The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Archives
  • Indexing

IJARAI Volume 4 Issue 11

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Vicarious Calibration Data Screening Method Based on Variance of Surface Reflectance and Atmospheric Optical Depth Together with Cross Calibration

Abstract: Vicarious calibration data screening method based on the measured atmospheric optical depth and the variance of the measured surface reflectance at the test sites is proposed. Reliability of the various calibration data has to be improved. In order to improve the reliability of the vicarious calibration data, some screenings have to be made. Through experimental study, it is found that vicarious calibration data screening would be better to apply with the measured atmospheric optical depth and variance of the measured surface reflectance due to the facts that thick atmospheric optical depth means that the atmosphere contains serious pollution sometime and that large deviation of the surface reflectance from the average means that the solar irradiance has an influence due to cirrus type of clouds. As the results of the screening, the uncertainty of vicarious calibration data from the approximated radiometric calibration coefficient is remarkably improved. Also, it is found that cross calibration uncertainty is poorer than that of vicarious calibration.

Author 1: Kohei Arai

Keywords: Vicarious calibration; Surface reflectance; Atmospheric Optical Depth; Sky-radiometer; Terra/ASTER; Satellite remote sensing

PDF

Paper 2: Method for Surface Reflectance Estimation with MODIS by Means of Bi-Section between MODIS and Estimated Radiance as well as Atmospheric Correction with Skyradiometer

Abstract: Method for surface reflectance estimation with MODIS by means of bi-section algorithm between MODIS and estimated radiance is proposed together with atmospheric correction with sky-radiometer data. Surface reflectance is one of MODIS products and is need to be improved its estimation accuracy. In particular the location near the skyradiometer or aeronet sites of which solar direct, aureole and diffuse radiance are measured, it is possible to improve the estimation accuracy of surface reflectance. The experiment is conducted at the skyradiometer site which is situated at Saga University. There is Ariake Sea near the Saga University. It is rather difficult to estimate surface reflectance of the sea surface because the reflectance is too low in comparison to that of land surface. In order to improve surface reflectance estimation accuracy, atmospheric correction is mandated. Atmospheric correction method is also proposed by using skyradiometer data. Through the experiment, it is found that these surface reflectance estimation and atmospheric correction methods are validated.

Author 1: Kohei Arai
Author 2: Kenta Azuma

Keywords: Sea surface reflectance; Atmospheric correction; Sky-radiometer; MODIS; satellite remote sensing

PDF

Paper 3: Defending Grey Attacks by Exploiting Wavelet Analysis in Collaborative Filtering Recommender Systems

Abstract: “Shilling” attacks or “profile injection” attacks have always major challenges in collaborative filtering recommender systems (CFRSs). Many efforts have been devoted to improve collaborative filtering techniques which can eliminate the “shilling” attacks. However, most of them focused on detecting push attack or nuke attack which is rated with the highest score or lowest score on the target items. Few pay attention to grey attack when a target item is rated with a lower or higher scores than the average score, which shows a more hidden rating behavior than push or nuke attack. In this paper, we present a novel detection method to make recommender systems resistant to such attacks. To characterize grey ratings, we exploit rating deviation of item to discriminate between grey attack profiles and genuine profiles. In addition, we also employ novelty and popularity of item to construct rating series. Since it is difficult to discriminate between the rating series of attacker and genuine users, we incorporate into discrete wavelet transform (DWT) to amplify these differences based on the rating series of rating deviation, novelty and popularity, respectively. Finally, we respectively extract features from rating series of rating deviation-based, novelty-based and popularity-based by using amplitude domain analysis method and combine all clustered results as our detection results. We conduct a list of experiments on the Book-Crossing dataset in diverse attack models. Experimental results were included to validate the effectiveness of our approach in comparison with benchmarked methods.

Author 1: Zhihai Yang
Author 2: Zhongmin Cai
Author 3: Agile Esmaeilikelishomi

Keywords: recommender system; grey attack; discrete wavelet transform; shilling attack

PDF

Paper 4: Implementation of Computer Assisted CIPP Model for Evaluation Program of HIV/AIDS Countermeasures in Bali

Abstract: One of the fact within economical development of tourism in Bali is indicated by established tourism facilities in order to support Bali tourism industry. Consquently, It has brought up effect that large numbers of new citizen search for occupation to Bali.Those people who came and settle in Bali temporaly or permanently, consequently Bali become heterogeneous.Thus, Bali become over populated. Since, over populated in Bali has risen up the economic sector and it has been spreading HIV /AIDS rapidly. As anticipation and prevention for contagious, developed and spreading HIV of Bali Provinse has regulated (regional act ) Number 3 2006 concerning of prevention act fr HIV/AIDS. As the matter of fact, regional act is not properly conducted yet as, therefore it is evaluation required f0r the rule and program that have been conducted by the government.One of the technical evaluation can be applied is CIPP model. However, CIPP model is still applied in conventional way and it has not yet contributed accurate evaluational count in processing the data, therefore by using CIPP model of computer assistance. This can be proved by ending up the result of the total program percentage of HIV /AID prevention by conventional counted result as much 88.000%, meanwhile the count with computer assistance end up with 88.400% in result. It shows high category.

Author 1: I Made Sundayana

Keywords: Evaluation; Computer Assisted CIPP Model

PDF

Paper 5: Prediction of New Student Numbers using Least Square Method

Abstract: STMIK BANJARBARU has acquired less number of new students for the last three years compared to the previous years. The numbers of new student acquisition are not always the same every year. The unstable number of new student acquisition made the difficulty in designing classes, lecturers, and other charges. Knowing the prediction number of new student acquisition for the coming period is very important as a basis for further decision making. Least Square method as the method of calculation to determine the scores prediction is often used to have a prediction, because the calculation is more accurate then moving average. The study was aimed to help the private colleges or universities, especially STMIK BANJARBARU, in predicting the number of new students who are accepted, so it will be easier to make decisions in determining the next steps and estimating the financial matters. The prediction of the number of new student acquisition will facilitates STMIK BANJARBARU to determine the number of classes, scheduling, etc. From the results of the study, it can be concluded that prediction analysis by using Least Square Method can be used to predict the number of new students acquisition for the coming period based on the student data in the previous years, because it produces valid results or closer to the truth. From the test results in the last 3 years, the validity shows 97.8%, so it can be said valid.

Author 1: Dwi Mulyani

Keywords: Prediction of New Students; Least Square method

PDF

Paper 6: Compressed Sensing Based Encryption Approach for Tax Forms Data

Abstract: In this work we investigate the possibility to use the measurement matrices from compressed sensing as secret key to encrypt / decrypt signals. Practical results and a comparison between BP (basis pursuit) and OMP (orthogonal matching pursuit) decryption algorithms are presented. To test our method, we used 10 text messages (10 different tax forms) and we generated 10 random matrices and for distortion validate we used the PRD (the percentage root-mean-square difference), its normalized version (PRDN) measures and NMSE (normalized mean square error). From the practical results we found that the time for BP algorithm is much higher than for OMP algorithm and the errors are smaller and should be noted that the OMP does not guarantee the convergence of the algorithm. We found that it is more advantageous, for tax forms (or other templates that show no interest for encryption) to encrypt only the recorded data. The time required for decoding is significantly lower than the decryption for the entire form

Author 1: Adrian Brezulianu
Author 2: Monica Fira
Author 3: Marius Daniel Pestina

Keywords: compressed sensing; encryption; security; greedy algorithms

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org