The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Archives
  • Proposals

Special Issue on Advances in Vehicular Ad Hoc Networking and Applications 2014

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Robust Automatic Traffic Signs Recognition Using Fast Polygonal Approximation of Digital Curves and Neural Network

Abstract: Traffic Sign Detection and Recognition (TSDR) has many features help the driver in improving the safety and comfort, today it is widely used in the automotive manufacturing sector, a robust detection and recognition system a good solution for driver assistance systems, it can warn the driver and control or prohibit certain actions which significantly increase driving safety and comfort. This paper presents a study to design, implement and test a method of detection and recognition of road signs based on computer vision. The approach adopted in this work consists of two main modules: a detection module which is based on color segmentation and edge detection to identify areas of the scene may contain road signs and a recognition module based on the multilayer perceptrons whose role is to match the patterns detected with road signs corresponding visual information. The development of these two modules is performed using the C/C++ language and the OpenCV library. The tests are performed on a set of real images of traffic to show the performance of the system being developed.

Author 1: Abderrahim SALHI
Author 2: Brahim MINAOUI
Author 3: Mohamed FAKIR

Keywords: Traffic sign; recognition; detection; pattern matching; image processing; Polygonal Approximation of digital curves

PDF

Paper 2: Time Slots Investment of a dead node in LEACH protocol on Wireless Sensor Network

Abstract: Wireless sensor network (MSN) is a wirelessly interconnected network. WSN promises a wide range of potential such as surveillance, military and civilian, to name just a few, applications. A sensor node senses the environment and delivers data to the sink. Energy saving is one of the keys to challenge network life time. LEACH protocol has been incorporated to extend network life time. This protocol forms clusters of the sensor nodes and elect one of them to become a Cluster Head (CH) to route data cluster to sink. In cluster, communication uses TDMA technique. This latter organizes transmission time (Time Slot) which corresponds to each node member of cluster. When a node dies, time slot corresponding to this node will be free. In this paper, we will present LEACH comportments after a node dies, then we will propose some ideas to invest its time slots by alive node members to maximize data reception time parameter so throughput end-to-end. This parameter is very important for real-time data. Finally, we will simulate this idea with Network Simulator (NS2) to argue for our propositions.

Author 1: Abedelhalim HNINI
Author 2: Abdellah EZZATI
Author 3: Mohammed FIHRI
Author 4: Abdelmajid HAJAMI

Keywords: Network Clustering; routing protocol; Ad hoc Network; LEACH; WSN; Node dies

PDF

Paper 3: A comparative study of decision tree ID3 and C4.5

Abstract: Data mining is the useful tool to discovering the knowledge from large data. Different methods & algorithms are available in data mining. Classification is most common method used for finding the mine rule from the large database. Decision tree method generally used for the Classification, because it is the simple hierarchical structure for the user understanding & decision making. Various data mining algorithms available for classification based on Artificial Neural Network, Nearest Neighbour Rule & Baysen classifiers but decision tree mining is simple one. ID3 and C4.5 algorithms have been introduced by J.R Quinlan which produce reasonable decision trees. The objective of this paper is to present these algorithms. At first we present the classical algorithm that is ID3, then highlights of this study we will discuss in more detail C4.5 this one is a natural extension of the ID3 algorithm. And we will make a comparison between these two algorithms and others algorithms such as C5.0 and CART.

Author 1: Badr HSSINA
Author 2: Abdelkarim MERBOUHA
Author 3: Hanane EZZIKOURI
Author 4: Mohammed ERRITALI

Keywords: Data mining; classification algorithm; decision tree; ID3 algorithme; C4.5 algorithme

PDF

Paper 4: The Impact of Black-Hole Attack on AODV Protocol

Abstract: In mobile Ad-Hoc networks, each node of the network must contribute in the process of communication and routing. However this contribution can expose the network to several types of attackers. In this paper, we study the impact of one attack called BLACK-HOLE, on Ad hoc On-Demand Distance Vector routing protocol. In this attack a malicious node can be placed between two or several nodes, and begin dropping all packets from a source and breaking communications between nodes. The vulnerability of the route discovery packets is exploited by the attacker with a simple modification in the routing protocol, in order to control all the traffic between nodes. In this study we simulate the attack with NS2, taking into account the mobility of the network and the attacker, the position of the attacker and finally the number of the attackers. We will also see the impact of this attack in a higher number of loss packet compared with AODV in normal situation.

Author 1: FIHRI Mohammed
Author 2: OTMANI Mohamed
Author 3: EZZATI Abdellah

Keywords: Black-Hole; AODV; Attack

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org