The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 11

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Predicting Garden Path Sentences Based on Natural Language Understanding System

Abstract: Natural language understanding (NLU) focusing on machine reading comprehension is a branch of natural language processing (NLP). The domain of the developing NLU system covers from sentence decoding to text understanding and the automatic decoding of GP sentence belongs to the domain of NLU system. GP sentence is a special linguistic phenomenon in which processing breakdown and backtracking are two key features. If the syntax-based system can present the special features of GP sentence and decode GP sentence completely and perfectly, NLU system can improve the effectiveness and develop the understanding skill greatly. On the one hand, by means of showing Octav Popescu’s model of NLU system, we argue that the emphasis on the integration of syntactic, semantic and cognitive backgrounds in system is necessary. On the other hand, we focus on the programming skill of IF-THEN-ELSE statement used in N-S flowchart and highlight the function of context free grammar (CFG) created to decode GP sentence. On the basis of example-based analysis, we reach the conclusion that syntax-based machine comprehension is technically feasible and semantically acceptable, and that N-S flowchart and CFG can help NLU system present the decoding procedure of GP sentence successfully. In short, syntax-based NLU system can bring a deeper understanding of GP sentence and thus paves the way for further development of syntax-based natural language processing and artificial intelligence.

Author 1: DU Jia-li
Author 2: YU Ping-fang

Keywords: Natural language understanding; N-S flowchart; computational linguistics; context free grammar; garden path sentences.

PDF

Paper 2: Extending UML for trajectory data warehouses conceptual modelling

Abstract: The new positioning and information capture technologies are able to treat data related to moving objects taking place in targeted phenomena. This gave birth to a new data source type called trajectory data (TD) which handle information related to moving objects. Trajectory Data must be integrated in a new data warehouse type called trajectory data warehouse (TDW) that is essential to model and to implement in order to analyze and understand the nature and the behavior of movements of objects in various contexts. However, classical conceptual modeling does not incorporate the specificity of trajectory data due to the complexity of their components that are spatial, temporal and thematic (semantic). For this reason, we focus in this paper on presenting the conceptual modeling of the trajectory data warehouse by defining a new profile using the StarUML extensibility mechanism.

Author 1: Wided Oueslati
Author 2: Jalel Akaichi

Keywords: Trajectory data; trajectory data warehouse; UML extension; trajectory UML profile.

PDF

Paper 3: Optimal itinerary planning for mobile multiple agents in WSN

Abstract: Multi mobile agents based on data collection and aggregations have proved their effective in wireless sensor networks (WSN). However, the way in which these agents are deployed must be intelligently planned and should be adapted to the characteristics of wireless sensor networks. While most existing studies are based on the algorithms of itinerary planning for multiple agents i.e. determining the number of mobile agents (MAs) to be deployed, how to group source nodes for each MA, attributing the itinerary of each MA for its source nodes. These algorithms determine the efficiency or effectiveness of aggregation. This paper aims at presenting the drawbacks of these approaches in large-scale network, and proposes a method for grouping network nodes to determine the optimal itinerary based on multi agents using a minimum amount of energy with efficiency of aggregation in a minimum time. Our approach is based on the principle of visiting central location (VCL). The simulation experiments show that our approach is more efficient than other approaches in terms of the amount of energy consumed in relation with the efficiency of aggregation in a minimum time.

Author 1: Mostefa BENDJIMA
Author 2: Mohamed FEHAM

Keywords: Wireless sensor networ; mobile agent; optimal itinerary; energy efficiency.

PDF

Paper 4: Genetic procedure for the Single Straddle Carrier Routing Problem

Abstract: This paper concentrates on minimizing the total travel time of the Straddle Carrier during the loading operations of outbound containers in a seaport container terminal. Genetic Algorithm is well-known meta-heuristic approach inspired by the natural evolution of the living organisms. Heuristic procedure is developed to solve this problem by recourse to some genetic operators. A numerical experimentation is carried out in order to evaluate the performance and the efficiency of the solution.

Author 1: Khaled MILI
Author 2: Faissal MILI

Keywords: Component; Container terminal optimization; routing Straddle Carrier; heuristic; Assignment strategy; Genetic Algorithm.

PDF

Paper 5: Virtual Enterprise Network based on IPSec VPN Solutions and Management

Abstract: Informational society construction can’t be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. Internet Protocol Security is a framework of open standards for ensuring private communications over public networks. It has become the most common network layer security control, typically used to create a virtual private network. Network management represents the activities, methods, procedures, and tools (software and hardware) that pertain to the operation, administration, maintenance, and provisioning of networked systems. Therefore, this work analyses the network architecture for an enterprise (industrial holding) geographically dispersed. In addition, the paper presents a network management solution for a large enterprise us

Author 1: Sebastian Mariu Rosu
Author 2: Marius Marian Popescu
Author 3: George Dragoi
Author 4: Ioana Raluca Guica

Keywords: Enterprise network; IPSec; network architecture; VPN; network management.

PDF

Paper 6: Analyzing the Efficiency of Text-to-Image Encryption Algorithm

Abstract: Today many of the activities are performed online through the Internet. One of the methods used to protect the data while sending it through the Internet is cryptography. In a previous work we proposed the Text-to-Image Encryption algorithm (TTIE) as a novel algorithm for network security. In this paper we investigate the efficiency of (TTIE) for large scale collection.

Author 1: Ahmad Abusukhon
Author 2: Mohammad Talib
Author 3: Maher A. Nabulsi

Keywords: Algorithm; Network; Secured Communication; Encryption & Decryption; Private key; Encoding.

PDF

Paper 7: DNA Sequence Representation and Comparison Based on Quaternion Number System

Abstract: Conventional schemes for DNA sequence representation, storage, and processing areusually developed based on the character-based formats.We propose the quaternion number system for numerical representation and further processing on DNA sequences.In the proposed method, the quaternion cross-correlation operation can be used to obtain both the global and local matching/mismatching information between two DNA sequences from the depicted one-dimensional curve and two-dimensional pattern, respectively.Simulation results on various DNA sequences and the comparison result with the well-known BLAST method are obtained to verify the effectiveness of the proposed method.

Author 1: Hsuan T Chang
Author 2: Chung J. Kuo
Author 3: Neng-Wen Lo
Author 4: Wei-Z.Lv

Keywords: Bioinformatics; genomic signal processing; DNA sequence; quaternion number; data visualization.

PDF

Paper 8: Evaluation of Regressive Analysis Based Sea Surface Temperature Estimation Accuracy with NCEP/GDAS Data

Abstract: In order to evaluate the skin surface temperature (SSST) estimation accuracy with MODIS data, 84 of MODIS scenes together with the match-up data of NCEP/GDAS are used. Through regressive analysis, it is found that 0.305 to 0.417 K of RMSE can be achieved. Furthermore, it also is found that band 29 is effective for atmospheric correction (30.6 to 38.8% of estimation accuracy improvement). If single coefficient set for the regressive equation is used for all the cases, SSST estimation accuracy is around 1.969 K so that the specific coefficient set for the five different cases have to be set.

Author 1: Kohei Arai

Keywords: Thermal infrared radiometer; Skin sea surface temperature; Regressive analysis; Split window method; NCEP/GDAS; MODTRAN; Terra and AQUA/MODIS

PDF

Paper 9: The Modelling Process of a Paper Folding Problem in GeoGebra 3D

Abstract: In this research; a problem situation, which requires the ability of thinking in three dimensions, was developed by the researchers. As the purpose of this paper is producing a modeling task suggestion, the problem was visualized and analyzed in GeoGebra3D environment. Then visual solution was also been supported by algebraic approach. So, the capability of creating the relationship between geometric and algebraic representations in GeoGebra was also presented in 3D sense.

Author 1: Muharrem Aktumen
Author 2: BekirKursat Doruk
Author 3: Tolga Kabaca

Keywords: component; Modelling, GeoGebra 3D, Paper Folding.

PDF

Paper 10: Sensitivity Analysis of Fourier Transformation Spectrometer: FTS Against Observation Noise on Retrievals of Carbon Dioxide and Methane

Abstract: Sensitivity analysis of Fourier Transformation Spectrometer: FTS against observation noise on retrievals of carbon dioxide and methane is conducted. Through experiments with real observed data and additive noise, it is found that the allowable noise on FTS observation data is less than 2.1x10-5 if estimation accuracy of total column carbon dioxide and methane is better than 1(%).

Author 1: Kohei Arai
Author 2: Hiroshi Okumura
Author 3: Takuya Fukamachi
Author 4: Shuji Kawakami
Author 5: Hirofumi Ohyama

Keywords: FTS; carbon dioxide, methane, sensitivity analysis, error analysis.

PDF

Paper 11: Sensitivity Analysis for Water Vapor Profile Estimation with Infrared: IR Sounder Data Based on Inversion

Abstract: Sensitivity analysis for water vapor profile estimation with Infrared: IR sounder data based on inversion is carried out. Through simulation study, it is found that influence due to ground surface relative humidity estimation error is greater than that of sea surface temperature estimation error on the water vapor vertical profile retrievals.

Author 1: Kohei Arai

Keywords: IR sounde; error budget analysis; MODTRAN; air temperature; relative humidity.

PDF

Paper 12: Wavelet Based Change Detection for Four Dimensional Assimilation Data in Space and Time Domains

Abstract: Method for time change detection of four dimensional assimilation data by means of wavelet analysis is proposed together with spatial change detection with satellite imagery data. The method is validated with assimilation data and the same scale of satellite imagery data. Experimental results show that the proposed method does work well in visually.

Author 1: Kohei Arai

Keywords: Assimilation; change detection; wavelet analysis.

PDF

Paper 13: Method for Image Source Separation by Means of Independent Component Analysis: ICA, Maximum Entory Method: MEM, and Wavelet Based Method: WBM

Abstract: Method for image source separation based on Independent Component Analysis: ICA, Maximum Entropy Method: MEM, and Wavelet Based Method: WBM is proposed. Experimental results show that image separation can be done from the combined different images by using the proposed method with an acceptable residual error.

Author 1: Kohei Arai

Keywords: Blind separation; image separation; cucktail party effect; ICA; MEM; wavelet analuysis.

PDF

Paper 14: Multifinger Feature Level Fusion Based Fingerprint Identification

Abstract: Fingerprint based authentication systems are one of the cost-effective biometric authentication techniques employed for personal identification. As the data base population increases, fast identification/recognition algorithms are required with high accuracy. Accuracy can be increased using multimodal evidences collected by multiple biometric traits. In this work, consecutive fingerprint images are taken, global singularities are located using directional field strength and their local orientation vector is formulated with respect to the base line of the finger. Feature level fusion is carried out and a 32 element feature template is obtained. A matching score is formulated for the identification and 100% accuracy was obtained for a database of 300 persons. The polygonal feature vector helps to reduce the size of the feature database from the present 70-100 minutiae features to just 32 features and also a lower matching threshold can be fixed compared to single finger based identification.

Author 1: Praveen N
Author 2: Tessamma Thomas

Keywords: fingerprint; multimodal biometrics; gradient; orientation field; singularity; matching score.

PDF

Paper 15: Gender Effect Canonicalization for Bangla ASR

Abstract: This paper presents a Bangla (widely used as Bengali) automatic speech recognition system (ASR) by suppressing gender effects. Gender characteristic plays an important role on the performance of ASR. If there is a suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In the proposed method, we have designed a new ASR incorporating the Local Features (LFs) instead of standard mel frequency cepstral coefficients (MFCCs) as an acoustic feature for Bangla by suppressing the gender effects, which embeds three HMM-based classifiers for corresponding male, female and geneder-independent (GI) characteristics. In the experiments on Bangla speech database prepared by us, the proposed system has achieved a significant improvement of word correct rates (WCRs), word accuracies (WAs) and sentence correct rates (SCRs) in comparison with the method that incorporates Standard MFCCs.

Author 1: B.K.M Mizanur Rahman
Author 2: Bulbul Ahamed
Author 3: Md. Asfak-Ur-Rahman
Author 4: Khaled Mahmud
Author 5: Mohammad Nurul Huda

Keywords: Acoustic Model; AutomaticSpeech Recognition; Gender Effects Suppression; Hidden Markov Model.

PDF

Paper 16: Three Layer Hierarchical Model for Chord

Abstract: Increasing popularity of decentralized Peer-to-Peer (P2P) architecture emphasizes on the need to come across an overlay structure that can provide efficient content discovery mechanism, accommodate high churn rate and adapt to failures in the presence of heterogeneity among the peers. Traditional p2p systems incorporate distributed client-server communication, which finds the peer efficiently that store a desires data item, with minimum delay and reduced overhead. However traditional models are not able to solve the problems relating scalability and high churn rates. Hierarchical model were introduced to provide better fault isolation, effective bandwidth utilization, a superior adaptation to the underlying physical network and a reduction of the lookup path length as additional advantages. It is more efficient and easier to manage than traditional p2p networks. This paper discusses a further step in p2p hierarchy via 3-layers hierarchical model with distributed database architecture in different layer, each of which is connected through its root. The peers are divided into three categories according to their physical stability and strength. They are Ultra Super-peer, Super-peer and Ordinary Peer and we assign these peers to first, second and third level of hierarchy respectively. Peers in a group in lower layer have their own local database which hold as associated super-peer in middle layer and access the database among the peers through user queries. In our 3-layer hierarchical model for DHT algorithms, we used an advanced Chord algorithm with optimized finger table which can remove the redundant entry in the finger table in upper layer that influences the system to reduce the lookup latency. Our research work finally resulted that our model really provides faster search since the network lookup latency is decreased by reducing the number of hops. The peers in such network then can contribute with improve functionality and can perform well in P2P networks.

Author 1: Waqas A imtiaz
Author 2: Shimul Shil
Author 3: A.K.M Mahfuzur Rahman

Keywords: Hierarchy; DHT; CHORD; P2P.

PDF

Paper 17: Automatic Facial Expression Recognition Based on Hybrid Approach

Abstract: The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years. Several techniques have emerged in order to improve the efficiency of the recognition by addressing problems in face detection and extraction features in recognizing expressions. This paper has proposed automatic system for facial expression recognition which consists of hybrid approach in feature extraction phase which represent a combination between holistic and analytic approaches by extract 307 facial expression features (19 features by geometric, 288 feature by appearance). Expressions recognition is performed by using radial basis function (RBF) based on artificial neural network to recognize the six basic emotions (anger, fear, disgust, happiness, surprise, sadness) in addition to the natural. The system achieved recognition rate 97.08% when applying on person-dependent database and 93.98% when applying on person-independent.

Author 1: Ali K. K. Bermani
Author 2: Atef Z. Ghalwash
Author 3: Aliaa A. A. Youssif

Keywords: Facial expression recognition; geometric and appearance modeling; Expression recognition; Gabor wavelet; principal component analysis (PCA); neural network.

PDF

Paper 18: Design of A high performance low-power consumption discrete time Second order Sigma-Delta modulator used for Analog to Digital Converter

Abstract: This paper presents the design and simulations results of a switched-capacitor discrete time Second order Sigma-Delta modulator used for a resolution of 14 bits Sigma-Delta analog to digital converter. The use of operational amplifier is necessary for low power consumption, it is designed to provide large bandwidth and moderate DC gain. With 0.35µm CMOS technology, the S? modulator achieves 86 dB dynamic range, and 85 dB signal to noise ratio (SNR) over an 80 KHz signal bandwidth with an oversampling ratio (OSR) of 88, while dissipating 9.8mW at ±1.5V supply voltage.

Author 1: Radwene LAAJIMI
Author 2: Mohamed MASMOUDI

Keywords: CMOS technology; Analog-to-Digital conversion; Low power electronics; Sigma-Delta modulation; switched-capacitor circuits; transconductance operational amplifier.

PDF

Paper 19: Short Answer Grading Using String Similarity And Corpus-Based Similarity

Abstract: Most automatic scoring systems use pattern based that requires a lot of hard and tedious work. These systems work in a supervised manner where predefined patterns and scoring rules are generated. This paper presents a different unsupervised approach which deals with students’ answers holistically using text to text similarity. Different String-based and Corpus-based similarity measures were tested separately and then combined to achieve a maximum correlation value of 0.504. The achieved correlation is the best value achieved for unsupervised approach Bag of Words (BOW) when compared to previous work.

Author 1: Wael H Gomaa
Author 2: Aly A. Fahmy

Keywords: Automatic Scoring; Short Answer Grading; Semantic Similarity; String Similarity; Corpus-Based Similarity.

PDF

Paper 20: Hybrid intelligent system for Sale Forecasting using Delphi and adaptive Fuzzy Back-Propagation Neural Networks

Abstract: Sales forecasting is one of the most crucial issues addressed in business. Control and evaluation of future sales still seem concerned both researchers and policy makers and managers of companies. this research propose an intelligent hybrid sales forecasting system Delphi-FCBPN sales forecast based on Delphi Method, fuzzy clustering and Back-propagation (BP) Neural Networks with adaptive learning rate. The proposed model is constructed to integrate expert judgments, using Delphi method, in enhancing the model of FCBPN. Winter’s Exponential Smoothing method will be utilized to take the trend effect into consideration. The data for this search come from an industrial company that manufactures packaging. Analyze of results show that the proposed model outperforms other three different forecasting models in MAPE and RMSE measures.

Author 1: Attariuas Hicham
Author 2: Bouhorma Mohammed
Author 3: Sofi Anas

Keywords: Component; Hybrid intelligence approach; Delphi Method; Sales forecasting; fuzzy clustering; fuzzy system; back propagation network.

PDF

Paper 21: Continuous Bangla Speech Segmentation using Short-term Speech Features Extraction Approaches

Abstract: This paper presents simple and novel feature extraction approaches for segmenting continuous Bangla speech sentences into words/sub-words. These methods are based on two simple speech features, namely the time-domain features and the frequency-domain features. The time-domain features, such as short-time signal energy, short-time average zero crossing rate and the frequency-domain features, such as spectral centroid and spectral flux features are extracted in this research work. After the feature sequences are extracted, a simple dynamic thresholding criterion is applied in order to detect the word boundaries and label the entire speech sentence into a sequence of words/sub-words. All the algorithms used in this research are implemented in Matlab and the implemented automatic speech segmentation system achieved segmentation accuracy of 96%.

Author 1: Md Mijanur Rahman
Author 2: Md. Al-Amin Bhuiyan

Keywords: Speech Segmentation; Features Extraction; Short-time Energy; Spectral Centroid; Dynamic Thresholding.

PDF

Paper 22: A Randomized Fully Polynomial-time Approximation Scheme for Weighted Perfect Matching in the Plane

Abstract: In the approximate Euclidean min-weighted perfect matching problem, a set of points in the plane and a real number are given. Usually, a solution of this problem is a partition of points of into pairs such that the sum of the distances between the paired points is at most times the optimal solution. In this paper, the authors give a randomized algorithm which follows a Monte-Carlo method. This algorithm is a randomized fully polynomial-time approximation scheme for the given problem. Fortunately, the suggested algorithm is a one tackled the matching problem in both Euclidean nonbipartite and bipartite cases. The presented algorithm outlines as follows: With repeating times, we choose a point from to build the suitable pair satisfying the suggested condition on the distance. If this condition is achieved, then remove the points of the constructed pair from and put this pair in (the output set of the solution). Then, choose a point and the nearest point of it from the remaining points in to construct a pair and put it in . Remove the two points of the constructed pair from and repeat this process until becomes an empty set. Obviously, this method is very simple. Furthermore, our algorithm can be applied without any modification on complete weighted graphs and complete weighted bipartite graphs , where and m is an even.

Author 1: Yasser M. Abd El-Latif
Author 2: Salwa M. Ali
Author 3: Hanaa A.E. Essa
Author 4: Soheir M. Khamis

Keywords: Perfect matching; approximation algorithm; Monte-Carlo technique; a randomized fully polynomial-time approximation scheme; and randomized algorithm.

PDF

Paper 23: Cost Analysis of Algorithm Based Billboard Manger Based Handover Method in LEO satellite Networks

Abstract: Now-a-days LEO satellites have an important role in global communication system. They have some advantages like low power requirement and low end-to-end delay, more efficient frequency spectrum utilization between satellites and spot beams over GEO and MEO. So in future they can be used as a replacement of modern terrestrial wireless networks. But the handover occurrence is more due to the speed of the LEOs. Different protocol has been proposed for a successful handover among which BMBHO is more efficient. But it had a problem during the selection of the mobile node during handover. In our previous work we have proposed an algorithm so that the connection can be established easily with the appropriate satellite. In this paper we will evaluate the mobility management cost of Algorithm based Billboard Manager Based Handover method (BMBHO). A simulation result shows that the cost is lower than the cost of Mobile IP of SeaHO-LEO and PatHO-LEO.

Author 1: Suman Kumar Sikdar
Author 2: Soumaya Das
Author 3: Debabrata Sarddar

Keywords: Component; Handover latency; LEO satellite; Mobile Node (MN); Billboard Manager (BM).

PDF

Paper 24: An agent based approach for simulating complex systems with spatial dynamics application in the land use planning

Abstract: In this research a new agent based approach for simulating complex systems with spatial dynamics is presented. We propose an architecture based on coupling between two systems: multi-agent systems and geographic information systems. We also propose a generic model of agent-oriented simulation that we will apply to the field of land use planning. In fact, simulating the evolution of the urban system is a key to help decision makers to anticipate the needs of the city in terms of installing new equipment and opening new urbanization’ areas to install the new population.

Author 1: Fatimazahra BARRAMOU
Author 2: Malika ADDOU

Keywords: Multi-agent system; Geographic information system; Modeling; Simulation; Complex system; Land use planning.

PDF

Paper 25: Improving Web Page Prediction Using Default Rule Selection

Abstract: Mining user patterns of web log files can provide significant and useful informative knowledge. A large amount of research has been done in trying to predict correctly the pages a user will most likely request next. Markov models are the most commonly used approaches for this type of web access prediction. Web page prediction requires the development of models that can predict a user’s next access to a web server. Many researchers have proposed a novel approach that integrates Markov models, association rules and clustering in web site access predictability. The low order Markov models provide higher coverage, but these are couched in ambiguous rules. In this paper, we introduce the use of default rule in resolving web access ambiguous predictions. This method could provide better prediction than using the individual traditional models. The results have shown that the default rule increases the accuracy and model-accuracy of web page access predictions. It also applies to association rules and the other combined models.

Author 1: Thanakorn Pamutha
Author 2: Chom Kimpan
Author 3: Siriporn Chimplee
Author 4: Parinya Sanguansat

Keywords: web mining, web usage mining; user navigation session; Markov model; association rules; Web page prediction; rule-selection methods.

PDF

Paper 26: Multilayer Neural Networks and Nearest Neighbor Classifier Performances for Image Annotation

Abstract: The explosive growth of image data leads to the research and development of image content searching and indexing systems. Image annotation systems aim at annotating automatically animage with some controlled keywords that can be used for indexing and retrieval of images. This paper presents a comparative evaluation of the image content annotation system by using the multilayer neural networks and the nearest neighbour classifier. The region growing segmentation is used to separate objects, the Hu moments, Legendre moments and Zernike moments which are used in as feature descriptors for the image content characterization and annotation.The ETH-80 database image is used in the experiments here. The best annotation rate is achieved by using Legendre moments as feature extraction method and the multilayer neural network as a classifier.

Author 1: Mustapha OUJAOURA,
Author 2: Brahim MINAOUI
Author 3: Mohammed FAKIR

Keywords: Image annotation; region growing segmentation; multilayer neural network classifier; nearest neighbour classifier; Zernike moments; Legendre moments; Hu moments; ETH-80 database.

PDF

Paper 27: Minimization of Call Blocking Probability using Mobile Node velocity

Abstract: Due to rapid growth in IEEE 802.11 based Wireless Local Area Networks (WLAN), handoff has become a burning issue. A mobile Node (MN) requires handoff when it travels out of the coverage area of its current access point (AP) and tries to associate with another AP. But handoff delays provide a serious barrier for such services to be made available to mobile platforms. Throughout the last few years there has been plenty of research aimed towards reducing the handoff delay incurred in the various levels of wireless communication.In this article, we propose a received signal strength measurement based handoff technique to improve handoff probability. By calculating the speed of MN (Mobile Node) and signaling delay information we try to take the right decision of handoff initiation time. Our theoretical analysis and simulation results show that by taking the proper decision for handoff we can effectively reduce false handoff initiation probability and unnecessary traffic load causing packet loss and call blocking.

Author 1: Suman Kumar Sikdar
Author 2: Uttam Kumar Kundu,
Author 3: Debabrata Sarddar

Keywords: component; Next Generation Wireless Systems (NGWS); Handoff; BS (Base Station); MN (Mobile Node); RSS (Received signal strength); IEEE802.11

PDF

Paper 28: A Pheromone Based Model for Ant Based Clustering

Abstract: Swarm intelligence is a collective effort of simple agents working locally but resulting in wonderful patterns. Labor division, decentralized control, stigmergy and self organization are the major components of swarm intelligence. Ant based clustering is inspired by brood sorting in ant colonies, an example of decentralized and self organized work. Stigmergy in ant colonies is via a chemical pheromone. This paper proposes a pheromone based ant clustering algorithm. In the proposed method, ant agents use pheromone to communicate the place to make the clusters, not the path as in real ants. The pheromone concentration helps to decide pick and drop of objects with less parameters and calculations. The simulations have shown good and dense cluster results.

Author 1: Saroj Bala
Author 2: S. I. Ahson
Author 3: R. P. Agarwal

Keywords: Ant colony optimization; Clustering; Stigmergy; Pheromone.

PDF

Paper 29: Modern and Digitalized USB Device With Extendable Memory Capacity

Abstract: This paper proposes a advance technology which is completely innovative and creative. The urge of inventing this proposal lies on the bases of the idea of making a pen drive have an extendable memory capacity with a modern and digitalized look. This device can operate without the use of a computer system or a mobile. The computerized pen drive has a display unit to display the contents of the pen drive and in-built USB slots to perform data transmission to other pen drives directly without the use of the computer system. The implementation of the extendable memory slots to the computerized pen drive makes it a modern digitalized and extendable USB device. The implementation of an operating system and a processor to the pen drive are the main challenges in this proposed system. The design of the system is done in such a way that the device is cost efficient and user friendly. The design process and the hardware, software structures of this modern and digitalized USB device with extendable memory capacity are explained in detail in this paper.

Author 1: J Nandini Meeraa
Author 2: S.Devi Abirami
Author 3: N.Indhuja
Author 4: R.Aravind
Author 5: C.Chithiraikkayalvizhi
Author 6: K.Rathina Kumar

Keywords: extendable memory capacity;in-built USB slots; computerized pen drive; operating system;processor.

PDF

Paper 30: Enhanced ModifiedSecurity Framework for Nigeria Cashless E-payment System

Abstract: In January 2012, the Nigeria Apex Bank, Central Bank of Nigeria (CBN) rolled out guidelines for the transition of Nigeria’s mainly cash-based economy and payment system to cashless and electronic payment (e-payment) system ending over 50 years of mainly cash-based operated economy and payment system. This announcement elicited mixed reactions firstly excitement due to the enormous benefits this transition will impact on Nigeria economy and at the same time elicited panic due to unpreparedness of the economy to transit successfully to electronic payment in a system hitherto filled with bobby trap of security challenges. Ten months later after the introduction of the policy, only a handful of the major stakeholders are fully compliant mainly because of the complexity and the high prohibitive cost of implementation of CBN adopted security framework, the Payment Card Industry Data Security Standard (PCI DSS). This paper surveys the security challenges facing the full implementation of the cashless epayment policy of Nigeria and at the end introduced an enhanced modified security framework for Nigeria’s cashless economy that may be easier and cheaper to implement by the majority of the stakeholders after studying the loopholes in the current Nigeria epayment system models.

Author 1: Fidelis C Obodoeze
Author 2: Dr. Francis A. Okoye
Author 3: Samuel C.Asogwa
Author 4: Frank E.Ozioko
Author 5: Calister N.Mba

Keywords: Cashless economy; electronic payment security; CBN; Nigeria;PoS; ATM; Bank Server; PCI DSS.

PDF

Paper 31: Cashless Society: An Implication To Conomic Growth & Development In Igeria

Abstract: The Central Bank of Nigeria (CBN) announced a new cash policy (Cashless Society), which began on 1st of January 2012 in Lagos state. The policy will be effective nationwide from June 1st 2012. The various technologies and issues involved in cashless society are discussed. This research work sampled the opinions of the general public on issues surrounding the Cashless Society by using structured questionnaire to gather information from people. Data obtained was tabulated and the result was analyzed using percentages. The analyzed result was presented graphically and it was discovered that larger percentage of sampled population are of the opinion that Cashless Society will proffer solution to high risk of cash related crimes such as illegal immigration, financing Terrorism, illegal drug Trade, Human Trafficking, corruption etc. It will enhance effectiveness of monetary policy in managing inflation in Nigeria, thereby improving economic growth and development. Various issues such as benefits and social implication of Cashless Society are discussed. We proposed a Model Cashless System for Nigeria, which will be more convenient for people toappreciate, embrace, and use.

Author 1: N A YEKINI
Author 2: I. K. OYEYINKA
Author 3: O.O. AYANNUGA
Author 4: O. N. LAWAL
Author 5: A. K. AKINWOLE

Keywords: Cashless Society; Corruption; Development; Economic growth; Electronic Card.

PDF

Paper 32: The Analysis of the Components of Project-Based Learning on Social Network

Abstract: This research aims to analyze the components of project based learning on social network, case study of presentation skill course. The study was carried out with 98 representatives of 2nd – 3rd year students of Educational Communications and Technology Department, 2nd semester, academic year 2554, who was studying ETM 205 Presentation Skill. 5 point-rating scale questionnaire was used as the research tool for data collection for analyzing the obtained data which has the reliability as 0.94 and using the mean, Standard Deviation (S.D.), factor analysis, varimax method in data analysis. The results can be concluded as follows:Ten components of project based learning on social network, case study of Presentation Skill course was divided into 3 steps following Ministry of Education’s framework as follows: 1) Pre-Project Stage consists of the 3rd component: The introduction of presentation skill and sharing ideas through social network, the 5th component: The learner preparation of pre-project stage, the 9th component: Writing the schemes and skills development training and the 10th component: The presentation skill training in group and individual 2) While / During-Project Stage consists of The 2nd component: Roles and responsibilities during project stage and communication, the 6th component: Readiness of performing duties of individual or group of people which communicate through social network and the 8th component: Guidance and agreement which learner submit voluntarily 3) Post-Project Stage consists of the 1st component: Evaluations, document management system, presentation, the 4th component: Instructor evaluation, feedback, congratulations to learners who achieve successful project and the 7th component: Multi-channel evaluation by regression equation or forecast equation concerning the analysis of the components of project learning management on social network

Author 1: Kuntida Thamwipat
Author 2: Napassawan Yookong

Keywords: analysis of the componenst; project-based learning; social network; Presentation Skill course.

PDF

Paper 33: A Database Creation for Storing Electronic Documents and Research of the Staff

Abstract: The research study aims at creating the database for storing Electronic Documents and Research of the staff in the Department of Educational Communications and Technology, evaluating its quality and measuring the satisfaction of the database by users. The sample subjects are 14 instructors and officers in the Department of Educational Communications and Technology, King Mongkut’s University of Technology Thonburi, in the second term of academic year 2012. The research tool is the database for storing Electronic Documents and Research of the staff in Department of Educational Communications and Technology. According to the evaluation by 3 experts in the area of Education Quality Assurance, the values of mean score and standard deviation are 4.51 and 0.38, respectively. This implies that the corresponding assurance quality of the database is very good. The media quality evaluation by 3 media specialists shows that its mean score is 4.58 and its standard deviation is 0.46. The evaluation result consequently indicates a very good quality of media. In terms of satisfaction on the database, the results obtained using questionnaires shows high satisfaction scores. The mean score is 4.15 and the standard deviation is 0.55 and this can be concluded that the database can be used effectively in the department.

Author 1: Pornpapatsorn Princhankol
Author 2: Siriwan Phacharakreangchai

Keywords: database creation; electronic documents; research.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org