The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 12

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A new approach towards the self-adaptability of Service-Oriented Architectures to the context based on workflow

Abstract: Distributed information systems are needed to be autonomous, heterogeneous and adaptable to the context. This is the reason why they resort Web services based on SOA Based on the advanced technology of SOA. These technologies can evolve in a dynamic environment in a well-defined context and according to events automatically, such as time, temperature, location, authentication, etc... This is what we call self-adaptability to context. In this paper, we are interested in improving the different needs of this criterion and we propose a new approach towards a self-adaptability of SOA to the context based on workflow and showing the feasibility of this approach by integration the workflow under a platform and test this integration by a case study.

Author 1: Faîçal Felhi
Author 2: Jalel Akaichi

Keywords: SOA; Webservices; self-adaptability; ubiquitous system; workflow.

Download PDF

Paper 2: Monte Carlo Ray Tracing Based Sensitivity Analysis of the Atmospheric and the Ocean Parameters on Top of the Atmosphere Radiance

Abstract: Monte Carlo Ray Tracing: MCRT based sensitivity analysis of the geophysical parameters (the atmosphere and the ocean) on Top of the Atmosphere: TOA radiance in visible to near infrared wavelength regions is conducted. As the results, it is confirmed that the influence due to the atmosphere is greater than that of the ocean. Scattering and absorption due to aerosol particles and molecules in the atmosphere is major contribution followed by water vapor and ozone while scattering due to suspended solid is dominant contribution for the ocean parameters.

Author 1: Kohei Arai

Keywords: Monte Carlo Ray Tracing; radiative transfer; scattering and absorption; geophysical parameters (the atmosphere and the ocean).

Download PDF

Paper 3: Statistical Analysis of the Demographic Ageing Process in the EU Member States, Former Communist Countries

Abstract: The aim of this paper is to make an analysis and a comparative study of the demographic ageing process in the former communist countries which are currently EU member states. Taking into account the complexity of the phenomenon, the study approaches only a part of the indices involved in this process. According to the structure of the population on groups of ages and sexes, the population pyramid is built and in this context we carried out various analyses and comparisons among countries. Further we approach determining demographic factors for the ageing process of the population, as for example the evolution of the young population, the mortality rate and the life expectancy and the changes in the population structure are pointed out with the help of the demographic dependency rate. There have been made a series of statistical correlations and predictions which allowed for a more concrete explanation of the evolution of the demographic ageing phenomenon.

Author 1: Dorel Savulea
Author 2: Nicolae Constantinescu

Keywords: component; statistical analysis; demographic analyse; statistical correlation.

Download PDF

Paper 4: Pattern Recognition-Based Environment Identification for Robust Wireless Devices Positioning

Abstract: There has been a continuous increase in the demands for Global Navigation Satellite System (GNSS) receivers in a wide range of applications. More and more wireless and mobile devices are equipped with built-in GNSS receivers; their users’ mobility behavior can result in challenging signal conditions that have detrimental effects on the receivers’ tracking and positioning accuracy. A major error source is the multipath signals, which are signals that are reflected off different surfaces and propagated to the receiver's antenna via different paths. Analysis of the received multipath signals indicated that their characteristics depend on the surrounding environment. This paper introduces a machine-learning pattern recognition algorithm that utilizes the aforementioned dependency to classify the multipath signals’ characteristics and identify the surrounding environment. The identified environment is utilized in a novel adaptive tracking technique that enables a GNSS receiver to change its tracking strategy to best suit the current signal condition. This will lead to a robust positioning under challenging signal conditions. The algorithm is verified using real and simulated Global Positioning System (GPS) signals with accurate multipath models.

Author 1: Nesreen I. Ziedan

Keywords: component; GPS; GNSS; machine learning; pattern recognition; PCA; PNN; multipath.

Download PDF

Paper 5: Low cost approach to real-time vehicle to vehicle communication using parallel CPU and GPU processing

Abstract: This paper proposes a novel Vehicle to Vehicle (V2V) communication system for collision avoidance which merges four different wireless devices (GPS, Wi-Fi, ZigBee® and 3G) with a low power embedded Single Board Computer (SBC) in order to increase processing speed while maintaining a low cost. The three major technical challenges with such combinations are the limited system bandwidth, high memory requirement and slow response time during data processing when accessing various collision avoidance situations. Collision avoidance data processing includes processing data for vehicles on express ways, roads, tunnels, traffic jams and indoor V2V communication such as required in car parks. Effective methods are proposed to address these technical challenges through parallel Central Processing Unit (CPU) and Graphic Processing Unit (GPU) processing. With this, parallel V2V trilateration and parallel bandwidth optimization, multi-dimensional real time complex V2V data streaming can be attained in less than a second. The test results have shown that there is at least a 4 to 10 times improvement on processing speed with parallel CPU and GPU processing used in V2V communication depending on different road safety conditions.

Author 1: GOH CHIA CHIEH
Author 2: DINO ISA

Keywords: component; CUDA; Parallel processing; Vehicle to Vehicle Communication; WLAN; ZigBee.

Download PDF

Paper 6: Simple Method for Ontology Automatic Extraction from Documents

Abstract: There are many situations where it is needed to represent and analyze the concepts that describe a document or a collection of documents. One of such situations is the information retrieval, which is becoming more complex by the growing number and variety of document types. One way to represent the concepts is through a formal structure using ontologies. Thus, this article presents a fast and simple method for automatic extraction of ontologies from documents or from a collections of documents that is independent of the document type and uses the junction of several theories and techniques, such as latent semantic for the extraction of initial concepts, Wordnet and similarity to obtain the correlation between the concepts.

Author 1: Andreia Dal Ponte Novelli
Author 2: José Maria Parente de Oliveira

Keywords: document ontology; ontology creation; ontology extraction; concept representation.

Download PDF

Paper 7: Facebook as a tool to Enhance Team Based Learning

Abstract: A growing number of educators are using social networking sites (SNS) to communicate with their students. Facebook is one such example which is widely used by students and educators. Facebook has been recently used by many educational institutions but most of these have been related to provide the information to the general audience. There has not been much study done to propose Facebook as an educational tool in a classroom scenario. The aim of this paper is to propose the idea of using Facebook in team based learning (TBL) scenario. The paper demonstrates the use of Facebook at each level of TBL The paper shows how Facebook can be used by students and teacher to communicate with each other in a TBL system. The paper also explains teacher – team and teacher – student communication via Facebook.

Author 1: Sami M. Alhomod
Author 2: Mohd Mudasir Shafi

Keywords: Social Networking; Facebook; Team Based Learning; Communication.

Download PDF

Paper 8: Comparison between MPPT P&O and MPPT Fuzzy Controls in Optimizing the Photovoltaic Generator

Abstract: This paper presents a comparative study between two control methods in order to optimize the efficiency of the solar generator. The simulation had been established by using Matlab/Simulink software to apply the MPPT P&O and MPPT Fuzzy controls on this system which is supplied through a Boost converter.Many results have been illustrated under standard and then variable weather conditions such as the illumination and the temperature. The voltage and the power of the panel and the battery as well as the duty cycle are well presented and analyzed for the two control methods. The obtained results show the effectiveness of MPPT Fuzzy controller in optimizing the PV generator. These results can encourage the use of this control strategy on solar panels in real time to optimize their yield.

Author 1: Messaouda AZZOUZI

Keywords: solar energy; photovoltaic; PV; MPPT; P&O; Boost converter; fuzzy; optimization.

Download PDF

Paper 9: Learning from Expressive Modeling Task

Abstract: This study aimed to present an authentic way of showing how computer assisted mathematical modeling of a real world situation helped to understand mystery of that situation. To achieve this aim, a group of pre-service mathematics teachers has been asked to think on how the trip computer of cars calculates the values like instant fuel consumption, average fuel consumption and the distance to be taken with remaining fuel. The theoretical discussion on mathematical structure has been directed as semi-structured interview. Then, theoretical outcomes have been used to create the model on the electronic spreadsheet MS Excel. At the end of the study, it has been observed that students have easily understood the behavior of trip computer by the help of mathematical background of the spreadsheet model and they have also been awaked of the role of mathematics in a real sense.

Author 1: Tolga KABACA

Keywords: Computer Assisted Modeling; Electronic Spreadsheet; Mathematical Model.

Download PDF

Paper 10: Design & Analysis of Optical Lenses by using 2D Photonic Crystals for Sub-wavelength Focusing

Abstract: 2D Photonic lenses (Convex-Convex, Convex-Plane, Plane-Convex, Concave-Concave, Concave-plane, and Plane-Concave) have been designed, simulated and optimized for optical communication using FDTD method. The effect of Crystal structures (Rectangular, Hexagonal, Face centered Cubic (FCC), Body centered Cubic (BCC), variation lattice constant (?), hole radius(r), reflective index (n), is demonstrated to get optimized parameters. Finally, with optimized parameters the effect of variation of lens radius on focal lengths and Electrical Field Intensity (Ey) is analyzed. Like optical lens, the focal length of photonic lens is also increased with lens radii, has dependency on optical axis. Moreover, with optimized parameters, Concave-Concave lens have been found as an optimal photonic lens that show sub-wavelength focusing with spatial resolutions- 9.22439µm (Rectangular crystal), 7.379512µm (Hexagonal Crystal), 7.840732µm (FCC, BCC).

Author 1: Rajib Ahmed
Author 2: Mahidul Haque Prodhan
Author 3: Rifat Ahmmed

Keywords: Photonic crystals; photonic lens; body centered cubic; face centered cubic.

Download PDF

Paper 11: Secure Optical Internet: A Novel Attack Prevention Mechanism for an OBS node in TCP/OBS Networks

Abstract: Optical Internet has become a strong development and its commercial use is growing rapidly. Due to transparency and virtual sharing infrastructure, they provide ultra-fast data rates with the help of optical burst switching technology, which transmits data in the form of bursts. From the security perspective, one of the OBS nodes in the optical network is compromised, causes the vulnerability. This paper is dealt to identify the vulnerabilities and named as burst hijacking attack and provide the prevention mechanism for the same. The NSFnet 14 nodes and the ns2 simulator with modified nOBS patch is used to simulate and verify the security parameters.

Author 1: K. Muthuraj
Author 2: N. Sreenath

Keywords: optical internet security; burst hijacking attack; threats and vulnerabilities in TCP/OBS networks.

Download PDF

Paper 12: Qos Routing Scheme and Route Repair in WSN

Abstract: During the last decade, a new type of wireless network has evoked great interest among the scientific community; it is the wireless sensor networks (WSN). The WSN are used in various social activities, such as industrial processes, military surveillance applications, observation and monitoring of habitat, etc... This diversity of applications brings these networks to support different types of traffic and to provide services that must be both generic and adaptive for applications, the properties of the quality of service (QoS) are different from one application to another. However, the need to minimize energy consumption has been the most important field of WSNs research. Few studies in the field are concerned with mechanisms for efficiently delivering QoS at the application level from network level metrics and connection such as delay or bandwidth, while minimizing the energy consumption of sensor nodes that are part of network. The idea is to ensure QoS through a routing process, which can detect paths that meet the QoS requirements based on ant colony optimization (ACOs), coupled with detected routes reservation process. However, it is necessary to integrate to this diagram the maintenance of route disrupted during communication. We propose a method that aims to improve the probability of success of a local route repair. This method based on the density of nodes in the vicinity of a route, as well as on the availability of this vicinity. Taking into account these parameters in the route selection phase (end of the routing process) allows selecting among multiple routes, the one which is potentially the most easily repairable. In addition, we propose a method for early detection of the failure of a local route repair. This method can directly trigger a process of global re-routing that better fits to restore communication between the source and destination.

Author 1: M Belghachi
Author 2: M. Feham

Keywords: WSNs; Quality of service; ACO; availability; global re-routing; local re-routing.

Download PDF

Paper 13: A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

Abstract: In the present investigation, we developed a novel Feistel cipher by dividing the plaintext into a pair of matrices. In the process of encryption, we have used a bunch of keys and modular arithmetic addition. The avalanche effect shows that the cipher is a strong one. The cryptanalysis carried out on this cipher indicates that this cipher cannot be broken by any cryptanalytic attack and it can be used for secured transmission of information.

Author 1: Dr V.U.K Sastry
Author 2: Mr. K. Anup Kumar

Keywords: encryption; decryption; cryptanalysis; avalanche effect; modular arithmetic addition.

Download PDF

Paper 14: A Novel Feistel Cipher Involving a Bunch of Keys Supplemented with XOR Operation

Abstract: In this investigation, we have developed a novel block cipher by modifying classical Feistel cipher. In this, we have used a key bunched wherein each key has a multiplicative inverse. The cryptanalysis carried out in this investigation clearly shows that this cipher cannot be broken by any attack.

Author 1: V U.K Sastry
Author 2: K. Anup Kumar

Keywords: encryption; decryption; cryptanalysis; avalanche effect; multiplicative inverse.

Download PDF

Paper 15: Computing the Exit Complexity of Knowledge in Distributed Quantum Computers

Abstract: Distributed Quantum computers abide from the exit complexity of the knowledge. The exit complexity is the accrue of the nodal information needed to clarify the total egress system with deference to a distinguished exit node. The core objective of this paper is to compile an arrogant methodology for assessing the exit complexity of the knowledge in distributed quantum computers. The proposed methodology is based on contouring the knowledge using the unlabeled binary trees, hence building an benchmarked and a computer based model. The proposed methodology dramatizes knowledge autocratically calculates the exit complexity. The methodology consists of several amphitheaters, starting with detecting the baron aspect of the tree of others entitled express knowledge and then measure the volume of information and the complexity of behavior destining from the bargain of information. Then calculate egress resulting from episodes that do not lead to the withdrawal of the information. In the end is calculated total egress complexity and then appraised total exit complexity of the system. Given the complexity of the operations within the Distributed Computing Quantity, this research addresses effective transactions that could affect the three-dimensional behavior of knowledge. The results materialized that the best affair where total exit complexity as minimal as possible is a picture of a binary tree is entitled at the rate of positive and negative cardinal points medium value. It could be argued that these cardinal points should not amass the upper bound apex or minimum.

Author 1: M A Abbas

Keywords: Complexity; Quantum Computers; Knowledge acquisition; Graph theory; Egress; Distributed systems.

Download PDF

Paper 16: Study of Proper Hierarchical Graphs on a Grid

Abstract: Hierarchical planar graph embedding (sometimes called level planar graphs) is widely recognized as a very important task in diverse fields of research and development. Given a proper hierarchical planar graph, we want to find a geometric position of every vertex (layout) in a straight-line grid drawing without any edge-intersection. An additional objective is to minimize the area of the rectangular grid in which G is drawn with more aesthetic embedding. In this paper we propose several ideas to find an embedding of G in a rectangular grid with area, ( -1) × (k-1), where is the number of vertices in the longest level and k is the number of levels in G.)

Author 1: Mohamed A. El Sayed
Author 2: Ahmed A. A. Radwan
Author 3: Nahla F. Omran

Keywords: level graphs; hierarchical graphs; algorithms; graph drawing.

Download PDF

Paper 17: A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Modular Arithmetic Addition and supported by Key-based Substitution

Abstract: In this paper, we have devoted our attention to the development of a block cipher, which involves a key bunch matrix, an additional matrix, and a key matrix utilized in the development of a pair of functions called Permute() and Substitute(). These two functions are used for the creation of confusion and diffusion for each round of the iteration process of the encryption algorithm. The avalanche effect shows the strength of the cipher, and the cryptanalysis ensures that this cipher cannot be broken by any cryptanalytic attack generally available in the literature of cryptography.

Author 1: Dr V.U.K Sastry
Author 2: K. Shirisha

Keywords: key bunch matrix; additional key matrix; multiplicative inverse; encryption; decryption; permute; substitute.

Download PDF

Paper 18: A Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution

Abstract: In this paper, we have developed a novel block cipher involving a key bunch matrix supported by a key-based permutation and a key-based substitution. In this analysis, the decryption key bunch matrix is obtained by using the given encryption key bunch matrix and the concept of multiplicative inverse. From the cryptanalysis carried out in this investigation, we have seen that the strength of the cipher is remarkably good and it cannot be broken by any conventional attack.

Author 1: Dr V.U.K Sastry
Author 2: K. Shirisha

Keywords: Key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis.

Download PDF

Paper 19: Data Compression for Video-Conferencing using Half tone and Wavelet Transform

Abstract: Overhead of data transmission over internet is increasing exponentially every day. Optimization of natural bandwidth is the basic motive by compressing image data to the maximum extend. For the same objective, combination of lossy half tone and lossless Wavelet Transform techniques is proposed so as to obtain low-bit rate video data transmission. Decimal values of bitmapped image are to be converted into either 1 or 0 in half toning process that incur pictorial loss and gives 8:1 compression ratio (CR) irrespective of image. Wavelet Transform is applied on half tone image for higher compression for various levels. An experimental result shows the higher CR, minimum Mean Square Error (MSE). Ten sample images of different people captured by Nikon camera are used for experimentation. All images are bitmap (.BMP) 512 X 512 in size. The proposed technique can be used for video conferencing, storage of movies and CCTV footage etc.

Author 1: Dr H.B Kekre
Author 2: Sanjay R. Sange
Author 3: Dr. Tanuja K. Sarode

Keywords: Half tone; Low-Bit rate; video data compression; Wavelet Tranform; Bandwidth optimization; Structural Similarity Index Measure (SSIM).

Download PDF

Paper 20: Finding Association Rules through Efficient Knowledge Management Technique

Abstract: One of the recent research topics in databases is Data Mining, to find, extract and mine the useful information from databases. In case of updating transactions in the database the already discovered knowledge may become invalid. So we need efficient knowledge management techniques for finding the updated knowledge from the database. There have been lot of research in data mining, but Knowledge Management in databases is not studied much. One of the data mining techniques is to find association rules from databases. But most of association rule algorithms find association rules from transactional databases. Our research is a further step of the Tree Based Association Rule Mining (TBAR) algorithm, used in relational databases for finding the association rules .In our approach of updating the already discovered knowledge; the proposed algorithm Association Rule Update (ARU), updates the already discovered association rules found through the TBAR algorithm. Our algorithm will be able to find incremental association rules from relational databases and efficiently manage the previously found knowledge.

Author 1: Anwar M. A.

Keywords: Data Mining; Co-occurrences; Incremental association rules; Dynamic Databases.

Download PDF

Paper 21: Cloud Computing for Solving E-Learning Problems

Abstract: The integration of information and communication technologies in education according to the global trend occupied a great interest in the Arab world through E-Learning techniques and put it into the form of services within Services Oriented Architecture Technique (SOA), and mixing its input and outputs within the components of the Education Business Intelligence (EBI) and enhance it to simulate reality by educational virtual worlds.This paper presents a creative environment derived from both virtual and personal learning environments based on cloud computing which contains variety of tools and techniques to enhance the educational process. The proposed environment focuses on designing and monitoring educational environment based on reusing the existing web tools, techniques, and services to provide Browser-based-Application.

Author 1: N S. Abu El Ala
Author 2: W. A. Awad
Author 3: H. M. El-Bakry

Download PDF

Paper 22: Optimizing the Performance Evaluation of Robotic Arms with the Aid of Particle Swarm Optimization

Abstract: In this modern world, robotic evaluation plays a most important role. In secure distance, this leads the humans to execute insecure task. To acquire an effective result, the system which makes the human task easier should be taken care of and the holdup behind the system should be eradicated. Only static parameters are considered and such parameters are not enough to obtain optimized value in existing work. For consecutively attaining optimized value in our previous work, we focused on both static and dynamic parameters in the robotic arm gearbox model. Now, a genetic algorithm is utilized and the result obtained is greater than the existing work. On the other hand, to attain an effective result the genetic algorithm itself is not enough since it takes massive time for computation process and the result obtained in this computation is not as much closer to the true value. By eliminating all those aforementioned issues, a proper algorithm needs to be utilized in order to achieve an efficient result than the existing and our previous works. In this paper, we anticipated to suggest a Particle Swarm Optimization technique that reduce the computation time as well as make the output result as much closer to the true value (i.e.,) experimentally obtained value.

Author 1: K Shivaprakash Reddy
Author 2: Dr.P V K Perumal
Author 3: Dr.B. Durgaprasad
Author 4: Dr.M.A Murtaza

Keywords: Particle Swarm Optimization; Robotic arm gear box; Static& Dynamic parameters.

Download PDF

Paper 23: Method for Water Vapor Profile Retievals by Means of Minimizing Difference Between Estimated and Actual Brightness Temperatures Derived from AIRS data and Radiative Transfer Model

Abstract: Method for water vapor profile retrievals by means of minimizing difference between estimated and actual brightness temperatures derived from AIRS data and radiative transfer model is proposed. Initial value is determined by linearized radiative transfer equation. It is found that this initial value determination method makes improvement of estimation accuracy together with reducing convergence time.

Author 1: Kohei Arai

Keywords: infrared sounder; non-linear optimization method; linearized inversion.

Download PDF

Paper 24: Peer Assignment Review Process for Collaborative E-learning: Is the Student Learning Process Changing?

Abstract: In recent years collaborative e-learning has been emphasized as a learning method that has facilitated knowledge construction and supported student learning. However some universities especially in developing country contexts are struggling to attain minimal educational benefits from its adoption and use. This paper investigates the application of a peer assignment review process for collaborative e-learning to third year undergraduate students. The study was aimed at evaluating the effect of the peer assignment review process on the student learning process. Data was collected using a survey questionnaire and analyzed using SPSS Version 16.0. While the student reported positive impact of the peer assignment review process in terms of facilitating students to put more effort and improve their work; quick feedback on their assignments; effective sharing and development of knowledge and information and the need of computer competence to manipulate the peer assignment review system, analysis of the quantitative data indicated that the process had limited effect on the learning process. This is attributed to lack of review skills, absence of lecturer scaffolding, low ICT literacy levels and change management.

Author 1: Evelyn Kigozi Kahiigi
Author 2: Mikko Vesisenaho
Author 3: F.F Tusubira
Author 4: Henrik Hansson
Author 5: Mats Danielson

Keywords: Peer Review; Collaborative E-learning; Learning Process; Students; University; Uganda; Developing Country.

Download PDF

Paper 25: Agent Oriented Software Testing – Role Oriented approach

Abstract: Several Agent Oriented Software Engineering (AOSE) methodologies were proposed to build open, heterogeneous and complex internet based systems. AOSE methodologies offer different conceptual frameworks, notations and techniques, thereby provide a platform to make the system abstract, generalize, dynamic and autonomous. Lifecycle coverage is one of the important criteria for evaluating an AOSE methodology. Most of the existing AOSE methodologies focuses only on analysis, design, implementation and disregarded testing, stating that the testing can be done by extending the existing object-oriented testing techniques. Though objects and agents have some similarities, they both differ widely. Role is an important attribute of an agent that has a huge scope and support for the analysis, design and implementation of Multi-Agent System (MAS). The main objective of the paper is to extend the scope and support of role towards testing, thereby the vacancy for software testing perception in the AOSE series will be filled up. This paper presents an overview of role based testing based on the V-Model in order to add the next new component as of Agent-Oriented Software testing in the agent oriented development life cycle.

Author 1: N Sivakumar
Author 2: K.Vivekanandan

Keywords: Agent oriented software enginerring; Multi-Agent System; Role oriented testing.

Download PDF

Paper 26: An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory

Abstract: Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. Certain Trust Model depends on some certain values given by experts and developers. Here, main parameters for calculating trust are certainty and average rating. In this paper we have proposed an Extension of Certain Trust Model, mainly the representation portion based on probabilistic logic and fuzzy logic. This extended model can be applied in a system like cloud computing, internet, website, e-commerce, etc. to ensure trustworthiness of these platforms. The model uses the concept of fuzzy logic to add fuzziness with certainty and average rating to calculate the trustworthiness of a system more accurately. We have proposed two new parameters - trust T and behavioral probability P, which will help both the users and the developers of the system to understand its present condition easily. The linguistic variables are defined for both T and P and then these variables are implemented in our laboratory to verify the proposed trust model. We represent the trustworthiness of test system for two cases of evidence value using Fuzzy Associative Memory (FAM). We use inference rules and defuzzification method for verifying the model.

Author 1: Kawser Wazed Nafi
Author 2: Tonny Shekha Kar
Author 3: Md. Amjad Hossain
Author 4: M.M.A Hashem

Keywords: Certain trust; Certain Logic; Fuzzy Logic; Probabilistic Logic; FAM rule; Fuzzification; Defuzzification; Inference Rules.

Download PDF

Paper 27: Scalable and Flexible heterogeneous multi-core system

Abstract: Multi-core system has wide utility in today’s applications due to less power consumption and high performance. Many researchers are aiming at improving the performance of these systems by providing flexible multi-core architecture. Flexibility in the multi-core processors system provides high throughput for uniform parallel applications as well as high performance for more general work. This flexibility in the architecture can be achieved by scalable and changeable-size window micro architecture. It uses the concept of execution locality to provide large-window capabilities. Use of high memory-level parallelism (MLP) reduces the memory wall. Micro architecture contains a set of small and fast cache processors which execute high locality code. A network of small in-order memory engines use low locality code to improve performance by using instruction level parallelism (ILP). Dynamic heterogeneous multi-core architecture is capable of recon?guring itself to ?t application requirements. Study of different scalable and ?exible architectures of heterogeneous multi-core system has been carried out and has been presented.

Author 1: Rashmi A Jain
Author 2: Dr. Dinesh V. Padole

Keywords: Flexible Heterogeneous Multi Core system (FMC); instruction level parallelism, thread-level parallelism; and memory-level parallelism; scalable; chip multiprocessors (CMP).

Download PDF

Paper 28: Genetic Algorithm Based Approach for Obtaining Alignment of Multiple Sequences

Abstract: This paper presents genetic algorithm based solution for determing alignment of multiple molecular sequences. Two datasets from DNA families Canis_familiaris and galaxy dataset have been considered for experimental work & analysis. Genetic operators like cross over rate, mutation rate can be defined by the user. Experiments & observations were recorded w.r.t variable parameters like fixed population size vs variable number of generations & vice versa, variable crossover & mutation rates. Comparative evaluation in terms of measure of fitness accuracy is also carried out w.r.t existing MSA tools like Maft, Kalign. Experimental results show that the proposed solution does offer better fitness accuracy rates.

Author 1: Ruchi Gupta
Author 2: Dr. Pankaj Agarwal
Author 3: Dr. A. K. Soni

Keywords: DNA Sequences; alignment; Genetic Algorithm; Crossover; Mutation; Selection; Multiple Sequence Alignment etc.

Download PDF

Paper 29: Passing VBR in Mobile Ad Hoc Networks – for effective live video Streaming

Abstract: Mobile ad hoc networks (often referred to as MANETs) consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. This technique can be used effectively in disaster management, intellectual conference and also in the battlefield environments. It has the significant attention in the recent years. This research paper depicts the remuneration of using suggestion tracking for selecting energy-conserving routes in delay-tolerant applications and it sends Variable Bit Rate delivery. The previous investigation set up from earlier period surveillance that delay can be traded for energy efficiency in selecting a path. The Prior objective is to find an experiential upper bound on the energy savings by assuming that each node accurately knows or predicts its future path. It examines the effect of varying the amount of future information on routing. Such a bound may prove useful in deciding how far to look in advance, and thus how much convolution to provide in mobility tracking.

Author 1: V. Saravanan
Author 2: Dr.C.Chandrasekar

Keywords: Variable Bit Rate; Mobile Ad Hoc; Machine Learning.

Download PDF

Paper 30: Financial Statement Fraud Detection using Text Mining

Abstract: Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement fraud by analyzing the hidden clues in the qualitative information (text) present in financial statements.

Author 1: Rajan Gupta
Author 2: Nasib Singh Gill

Keywords: Text Mining; Bag of words; Support Vector Machines.

Download PDF

Paper 31: Error Analysis on Estimation Method for Air-Temperature, Atmopspheric Pressure, and Realtive Humidity Using Absorption Due to CO2, O2, and H2O Which situated at Around Near Infrared Wavelength Region

Abstract: A method for air-temperature, atmospheric pressure and relative humidity using absorptions due to CO2, O2 and H2O which situated at around near infrared wavelength region is proposed and is evaluated its validity. Simulation study results with MODTRAN show a validity of the proposed method.

Author 1: Kohei Arai

Keywords: absorption band; regressive analysis; air-temperature; atmospheric pressure and relative humidity estimations.

Download PDF

Paper 32: Productisation of Service: A Case Study

Abstract: This paper discusses the issue of Productisation of service, i.e. development of systemic, scalable and replicable service offerings, as implemented by a multinational Consulting organization, engaged in the business of outsourcing and consulting solutions, from their office in India. The literature is quite rich with discussions and debates related to products and services individually, but there seems to be an important deficiency in terms of ‘integration’ between product design and service elements for supporting new service-product system. In today’s flat world the geographic boundaries are getting diminished when firms are expanding seamlessly across the globe. This seamless expansion of the electronic data processing market makes use of the outsourcing as one of its main way to expand into various geographies. Data Sanitization is one of the most sought after service offering made by a consulting firm to protect the sensitive client data from any misuse. The paper attempts to document the process followed by a firm to productize its data sanitization service offering. This documentation will not only help in integration of product and service parameters, but also will be extremely helpful for the organizations worldwide offering service as business.

Author 1: Nilanjan Chattopadhyay

Keywords: Services management; productisation; service product; data sanitisation; data security; productised service.

Download PDF

Paper 33: Subpixel Accuracy Analysis of Phase Correlation Shift Measurement Methods Applied to Satellite Imagery

Abstract: The key point of super resolution process is the accurate measuring of sub-pixel shift. Any tiny error in measuring such shift leads to an incorrect image focusing. In this paper, methodology of measuring sub-pixel shift using Phase correlation (PC) are evaluated using different window functions, then modified version of (PC) method using high pass filter (HPF) is introduced . Comprehensive analysis and assessment of (PC) methods shows that different natural features yield different shift measurements. It is concluded that there is no universal window function for measuring shift; it mainly depends on the features in the satellite images. Even the question of which window is optimal of particular feature is generally remains open. This paper presents the design of a method for obtaining high accuracy sub pixel shift phase correlation using (HPF).The proposed method makes the change in the different locations that lack of edges easy.

Author 1: S. A. Mohamed
Author 2: A.K. Helmi
Author 3: M.A. Fkirin
Author 4: S.M. Badwai

Keywords: phase correlation (PC); high pass filter (HPF); window function; sub-pixel shift.

Download PDF

Paper 34: Performance Comparison of Gender and Age Group Recognition for Human-Robot Interaction

Abstract: In this paper, we focus on performance comparison of gender and age group recognition to perform robot’s application services for Human-Robot Interaction (HRI). HRI is a core technology that can naturally interact between human and robot. Among various HRI components, we concentrate audio-based techniques such as gender and age group recognition from multichannel microphones and sound board equipped with robots. For comparative purposes, we perform the performance comparison of Mel-Frequency Cepstral Coefficients (MFCC) and Linear Prediction Coding Coefficients (LPCC) in the feature extraction step, Support Vector Machine (SVM) and C4.5 Decision Tree (DT) in the classification step. Finally, we deal with the usefulness of gender and age group recognition for human-robot interaction in home service robot environments.

Author 1: Myung Won Lee
Author 2: Keun-Chang Kwak

Keywords: gender recognition; age group recognition; human-robot interaction.

Download PDF

Paper 35: Spatial Cloud Detection and Retrieval System for Satellite Images

Abstract: In last the decade we witnessed a large increase in data generated by earth observing satellites. Hence, intelligent processing of the huge amount of data received by hundreds of earth receiving stations, with specific satellite image oriented approaches, presents itself as a pressing need. One of the most important steps in earlier stages of satellite image processing is cloud detection. Satellite images having a large percentage of cloud cannot be used in further analysis. While there are many approaches that deal with different semantic meaning, there are rarely approaches that deal specifically with cloud detection and retrieval. In this paper we introduce a novel approach that spatially detect and retrieve clouds in satellite images using their unique properties .Our approach is developed as spatial cloud detection and retrieval system (SCDRS) that introduce a complete framework for specific semantic retrieval system. It uses a Query by polygon (QBP) paradigm for the content of interest instead of using the more conventional rectangular query by image approach. First, we extract features from the satellite images using multiple tile sizes using spatial and textural properties of cloud regions. Second, we retrieve our tiles using a parametric statistical approach within a multilevel refinement process. Our approach has been experimentally validated against the conventional ones yielding enhanced precision and recall rates in the same time it gives more precise detection of cloud coverage regions.

Author 1: Noureldin Laban
Author 2: Ayman Nasr
Author 3: Motaz ElSaban
Author 4: Hoda Onsi

Keywords: Satellite images; Content based image retrieval; Query by polygon; Retrieval re?nement; cloud detection; geographic information system.

Download PDF

Paper 36: Equalization: Analysis of MIMO Systems in Frequency Selective Channel

Abstract: Due to the increased demand of wireless communication systems because of the features of the system which provides a wide coverage, high throughput and reliable services, the MIMO systems communication has come into existence. Features provided by these systems ensure the improved system coverage and increased data transmission rate by considering multiple numbers of transmitter and receiver antennas. In this paper, we are considering the equalization; a filtering approach that minimizes the error between actual output and desired output by continuous updating its filter coefficients for Rayleigh Frequency selective fading channel. We concluded that MMSE and ZF give the worst performance in Rayleigh frequency selective channel as compare to Rayleigh Flat fading Channel [35] due to a constant BER for large SNR’s. We have also observed that the successive interference methods provide better performance as compare to others, but their complexity is high. ML provides the better performance in comparison to others and BER doesn’t remain constant for a large SNR in this case. Simulation results shows that ML equalizer with BPSK gives better performance as compare to QPSK. Finally we concluded that Sphere decoder provides the best performance.

Author 1: Amit Grover

Keywords: Quadrature Amplitude Modulation (QAM); Quadrature Phase Shift Key (QPSK); Binary Phase Shift Key (BPSK); Minimum mean-squared error (MMSE); Maximum likelihood (ML); Bit error rate (BER); Inter-symbol interference (ISI); Successive-interference-cancellatio

Download PDF

Paper 37: Test Case PrioritizationUsing Fuzzy Logic for GUI based Software

Abstract: Testing of GUI (Graphical User Interface) applications has many challenges due to its event driven nature and infinite input domain. It is very difficult for any programmer to test for each and every possible input. When test cases are generated using automated testing tool it uses each and every possible combination to generate test cases hence generates numerous number of test case for any GUI based application. Within a defined time frame it is not possible to test every test case, that is why test cases prioritization is required. Test-case prioritization has been widely proposed and used in recent years as it can improve the rate of fault detection during the testing phase. Very few methods are defined for GUI Test case prioritization that usually consider single criteria for assigning priority for the test case which is not sufficient for the consideration of that test case as more fault revealing. In this paper we have proposed a method for assigning weight value on the basis of multiple factors as one of the criteria for test case prioritization for GUI based software. These factors are: The type of event, Event Interaction, and Parameter-value interaction coverage-based criteria. In the proposed approach priority is assigned based upon these factors using fuzzy logic model. Experimental results indicate that the proposed model is suitable for prioritizing the test cases of GUI based software.

Author 1: Neha Chaudhary
Author 2: Om Prakash Sangwan
Author 3: Yogesh Singh

Keywords: Graphical user Interface; Prioritization; Test Suite; Fuzzy Model.

Download PDF

Paper 38: Masking Digital Image using a Novel technique based on a Transmission Chaotic System and SPIHT Coding Algorithm

Abstract: In this article, a new transmission system of encrypted image based on novel chaotic system and SPIHT technique is proposed. This chaotic system is made up of two chaotic systems already developed: the discrete-time modified Henon chaotic system and the continuous-time Colpitts one. The transmission system is designed to take profit of two advantages. The first is the use of a robust and standard algorithm (SPIHT) which is appropriate to the digital transmission. The second is to introduce farther complexity of the encryption using the chaotic system over secure channel. Through these two advantages, our purpose is to obtain a robust system against pirate attacks. Cryptanalysis and various experiments have been carried out and the results were reported in this paper, which demonstrate the feasibility and flexibility of the proposed scheme.

Author 1: Hamiche Hamid
Author 2: Lahdir Mourad
Author 3: Tahanout Mohammed
Author 4: Djennoune Said

Keywords: Chaos Modified Henon;Colpitts, SPIHT; Robustness.

Download PDF

Paper 39: Important Features Detection in Continuous Data

Abstract: In this paper, a method for calculating the importance factor of continuous features from a given set of patterns is presented. A real problem in many practical cases, like medical data, is to find which parts of patterns are crucial for correct classification. This leads to the need of preprocessing all data, which has influence on both time and accuracy of applied methods (when unimportant data hide those which are important). There are some methods that allow selection of important features for binary and sometimes discrete data or, after some preprocessing, continuous data. Very often however, such conversion is burdened with the risk of losing important data, which is a result of lack of knowledge of optimal discretization consequence. Proposed method allows to avoid that problem, because it is based on original, non-transformed continuous data. Two factors - concentration and diversity - are defined and are used to calculate the importance factor for each feature and pattern. Based on those factors e.g. unimportant features can be identified to decrease dimension of input data or ''bad'' patterns can be detected to improve classification. An example how proposed method can be used to improve decision tree is given as well.

Author 1: Piotr Fulmanski
Author 2: Alicja Miniak-Górecka

Keywords: important features extraction; continuous data analysis; decision tree.

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org