The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 10

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Identification of Employees Using RFID in IE-NTUA

Abstract: During the last decade with the rapid increase in indoor wireless communications, location-aware services have received a great deal of attention for commercial, public-safety, and a military application, the greatest challenge associated with indoor positioning methods is moving object data and identification. Mobility tracking and localization are multifaceted problems, which have been studied for a long time in different contexts. Many potential applications in the domain of WSNs require such capabilities. The mobility tracking needs inherent in many surveillance, security and logistic applications. This paper presents the identification of employees in National Technical University in Athens (IE-NTUA), when the employees access to a certain area of the building (enters and leaves to/from the college), Radio Frequency Identification (RFID) applied for identification by offering special badges containing RFID-tags.

Author 1: Rashid Ahmed
Author 2: John N. Avaritsiotis

Keywords: RFID; Employees In National Technical University; Global Positioning System; Non-Line of Site

Download PDF

Paper 2: Smart Broadcast Technique for Improved Video Applications over Constrained Networks

Abstract: improved wireless video communication is challenging since video stream is vulnerable to channel distortions. Hence, the need to investigate efficient scheme for improved video communications. This research work investigated broadcast schemes, and proposes smart broadcast technique as a solution for improved video quality over constrained network such as wireless network under tight constraints. The scheme exploits the concept of video analysis and adaptation principles in the optimization process. The experimental results obtained under different channel conditions demonstrate the capability of the proposed scheme in terms of improving the average received video quality performance over a constrained network.

Author 1: U. Ukommi

Keywords: Video communication; broadcast; video quality; wireless network

Download PDF

Paper 3: Automated Edge Detection Using Convolutional Neural Network

Abstract: The edge detection on the images is so important for image processing. It is used in a various fields of applications ranging from real-time video surveillance and traffic management to medical imaging applications. Currently, there is not a single edge detector that has both efficiency and reliability. Traditional differential filter-based algorithms have the advantage of theoretical strictness, but require excessive post-processing. Proposed CNN technique is used to realize edge detection task it takes the advantage of momentum features extraction, it can process any input image of any size with no more training required, the results are very promising when compared to both classical methods and other ANN based methods

Author 1: Mohamed A. El-Sayed
Author 2: Yarub A. Estaitia
Author 3: Mohamed A. Khafagy

Keywords: Edge detection; Convolutional Neural Networks; Max Pooling

Download PDF

Paper 4: Hiding an Image inside another Image using Variable-Rate Steganography

Abstract: A new algorithm is presented for hiding a secret image in the least significant bits of a cover image. The images used may be color or grayscale images. The number of bits used for hiding changes according to pixel neighborhood information of the cover image. The exclusive-or (XOR) of a pixel’s neighbors is used to determine the smoothness of the neighborhood. A higher XOR value indicates less smoothness and leads to using more bits for hiding without causing noticeable degradation to the cover image. Experimental results are presented to show that the algorithm generally hides images without significant changes to the cover image, where the results are sensitive to the smoothness of the cover image.

Author 1: Abdelfatah A. Tamimi
Author 2: Ayman M. Abdalla
Author 3: Omaima Al-Allaf

Keywords: image steganography; information hiding; LSB method

Download PDF

Paper 5: Synthetic template: effective tool for target classification and machine vision

Abstract: A process for replacing a voluminous image dictionary, which characterizes a certain target of interest in a constrained zone of effectiveness representing controlled states including scale and view angle, with a synthetic template has been developed. Synthetic template (ST) is a spatial map (grayscale image) obtained by combining the set of zone-specific training images that are ascribed to the target of interest. It has been shown that the solo-template ST correlation filter outperforms filter banks comprised of multiple target-class training images. A geometric interpretation of the basic ST concept is employed in order to further explain and substantiate its properties.

Author 1: Kaveh Heidary

Keywords: machine vision; image procession; target classification; correlation filter

Download PDF

Paper 6: Using Penalized Regression with Parallel Coordinates for Visualization of Significance in High Dimensional Data

Abstract: In recent years, there has been an exponential increase in the amount of data being produced and disseminated by diverse applications, intensifying the need for the development of effective methods for the interactive visual and analytical exploration of large, high-dimensional datasets. In this paper, we describe the development of a novel tool for multivariate data visualization and exploration based on the integrated use of regression analysis and advanced parallel coordinates visualization. Conventional parallel-coordinates visualization is a classical method for presenting raw multivariate data on a 2D screen. However, current tools suffer from a variety of problems when applied to massively high-dimensional datasets. Our system tackles these issues through the combined use of regression analysis and a variety of enhancements to traditional parallel-coordinates display capabilities, including new techniques to handle visual clutter, and intuitive solutions for selecting, ordering, and grouping dimensions. We demonstrate the effectiveness of our system through two case-studies.

Author 1: Shengwen Wang
Author 2: Yi Yang
Author 3: Jih-Sheng Chang
Author 4: Fang-Pang Lin

Keywords: Parallel Coordinates; High-Dimensional Data; Multivariate Visualization; LASSO Regression; Penalized Regression; Dimension Reordering

Download PDF

Paper 7: Maturity Model for IT Service Outsourcing in Higher Education Institutions

Abstract: The current success of organizations depends on the successful implementation of Information and Comunication Technologies (ICTs). Good governance and ICT management are essential for delivering value, managing technological risks, managing resources and performance measurement. In addition, outsourcing is a strategic option which complements IT services provided internally in organizations. This paper proposes the design of a new holistic maturity model based on standards ISO/IEC 20000 and ISO/IEC 38500, the frameworks and best practices of ITIL and COBIT, with a specific focus on IT outsourcing. This model is validated by practices in the field of higher education, using a questionnaire and a metrics table among other measurement tools. Models, standards and guidelines are proposed in the model for facilitating adaptation to universities and achieving excellence in the outsourcing of IT services. The applicability of the model allows an effective transition to a model of good governance and management of outsourced IT services which, aligned with the core business of universities (teaching, research and innovation), affect the effectiveness and efficiency of its management, optimizes its value and minimizes risks.

Author 1: Victoriano Valencia García
Author 2: Dr. Eugenio J. Fernández Vicente
Author 3: Dr. Luis Usero Aragonés

Keywords: IT Governance; IT Management; Outsourcing; IT Services; Maturity Models

Download PDF

Paper 8: A New Approach for Hiding Data Using B-box

Abstract: Digital Images and video encryption play an important role in today’s multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem for video. Our method can achieve two goals; the first goal is to design a height security for hiding a data in video, the second goal is to design a computational complexity cryptosystem.

Author 1: Dr. Saad Abdual azize AL_ani
Author 2: Bilal Sadeq Obaid Obaid

Keywords: ASCII; Binary; Cryptosystem; Decimal; Decryption; Encryption; Image; Plaintext; Video

Download PDF

Paper 9: Enhanced Link Redirection Interface for Secured Browsing using Web Browser Extensions

Abstract: In the present world scenario where data is meant to be protected from intruders and crackers, everyone has the fear to keep their private data safe. As the data is stored on servers accessed through websites by browsers, it’s the browsers, which act as a medium between a user and the server to send or receive data. As browsers send data in plain text, any data which is sent could easily be intercepted and used against someone. Hence this led to the use of Transport Layer Security (TLS) and Secure Socket Layer (SSL), which are cryptographic protocols designed to provide communication security over the Internet. A layer on top of SSL/TLS, support an encrypted mode, also known as HTTPS (HTTP Secure). Therefore, one of the main aspect of security lies in the website supporting HTTPS. Most websites have support for this encrypted mode and still we use an unencrypted mode of websites because a common user is unaware of the advancements in the field of technology. So to help us, in browsers, we have extensions or plug-ins to ease our life. This paper proposes the idea to implement the security measures in the web browsers.

Author 1: Mrinal Purohit Y
Author 2: Kaushik Velusamy
Author 3: Shriram K Vasudevan

Keywords: Browsers; HTTPS; SSL

Download PDF

Paper 10: A Novel Location Determination Technique for Traffic Control and Surveillance using Stratospheric Platforms

Abstract: This paper presents a new technique for location determination using the promising technique of stratospheric platform (SP) flying at altitudes 17-22 km high and a suitable Direction-of-Arrival technique (DOA). The SP system is preferable due to its superior communication performance compared to conventional terrestrial and satellite systems. The proposed technique provides central information about accurate locations for mobile stations which is very important for traffic control and rescue operations at emergency situations. The DOA estimation in this technique defines the user location using high resolution DOA technique such as MUSIC which provides an accuracy comparable to the Global Positioning System (GPS) technique but without the need for GPS receivers. Several scenarios for users’ locations determination are examined to define the robustness of the proposed technique.

Author 1: Yasser Albagory
Author 2: Mostafa Nofal
Author 3: Said El-Zoghdy

Keywords: stratospheric platforms; mobile communications; DOA techniques; GPS Technique

Download PDF

Paper 11: Overall Sensitivity Analysis Utilizing Bayesian Network for the Questionnaire Investigation on SNS

Abstract: Social Networking Service (SNS) is prevailing rapidly in Japan in recent years. The most popular ones are Facebook, mixi, and Twitter, which are utilized in various fields of life together with the convenient tool such as smart-phone. In this work, a questionnaire investigation is carried out in order to clarify the current usage condition, issues and desired functions. More than 1,000 samples are gathered. Bayesian network is utilized for this analysis. Sensitivity analysis is carried out by setting evidence to all items. This enables overall analysis for each item. We analyzed them by sensitivity analysis and some useful results were obtained. We have presented the paper concerning this. But the volume becomes too large, therefore we have split them and this paper shows the latter half of the investigation result by setting evidence to Bayesian Network parameters. Differences in usage objectives and SNS sites are made clear by the attributes and preference of SNS users. They can be utilized effectively for marketing by clarifying the target customer through the sensitivity analysis.

Author 1: Tsuyoshi Aburai
Author 2: Kazuhiro Takeyasu

Keywords: SNS; Questionnaire Investigation; Bayesian Network; Sensitivity Analysis

Download PDF

Paper 12: Risk Assessment of Network Security Based on Non-Optimum Characteristics Analysis

Abstract: This paper discusses in detail the theory of non-optimum analysis on network systems. It points out that the main problem of exploring indefinite networks’ optimum lies in the lack of non-optimum analysis on the network system. The paper establishes the syndrome and empirical analysis based on the non-optimum category of the network security. At the same time, it also puts forward the non-optimum measurement of the network security along with non-optimum tracing and self-organization of the network systems. The formation of non-optimum network serves as the basis for existence of optimum network. Besides, the level of network security can be measured from the non-optimum characteristics analysis of network systems. By summing the practice, this paper has also come at the minimum non-optimum principle of the network security optimization, established the relationship between risk and non-optimum, and put forward evaluation method about trust degree of network security. Finally, according to the previous practice of network security risk management, a kind of network security optimization has been developed to approach the relationship of non-optimum and risk.

Author 1: Ping He

Keywords: network security; non-optimum analysis; risk assessment; maximum and minimum limitation; ARS

Download PDF

Paper 13: An Architectural-model for Context aware Adaptive Delivery of Learning Material

Abstract: The web based learning has become more complex to search required learning resources with continuously growing digital learning contents which are entangled with structural and semantic interrelationship. Meanwhile, the rapid development of communication technology lead to heterogeneity of learning devices than it was in the early stage. The context-aware adaptive learning environment has become a promising solution to these searching and presentation problems in educational domain. To solve this context aware learning content delivery problem, we proposed a novel architectural model based on MVC (Model–View–Controller) design pattern, that is able to perform personalized adaptive delivery of course content according to learner contextual information such as learning style and characteristics of the learning device using an ontological approach.

Author 1: Kalla. Madhu Sudhana
Author 2: V. Cyril Raj
Author 3: T.Ravi

Keywords: MVC design pattern; context-aware adaptive learning; architectural model; Usability Analysis

Download PDF

Paper 14: Hybrid Reasoning Model for Strengthening the problem solving capability of Expert Systems

Abstract: In this paper, we briefly outlined popular case-based reasoning combinations. More specifically, we focus on combinations of case-based reasoning with rule based reasoning, and model based reasoning. Further we examined the strengths and weaknesses of various reasoning models, case-based reasoning, rule-based reasoning and model-based reasoning, and discuss how they can be combined to form a more robust and better-performing hybrid. In a decision support system to address the variety of tasks a user performs, a single type of knowledge and reasoning method is often not sufficient. It is often necessary to determine which reasoning method would be the most appropriate for each task, and a combination of different methods has often shown the best results. In this study CBR was mixed with other RBR and MBR approaches to promote synergies and benefits beyond those achievable using CBR or other individual reasoning approaches alone. Each approach has advantages and disadvantages, which are proved to be complementary in a large degree. So, it is well-justified to combine these to produce effective hybrid approaches, surpassing the disadvantages of each component method. “KNAPS-CR” model integrates problem solving with learning from experience within an extensive model of different knowledge types. “KNAPS-CR” has a reasoning strategy which first attempts case-based reasoning, then rule-based reasoning, and, finally, model-based reasoning. It learns from each problem solving session by updating its collection of cases, irrespective of which reasoning method that succeeded in solving the problem.

Author 1: Kapil Khandelwal
Author 2: Durga Prasad Sharma

Keywords: knowledge based systems; KBS, sustained learning; problem solving; hybrid reasoning models; case based reasoning; CBR; model based reasoning; MBR; rule based reasoning;RBR

Download PDF

Paper 15: Quaternionic Wigner-Ville distribution of analytical signal in hyperspectral imagery

Abstract: The 2D Quaternionic Fourier Transform (QFT), applied to a real 2D image, produces an invertible quaternionic spectrum. If we conserve uniquely the first quadrant of this spectrum, it is possible, after inverse transformation, to obtain, not the original image, but a 2D quaternion image, which generalize in 2D the classical notion of 1D analytical image. From this quaternion image, we compute the corresponding correlation product, then, by applying the direct QFT, we obtain the 4D Wigner-Ville distribution of this analytical signal. With reference to the shift variables ?1 , ?2 used for the computation of the correlation product, we obtain a local quaternion Wigner-Ville distribution spectrum.

Author 1: Yang LIU
Author 2: Robert GOUTTE

Keywords: Analytical; signal; hyperspectral imagery; quaternionic distribution

Download PDF

Paper 16: On the Practical Feasibility of Secure Multipath Communication

Abstract: Secure multipath transmission (MPT) uses network path redundancy to achieve privacy in the absence of public-key encryption or any shared secrets for symmetric encryption. Since this form of secret communication works without secret keys, the risk of human failure in key management naturally vanishes, leaving security to rest only on the network management. Consequently, MPT allows for secure communication even under hacker attacks, on condition that at least some parts of the network remain intact (unconquered) at all times. This feature is, however, bought at the price of high network connectivity (densely meshed structures) that is hardly found in real life networks. Based on a game-theoretic treatment of multipath transmission, we present theoretical results for judging the networks suitability for secure communication. In particular, as MPT uses non-intersecting and reliable paths, we present algorithms to compute these in a way that is especially suited for subsequent secure and reliable communication. Our treatment will use MPT as a motivating and illustrating example, however, the results obtained are not limited to any particular application of multipath transmission or security.

Author 1: Stefan Rass
Author 2: Benjamin Rainer
Author 3: Stefan Schauer

Keywords: communication system security; multipath channels; privacy; risk analysis; security by design

Download PDF

Paper 17: Optimizing the use of an SPI Flash PROM in Microblaze-Based Embedded Systems

Abstract: This paper aims to simplify FPGA designs that incorporate Embedded Software Systems using a soft core Processor. It describes a simple solution to reduce the need of multiple non-volatile memory devices by using one SPI (Serial Peripheral Interface) Flash PROM for FPGA configuration data, software code (Processor applications), and miscellaneous user data. We have thus developed a design based on a MicroBlaze soft processor implemented on a Xilinx Spartan-6 FPGA SP605 Evaluation Kit. The hardware architecture with SPI flash was designed using the Xilinx Platform Studio (XPS) and the software applications, including the bootloader, was developed with Xilinx Software Development Kit (SDK). ISE Design Tools prepared by Xilinx Company, is employed to create the files used to program flash memory which are SREC (S-record) file associated with software code, Hexadecimal file for user data, and bootloader file to configure the FPGA and allows software applications stored in flash memory to be executed when the system is powered on. Reading access to the SPI Flash memory is simplified by the use of Xilinx In-System Flash (ISF) library.

Author 1: Ahmed Hanafi
Author 2: Mohammed Karim

Keywords: Microblaze; ISF; Bootloader; SREC; Configuration; Bitstream SPI Flash

Download PDF

Paper 18: Design and Application of Queue-Buffer Communication Model in Pneumatic Conveying

Abstract: In order to communicate with a PLC (Programmable Logic Controller) flexibly and freely, a data communication model based on the PLC's free port is designed. In the structure of the model, a distributed data communication environment is constructed by using Ethernet and serial adapters. In the communication algorithm, a method of queue-buffer for multi-threaded is used to improve the real-time of the control. This communication model has good scalability and portability because the realization of it is not restricted by the number of PLC slave stations and the type of operating system of the host computer. A corresponding communication algorithm is applied to data collection and devices monitoring for a pipe pneumatic conveying system. The practice shows that not only the stability and reliability of the model can meet the needs of automatic control but also the communication performance and efficiency of the model is outstanding.

Author 1: Liping Zhang
Author 2: Haomin Hu

Keywords: Queue-Buffer; Programmable Logic Controller; Freeport Communication; Critical resource; Mutex

Download PDF

Paper 19: Thyroid Diagnosis based Technique on Rough Sets with Modified Similarity Relation

Abstract: Because of the patient’s inconsistent data, uncertain Thyroid Disease dataset is appeared in the learning process: irrelevant, redundant, missing, and huge features. In this paper, Rough sets theory is used in data discretization for continuous attribute values, data reduction and rule induction. Also, Rough sets try to cluster the Thyroid relation attributes in the presence of missing attribute values and build the Modified Similarity Relation that is dependent on the number of missing values with respect to the number of the whole defined attributes for each rule. The discernibility matrix has been constructed to compute the minimal sets of reducts, which is used to extract the minimal sets of decision rules that describe similarity relations among rules. Thus, the rule associated strength is measured.

Author 1: Elsayed Radwan
Author 2: Adel M.A. Assiri

Keywords: Thyroid Disease - Rough Sets - Data Discretization – Knowledge Reduction; Modified Similarity Relation MSIM

Download PDF

Paper 20: Geo-visual Approach for Spatial Scan Statistics: An Analysis of Dengue Fever Outbreaks in Delhi

Abstract: There are very few surveillance systems being used to detect disease outbreaks at present. In disease surveillance system, data related to cases and various risk factors are collected and then the collected data is transformed into meaningful information for effective disease control using statistical analysis tools. Disease outbreaks can be detected but for effective disease control, a visualization approach is required. Without appropriate visualization, it is very difficult to interpret the results of analysis. In this work, a method has been developed for geographical representation of the disease surveillance and response system for early detection of disease outbreaks using SaTScan and open source Geographic Information System software. Maps that combine the geographical location of diseases and clusters to enhance the understanding of results of statistical analysis tool are developed using QGIS library which provides many spatial algorithms and native GIS functions. This library is accessed through PyQGIS and PyQt using Python.

Author 1: Shuchi Mala
Author 2: Raja Sengupta

Keywords: Disease Surveillance; p-value; clusters; statistically significant; outbreaks and visualization

Download PDF

Paper 21: Load Balancing with Neural Network

Abstract: This paper discusses a proposed load balance technique based on artificial neural network. It distributes workload equally across all the nodes by using back propagation learning algorithm to train feed forward Artificial Neural Network (ANN). The proposed technique is simple and it can work efficiently when effective training sets are used. ANN predicts the demand and thus allocates resources according to that demand. Thus, it always maintains the active servers according to current demand, which results in low energy consumption than the conservative approach of over-provisioning. Furthermore, high utilization of server results in more power consumption, server running at higher utilization can process more workload with similar power usage. Finally the existing load balancing techniques in cloud computing are discussed and compared with the proposed technique based on various parameters like performance, scalability, associated overhead... etc. In addition energy consumption and carbon emission perspective are also considered to satisfy green computing.

Author 1: Nada M. Al Sallami
Author 2: Ali Al daoud
Author 3: Sarmad A. Al Alousi

Keywords: Green Cloud Computing; Load Balancing; Artificial Neural Networks

Download PDF

Paper 22: Acceptance of Web 2.0 in learning in higher education: a case study Nigeria

Abstract: Technology acceptance has been studied in different perspectives. Though a few empirical studies on acceptance of Web 2.0 as a social networking tool in teaching and learning exist, none of such studies exist in Nigeria which is the focus of this study. This paper reports on a pilot study that begins to fill this gap by investigating the perceptions, attitude and acceptance of Web 2.0 in e-learning of this country. Based on literature review and initial primary study, a conceptual model of 9 variables and associated hypotheses was designed. The model was operationalised into a questionnaire that was used to collect data from 317 students from 5 universities. The findings that came from data analysis indicate that all the variables except motivation via learning management systems which are not presently used in these universities affect intention to use Web 2.0 in e-learning in Nigeria. Some of the validated variables are perceived usefulness and prior knowledge. The major conclusions and recommendations include the utilisation of Web 2.0 facilities to stimulate participation in learning. This work will contribute to the body of knowledge on acceptance of Web 2.0 social networking tools in teaching and learning. It will aid management decisions toward investing better on technology so as to improve the educational sector. This research will also be beneficial in the social development of individuals, local communities, national and international communities.

Author 1: Razep Echeng
Author 2: Abel Usoro
Author 3: Grzegorz Majewski

Keywords: Web 2.0; collaboration; active participation; enhanced learning; Web 2.0 acceptance; learning; higher education; technology based learning

Download PDF

Paper 23: Mitigating Black Hole attack in MANET by Extending Network Knowledge

Abstract: The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a flooding mechanism for distributing control traffic messages in the network, and reducing the redundancy in the flooding process. A node in an OLSR network selects its MPR set so that all two hop neighbor are reachable by the minimum number of MPR. However, if an MPR misbehaves during the execution of the protocol, the connectivity of the network is compromised. This paper introduces a new algorithm for the selection of Multipoint Relays (MPR) with additional coverage whose aims is to provide each node to selects alternative paths to reach any destination two hops away. This technique helps avoid the effect of malicious attacks and its easily to implement the corresponding algorithm.

Author 1: Hicham Zougagh
Author 2: Ahmed Toumanari
Author 3: Rachid Latif
Author 4: Noureddine.Idboufker

Keywords: MANET; OLSR; Security; Routing Protocol; Black Hole attack

Download PDF

Paper 24: Determining Public Structure Crowd Evacuation Capacity

Abstract: This paper explores a strategy for determining public space safety. Due to varied purposes and locations, each public space has architecture as well as facilities. A generalized analysis of capacities for public spaces is essential. The method we propose is to examine a public space with a given architecture. We used Bayesian Belief Network to determine the level of safety and identify points of weakness in public spaces.

Author 1: Pejman Kamkarian
Author 2: Henry Hexmoor

Keywords: Networks of Bayesian Belief Revision, Public Space Safety, Crowd Evacuation

Download PDF

Paper 25: Terrain Coverage Ant Algorithms: The Random Kick Effect

Abstract: In this work the effect of random repositioning of ant robots/agents on the performance of terrain coverage algorithms is investigated. A number of well-known terrain coverage algorithms are implemented and studied in a simulated environment. We prove that agent repositioning imposes small variations on the performance of the algorithms when random or controlled jumps occurred and evaporation and failures are allowed.

Author 1: M. Dervisi
Author 2: O.B. Efremides
Author 3: D.P. Iracleous

Keywords: Terrain coverage, ant agents, performance

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org