The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 4 Issue 2

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Machine Learning for Bioclimatic Modelling

Abstract: Many machine learning (ML) approaches are widely used to generate bioclimatic models for prediction of geographic range of organism as a function of climate. Applications such as prediction of range shift in organism, range of invasive species influenced by climate change are important parameters in understanding the impact of climate change. However, success of machine learning-based approaches depends on a number of factors. While it can be safely said that no particular ML technique can be effective in all applications and success of a technique is predominantly dependent on the application or the type of the problem, it is useful to understand their behavior to ensure informed choice of techniques. This paper presents a comprehensive review of machine learning-based bioclimatic model generation and analyses the factors influencing success of such models. Considering the wide use of statistical techniques, in our discussion we also include conventional statistical techniques used in bioclimatic modelling.

Author 1: Maumita Bhattacharya

Keywords: Machine Learning; Bioclimatic Modelling; Geographic Range; Artificial Neural Network; Evolutionary Algorithm

Download PDF

Paper 2: Toward the Integration of Traditional and Agile Approaches

Abstract: The agile approach uses continuous delivery, instead of distinct procedure, to work closer with customers and to respond faster requirement changes. All of these are against the traditional plan driven approach. Due to agile method’s characteristics and its success in the real world practices, a number of discussions regarding the differences between agile and traditional approaches emerged recently and many studies intended to integrate both methods to synthesize the benefits from these two sides. However, this type of research often concludes from observations of a development activity or surveys after a project. To provide a more objective supportive evidence of comparing these two approaches, our research analyzes the source codes, logs, and notes. We argue that the agile and traditional approaches share common characteristics, which can be considered as the glue for integrating both methods. In our study, we collect all the submissions from the version control repository, and meeting notes and discussions. By applying our suggested analysis method, we illustrate the shared properties between agile and traditional approaches; thus, different development phases, like implementation and test, can still be identified in agile development history. This result not only provides a positive result for our hypothesis but also offers a suggestion for a better integration.

Author 1: Hung-Fu Chang
Author 2: Stephen C-Y.Lu

Keywords: Source Code Analysis; Software Data Mining; Agile Development

Download PDF

Paper 3: Universal Learning System for Embedded System Education and Promotion

Abstract: In this article, the idea of the universal learning system for embedded systems is presented. The proposed system provides a complete learning environment consisting of the information collection center, preference estimation system, Q&A center, forum, and virtual classroom. The skeleton of the proposed system is a preference estimation system, which helps users know the relationship between different hardware kits and suggests suitable hardware kits to users to learn embedded systems. Then, the proposed system provides the virtual classroom and Q&A service for users to start their classes. Besides, users can share design samples and experience, and join discussions through the forum of the proposed system. For demonstration, three embedded hardware platforms are introduced and applied by the proposed learning system. The results show that most students feel the proposed learning system can effectively help with their embedded software design.

Author 1: Kai-Chao Yang
Author 2: Yu-Tsang Chang
Author 3: Chien-Ming Wu
Author 4: Chun-Ming Huang

Keywords: Embedded system; Distance learning; Computer science education

Download PDF

Paper 4: Diabetes Monitoring System Using Mobile Computing Technologies

Abstract: Diabetes is a chronic disease that needs to regularly be monitored to keep the blood sugar levels within normal ranges. This monitoring depends on the diabetic treatment plan that is periodically reviewed by the endocrinologist. The frequent visit to the main hospital seems to be tiring and time consuming for both endocrinologist and diabetes patients. The patient may have to travel to the main city, paying a ticket and reserving a place to stay. Those expenses can be reduced by remotely monitoring the diabetes patients with the help of mobile devices. In this paper, we introduce our implementation of an integrated monitoring tool for the diabetes patients. The designed system provides a daily monitoring and monthly services. The daily monitoring includes recording the result of daily analysis and activates to be transmitted from a patient’s mobile device to a central database. The monthly services require the patient to visit a nearby care center in the patient home town to do the medical examination and checkups. The result of this visit entered into the system and then synchronized with the central database. Finally, the endocrinologist can remotely monitor the patient record and adjust the treatment plan and the insulin doses if need.

Author 1: Mashael Saud Bin-Sabbar
Author 2: Mznah Abdullah Al-Rodhaan

Keywords: Diabetes; Electronic Monitoring; Remote Monitoring, Ubiquities Healthcare; T1DM, T2DM; Android Monitoring System.

Download PDF

Paper 5: Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool

Abstract: Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we discuss security issues in WSNs. In this paper we are discussing a vulnerable sinkhole attack, its implementation and correction.

Author 1: Tejinderdeep Singh
Author 2: Harpreet Kaur Arora

Keywords: Wireless Sensor Networks (WSN); Intrusion Detection (ID); Base Station (BS); Sinkhole (SH);Ad-hoc on demand Distance Vector (AoDV).

Download PDF

Paper 6: Intelligent Collaborative Quality Assurance System for Wind Turbine Supply Chain Management

Abstract: To determine the root causes or sources of variance of bad quality in supply chains is usually more difficult because multiple parties are involved in the current global manufacturing environment. Each component within a supply chain tends to focus on its own responsibilities and ignores possibilities for interconnectivity and therefore the potential for systematic quality assurance and quality tracing. Rather than concentrating on assigning responsibility for “recall” incidents, it would be better to expend that energy on constructing a collaborative system to assure product quality by employing a systematic view for the entire supply chain. This paper presents a systematic framework for intelligent collaborative quality assurance throughout an entire supply chain based on an expert system for implementing two levels of quality assurance: system level and component level. This proposed system provides intelligent functions for quality prediction, pattern recognition and data mining. A case study for wind turbines is given to demonstrate this approach. The results show that such a system can assure product quality improved in a continuous process.

Author 1: B.L. SONG
Author 2: W.LIAO
Author 3: J.LEE

Keywords: Wind turbine expert system; Supply chain management; Collaborative quality assurance; Prediction; Pattern recognition;

Download PDF

Paper 7: Introducing SMART Table Technology in Saudi Arabia Education System

Abstract: Education remains one of the most important economic development indicators in Saudi Arabia. This is evident in the continuous priority of the development and enhancement of education. The application of technology is crucial to the growth and improvement of the educational system in Saudi Arabia. Introducing SMART Table technology in the Saudi Arabian education system is argued in this paper as being able to assist teachers and students in the process of accommodating both technological changes and new knowledge. SMART Tables also can enhance the level of flexibility in the educational system, thus improving the quality of education within a modern Saudi Arabia. It is crucial to integrate technology effectively and efficiently within the educational system to improve the quality of student outcomes. This study will consider the potential benefits and recommendations associated with the adoption of SMART Tables in Saudi Arabian education system.

Author 1: Gafar Almalki
Author 2: Professor Glenn Finger
Author 3: Dr Jason Zagami

Keywords: ICT; Smart Table; education; barrier; implementation

Download PDF

Paper 8: SS-SVM (3SVM): A New Classification Method for Hepatitis Disease Diagnosis

Abstract: In this paper, a new classification approach combining support vector machine with scatter search approach for hepatitis disease diagnosis is presented, called 3SVM. The scatter search approach is used to find near optimal values of SVM parameters and its kernel parameters. The hepatitis dataset is obtained from UCI. Experimental results and comparisons prove that the 3SVM gives better outcomes and has a competitive performance relative to other published methods found in literature, where the average accuracy rate obtained is 98.75%.

Author 1: Mohammed H. Afif
Author 2: Abdel-Rahman Hedar
Author 3: Taysir H. Abdel Hamid
Author 4: Yousef B. Mahdy

Keywords: Support Vector Machine; Scatter Search; Classification; Parameter tuning

Download PDF

Paper 9: Comparison of the Information Technology Development in Slovakia and Hungary

Abstract: Nowadays the role of information is increasingly important, so every company has to provide the efficient procurement, processing, storage and visualization of this special resource in hope to stay competitive. More and more enterprises introduce Enterprise Resource Planning System to be able to perform the listed functions. The article illustrates the usage of these systems in Hungary and Slovakia, as well as tests the following presumption: the level of Information Technology (IT) development is lower in Hungary than our northern neighbor.

Author 1: Peter Sasvari
Author 2: Zsuzsa Majoros

Keywords: Information society; Information Technology; Slovakia, Hungary

Download PDF

Paper 10: Automated Localization of Optic Disc in Retinal Images

Abstract: An efficient detection of optic disc (OD) in colour retinal images is a significant task in an automated retinal image analysis system. Most of the algorithms developed for OD detection are especially applicable to normal and healthy retinal images. It is a challenging task to detect OD in all types of retinal images, that is, normal, healthy images as well as abnormal, that is, images affected due to disease. This paper presents an automated system to locate an OD and its centre in all types of retinal images. The ensemble of steps based on different criteria produces more accurate results. The proposed algorithm gives excellent results and avoids false OD detection. The technique is developed and tested on standard databases provided for researchers on internet, Diaretdb0 (130 images), Diaretdb1 (89 images), Drive (40 images) and local database (194 images). The local database images are collected from ophthalmic clinics. It is able to locate OD and its centre in 98.45% of all tested cases. The results achieved by different algorithms can be compared when algorithms are applied on same standard databases. This comparison is also discussed in this paper which shows that the proposed algorithm is more efficient.

Author 1: Deepali A.Godse
Author 2: Dr.Dattatraya S.Bormane

Keywords: disease; healthy; optic disc; retinal image

Download PDF

Paper 11: Neural Network Solution For Service Level Agreement

Abstract: Service Oriented Computing is playing an important role in sharing the industry and the way business is conducted and services are delivered and managed. This paradigm is expected to have major impact on service economy; the service sector includes health services, financial services, government services, etc. This involves significant interaction between clients and service providers[1]. This paper is pointed in addressing the problem of enabling Service Level Agreement (SLA) oriented resources allocation in data centers to satisfy competing applications demand for computing services. A QoS report designed to compare performance variables to QoS parameters and indicate when a threshold has been crossed. This paper was suggested a methodology which helps in SLA evaluation and comparison. The methodology was found on the adoption of policies both for service behavior and SLA description and on the definition of a metric function for evaluation and comparison of policies. In addition, this paper contributes a new philosophy to evaluate the agreements between user and service provider by monitoring the measurable and immeasurable qualities to extract the decision by using artificial neural networks (ANN).

Author 1: Sarmad Al-Aloussi

Keywords: Service Oriented Architecture; Service Level Agreements; QoS; and Neural Network.

Download PDF

Paper 12: IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process

Abstract: Tokenization is the task of chopping it up into pieces, called tokens, perhaps at the same time throwing away certain characters, such as punctuation. A token is an instance of token a sequence of characters in some particular document that are grouped together as a useful semantic unit for processing. New software tool and algorithm to support the IRS at tokenization process are presented. Our proposed tool will filter out the three computer character Sequences: IP-Addresses, Web URLs, Date, and Email Addresses. Our tool will use the pattern matching algorithms and filtration methods. After this process, the IRS can start a new tokenization process on the new retrieved text which will be free of these sequences.

Author 1: Ahmad Al Badawi
Author 2: Qasem Abu Al-Haija

Keywords: Information Retrieval; Tokenization; pattern matching; and Sequences Filtration.

Download PDF

Paper 13: A Simple Exercise-to-Play Proposal that would Reduce Games Addiction and Keep Players Healthy

Abstract: Games players usually get addicted to video games in general and more specifically to those that are usually played over the internet. These players prefer to stay at home and play games rather than playing sports or outdoor games. This paper presents a proposal that aims to implement a simple way to let video games players exercise in order to play. The proposal targets games where players virtually live inside a certain area such as a forest, city or a war zone. Their aim is to explore the area, capture, kill and avoid being killed by something or someone. A costumed built treadmill acting as a movement capture device is proposed to capture players’ commands for movements. These movements include Running, walking, Stopping, and Turning. In that way, the players enjoy exercising as well as playing the game. However, sooner or later, the players get exhausted driving them to exit the game. That way, we believe that such a proposal would keep players healthy, and reduce the chance of addiction.

Author 1: Nael Hirzallah

Keywords: Virtual Reality; Gaming; Video Game.

Download PDF

Paper 14: Segmentation of Ultrasound Breast Images using Vector Neighborhood with Vector Sequencing on KMCG and augmented KMCG algorithms

Abstract: B mode ultrasound (US) imaging is popular and important modality to examine the range of clinical problems and also used as complimentary to the mammogram imaging to detect and diagnose the nature breast tumor. To understand the nature (benign or malignant) of the tumor most of the radiologists focus on shape and boundary. Therefore boundary is as important characteristic of the tumor along with the shape. Tracing the contour manually is a time consuming and tedious task. Automated and efficient segmentation method also helps radiologists to understand and observe the volume of a tumor (growth or shrinkage). Inherent artifact present in US images, such as speckle, attenuation and shadows are major hurdles in achieving proper segmentation. Along with these artifacts, inhomogeneous texture present in the region of interest is also a major concern. Most of the algorithms studies in the literature include noise removal technique as a preprocessing step. Here in this paper, we are eliminating this step and directly handling the images with high degree of noise. VQ based clustering technique is proposed for US image segmentation with KMCG and augmented KMCG codebook generation algorithms. Using this algorithm images are divided in to clusters, further these clusters are merged sequentially. A novel technique of sequential cluster merging with vector sequencing has been used. We have also proposed a technique to find out the region of interest from the selected cluster with seed vector acquisition. Results obtained by our method are compared with our earlier method and Marker Controlled Watershed transform. With the opinion of the expert radiologist, we found that our method gives better results.

Author 1: Dr.H.B. kekre
Author 2: Pravin Shrinath

Keywords: codebook; seed vector; training set; vector quantization

Download PDF

Paper 15: An Improved Scheme on Morphological Image Segmentation Using the Gradients

Abstract: An improved scheme for contour detection with better performance measure has been proposed. It is based on the response of human visual system during visualization of any type of an image. The scheme consisted of two parts namely to find the edge of the image by using the modified mask of Laplacian of Gaussian edge operator and subsequent modulation of the edge by using watershed algorithm. The method has been applied to a digital image and better performance measure of contour detection has been achieved.

Author 1: Pinaki Pratim Acharjya
Author 2: Santanu Santra
Author 3: Dibyendu Ghoshal

Keywords: Contour detection; gradients; watershed algorithm

Download PDF

Paper 16: Coordinated Resource Management Models in Hierarchical Systems

Abstract: In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry .Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use of both classical and modern control technology, for which the most important components are professional levels of structure knowledge, dynamics and management processes, threats and interference and external and internal attacks. The problem of control flows of energy and materials resources in local and regional structures in normal and marginal, emergency operation provoked information attacks or threats on failure flows are further relevant especially when considering the low level of professional ,psychological and cognitive training of operational personnel manager. Logistics Strategies include the business goals requirements, allowable decisions tactics, and vision for designing and operating a logistics system .In this paper described the selection module coordinating flow management strategies based on the use of resources and logistics systems concepts.

Author 1: Gabsi Mounir
Author 2: Rekik Ali
Author 3: Temani Moncef

Keywords: Strategy models; logistic system; resources management; optimisation; routing; transport

Download PDF

Paper 17: Modeling and Simulation Multi Motors Web Winding System

Abstract: Web winding systems allow the operations of unwinding and rewinding of various products including plastic films, sheets of paper, sheets, and fabrics. These operations are necessary for the development and the treatment of these products. Web winding systems generally consist of the same machine elements in spite of the diversity of the transported products. Due to the wide rang variation of the radius and inertia of the rollers the system dynamic change considerably during the winding/ unwinding process. Decentralized PI controller for web tension control and linear speed control are presented in this paper. The PI control method can be applied easily and is widely known, it has an important place in control applications. Simulation results show the effectiveness of the proposed linear speed and tension controller for web winding multi motors systems.

Author 1: Hachemi Glaoui
Author 2: Abdeldjebar Hazzab
Author 3: Bousmaha Bouchiba
Author 4: Ismaïl Khalil Bousserhane

Keywords: Multi motors web winding system; PI controller; tension control; linear speed control

Download PDF

Paper 18: The Visual Web User Interface Design in Augmented Reality Technology

Abstract: Upon the popularity of 3C devices, the visual creatures are all around us, such the online game, touch pad, video and animation. Therefore, the text-based web page will no longer satisfy users. With the popularity of webcam, digital camera, stereoscopic glasses, or head-mounted display, the user interface becomes more visual and multi-dimensional. For the consideration of 3D and visual display in the research of web user interface design, Augmented Reality technology providing the convenient tools and impressive effects becomes the hot topic. Augmented Reality effect enables users to represent parts of the digital objects on top of the physical surroundings. The easy operation with webcam greatly improving the visual representation of web pages becomes the interest of our research. Therefore, we apply Augmented Reality technology for developing a city tour web site to collect the opinions of users. Therefore, the website stickiness is an important measurement. The major tasks of the work include the exploration of Augmented Reality technology and the evaluation of the outputs of Augmented Reality. The feedback opinions of users are valuable references for improving AR application in the work. As a result, the AR increasing the visual and interactive effects of web page encourages users to stay longer and more than 80% of users are willing to return for visiting the website soon. Moreover, several valuable conclusions about Augmented Reality technology in web user interface design are also provided for further practical references.

Author 1: Chouyin Hsu
Author 2: Haui-Chih Shiau

Keywords: Visual Represeantion; User Interface Design; Augmented Reality; Google SketchUp

Download PDF

Paper 19: E-Government Grid Services Topology Based On Province And Population In Indonesia

Abstract: The e-Government Grid Service Model in Indonesia is an adjustments based on the framework of existing e-Government and also the form of government in the country. Grid-based services for interoperability could be a solution for resource sharing and interoperability of e-Government systems. In previous study, we designed and simulated the topology of Indonesian e-Government Grid services based on function group from e-Government application solution map to connect the ministry/agency/department /institution. In this paper we analyse the result of e-Government services topology simulation based on the province and population in the country.

Author 1: Ummi Azizah Rachmawati
Author 2: Xue Li
Author 3: Heru Suhartanto

Keywords: component; formatting; style; styling; insert (key words)

Download PDF

Paper 20: Performance Comparison of DCT and Walsh Transforms for Watermarking using DWT-SVD

Abstract: This paper presents a DWT-DCT-SVD based hybrid watermarking method for color images. Robustness is achieved by applying DCT to specific wavelet sub-bands and then factorizing each quadrant of frequency sub-band using singular value decomposition. Watermark is embedded in host image by modifying singular values of host image. Performance of this technique is then compared by replacing DCT by Walsh in above combination. Walsh results in computationally faster method and acceptable performance. Imperceptibility of method is tested by embedding watermark in HL2, HH2 and HH1 frequency sub-bands. Embedding watermark in HH1 proves to be more robust and imperceptible than using HL2 and HH2 sub-bands.

Author 1: Dr.H.B. Kekre
Author 2: Dr.Tanuja Sarode
Author 3: Shachi Natu

Keywords: Discrete Wavelet Transform (DWT); Discrete Cosine Transform (DCT); Singular Value Decomposition (SVD); watermarking.

Download PDF

Paper 21: Framework of Designing an Adaptive and Multi-Regime Prognostics and Health Management for Wind Turbine Reliability and Efficiency Improvement

Abstract: Wind turbine systems are increasing in technical complexity, and tasked with operating and degrading in highly dynamic and unpredictable conditions. Sustaining the reliability of such systems is a complex and difficult task. In spite of extensive efforts, current prognostics and health management (PHM) methodologies face many challenges, due to the complexity of the degradation process and the dynamic operating conditions of a wind turbine. This research proposed a novel adaptive and multi-regime prognostics and health management (PHM) approach with the aim to tackle the challenges of traditional methods. With this approach, a scientific and systematic solution is provided for health assessment, diagnosis and prognosis of critical components of wind turbines under varying environmental, operational and aging processes. The system is also capable of adaptively selecting the tools suitable for a component under a certain health status and a specific operating condition. The adopted relevant health assessment, diagnosis and prognosis tools and techniques for wind turbines are warranted by the intensive research of PHM models by the IMS center for common rotary machinery components. Some sub-procedures, such as information reconstruction, regime clustering approach and the prognostics of rotating elements, were validated by the best score performance in PHM Data Challenge 2008 (student group) and 2009 (professional group). The success of the proposed wind turbine PHM system would greatly benefit current wind turbine industry.

Author 1: B.L. Song
Author 2: J.Lee

Keywords: PHM; Adaptive tool selection; Multi-regime prognostics; Information reconstruction; Holo-coefficient

Download PDF

Paper 22: Automatic Detection Of Electrocardiogram ST Segment: Application In Ischemic Disease Diagnosis

Abstract: The analysis of electrocardiograph (ECG) signal provides important clinical information for heart disease diagnosis. The ECG signal consists of the P, QRS complex, and T-wave. These waves correspond to the fields induced by specific electric phenomenon on the cardiac surface. Among them, the detection of ischemia can be achieved by analysis the ST segment. Ischemia is one of the most serious and prevalent heart diseases. In this paper, the European database was used for evaluation of automatic detection of the ST segment. The method comprises several steps; ECG signal loading from database, signal preprocessing, detection of QRS complex and R-peak, ST segment, and other relation parameter measurement. The developed application displays the results of the analysis.

Author 1: Duck Hee Lee
Author 2: Jun Woo Park
Author 3: Jeasoon Choi
Author 4: Ahmed Rabbi

Keywords: Electrocardiogram (ECG); Ischemia; European ST-T database; QRS complex ; ST segment.

Download PDF

Paper 23: ZeroX Algorithms with Free crosstalk in Optical Multistage Interconnection Network

Abstract: Multistage interconnection networks (MINs) have been proposed as interconnecting structures in various types of communication applications ranging from parallel systems, switching architectures, to multicore systems and advances. Optical technologies have drawn the interest for optical implementation in MINs to achieve high bandwidth capacity at the rate of terabits per second. Crosstalk is the major problem with optical interconnections; it not only degrades the performance of network but also disturbs the path of communication signals. To avoid crosstalk in Optical MINs many algorithms have been proposed by many researchers and some of the researchers suppose some solution to improve Zero Algorithm. This paper will be illustrated that is no any crosstalk appears in Zero based algorithms (ZeroX, ZeroY and ZeroXY) in using refine and unique case functions. Through simulation modeling, the Zero based algorithm approach yields the best performance in terms of minimal routing time in and number of passes comparison to the previous algorithms tested for comparison in this paper.

Author 1: M.A.Al- Shabi

Keywords: component; Optical multistage interconnection networks (MINs); ZeroX Algorithm; crosstalk in Omega network.

Download PDF

Paper 24: A Mixed Finite Element Method for Elasticity Problem

Abstract: This paper describes a numerical solution for plane elasticity problem. It includes algorithms for discretization by mixed finite element methods. The discrete scheme allows the utilization of Brezzi - Douglas - Marini element (BDM1) for the stress tensor and piecewise constant elements for the displacement. The numerical results are compared with some previously published works or with others coming from commercial code like ABAQUS.

Author 1: A. Elakkad
Author 2: M.A.Bennani
Author 3: J.EL Mekkaoui
Author 4: A.Elkhalfi

Keywords: Elasticity problem; Mixed Finite element method; BDM1 approximation; ABAQUS

Download PDF

Paper 25: Omega Model for Human Detection and Counting for application in Smart Surveillance System

Abstract: Driven by the significant advancements in technology and social issues such as security management, there is a strong need for Smart Surveillance System in our society today. One of the key features of a Smart Surveillance System is efficient human detection and counting such that the system can decide and label events on its own. In this paper we propose a new, novel and robust model: “The Omega Model”, for detecting and counting human beings present in the scene. The proposed model employs a set of four distinct descriptors for identifying the unique features of the head, neck and shoulder regions of a person. This unique head-neck-shoulder signature given by the Omega Model exploits the challenges such as inter person variations in size and shape of people’s head, neck and shoulder regions to achieve robust detection of human beings even under partial occlusion, dynamically changing background and varying illumination conditions. After experimentation we observe and analyze the influences of each of the four descriptors on the system performance and computation speed and conclude that a weight based decision making system produces the best results. Evaluation results on a number of images indicate the validation of our method in actual situation.

Author 1: Subra mukherjee
Author 2: Karen Das

Keywords: Omega Model; Human Detection; Surveillance; Back ground Subtraction; Gaussian Mixture Model (GMM); Mixture of Gaussians (MOG).

Download PDF

Paper 26: Integration of Automated Decision Support Systems with Data Mining Abstract: A Client Perspective

Abstract: Customer’s behavior and satisfaction are always play important role to increase organization’s growth and market value. Customers are on top priority for the growing organization to build up their businesses. In this paper presents the architecture of Decision Support Systems (DSS) in connection to deal with the customer’s enquiries and requests. Main purpose behind the proposed model is to enhance the customer’s satisfaction and behavior using DSS. We proposed model by extension in traditional DSS concepts with integration of Data Mining (DM) abstract. The model presented in this paper shows the comprehensive architecture to work on the customer requests using DSS and knowledge management (KM) for improving the customer’s behavior and satisfaction. Furthermore, DM abstract provides more methods and techniques; to understand the contacted customer’s data, to classify the replied answers in number of classes, and to generate association between the same type of queries, and finally to maintain the KM for future correspondence.

Author 1: Abdullah Saad AL-Malaise

Keywords: Decision Support Systems; Knowledge Management; Data Mining; Customer’s Satisfaction.

Download PDF

Paper 27: Automatic Image Registration Technique of Remote Sensing Images

Abstract: Image registration is a crucial step in most image processing tasks for which the final result is achieved from a combination of various resources. Automatic registration of remote-sensing images is a difficult task as it must deal with the intensity changes and variation of scale, rotation and illumination of the images. This paper proposes image registration technique of multi-view, multi- temporal and multi-spectral remote sensing images. Firstly, a preprocessing step is performed by applying median filtering to enhance the images. Secondly, the Steerable Pyramid Transform is adopted to produce multi-resolution levels of reference and sensed images; then, the Scale Invariant Feature Transform (SIFT) is utilized for extracting feature points that can deal with the large variations of scale, rotation and illumination between images .Thirdly, matching the features points by using the Euclidian distance ratio; then removing the false matching pairs using the RANdom SAmple Consensus (RANSAC) algorithm. Finally, the mapping function is obtained by the affine transformation. Quantitative comparisons of our technique with the related techniques show a significant improvement in the presence of large scale, rotation changes, and the intensity changes. The effectiveness of the proposed technique is demonstrated by the experimental results.

Author 1: M. Wahed
Author 2: Gh.S.El-tawel
Author 3: A.Gad El-karim

Keywords: Image registration; Steerable Pyramid Transform; SIFT; RANSAC

Download PDF

Paper 28: Indian Sign Language Recognition Using Eigen Value Weighted Euclidean Distance Based Classification Technique

Abstract: Sign Language Recognition is one of the most growing fields of research today. Many new techniques have been developed recently in these fields. Here in this paper, we have proposed a system using Eigen value weighted Euclidean distance as a classification technique for recognition of various Sign Languages of India. The system comprises of four parts: Skin Filtering, Hand Cropping, Feature Extraction and Classification. 24 signs were considered in this paper, each having 10 samples, thus a total of 240 images was considered for which recognition rate obtained was 97%.

Author 1: Joyeeta Singha
Author 2: Karen Das

Keywords: Hand Gesture Recognition; Skin Filtering; Human Computer Interaction; Euclidean Distance (E.D.); Eigen value; Eigen vector.

Download PDF

Paper 29: Recognition of Facial Expression Using Eigenvector Based Distributed Features and Euclidean Distance Based Decision Making Technique

Abstract: In this paper, an Eigenvector based system has been presented to recognize facial expressions from digital facial images. In the approach, firstly the images were acquired and cropping of five significant portions from the image was performed to extract and store the Eigenvectors specific to the expressions. The Eigenvectors for the test images were also computed, and finally the input facial image was recognized when similarity was obtained by calculating the minimum Euclidean distance between the test image and the different expressions.

Author 1: Jeemoni Kalita
Author 2: Karen Das

Keywords: Facial expression recognition; facial expressions; Eigenvectors; Eigenvalues

Download PDF

Paper 30: Expensive Optimisation: A Metaheuristics Perspective

Abstract: Stochastic, iterative search methods such as Evolutionary Algorithms (EAs) are proven to be efficient optimizers. However, they require evaluation of the candidate solutions which may be prohibitively expensive in many real world optimization problems. Use of approximate models or surrogates is being explored as a way to reduce the number of such evaluations. In this paper we investigated three such methods. The first method (DAFHEA) partially replaces an expensive function evaluation by its approximate model. The approximation is realized with support vector machine (SVM) regression models. The second method (DAFHEA II) is an enhancement on DAFHEA to accommodate for uncertain environments. The third one uses surrogate ranking with preference learning or ordinal regression. The fitness of the candidates is estimated by modeling their rank. The techniques’ performances on some of the benchmark numerical optimization problems have been reported. The comparative benefits and shortcomings of both techniques have been identified.

Author 1: Maumita Bhattacharya

Keywords: Evolutionary Algorithm; Preference Learning; Surrogate Modeling; Surrogate Ranking

Download PDF

Paper 31: GASolver-A Solution to Resource Constrained Project Scheduling by Genetic Algorithm

Abstract: The Resource Constrained Scheduling Problem (RCSP) represents an important research area. Not only exact solution but also many heuristic methods have been proposed to solve RCPSP (Resource Constrained Project Scheduling Problem). It is an NP hard problem. Heuristic methods are designed to solve large and highly Resource Constrained software projects. We have solved the problem of resource constrained scheduling problem and named as GASolver. It is implemented in C# using .net platform. We have used Dependency Injection to make the problem loosely coupled, so that other arena of scheduling like Time Cost Tradeoff (CT), Payment Scheduling (PS) etc can be merged with same solution in the future. We have implemented GASolver using Genetic Algorithm (GA).

Author 1: Dr Mamta Madan
Author 2: Mr Rajneesh Madan

Keywords: Genetic Algorithm; Dependency Injection; GASolver.Core; Resource Constrained Scheduling.

Download PDF

Paper 32: Method for Image Portion Retrieval and Display for Comparatively Large Scale of Imagery Data onto Relatively Small Size of Screen Which is Suitable to Block Coding of Image Data Compression

Abstract: Method for image portion retrieval and display for the relatively large scale of imagery data onto comparatively small size of display is proposed. The method is suitable to the data compression methods based on block coding. Through experiments with satellite imagery data, it is found that the proposed method is useful for the display onto small sized screen such as mobile phone display and so on.

Author 1: Kohei Arai

Keywords: data compression; image retrieval; block coding

Download PDF

Paper 33: E-governance justified

Abstract: Information and Communication Technology today has become an indispensable part in our lives, gaining wide application in human activities. This is due to the fact that, its use is less expensive, more secure, and allows speedy information transmission and access. It serves as a good base for the development and success of today’s relatively young technologies. It has relieved people of manual day-to-day activities in such areas as businesses organizations, transport industry, teaching and research, banking, broadcasting, entertainment amongst other. This paper takes an overview study of e-governance, one of the most demanding applications of information and communication technology for public services. The paper summarizes the concept of e-governance, its major essence and some ongoing e-governance activities in some parts of the world.

Author 1: William Akotam Agangiba
Author 2: Millicent Akotam Agangiba

Keywords: E-governance; Government; Human activities; Information Technology (IT); Service delivery; citizen.

Download PDF

Paper 34: Method for Estimation of Aerosol Parameters Based on Ground Based Atmospheric Polarization Irradiance Measurements

Abstract: Method for aerosol refractive index estimation with ground based polarization measurement data is proposed. The proposed method uses a dependency of refractive index on p and s polarized down welling solar diffuse irradiance. It is much easy to measure p and s polarized irradiance on the ground with a portable measuring instrument rather than solar direct, diffuse and aureole measurements. Through theoretical and simulation studies, it is found that the proposed method show a good estimation accuracy of refractive index using measured down welling p and s polarized irradiance data with a measuring instrument pointing to the direction which is perpendicular to the sun in the principal plane. Field experimental results also show a validity of the proposed method in comparison to the estimated results from the conventional method with solar direct, diffuse and aureole measurement data.

Author 1: Kohei Arai

Keywords: Degree of Polarization; aerosol refractive index; size distribution

Download PDF

Paper 35: Visualization of Learning Processes for Back Propagation Neural Network Clustering

Abstract: Method for visualization of learning processes for back propagation neural network is proposed. The proposed method allows monitor spatial correlations among the nodes as an image and also check a convergence status. The proposed method is attempted to monitor the correlation and check the status for spatially correlated satellite imagery data of AVHRR derived sea surface temperature data. It is found that the proposed method is useful to check the convergence status and also effective to monitor the spatial correlations among the nodes in hidden layer.

Author 1: Kohei Arai

Keywords: neural network; error back propagation; convergence process; spatial correlation

Download PDF

Paper 36: Data Fusion Between Microwave and Thermal Infrared Radiometer Data and Its Application to Skin Sea Surface Temperature, Wind Speed and Salinity Retrievals

Abstract: Method for data fusion between Microwave Scanning Radiometer: MSR and Thermal Infrared Radiometer: TIR derived skin sea surface temperature: SSST, wind speed: WS and salinity is proposed. SSST can be estimated with MSR and TIR radiometer data. Although the contribution ocean depth to MSR and TIR radiometer data are different each other, SSST estimation can be refined through comparisons between MSR and TIR derived SSST. Also WS and salinity can be estimated with MSR data under the condition of the refined SSST. Simulation study results support the idea of the proposed data fusion method.

Author 1: Kohei Arai

Keywords: data fusion; simulataneous estimation

Download PDF

Paper 37: A Gaps Approach to Access the Efficiency and Effectiveness of IT-Initiatives In Rural Areas: case study of Samalta, a village in the central Himalayan Region of India

Abstract: This paper focuses on the effectiveness and efficiency of IT initiatives in rural areas where topology creates isolation to developmental activities. A village is selected for the study and information is gathered through interviews of village dwellers. These collected responses are then analyzed and a gaps model is proposed.

Author 1: Kamal Kumar Ghanshala
Author 2: Durgesh Pant
Author 3: Jatin Pandey

Keywords: KDJ-Gaps Model; Efficiency; Effectiveness; IT-Initiatives

Download PDF

Paper 38: An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systems

Abstract: Resource allocation in heterogeneous parallel and distributed computing systems is the process of allocating user tasks to processing elements for execution such that some performance objective is optimized. In this paper, a new resource allocation algorithm for the computing grid environment is proposed. It takes into account the heterogeneity of the computational resources. It resolves the single point of failure problem which many of the current algorithms suffer from. In this algorithm, any site manager receives two kinds of tasks namely, remote tasks arriving from its associated local grid manager, and local tasks submitted directly to the site manager by local users in its domain. It allocates the grid workload based on the resources occupation ratio and the communication cost. The grid overall mean task response time is considered as the main performance metric that need to be minimized. The simulation results show that the proposed resource allocation algorithm improves the grid overall mean task response time. (Abstract)

Author 1: S.F. El-Zoghdy
Author 2: M.Nofal
Author 3: M.A.Shohla
Author 4: A.A.El-sawy

Keywords: grid computing; resource management; load balancing; performance evaluation; queuing theory; simulation models (key words)

Download PDF

Paper 39: Reliable Global Navigation System using Flower Constellation

Abstract: For many space missions using satellite constellations, symmetry of satellites distribution plays usually a key role. Symmetry may be considered in space and/or in time distribution. Examples of required symmetry in space distribution are in Earth observation missions (either, for local or global) as well as in navigation systems. It is intuitive that to optimally observe the Earth a satellite constellation should be synchronized with the Earth rotation rate. If a satellite constellation must be designed to constitute a communication network between Earth and Jupiter, then the orbital period of the constellation satellites should be synchronized with both Earth and Jupiter periods of revolution around the Sun. Another example is to design satellite constellations to optimally observe specific Earth sites or regions. Again, this satellites constellation should be synchronized with Earth’s rotational period and (since the time gap between two subsequent observations of the site should be constant) also implies time symmetry in satellites distribution. Obtaining this result will allow to design operational constellations for observing targets (sites, borders, regions) with persistence or assigned revisit times, while minimizing the number of satellites required. Constellations of satellites for continuous global or zonal Earth coverage have been well studied over the last twenty years, are well known and have been well documented [1], [2], [7], [8], [11], [13]. A symmetrical, inclined constellation, such as a Walker constellation [1], [2] provides excellent global coverage for remote sensing missions; however, applications where target revisit time or persistent observation are important lead to required variations of traditional designs [7], [8]. Also, few results are available that affect other figures of merit, such as continuous regional coverage and the systematic use of eccentric orbit constellations to optimize“hang time” over regions of interest. Optimization of such constellations is a complex problem and the general-purpose constellation design methodology used today is largely limited to Walker-like constellations. As opposed to Walker Constellations [1], [2], which were looking for symmetries in inertial reference frame, Flower Constellations [11] were devised to obtain symmetric distributions of satellites on rotating reference frames (e.g., Earth, Jupiter, satellite orbit). Since the theory of Flower Constellations has evolved with time the next section is dedicated to the summary of the theory up to the current status. The FCs solution space has been recently expanded with the Lattice theory [13], [14], encompassing all possible symmetric solutions.

Author 1: Daniele Mortari
Author 2: Jeremy J.Davis
Author 3: Ashraf Owi
Author 4: Hany Dwidar

Download PDF

Paper 40: Algorithm Selection for Constraint Optimization Domains

Abstract: In this paper we investigate methods for selecting the best algorithms in classic distributed constraint optimization problems. While these are NP-complete problems, many heuristics have nonetheless been proposed. We found that the best method to use can change radically based on the specifics of a given problem instance. Thus, dynamic methods are needed that can choose the best approach for a given problem. We found that large differences typically exist in the expected utility between algorithms, allowing for a clear policy. We present a dynamic algorithm selection approach based on this realization. As support for this approach, we describe the results from thousands of trials from Distributed Constraint Optimization problems that demonstrates the strong statistical improvement of this dynamic approach over the static methods they are based on.

Author 1: Avi Rosenfeld

Download PDF

Paper 41: Reliable Network Traffic Collection for Network Characterization and User Behavior

Abstract: This paper presents a reliable and complete traffic collection facility as a first and crucial step toward accurate traffic analysis for network characterization and user behavior. The key contribution is to produce an accurate, reliable and high fidelity traffic traces as the valuable source of information in the passive traffic ananlysis approach. In order to guarantee the traces reliability, we first detect the bottlenecks of the collection facility, and then propose different monitoring probes starting from the ethernet network interface and ending at the packet trace. The proposed facility can run without stop for long time instead of one-shot periods, therefore, it can be used to draw a complete picture of network traffic that fully characterize the network and user behavior. The laboratory experiments conclude that the system is highly reliable, stable and produces reliable traces attached with different statistics reports that come from the installed monitoring probes.

Author 1: Ali Ismail Awad
Author 2: Hanafy Mahmud Ali
Author 3: Heshasm F. A. Hamed

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org