The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 5 Issue 5

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Integrating Android Devices into Network Management Systems based on SNMP

Abstract: Mobile devices are becoming essential for today life. In developed countries, about half of the people have a smartphone, resulting in millions of these electronic devices. Android is the most popular operating system for smartphones and other electronic devices such as tablets. Hence, for network administrators, it is essential to start managing all the Android based devices. SNMP is the de facto standard for network administration, where agents that are running in managed devices are polled by management stations. Some primitive tools have already been developed to transform an Android device as a basic management station. However, so far, there is no SNMP agent for this operating system. In this paper, we develop the first SNMP agent for Android. We also propose an SNMP benchmark to study the SNMP traffic that can be supported by our SNMP agent over some real and actual Android devices. The results obtained show that it is realistic to integrate mobile Android devices in network management systems since they can handle a high number of SNMP requests in a reasonable period of time.

Author 1: Fernando Hidalgo
Author 2: Eric Gamess

Keywords: Network Management Systems; SNMP; Android; Performance Evaluation; Benchmarks

Download PDF

Paper 2: Acceptance Factors and Current Level of Use of Web 2.0 Technologies for Learning in Higher Education: a Case Study of Two Countries

Abstract: The use of Web 2.0 technology tools or social media in educational context is being emphasized in recent times in different parts of the world and this has brought about a significant increase in the number of educational institutions who are aware of their usefulness when either implementing them as a separate system or incorporating them into their learning management systems. However, there is little research on the acceptance and how much these tools are currently being used for learning hence the need for more empirical studies to investigate factors that would influence acceptance and increase the use of these technologies. The study developed hypotheses and a research model which was operationalized into a questionnaire administered to academics and students in Scotland and Nigeria. 317 responses were received from Nigeria and 279 from Scotland. Analysed data was used to validate the research model that is aimed at explaining acceptance and present level of use of Web 2.0 technology tools in learning environments.

Author 1: Razep Echeng
Author 2: Abel Usoro

Keywords: Web 2.0 technologies; acceptance factors; adoption for learning; collaboration; participation; Nigerian higher education; Scotland

Download PDF

Paper 3: Experimental Analysis of the Fault Tolerance of the PIM-SM IP Multicast Routing Protocol under GNS3

Abstract: PIM-SM is the most commonly used IP multicast routing protocol in IPTV systems. Its fault tolerance is examined by experimenting on a mesh topology multicast test network built up by Cisco routers under GNS3. Different fault scenarios are played and different parameters of the PIM-SM and of the OSPF protocols are examined if they influence and how they influence the outage time of an IPTV service. The failure of the Rendezvous Point (RP) of the given IP multicast group as well as the complete failure of a router in the media forwarding path of the multicast stream are examined. A method is given how the service outage time caused by the complete failure of a router can be limited by an appropriate choice of the Dead Interval parameter of OSPF.

Author 1: Gábor Lencse
Author 2: István Derka

Keywords: IP multicast protocols; PIM-SM; OSPF; fault tolerance; GNS3; modelling and simulation

Download PDF

Paper 4: Novel LVCSR Decoder Based on Perfect Hash Automata and Tuple Structures – SPREAD –

Abstract: The paper presents the novel design of a one-pass large vocabulary continuous-speech recognition decoder engine, named SPREAD. The decoder is based on a time-synchronous beam-search approach, including statically expanded cross-word triphone contexts. An approach using efficient tuple structures is proposed for the construction of the complete search-network. The foremost benefits are the important space savings and higher processing speed, and the compact and reduced size of the tuple structure, especially when exploiting the structure of the key. In this way, the time needed to load the ASR search-network into the memory is also significantly reduced. Further, the paper proposes and presents the complete methodology for compiling general ASR knowledge sources into a tuple structures. Additionally, the beam search is enhanced with the novel implementation of a bigram language model Look-Ahead technique, by using tuple structures and a caching scheme. The SPREAD LVCSR decoder is based on a token-passing algorithm, capable of restricting its search-space by several types of token pruning. By using the presented language model Look-Ahead technique, it is possible to increase the number of tokens that can be pruned without decoding precision loss.

Author 1: Matej Rojc
Author 2: Kacic Zdravko

Keywords: LVCSR decoder; tuple structure; finite automata; perfect hashing; Look-Ahead; language models

Download PDF

Paper 5: Prediction of Satellite Motion under the Effects of the Earth’s Gravity, Drag Force and Solar Radiation Pressure in terms of the KS-regularized Variables

Abstract: This paper is concerned with an orbit prediction using one of the best regular theories (KS-regularized variables). Perturbations due to the Earth’s gravitational field with axial symmetry up to the fourth order zonal harmonic, atmospheric drag (variation in density model with height) and solar radiation pressure are considered. Applications of the problem with a comparison between the perturbations effect will be illustrated by numerical and graphical example.

Author 1: Hany R. Dwidar

Keywords: KS-regularized variables; orbit determination; Numerical Modeling

Download PDF

Paper 6: OJADEAC: An Ontology Based Access Control Model for JADE Platform

Abstract: Java Agent Development Framework (JADE) is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA) specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC) is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

Author 1: Ban Sharief Mustafa
Author 2: Najla Aldabagh

Keywords: Java Agent Development Framework (JADE); JADE-S; Ontology-Based Access Control Model; Web Ontology Language (OWL)

Download PDF

Paper 7: Proposal for Two Enhanced NTRU

Abstract: Sound is very widely used in communication. In order to ensure secure communication a cryptographic data scheme is used. Secure sound is needed in many fields such as military, business, banking and electronic commerce. There is also an increasing demand for secured sound in network communication. Several symmetric and asymmetric algorithms are used for sound encryption. In this work, NTRU, the last in line public key cryptosystem is enhanced in two methods and used for encrypting sound files after converting the sound into text. In the proposed methods the message is encrypted one character at a time, since NTRU encrypts only prime numbers, thus 7 bits of each character is encrypted and the eighth bit is left without encryption. In method I NTRU algorithm is enhanced by adding the result obtained from calculating a mathematical equation of one variable to the message and then the resulted encrypted bit is fed-back and added to the next bit of the message in the next step; this procedure is repeated for the subsequent bits of the message. In method II NTRU algorithm is enhanced by adding the subsequent states of LFSR (Linear Feedback Shift Register) to the subsequent bytes of the message. The proposed methods are tested on several sound files; the results show that the proposed methods I and II maintain approximately the same original method encryption and decryption time while generating more complex encryption.

Author 1: Ahmed Tariq Sadiq
Author 2: Najlaa Mohammad Hussein
Author 3: Suha Abdul Raheem Khoja

Keywords: NTRU; security; sound

Download PDF

Paper 8: Building BTO System in the Sanitary Materials Manufacturer with the Utilization of the High Accuracy Forecasting

Abstract: In recent years, BTO (Build to Order) system is prevailing. It pursues short lead time, minimum stocks, and thereby minimum cost. But the high accuracy demand forecasting is inevitable for the parts manufacturers. In this paper, well organized BTO system in the sanitary materials manufacturer is seek with the aid of high accuracy demand forecasting, which is newly developed by us. Focusing that the equation of ESM is equivalent to (1,1) order ARMA model equation, a new method of estimation of smoothing constant in ESM was derived. Trend removal method was also devised. AR model is also used for forecasting. After removing trend, AR model is utilized and forecasting is executed. Better one in the forecasting accuracy between them was chosen for the final forecasting. Thus, we could obtain the high accuracy demand forecasting. These methods are examined by the data of sanitary materials manufacturer and the BTO system is newly built by utilizing this method. Further development of this system should be performed hereafter.

Author 1: Hirotake Yamashita
Author 2: Kazuhiro Takeyasu

Keywords: BTO; forecasting; lead time; stock; sanitary materials; AR model

Download PDF

Paper 9: A Hybrid Method to Improve Forecasting Accuracy in the Case of Sanitary Materials Data

Abstract: Sales forecasting is a starting point of supply chain management, and its accuracy influences business management significantly. In industries, how to improve forecasting accuracy such as sales, shipping is an important issue. In this paper, a hybrid method is introduced and plural methods are compared. Focusing that the equation of exponential smoothing method(ESM) is equivalent to (1,1) order ARMA model equation, a new method of estimation of smoothing constant in exponential smoothing method is proposed before by Takeyasu et.al. which satisfies minimum variance of forecasting error. Firstly, we make estimation of ARMA model parameter and then estimate smoothing constants. In this paper, combining the trend removing method with this method, we aim to improve forecasting accuracy. Trend removing by the combination of linear and 2nd order non-linear function and 3rd order non-linear function is carried out to the manufacturer’s data of sanitary materials. The new method shows that it is useful for the time series that has various trend characteristics and has rather strong seasonal trend. The effectiveness of this method should be examined in various cases.

Author 1: Daisuke Takeyasu
Author 2: Hirotake Yamashita
Author 3: Kazuhiro Takeyasu

Keywords: component; minimum variance; exponential smoothing method; forecasting; trend; sanitary materials

Download PDF

Paper 10: A Comparative Study of Game Tree Searching Methods

Abstract: In this paper, a comprehensive survey on gaming tree searching methods that can use to find the best move in two players zero-sum computer games was introduced. The purpose of this paper is to discuss, compares and analyzes various sequential and parallel algorithms of gaming tree, including some enhancement for them. Furthermore, a number of open research areas and suggestions of future work in this field are mentioned.

Author 1: Ahmed A. Elnaggar
Author 2: Mostafa Abdel Aziem
Author 3: Mahmoud Gadallah
Author 4: Hesham El-Deeb

Keywords: game tree search; searching; evaluation; parallel; distributed; GPU

Download PDF

Paper 11: The Effect of Diversity Implementation on Precision in Multicriteria Collaborative Filtering

Abstract: This research was triggered by the criticism on the emergence of homogeneity in recommendation within the collaborative filtering based recommender systems that put similarity as the main principle in the algorithm. To overcome the problem of homogeneity, this study proposes a novelty, i.e. the diversity of recommendations applied to the multicriteria collaborative filtering-based document recommender systems. Development of the diversity recommendation was made by the two techniques, the first is to compare the similarity of content and the second is to use a variation of the criteria. The application of diversity, both content and criteria-based, was proven to provide a sufficiently significant influence on the increase of recommendation precision.

Author 1: Wiranto
Author 2: Edi Winarko
Author 3: Sri Hartati
Author 4: Retantyo Wardoyo

Keywords: Algorithms; multicriteria; content; collaborative; filtering; systems; similarity; diversity; precision

Download PDF

Paper 12: Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Abstract: Ameliorating the lifetime in heterogeneous wireless sensor network is an important task because the sensor nodes are limited in the resource energy. The best way to improve a WSN lifetime is the clustering based algorithms in which each cluster is managed by a leader called Cluster Head. Each other node must communicate with this CH to send the data sensing. The nearest base station nodes must also send their data to their leaders, this causes a loss of energy. In this paper, we propose a new approach to ameliorate a threshold distributed energy efficient clustering protocol for heterogeneous wireless sensor networks by excluding closest nodes to the base station in the clustering process. We show by simulation in MATLAB that the proposed approach increases obviously the number of the received packet messages and prolongs the lifetime of the network compared to TDEEC protocol.

Author 1: MOSTAFA BAGHOURI
Author 2: SAAD CHAKKOR
Author 3: ABDERRAHMANE HAJRAOUI

Keywords: Heterogeneous wireless sensor networks; Clustering based algorithm; Energy-efficiency; TDEEC Protocol; Network lifetime

Download PDF

Paper 13: Green Technology, Cloud Computing and Data Centers: the Need for Integrated Energy Efficiency Framework and Effective Metric

Abstract: Energy efficiency (EE), energy consumption cost and environmental impact are vibrant challenges to cloud computing and data centers. Reducing energy consumption and emissions of carbon dioxide (CO2) in data centers represent open areas and driving force for future research work on green data centers. Our Literature review reveals that there are currently several energy efficiency frameworks for data centers which combine a green IT architecture with specific activities and procedures that led to decrease the impact on environment and less CO2 emissions. The current available frameworks have some pros and cons that is the reason why there is an urgent need for an integrated criterion for selecting and adopting energy efficiency framework for data centers. The required energy efficiency framework criteria should also consider the social network applications as a vital related factor in elevating energy consumption, as well as high potential for better energy efficiency in data centers. Additionally, in this paper, we highlighted the importance of the identification of efficient and effective energy efficiency metric that can be used for the measurement and determination of the value of data centers efficiency and their performance combined with sound and empirically validated integrated EE framework.

Author 1: Nader Nada
Author 2: Abusfian Elgelany

Keywords: Cloud Computing; green Cloud; Datacenter; Energy efficiency

Download PDF

Paper 14: Computation of Single Beam Echo Sounder Signal for Underwater Objects Detection and Quantification

Abstract: Underwater Acoustic methods have been extensively used to locate and identify marine objects. These applications include locating underwater vehicles, finding shipwrecks, imaging sediments and imaging bubble fields. Ocean is fairly transparent to sound and opaque to all other sources of radiation. Acoustics technology is the most effective tool for monitoring this environment because of the sound's ability to propagate long distance in water. We used single beam echo sounder to discriminate underwater objects. Development of the algorithm and applied it to detect and quantify underwater object such as fish, sea grass, and seabed. We found the detected target has different backscatter value.

Author 1: Henry M. Manik
Author 2: Asep Mamun
Author 3: Totok Hestirianoto

Keywords: single beam; echo sounder; backscattering; algorithm

Download PDF

Paper 15: Inter-organizational Workflow for Intelligent Audit of Information Technologies in terms of Entreprise Business Processes

Abstract: IT governance is critical to the success of Enterprise governance by providing effective, efficient and measurable improvements in business processes by ensuring that information technologies are in line with business objectives. Consequently, this paper provides an intelligent solution to audit Information System Business processes using the IT Governance Framework COBIT. The particularity of this solution is the use of Inter-organization Workflows (IOW), Multi-agent System and semantic web. In fact Inter-Organizational Workflow is used to cooperate autonomous, heterogeneous and distributed organizations processes to reach a common goal. In this paper case the goal is the dynamic alignment of every Business Process with the convenient Information System component and this through a permanent interaction with different stockholders. Multi-agent Systems (MAS) are known as the natural solution for IOW modeling since they provide dynamic modification and execution of adaptive processes. In addition, MAS have the ability to describe distribution and coordination of IOW organizations in micro and macro level, with high level communication protocols. As for the semantic web, the proposed IT Governance IOW based on COBIT, has the principal role to match Enterprise real Business Goals with COBIT Business goals , so the use of the semantic web is a way to share business terminology and avoid semantic conflict for a correct and efficient Audit operation.

Author 1: Meriyem Chergui
Author 2: Hicham Medromi
Author 3: Adil Sayouti

Keywords: Inter-organizational Workflow; COBIT; Audit; Information System; IT Governance; Business Processes; Multi-Agent System; Semantic Web; Ontology

Download PDF

Paper 16: Performance Evaluation of Private Clouds Eucalyptus versus CloudStack

Abstract: the number of open source cloud management platforms is increasing day-by-day. The features of these software vary significantly and this creates a difficulty for the cloud consumers to choose the software based on their business and scientific requirements. This paper evaluates Eucalyptus and CloudStack, the two most popular open source platforms used to build private Infrastructure as a service (IaaS) clouds. The performance of virtual machines (VMs) initiated and managed by Eucalyptus and CloudStack are evaluated in terms of CPU utilization, memory bandwidth, disk I/O access speed, and network performance using suitable benchmarks. Different VM management operations such as add, delete and live migration are also assessed to determine which cloud solution is more suitable than other to be adopted as a private cloud solution. As a further performance testing, a simple web application has been implemented on the both clouds to evaluate their suitability in web application hosting.

Author 1: Mumtaz M.Ali AL-Mukhtar
Author 2: Asraa Abdulrazak Ali Mardan

Keywords: Cloud Computing; CloudStack; Eucalyptus; IaaS; Virtual Machine; Performance Evaluation

Download PDF

Paper 17: An Enhanced Fuzzy Multi Criteria Decision Making Model with A proposed Polygon Fuzzy Number

Abstract: Decisions in real world applications are often made under the presence of conflicting, uncertain, incomplete and imprecise information. Fuzzy multi Criteria Decision making (FMCDM) approach provides a powerful approach for drawing rational decisions under uncertainty given in the form of linguistic values. Linguistic values are usually represented as fuzzy numbers. Most of researchers adopt either triangle or trapezoidal fuzzy numbers. Since triangle, intervals, and even singleton are special cases of Trapezoidal fuzzy numbers, so, for most researchers Trapezoidal fuzzy numbers are considered Generalized fuzzy numbers (GFN). In this paper, we introduce polygon fuzzy number (PFN) as the actual form of GFN. The proposed form of PFN provides higher flexibility to decision makers to express their own linguistic rather than other form of fuzzy numbers. The given illustrative example ensures such ability for better handling of the FMCDM problems.

Author 1: Samah Bekheet
Author 2: Ammar Mohammed
Author 3: Hesham A. Hefny

Keywords: Fuzzy multi criteria decision making; linguistic values; polygon fuzzy number; level set

Download PDF

Paper 18: Telugu Bigram Splitting using Consonant-based and Phrase-based Splitting

Abstract: Splitting is a conventional process in most of Indian languages according to their grammar rules. It is called ‘pada vicchEdanam’ (a Sanskrit term for word splitting) and is widely used by most of the Indian languages. Splitting plays a key role in Machine Translation (MT) particularly when the source language (SL) is an Indian language. Though this splitting may not succeed completely in extracting the root words of which the compound is formed, but it shows considerable impact in Natural Language Processing (NLP) as an important phase. Though there are many types of splitting, this paper considers only consonant based and phrase based splitting.

Author 1: T. Kameswara Rao
Author 2: Dr. T. V. Prasad

Keywords: Bigram; n-gram; consonant based splitting; phrase based splitting

Download PDF

Paper 19: A Review of Text Messaging (SMS) as a Communication Tool for Higher Education

Abstract: Since 2011, The Limerick Institute of Technology (School of Applied Science Engineering & Technology) has actively engaged in a course of research to determine if SMS can be used to (1) increase student’s preparation for class, (2) increase their motivational levels towards learning and (3) to assist with memory retention. The purpose of this paper is to introduce the concept of the technology and to summarise the academic arguments that have been made both for and against the use of such technology for teaching and learning activities in higher education. A full quantitate and qualitative analysis of the research will take place in 2014. The project forms part of a school wide Scholarship of Teaching & Learning approach (SoTL). This paper will be of interest to academic managers, program managers, e-learning support staff, administrators and lecturers.

Author 1: Dr.Daragh Naughton

Keywords: SMS; text message; higher education; motivation

Download PDF

Paper 20: Web and Telco Service Integration: A Dynamic and Adaptable Approach

Abstract: The current evolution of the Web, known as Web 2.0 and characterized by providing a diverse global service ecosystem, has marked a change in the role played by telecom operators. In order to maintain high competitive market dynamism and generate new revenue sources, many operators seek to leverage the wide variety of existing Web services and integrate them with its infrastructure capabilities. Such integration leads to various challenges from a technological perspective, where the heterogeneity on networks and the need for highly qualified personnel for the development of these services are highlighted. This paper is propose the definition of a mechanism for integrating both Web and Telco services which facilitates and speeds the development of new services, considering the dynamic conditions of its execution.

Author 1: Julián Rojas
Author 2: Leandro Ordóñez-Ante
Author 3: Juan Carlos Corrales

Keywords: Web Services; Telco Services; JAIN SLEE; Integration; Adaptation

Download PDF

Paper 21: Improving Forecasting Accuracy in the Case of Intermittent Demand Forecasting

Abstract: In making forecasting, there are many kinds of data. Stationary time series data are relatively easy to make forecasting but random data are very difficult in its execution for forecasting. Intermittent data are often seen in industries. But it is rather difficult to make forecasting in general. In recent years, the needs for intermittent demand forecasting are increasing because of the constraints of strict Supply Chain Management. How to improve the forecasting accuracy is an important issue. There are many researches made on this. But there are rooms for improvement. In this paper, a new method for cumulative forecasting method is proposed. The data is cumulated and to this cumulated time series, the following method is applied to improve the forecasting accuracy. Trend removing by the combination of linear and 2nd order non-linear function and 3rd order non-linear function is executed to the production data of X-ray image intensifier tube device and Diagnostic X-ray image processing apparatus. The forecasting result is compared with those of the non-cumulative forecasting method. The new method shows that it is useful for the forecasting of intermittent demand data. The effectiveness of this method should be examined in various cases.

Author 1: Daisuke Takeyasu
Author 2: Asami Shitara
Author 3: Kazuhiro Takeyasu

Keywords: intermittent demand forecasting; minimum variance; exponential smoothing method; trend

Download PDF

Paper 22: An Algorithm Research for Supply Chain Management Optimization Model

Abstract: In this paper, we consider the extended linear complementarity problem on supply chain management optimization model. We first give a global error bound for the extended linear complementarity problem, and then propose a new type of algorithm based on the error bound estimation. Both the global and quadratic rate of convergence are established. These conclusions can be viewed as extensions of previously known results.

Author 1: Ruomeng Kong
Author 2: Chengjiang Yin

Keywords: supply chain management optimization model; the extended linear complementarity problem; error bound; algorithm; quadratical convergence

Download PDF

Paper 23: An Adaptive Hybrid Controller for DBMS Performance Tuning

Abstract: Performance tuning process of database management system (DBMS) is an expensive, complex and time consuming process to be handled by human experts. A proposed adaptive controller is developed that utilizes a hybrid model from fuzzy logic and regression analysis to tune the memory-resident data structures of DBMS. The fuzzy logic module uses flexible rule matrix with adaption techniques to deal with fluctuations and abrupt changes in the operation environment. The regression module predicts fluctuations in operation environment so the controller can take former action. Experimental results on standard benchmarks showed significant performance enhancement as compared to built-in self-tuning features.

Author 1: Sherif Mosaad Abdel Fattah
Author 2: Maha Attia Mahmoud
Author 3: Laila Abd-Ellatif Abd-Elmegid

Keywords: automatic database tuning; fuzzy logic; adaptive controller; regression; self-tuning; DBMS

Download PDF

Paper 24: Designing a Multi Agent System Architecture for IT Governance Platform

Abstract: This paper presents a multi-agents architecture which facilitates the integration of three major IT governance frameworks: COBIT5, ITIL V3 and ISO/IEC27002, to optimize the construction of a distributed system. This architecture proposes a new and easier method to develop a distributed multi agents system, where agents involved in this system can communicate in a distributed way thanks to functionalities offered by the system. It gives finally an overview of implementation of a prototype of the proposed solution limited for the moment to integration of processes most used in the majority of information systems.

Author 1: S. ELHASNAOUI
Author 2: H. MEDROMI
Author 3: S.FARIS
Author 4: H.IGUER
Author 5: A. SAYOUTI

Keywords: IT Governance; Multi Agent System; COBIT 5; ITIL V3; ISO/IEC 27001/27001; Process; Information System Introduction

Download PDF

Paper 25: Using Digital Image Processing to Make an Intelligent Gate

Abstract: This paper presents an automatic system for controlling and dominating building gate based on digital image processing. The system begins with a digital camera, which captures a picture for that vehicle which intends to enter the building, then sends the picture to the computer. Image analyses performed to detect and recognize the vehicle, and matching the vehicle’s image with the stored database of the permissible vehicles. Then, the computer sends a signal to the electro-mechanical part that controls gate to open and permits the vehicle to enter the building in case of the vehicle’s image matches any image in the database, or sends an apology voice message in case of no identical image. The system is regarded as an empirical and it was applied on various types of vehicles. Results obtained were accurate and the system is successful for all vehicles used in the system test.

Author 1: Sundus K. E.
Author 2: AL_Mamare S. H.

Keywords: image processing; color recognition; patch recognition

Download PDF

Paper 26: An Algorithm for Summarization of Paragraph Up to One Third with the Help of Cue Words Comparison

Abstract: In the fast growing information era utility of technology are more precise than completing the assignment manually. The digital information technology creates a knowledge-based society with high-tech global economy which spreads over and influence the corporate and service sector to operate in more efficient and convenient way. Here an attempt was made on Extract Technology based on research. In this technology data could be refined and sourced with certainty and relevance. The application of artificial intelligence matched with the theories of machine learning would prove to be very effective. Sometime summarization of paragraph required rather than page or pages. So, Auto Summarization Model is an agnostic content summarization technology that automatically parses news, information, documents and many more into relevant and contextually accurate abbreviated summaries. This is a concept to convert a whole paragraph into one third. The Auto summarization technology reads a document, much better way than manually prepared, where, keywords and key phrases accurately weighted as they are found in the document, text or web page.

Author 1: Noopur Srivastava
Author 2: Bineet Kumar Gupta

Keywords: Data Mining; Data Warehouse; Artificial Intelligence

Download PDF

Paper 27: A Secure Electronic Transaction Payment Protocol Design and Implementation

Abstract: Electronic payment is the very important step of the electronic business system, and its security must be ensured. SSL/TLS and SET are two widely discussed means of securing online credit card payments. Because of implementation issues, SET has not really been adopted by e-commerce participants, whereas, despite the fact that it does not address all security issues, SSL/TLS is commonly used for Internet e-commerce security. The three-domain (3D) security schemes, including 3-D Secure and 3D SET have recently been proposed as ways of improving ecommerce transaction security. Based on our research about SSL, SET, 3D security schemes and the requirements of electronic payment, we designed a secure and efficient E-Payment protocol. The new protocol offers an extra layer of protection for cardholders and merchants. Customers are asked to enter an additional password after checkout completion to verify they are truly the cardholder, the authentication is done directly between the cardholder and card issuer using the issuer security certificate and without involving the third party (Visa, MasterCard).

Author 1: Houssam El Ismaili
Author 2: Hanane Houmani
Author 3: Hicham Madroumi

Keywords: E-commerce; Secure Socket Layer (SSL); Secure Electronic Transaction (SET); 3D-Secure

Download PDF

Paper 28: Opinion Mining and Analysis for Arabic Language

Abstract: Social media constitutes a major component of Web 2.0 and includes social networks, blogs, forum discussions, micro-blogs, etc. Users of social media generate a huge volume of reviews and comments on a daily basis. These reviews and comments reflect the opinions of users about different issues, such as: products, news, entertainments, or sports. Therefore different establishments may need to analyze these reviews and comments. For examples: It is essential for companies to know the pros and cons of their products or services in the eyes of customers. Governments may want to know the attitude of people towards certain decisions, services, etc. Although the manual analysis of textual reviews and comments can be more accurate than the automatic methods, nonetheless, it is time consuming, expensive, and can be subjective. Furthermore, the huge amount of data contained in social networks can make it impractical to perform analysis manually. This paper focuses on evaluating Arabic social content. Currently, Middle East is an area rich of major political and social reforms. The social media can be a rich source of information to evaluate such contexts. In this research we developed an opinion mining and analysis tool to collect different forms of Arabic language (i.e. Standard or MSA, and colloquial). The tool accepts comments and opinions as input and generates polarity based outputs related to the comments. Additionally the tool can determine the comment or review is: (subjective or objective), (positive or negative), and (strong or weak). The evaluation of the performance of the developed tool showed that it yields more accurate results when it is applied on domain-based Arabic reviews relative to general-based Arabic reviews.

Author 1: Mohammed N. Al-Kabi
Author 2: Amal H. Gigieh
Author 3: Izzat M. Alsmadi
Author 4: Heider A. Wahsheh
Author 5: Mohamad M. Haidar

Keywords: Sentiment Analysis; Arabic Sentiment Analysis; Opinion mining; Opinion Subjectivity; Opinion Polarity

Download PDF

Paper 29: Cloud and Web Technologies: Technical Improvements and Their Implications on E-Governance

Abstract: Cloud computing technology helps to improve ICT based services like e-governance execution and create new business opportunities and their implementation. Cloud computing is an evolution of web based internet application and describes an advance consumption, supplement and delivery model for Information Technology and ICT services based on the global network. This enables allocation of resources and costs across a large pool of users while providing on-demand services with dynamic scalability. So we can say that a technology that has the capability and potential to offer solutions for e-governance is cloud computing. Cloud computing provide service-oriented access to users least compromising on security. In today's era software and their services are biggest cost concern for the implementation of IT environment in an organization. Cloud has the capability to reduce the cost in dramatic way for the all kind of the organization even it is small scale Industry or a big corporate organization. This makes Cloud an excellent platform to host e-governance services and application. The basic intention of this paper is whatever improvement happening in cloud technology and in web technology mention sub sequentially. If we apply them in existing e-governance application running under various department then we can minimize the some of the most basic affected components of application software like cost of the software in its execution, optimal time for usage and running of application software, storage capacity for storing of the data and network infrastructure used for the functioning of the application software.

Author 1: Danish Manzoor
Author 2: Ashraf Ali
Author 3: Dr. Ateeq Ahmad

Keywords: Cloud; Web Semantics; Burst; SaaS; PaaS; IaaS; G-Cloud; M-Cloud; TCO; ICT, E-Governance; ITIL; Cloud legacy; Legacy cloud system silos; Lock-In; RDF; XML; URI

Download PDF

Paper 30: Efficient Eye Blink Detection Method for disabled-helping domain

Abstract: In this paper, we present a real time method based on some video and image processing algorithms for eye blink detection. The motivation of this research is the need of disabling who cannot control the calls with human mobile interaction directly without the need of hands. A Haar Cascade Classifier is applied for face and eye detection for getting eye and facial axis information. In addition, the same classifier is used based on Haar- like features to find out the relationship between the eyes and the facial axis for positioning the eyes. An efficient eye tracking method is proposed which uses the position of detected face. Finally, an eye blinking detection based on eyelids state (close or open) is used for controlling android mobile phones. The method is used with and without smoothing filter to show the improvement of detection accuracy. The application is used in real time for studying the effect of light and distance between the eyes and the mobile device in order to evaluate the accuracy detection and overall accuracy of the system. Test results show that our proposed method provides a 98% overall accuracy and 100% detection accuracy for a distance of 35 cm and an artificial light.

Author 1: Assit. Prof. Aree A. Mohammed
Author 2: MSc. Student Shereen A. Anwer

Keywords: eye detection; eye tracking; eye blinking; smoothing filter; detection accuracy

Download PDF

Paper 31: A fast cryptosystem using reversible cellular automata

Abstract: This article defines a new algorithm for a secret key cryptosystem using cellular automata which is a promising approach to cryptography. Our algorithm is based on cellular automata built on a set of reversible rules which have the ability to construct unpredictable secret keys using MARGOLUS neighborhood. To prove the feasibility of the algorithm, we present some tests of encryption, decryption and diffusion; a CPU time comparison with an encryption algorithm by blocks as for instance AES-256 is established. On the other hand, the security of the algorithm is proved and the implemented algorithm resists against a brute force attack.

Author 1: Said BOUCHKAREN
Author 2: Saiida LAZAAR

Keywords: AES; Cellular automata; Diffusion; Cryptosystem; MARGOLUS neighborhood

Download PDF

Paper 32: Herbal Leave Recognition System Based on Dirichlet Laplacian Eigenvalues

Abstract: Identifying and recognition of herbal plant green leaves is essential in botanical study. In[8] Thai herb leaf image recognition system used for recognition of leaves with accuracy of 93.29%, in this paper, we propose a recognition system of leaves based on the eigenvalues of Dirichlet Laplacian that used to generate three different sets of features for shape analysis and classification in binary images[4]. First leaf images are preprocessed to remove unwanted background, converted to binary form; used to build the images database, finally Queries made on the system. The correct classification rates without noise is 100% and with noise is 90%.

Author 1: Mahmoud Elgamal
Author 2: Mahmoud Youness R. Alaidy

Keywords: Eigenvalues, Finite difference method, Curve descriptor, Binary image classification, noise, leave recognition.

Download PDF

Paper 33: Solving for the RC4 stream cipher state register using a genetic algorithm

Abstract: The RC4 stream cipher has shown to be quite resilient to cryptanalysis for the 26 years it has been around. The algorithm is still one of the most widely used methods of encryption over the Internet today being implemented through the Secure Socket Layer and Transport Layer Security protocols. Genetic algorithms are a sub-class of evolutionary algorithms that have been used to help solve many different problems of optimization in a variety of disciplines. In this paper we will examine the abilities of the genetic algorithm as a tool to help solve the permutation that is stored as the state register of the RC4 stream cipher. Finally, we will show that on average the genetic algorithm can solve 100% of the keystream in 2121:5 generations.

Author 1: Benjamin Ferriman
Author 2: Charlie Obimbo

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org