The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 6 Issue 8

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Competitive Sparse Representation Classification for Face Recognition

Abstract: A method, named competitive sparse representation classification (CSRC), is proposed for face recognition in this paper. CSRC introduces a lowest competitive deletion mechanism which removes the lowest competitive sample based on the competitive ability of training samples for representing a probe in multiple rounds collaborative linear representation. In other words, in each round of competing, whether a training sample is retained or not in the next round depends on the ability of representing the input probe. Because of the number of training samples used for representing the probe decreases in CSRC, the coding vector is transformed into a low dimensional space comparing with the initial coding vector. Then the sparse representation makes CSRC discriminative for classifying the probe. In addition, due to the fast algorithm, the FR system has less computational cost. To verify the validity of CSRC, we conduct a series of experiments on AR, Extended YB, and ORL databases respectively.

Author 1: Ying Liu
Author 2: Jian-Xun Mi
Author 3: Cong Li
Author 4: Chao Li

Keywords: face recognition; collaborative representation sparse representation; and competitive representation

Download PDF

Paper 2: Finite Element Analysis based Optimization of Magnetic Adhesion Module for Concrete Wall Climbing Robot

Abstract: Wall climbing robot can provide easier accessibility to tall structures for Non Destructive Testing (NDT) and improve working environments of human operators. However, existing adhesion mechanism for climbing robots such as vortex, electromagnet etc. are still at development stage and offer no feasible adhesion mechanism. As a result, few practical products have been developed for reinforced concrete surfaces, though wall-climbing robots have been researched for many years. This paper proposes a novel magnetic adhesion mechanism for wall-climbing robot for reinforced concrete surface. Mechanical design parameters such as distance between magnets, the yoke thickness, and magnet arrangements have been investigated by Finite Element Analysis (FEA). The adhesion module can be attached under the chassis of a prototype robot. The magnetic flux can penetrate maximum concrete cover of 30 mm and attain adhesion force of 121.26 N. The prototype provides high Force-to-Weight ratio compared to other reported permanent magnet based robotic systems. Both experiment and simulation results prove that the magnetic adhesion mechanism can generate efficient adhesion force for the climbing robot to operate on vertical reinforced concrete structures.

Author 1: MD Omar faruq Howlader
Author 2: Traiq Pervez Sattar

Keywords: Finite Element Analysis (FEA); Magnetic Adhesion System; Non Destructive Testing (NDT); Wall Climbing Robot

Download PDF

Paper 3: Facial Age Estimation based on Decision Level Fusion of AAM, LBP and Gabor Features

Abstract: In this paper a new hierarchical age estimation method based on decision level fusion of global and local features is proposed. The shape and appearance information of human faces which are extracted with active appearance models (AAM) are used as global facial features. The local facial features are the wrinkle features extracted with Gabor filters and skin features extracted with local binary patterns (LBP). Then feature classification is performed using a hierarchical classifier which is the combination of an age group classification and detailed age estimation. In the age group classification phase, three distinct support vector machines (SVM) classifiers are trained using each feature vector. Then decision level fusion is performed to combine the results of these classifiers. The detailed age of the classified image is then estimated in that age group, using the aging functions modeled with global and local features, separately. Aging functions are modeled with multiple linear regression. To make a final decision, the results of these aging functions are also fused in decision level. Experimental results on the FG-NET and PAL aging databases have shown that the age estimation accuracy of the proposed method is better than the previous methods.

Author 1: Asuman Günay
Author 2: Vasif V. Nabiyev

Keywords: AAM; LBP; Gabor filters; Regression; Fusion; Age estimation

Download PDF

Paper 4: Flow-Based Specification of Time Design Requirements

Abstract: This paper focuses on design requirements in real-time systems where information is processed to produce a response within a specified time. Nowadays, computer control applications embedded in chips have grown in significance in many aspects of human life. These systems need a high level of reliability to gain the trust of users. Ensuring correctness in the early stages of the design process is especially a major challenge in these systems. Faulty requirements lead to errors in the final product that have to be fixed later, often at a high cost. A crucial step in this process is modeling the intended system. This paper explores the potential of flow-based modeling in expressing design requirements in real-time systems that include time constraints and synchronization. The main emphasized problem is how to represent time. The objective is to assist real-time system requirement engineers, in an early state of the development, to express the timing behavior of the developed system. Several known examples are modeled and the results point to the viability of the flow-based representation in comparison with such time specifications as state-based and line-based modeling.

Author 1: Sabah Al-Fedaghi

Keywords: design requirements; conceptual model; time constraints; model-based systems engineering; requirements specification

Download PDF

Paper 5: Analysis of Heart Rate Variability by Applying Nonlinear Methods with Different Approaches for Graphical Representation of Results

Abstract: There is an open discussion over nonlinear properties of the Heart Rate Variability (HRV) which takes place in most scientific studies nowadays. The HRV analysis is a non-invasive and effective tool that manages to reflect the autonomic nervous system regulation of the heart. The current study presents the results of HRV analysis based on 24-hour Holter ECG signals of healthy and unhealthy subjects. Analysis of heart intervals is performed with the use of original algorithms and software, developed by the authors, to quantify the irregularity of the heart rate. The main aim is the formation of the parametric estimate of patients’ health status, based on mathematical methods that are applied on cardiac physiology. The obtained results show that the analysis of Holter recordings by nonlinear methods may be appropriate for diagnostic, forecast and prevention of the pathological cardiac statuses. Different approaches of graphical representation and visualization of these results are used in order to verify this.

Author 1: Evgeniya Gospodinova
Author 2: Mitko Gospodinov
Author 3: Ivan Domuschiev
Author 4: Nilianjan Dey
Author 5: Amira S. Ashour
Author 6: Dimitra Sifaki-Pistolla

Keywords: Heart Rate Variability (HRV); ECG signal; Holter signal; nonlinear graphical methods

Download PDF

Paper 6: Diagnosis of Wind Energy System Faults Part I : Modeling of the Squirrel Cage Induction Generator

Abstract: Generating electrical power from wind energy is becoming increasingly important throughout the world. This fast development has attracted many researchers and electrical engineers to work on this field. The authors develop a dynamic model of the squirrel cage induction generator exists usually on wind energy systems, for the diagnosis of broken rotor bars defects from an approach of magnetically coupled multiple circuits. The generalized model is established on the base of mathematical recurrences. The winding function theory is used for determining the rotor resistances and the inductances in the case of n- broken bars. Simulation results, in Part. II of this paper, confirm the validity of the proposed model.

Author 1: Lahcène Noureddine
Author 2: Omar Touhami

Keywords: Induction Generator; Rotor Broken Bars; Faults Diagnosis; MCSA

Download PDF

Paper 7: A Novel Ball on Beam Stabilizing Platform with Inertial Sensors

Abstract: This research paper presents dynamic modeling of inertial sensor based one degree of freedom (1-DoF) stabilizing platform. Plant is a ball on a pivoted beam. Nonlinear modeling of the plant is done. Ball position on beam is actuated by DC motor using two arms and one beam structure. Arms and beam are linked by pivoted joints. Nonlinear geometrical relations for mechanical structure are derived followed by physically realizable approximations. These relations are used in system dynamic equations followed by linearization, resulting in a linear continuous time differential equation model. State space conversion is done. Final model is simulation and system dynamics are elaborated by analysis of the simulation responses

Author 1: Ali Shahbaz Haider
Author 2: Muhammad Nasir
Author 3: Basit Safir
Author 4: Farhan Farooq

Keywords: stabilizing platform; ball on beam; nonlinear dynamics; inertial sensors

Download PDF

Paper 8: Cryptic Mining in Light of Artificial Intelligence

Abstract: “The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algorithms, co-operative effort of cryptanalyst and mechanism of knowledge based inference engine. This information of knowledge base will be useful for mining data(plain-text, key or cipher text plain-text relationships), classification of cipher text based on enciphering algorithms, key length or any other desirable parameters, clustering of cipher text based on similarity and extracting association rules for identifying weaknesses of cryptic algorithms. This categorization will be useful for placing given cipher text into a specific category or solving difficult level of cipher text-plain text conversion process. This paper elucidates cipher text-plain text process first than utilizes it to create a framework for AI-enabled-Cryptanalysis system. The process demonstrated in this paper attempts to analyze captured cipher from scratch. The system design elements presented in the paper gives all hints and guidelines for development of AI enabled Cryptic analysis tool.

Author 1: Shaligram Prajapat
Author 2: Aditi Thakur
Author 3: Kajol Maheshwari
Author 4: Ramjeevan Singh Thakur

Keywords: Cipher text; Cryptic analysis; Encryption algorithm; Artificial Intelligence (AI)

Download PDF

Paper 9: Evaluation and Improvement of Procurement Process with Data Analytics

Abstract: Analytics can be applied in procurement to benefit organizations beyond just prevention and detection of fraud. This study aims to demonstrate how advanced data mining techniques such as text mining and cluster analysis can be used to improve visibility of procurement patterns and provide decision-makers with insight to develop more efficient sourcing strategies, in terms of cost and effort. A case study of an organization’s effort to improve its procurement process is presented in this paper. The findings from this study suggest that opportunities exist for organizations to aggregate common goods and services among the purchases made under and across different prescribed procurement approaches. It also suggests that these opportunities are more prevalent in purchases made by individual project teams rather than across multiple project teams.

Author 1: Melvin Tan H.C.
Author 2: Wee-Leong Lee

Keywords: procurement; text mining; clustering; data analytics; fraud detection

Download PDF

Paper 10: Increase Efficiency of SURF using RGB Color Space

Abstract: SURF is one of the most robust local invariant feature descriptors. SURF is implemented mainly for gray images. However, color presents important information in the object description and matching tasks as it clearly in the human vision system. Many objects can be unmatched if their color contents are ignored. To overcome this drawback this paper proposed a method CSURF (Color SURF) that combines features of Red, Green and blue layers to detect color objects. It edits matched process of SURF to be more efficient with color space. Experimental results show that CSURF is more precious than traditional SURF and CSURF invariant to RGB color space

Author 1: M. Wafy
Author 2: A. M. M. Madbouly

Keywords: SURF; Features; Local Features; Color Space

Download PDF

Paper 11: Smart Grid Testbed using SCADA Software and Xbee Wireless Communication

Abstract: This paper presents the development of Smart Grid testbed using SCADA software and Xbee wireless communication. The proposed testbed combines both the software simulation and the hardware simulation. The Winlog SCADA software is employed to implement the algorithm in the Smart Grid system. To communicate between nodes and the Smart Grid Center, the Xbee wireless communication is employed. The testbed is useful to test and verify the developed algorithms in the Smart Grid system. By using the hardware testbed, the more realistic simulation could be performed. While by using the software testbed, the complex model and algorithm could be implemented easily. The experimental results show that the proposed testbed works properly in simulating the continuous supply algorithm implemented in the Smart Grid system.

Author 1: Aryuanto Soetedjo
Author 2: Abraham Lomi
Author 3: Yusuf Ismail Nakhoda

Keywords: SCADA; Smart Grid; wireless communication; Xbee DigiMesh; testbed

Download PDF

Paper 12: A Proposed Peer Selection Algorithm for Transmission Scheduling in P2P-VOD Systems

Abstract: Video transmission in peer-to-peer video-on-demand faces some challenges. These challenges include long transmission delay and poor quality of service. The peer selection plays an important role in enhancing transmission efficiency. For this reason, a proposed algorithm for peer selection is introduced to overcome these challenges. The proposed algorithm consists of four steps. First, the peers exchange their own buffer maps with other peers. Second, the requested segments are ordered according to their priorities. Third, neighbors of the receiver are evaluated by the efficiency estimation. Finally, the efficient sender list is applied to solve the overloading and bottleneck on the highest efficient sender. A simulation is introduced to evaluate the performance of the proposed algorithm compared to a peer selection algorithm with context-aware adaptive (CAA) data scheduling algorithm. The results show that, the proposed algorithm reduces initial buffering delay and achieves high throughput rather than CAA algorithm.

Author 1: Hatem Fetoh
Author 2: Waleed M. Bahgat
Author 3: Ahmed Atwan

Keywords: video-on-demand; segment transmission; chunk miss ratio; initial playback delay; peer-to-peer

Download PDF

Paper 13: Understanding Social Network Usage: Impact of Co-Presence, Intimacy, and Immediacy

Abstract: This study examines individuals’ intentions and behaviour on Social Networking Sites (SNSs). The study proposed model asserts that “Co-presence”, “Intimacy”, “Immediacy”, “Perceived Enjoyment”, and “Perceived ease of use” formed individuals' “Attitude” towards “behavioral intention” to use SNSs. The results support all formulated hypotheses. The proposed model in this study explains 69% of individual’s attitude or feelings towards adoption the SNSs, 59% of the variance in “Behavioral Intention” and 54% of the variance in “Usage Behaviour”. The present study has shown the importance of social presence’s factors, namely co-presence, intimacy, and immediacy, in explaining individuals’ intentions and behavior. The study findings confirmed that social presence positively influence SNS usage indirectly through user attitude, and as aforementioned that three factors, namely co-presence, intimacy, and immediacy are framing the construct of social presence. Thus, this study is the first empirical effort to examine the impact of co-presence, intimacy, and immediacy in determining intention or behaviour.

Author 1: Waleed Al-Ghaith

Keywords: Social presence theory; Social networking sites; SNS; Factors; Adoption; Usage; Saudi Arabia

Download PDF

Paper 14: Trust: A Requirement for Cloud Technology Adoption

Abstract: Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services; that can be rapidly provisioned and released with minimal management effort or service provider interaction. Studies have shown that cloud computing has the potential to benefit establishments, industries, national and international economies. Despite the enormous benefits cloud computing technology has the potentials of offering, several issues are making intended users to pause in adopting the usage of the technology. Users need to be assured of the safety and reliability of the technology while using it. This is needed to build confidence around the technology and reduce the level of anxiety. This research attempts to investigate the effect of trust in the adoption of the technology by formulating a trust model based on Expectancy Disconfirmation Theory model and Bayesian network. A simulation experiment was carried out to determine the significance of trust in the adoption of cloud technology.

Author 1: Akinwale O. Akinwunmi
Author 2: Emmanuel A. Olajubu
Author 3: G. Adesola Aderounmu

Keywords: Cloud; User; Adoption; Trust; Bayesian Network

Download PDF

Paper 15: Proposal for Scrambled Method based on NTRU

Abstract: Scrambling is widely used to protect the security of data files such as text, image, video or audio files; however, it is not the most efficient method to protect the security of the data files. This article uses NTRU public key cryptosystem to increase the robustness of scrambling of sound files. In this work, we convert the sound file into text, and then scramble it in the following way: first, we encrypt the header of the sound file then, scramble the data of the file after the header in three stages. In each stage we scramble the data of the sound file and keep the original order of data in an array then, the three arrays are encrypted by the sender and sent with the encrypted header to the receiver in one file, while the scrambled data of the sound file is sent to the receiver in another file. We have tested the proposed method on several sound files; the results show that the time of encryption and decryption is reduced to approximately one-third, or less, compared to encrypting the file using NTRU.

Author 1: Ahmed Tariq Sadiq
Author 2: Najlaa Mohammad Hussein
Author 3: Suha Abdul Raheem Khoja

Keywords: NTRU; public key; cipher; sound; scramble; segment

Download PDF

Paper 16: Network Efficiency – Optimized Automaton Approach

Abstract: A sperner’s grid is thought of a finite state system, where in the model gives rise to an optimal network through characterization of paths .the automation graphs of the various states gives rise to different groomable light paths in network.

Author 1: K. Thiagarajan
Author 2: N. Subashini
Author 3: M. S. Muthuraman

Keywords: Automaton; Network; Efficiency; Characterization

Download PDF

Paper 17: HTCSLQ : Hierarchical Tree Congestion Degree with Speed Sending and Sum Costs Link Quality Mechanism for Wireless Sensor Networks

Abstract: Wireless Sensor Network (wsn) performances have progressed over the last few years, aiming at expanding the lifetime nodes. Among the important studied parts on wsn is the congestion degree that can be identified by several algorithms such as HTAP (Hierarchical Tree Alternative Path), which is the target in the current study. It is important to mention that besides the variations observed between the four HTAP deployments of this classical algorithm ( detailed on the rest of paper ) , there is a possibility that other factors, such as energy efficiency, network lifetime are affected by the node displacements in the HTAP phases ( in case of the route change caused by the isolated dead nodes to the sink ) , which give the idea to reduce this undesirable problem by designing a new algorithm called Hierarchical Tree Congestion degree with Speed sending and Sum costs link Quality (HTCSLQ) by reducing the energy consumption , according to the choice of the lower Congestion degree , optimal Speed sending and Sum costs link Quality values from the source to destination.

Author 1: Mbida Mohamed
Author 2: Ezzati Abdellah

Keywords: HTAP (Hierarchical Tree Alternative Path); Cd (congestion degree); Ss( speed of sending); SCVQL (Sum of costs variable Link quality); Wireless Sensor Network (wsn)

Download PDF

Paper 18: Efficient Proposed Framework for Semantic Search Engine using New Semantic Ranking Algorithm

Abstract: The amount of information raises billions of databases every year and there is an urgent need to search for that information by a specialize tool called search engine. There are many of search engines available today, but the main challenge in these search engines is that most of them cannot retrieve meaningful information intelligently. The semantic web technology is a solution that keeps data in a readable format that helps machines to match smartly this data with related information based on meanings. In this paper, we will introduce a proposed semantic framework that includes four phases crawling, indexing, ranking and retrieval phase. This semantic framework operates over a sorting RDF by using efficient proposed ranking algorithm and enhanced crawling algorithm. The enhanced crawling algorithm crawls relevant forum content from the web with minimal overhead. The proposed ranking algorithm is produced to order and evaluate similar meaningful data in order to make the retrieval process becomes faster, easier and more accurate. We applied our work on a standard database and achieved 99 percent effectiveness on semantic performance in minimum time and less than 1 percent error rate compared with the other semantic systems.

Author 1: M. M. El-gayar
Author 2: N.Mekky
Author 3: A. Atwan

Keywords: Semantic Search Engine; Ontology; Semantic Ranker; Crawler; RDF;SPARQL

Download PDF

Paper 19: Self-Healing Hybrid Protection Architecture for Passive Optical Networks

Abstract: Expanding size of passive optical networks (PONs) along with high availability expectation makes the reliability performance a crucial need. Most protection architectures utilize redundant network components to enhance network survivability, which is not economical. This paper proposes new self-healing protection architecture for passive optical networks (PONs), with a single ring topology and star-ring topology at feeder and distribution level respectively. The proposed architecture provides desirable protection to the network by avoiding fiber duplication at both feeder and distribution level. Moreover, medium access control (MAC) controlled switching is utilized to provide efficient detection, and restoration of faults or cuts throughout the network. Analytical analysis reveals that the proposed self-healing hybrid protection architecture ensures survivability of the affected traffic along with desirable connection availability of 99.9994 % at minimum deployment cost, through simple architecture and simultaneous protection against failures.

Author 1: Waqas A. Imtiaz
Author 2: P. Mehar
Author 3: M. Waqas
Author 4: Yousaf Khan

Keywords: passive optical network; protection; star-ring topology; reliability; CAPEX

Download PDF

Paper 20: Computer Vision for Screening Resistance Level of Rice Varieties to Brown Planthopper

Abstract: Brown planthopper is one of the most important insect pest that threatens the stability of national rice production in Indonesia. One of the efforts to save rice production is by using brown planthopper resistant variety. Currently the determination approach is still conventional based on Standard Seedboxes Screening Test from IRRI with assistance of experienced experts in the scoring process resistance level.In this study, a prototype of application system to predict resistance levels by image color approach was developed. The method consists of collecting images data, preparation process (background and objects segmentation), and determination of area proportion which has been infected (sick and dead) and healthy, based on ‘A’ value from CIELab color space laboratory. According to proportion value distribution, the rule of rice resistance to brown planthopper assessment based on image was developed. The rule is mostly similar with IRRI standard rules. All of images were assessed based on the rule and then the model was developed with an error rate of 17.02%.

Author 1: Elvira Nurfadhilah
Author 2: Yeni Herdiyeni
Author 3: Aunu Rauf
Author 4: Rahmini

Keywords: brown planthopper; color extraction; resistance; standard seedboxes screening test

Download PDF

Paper 21: Probabilistic Algorithm based on Fuzzy Clustering for Indoor Location in Fingerprinting Positioning Method

Abstract: Recently, the location of the fingerprint positioning technology is obviously superior to the signal transmission loss model based on the positioning technology, and is widely concerned by scholars. In the online phase, due to the efficiency of the probabilistic distribution matching computation is low and when clustering the position fingerprint database, hard clustering lead to degrading the positioning accuracy, a probabilistic algorithm based on fuzzy clustering is proposed and applied to the indoor location fingerprinting positioning. Compared with hard clustering fusion algorithm, the proposed method has realized the fuzzy partition of the database, makes online positioning phase can effectively search the desired fingerprint data, and improve the positioning accuracy. Experiments show that the algorithm can effectively deal with the problem of the positioning accuracy of hard clustering.

Author 1: Bo Dong
Author 2: Fei Wu
Author 3: Jian Xing
Author 4: Yan Zou

Keywords: Fuzzy Clustering; Fingerprinting Positioning; Indoor Location; RSSI; Probabilistic Algorithm

Download PDF

Paper 22: Implementation of Location Base Service on Tourism Places in West Nusa Tenggara by using Smartphone

Abstract: The study is aimed to create an application that can assist users in finding information about tourism places in West Nusa Tenggara, Indonesia. West Nusa Tenggara is one of the provinces in Indonesia and one of the second tourists’ destinations after Bali. It is a small Sunda Island which consists of two large islands located in the west of Lombok and Sumbawa that located in the east to the capital of Mataram on the island of Lombok. The area of West Nusa Tenggara province is 19,708.79 km2. The application provides information such as descriptions of sights, tourism spot address, photo galleries, and the available facilities and the closest track to where the tourism spot is by using Google maps. Google maps can display map locations and closest routes from the user's position to the tourism place. Determination of the position of the user and position of Tourism sites using GPS (Global Positioning System). This application is made by using the Java programming language for Android with Eclipse 4.2.1 IDE that can be used on the Smartphone device based on Android. The result of the research is the creation of location-based services applications to search a place of Tourism in West Nusa Tenggara province so as to help tourists visiting the West Nusa Tenggara. The benefit of this application is that to determine the path in finding the tourism places.

Author 1: Karya Gunawan
Author 2: Bambang Eka Purnama

Keywords: location base service; GPS; Smartphone; tourism information

Download PDF

Paper 23: Robust Fuzzy-Second Order Sliding Mode based Direct Power Control for Voltage Source Converter

Abstract: This paper focuses on a second order sliding mode based direct power controller (SOSM-DPC) of a three-phase grid-connected voltage source converter (VSC). The proposed control scheme combined with fuzzy logic aims at regulating the DC-link voltage of the converter and precisely tracking arbitrary power references, in order to easily control the system’s power factor. Therefore measures are proposed to reduce the chattering effects inherent to sliding-mode control (SMC). Simulations performed under Matlab/Simulink validate the feasibility of the designed Fuzzy-SOSM. Simulation results on a 1kVA grid-connected VSC under normal and faulted grid voltage conditions demonstrate good performance of the proposed control law in terms of robustness, stability and precision.

Author 1: D. Kairous
Author 2: B. Belmadani

Keywords: AC-DC power converters; Bidirectional power flow; Fuzzy logic; Sliding mode control; Direct Power control

Download PDF

Paper 24: Research on Energy Saving Method for IDC CRAC System based on Prediction of Temperature

Abstract: Amid the information era, energy consumption of IDC Computer Room Air Conditioning (CRAC) system is becoming increasingly serious. Thus there is growing concern over energy saving and consumption reduction. Based on the analysis of the energy saving application of the air conditioning system in the present computer room, a new energy saving method of the IDC CRAC system, which presents energy saving decision based on the prediction of temperature, is proposed. Its principle is the collection of CPU utilization reflected the change of equipment working load, the temperature in hot spots and cold area. Then, to build a BP Neural Network model, taking the working load and the temperature in hot spots for the actual input, taking the temperature in a cold area for actual output. The BP Neural Network model can predict the temperature in hot spots of the next, when a set of real-time data into the model. Choosing a reasonable and effective decision-making scheme of the air conditioning system can realize energy saving control. Preliminary simulation results show, through the establishment of BP network model obtain approximation error of training samples and the prediction error of testing samples, both to highlight the advantages of the model. Finally, the distribution of temperature change about CRAC system whole day obtained by simulation shows that the proposed energy-saving method can reduce the energy consumption of IDC, fully embodies the effect of energy saving.

Author 1: Zou Yan
Author 2: WU Fei
Author 3: Xing Jian
Author 4: Dong Bo

Keywords: IDC; CRAC system; BP Neural Network Model; Forecast of temperature; Energy saving

Download PDF

Paper 25: Bio-Inspired Clustering of Complex Products Structure based on DSM

Abstract: Clustering plays an important role in the decomposition of complex products structure. Different clustering algorithms may achieve different effects of the decomposition. This paper aims to proposes a bio-inspired genetic algorithm that is implemented based on its reliable fitness function and design structure matrix (DSM) for clustering analysis of complex products. This new bio-inspired genetic algorithm captures the features of DSM, which is base on the biological evolution theory. Examples of these products include motorcycle engines that are presented for clustering. The five cluster alternatives are obtained from the regular clustering algorithm and the bio-inspired genetic algorithm, while the best cluster alternative comes from the bio-inspired genetic algorithm. The results show that this algorithm is well adaptable, especially when the product elements have complicated and asymmetric connections.

Author 1: Fan Yang
Author 2: Pan Wang
Author 3: Sihai Guo
Author 4: Qibing Lu
Author 5: Xingxing Liu

Keywords: Bio-inspired computation; genetic algorithm (GA); reliable fitness function; DSM; complex products; clustering

Download PDF

Paper 26: Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

Abstract: With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.

Author 1: Tehseen Mehraj
Author 2: Bisma Rasool
Author 3: Burhan Ul Islam Khan
Author 4: Asifa Baba
Author 5: Prof. A. G. Lone

Keywords: Access Management; Authentication; One-Time-Password (OTP); OTP generation; User adoptability

Download PDF

Paper 27: Psychosocial Correlates of Software Designers' Professional Aptitude

Abstract: This paper presents quantitative results of the first phase of empirical research carried out within the framework of the interdisciplinary project InfoPsycho that was initiated in 2013 at the Koszalin University of Technology and the University of Gdansk. The aim of the study was to identify the personality traits that characterize successful applicants for university studies in the field of software development. Synthetic indicators of quality and performance of their design tasks and exercises were selected as the criteria for candidates’ professional skills. To measure personality traits, the NEO-FFI questionnaire was used, based on the five-factor model by Costa and McCrae. Preliminary results show that expected young designers (N=140) score high on neuroticism and introversion as compared with those designers whose design documentation is of poor quality. They also show a high degree of conscientiousness, which can be seen when their performance of exercises and programming tasks is being evaluated.

Author 1: Walery Suslow
Author 2: Jacek Kowalczyk
Author 3: Michal Statkiewicz
Author 4: Marta Boinska
Author 5: Janina Nowak

Keywords: Software designer; Software quality; Professional skills; Early diagnosis; Psychological tests; NEO-FFI

Download PDF

Paper 28: Map Reduce: A Survey Paper on Recent Expansion

Abstract: A rapid growth of data in recent time, Industries and academia required an intelligent data analysis tool that would be helpful to satisfy the need to analysis a huge amount of data. MapReduce framework is basically designed to compute data intensive applications to support effective decision making. Since its introduction, remarkable research efforts have been put to make it more familiar to the users subsequently utilized to support the execution of massive data intensive applications. Our survey paper emphasizes the state of the art in improving the performance of various applications using recent MapReduce models and how it is useful to process large scale dataset. A comparative study of given models corresponds to Apache Hadoop and Phoenix will be discussed primarily based on execution time and fault tolerance. At the end, a high-level discussion will be done about the enhancement of the MapReduce computation in specific problem area such as Iterative computation, continuous query processing, hybrid database etc.

Author 1: Shafali Agarwal
Author 2: Zeba Khanam

Keywords: Map Reduce; Hadoop; Iterative Computation; Phoenix; Databases

Download PDF

Paper 29: Security Issues Model on Cloud Computing: A Case of Malaysia

Abstract: By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security viewpoint, several issues and problems were discussed regarding the cloud transfer. The goal of this study is to represent a general security viewpoint of cloud computing through signifying the security problems that must be focused and accomplished appropriately for identifying a better perspective about current world of cloud computing. This research also is to clarify the particular interrelationships existing between cloud computing security and other associated variables such as data security, virtual machine security, application security and privacy. In addition, a model of cloud computing security which depends on the investigation regarding previous studies has been developed. To examine the model a type of descriptive survey is applied. The survey sample population is selected from employers and managers IT companies in Malaysia. By testing the correlation, the results of study indicated that there are those identified security challenges in current world of cloud computing. Furthermore, the results showed that the cloud computing security correlation with data security, virtual machine security, application security and privacy is positive.

Author 1: Komeil Raisian
Author 2: Jamaiah Yahaya

Keywords: Cloud Computing; Security Issues; Security Viewpoint; Grid Computing

Download PDF

Paper 30: A Hybrid Heuristic/Deterministic Dynamic Programing Technique for Fast Sequence Alignment

Abstract: Dynamic programming seeks to solve complex problems by breaking them down into multiple smaller problems. The solutions of these smaller problems are then combined to reach the overall solution. Deterministic algorithms have the advantage of accuracy but they need large computational power requirements. Heuristic algorithms have the advantage of speed but they provide less accuracy. This paper presents a hybrid design of dynamic programing technique that is used for sequence alignment. Our technique combines the advantages of deterministic and heuristic algorithms by delivering the optimal solution in suitable time. we implement our design on a Xilinx Zynq-7000 Artix-7 FPGA and show that our implementation improves the performance of sequence alignment by 63% for in comparison to the traditional known methods.

Author 1: Talal Bonny

Keywords: Sequence alignment, dynamic programing, Perfor-mance, optimization, FPGA

Download PDF

Paper 31: AdviseMe: An Intelligent Web-Based Application for Academic Advising

Abstract: The traditional academic advising process in many tertiary-level institutions today possess significant inefficiencies, which often account for high levels of student dissatisfaction. Common issues include high student-advisor loads, long waiting periods at advisory offices and the need for advisors to handle a significant number of redundant cases, among others. Utilizing semantic web expert system technologies, a solution was proposed that would complement the traditional advising process, alleviating its issues and inefficiencies where possible. The solution coined ‘AdviseMe’, an intelligent web-based application, provides a reliable, user-friendly interface for the handling of general advisory cases in special degree programmes offered by the Faculty of Science and Technology (FST) at the University of the West Indies (UWI), St. Augustine campus. In addition to providing information on handling basic student issues, the system’s core features include course advising, as well as infor-mation of graduation status and oral exam qualifications. This paper produces an overview of the solution, with special attention being paid to the its inference system exposed via its RESTful Java Web Server (JWS). The system was able to provide sufficient accurate advice for the sample set presented and showed high levels of acceptabil-ity by both students and advisors. Furthermore, its successful implementation demonstrated its ability to enhance the advisory process of any tertiary-level institution with programmes similar to that of FST.

Author 1: Lawrence Keston Henderson
Author 2: Wayne Goodridge

Keywords: Web-Based Academic Advising; Academic Advising; Ontology; Jena; Expert Systems

Download PDF

Paper 32: Evolutionary Approach to jointly resolve the Power and the Capacity Optimization problems in the multi-user OFDMA Systems

Abstract: This paper deals with the problem of resources allo-cation in the downlink of the radio mobile systems. The allocation of resources is established in the context of multi-path effect and Doppler effect. These phenomena cause randomly variations of the channel and make difficult the allocation of the resources. Therefore, the problem of resources allocation is a high non linear optimization problem. Thus, we propose an implementation of genetic algorithms approach to increase the total throughput of users while minimizing the consumption of the total power of the base station. Like the evolutionary algorithms approach, this method is characterized by its robustness, permitting to efficiently solve a non linear optimization problem.

Author 1: Ndiaye Abdourahmane
Author 2: Ouya Samuel
Author 3: Mendy Gervais

Keywords: Cellular Network; OFDMA; Resources Allocation; Rate Adaptive; Margin Adaptive; Genetic Algorithms

Download PDF

Paper 33: Image Enhancement Using Homomorphic Filtering and Adaptive Median Filtering for Balinese Papyrus (Lontar)

Abstract: Balinese papyrus (Lontar) is one of the most popular media to write for more than a hundred years in Indonesia. Balinese papyrus are used to document things that are considered important in the past. Most of the balinese papyrus suffered damage caused by weathering, edible fungus and insects making it is difficult to read. One of the efforts made to preserve the existence of balinese papyrus is to perform digitization of it. The problems most often encountered in the process of digitizing the image of the balinese papyrus is less good results as there is noise caused by its conditions that have been damaged and the uneven distribution illumination in this part of the image. In this study the authors propose to combine homomorphic filtering with adaptive median filtering to perform image enhancement. Surve results obtained show the percentage of the average respondents stated that the image enhancement results are good is 83.4%, the percentage of the average respondents stated that the image enhancement results are very good is 4% and the percentage of the average respondents stated that the image enhancement results are enough is 12, 6%.

Author 1: Ida Bagus Ketut Surya Arnawa

Keywords: Image Enhancement; Balinese Papyrus; Homomorphic Filtering; Adaptive Median Filtering; Otsu Binarization

Download PDF

Paper 34: Model Checking Self-Stabilising in Embedded Systems with Linear Temporal Logic

Abstract: Over the past two decades, the use of distributed embedded systems is wide in many applications. One way to guarantee that these systems tolerate transient faults is done by making them self-stabilizing systems, which automatically recover from any transient fault. In this paper we present a formalism of self-stabilization concept based on Linear Temporal Logic (LTL), and model checked the self-stabilization in embedded systems. Using a case study inspired by industrial practice, we present in detail a model checking to verify the self stabilization property of our embedded system.

Author 1: Rim Marah
Author 2: Abdelaaziz EL Hibaoui

Keywords: Distributed Embedded Systems, Linear Temporal Logic, Self-Stabilization, Model Checking, Verification

Download PDF

Paper 35: Modeling and simulation of the effects of landslide on circulation of transports on the mountain roads

Abstract: Landslides, as one of the major natural hazards, account each year for enormous property damage in terms of both direct and indirect costs. Mountain roads where probability of land sliding is the highest, causes hurdles not only in the traffic flow but generate various traffic problems in the form of congestion, high accidents rate and waste of time. This paper introduces an agent-based model for modeling and simulation of the effects of landslide on the circulation of transports on mountain roads. This model is applied to the National Road N°6 of Vietnam to visualize and analyze the effects of landslide on the road when it occurs. This model could help us to improve and optimally organize of landslide warning and rescue system on the road.

Author 1: Manh Hung Nguyen
Author 2: Tuong Vinh Ho
Author 3: Trong Khanh Nguyen
Author 4: Minh Duc Do

Keywords: Simulation model, Traffic network simulation, Landslide effect, Multiagent system

Download PDF

Paper 36: SmartFit: A Step Count Based Mobile Application for Engagement in Physical Activities

Abstract: Research has found that relatively few people en-gage in regular exercise or other physical activities. Despite the availability of numerous mobile applications and specialized devices for self-tracking, people mostly lack the motivation for performing physical activities. In this article we present SmartFit, a mobile application that uses step count for promoting the physical activities in adults. This article points out that while considering walk, activity duration is not sufficient for deter-mining users activeness state. Step count is another factor that should be taken into account. For this we propose an approach for converting the steps into duration for which activity has been performed. This duration is then used in Smartfit for categorizing user into different activeness levels. Gamification techniques have been incorporated in SmartFit as they are found to serve the purpose of motivating and encouraging the user. Gamification is used for awarding/deducting points to user in order to keep them engaged for longer period. Furthermore feedback is also provided to users depending upon their goal and achieved progress. The objective is to facilitate and motivate the user and then keep them engaged in carrying out the recommended level of physical activities.

Author 1: Atifa Sarwar
Author 2: Hamid Mukhtar
Author 3: Maajid Maqbool
Author 4: Djamel Belaid

Keywords: Feedback, Gamification, Physical Activities, Step Count

Download PDF

Paper 37: Cyberspace Challenges and Law Limitations

Abstract: Privacy and Data security are heating topic in the modern technologically advanced economy. Technological Innovations have created new forms of electronic data which are more vulnerable to theft or loss when compared to tradi-tional data storage. Moreover, the recent advances in internet technologies have exacerbated the risk of security threats. The Internet brings a whole new set of challenges in terms of data protection. Considering the complexities of modern technological advancements and its impact on data security, this study examines the Irish laws and EU directives for privacy and data security, its effectiveness in managing large scale data breaches and limitations. This paper also simulates attack scenarios that can be done by anonymous users in a complex cyberspace environment and explains how a digital evidence related to the attack scenario can be tracked down.

Author 1: Aadil Al-Mahrouqi
Author 2: Cormac O Cianain
Author 3: Tahar Kechadi

Keywords: Internet anonymous; pseudonymous internet users, electronic discovery; large-scale data breaches

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org