The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 8 Issue 2

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Visualising Arabic Sentiments and Association Rules in Financial Text

Abstract: Text mining methods involve various techniques, such as text categorization, summarisation, information retrieval, document clustering, topic detection, and concept extraction. In addition, because of the difficulties involved in text mining, visualisation techniques can play a paramount role in the analysis and pre-processing of textual data. This paper will present two novel frameworks for the classification and extraction of the association rules and the visualisation of financial Arabic text in order to realize both the general structure and the sentiment within an accumulated corpus. However, mining unstructured data with natural language processing (NLP) and machine learning techniques can be arduous, especially where the Arabic language is concerned, because of limited research in this area. The results show that our frameworks can readily classify Arabic tweets. Furthermore, they can handle many antecedent text association rules for the positive class and the negative class.

Author 1: Hamed AL-Rubaiee
Author 2: Renxi Qiu
Author 3: Dayou Li

Keywords: Opinion mining; Stock market; Twitter; Saudi Arabia; Association text rules; Data mining, Text Visualization

Download PDF

Paper 2: Agent-based Managing for Grid Cloud System — Design and Prototypal Implementation

Abstract: Here, we present the design and architecture of an Agent-based Manager for Grid Cloud Systems (AMGCS) using software agents to ensure independency and scalability when the number of resources and jobs increase. AMGCS handles IaaS resources (Infrastructure-as-a-Service — compute, storage and physical resources), and schedules compute-intensive jobs for execution over available resources based on QoS criteria, with optimized task-execution and high resource-utilization, through the capabilities of grid clouds. This prototypal design and implementation has been tested and shown a proven ability to increase the reliability and performance of cloud application by distributing its tasks to more than one cloud system, hence increase the reliability of user jobs and complex tasks submitted from regular machines.

Author 1: Osama H. Younis
Author 2: Fathy E. Eassa
Author 3: Fadi F. Fouz
Author 4: Amin Y. Noaman
Author 5: Ayman I. Madbouly
Author 6: Leon J. Osterweil

Keywords: Cloud Computing; Grid; Management; Distributed Systems; Architecture

Download PDF

Paper 3: An Investigation on Information Communication Technology Awareness and Use in Improving Livestock Farming in Southern District, Botswana

Abstract: This paper investigated the extent of Information Communication Technology (ICT) usage by livestock keepers and limitations encountered. The study was conducted with the objective of coming up with findings that will contribute towards strengthening ICT usage for the development of livestock keeping. In order to meet this objective the researcher used a mixed method approach where by qualitative and quantitative methods were both used. The results of this study, showed mobile phone technology as the most popular ICT used by 89% of the respondents. Also 73 % of the respondents indicated that they have access to the local radio channel, television accounted for 59%. Other types of ICTs that were pointed out by few respondents are Facebook, Email, the Internet and YouTube. Livestock keepers have identified a number of limitations in using ICTs that need to be addressed that include high cost of communication, poor mobile communication signal, unawareness of television and radio program schedule, and lack of electricity in rural areas. In conclusion, this study has identified ICTs such as radio, mobile phones, and television as types of ICT that are used most frequently by livestock keepers, though they are not used at satisfactory level for livestock production. Therefore, the researcher proposed that information systems aimed at delivering information to livestock keepers should be more mobile driven than being computer based. A major approach that could be adopted to address the challenges of radio and television usage is to come up with livestock programs that combine mobile technology with radio and television programs. Participants and listeners to radio or television programs could use mobile technologies to send in their questions either by calls or short messages.

Author 1: Clifford Matsoga Lekopanye
Author 2: Meenakshi Sundaram K

Keywords: ICT; Livestock production; ICT utilization; information access; developing countries; ICT awareness

Download PDF

Paper 4: Tutoring Functions in a Blended Learning System: Case of Specialized French Teaching

Abstract: There is an emergence of blended learning today which combines diversified teaching methods, alternating distance learning and classroom learning. As a matter of fact, most Moroccan universities are presently aware of the importance of this approach, which appears to be most suited for Moroccan university context. This article is meant to identify the different roles of the tutor within the blended learning system. This is more precisely to present an experience of implementing a hybrid learning system by using the "FOUL" platform. The introduction of this platform is accompanied by a need for developing new skills, be it for a teacher or a student. This experience is motivated, on the one hand, by the supply of additional online resources as a complement to a face-to-face classroom method , on the other hand by the personalization of learning and riding out classroom-based learning constraints (e.g. in terms of time, place, staff ...) as it is the case in universities. This article intends to address the above problems by analyzing student responses to questionnaires and processing the content of synchronous communication between learners/learners and learners/online tutors in order to identify and analyze tutoring functions. It can be concluded that the success of a hybrid learning system is conditioned by the presence of some basic functions such as: pedagogical, organizational and socio-motivational functions. These functions remain dominant in a hybrid learning system.

Author 1: Nadia Chafiq
Author 2: Mohammed Talbi

Keywords: Learning scenario; Tutoring functions; platform; linguistic proficiency; Interaction

Download PDF

Paper 5: A Graph Theoretic Approach for Minimizing Storage Space using Bin Packing Heuristics

Abstract: In the age of Big Data the problem of storing huge volume of data in a minimum storage space by utilizing available resources properly is an open problem and an important research aspect in recent days. This problem has a close relationship with the famous classical NP-Hard combinatorial optimization problem namely the “Bin Packing Problem” where bins represent available storage space and the problem is to store the items or data in minimum number of bins. This research work mainly focuses on to find a near optimal solution of the offline one dimensional Bin Packing Problem based on two heuristics by taking the advantages of graph. Additionally, extreme computational results on some benchmark instances are reported and compared with the best known solution and solution produced by the four other well-known bin oriented heuristics. Also some future directions of the proposed work have been depicted.

Author 1: Debajit Sensarma
Author 2: Samar Sen Sarma

Keywords: Bin Packing; Combinatorial Optimization; Graph Theory; Heuristics; Operational Research

Download PDF

Paper 6: An Approach of nMPRA Architecture using Hardware Implemented Support for Event Prioritization and Treating

Abstract: One of the fundamental requirements of real time operating systems is the determinism of executing critical tasks and treating multiple periodic or aperiodic events. The present paper presents the hardware support of the nMPRA processor (Multi Pipeline Register Architecture) dedicated to treating time events, interrupt events and events associated with synchronization and inter-task communication mechanisms. Because in real time systems the treatment of events is a very important aspect, this paper describes both the mechanism implemented in hardware for prioritizing and treating multiple events, and the experimental results obtained using Virtex-7 FPGA circuit. The article's element of originality is the very short response time required in treating and prioritizing events.

Author 1: Ionel ZAGAN
Author 2: Nicoleta Cristina GAITAN
Author 3: Vasile Gheorghita GAITAN

Keywords: nMPRA; event treating; mutex; inter-task communication; hardware scheduler

Download PDF

Paper 7: Concepts and Tools for Protecting Sensitive Data in the IT Industry: A Review of Trends, Challenges and Mechanisms for Data-Protection

Abstract: Advancements in storage, dissemination and access of multimedia data content on the Internet continues to grow at exponential rates, while individuals, organizations and governments spend huge efforts to exert their fingerprint in this information age through the use of online multimedia resources to propagate thoughts, services, policies, ecommerce and other types of information. Furthermore, information at different levels may be classified into confidential, sensitive and critical data types. Such data has been subject to numerous tools and techniques for providing automated information processing, information management and storage mechanisms. Consequently, numerous security tools and techniques have also emerged for the protection of data at the various organizational levels and according to different requirements. This paper discusses three important types of information security aspects that includes; data-storage, in-transit data and data access-prevention for unauthorized users. In particular, the paper reviews and presents the latest trends and most common challenges in information security with regards to data-breaches and vulnerabilities found in industry today using simple brief summaries for the benefit of IT practitioners and academics. Thereafter, state-of-the-art techniques used to secure information content commonly required in applications-software, in-house operations software or websites are given. Mechanisms for enhancing data-protection under the given set of challenges and vulnerabilities are also discussed. Finally, the importance of using information security policies and standards for protecting organizational data content is discussed along with foreseeable open issues for future work.

Author 1: Omar Tayan

Keywords: sensitive-data; data-breaches; data-protection; trend analysis; classification

Download PDF

Paper 8: Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm

Abstract: The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere and anytime. Security threat in the paradigm of BYOD creates a great opportunity for hackers or attackers to find new attacks or vulnerabilities that could possibly exploit the students’ mobile devices and gains valuable data from them. A survey was conducted in learning the current awareness of security and privacy importance in BYOD for higher education in Malaysia. Based on the analysis of this survey, it demonstrates that the trend of BYOD in Malaysia has begun. Thoroughly, the survey results have been proven that the current basic fundamental security and privacy awareness and knowledge on mobile devices or applications is important in order to protect their mobile devices or data.

Author 1: Manmeet Mahinderjit Singh
Author 2: Chen Wai Chan
Author 3: Zakiah Zulkefli

Keywords: Mobile Computing; BYOD Higher Education; Security; Privacy; Malicious Software; Risk

Download PDF

Paper 9: Improved Mechanism to Prevent Denial of Service Attack in IPv6 Duplicate Address Detection Process

Abstract: From the days of ARPANET, with slightly over two hundred connected hosts involving five organizations to a massive global, always-on network connecting hosts in the billions, the Internet has become as important as the need for electricity and water. Internet Protocol version 4 (IPv4) could not sustain the growth of the Internet. In ensuring the growth is not stunted, a new protocol, i.e. Internet Protocol version 6 (IPv6) was introduced that resolves the addressing issue IPv4 had. In addition, IPv6 was also laden with new features and capabilities. One of them being address auto-configuration. This feature allows hosts to self-configure without the need for additional services. Nevertheless, the design of IPv6 has led to several security shortcomings. Duplicate Address Detection (DAD) process required for auto-configuration is prone to Denial of Service (DoS) attack in which hosts are unable to configure themselves to join the network. Various mechanisms, SeND, SSAS, and the most recent being Trust-ND, have been introduced to address this issue. Although these mechanisms were able to circumvent DoS attack on DAD process, they have introduced various side effects, i.e. complexities and degradation of performance. This paper reviews the shortcomings of these mechanism and proposes a new mechanism, Secure-DAD, that addresses them. The performance comparison between Trust-ND and Secure-ND also showed that Secure-DAD is more promising with improvement in terms of processing time reduction of 45.1% compared to Trust-ND while preventing DoS attack in IPv6 DAD process.

Author 1: Shafiq Ul Rehman
Author 2: Selvakumar Manickam

Keywords: Secure-DAD; Duplicate Address Detection; Denial of Service Attack; IPv6 Security; Address auto-configuration

Download PDF

Paper 10: Web Server Performance Evaluation in a Virtualisation Environment

Abstract: Operational and investment costs are reduced by resource sharing in virtual machine (VM) environments, which also results in an overhead for hosted services. VM machine performance is important because of resource contention. If an application takes a long time to execute because of its CPU or network, it is considered to be a failure because if many VMs are running over a single hardware platform, there will be competition for shared resources, e.g., the CPU, network bandwidth, and memory. Therefore, this study focuses on measuring the performance of a web server under a virtual environment and comparing those results with that from a dedicated machine. We found that the difference between the two sets of results is largely negligible. However, in some areas, one approach performed better than the other.

Author 1: Manjur Kolhar

Keywords: Cloud computing; virtual machine; resource sharing; latency sensitive; web server; multi-tier application

Download PDF

Paper 11: A Multi-Threaded Symmetric Block Encryption Scheme Implementing PRNG for DES and AES Systems

Abstract: Due to the ever-increasing efficiency of computer systems, symmetric cryptosystem are becoming more vulnerable to linear cryptanalysis brute force attacks. For example, DES with its short key (56 bits) is becoming easier to break, while AES has a much longer key size (up to 256 bits), which makes it very difficult to crack using even the most advanced dedicated cryptanalysis computers. However, more complex algorithms, which exhibit better confusion and diffusion characteristics, are always required. Such algorithms must have stronger resistance against differential and linear cryptanalysis attacks. This paper describes the development of an algorithm that implements a pseudo random number generator (PRNG) in order to increase the key generation complexity. Experimental results on both DES and AES cryptosystems complemented with the PRNG have shown an average improvement of up to 36.3% in the avalanche error computation over the original standard systems, which is a considerable improvement in the time complexity of both systems.

Author 1: Adi A. Maaita
Author 2: Hamza A. Alsewadi

Keywords: Computer Security; Symmetric cryptography; DES; AES; pseudo random number generators

Download PDF

Paper 12: Review of Image Compression and Encryption Techniques

Abstract: In line with a growing need for data and information transmission in a safe and quick manner, researches on image protection and security through a combination of cryptographic and compression techniques begin to take form. The combination of these two methods may include into three categories based on their process sequences. The first category, i.e. cryptographic technique followed by compression method, focuses more on image security than the reduction of a size of data. The second combination, compression technique followed by the cryptographic method, has an advantage where the compression technique can be lossy, lossless, or combination of both. The third category, i.e. compression and cryptographic technologies in a single process either partially or in the form of compressive sensing(CS) provides a good data safety assurance with such a low computational complexity that it is eligible for enhancing the efficiency and security of data/information transmission.

Author 1: Emy Setyaningsih
Author 2: Retantyo Wardoyo

Keywords: cryptography; compression; lossless; lossy; compressive sensing

Download PDF

Paper 13: Model-based Pedestrian Trajectory Prediction using Environmental Sensor for Mobile Robots Navigation

Abstract: Safety is the most important to the mobile robots that coexist with human. There are many studies that investigate obstacle detection and collision avoidance by predicting obstacles’ trajectories several seconds into the future using mounted sensors such as cameras and laser range finder (LRF) for the safe behavior control of robots. In environments such as crossing roads where blind areas occur because of visual barriers like walls, obstacle detection might be delayed and collisions might be difficult to avoid. Using environmental sensors to detect obstacles is effective in such environments. When crossing roads, there are several passages pedestrian might move and it is difficult to depict going each passage in the same movement model. Therefore, we hypothesize that a more effective way to predict pedestrian movement is by predicting passages pedestrian might move and estimating the trajectories to the passages. We acquire pedestrian trajectory data using an environmental LRF with an extended Kalman filter (EKF) and construct pedestrian movement models using vector auto regressive (VAR) models, which pedestrian state is consisting of the position, speed and direction. Then, we test the validity of the constructed pedestrian movement models using experimental data. We narrow down the selection of a pedestrian movement model by comparing the prediction error for each path between the estimated pedestrian state using an EKF, and the predicted state using each movement model. We predict the trajectory using the selected movement model. Finally, we confirm that an appropriate path model that a pedestrian can actually move through is selected before the crossing area and that only the appropriate model is selected near the crossing area.

Author 1: Haruka Tonoki
Author 2: Ayanori Yorozu
Author 3: Masaki Takahashi

Keywords: Prediction of Human Movement; Service Robots; Vector Auto Regressive Models; Kalman Filter; Collision Avoidance

Download PDF

Paper 14: Efficient Model for Distributed Computing based on Smart Embedded Agent

Abstract: Technological advances of embedded computing exposed humans to an increasing intrusion of computing in their day-to-day life (e.g. smart devices). Cooperation, autonomy, and mobility made the agent a promising mechanism for embedded devices. The work aims to present a new model of an embedded agent designed to be implemented in smart devices in order to achieve parallel tasks in a distribute environment. To validate the proposed model, a case study was developed for medical image segmentation using Cardiac Magnetic Resonance Image (MRI). In the first part of this paper, we focus on implementing the parallel algorithm of classification using C-means method in embedded systems. We propose then a new concept of distributed classification using multi-agent systems based on JADE and Raspberry PI 2 devices.

Author 1: Hassna Bensag
Author 2: Mohamed Youssfi
Author 3: Omar Bouattane

Keywords: Distributed computing; parallel computing; Multi Agent System; Embedded computing; Raspberry PI 2

Download PDF

Paper 15: Decision Framework for Mobile Development Methods

Abstract: Recently, the mobile applications have emerged with the uprising smartphone trend. Now-a-days, a huge number of mobile operating systems require more developments, in order to achieve that, Open source cross-platform mobile frameworks came up, in order to allow importing the same code on various operating systems. In this paper, the focus is made on commonly used mobile development methods, and a process that selects the most suitable solution for a particular need is proposed. Eventually, a new framework that helps to choose the appropriate approach and tool respectively is suggested, according to a convenient survey based on binary questions, in addition to certain criteria.

Author 1: LACHGAR Mohamed
Author 2: ABDALI Abdelmounaïm

Keywords: Mobile development approaches; Mobile development tools; Cross-platform mobile; Mobile OS

Download PDF

Paper 16: Prolonging the Network Lifetime of WSN by using the Consumed Power Fairly Protocol

Abstract: In wireless sensor networks (WSN), energy saving is always a key concern. Since nodes have limited power, some of them may use specific routes, thus leading to exhaustion of intermediate nodes. These nodes die, which results in routing holes in the network. Consequently, the overall throughput of the network may get reduced. Therefore, in this study, the mathematical proposed model is leaded to optimal route by depending on equal power consumption from whole nodes in the network. Moreover, a new routing protocol model was designed. The protocol is termed as Consumed Power Fairly (CPF). This protocol could achieve high power efficiency by distributing power consumption equally to all nodes in the network. Our proposed model works on finding the route to destination with high power availability after summation of the total power for all nodes from the source to the destination node, thus subtracting the power consumption for particular data required to send. In short, the proposal CPF protocol reduces the number of dead nodes and keeps the connectivity high, which increases prolonging the network lifetime.

Author 1: Ahmed Jamal Ahmed
Author 2: Jiwa Abdullah

Keywords: WSN; network topology; energy consumption; graph theory; Consumed Power Fairly

Download PDF

Paper 17: Unsupervised Commercials Identification in Videos

Abstract: Commercials (ads) identification and measure their statistics from a video stream is an essential requirement. The duration of a commercial and the timing on which the commercial runs on TV cost differently to the ads owner. Automatic systems that measure these statistics will facilitate the ad owner. This research presents a system that segment semantic videos and identify commercials automatically from broadcast TV transmission. The proposed technique uses color histogram and SURF features resulting in identify individual ads from TV transmission video stream. Experimental results on unseen videos demonstrate better results for ads identification. The target for the proposed approach is television transmission that do not use blank frame between the ads and a non-ad part of the transmission like in Pakistan, different from European countries TV transmission. The proposed segmentation approach is unsupervised.

Author 1: Najeed Ahmed Khan
Author 2: Umair Amin
Author 3: Waseemullah
Author 4: Muhammad Umer

Keywords: TV commercial; semantic analysis; segmentation; video classification; commercial detection; commercial classification

Download PDF

Paper 18: Computational Model for the Generalised Dispersion of Synovial Fluid

Abstract: The metabolic function of synovial fluid is important to understand normal and abnormal synovial joint motion, especially if one seeks some leading causes of the degenerative joint disease. The concentration of hyaluronic acid molecules and other high molecular weight substances in the synovial fluid may be responsible to disperse the nutrients into the cartilage. The theoretical study of the convective diffusion mechanism occurring in the knee joint is presented. A flow model has been analyzed for better understanding of the convective diffusion of the viscous flow in between the articular surfaces. The governing system of partial differential equations has been solved for the Newtonian fluid with suitable matching and conditions. The analytical solution for the unsteady dispersion problem has been obtained for the better understand the phenomena of nutritional transport to synovial joint. The contributions of (convection + diffusion) on the dispersion of nutrients are investigated in detail. The dispersion coefficient has been computed for different values of the viscosity parameter. The results show that the average concentration has a negative correlation with the axial distance and the time.

Author 1: M. Alshehri
Author 2: S. K. Sharma

Keywords: Synovial Fluid; Articular Cartilage; Unsteady diffusion coefficient; Computational model

Download PDF

Paper 19: Multi Objective Optimization of Cloud Computing Services for Consumers

Abstract: This paper presents a novel multi objective model for optimizing the purchase decision of a cloud computing services customer. The providers are typically offering consumers cloud computing varying information systems services. The cloud services consist of different functionalities at varying costs, and varying reliability. So the customer’s main objectives (based on the literature) are to maximize their utility, and minimize their costs and risks. Since utility cost and risks are different dimensions, the problem is essentially a multi-objective optimization problem. So far, previous research does not address the multi objective nature of the problem. This article deals with optimizing consumers’ decision, but at the same time maintaining each of their objectives’ considerations. An optimization model presented and illustrated. The article also demonstrates the advantages gained by the optimization model when implemented using the dynamic cloud architecture over the traditional cloud architecture.

Author 1: Eli WEINTRAUB
Author 2: Yuval COHEN

Keywords: Cloud Computing; Security Risk; Software as a service; Platform as a service; Infrastructure as a service; Optimization; Cost; Utility

Download PDF

Paper 20: Ant Colony Optimization (ACO) based Routing Protocols for Wireless Sensor Networks (WSN): A Survey

Abstract: Wireless Sensor Networks have several issues and challenges with regard to Energy Efficiency, Limited Computational capability, Routing Overhead, Packet Delivery and many more. Designing Energy Efficient Routing Protocol has always been a limiting factor cum issue for Wireless Sensor Networks. Varied routing protocols being proposed till date for overcoming these issues based on Swarm Intelligence. Swarm Intelligence is concerned with study of combined behavior of systems designed by varied components for coordinating among themselves via decentralized controls and self-organization. Algorithms based on Swarm Intelligence, nature based intelligence are highly robust, adaptive and scalable. This paper presents comprehensive survey of Ant Colony Optimization based routing protocols for Wireless Sensor Networks to give better platform for researchers to work on various shortcomings of protocols developed till date to develop efficient routing protocol for WSN in near future.

Author 1: Anand Nayyar
Author 2: Rajeshwar Singh

Keywords: Wireless Sensor Networks; Routing; Routing Protocols; Swarm Intelligence (SI); Ant Based Routing; Ant Colony Optimization

Download PDF

Paper 21: An Investigation of Analytic Decision During Driving Test

Abstract: To examine the long-term causality between Cardiorespiratory Electromyography Galvanic signals for 17 drivers taken from Stress Recognition in Automobile Drivers database. Methods: Two statistical methods, co-integration to reveal an eventual existence of a long-term relationship between ECG (Electrocardiograph), EMG (electromyography), GSR (galvanic skin resistance), heart rate (HR) and respiration, well as the Application of the model of Granger causality. Results: ECG shows certain dependence to EMG, GSR, heart rate and respiration. The results for ECG dependent suggest that an increase of 1% in EMG, FOOTGSR, HAND GSR, HR and RESPIRATION implies a variation of ECG which take a value respectively of 0.016248%, 0.007241%, 0.028366%, 0.000511% and 0.000110% in the within dimension based on the FMOLS (Fully Modified Ordinary Least Squares). With same way, the result for ECG suggest that an increase of 1% in EMG, FOOT GSR, HAND GSR, HR and RESPIRATION implies a variation of ECG which take a value respectively, of 0.065684%, 0.014534%, 0.032800%, 0.000304%, 0.005986% in the between dimension based on the same method. The results of panel Granger causality show a bi-directional relationship between ECG and FOOT GSR, HAND GSR and respiration signals, it must be noted as a unidirectional causality from EMG to ECG. Conclusion: This study shows the long-term interaction between the bio signals, and reveal how the understanding of these interactions can help the doctors to understand the risks that may exist between these interactions. The main advantage of a multidimensional and multivariate model is to solve a multitude of problems that prevent doctors to treat the patients better and is not the case for studies in two dimensions.

Author 1: Samir Ghouali
Author 2: Yassine Zakarya Ghouali
Author 3: Mohammed Feham

Keywords: Panel Co-integration; Panel Granger Causality; FMOLS and DOLS Estimators; Cardiorespiratory electromyography galvanic signals

Download PDF

Paper 22: Internet of Things (IoT) : Charity Automation

Abstract: People are living in cities and villages based on their profession and their earnings. Those who have better earnings can live their live nicely. However, those who do not have good earnings are facing difficulties to survive their lives even for their basic necessities such as food and clothes. Government and limited charity organizations are trying to help them. In the Kingdom of Saudi Arabia few charity organizations placed few donation boxes around the city to collect donations on donor’s ease, but it has become hard for them to monitor them regularly, which affect the donation condition. Involving the Internet of Technology (IoT) will give the donors' comfort and fast way to communicate with the charity, which will make the donation process efficient, easier and in well-organized as well. This paper presents a smart solution which is based on advanced technologies namely; Smart Charity (SC) that will help charity organizations, donators and needy people by involving IoT. SC working mechanism based on two folds, 1)Web-Based Application and 2)Android-based smart Application that will enable donors to donate through their mobiles anywhere and anytime, as well they can suggest the best time for them so the charity organization’s representative can visit and collect the desired donations. SC will enable the charity organization to know the location of donors and needy people through GPS as well. In addition, SC introduces Smart Donation Box (SDB) concept by involving IoT, which will have the capability to communicate with charity organizations about its current status such as quarterly, half or fully filled.

Author 1: Maher Omar Alshammari
Author 2: Abdulmohsen A. Almulhem
Author 3: Noor Zaman

Keywords: Smart city; Smart Charity; Internet of Things (IoT)

Download PDF

Paper 23: Virtual Observation System for Earth System Model: An Application to ACME Land Model Simulations

Abstract: Investigating and evaluating physical-chemical-biological processes within an Earth system model (EMS) can be very challenging due to the complexity of both model design and software implementation. A virtual observation system (VOS) is presented to enable interactive observation of these processes during system simulation. Based on advance computing technologies, such as compiler-based software analysis, automatic code instrumentation, and high-performance data transport, the VOS provides run-time observation capability, in-situ data analytics for Earth system model simulation, model behavior adjustment opportunities through simulation steering. A VOS for a terrestrial land model simulation within the Accelerated Climate Modeling for Energy model is also presented to demonstrate the implementation details and system innovations.

Author 1: Dali Wang
Author 2: Fengming Yuan
Author 3: Benjamin Hernandez
Author 4: Yu Pei
Author 5: Cindy Yao
Author 6: Chad Steed

Keywords: Earth System Modeling; Accelerated Climate Modeling for Energy; In-Situ Data Analytics; Virtual Observation System; Functional Unit Testing

Download PDF

Paper 24: RTS/CTS Framework Paradigm and WLAN Qos Provisioning Methods

Abstract: Wireless local area network (WLAN) communications performance design and management have evolved a lot to be where they are today. They went through some technology’s amendments and innovations. But, some performance tools remained almost unchanged and play a fundamental role in contemporary networking solutions despite the latest innovations higher influence on their indisputable and important function. That is the case with Request to send (RTS) and consent to receive (CTS) protocols. They are among the former technologies, which helped for transmission control with better performance in WLAN environment. They are so important, particularly since the advent of sensitive data networking (e.g. internet telephony, audio and video materials distribution) over the internet protocol (IP). Up to recent years following today’s multimedia WLAN based networks deployment trends, RTS/CTS) contributed to provide networks with some expected good performance levels prior to the discovery of more sophisticated methods for this purpose (i.e. performance enhancements). And yet, one may question whether the new technologies have rendered RTS/CTS frameworks obsolete; or are they now used only for some specific network applications traffic management? This articles review attempts to comprehensibly study some of the research works, which have had interest in RTS/CTS mechanism as tools for WLAN applications performance support. Various researches have studied these tools from their early innovation as network node’s built-in component, through different frameworks associated with WLAN legacy (IEEE 802.11) MAC protocols. This paper analyzed RTS/CTS initial implementation as mere network performance solution from packets’ collision avoidance perspective; and then for transmission delay due to hidden nodes and their false deployment. The article closes up on a critical analysis on the possible long time contribution of these protocols into integrated schemes based WLAN QoS performance design.

Author 1: Mohamed Nj.
Author 2: S. Sahib
Author 3: N. Suryana
Author 4: B. Hussin

Keywords: RTS/CTS; MAC; Internet; Telephony; video; real-time; loss; multimedia; WLAN; mechanism; performance; protocols, collision; framework; transmission; reception; flow control; handshake; MANET; BSS; IBSS; QoS

Download PDF

Paper 25: Finite Element Method Combined with Neural Networks for Power System Grounding Investigation

Abstract: Even in homogenous soil and for simple geometrical structure the analytical design of a grounding system is a complex and not very accurate procedure. Using Finite Element Analysis (FEA) it can perform a precise design for complex grounding systems but with important hardware resources and time consumption. This paper proposes a methodology for power system grounding design, directed to ensure the advantages of the FEA but without its disadvantages. This is realized by adding the function emulation using neural networks. The vertical rod, buried in inhomogeneous soil is the subject of this presentation. Consequently, the first step was to perform FEA for a large number of configurations: different types of vertical rods connected to the surface, buried at various depths in different double-layer soil structures. Then, the results have been interpreted through a multi-layer perceptron (MLP) with one hidden layer. A compromise between the number of inputs and precision have been tested, in order to define a minimum number of FEA required to obtain an acceptable grounding system design, i.e. a desired grounding resistance, for any combinations of the geometrical and material parameters. The validation of the methodology was done based on data reported in various research works.

Author 1: Liviu Neamt
Author 2: Oliviu Matei
Author 3: Olivian Chiver

Keywords: neural network; finite element analysis; power systems; grounding

Download PDF

Paper 26: A Framework for an Effective Information Security Awareness Program in Healthcare

Abstract: Electronic Health Record (EHR) is a valuable asset of every healthcare and it needs to be protected. Human errors are recognized as the major information security threats to EHR systems. Employees who interact with EHR systems should be trained about the risks and hazards related to information security. However, there are limited studies regarding the effectiveness of training programs. The aim of this paper is to propose a framework that provides guidelines for healthcare organizations to select an effective information security training delivery method. In addition, this paper proposes a guideline to develop information security content for awareness training programs. Lastly, this study attempts to implement the proposed framework in a selected healthcare for evaluation. Hence, a serious game is developed as a training method to deliver information security content for the selected healthcare. An effective training program raises employees’ awareness toward information security with a long-term impact. It helps to gradually change employees’ behavior over time by reducing their negligence towards secure utilization of healthcare EHR systems.

Author 1: Arash Ghazvini
Author 2: Zarina Shukur

Keywords: awareness Training Program; Information Security; Content Development; Electronic Health Record; Human Error; Serious Game

Download PDF

Paper 27: GSM based Android Application: Appliances Automation and Security Control System using Arduino

Abstract: Now-a-days, automation is playing significant role using android phone in human life, particularly, handicapped and senior citizens. Appliances automation allows users to control different appliances such as light, fan, fridge and AC. It also provides security system like door controlling, temperature & fire detection and water shower. Furthermore, security cameras are used to control and monitored by the users to observe activity around a house. It has been observed that the internet services in interior Sindh are not as much better as required. Hence, GSM SIM900A based android application is developed named Appliances Automation & Security Control System using Arduino. The developed system is decomposed into two separate entities: (1) hardware is designed and developed using Arduino (MEGA 2560) with other required electronics components which is programmed using embedded C language, (2) an Android app which provides freedom to user to control and access the electronic appliances and the security system without internet. The developed application is tested in Karachi, Sukkur and Khairpur with ZONG, Moblink, Telenor and Ufone. The acceptable results are achieved at Karachi and Sukkur but suitable results are not calculated at Khairpur in terms of delay due to the frequency of selected GSM Module.

Author 1: Kainat Fareed Memon
Author 2: Javed Ahmed Mahar
Author 3: Hidayatullah Shaikh
Author 4: Hafiz Ahmed Ali
Author 5: Farhan Ali Surahio

Keywords: android application; gsm module; security system; Arduino

Download PDF

Paper 28: ROI-based Compression on Radiological Image by Urdhva-Tiryagbhyam and DWT Over FPGA

Abstract: The area of radiological image compression has not yet met its potential solution. After reviewing the existing mechanism of compression, it was found that majority of the existing techniques suffers from significant pitfalls e.g. more usage of transformation schemes, more resource utilization, delay, less focus on FPGA performance enhancement, extremely less emphasis on Vedic-multipliers. Hence, this paper presents an analytical modelling of ROI (Region of Interest)-based radiological image compression that applies Vedic Multiplier Urdhva-Tiryagbhyam to enhance the performance of coding using Discrete Wavelet Transform (DWT). The study outcome was implemented in Matlab and multiple test bed of FPGA devices (Virtex 4 FX100 -12 FF1152 and Spartan 3 XC400-5TQ144) and assessed using both visual and numerical outcomes to find that proposed system excel better performance in comparison to recently existing techniques.

Author 1: Suma
Author 2: V. Sridhar

Keywords: Radiological Image Compression; Discrete Wavelet Transform; FPGA; Lifting Scheme

Download PDF

Paper 29: Proposal of the Support Tool for After-Class Work based on the Online Threaded Bulletin Board

Abstract: In this paper, based on the assumption that after-class work in an exercise-based course accompanied by group work is done on an online threaded bulletin board system, the authors propose a support tool for the instructors. Specifically, while focusing on the factors that compose a discussion on the online bulletin board, the users who comment, the topics, and the items (keywords) to be discussed, the authors try to visualize the relationships among these factors as network diagrams. The authors also propose indexes, the comment degree and the activation degree, to evaluate communities formed there. Our experiments in which group work was actually implemented with the application of the proposed tool demonstrated that use of the network diagrams and the evaluation indexes served to distinguish the differences between those groups with properly-proceeding discussions and those without such discussions. The authors confirmed that this can enable the instructors to easily discover those students who do not participate in the discussion and groups with sluggish discussions.

Author 1: Kohei Otake
Author 2: Yoshihisa Shinozawa
Author 3: Tomofumi Uetake

Keywords: Learning Support Tool; Online Threaded Bulletin Board; Network Analysis

Download PDF

Paper 30: Impact Propagation of Human Errors on Software Requirements Volatility

Abstract: Requirements volatility (RV) is one of the key risk sources in software development and maintenance projects because of the frequent changes made to the software. Human faults and errors are major factors contributing to requirement change in software development projects. As such, predicting requirements volatility is a challenge to risk management in the software area. Previous studies only focused on certain aspects of the human error in this area. This study specifically identifies and analyses the impact of human errors on requirements gathering and requirements volatility. It proposes a model based on responses to a survey questionnaire administered to 215 participants who have experience in software requirement gathering. Exploratory factor analysis (EFA) and structural equation modelling (SEM) were used to analyse the correlation of human errors and requirement volatility. The results of the analysis confirm the correlation between human errors and RV. The results show that human actions have a higher impact on RV compared to human perception. The study provides insights into software management to understand socio-technical aspects of requirements volatility in order to control risk management. Human actions and perceptions respectively are a root cause contributing to human errors that lead to RV.

Author 1: Zahra Askarinejadamiri
Author 2: Abdul Azim Abd Ghani
Author 3: Hazura Zulzallil
Author 4: Koh Tieng Wei

Keywords: Human factor; human errors; requirements volatility

Download PDF

Paper 31: Helpful Statistics in Recognizing Basic Arabic Phonemes

Abstract: The recognition of continuous speech is one of the main challenges in the building of automatic speech recognition (ASR) systems, especially when it comes to phonetically complex languages such as Arabic. An ASR system seems to be actually in a blocked alley. Nearly all solutions follow the same general model. The previous research focused on enhancing its performance by incorporating supplementary features. This paper is part of ongoing research efforts aimed at developing a high-performance Arabic speech recognition system for learning and teaching purposes. It investigates a statistical analysis of certain distinctive features of the basic Arabic phonemes which seems helpful in enhancing the performance of a baseline HMM-based ASR system. The statistics are collected using a particular Arabic speech database, which involves ten different male speakers and more than eight hours of speech which covers all Arabic phonemes. In HMM modeling framework, the statistics provided are helpful in establishing the appropriate number of HMM states for each phoneme and they can also be utilized as an initial condition for the EM estimation procedure, which generally, accelerates the estimation process and, thus, improves the performance of the system. The obtained findings are presented and possible applications of automatic speech recognition and speaker identification systems are also suggested.

Author 1: Mohamed O.M. Khelifa
Author 2: Yousfi Abdellah
Author 3: Yahya O.M. ElHadj
Author 4: Mostafa Belkasmi

Keywords: automatic speech recognition (ASR); speech recognizer; phonemes recognition; speech database; hidden Markova models (HMMs)

Download PDF

Paper 32: Comparison of Discrete Cosine Transforms (DCT), Discrete Fourier Transforms (DFT), and Discrete Wavelet Transforms (DWT) in Digital Image Watermarking

Abstract: Digital Image Watermarking is used recently to secure the image by embedding another digital image. It is typically used to identify ownership of the copyright of the signal. Frequency domain transformation methods used widely in Digital Image Compression and Digital Image Watermarking. They reduce the weakness of classics digital image watermarking such as Least Significant Bit (LSB) methods which is more noise-tolerant. Popular transformation method used are Two Dimensional Discrete Cosine Transform (2D DCT), Two Dimensional Discrete Fourier Transforms (2D DFT), and Two Dimensional Discrete Wavelet Transform (2D DWT). This paper will show the comparison result of those three transformation method. The experiments are comparison analysis of image watermark quality using Peak Signal to Noise Ratio (PSNR), color converting, image resizing, image optical scanning and the noise-tolerant of the image watermarked by giving Gaussian noise.

Author 1: Rosa A Asmara
Author 2: Reza Agustina
Author 3: Hidayatulloh

Keywords: Digital Image Watermarking; 2D Discrete Cosine Transform (2D DCT); 2D Discrete Fourier Transform (2D DFT); 2D Discrete Wavelet Transform (2D DWT); Least Significant Bit method (LSB); Digital Signal Processing

Download PDF

Paper 33: Web Application Development by Applying the MVC and Table Data Gateway in the Annual Program Budget Management System

Abstract: This paper is the result of the development of the Web application to register the Annual Work Program, in which goals and actions are assigned the financial resources to manage the annual work program identified. In this paper, we have identified five types of users: the first is the Administrator, in charge of monitoring the goals programmed in the period, as well as the resource assigned to reach those goals; the second corresponds to the purchasing department who is in charge of contacting the supplier and at the same time inform financial and warehouse of the acquisition through the system; the third corresponds to a warehouse in charge of validating the material and generate entry / exit official vouchers and send the purchase order to financiers; the fourth user corresponds to financial, this will identify through the system that all the procedure is completed to make the payment; and finally, the fifth user make up the set of all remaining departments. Finally, the system presents flexibility in case it is necessary to go adding departments.

Author 1: A. Medina-Santiago
Author 2: A. Cisneros-Gómez
Author 3: E. M. Melgar-Paniagua
Author 4: G. B. Nango-Sólis
Author 5: E. A. Moreno-López
Author 6: M. E. Castellanos-Morales
Author 7: D. B. Cantoral-Díaz
Author 8: L. M. Blanco-Gonzalez

Keywords: WEB Applications; MVC; Data Gateway Table; Software engineering; incremental; iterative

Download PDF

Paper 34: Semantic Sentiment Analysis of Arabic Texts

Abstract: Twitter considered as a rich resource to collect people's opinions in different domains and attracted researchers to develop an automatic Sentiment Analysis (SA) model for tweets. In this work, a semantic Arabic Twitter Sentiment Analysis (ATSA) model is developed based on supervised machine learning (ML) approaches and semantic analysis. Most of the existing Arabic SA approaches represent tweets based on the bag-of-words (BoW) model. The main limitation of this model is that it is semantically weak; where words considered as independent features and ignore the semantic associations between them. As a result, synonymous words that appear in two tweets are represented as different independent features. To overcome this limitation, this work proposes enriching the tweets representation with concepts utilizing Arabic WordNet (AWN) as an external knowledge base. In addition, different concepts representation approaches are developed and evaluated with naïve Bayes (NB) and support vector machine (SVM) ML classifiers on an Arabic Twitter dataset. The experimental results indicate that using concepts features improves the performance of the ATSA model compared with the basic BoW representation. The improvement reached 4.48% with the SVM classifier and 5.78% with the NB classifier.

Author 1: Sana Alowaidi
Author 2: Mustafa Saleh
Author 3: Osama Abulnaja

Keywords: Arabic Sentiment Analysis; Twitter; Semantic Relations; Arabic WordNet; Machine Learning

Download PDF

Paper 35: Logarithmic Spiral-based Construction of RBF Classifiers

Abstract: Clustering process is defined as grouping similar objects together into homogeneous groups or clusters. Objects that belong to one cluster should be very similar to each other, but objects in different clusters will be dissimilar. It aims to simplify the representation of the initial data. The automatic classification recovers all the methods allowing the automatic construction of such groups. This paper describes the design of radial basis function (RBF) neural classifiers using a new algorithm for characterizing the hidden layer structure. This algorithm, called k-means Mahalanobis distance, groups the training data class by class in order to calculate the optimal number of clusters of the hidden layer, using two validity indexes. To initialize the initial clusters of k-means algorithm, the method of logarithmic spiral golden angle has been used. Two real data sets (Iris and Wine) are considered to improve the efficiency of the proposed approach and the obtained results are compared with basic literature classifier

Author 1: Mohamed Wajih Guerfala
Author 2: Amel Sifaoui
Author 3: Afef Abdelkrim

Keywords: Radial Basis Function neural network; classification; k -means; validity index of Davis Bouldin; Mean Squared Error; Mahalanobis distance; Logarithmic spiral; golden angle; golden ratio

Download PDF

Paper 36: Priority Task Scheduling Strategy for Heterogeneous Multi-Datacenters in Cloud Computing

Abstract: With the rapid development in science and technology, cloud computing has emerged to be widely adopted in several IT (Information Technology) areas. It allows for the companies as well as researchers to use the computing resources as a service over a network as internet without owning the infrastructure. However, Due to increasing demand of cloud computing, the growing number of tasks affects the system load and performance. Scheduling of multitasks with respect SLA (Service Level Agreement) can face serious challenges. In order to overcome this problem as well as provide better quality of service, the tasks have to be scheduled in optimal way. In this paper, we address the problem of the priority task scheduling through proposing a global strategy over distributed data-center in cloud computing basing on three parameters: tasks deadline, task age and the task length.

Author 1: Naoufal Er-raji
Author 2: Faouzia Benabbou

Keywords: age; cloud computing; cluster; data-center; deadline; length; node; SLA; priority task scheduling

Download PDF

Paper 37: Sentiment Analysis Challenges of Informal Arabic Language

Abstract: Recently, there are wide numbers of users that use the social network like Twitter, Facebook, MySpace to share various kinds of resources, express their opinions, thoughts, messages in real time. Thus, increase the amount of electronic content that generated by users. Sentiment analysis becomes a very interesting topic in research community. Thereby, we need to give more attention to Arabic sentiment analysis. This paper discusses the challenges and obstacles when analyze the sentiment analysis of informal Arabic, the social media. The most of recent research sentiment analysis conduct for English text. Also, when the research works in Arabic sentiment analysis, they focus in formal Arabic. However, most of social media network use the informal Arabic (colloquial) such as Twitter and YouTube website. This paper investigates the problems and the challenges to identify sentiment in informal Arabic language which is mostly used when users express their opinions and feelings in context of twitter and YouTube Arabic content.

Author 1: Salihah AlOtaibi
Author 2: Muhammad Badruddin Khan

Keywords: Informal Arabic; Sentiment analysis; Opinion Mining (OM) ; Twitter; YouTube

Download PDF

Paper 38: Need and Role of Scala Implementations in Bioinformatics

Abstract: Next Generation Sequencing has resulted in the generation of large number of omics data at a faster speed that was not possible before. This data is only useful if it can be stored and analyzed at the same speed. Big Data platforms and tools like Apache Hadoop and Spark has solved this problem. However, most of the algorithms used in bioinformatics for Pairwise alignment, Multiple Alignment and Motif finding are not implemented for Hadoop or Spark. Scala is a powerful language supported by Spark. It provides, constructs like traits, closures, functions, pattern matching and extractors that make it suitable for Bioinformatics applications. This article explores the Bioinformatics areas where Scala can be used efficiently for data analysis. It also highlights the need for Scala implementation of algorithms used in Bioinformatics.

Author 1: Abbas Rehman
Author 2: Ali Abbas
Author 3: Muhammad Atif Sarwar
Author 4: Javed Ferzund

Keywords: Scala; Big Data; Hadoop; Spark; Next Generation Sequencing; Genomics; RNA; DNA; Bioinformatics

Download PDF

Paper 39: Analytical Review on Test Cases Prioritization Techniques: An Empirical Study

Abstract: For conclusively predicting the quality of any software system, software testing plays an important but a vital role. For finding faults early and to observe failures (anomalies) before implementation stage, software testing is done and if bugs (defects) are detected then software is passed through maintenance phase. The success and failure of a software project is often attributed to the development methodology used. It is also observed that in many scenarios, the software engineering methods are not implemented in their true spirit. Moreover, many of the development methodologies don’t cater the change very well, because they follow a predefined development path which allows very less deviation. In software testing, regression testing is the important type of software testing. When any change made on the software then regression testing is done to check that it doesn’t influence other parts of software. In regression testing, test cases are prioritized in order to reuse new test cases and existing test cases. Test case prioritization is done by using different techniques. This paper presents a review of different test case prioritization techniques.

Author 1: Zainab Sultan
Author 2: Rabiya Abbas
Author 3: Shahid Nazir Bhatti
Author 4: S. Asim Ali Shah

Keywords: Agile Software Engineering (ASE); Testing; Regression Testing; Test Suit Reduction; Test Case Generation; Test minimization; Test Case Prioritization Technique

Download PDF

Paper 40: The Impact of Analytical Assessment of Requirements Prioritization Models: An Empirical Study

Abstract: Requirements prioritization is one of the important parts of managing requirements in software development process which plays its role in the success or failure of a software product. A software product can go wrong or fail if right requirements are not prioritized at right time. Thus, there is a need of a vast or complete requirements prioritization technique or model that spans all the factors that must be considered while prioritizing requirements whether it’s for a traditional software development or agile software development. There are several requirements prioritization methodologies that aid in decision making and in prioritizing requirements but importantly many lacks to account the important factors that have significant influence in prioritizing requirements. A requirement prioritization methodology that takes account of important factors such as time and human behavioral factors that has an influence in prioritizing requirements is required. This new model/ technique expected to overcome the lack that is in existing prioritization techniques because of not considering time gap factor and human behavioral factor. Extensive study on literature of agile methodology, requirements elicitation and prioritization has been done to find out factors that influence the decision making process of requirement prioritization. It is found that as agile methodologies such as XP, SCRUM deliver products in increments, there is a time gap between each increment of approximate 4 weeks or more, this time lapse could cause human behavioral to change either because of market demand or any other personal reason and, thus, influences the prioritization decision. These factors could be termed as time factor and human behavioral factors. Thus, a requirement prioritization technique or model is needed that takes account of all such factors while prioritizing requirements whether it’s for a traditional software development or agile software development.

Author 1: Aneesa Rida Asghar
Author 2: Shahid Nazir Bhatti
Author 3: Atika Tabassum
Author 4: S Asim Ali Shah

Keywords: Agile Software Engineering (ASE); Agile Software Development (ASD); Scrum Software Development Process; SCRUM; Product Owner (PO); Extreme Programming (XP); Requirements Prioritization techniques; Analytical Hierarchy Process (AHP); Cummulative Voting (CV); Numerical Assignment (NAT)

Download PDF

Paper 41: A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

Abstract: The study of sending and receiving secret messages is called cryptography. Generally, senders and receivers are unaware about the process of encryption and decryption. Hence, encryption plays an important role in data communication and data security. The meaning of encryption is not only to keep data confidential from unwanted access but also ensuring the data integrity through available way. As the capacity of breaking the security is increasing rapidly, so, the process that hides infor-mation is one of the most concerned topics. Advanced Encryption Standard is a popular, widely used and efficient encryption algorithm, which has been used since it was invented. This paper focuses on the AES key generation process and Substitution box. It modifies the conventional key generation technique and builds the dynamic 3-Dimensional S-box of Advance Encryption Standard. The proposed approach suggests 3-Dimensioanl Key Generation Matrix and S-box. As per shown this novel technique increases the amount of time it needs during encryption and decryption. The experimental result shows that it also enhances the strength of AES algorithm. The proposed approach illustrates the theoretical analysis and corresponding experimented results.

Author 1: Ziaur Rahaman
Author 2: Anjela Diana corraya
Author 3: Mousumi Akter Sumi
Author 4: Ali Newaz Bahar

Keywords: Advanced Encryption Standard; AES Modification; 3-dimensional Key Generation Matrix; dynamic S-box

Download PDF

Paper 42: Cyclic Redundancy Checking (CRC) Accelerator for Embedded Processor Datapaths

Abstract: We present the integration of a multimode Cyclic Redundancy Checking (CRC) accelerator unit with an embedded processor datapath to enhance the processor performance in terms of execution time and energy efficiency. We investigate the performance of CRC accelerated embedded processor datapath in terms of execution time and energy efficiency. Our evaluation shows that the CRC accelerated Microblaze SoftCore embedded processor datapath is 153 times more cycle and energy efficient than a datapath lacking a CRC accelerator unit. This acceleration is achieved at the cost of some area overhead.

Author 1: Abdul Rehman Buzdar
Author 2: Liguo Sun
Author 3: Rao Kashif
Author 4: Muhammad Waqar Azhar
Author 5: Muhammad Imran Khan

Keywords: CRC; Accelerator; Codesign; FPGA; MicroBlaze; Embedded Processor

Download PDF

Paper 43: Prediction by a Hybrid of Wavelet Transform and Long-Short-Term-Memory Neural Network

Abstract: Data originating from some specific fields, for in-stance tourist arrivals, may exhibit a high degree of fluctuations as well as non-linear characteristics due to time varying behaviors. This paper proposes a new hybrid method to perform prediction for such data. The proposed hybrid model of wavelet transform and long-short-term memory (LSTM) recurrent neural network (RNN) is able to capture non-linear attributes in tourist arrival time series. Firstly, data is decomposed into constitutive series through wavelet transform. The decomposition is expressed as a function of a combination of wavelet coefficients, which have different levels of resolution. Then, LSTM neural network is used to train and simulate the value at each level to find the bias vectors and weighting coefficients for the prediction value. A sliding windows model is employed to capture the time series nature of the data. An evaluation is conducted to compare the proposed model with other RNN algorithms, i.e., Elman RNN and Jordan RNN, as well as the combination of wavelet transform with each of them. The result shows that the proposed model has better performance in terms of training time than the original LSTM RNN, while the accuracy is better than the hybrid of wavelet-Elman and the hybrid of wavelet-Jordan.

Author 1: Putu Sugiartawan
Author 2: Reza Pulungan
Author 3: Anny Kartika Sari

Keywords: Wavelet Transform; Long-Short-Term Memory; Re-current Neural Network; Time Series Prediction

Download PDF

Paper 44: Reverse Area Skyline in a Map

Abstract: Skyline query retrieves a set of data objects, each of which is not dominated by another object. On the other hand, given a query object q, “reverse” skyline query retrieves a set of points that are “dynamic” skyline of q. If q is a given preference of a user, “dynamic” skyline query retrieves a set of points that are not dominated by another point with respect to q. Intuitively,“reverse” skyline query of q retrieves a set of points that are as preferable as q. Area skyline query is a method for selecting good areas, each of which is near to desirable facilities such as stations, warehouses, promising customers’ house, etc. and is far from undesirable facilities such as competitors’ shops, noise sources, etc. In this paper, we applied reverse skyline concept to area skyline query and proposed Reverse Area Skyline algorithm. Analogically, given an area g, reverse area skyline query selects areas, each of which are as preferable as g. Assume that a real estate company wants to sell an area. Reverse area skyline query must be useful for such company to consider effective real estate developments so that the area attracts many buyers. Reverse area skyline query can also be used for selecting promising buyers of the area.

Author 1: Annisa
Author 2: Asif Zaman
Author 3: Yasuhiko Morimoto

Keywords: skyline query; reverse skyline query; area skyline query

Download PDF

Paper 45: OpenCL-Accelerated Object Classification in Video Streams using Spatial Pooler of Hierarchical Temporal Memory

Abstract: The paper presents a method to classify objects in video streams using a brain-inspired Hierarchical Temporal Memory (HTM) algorithm. Object classification is a challeng-ing task where humans still significantly outperform machine learning algorithms due to their unique capabilities. A system which achieves very promising performance in terms of recogni-tion accuracy have been implemented. Unfortunately, conducting more advanced experiments is very computationally demanding; some of the trials run on a standard CPU may take as long as several days for 960x540 video streams frames. Therefore, authors decided to accelerate selected parts of the system using OpenCL. In particular, authors seek to determine to what extent porting selected and computationally demanding parts of a core may speed up calculations. The classification accuracy of the system was examined through a series of experiments and the performance was given in terms of F1 score as a function of the number of columns, synapses, min overlap and winners set size. The system achieves the highest F1 score of 0.95 and 0.91 for min overlap=4 and 256 synapses, respectively. Authors have also conduced a series of experiments with different hardware setups and measured CPU/GPU acceleration. The best kernel speed-up of 632x and 207x was reached for 256 synapses and 1024 columns. However, overall acceleration including transfer time was significantly lower and amounted to 6.5x and 3.2x for the same setup.

Author 1: Maciej Wielgosz
Author 2: Marcin Pietron

Keywords: Hierarchical Temporal Memory; OpenCL; GPU; Video processing

Download PDF

Paper 46: Performance Analysis of Proposed Congestion Avoiding Protocol for IEEE 802.11s

Abstract: The wireless technology is one of the core compo-nents of mobile applications with mobility support at low deploy-ment costs. Among these, Wireless Mesh Network (WMN) is one of the technologies that supports mobile users for un-disrupted, reliable data connectivity, provides high bandwidth even in areas, where access of such services is difficult. Additionally, it features capabilities like self-configuring, self-healing, and self-organizing. IEEE proposed a MAC standard for WMN enhancements named IEEE 802.11s for multi-hop networks. Within this standard, the mandatory routing protocol called Hybrid Wireless Mesh Protocol (HWMP) is proposed for efficient utilization of resources to achieve high bandwidth at MAC layer. To improve this protocol, a congestion avoiding protocol was proposed, which utilizes alternate paths just before the congestion state is reached. The proposed technique does not add any overhead, it utilizes congestion notification frame, which is already part of standard. This paper discusses simulation results of the proposed routing protocol against the existing HWMP protocol for packet delivery fraction, throughput and delay. The results indicate that the proposed technique significantly improves performance of IEEE 802.11s.

Author 1: Kishwer Abdul Khaliq
Author 2: Amir Qayyum
Author 3: Jurgen Pannek

Keywords: Wireless Mesh Network; IEEE802.11s; Congestion Control; Congestion Avoidance; Routing Protocol; HWMP

Download PDF

Paper 47: Time Varying Back Propagating Algorithm for MIMO Adaptive Inverse Controller

Abstract: In the field of automatic control system design, adaptive inverse is a powerful control technique. It identifies the system model and controls automatically without having prior knowledge about the dynamics of plant. In this paper neural network based adaptive inverse controller is proposed to control a MIMO system. Multi layer perception and back propagation are combinedly used in this investigation to design the NN learning algorithm. The developed structure represents the ability to identify and control the MIMO system. Mathematical derivation and simulation results for both plant identification and control are shown in this paper. Further, to prove the superiority of the proposed technique, performances are compared with recursive least square (RLS) method for the same MIMO system. RLS based adaptive inverse scheme is discussed in this paper for plant identification and control. Also the obtained simulated results are compared for both plant parameter estimation and tracking trajectory performance.

Author 1: Ibrahim Mustafa Mehedi

Keywords: Adaptive inverse control; neural network; MIMO; multilayer perception

Download PDF

Paper 48: Study of the Performance of Multi-hop Routing Protocols in Wireless Sensor Networks

Abstract: Currently in the literature, there are quite a num-ber of multi-hop routing algorithms, some of which are subject to normalization. Routing protocols based on clustering provide an efficient method for extending the lifetime of a wireless sensor network. Except that much of the research focuses less on communication between the Cluster-Head (CH), the nodes and the base station, and gives even less importance to the influence of the type of communication on the Life of the network. The aim of this article is to make a comparative study between some routing algorithms. Since they are not based on analytical models, the exact evaluation of some aspects of these protocols is very difficult. This is the reason why we make simulations. To study their performance. Our simulation is done under NS2 (Network Simulator 2). It allowed to obtain a classification of the different routing algorithms studied according to one of the metrics such as the loss of message, and the lifetime of a network.

Author 1: Nouredine Seddiki
Author 2: Bassou Abedsalem

Keywords: network sensors; routing protocol; simulation; NS2; d network lifetime

Download PDF

Paper 49: A Low Cost FPGA based Cryptosystem Design for High Throughput Area Ratio

Abstract: Over many years, Field Programmable Gated Ar-rays (FPGA) have been used as a target device for various prototyping and cryptographic algorithm applications. Due to the parallel architecture of FPGAs, the flexibility of cryptographic algorithms can be exploited to achieve high throughputs at the expense of very low chip area. In this research, we propose a low cost FPGA based cryptosystem named as Secure Cipher for high throughput to area ratio. The proposed Secure Cipher is implemented using full loop unroll technique in order to exploit the parallelism of the proposed algorithm. The proposed cryp-tosystem implementation achieved a throughput of 4600Mbps for encryption. The logic resource utilization of this implementation is 802 logic elements(LE) which yields a throughput to area ratio of 5.735Mbps/LE.

Author 1: Muhammad Sohail Ibrahim
Author 2: Irfan Ahmed
Author 3: M. Imran Aslam
Author 4: Muhammad Ghazaal
Author 5: Muhammad Usman
Author 6: Kamran Raza
Author 7: Shujaat Khan

Keywords: Encryption; Cryptosystem; Secure Cipher; AES; FPGA; Full loop unroll

Download PDF

Paper 50: Method for Game Development Driven by User-eXperience: a Study of Rework, Productivity and Complexity of Use

Abstract: The growing capabilities and revenues of video game development are important factors for software companies. However, game development processes could be considered im-mature, specifically in the design phase. Ambiguous requirements in game design cause rework. User-eXperience (UX) is usually assessed at the end of the development process, causing difficulties to ensure the interactive experience between the game and users. To reduce these problems, this paper proposes a method for Game Development driven by User-eXperience (GameD-UX) that integrates a repository based on requirements engineering, a model for user experience management, and an adjusted agile process. Two experiments were conducted to study rework and productivity of video game development. Results of the first experiment revealed that GameD-UX causes less rework than conventional approaches, but it induces lower productivity. A tool for supporting the GameD-UX method was developed by considering the lessons learned. The second experiment showed that the software tool increases the productivity and reduces the complexity of use of GameD-UX.

Author 1: Mario Gonzalez-Salazar
Author 2: Hugo Mitre-Hernandez
Author 3: Carlos Lara-Alvarez

Keywords: Rework; Productivity; Complexity of Use; Video Game Development

Download PDF

Paper 51: Face Recognition using SIFT Key with Optimal Features Selection Model

Abstract: Facial expression is complex in nature due to legion of variations present. These variations are identified and recorded using feature extraction mechanisms. The researchers have worked towards it and created classifiers for identifying face expression. The classifiers involve Principal component analysis (PCA), Local Polynomial approximation (LPA), Linear binary pattern (LBP), Discrete wavelet transformation (DWT) etc. The proposed work deals with the new classifier using SIFT key with genetic algorithm to identify distinct facial expression. Optimal features of existing algorithms are used within the proposed work. Also comparison of existing techniques such as LBP, PCA and DWT is presented with SIFT key with genetic algorithm. The results show that proposed classifier gives better result in terms of recognition raet.

Author 1: Taqdir
Author 2: Renu Dhir

Keywords: Feature Extraction; Classifier; PCA; LPA; LBP; DWT; SIFT key; Genetic algorithm

Download PDF

Paper 52: Empirical Evaluation of Social and Traditional Search Tools for Adhoc Information Retrieval

Abstract: The nature of World Wide Web (www) has evolved over the passage of time. Easier and faster availability of Internet has given rise to huge volumes of data available online. Another cause of huge volumes of data is the emergence of online social networks (like Facebook, Twitter, etc.) which has actually changed the role of data consumers to data generators. Increasing popularity of these online social networks has also changed the way different web services used to be used. For example, Facebook messaging has some impact on usage of emails; twitter usage affects (positively or negatively) online newspaper readings. Both of these platforms are heavily used for information searching. In this paper, we evaluate the role of Facebook and Twitter for academic queries and compare the findings with Google search engines to find out if there is a chance that these online social networks will replace Google sooner. A query set selected from the standard AOL dataset is used for experimentation. Academic related queries are selected and classified by expert users. Findings of Google, Facebook and Twitter are compared against these queries using Mean Average Precision (MAP), as a metrics for evaluation. Results conclude that Google has the dominating factor with a better MAP than Facebook and Twitter.

Author 1: Safdar Hussain
Author 2: Malik Muhammad Saad Missen
Author 3: Nadeem Akhtar
Author 4: Mujtaba Husnain
Author 5: Intesab Hussain
Author 6: M. Ali Nizamani

Keywords: AOL Query Log; Facebook; Twitter; Social Search

Download PDF

Paper 53: Mobile Technology based Polio-Vaccination System (PVS) – First Step Towards Polio-Free Pakistan

Abstract: Health information technology revolutionized the world with its great expansion and widespread in the domain of health care system. Most of the developed countries adopted advanced technology in their vaccination systems. Vaccination systems of many developing countries still lack the use of technology eventually causing mismanagement and corruption to occur in vaccination campaigns. Issues like mismanagement and corruption not only affect vaccination campaigns but also cause further diffusion of a disease. Pakistan is also one of such countries where vaccination system is prone to these and many other issues and hence it does not help in disease eradication. For example, polio remains alive in Pakistan because Pakistan’s Polio vaccination system is faced with many problems and the biggest one is security of vaccination teams. Corruption, mismanagement, unawareness among public and life-threat to vaccination teams are the main problems of current polio vaccination system of Pakistan. To overcome these flaws and to make an idyllic system with the new advanced technology, we propose technology oriented secure polio vaccination system. The proposed system is more secure and removes flaws in the current system. We model our proposed system using Colored Petri Nets (CPNs) which is a state-of-the-art tool for formal modeling.

Author 1: Nukhba Afzal
Author 2: Malik Muhammad Saad Missen
Author 3: Amnah Firdous
Author 4: Nadeem Akhtar
Author 5: Hina Asmat
Author 6: Saleem Ullah

Keywords: Polio Vaccination; Information system; GPS technology; Health-care

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org