The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 8 Issue 5

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Ranking XP Prioritization Methods based on the ANP

Abstract: The analytic network process (ANP) is considered one of the most powerful tools to facilitate decision-making in complex environments. The ANP allows decision makers to structure their problems mathematically using a series of simple binary comparisons. Research suggests that ANP can be useful in software development, where complicated decisions are routinely made. Industrial adoption of ANP, however, is virtually nonexistent because of its perceived complexity. We believe that ANP can be very beneficial in industry as it resolves conflicts in a mutually acceptable manner. We propose a protocol for its adoption by means of a case study that aims to explain a ranking method to assist an XP team in selecting the best prioritization method for ranking the user stories. The protocol was tested in a professional course environment.

Author 1: Abdulmajeed Aljuhani
Author 2: Luigi Benedicenti
Author 3: Sultan Alshehri

Keywords: analytic network process; extreme programming; planning game; prioritization techniques; user stories

Download PDF

Paper 2: Scalable Service for Predictive Learning based on the Professional Social Networking Sites

Abstract: Professional social networking sites are widely used as a tool for obtaining specific information such as technology trends and professional skills demand. The article is aimed to consider the evolution of services for professional communities through integration of analysis of the patent activity, analysis of the academic research activity and analysis of the labour market trends. Authors have developed the prototype of a predictive learning software service which intended to fill the gap between professional social networking sites and e-learning systems, including massive open online course systems. It includes functionality for monitoring of professional skills demand on the labour market and analysis of patents for each corresponding technology. The software service will help to determine demand for professional skills, to actualise an applicant’s skillset, to organise professional communities and to build individual learning programs for studying of skills and technologies which are predicted to grow in demand on the labour market.

Author 1: Evgeny Nikulchev
Author 2: Dmitry Ilin
Author 3: Gregory Bubnov
Author 4: Egor Mateshuk

Keywords: Online social networks; Social networking sites; Technology life cycle; Predictive learning; Patent activity analysis, Professional skills; Topic detection; LinkedIn; ResearchGate

Download PDF

Paper 3: The Novelty of A-Web based Adaptive Data-Driven Networks (DDN) Management & Cooperative Communities on the Internet Technology

Abstract: Nowadays, the area of adaptive data science of all data-driven properties on the Internet remains generally envision through integrated web entity maintenance. In this connection, several clients can collaborate with web server then collapse all data resources. However, the ideal client/server model tolerates after approximate edge produced via design all data in the unique centric area. Specifically, the proposed method of Internet cooperative communities is graphed data structure of vertical and horizontal entities sharing a mutual concern or field of reference. The computer networks centrally located the segment of cooperative neighbourhood build a logically graphs structure connection links spread the sensible computer networks structure of searching cooperative communities’ nodes on the Internet. The time for generation a global cooperative community structure can be improved and adjusted. That confesses the tool around dynamic and in state of the art algorithms’ and its usage performances. In this way, our techniques can professionally selection the classified structure of A-Web communities, and users preferred web data services can be recovered and choosing A-Web communities allowing to the categorised structure and distributes systems on influence rank. Finally, this is implemented into the novelty of A-Web constructed adaptive data-driven networks management structure. In the part of the contribution, this system provides the revolution of decentralised networking libraries. In other words, this project connects on the free-net and help in searching millions of scientific research data science volumes that are published globally on the Internet technology. This system also will connect other files; documents or info-resources on A-Web and middleware of the fundamental concepts of A-Web will be encapsulated transitory.

Author 1: Muhammad Tahir
Author 2: MingChu Li
Author 3: Arsalan Ali Shaikh
Author 4: Muhammad Aamir

Keywords: Adaptive Data-driven Management; A-Web Editor; Community Graphs; Internet Technology; Logically Connection Links; Vertical & Horizontal Networks Communities

Download PDF

Paper 4: Mode-Scheduling Steering Law of VSCMGs for Multi-Target Pointing and Agile Maneuver of a Spacecraft

Abstract: This study proposes a method of selecting a set of gimbal angles in the final state and applies the method to the mode-scheduling steering law of variable-speed control moment gyros intended for multi-target pointing manoeuvres in the three-axis attitude control of a spacecraft. The proposed method selects reference final gimbal angles, considering the condition numbers of the Jacobian matrix of the reaction wheel mode in the final state of a single manoeuvre and that of the constant-speed control moment gyro mode at the start of the upcoming manoeuvre to keep away from the singularities. To improve the reachability of reference final gimbal angles, the nearest set of gimbal angles among nominated sets according to the Euclidean norm is selected as the reference final set at the middle of the single manoeuvre, and then realised by adopting gimbal angle feedback steering logic using null motion. In addition, the manoeuvre profile is designed such that the second half of the single manoeuvre is more gradual and takes longer than the first. Numerical simulation confirms the validity of the proposed method in consecutive manoeuvres.

Author 1: Yasuyuki Nanamori
Author 2: Masaki Takahashi

Keywords: Variable-Speed Control Moment Gyros; Attitude Control; Singularity; Steering Law; Spacecraft

Download PDF

Paper 5: Comparative Analysis of Various Methods Treatment Expert Assessments

Abstract: The paper deals with the problem of choosing the most effective methods of processing expert information if there are several results of expert evaluation on the problem. The problem of levelling expert assessments, which differ much from the other set of estimates, is considered. Ratios for the weighting factors of individual expert assessments, taking into account the extent of the deviation of each expert's evaluation of the resulting valuation to be obtained from them, are offered. For the problem of estimation of the degree of importance the different components of the computer to ensure the security of data processed in the personal computer, a list of five possible expert data processing methods is formed, and carried out an expert evaluation of the level of the components’ importance on the basis of linguistic variables. Expert estimations are processed by all presented methods. The results of evaluation allowed to identify the most effective methods of treatment; namely median variant of the maximum likelihood method, which is based on a stochastic model of peer review, and proposed in the paper method that takes into account deviations from the specific evaluations of the resulting values.

Author 1: Georgi Popov
Author 2: Shamil Magomedov

Keywords: Treatment; Linguistic variables; Information processing; Evaluation procedures

Download PDF

Paper 6: Sperm Motility Algorithm for Solving Fractional Programming Problems under Uncertainty

Abstract: This paper investigated solving Fractional Programming Problems under Uncertainty (FPPU) using Sperm Motility Algorithm. Sperm Motility Algorithm (SMA) is a novel metaheuristic algorithm inspired by fertilization process in human, was proposed for solving optimization problems by Osama and Hezam [1]. The uncertainty in the Fractional Programming Problem (FPP) could be found in the objective function coefficients and/or the coefficients of the constraints. The uncertainty in the coefficients can be characterised by two methods. The first method is fuzzy logic-based alpha-cut analysis in which uncertain parameters are treated as fuzzy numbers leading to Fuzzy Fractional Programming Problems (FFPP). The second is Monte Carlo simulation (MCS) in which parameters are treated as random variables bound to a given probability distribution leading to Probabilistic Fractional Programming Problems (PFPP). The two different methods are used to revise the trustiness in the transformation to the deterministic domain. A comparative study of the obtained result using SMA with genetic algorithm and the two SI algorithms on a selected benchmark examples is carried out. A detailed comparison is induced giving a ranked recommendation for algorithms and methods proper for solving FPPU.

Author 1: Osama Abdel Raouf
Author 2: Bayoumi M. Ali Hassan
Author 3: Ibrahim M. Hezam

Keywords: Sperm Motility Algorithm; Fractional Programming; Uncertainty; Fuzzy Programming; Monte Carlo Method

Download PDF

Paper 7: SHPIS: A Database of Medicinal Plants from Saudi Arabia

Abstract: Many studies in the past have revealed the use of the indigenous medicinal plant for the treatment of various diseases in Saudi Arabia. However, the details of these indigenous essential medicinal herbs and their therapeutic implication against various human and animals diseases are not well documented and organised in a local platform. In this regard, a thorough mining of scholarly article for information on local herbal remedies available and used by communities of Saudi Arabia was performed. The research revealed a unique insight into the natural herbal resource of Saudi Arabia with as many as 120 varieties of the medicinal plant from Saudi Arabia. Therefore, in order to provide a structured platform to store and retrieve relevant information pertaining to an indigenous medicinal plant of Saudi Arabia, a Saudi Herbal Plants Information System was built using waterfall model. MySQL an open source Relational Database Management System and server-side scripting language Hypertext Pre-processor was used to build an interactive dynamic web portal of the Saudi Herbal Plants Information System. The designed web portal allows visitors to access information on herbs available in the herbal database for research and development.

Author 1: Asif Hassan Syed
Author 2: Tabrej khan

Keywords: Saudi Medicinal Plants; Saudi Herbal Plant Information System; MySQL; Relational Database Management System; Hypertext Pre-processor; Web Portal

Download PDF

Paper 8: Implementation of Failure Enterprise Systems in Organizational Perspective Framework

Abstract: Failure percentage of Enterprise Resource Planning (ERP) implementation projects stay high, even following quite a while of endeavours to diminish them. In this paper, the author proposes the exact exploration that plans to decrease the failure percentage of ERP projects. Nonetheless, most endeavours to enhance project achievement have concentrated on varieties inside of the conventional project management pattern. Author contends that a main driver of high ERP Implementation project failure percentage is the conventional pattern itself. Implementation of another pattern is a Value-Driven Change Leadership (VDCL) of reducing ERP Implementation failure percentage. This paper proposes an exact examination to explain the part of the new pattern (VDCL) in diminishing ERP Implementation failure percentage. This paper portrays the exploratory procedure for an exact study to the use of VDCL in decreasing ERP Implementation failure percentage.

Author 1: Soobia Saeed
Author 2: Asadullah Shaikh
Author 3: Muhammad Ali Memon
Author 4: Majid Hussain Memon
Author 5: Faheem Ahmed Abassi
Author 6: Syed Mehmood R Naqvi

Keywords: VDCL; ERP; Implementation; projects; failure

Download PDF

Paper 9: Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm

Abstract: Cross site scripting (XSS) is one of the major threats to the web application security, where the research is still underway for an effective and useful way to analyse the source code of web application and removes this threat. XSS occurs by injecting the malicious scripts into web application and it can lead to significant violations at the site or for the user. Several solutions have been recommended for their detection. However, their results do not appear to be effective enough to resolve the issue. This paper recommended a methodology for the detection of XSS from the PHP web application using genetic algorithm (GA) and static analysis. The methodology enhances the earlier approaches of determining XSS vulnerability in the web application by eliminating the infeasible paths from the control flow graph (CFG). This aids in reducing the false positive rate in the outcomes. The results of the experiments indicated that our methodology is more effectual in detecting XSS vulnerability from the PHP web application compared to the earlier studies, in terms of the false positive rates and the concrete susceptible paths determined by GA Generator.

Author 1: Abdalla Wasef Marashdih
Author 2: Zarul Fitri Zaaba
Author 3: Herman Khalid Omer

Keywords: Web Application Security; Security Vulnerability; Web Testing; Cross Site Scripting; Genetic Algorithm

Download PDF

Paper 10: A Study on the Effect of Learning Strategy using a Highlighter Pen on Gaze Movement

Abstract: In this study, we propose a learning strategy using a highlighter pen to improve the learning efficiency of learners. This method makes the important information stand out by colouring text. It is known that highlighting important points of sentence problems with a highlighter pen improves the speed of answers and correct answer rates, especially in school subjects, such as Japanese and mathematics. In this study, we focused on the gaze movement and analysed the gaze dwell time and the number of gaze movements to clarify what kind of influence and learning effect it has on the cognitive process.

Author 1: Hiroki Nishimura
Author 2: Noriaki Kuwahara

Keywords: Highlighter pen; Learning strategy; Eye movement

Download PDF

Paper 11: Research Advancements Towards in Existing Smart Metering over Smart Grid

Abstract: The advent of smart meters has automated the entire process of billing generation system over commercial energy usage which was previously done using digital meter. Although western countries practice its usage more, it is still unknown to many developing countries along with its power distribution. Hence, this paper reviews the working principle of smart meters along with the brief of basic operation description. It thoroughly investigates the implementation work towards algorithm design and techniques developed that are being carried out in last five years towards smart meters. The paper examines the various significant technology that has evolved to address the problems in smart meter e.g. performance improvement, energy efficiency, security factor, etc. Finally, a set of research gap is explored after scrutinizing the advantages and limitations of existing techniques followed by brief highlights of the feasible line of research to compensate the unaddressed problems associated with research work direction towards smart meters.

Author 1: Abdul Khadar A
Author 2: Javed Ahamed Khan
Author 3: M S Nagaraj

Keywords: Digital Meter; Energy; Power Distribution; Performance; Privacy Smart Meter; Smart Grid

Download PDF

Paper 12: RKE-CP: Response-based Knowledge Extraction from Collaborative Platform of Text-based Communication

Abstract: With the generation of massive amount of product-centric responses from existing applications on collaborative platform, it is necessary to perform a discrete analytical operation on it. As majority of such responses are textual in nature, it increases the applicability of using text mining approaches on it. We review the existing research contribution in text mining to find that there are significant research gap. Therefore, the proposed study presents a technique called as RKE-CP i.e. Response-based Knowledge Extraction from Collaborative Platform where the term Collaborative points towards cloud environment. The proposed technique is designed using mathematical modelling where the maximum focus of design and implementation lies on accomplishing a good balance between faster response time in mining operation and higher precision/recall rate. The study outcome possess’ better precision score, recall, and lowered processing time as compared with the most relevant work text mining.

Author 1: Jalaja G
Author 2: Kavitha C

Keywords: Text Mining; Collaborative Platform; Probability Theory; Heterogeneous Domain; Precision /Recall

Download PDF

Paper 13: Neural Network Classification of White Blood Cell using Microscopic Images

Abstract: With the technological advances in medical field, the need for faster and more accurate analysis tools becomes essential for better patients’ diagnosis. In this work, the image recognition problem of white blood cells (WBC) is investigated. Five types of white blood cells are classified using a feed forward back propagation neural network. After segmentation of blood cells that are obtained from microscopic images, the most 16 significant features of these cells are fed as inputs to the neural network. Half of the 100 of the WBC sub-images that are found after segmentation are used to train the neural network, while the other half is used for test. The results found are promising with classification accuracy being 96%.

Author 1: Mazin Z. Othman
Author 2: Thabit S. Mohammed
Author 3: Alaa B. Ali

Keywords: White Blood Cell; Neural networks; Image analysis; Leukocytes; Lymphocyte; Feature extraction

Download PDF

Paper 14: An Early Phase Software Project Risk Assessment Support Method for Emergent Software Organizations

Abstract: Risk identification and assessment are amongst critical activities in software project management. However, identifying and assessing risks and uncertainties is a challenging process especially for emergent software organizations that lack resources. The research aims to introduce a method and a prototype tool to assist software development practitioners and teams with risk assessment processes. We have identified and put forward software project related risks from the literature. Then by conducting a survey to software practitioners of small organizations, we collected probability and impact of each risk factor opinions of 86 practitioners based on past projects. We developed a risk assessment method and a prototype tool initially based on data that accumulates further data as the tool. Along with a risk prioritisation and risk matrix, the method utilises fuzzy logic to provide the practitioners with predicted scores for potential failure types and aggregated risk score for the project. In order to validate the usability of the method and the tool, we have conducted a case study for the project risk assessment in a small software organization. The introduced method is partially successful at prediction of risks and estimating the probability of predefined failure modes.

Author 1: Sahand Vahidnia
Author 2: Ömer Özgür Tanriöver
Author 3: I.N. Askerzade

Keywords: Software Risk Identification; Software Risk Assessment; Failure Mode Prediction; Fuzzy Decision Support

Download PDF

Paper 15: Resources Management of High Speed Downlink Packet Access Network in the Presence of Mobility

Abstract: High-Speed Downlink Protocol Access (HSDPA) is a mobile telephony protocol. It is designed to increase data capacity and transfer rate. This paper presents a resource allocation strategy in the HSDPA broadband network. An admission check is proposed. It divides the coverage area of a base station (Node-B) into several regions based on the principle of Adaptive Modulation and Coding (AMC) efficiency. The call admission control (CAC) mechanism distinguishes two RT and NRT traffic according to the type of service requested by the user. It dynamically allocates an effective bandwidth to each accepted call in the system based on its modulation efficiency and maintains its initial rate during its communication.

Author 1: Abdulaleem Ali Almazroi

Keywords: HSDPA Network; Admission Control; Performance Evaluation; Mobility

Download PDF

Paper 16: Detection of Scaled Region Duplication Image Forgery using Color based Segmentation with LSB Signature

Abstract: Due to the availability of powerful image editing softwares, forgers can tamper the image content easily. There are various types of image forgery, such as image splicing and region duplication forgery. Region duplication is one of the most common manipulations used for tampering digital images. It is vital in image forensics to authenticate the digital image. In this paper, a novel region duplication forgery detection approach is proposed. By segmenting the input image based on the colour features, sufficient number of centroids are produced, that exist even in small or smooth regions. Then, the Least Significant Bit (LSB) of all the colours of pixels in each segment are extracted to build the signature vector. Finally, the hamming distance is calculated through exploiting the signature vector of image to find the dissimilarity. Various experimental results are provided to demonstrate the superior performance of the proposed scheme under some post processing operations such as scaling attack.

Author 1: Dr. Diaa Mohammed Uliyan
Author 2: Dr. Mohammed A. F. Al-Husainy

Keywords: Digital image forensics; Region duplication; Forgery detection; Image authentication

Download PDF

Paper 17: Investigation of Critical Factors that Perturb Business-IT Alignment in Organizations

Abstract: Business executives around the globe have recognised the significance of information technology (IT) and started adopting IT in their business processes. Firms always invest in adopting latest technologies in order to comply with the customer requirements despite of heavy investment companies are unable to avail optimum benefits from the underpinning technologies. Consequently IT does not support business the way it should have been and hence a misalignment between business and IT is created. In the current study various factors in a Saudi financial institution have been discussed and assessed that perturb alignments in both the entities. In the research study questionnaire approach has been used which is an effective tool to collect qualitative data. Finally, some recommendations have been suggested to bring business and IT into an alignment.

Author 1: Muhammad Asif Khan

Keywords: Alignment; Business-it gap; Organizational factors; Strategic alignment, Critical factors

Download PDF

Paper 18: Fuzzy Pi Adaptive Learning Controller for Controlling the Angle of Attack of an Aircraft

Abstract: In this paper, a Fuzzy PI Adaptive Learning controller is proposed for a flight control system to control the angle of attack of an aircraft. The proposed controller tracks the reference angle as desired by the pilot of the aircraft. The performance indices are evaluated and the corresponding value is compared with that for the conventional controllers obtained from Zigler Nichols (ZN), Tyreus Luyben (TL) and Extended Skogestad Internal Model Controller (ESIMC). The performance indices such as Mean Square Error (MSE), Integral Absolute Error (IAE) and Integral Absolute Time Error (IATE) are evaluated to verify superiority of one over another.

Author 1: Srinibash Swain
Author 2: Partha Sarathi Khuntia

Keywords: Angle of Attack; Interpolation Rule; Performance Indices; Fuzzy PI Adaptive Learning Controller

Download PDF

Paper 19: Performance Comparison of Protocols Combination based on EIGRP and OSPF for Real-Time Applications in Enterprise Networks

Abstract: This work studies the impact of redistribution on network performance compared with the use of a single routing protocol. A real network with real traffic parameters is simulated, in order to investigate a real deployment case, and then being able to extract precise results and practical conclusions. This work demonstrates that using one single routing protocol is more efficient in general cases for real topologies, especially when deploying sensitive applications requiring a certain QoS level.

Author 1: Dounia EL IDRISSI
Author 2: Najib ELKAMOUN
Author 3: Fatima LAKRAMI
Author 4: Rachid HILAL

Keywords: Routing protocols; EIGRP; OSPF; Redistribution; QoS; Opnet

Download PDF

Paper 20: Association between JPL Coding Standard Violations and Software Faults: An Exploratory Study

Abstract: Since the software community has realised the importance of adopting coding standards during the development process for improved software quality, many coding standards have been proposed and used during the software development. The main objective of this paper is to explore the association between Java Programming Language (JPL) coding standard and fault density of classes in object-oriented software. For this purpose, a set of metrics that quantify the violations of coding standards has been proposed. An exploratory study was then conducted in which data were collected from six open source software systems. The study involved principal component analysis, bivariate correlation analysis, and univariate regression analysis. The principle component analysis has shown that many of the proposed metrics fall into the first two components which in turn reflects the importance and diversity of these metrics. Furthermore, associations between some metrics and fault density have been observed across all systems, and thus indicate that these metrics can be useful predictors for improved early estimation of faulty density of object-oriented classes.

Author 1: Bashar Q. Ahmed
Author 2: Mahmoud O. Elish

Keywords: Coding standard; Software faults; Software quality; Exploratory study

Download PDF

Paper 21: A Survey on Content-based Image Retrieval

Abstract: The widespread of smart devices along with the exponential growth of virtual societies yield big digital image databases. These databases can be counter-productive if they are not coupled with efficient Content-Based Image Retrieval (CBIR) tools. The last decade has witnessed the introduction of promising CBIR systems and promoted applications in various fields. In this article, a survey on state of the art content based image retrieval including empirical and theoretical work is proposed. This work also includes publications that cover research aspects relevant to CBIR area. Namely, unsupervised and supervised learning and fusion techniques along with low-level image visual descriptors have been reported. Moreover, challenges and applications that emerged to support CBIR research have been discussed in this work.

Author 1: Mohamed Maher Ben Ismail

Keywords: Image retrieval; Content-based image retrieval; Supervised learning; Unsupervised learning

Download PDF

Paper 22: A Mixed Method Study for Investigating Critical Success Factors (CSFs) of E-Learning in Saudi Arabian Universities

Abstract: Electronic Learning (E-Learning) in the education system has become the obvious choice of the community over the globe because of its numerous advantages. The main aim of the present study is to identify Critical Success Factors (CSFs) and validate them for successful implementation of the E-Leaning at Saudi Arabian Universities. This study developed a multi-dimensional instrument for measuring the E-Learning CSFs in the higher educational institutions of Saudi Arabia. The study reviewed various CSFs from literature and identified most important E-Learning CSFs which are described and grouped in five dimensions such as Student, Instructor, Design and Contents, System and Technological, and Institutional Management Services. The 36 CSFs falling under these relevant dimensions were then validated their importance quantitatively through university Students, Instructors, and E-Learning staffs of some well-known universities in Saudi Arabia. A survey instrument was developed and tested on a sample of 257 respondents of Saudi Arabia Universities. It was found that System and Technological dimension is the most significant as perceived by respondents. Results of the study discovered that all obtained factors are highly reliable and thus would be useful to develop and implement E-Learning systems.

Author 1: Quadri Noorulhasan Naveed
Author 2: AbdulHafeez Muhammad
Author 3: Sumaya Sanober
Author 4: Mohamed Rafik N. Qureshi
Author 5: Asadullah Shah

Keywords: Critical Success Factors (CSFs); Content Reliability and Collected Mean; E-Learning, Kingdom of Saudi Arabia. Quantitative Analysis

Download PDF

Paper 23: Optimizing Coverage of Churn Prediction in Telecommunication Industry

Abstract: Companies are investing more in analytics to obtain a competitive edge in the market and decision makers are required better identification among their data to be able to interpret complex patterns more easily. Alluring thousands of new customers is worthless if an equal number is leaving. Business Intelligence (BI) systems are unable to find hidden churn patterns for the huge customer base. In this paper, a decision support system has been proposed, which can predict the churning behaviour of a customer efficiently. We have proposed a procedure to develop an analytical system using data mining as well as machine learning techniques C5, CHAID, QUEST, and ANN for the churn analysis and prediction for the telecommunication industry. Prediction performance can be significantly improved by using a large volume and several features from both Business Support Systems (BSS) and Operations Support Systems (OSS). Extensive experiments are performed; marginal increases in predictive performance can be seen by using a larger volume and multiple attributes from both Telco BSS and OSS data. From the results, it is observed that using a combination of techniques can help to figure out a better and precise churn prediction model.

Author 1: Adnan Anjum
Author 2: Saeeda Usman
Author 3: Adnan Zeb
Author 4: Imran Uddin Afridi
Author 5: Pir Masoom Shah
Author 6: Zahid Anwar
Author 7: Adeel Anjum
Author 8: Basit Raza
Author 9: Ahmad Kamran Malik
Author 10: Saif Ur Rehman Malik

Keywords: Telco; Churn Prediction; Business Intelligence; Business Support Systems; Operations Support Systems; E-Churn Model (Ensembling Churn Model)

Download PDF

Paper 24: A Genetic Programming based Algorithm for Predicting Exchanges in Electronic Trade using Social Networks’ Data

Abstract: Purpose of this paper is to use Facebook dataset for predicting Exchanges in Electronic business. For this purpose, first a dataset is collected from Facebook users and this dataset is divided into two training and test datasets. First, an advertisement post is sent for training data users and feedback from each user is recorded. Then, a learning machine is designed and trained based on these feedbacks and users' profiles. In order to design this learning machine, genetic programming is used. Next, test dataset is used to test the learning machine. The efficiency of the proposed method is evaluated in terms of Precision, Accuracy, Recall and F-Measure. Experiment results showed that the proposed method outperforms basic algorithm (based on J48) and random selection method in selecting objective users for sending advertisements. The proposed method has obtained Accuracy=74% and 73% earning ration in classifying users.

Author 1: Shokooh Sheikh Abooli Poor
Author 2: Mohammad Ebrahim Shiri

Keywords: Electronic business; Social networks; prediction; machine learning; genetic programming; Facebook network

Download PDF

Paper 25: Addressing the Future Data Management Challenges in IoT: A Proposed Framework

Abstract: Internet of Thing (IoT) has been attracting the interest of researchers in recent years. Traditionally, only handful types of devices had the capability to be connected to internet/intranet, but due to the latest developments in RFID, NFC, smart sensors and communication protocols billions of heterogeneous devices are being connected each year. From smart phones uploading the data regarding location and fitness to smart grids uploading the data regarding energy consumption and distribution, these devices are generating a huge amount of data each passing moment. This research paper proposes a data management framework to securely manage the huge amount of data that is being generated by IoT enabled devices. The proposed framework is divided into nine layers. The framework incorporates layers such as data collection layer, fog computing layer, integrity management layer, security layer, data aggregation layer, data analysis layer, data storage layer, application layer and archiving layer. The security layer has been proposed as a background layer because all layers shall ensure the privacy and security of the data. These layers will help in managing the data from the point where it is generated by an IoT enabled device until the point where the data is archived at the data center.

Author 1: Mohammad Asad Abbasi
Author 2: Zulfiqar A. Memon
Author 3: Tahir Q. Syed
Author 4: Jamshed Memon
Author 5: Rabah Alshboul

Keywords: IoT; Data Management; Cloud Computing; Big Data; Smart Devices; Interoperability; Privacy; Trust

Download PDF

Paper 26: Sustainable Green SLA (GSLA) Validation using Bayesian Network Model

Abstract: Currently, most of the IT (Information Technology) and ICT (Information and Communication Technology) industries/companies provides their various services/product at a different level of customers/users through newly developed sustainable GSLA (Green Service Level Agreement). In addition, all these industries also designed new green services at their scope by using global sustainable GSLA informational model. The recent development of sustainable GSLA under 3Es (Ecology, Economy and Ethics) are assisting these IT and ICT based industries to practice sustainability by providing green services to their customers/users and thus respecting green computing paradigm. However, the evaluation of newly developed sustainable GSLA model is not validating yet. This research attempts to evaluate and validate the sustainable GSLA model by using Bayesian Network Model (BNM). The validation of using BNM is done with the feedback of 44 different IT and ICT based companies from Japan, India and Bangladesh. The average accuracy of using BNM for validating sustainable GSLA model is 68% while considering all sample data sets. Moreover, while the proposed BNM have higher confidence with entropy calculation, then the accuracy is almost 100% for most of the companies’ feedback. The proposed idea of using BNM for evaluating and validating sustainable GSLA model would definitely help the ICT engineer to design and develop future green services in their industries. Additionally, the evaluation also validates the proposed information sustainable GSLA model from previous research.

Author 1: Iqbal Ahmed
Author 2: Hiroshi Okumura
Author 3: Kohei Arai
Author 4: Osamu Fukuda

Keywords: GSLA; Sustainability; GSLA informational model; Bayesian Network

Download PDF

Paper 27: Intelligent Watermarking Scheme for image Authentication and Recovery

Abstract: Recently, researchers have proposed semi-fragile watermarking techniques with the additional capability of image recovery. However, these approaches have certain limitations with respect to capacity, imperceptibility, and robustness. In this paper, we are proposing two independent watermarks, one for image recovery and the other for authentication. The first watermark (image digest), a highly compressed version of the original image itself, is used to recover the distorted image. Unlike the traditional quantisation matrix, genetic programming based matrices are used for compression purposes. These matrices are based on the local characteristics of the original image. Furthermore, a second watermark, which is a pseudo-random binary matrix, is generated to authenticate the host image precisely. Experimental results show that the semi-fragility of the watermarks makes the proposed scheme tolerant of JPEG lossy compression and it locates the tampered regions accurately.

Author 1: Rafi Ullah
Author 2: Hani Ali Alquhayz

Keywords: Watermarking; Genetic Programming (GP); Authentication; Quantisation; and Recovery

Download PDF

Paper 28: Digital Image Security: Fusion of Encryption, Steganography and Watermarking

Abstract: Digital images are widely communicated over the internet. The security of digital images is an essential and challenging task on shared communication channel. Various techniques are used to secure the digital image, such as encryption, steganography and watermarking. These are the methods for the security of digital images to achieve security goals, i.e. confidentiality, integrity and availability (CIA). Individually, these procedures are not quite sufficient for the security of digital images. This paper presents a blended security technique using encryption, steganography and watermarking. It comprises of three key components: (1) the original image has been encrypted using large secret key by rotating pixel bits to right through XOR operation, (2) for steganography, encrypted image has been altered by least significant bits (LSBs) of the cover image and obtained stego image, then (3) stego image has been watermarked in the time domain and frequency domain to ensure the ownership. The proposed approach is efficient, simpler and secured; it provides significant security against threats and attacks.

Author 1: Mirza Abdur Razzaq
Author 2: Riaz Ahmed Shaikh
Author 3: Mirza Adnan Baig
Author 4: Ashfaque Ahmed Memon

Keywords: Image security; Encryption; Steganography; Watermarking

Download PDF

Paper 29: Corpus for Test, Compare and Enhance Arabic Root Extraction Algorithms

Abstract: Many studies have focused recently on building, evaluating and comparing Arabic root extracting algorithm. The main challenges facing root extraction algorithms are the absence of standard data set for testing, comparing and enhancing different Arabic root extraction algorithms. In addition, the absence of complete lists of roots prefixes suffixes and patterns. In this paper, we describe the development of a new corpus driven from traditional Arabic dictionaries “mu’jams”. The goal is to use the corpus, as a new gold standard data set for testing, comparing and enhancing different Arabic root extraction algorithms. This data set covers all types of words and all roots. It contains each word and its root as a pair to avoid the consultation of a human expert needed to verify the correct roots of words used in the testing or comparing process. We describe the individual phases of the corpus construction, i.e. normalisation, reading derivation words and roots as a pair, and reading each root and its definition part. We have automatically extracted (12000) roots, (430) prefixes, (320) suffixes, (4320) patterns, and (720,000) word-root pair. Konja’s and Garside Arabic root extraction algorithm was tested on this corpus; the accuracy was (63%), then we test it after supplying it with our lists of roots prefixes suffixes and patterns, the accuracy of it became 84%.

Author 1: Nisrean Thalji
Author 2: Nik Adilah Hanin
Author 3: Yasmin Yacob
Author 4: Sohair Al-Hakeem

Keywords: Arabic root extraction algorithm; corpus; pattern; prefix; suffix; root

Download PDF

Paper 30: Fault Attacks Resistant Architecture for KECCAK Hash Function

Abstract: The KECCAK cryptographic algorithms widely used in embedded circuits to ensure a high level of security to any systems which require hashing as the integrity checking and random number generation. One of the most efficient cryptanalysis techniques against KECCAK implementation is the fault injection attacks. Until now, only a few fault detection schemes for KECCAK have been presented. In this paper, in order to provide a high level of security against fault attacks, an efficient error detection scheme based on scrambling technique has been proposed. To evaluate the robust of the proposed detection scheme against faults attacks, we perform fault injection simulations and we show that the fault coverage is about 99,996%. We have described the proposed detection scheme and through the Field-Programmable Gate Array analysis, results show that the proposed scheme can be easily implemented with low complexity and can efficiently protect KECCAK against fault attacks. Moreover, the Field-Programmable Gate Array implementation results show that the proposed KECCAK fault detection scheme realises a compromise between implementation cost and KECCAK robustness against fault attacks.

Author 1: Fatma Kahri
Author 2: Hassen Mestiri
Author 3: Belgacem Bouallegue
Author 4: Mohsen Machhout

Keywords: Cryptographic; KECCAK SHA-3; Fault detection; Embedded systems; FPGA implementation

Download PDF

Paper 31: Design and Simulation of Robust Controllers for Power Electronic Converters used in New Energy Architecture for a (PVG)/ (WTG) Hybrid System

Abstract: The use of the combination of photovoltaic energy source and the wind energy source as a hybrid configuration has become an alternative solution to produce power energy to fed industrial and domestic applications. In order to fully exploit the energy provided by both sources and ensure a very high efficiency it is necessary to oblige the hybrid power system to produce the maximum possible power. Indeed, in the applications based on renewable energy, power converters are used as an essential element that can help the global energy system to extract maximum power. This paper focuses on developing and optimising of a new architecture for hybrid photovoltaic generator (PVG) / wind turbine generator (WTG) power energy. To obtain the maximum power, two kinds of MPPT procedures have been used: the first is based on MPPT (P&O) sliding mode control (MPPTSMC) for the photovoltaic generator (PVG), and the second is a control based on MPPT current control (MPPTCC) approach and that for the wind turbine generator (WTG). In addition, the proposed hybrid power system can work very well under changes of climatic conditions, such as irradiation and wind speed. On the other hand, in order to maintain dc-link at a desired and stable value, during these variations, we have integrated a boost converter controlled by a sliding mode controller (SMC). A simulation model for the hybrid power system has been carried out using PSIM tools.

Author 1: Mohamed Akram JABALLAH
Author 2: Dhafer MEZGHANI
Author 3: Abdelkader MAMI

Keywords: (PVG)/(WTG) Hybrid system; (MPPTSMC); (MPPTCC); Wind turbine generator (WTG); Photovoltaic generator (PVG)

Download PDF

Paper 32: A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations

Abstract: The advent of e-commerce together with the growth of the Internet promoted the digitisation of the payment process with the provision of various online payment methods like electronic cash, debit cards, credit cards, contactless payment, mobile wallets, etc. Besides, the services provided by mobile payment are gaining popularity day-by-day and are showing a transition by advancing towards a propitious future of speculative prospects in conjunction with the technological innovations. This paper is aimed at evaluating the present status and growth of online payment systems in worldwide markets and also takes a look at its future. In this paper, a comprehensive survey on all the aspects of electronic payment has been conducted after analysis of several research studies on online payment systems. Several online payment system services, the associated security issues and the future of such modes of payment have been analysed. This study also analyses the various factors that affect the adoption of online payment systems by consumers. Furthermore, there can be seen a huge growth in mobile payment methods globally beating both debit and credit card payments, all due to the convenience and security offered by them. Nevertheless, various obstacles have been identified in the adoption of online payment methods; thus, some measures have to be taken for granting this industry a hopeful future. Thus, there should be a suitable trade-off between usability and security when designing online payment systems in order to attract customers. Also, technical and organisational issues which arise in the attempt to achieve interoperability must be taken into consideration by the designers. As a matter of fact, the process of developing interoperable and flexible solutions and universal standards is one of the most difficult tasks in the future ahead.

Author 1: Burhan Ul Islam Khan
Author 2: Rashidah F. Olanrewaju
Author 3: Asifa Mehraj Baba
Author 4: Adil Ahmad Langoo
Author 5: Shahul Assad

Keywords: E-Commerce; Online payment system; Online payment developments; Payment gateway; Online payment challenges

Download PDF

Paper 33: Gamified Incentives: A Badge Recommendation Model to Improve User Engagement in Social Networking Websites

Abstract: The online social communities employ several techniques to attract more users to their services. One of the essential demand of these communities is to find efficient ways to attract more users and improve their engagement. For this reason, social media sites typically take advantage of gamification systems to improve users’ participation. Among all the gamification services, badges are the most popular feature in online communities which are massively used as a reward system for users. Therefore, the recommendation of relevant unachieved badges to users will have a significant impact on their engagement level; instead of leaving them in the ocean of different actions and badges. In this paper, we develop a badge recommendation model based on item-based collaborative filtering which recommends the next achievable badges to users. The model calculates the correlation between unachieved badges and users’ previously awarded badges. We evaluate our model with the data from Stack Overflow question-answering website to examine if the recommendation model can recommend proper badges in an existing real community. Experimental results show that the model has about 70 per cent true recommendation by just recommending one badge and it has about 80 per cent correct recommendation if it recommends two badges for each user.

Author 1: Reza Gharibi
Author 2: Mohammad Malekzadeh

Keywords: Social Media; Data Mining; Gamification Algorithms; User Engagement; Recommendation Systems

Download PDF

Paper 34: A Novel Edge Cover based Graph Coloring Algorithm

Abstract: Graph Colouring Problem is a well-known NP-Hard problem. In Graph Colouring Problem (GCP) all vertices of any graph must be coloured in such a way that no two adjacent vertices are coloured with the same colour. In this paper, a new algorithm is proposed to solve the GCP. Proposed algorithm is based on finding vertex sets using edge cover method. In this paper implementation prospective of the algorithm is also discussed. Implemented algorithm is tested on various graph instances of DIMACS standards dataset. Algorithm execution time and a number of colours required to colour graph are compared with some other well-known Graph Colouring Algorithms. Variation in time complexity with reference to increasing in the number of vertices, a number of edges and an average degree of a graph are also discussed in this paper.

Author 1: Harish Patidar
Author 2: Dr. Prasun Chakrabarti

Keywords: Graph Colouring Problem, Edge Cover, Independent Set, NP-Hard Problem

Download PDF

Paper 35: Effect of Threshold Values Used for Road Segments Detection in SAR Images on Road Network Generation

Abstract: In this study, the effect of threshold values used for road segments detection in synthetic aperture radar (SAR) images of road network generation is examined. A three-phase method is applied as follows: image smoothing, road segments detection and irrelevant segments removal. Threshold values used in road segment detection phase are evaluated for four different situations and results are compared. The software is developed to apply and test all situations. Two different synthetic aperture radar images are used in experimental studies.

Author 1: Safak Altay Açar
Author 2: Safak Bayir

Keywords: road detection; synthetic aperture radar

Download PDF

Paper 36: Forecasting Production Values using Fuzzy Logic Interval based Partitioning in Different Intervals

Abstract: Fuzzy time series models have been put forward for rice production from many researchers around the globe, but the prediction has not been very accurate. Frequency density or ratio based partitioning methods have been used to represent the partition of discourse. We observed that various prediction models used 7th interval based partitioning for their prediction models, so we wanted to find the reason for that and along with finding the explanation for that we have proposed a novel algorithm to make predictions easy. We have tried to provide an explanation for that. This paper has been put forth due to the motivation from previously published research works in prediction logics. In the current paper, we use a fuzzy time series model and provide a more accurate result than the methods already existent. To make such predictions, we have used interval based partitioning as the partition of discourse and actual production as the universe of discourse. Fuzzy models are used for prediction in many areas, like enrolments prediction, stock price analysis, weather forecasting, and rice production.

Author 1: Shubham Aggarwal
Author 2: Jatin Sokhal
Author 3: Bindu Garg

Keywords: Mean Square Error; Fuzzy time series; Average Forecast Error Rate

Download PDF

Paper 37: An RTOS-based Fault Injection Simulator for Embedded Processors

Abstract: Evaluating embedded systems vulnerability to faults injection attacks has gained importance in recent years due to the rising threats they bring to chips security. The task is particularly important for micro-controllers since they have lower resistance to fault attacks compared to hardware-based cryptosystems. This paper reviews recent embedded fault injection simulators from literature and presents an embedded high-level fault injection mechanism based on a Real-Time Operating System (RTOS). The approach aims to be architecture-independent and portable to 32-bit micro-controllers and embedded processors. The proposed mechanism, primarily targets realistic fault attack scenarios on memory locations, is adapted to timed and event-based fault injection. A Differential Fault Attack (DFA) was mounted on a popular ARM-based micro-controller running FreeRTOS to illustrate the proposed mechanism. The aim is also to bridge the embedded fault injection simulation mechanism efficiently to a computer-based cryptanalysis and to highlight the importance of physically protecting the memory and integrating data-specific countermeasures.

Author 1: Nejmeddine ALIMI
Author 2: Younes LAHBIB
Author 3: Mohsen MACHHOUT
Author 4: Rached TOURKI

Keywords: Cryptography; DFA; Fault Injection; Simulator; RTOS; ARM; Microcontroller; MATLAB

Download PDF

Paper 38: The Performance of Individual and Ensemble Classifiers for an Arabic Sign Language Recognition System

Abstract: The objective of this paper is to compare different classifiers’ recognition accuracy for the 28 Arabic alphabet letters gestured by participants as Sign Language and captured by two depth sensors. The accuracy results of three individual classifiers: (1) the support vector machine (SVM), (2) random forest (RF), and (3) nearest neighbour (kNN), using the original gestured dataset were compared with the accuracy results using an ensemble of the results of each classifier, as recommended by the literature. SVM produced higher overall accuracy when running as an individual classifier regardless of the number of observations for each letter. However, for letters with fewer than 65 observations each, which created a far smaller dataset, RF had higher accuracy than SVM did when using the ensemble approach. Although RF produced higher accuracy results for classes with limited class observation data, the difference between the accuracy results of RF in phase 2 and SVM in phase 1 was negligible. The researchers conclude that such a difference does not warrant using the ensemble approach for this experiment, which adds more processing complexity without a significant increase in accuracy.

Author 1: Miada A. Almasre
Author 2: Hana Al-Nuaim

Keywords: Ensemble; Stacking; Support vector machine; SVM; Random forest; RF; Nearest neighbour; kNN; ArSL recognition system; Depth sensors

Download PDF

Paper 39: Software Quality and Productivity Model for Small and Medium Enterprises

Abstract: The enterprises today including small and medium enterprises (SMEs) are dependent on software to accomplish their objectives and maintain survivability and sustainability in their businesses. Although many studies in software quality have been carried out previously, they still lack for the correlation between software quality and the impact to SMEs productivity. The objectives of this study are to determine the quality factors from management’s perspective and to determine the impact of software quality and the productivity of SMEs. It is implemented through a survey conducted in Malaysia which involves 43 respondents who are among the managers and management of SME companies. The survey indicates that efficiency, expandability, functionality, reusability, safety and usability are the most influential factors from a management perspective. The research hypotheses defined are accepted with strong relationships between the defined variables. It shows that the level of software quality assessment in SMEs is correlated with the level of its productivity. Based on these findings, a software quality and productivity (SQAP) model for SME is developed. This paper presents the development of SQAP model which can be used as the standard and guideline in the process of obtaining and upgrading software in SMEs and can further be applied in quality assessment in the organisations.

Author 1: Jamaiah H. Yahaya
Author 2: Asadullah Tareen
Author 3: Aziz Deraman
Author 4: Abdul Razak Hamdan

Keywords: Software Quality; Small and Medium Enterprise; SME Productivity; Software Quality and Productivity Model

Download PDF

Paper 40: Hybrid Texture based Classification of Breast Mammograms using Adaboost Classifier

Abstract: Breast cancer is one of the most dangerous, leading and widespread cancers in the world especially in women. For breast analysis, digital mammography is the most suitable tool used to take mammograms for detection of cancer. It has been proved in the literature that if it can be detected at early and initial stages, then there are many chances to cure timely and efficiently. Therefore, initial screening of mammograms is the most important to detect cancer at initial stages. A radiologist is very expensive in the whole world wide and for a common person, it is very difficult to take opinion from more than one radiologist because it is a very sensitive disease. Thus, another solution is required that can be used as a second opinion to help the low cost solution to the patients. In this paper, a solution has been proposed to solve such type of problem to take mammograms and then detect cancer automatically in those images without any help of radiologist or medical specialist. So this solution can be adopted especially at the initial level. Proposed method first segment the portion of the image that contains these cancerous parts. After that, enhancement has been performed so that cancer can be clearly visible and identifiable. Texture features have been extracted to classify mammograms. An ensemble classifier AdaBoost has been used to classify those features by using the concept of intelligent experts. The standard dataset has been used for validation of the proposed method by using well-known quantitative measures. Proposed method has been compared with the existing method. Results show that proposed method has achieved 96.74% accuracy as well as 98.34% sensitivity.

Author 1: M. Arfan Jaffar

Keywords: Features; Segmentation; Breast mammograms; Classification; Texture

Download PDF

Paper 41: Fuzzy Ontology based Approach for Flexible Association Rules Mining

Abstract: Data mining is used for extracting related data. The association rules approach is one of the used methods for analyzing, discovering and extracting knowledge and mining the relationships among raw data. Commonly, it is important to understand and discover such knowledge directly from huge records of items stored in a relational database. This paper proposes an approach for generating human-like fuzzy association rules based on fuzzy ontology. It focuses on enhancing the process of extracting association rules from a huge database respecting a predefined domain fuzzy ontology. Commonly, association rules mining based on crisp ontology is found to be more flexible than classical ones as it considers the relationships between concepts or items. Yet, crisp ontology suffers from the problem of information losing resulted from the rigid boundaries of crisp relationships, which are approximated to be 0 or 1, between concepts. In contrast, the smooth boundaries of fuzzy sets make it able to represent partial relationships that range from 0 to 1 between concepts in an ontology in a more flexible human-like manner. Consequently, generating fuzzy association rules based on fuzzy ontology makes it more human-like and reliable compared with other previous ones. An illustrative case study, on two different data sets, shows the added value of the proposed approach compared with some other recent approaches.

Author 1: Alsayed M. H. Moawad
Author 2: Ahmed M. Gadallah
Author 3: Mohamed H. Kholief

Keywords: Fuzzy Ontology; Crisp Ontology; Data Mining; Fuzzy Association Rule

Download PDF

Paper 42: Study of Hybrid Autonomous Power System Modelling Via Multi-Agents Strategy

Abstract: In this paper, a design of a Hybrid autonomous Power System is proposed and detailed. The studied system integrates several components as solar energy source, Energy Recovery system based on a proton membrane exchange fuel cell system and two energy storage components, namely, (1) Energy Storage based on H2 gas production, and (2) an Ultra-capacitor storage device. The system is controlled through an energy management Unit which aims to ensure the smooth operation system to be against any unexpected fluctuation. The modelling of the system relies on the application of a multi-agent strategy whose good effects on the performance of the system is evaluated and demonstrated by the obtained simulation results. The improvement of the system performance is proved through a comparison with the conventional strategies. The system that relies on multi-agents control approach seems to be more reliable and promising in term of effectiveness and fast response.

Author 1: NASRI Sihem
Author 2: BEN SLAMA Sami
Author 3: ZAFAR Bassam
Author 4: CHERIF Adnan

Keywords: Solar Source; Energy Recovery; Hydogen; Energy Storage; Ultra-capacitor; Multi-agent; Energy Management

Download PDF

Paper 43: A Novel Big Data Storage Model for Protein-Protein Interaction and Gene-Protein Associations

Abstract: NGS (Next Generation Sequencing) technology has resulted in huge amount of proteomics data that exists in the form of interactions (protein-protein, gene-protein, and gene-disease). ETL (Extraction, Transformation, and Loading) techniques are very useful for Databases. Existing Rational Databases are not unified and having SQL (Structured Query Language). Proteomics data requires improvement for Integration of different Data sources. With the usage of NoSQL (not only SQL), improve the efficiency and performance. For this, a novel based unified model has been designed for protein interactions data (P-P, G-G, and G-D) by using Apache HBase to evaluate given the model, different case studies have been used.

Author 1: M. Atif Sarwar
Author 2: Hira Yaseen
Author 3: Javed Ferzund
Author 4: Hina Farooq
Author 5: Azka Mahmood

Keywords: Hadoop; HBase; Big Data; Apache Drill; Protein-Protein Interaction; Gene-Protein Association; Gene-Disease Associations

Download PDF

Paper 44: A Novel Security Scheme based on Twofish and Discrete Wavelet Transform

Abstract: Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.

Author 1: Mohammad S. Saraireh

Keywords: Cryptography; Twofish; DWT; Histogram; PSTN; Steganography

Download PDF

Paper 45: Awareness Survey of Anonymisation of Protected Health Information in Pakistan

Abstract: With the growing advancement of science and technology, research has become the vital step in every educational field. This research survey sheds light on the methods of de-identification and anonymisation for protecting the privacy of the patients, practitioners and nurses. Researchers require huge amounts of patient data for carrying out different analyses. Patient information must therefore be preserved while ensuring that the applied privacy policies do not render the data less valuable. De-identification and anonymisation techniques masks the patient identity through various methods such as suppression, randomisation, shuffling, creating pseudonyms, generalisation, adding noise, scrambling, masking, encoding and encryption, etc. The dataset having critical information is called protected health information (PHI) through which an individual can be identified. Thus, PHI must be preserved through an appropriate means to make data valuable and at the same time, protect the data from hackers. This paper presents the importance of securing PHIs in Pakistan by analysing the results of an awareness survey.

Author 1: Muhammad Usman Shahid
Author 2: Saman Hina
Author 3: Waqas Mahmood
Author 4: Hamda Usman

Keywords: Anonymisation; De-Identification; Protected health information; Patient data

Download PDF

Paper 46: Designing Novel Queries for Analysing NoSQL Data of Gene-Disease Associations

Abstract: To precisely identify gene associated diseases has been an open area of research for biological scientists to ensure clinical and psychological symptoms and treatment for human diseases. Because whole Human Genome is defined now it is the next step to find all necessary possible factors from such a complex data set that cause gene mutations and hence lead inherited and/or non-inherited diseases. So our research implementation combines all important factors from different biomolecular data sources to make one integrated data set and defines new relationships among these factors for gene associated disease/s that were not present in existing platforms. This paper presents a novel query model for NoSQL data storage that can help researchers to visualise relationships among gene factors and two new factors termed as “causative factors” and “drugs/treatment” for associated diseases. Since no data source applies graphical querying for gene associated diseases, our proposed novel cypher query model can help researchers to deeply analyse data set and get results in an efficient manner. The proposed query model writes novel cypher queries for this research domain on a graphical data model implemented in neo4j, which is a NoSQL (Not Only Structured) database. Use of NoSQL database and NoSQL query language has overcome certain limitations of relational databases, the existing data platforms had to cope up with. This paper gives a new suitable data storage format and effective data search queries for large, complex, semi-structured and multi-dimensional gene associated diseases data set to efficiently define new relationships among factors format to open new horizons of research.

Author 1: Hira Yaseen
Author 2: Muhammad Atif Sarwar
Author 3: Javed Ferzund

Keywords: Cypher queries; NoSQL; data model; Gene-disease associations; Causative factors; Drugs/treatment

Download PDF

Paper 47: Context-Aware Mobile Application Task Offloading to the Cloud

Abstract: One of the benefits of mobile cloud computing is the ability to offload mobile applications to the cloud for many reasons including performance enhancement and reduced resource consumption. This paper is concerned with offloading of context-aware mobile applications, in which actions or tasks are executed in certain contexts and offloading those tasks needs to be itself context-aware to be advantageous. The paper investigates candidate techniques and development models in the literature to identify suitable ones. Accordingly, the paper proposes the practical Context-Aware Mobile applications Offloading (CAMO) development model, which we developed in Java for the Android platform. Programmers can exploit the independency of the tasks of a typical context-aware mobile application and use CAMO to profile each task in isolation on the mobile and the cloud. The paper introduces the concept of a task-offloading plan in which programmers specify a criterion and/or an objective for offloading a task in a specific context. Offloading criteria allow rapid offloading in case the mobile environment does not change frequently. Based on the profiling results, programmers can use the classes and methods of CAMO to develop one or more custom offloading plans for each task or use pre-specified plans, criterion and objectives. We provide three example tasks with details of their profiling and analysis for developing corresponding offloading plans. CAMO is general and flexible enough for offloading any application partitioned into independent modules. Empirical evaluation shows extreme satisfaction of mobile application developers with its capabilities.

Author 1: Hanan Elazhary
Author 2: Saja Aloraini
Author 3: Roa’a Aljuraid

Keywords: Application offloading; Context awareness; Distributed systems; Mobile application; Mobile cloud computing

Download PDF

Paper 48: NFC Technology for Contactless Payment Echosystems

Abstract: Since the earliest ages, the human being has not ceased to develop its system of exchange of goods. The first system introduced is barter, it has evolved over time into currency by taking various forms (shells, teeth, feathers, etc.). The evolution of micro-electronics has favoured the appearance of a new form of payment that is the credit card. Currently it is the most used means of payment throughout the world. Today financial institutions want to replace the credit card by mobile phone for the implementation of contactless payment systems via NFC. This mode of operation is called Host Card Emulation or HCE. We will present in this article the basic element at the heart of this technology, which is the Secure Element. We will present the different forms that this element can take and possible cases of use of this technology for the establishment of an ecosystem of payment by mobile or purchase tickets transport.

Author 1: EL Hillali Wadii
Author 2: Jaouad Boutahar
Author 3: Souhail EL Ghazi

Keywords: NFC; Secure Element; SIM-Centric; HCE; Tockenisation; MPayment; Mticketing

Download PDF

Paper 49: A Conflict Resolution Strategy Selection Method (ConfRSSM) in Multi-Agent Systems

Abstract: Selecting a suitable conflict resolution strategy when conflicts appear in multi-agent environments is a hard problem. There is a need to formulate a model for strategic decision making in selecting a strategy to resolve conflicts. In this paper, we formalise a model for selecting a conflict resolution strategy in multi-agent systems. The model is expected to select a suitable strategy which guaranties low cost in terms of the number of messages and time ticks. This paper focuses on a novel method to guide strategic decision making for conflict resolution. The proposed model is named as Conflict Resolution Strategy Selection Method (ConfRSSM). We identified three distinct types of intervention: (1) domain requirement, (2) conflict strength, and (3) confidence level of the conflicting agents. We also ascertain that the most appropriate conflict resolution strategy for a given conflict depends on the type of conflict (weak, strong), the agents’ confidence level, and the domain preferences. Our method explores the best strategic choices that will reduce the cost and time in selecting a strategy.

Author 1: Alicia Y.C. Tang
Author 2: Ghusoon Salim Basheer

Keywords: Conflict resolution; Confidence level; Multi-agent system; Strategy selection method

Download PDF

Paper 50: Comparative Study of Bayesian and Energy Detection Including MRC Under Fading Environment in Collaborative Cognitive Radio Network

Abstract: The most important component of Cognitive Radio Network (CRN) is to sense the underutilised spectrum efficiently in fading environment for incorporating the increasing demand of wireless applications. The result of spectrum sensing can be affected by incorrect detection of the existence of Primary User (PU). In this paper, we have considered Collaborative spectrum sensing to maximise the spectrum utilisation of Cognitive Radio (CR) user. We proposed a new architecture and algorithm that shows the step by step spectrum sensing procedure using Energy detection and Bayesian detection in collaborative environment for an optimal number of users. This algorithm also includes Maximal Ratio Combining (MRC) diversity techniques in fusion centre to make a final decision under fading condition. The simulation result shows the significant optimisation of detection performance with less misdetection for large number of users. It is also observed that MRC produces better results in collaborative manner under Nakagami-m, Rayleigh and Normal fading. Finally in this paper, we have analysed the relative performance of different wireless channels for various SNR levels and from that analysis it concludes that ED technique works better in high SNR and BD technique works for low SNR.

Author 1: Shakila Zaman
Author 2: Risala Tasin Khan
Author 3: Md. Imdadul Islam

Keywords: Maximal Ratio Combining; Collaborative spectrum sensing, Fading and Shadowing; Data fusion centre; Receiver operating characteristics; False alarm rate

Download PDF

Paper 51: Using PCA and Factor Analysis for Dimensionality Reduction of Bio-informatics Data

Abstract: Large volume of Genomics data is produced on daily basis due to the advancement in sequencing technology. This data is of no value if it is not properly analysed. Different kinds of analytics are required to extract useful information from this raw data. Classification, Prediction, Clustering and Pattern Extraction are useful techniques of data mining. These techniques require appropriate selection of attributes of data for getting accurate results. However, Bioinformatics data is high dimensional, usually having hundreds of attributes. Such large a number of attributes affect the performance of machine learning algorithms used for classification/prediction. So, dimensionality reduction techniques are required to reduce the number of attributes that can be further used for analysis. In this paper, Principal Component Analysis and Factor Analysis are used for dimensionality reduction of Bioinformatics data. These techniques were applied on Leukaemia data set and the number of attributes was reduced from to.

Author 1: M. Usman Ali
Author 2: Shahzad Ahmed
Author 3: Javed Ferzund
Author 4: Atif Mehmood
Author 5: Abbas Rehman

Keywords: Bioinformatics; Statistics; Microarray; Leukaemia; Feature Selection; Statistical tests; PCA; Factor Analysis; R tool

Download PDF

Paper 52: SaaS Level based Middleware Database Integrator Platform

Abstract: In purpose of data searching acceleration, the fastest data response is the major concern for latest cloud environment. Regarding this, the intellectual decision is to enrich the SaaS level applications. Amongst the SaaS based applications, service level database integration is the recent trend to provide the integrated view of the heterogeneous cloud databases through shared services using DBaaS. But the generic limitations interacted during the database integration are dynamic adaptability of multiple databases structure, dynamic data location identification in the concern databases, data response using the data commonality. Data migration technique and single query approach are the two individual solutions for the proposed limitations. But the side effects during data migration technique are extra space utilisation and excess time consumption. Again, the single query approach suffers from worst case time complexity for data connectivity, data aggregation and query evaluation. So, to find a suitable data response solution by eliminating these combined major issues, a graph based Middleware Database Integrator Platform or MDIP model has been proposed. This integrator platform is actually the flexible metadata representation technique for the concerned heterogeneous cloud databases. The associativity and commonality among components of multiple databases would be further helpful for efficient data searching in an integrated way. For the incorporation within the service level but not in the services, MDIP is considered as the different platform. It is applicable over any service based database integration in purpose of data response efficiency. Finally, the quality assessment using evaluated query time compared with already proposed SLDI shows better data access quality. Thus, its expertise dedication in data response can overcome summarised challenges like data adaptation flexibility, dynamic identification of data location, wastage of data storage, data accessing within minimal time span and optimised cost in presence of data consistency, data partitioning and user side scalability.

Author 1: Sanjkta Pal

Keywords: Database integration; Integrator platform; Multi- Level graph; Subset of vertices; First class edge; Concrete edge; Connectivity edge

Download PDF

Paper 53: Miniaturisation of a 2-Bits Reflection Phase Shifter for Phased Array Antenna based on Experimental Realisation

Abstract: In this paper, a controllable reflection type Phase Shifter (PS) is designed, simulated and implemented. The structure of the 2-bits PS consists of branch line coupler, delay lines and six GaAs FET switches controlled in pair. The phase shifting is achieved by turning ON one pair of switches. The circuit design is fabricated using FR4 substrate with dielectric constant equal to 4.7. The size of the realised circuit is 7cm×2.8cm. To reduce this size, two methods are used. First, shortened quarter-wave length transmission line in T model is employed to develop a compact branch-line coupler. Second, a loaded line with capacitor is used to reduce the dimension of delays lines. The two methods are combined to realise a PS with compact size equal to 4.5cm×1.96cm.

Author 1: Mariem Mabrouki
Author 2: Bassem Jmai
Author 3: Ridha ghayoula
Author 4: Ali. Gharsallah

Keywords: Reflection type PS; FET switch; Branch line coupler; Semiconductors technology

Download PDF

Paper 54: Predictive Approach towards Software Effort Estimation using Evolutionary Support Vector Machine

Abstract: The project effort measurement is one of the most important estimates done in project management domain. This measure is done in advance using some traditional methods like Function Point analysis, Use case analysis, PERT analysis, Analogous, Poker, etc. Classical models have limitations that they are burdensome to implement, especially when there are LOC (lines of code) or objects’ count required in measurement. Sometimes historical information regarding a project is also considered to estimate the projects’ effort. But these estimates are then needed to be adjusted. The idea proposed in this research is to determine what factors regarding a project are directly related to the effort estimation. Other than that a model is proposed to predict the effort using minimum number of parameters in software project development.

Author 1: Tahira Mahboob
Author 2: Sabheen Gull
Author 3: Sidrish Ehsan
Author 4: Bushra Sikandar

Keywords: Correlation coefficient; Decision tree; Effort Estimation; Evolutionary Support Vector Machine; Software project management

Download PDF

Paper 55: A Lightweight Approach for Specification and Detection of SOAP Anti-Patterns

Abstract: Web-services have become a governing technology for Service Oriented Architectures due to reusability of services and their dependence on other services. The evolution in service based systems demands frequent changes to provide quality of service to customers. It is realised by different researchers that evolution in service based systems may degrade design and quality of service and may generate poor solutions known as anti-patterns. The detection of anti-patterns from web services is an important research realm and it is continuously getting the attention of researchers. There are a number of techniques and tools presented for detection of anti-patterns from object oriented software applications but only few approaches are presented for detection of anti-patterns from SOA. The state of the art anti-pattern detection approaches presented for detection of anti-patterns from SOA are not flexible enough and they are limited to detection of only a few anti-patterns. We present a flexible approach supplemented with a tool support to detect 10 anti-patterns from different SOA-based applications. We compare results of our approach with two representative state of the art approaches.

Author 1: Fatima Sabir
Author 2: Ghulam Rasool
Author 3: Maria Yousaf

Keywords: SOAP web services; Anti-patterns; Bad smells; SQL

Download PDF

Paper 56: A Novel Reconfigurable MMIC Antenna with RF-MEMS Resonator for Radar Application at K and Ka Bands

Abstract: This paper presents a new reconfigurable antenna based on coplanar waveguide (CPW). The design for reconfigurable antenna is based on monolithic microwave integrate circuit (MMIC). This scheme combines a CPW antenna and switchable resonator radio frequency micro-electro-mechanical system (RF-MEMS). The resonator RF-MEMS presents a meander inductor structure and tuning capacitor controlled by the applied DC voltage. This component can be used for the System on the Chip (SoC). Moreover, this device presents a compactness characteristic and the possibility to operate at high frequencies. The switch element allows changing the frequency band and the resonant frequency easily. The simulation results are shown between 10 and 40 GHz. The presented reconfigurable antenna can cover five bands: (26, 26.6) GHz, (26.4, 27.3) GHz, (27.3, 28) GHz, (29, 30.1) GHz and (30.13, 30.7) GHz. All simulation results were made by the High Frequency Structural Simulator (HFSS) software and validated by Computer Simulation Technology Microwave Studio (CST MWS).

Author 1: Bassem Jmai
Author 2: Salem Gahgouh
Author 3: Ali Gharsallah

Keywords: RF-MEMS; CPW; Bandwidth; Meander; Resonator; Frequency reconfigurable antennas and MMIC

Download PDF

Paper 57: A Bottom-up Approach for Visual Object Recognition on FPGA based Embedded Multiprocessor Architecture

Abstract: This paper presents an object recognition approach of outdoor autonomous systems identifying the nature of the interested object when observing an image. Therefore, seeking for effective and robust recognition method, the proposed approach is performed using a novel saliency based feature detector/descriptor which is combined with an object classifier to identify the nature of objects in an indoor or an outdoor environment. As known, bottom-up visual attention computational models need a considerable computational power and communication cost. A major challenge in this work is to deal with such image processing applications managing a large amount of the information processing and to work within real-time requirements by improving the processing speed. Based on interesting approach designing specific architectures for parallelism, this paper presents a solution for rapid prototyping of saliency-based object recognition applications. In order to meet computation and communication requirement, the developed pipelined architectures are composed of identical processing modules which can work concurrently with distributed memories and compute in parallel several sequential tasks with a high computational cost. We present hardware implementations with performance results on an Xilinx System-on-Programmable Chip (SoPC) target. The experimental results including execution times and application speedups as well as requirements in terms of computing resources show that the proposed homogeneous network of processors is efficient for embedding the proposed image processing application.

Author 1: Hanen Chenini

Keywords: Object recognition; Saliency-based feature detector/ descriptor; Object classifier; Pipeline architecture; Coarsegrained model

Download PDF

Paper 58: Collaborative Routing Algorithm for Fault Tolerance in Network on Chip CRAFT NoC

Abstract: Many fault tolerance techniques have been proposed in Network on Chip to cope with defects during fabrication or faults during product lifetime. Fault tolerance routing algorithm provide reliable mechanisms for continue delivering their services in spite of defective nodes due to the presence of permanent and/or transient faults throughout their lifetime implementation. This paper presents a new approach in the domain of fault-tolerant NoC with two main contributions. Firstly, we consider a unified fault model that include transient faults, permanent faults and congestion considered as a fault. Secondly, we present a new architecture based on sub-nets and give an overview of the associated test and (re)routing algorithm. The main result of this paper, is a new routing algorithm called Collaborative Routing Algorithm for Fault Tolerance in Network on Chip (CRAFT-NoC). We compare our approach with ACOFAR that considers as well congestion and permanent faults. Our simulation results show significant improvements in terms of both latency and reliability.

Author 1: Chakib NEHNOUH
Author 2: Mohamed SENOUCI
Author 3: Abdelkader Chaib

Keywords: Network on Chip; Fault Tolerance; Congestion; Reliability; Sub- network; Routing Algorithm

Download PDF

Paper 59: Designing Graphical Data Storage Model for Gene-Protein and Gene-Gene Interaction Networks

Abstract: Graph is an expressive way to represent dynamic and complex relationships in highly connected data. In today’s highly connected world, general purpose graph databases are providing opportunities to experience benefits of semantically significant networks without investing on the graph infrastructure. Examples of prominent graph databases are: Neo4j, Titan and OrientDB etc. In biological OMICS landscape, Interactomics is one of the new disciplines that focuses mainly on the data modeling, data storage and retrieval of biological interaction data. Biological experiments generate prodigious amount of data in various formats(semi-structured or unstructured). The large volume of such data posses challenges for data acquisition, data integration, multiple data modalities (either data model of storage model, storage, processing and visualization. This paper aims at designing a well suited graphical data storage model for biological information which is collected from major heterogeneous biological data repositories, by using graph database.

Author 1: Hina Farooq
Author 2: Javed Ferzund
Author 3: Azka Mahmood
Author 4: Muhammad Atif Sarwar

Keywords: Big Data; Graph Theory; Graph Database; Gene- Gene Interaction; Protein-Protein Interaction; Large Scale Biological Graphs; Storage Model; Neo4j

Download PDF

Paper 60: Ensuring Data Provenance with Package Watermarking

Abstract: The last decade has shown tremendous growth data production from different sectors, e.g., biology, financial markets, scientific computing, business processes, Internet of Things. The “Data is New Oil” has become a proverb in academic and corporate circles. Accordingly, tracing, recording origin and deriving data called data provenance has gained tremendous traction across board. Privacy and security of data are major challenges to provenance management. This can be tackled using watermarking. The downside of majority of existing watermarking techniques is data distortion. In this work, we purpose a novel approach called package watermarking that addresses the data capacity, usability, robustness, security, distortion, verifiability, and detectability issues in data provenance.

Author 1: Muhammad Umer Sarwar
Author 2: Muhammad Kashif Hanif
Author 3: Ramzan Talib
Author 4: Muhammad Asad Abbas

Keywords: Data security; Provenance; Watermarking; Tempering; Cryptography; Encryption; Decryption

Download PDF

Paper 61: High Precision DCT CORDIC Architectures for Maximum PSNR

Abstract: This paper proposes two optimal Cordic Loeffler based DCT (Discrete Cosine Transform algorithm) architectures: a fast and low Power DCT architecture and a high PSNR DCT architecture. The rotation parameters of CORDIC angles required for these architectures have been calculated using a MATLAB script. This script allows the variation of the angle’s precision from 10-1 to 10-4. The experimental results show that the fast and low Power DCT architecture correponds to the precision 10-1. Its complexity is even lower than the BinDCT which is a reference in terms of low complexity and its power has been enhanced in comparison with the conventional Cordic Loeffler DCT by 12 mW. The experimental results also show that the high PSNR DCT architecture corresponds to the precision 10-3 for which the PSNR has been improved by 6.55 dB in comparison with the conventional Cordic Loeffler DCT. Then, the hardware implementation and the generated RTL of some required Cordics are presented.

Author 1: Imen Ben Saad
Author 2: Sonia Mami
Author 3: Yassine Hachaichi
Author 4: Younes Lahbib
Author 5: Abdelkader Mami

Keywords: Cordic Loeffler DCT; high quality architecture; low power architecture; Image Processing; DCT

Download PDF

Paper 62: Modeling Smart Agriculture using SensorML

Abstract: IoT is transforming the physical world into a digital world by connecting people and things. This paper describes state of the art domains where IoT is playing a key role. Smart agriculture is selected as a case study of IoT application domain. OGC sensor web enablement framework is studied and discussed its application for smart agriculture. This paper mainly focuses on modeling the smart agriculture system using SensorML of OGC. It also identified, developed and modeled few major components/sub-systems/systems required for smart agriculture. This study also demonstrated how SensorML can be utilized in modeling IoT enabled systems.

Author 1: Maha Arooj
Author 2: Muhammad Asif
Author 3: Syed Zeeshan Shah

Keywords: Internet of Things; Smart Agriculture; Sensors; SensorML; OGC SWE; Sensor Web

Download PDF

Paper 63: Nonlinear Identification and Control of Coupled Mass-Spring-Damper System using Polynomial Structures

Abstract: The paper aims to identify and control the coupled mass-spring-damper system. A nonlinear discrete polynomial structure is elaborated. Its parameters are estimated using Recursive Least Squares (RLS) algorithm. Moreover, a feedback stabilizing control law based on Kronecker power is designed. Finally, simulations are presented to illustrate the effectiveness of the proposed structure.

Author 1: Sana RANNEN
Author 2: Chekib GHORBEL
Author 3: Naceur BENHADJ BRAIEK

Keywords: Identification; RLS algorithm; Polynomial structure; Stabilizing control; LQR

Download PDF

Paper 64: Predictive Performance Comparison Analysis of Relational & NoSQL Graph Databases

Abstract: From last three decades, the relational databases are being used in many organizations of various natures such as Education, Health, Business and in many other applications. Traditional databases show tremendous performance and are designed to handle structured data with ACID (Atomicity, Consistency, Isolation, Durability) property to manage data integrity. In the current era, organizations are storing more data i.e. videos, images, blogs, etc. besides structured data for decision making. Similarly, social media and scientific applications are generating large amount of semi-structured data of varied nature. Relational databases cannot process properly and manage such large amount of data efficiently. To overcome this problem, another paradigm NoSQL databases is introduced to manage and process massive amount of unstructured data efficiently. NoSQL databases are divided into four categories and each category is used according to the nature and need of the specific problem. In this paper we will compare Oracle relational database and NoSQL graph database using optimized queries and physical database tuning techniques. The comparison is two folded: in the first iteration we compare various kinds of queries such as simpler query, database tuning of Oracle relational database such as sub databases and perform these queries in our desired environments. Secondly, for this comparison we will perform predictive analysis for the results obtained from our experiments.

Author 1: Wisal Khan
Author 2: Ejaz ahmed
Author 3: Waseem Shahzad

Keywords: Big Data; Hadoop; MapReduce; Relational Databases; NoSQL Databases; Decision tree

Download PDF

Paper 65: On the Probability of Detection Ability in Observing Dynamic Environmental Phenomena using Wireless Sensor Networks

Abstract: Wireless Sensor Network (WSN) is being utilised for several purposes in military and civil domains, including surveillance, monitoring, and management, where networked sensors monitor and detect an event of interest and report to the concerned party through the WSN or the Internet infrastructure. Due to the characteristics of WSN, there are many fundamental technical challenges including the node deployment, event localization, and event tracking, among which, the probability of the event observability has a crucial role. The observability is defined as the capability of observing an evolving event in the monitoring area. The probability of detection ability in observing an event depends on the parameters of the detection function, which in turn rely on the sensor technology and the nature of the surrounding environment. This paper addresses the observation of an event using WSN and how accurately the event is observed in the monitoring area. It presents a practical solution for event observability after formulizing and establishing the complexity of observability issue and tackling its relation and impact on node deployment and event localization. Hence, a feasible event observation model has been proposed and validated in this paper. The numerical results of the experimental evaluation have confirmed that an accurate detection of an occurring event can be achieved by the proposed model.

Author 1: Omar Fouad Mohammed
Author 2: Burairah Hussin
Author 3: Abd Samad Hasan Basari

Keywords: Wireless Sensor Network (WSN); Environmental Monitoring; Event Detection; Event Localization; Sensing Modelling

Download PDF

Paper 66: SmileToPhone: A Mobile Phone System for Quadriplegic Users Controlled by EEG Signals

Abstract: Quadriplegic people are unable to use mobile devices without the aid of other persons which can be devastating for them both socially and economically. This has motivated many researchers to propose hardware and software solutions that operate as intermediates between the impaired users and their devices: accessibility switches, joysticks and head movements. However, the efficiency of these tools is limited in some conditions. To alleviate this problem, we propose to exploit electroencephalographic signals captured via an adequate headset. More precisely, the user is asked to perform a facial expression that will be recognized by the system through the analysis of the EEG signals. Several facial expressions are offered and each one corresponds to a command wirelessly sent to the mobile device and executed. This Brain Computer Interface based system is called SmileToPhone. It enables the quadriplegic patients to use their smartphones in an easy way with a minimum of effort and with respect to studied Human-Computer-Interaction requirements. The system includes the main functionalities of a smartphone such as making calls and sending messages. The evaluation of the system usability showed that most of the time, users were able to use the different functionalities of the system in an easy way. The current results are encouraging and motivating to add more features to the system.

Author 1: Heyfa Ammar
Author 2: Mounira Taileb

Keywords: Quadriplegia; EEG; facial expression; BCI system; HCI

Download PDF

Paper 67: Workplace Design and Employee’s Performance and Health in Software Industry of Pakistan

Abstract: Factors like colour, light, air quality, environmental conditions, and noise has a great effect on the Health and Performance of office employees. All these factors have the impact on employee’s performance and are the reasons to improve or reduce the level of employee’s working quality and health. The office design, computer usage, and sitting postures affect the muscles, eyes and other body parts. Availability of better office environment and design improve the performance and health of employees to achieve much better and productive outcome from the employees. Following empirical study has investigated the relationship between office workplace design and employee’s health and performance. We conducted a survey on the employees working in the software industry of Pakistan, collected the data from employees through questionnaire. We used Linear Regression for the analysis of the study. The results concluded that workplace design has a significant impact on employee’s health, and have a negative relationship with the employee discomfort level. Results also showed that workplace design has statistically significant impact on employee’s performance.

Author 1: Amna Riaz
Author 2: Umar Shoaib
Author 3: Muhammad Shahzad Sarfraz

Keywords: Ergonomics; Office work design; Employee’s health; Employee’s performance; User friendly design; Accessibility

Download PDF

Paper 68: Line of Sight Estimation Accuracy Improvement using Depth Image and Ellipsoidal Model of Cornea Curvature

Abstract: Line of sight estimation accuracy improvement is attempted using depth image (distance between user and display) and ellipsoidal model (shape of user’s eye) of cornea curvature. It is strongly required to improve line of sight estimation accuracy for perfect computer input by human eyes only. The conventional method for line of sight estimation is based on the approximation of cornea shape with ellipse function in the acquired eye image. The proposed estimation method is based on the approximation of crystalline lenses and cornea with ellipsoidal function. Therefore, much accurate approximation can be performed by the proposed method. Through experiments, it is found that depth images are useful for improvement of the line of sight estimation accuracy.

Author 1: Kohei Arai
Author 2: Kohya Iwamura

Keywords: Computer input just by sight; Computer input by human eyes only; Purkinje image; Cornea curvature

Download PDF

Paper 69: Modulation Components and Genetic Algorithm for Speaker Recognition System

Abstract: In this paper, the aim is to investigate weather or not that changing the filter-bank components (of the speaker recognition system) could improve the system performance in identifying the speaker. The filter is composed of 30 Gamatone filter channels. First, the channels are mel distributed of the frequency line. Then the components´values (center frequencies and bandwidths) changes with each run. Genetic algorithm (GA) is adopted to improve the filter component values that, in a result, improve the system performance. At each GA run, a new set of filter components will be generated that aimed to improve the performance comparing with the previous run. This will continue until the system reach to the maximum accuracy or the GA reach to its limits. Results show that the system will be improved at each run, however, different words might response differently to the system filter changing. Also, in terms of additive noise, the results show that although the digits affected differently by the noise, the system still get improving with reach GA run.

Author 1: Tariq A. Hassan
Author 2: Rihab I. Ajel
Author 3: Eman K. Ibrahim

Keywords: Computer Forensics; Digital Signal Processing

Download PDF

Paper 70: Establishing Standard Rules for Choosing Best KPIs for an E-Commerce Business based on Google Analytics and Machine Learning Technique

Abstract: The predictable values that indicate the performance of any company and determine that how well they are performing in order to achieve their objective is referred by the term called as “key performance indicators”. The key performance indicator techniques and other methods that are similar to KPI are usually implemented in the businesses that are running online, but for an e-commerce business, it is always difficult to select the right KPI. As long as the KPIs are concerned, the biggest blunder that an online business can make is that they calculate everything along with the KPIs. But whatever they are calculating cannot be referred as the “key” because they are measuring each and everything, so this can immediately become devastating. The need is to only measure certain specific keys in order to calculate the performance of a business. The main aim of this research is to establish the set of standard rules that must be adopted in order to identify the best KPIs for an e-commerce business website based on google analytics and machine learning technique.

Author 1: Haris Ahmed
Author 2: Dr. Tahseen Ahmed Jilani
Author 3: Waleej Haider
Author 4: Mohammad Asad Abbasi
Author 5: Shardha Nand
Author 6: Saher Kamran

Keywords: E-commerce KPI; Google Analytics; Machine Learning; C4.5 Decision Tree; Weka J48

Download PDF

Paper 71: Compliance-Driven Architecture for Healthcare Industry

Abstract: The United States (US) healthcare organizations are continuously struggling to cope-up with evolving regulatory requirements e.g. Health Information Technology for Economic and Clinical Health Act (HITECH) and International Organization for Standardization (ISO) 9001: 2015. These requirements are not only affecting the US healthcare industry but also other industries as well e.g. software industry that provides software products and services to healthcare organizations. It is vital for software companies to ensure and comply with applicable regulatory requirements. These evolving regulatory requirements may affect all phases of software development lifecycle including software architecture. It is difficult for Software architects to transform and trace regulatory requirements at software architecture level due to the absence of software design and architectural mechanisms. We have composed architectural mechanisms from given set of information security regulations i.e. Health Insurance Portability and Accountability Act (HIPAA) non-functional requirements, and these composed mechanisms were used to initiate initial architecture for the Electronic Health Record (EHR) and/or Health Level Seven (HL7). At next, style was selected for compliant and non-compliant software architecture. A layer of compliance was introduced in existing layered style that intends to help software companies to track compliance at software architecture level. Further, we have evaluated compliance-driven EHR architecture vs. non-compliant EHR architecture using a large healthcare billing and IT company with offices on three continents as a case study.

Author 1: Syeda Uzma Gardazi
Author 2: Arshad Ali Shahid

Keywords: Compliance-driven; architectural mechanisms; ISO 9001:2015; ISO 27001:2013; HIPAA; HITCH; software architecture; Logic-based Compliance Advisor (LCA); architectural evaluation

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org