Thursday, April 23, 2020

INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE THE EFFECTS OF COMPLEXITY

Author :  Howayda Abdallah Ali Elmarzaki

Affiliation :  Department of Software Engineering, Benghazi University

Country :  Libya

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 2, January, 2018

Abstract

The efficiency of multi agent system design mainly relies on the quality of a conceptual architecture of such systems. Hence, quality issues should be considered at an early stage in the software development process. Large systems such as multi agents systems (MAS) require many communications and interactions to fulfil their tasks, and this leads to complexity of architecture design (AD) which have crucial influence on architecture design quality. This work attempts to introduce approach to increase the architecture design quality of MAS by minimizing the effect of complexity.

Keyword :  Multi agent system (MAS), a general architectures, Quality attributes, Recommendations systems (RS).

For More Details :  https://airccj.org/CSCP/vol8/csit88206.pdf

Saturday, April 18, 2020

Call For Paper - Advanced Computational Intelligence: An International Journal (ACII)



Advanced Computational Intelligence: An International Journal (ACII)



Important Dates

Submission Deadline:April 18, 2020
Authors Notification:May 18, 2020
Final Manuscript Due:May 26, 2020
Publication Date:Determined by the Editor-in-Chief
Contact usaciij@aircconline.com

Call For Papers - International Conference on Big Data, Blockchain and Security (BDBS 2020)



International Conference on Big Data, Blockchain and Security (BDBS 2020)




Important Dates
Submission Deadline:April 25, 2020
Authors Notification:June 10, 2020
Final Manuscript Due:June 18, 2020
Contact usbdbs@cseij.org

Call For Papers - 6th International Conference on Computer Science, Information Technology (CSITEC 2020)



6th International Conference on Computer Science, Information 

Technology (CSITEC 2020)



Important Dates :
Submission Deadline:April 25, 2020
Authors Notification:June 10, 2020
Registration & Camera-Ready Paper Due:June 18, 2020
Contact uscsitec@cseij.org

Call For Papers - Computer Applications: An International Journal (CAIJ)



Computer Applications: An International Journal (CAIJ)
https://airccse.com/caij/index.html

Important Dates

Submission Deadline:April 25, 2020
Authors Notification:May 25, 2020
Final Manuscript Due:June 03, 2020
Publication Date:Determined by the Editor-in-Chief
Contact uscaij.journal@airccse.com

Friday, April 17, 2020

SEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITION

Author :  Ines SARRAY

Affiliation :  Universite´Coˆted’Azur, INRIA, SophiaAntipolis

Country :  France

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 2, January, 2018

Abstract

Many important and critical applications such as surveillance or healthcare require some form of (human) activity recognition. Activities are usually represented by a series of actions driven and triggered by events. Recognition systems have to be real time, reactive, correct, complete, and dependable. These stringent requirements justify the use of formal methods to describe, analyze, verify, and generate effective recognition systems. Due to the large number of possible application domains, the researchers aim at building a generic recognition system. They choose the synchronous approach because it has a well-founded semantics and it ensures determinism and safe parallel composition. They propose a new language to represent activities as synchronous automata and they supply it with two complementary formal semantics. First a behavioral semantics gives a reference definition of program behavior using rewriting rules. Second, an equational semantics describes the behavior in a constructive way and can be directly implemented. This paper focuses on the description of these two semantics and their relation.

Keyword :  Activity Recognition, Language, Synchronous Approach, Semantics

For More Details :  https://airccj.org/CSCP/vol8/csit88204.pdf

Tuesday, April 14, 2020

A DOMAIN INDEPENDENT APPROACH FOR ONTOLOGY SEMANTIC ENRICHMENT

Author :  Tahar Guerram

Affiliation :  Departement of Mathematics and Computer Science, University Larbi Ben M’hidi of Oum El Bouaghi

Country :  ALGERIA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 2, January, 2018

Abstract

Ontology automatic enrichment consists of adding automatically new concepts and/or new relations to an initial ontology built manually using a basic domain knowledge. In a concrete manner, enrichment is firstly, extracting concepts and relations from textual sources then putting them in their right emplacements in the initial ontology. However, the main issue in that process is how to preserve the coherence of the ontology after this operation. For this purpose, we consider the semantic aspect in the enrichment process by using similarity techniques between terms. Contrarily to other approaches, our approach is domain independent and the enrichment process is based on a semantic analysis. Another advantage of our approach is that it takes into account the two types of relations, taxonomic and non taxonomic ones.

Keyword :  Ontology, Ontology learning, Semantic enrichment, Natural language processing.

For More Detailshttps://airccj.org/CSCP/vol8/csit88202.pdf

Sunday, April 12, 2020

TOWARDS MAKING SENSE OF ONLINE REVIEWS BASED ON STATEMENT EXTRACTION

Author :  Michael Rist

Affiliation :  Department of Computer Science and Applied Cognitive Science, University Duisburg-Essen, Duisburg

Country :  Germany

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 2, January, 2018

Abstract

Product reviews are valuable resource for information seeking and decision making purposes. Products such as smart phone are discussed based on their aspects e.g. battery life, screen quality, etc. Knowing user statements about aspects is relevant as it will guide other users in their buying process. In this paper, we automatically extract user statements about aspects for a given product. Our extraction method is based on dependency parse information of individual reviews. The parse information is used to learn patterns and use them to determine the user statements for a given aspect. Our results show that our methods are able to extract potentially useful statements for given aspects.

Keyword :  Aspect-based opinion extraction, dependency parse trees, dependency patterns

For More Detailshttps://airccj.org/CSCP/vol8/csit88201.pdf

Thursday, April 9, 2020

AN ENERGY EFFICIENT HIERARCHICAL ROUTING SCHEME FOR WIRELESS SENSOR NETWORKS

Author :  Alaa Aadri

Affiliation :  University of Sultan Moulay Slimane, Faculty of Sciences and Techniques Information Processing Decision Support Laboratory

Country :  Morocco

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

Wireless sensor networks represent a very interesting field in the Internet of objects (IoT) and in information and communication technologies in view of the diversity of their applications based on the manipulation of information through sensor nodes with limited characteristics (low storage capacity, autonomous source of energy, limited power, etc.). In this kind of networks generally called WSN, hierarchical routing has shown over the last few years his increasing interest among researchers in the field of computer research aiming to guarantee energy efficiency of the network. In this paper, we compare some existing energy efficient clustering routing protocol with a new clustering protocol which we have developed during our researches using different simulation parameters, and we show that our routing protocol gives better results and extends the network lifetime

Keyword :  IoT; WSN; hierarchical routing; energy efficiency; performance analyzis

For More Details :  https://airccj.org/CSCP/vol7/csit77011.pdf

Wednesday, April 8, 2020

INVESTIGATING THE IMPLICATION OF BIG DATA ANALYTICS ON CONSUMER FINANCE IN CHINA

Author :  Prof. Jiwat Ram

Affiliation :  School of Management, Shandong University

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

The use of Big Data analytics for business improvements is a vital strategy for survival. In this paper, we report a study that investigates the role of BD analytics on consumer finance, credit card finance in China—a research area that has largely remained unexplored. The largeness and diversity of Chinese consumer market merit an urgent attention and understanding of role of BD analytics is significant both theoretically and managerially. This study achieves that target. Given the exploratory nature of study, we take a qualitative approach. We conduct approximately 30 interviews with baking and finance sector respondents. The data will be recorded, transcribed and translated. We will analyze data using content analysis / thematic analysis technique.



Keyword :  Consumer finance; Credit Card finance; Business analytics China

For More Detailshttps://airccj.org/CSCP/vol7/csit77010.pdf

Tuesday, April 7, 2020

SECURING INFORMATION SYSTEMS A NEW APPROACH

Author :  William R. Simpson

Affiliation :  Institute for Defense Analyses, 4850 Mark Center Dr., Alexandria

Country :  Virginia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

Increasing threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to put in place steel gates and prevent hostile entities from entering the enterprise domain. The current complexity level has made the fortress approach to security implemented throughout the defence, banking, and other high trust industries unworkable. The alternative security approach presented in this paper is the result of a concentrated fourteen year program of pilots and research. Its distributed approach has no need for passwords or accounts and derives from a set of tenets that form the basic security model requirements. At each step in the process it determines identities and claims for access and privileges. These techniques are resilient, secure, extensible, and scalable. They are currently being implemented for a major enterprise, and are a candidate for other enterprise security approaches. This paper discusses the Enterprise Level Security architecture, a webbased security architecture designed to select and incorporate technology into a cohesive set of policies and rules for an enterprise information system. The paper discusses the history, theoretical underpinnings, implementation decisions, current status, and future plans for expansion of capabilities and scale.

Keyword :  Access control, attributes, authentication, claims, cryptography, digital signatures, enterprise, high assurance, identity management systems, public key infrastructure

For More Details :  http://airccj.org/CSCP/vol7/csit77009.pdf

Monday, April 6, 2020

KURTOSIS: IS IT AN APPROPRIATE MEASURE TO COMPARE THE EXTENT OF FAT-TAILEDNESS OF THE DEGREE DISTRIBUTION FOR ANY TWO REALWORLD NETWORKS?

Author :  Natarajan Meghanathan

Affiliation :  Jackson State University, MS

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June,

Abstract

"Kurtosis" has long been considered an appropriate measure to quantify the extent of fattailedness of the degree distribution of a complex real-world network. However, the Kurtosis values for more than one real-world network have not been studied in conjunction with other statistical measures that also capture the extent of variation in node degree. In this paper, we determine the Kurtosis values for a suite of 48 real-world networks along with measures such as SPR(K), Max(K)-Min(K), Max(K)-Avg(K), SD(K)/Avg(K), wherein SPR(K), Max(K), Min(K), Avg(K) and SD(K) represent the spectral radius ratio for node degree, maximum node degree, minimum node degree, average and standard deviation of node degree respectively. Contrary to the conceived notion in the literature, we observe that real-world networks whose degree distribution is Poisson in nature (characterized by lower values of SPR(K), Max(K)-Min(K), Max(K)-Avg(K), SD(K)/Avg(K)) could have Kurtosis values that are larger than that of realworld networks whose degree distribution is scale-free in nature (characterized by larger values of SPR(K), Max(K)-Min(K), Max(K)-Avg(K), SD(K)/Avg(K)). When evaluated for any two realworld networks among all the 48 real-world networks, the Kendall's concordance-based correlation coefficients between Kurtosis and each of SPR, Max(K)-Min(K), Max(K)-Avg(K) and SD(K)/Avg(K) are 0.40, 0.26, 0.34 and 0.50 respectively. Thus, we seriously question the appropriateness of using Kurtosis to compare the extent of fat-tailedness of the degree distribution of the vertices for any two real-world networks.

Keyword :  Fat-tailedness, Degree Distribution, Kurtosis, Real-World Networks, Kendall's Concordancebased Correlation Coefficient

For More Details :  https://airccj.org/CSCP/vol7/csit77007.pdf

Sunday, April 5, 2020

BUILDING A TEXT-TO-SPEECH SYSTEM FOR PUNJABI LANGUAGE

Author :  Rupinderdeep Kaur

Affiliation :  Computer Science and Engineering department, Thapar University

Country :  Punjab

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

A Text-To-Speech (TTS) system is a computer application that is capable of converting typed text into speech. This paper contains description of working of a TTS system along with architecture of the system and various available TTS systems for Indian Languages with comparison of these systems on the basis of the methods used by them for speech synthesis. TTS system generally involves two steps, text processing and speech generation. Synthetic speech may be used in several applications, like, telecommunications services, language education, aid to handicapped persons, fundamental and applied research etc. TTS involves many challenges during the process of conversion of text to speech. The most important qualities expected from speech synthesis system are naturalness and intelligibility. The general architecture of a TTS system and different waveform generation methods are discussed in this paper. A scheme for developing a TTS system for Punjabi Language is also included in this paper.

Keyword :  TTS, Phonetics, Prosody, Speech Synthesis

For More Details :  https://airccj.org/CSCP/vol7/csit77006.pdf

Friday, April 3, 2020

A COLLABORATIVE CODING FRAMEWORK OF RS AND H.264

Author :  Jiejun Hu

Affiliation :  Department of Computer Science and Technology, Jilin University

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

The quality of online multimedia is required higher and higher, yet the uncertainty of network, such as interference, connection failure, still exists. In order to ensure the quality of service in multimedia transmission, we incorporate erasure code with video code together, and present a collaborative coding framework of Reed-Solomon code (RS) and H.264. First of all, we analyze the common coding pattern hidden in RS and H.264. Then, we design the collaborative coding framework of the two codes. Finally, we give a prototype implementation and validate the coding effectiveness using standard dataset. The erasure data slice goes through the redundant data tunnel of H.264, thus it will not involve extra traffic overhead. Experimental results show that the framework can increase the quality of media transmission.

Keyword :  RS coding, H.264 coding, erasure code, video code, collaborative coding framework

For More Details :  https://airccj.org/CSCP/vol7/csit77005.pdf

Thursday, April 2, 2020

CLASSIFICATION ALGORITHMS FOR THE DETECTION OF THE PRIMARY TUMOR BASED ON MICROSCOPIC IMAGES OF BONE METASTASES

Author :  Slađan Kantar

Affiliation :  Master student at “The Faculty of Computer Science"University of Belgrade

Country :  Serbia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

This paper presents the analysis of techniques for microscopic images in order to find a primary tumor based on the of bone metastases. Was done algorithmic classification into three groups, kidney, lung and breast. In order to speed up the treatment of the patient and easier for doctors and therefore reduce room for human error. Digital microscope images of bone metastases were analyzed, for which it is known that the primary tumor is in one of the three human organs: kidney, lung or breast. We tested several solutions for classification, were tested two methods of image analysis. Multifractal analysis and convolutional neural network. Both methods were tested with and without preprocessing image. Results of multifractal analysis were then classified using different algorithms. Images were processed using CLAHE and kmeans algorithm. At the end, the results obtained using a variety of techniques are presented.

Keyword :  Cancer classification, Microscopic images, Image preprocessing, Multifractal analysis, Classification algorithms

For More Details :  https://airccj.org/CSCP/vol7/csit77004.pdf


SCALABLE AND EFFICIENT PATHSENSITIVE ANALYSIS TECHNIQUE SCANNING MANY TYPES OF VULNERABILITY

Author :  Dongok Kang and Minsik Jin

Affiliation :  PA Division, Fasoo.com R&D Center, Seoul

Country :  Korea

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

The goal of this paper is to present an efficient and effective path-sensitive analysis technique for many types of security vulnerability. We propose two analysis techniques. The first is a scalable path-sensitive analysis technique for security vulnerability with high precision and recall. Our strategies are to allow flexible design of path state and to make an effective path navigation heuristic which achieves both scalability and high recall. Experimental results show that a vulnerability scanner implemented through this technique get precision 100% and recall 93% on OWASP Benchmark. The vulnerability scanner is able to analyze 1 million lines of code. The second is a pre-analysis technique to improve the efficiency of the above analysis technique. The pre-analysis technique improves the path navigation by using an additional cheap anlysis. Despite the additional cost, experimental results show that the total analysis time is reduced by 2.5 times. Simultaneously recall of the analysis is improved by the pre-analysis technique.

Keyword :  Secure coding, Security, Static analysis, Vulnerability scanner, Summary-based, Path-sensitive, Information flow Analysis, Pre-analysis

For More Detailshttps://airccj.org/CSCP/vol7/csit77003.pdf

Wednesday, April 1, 2020

GÖDEL THEOREM IS INVALID

Author :  J. Ulisses Ferreira

Affiliation :  Trv Pirapora 36 Costa Azul, 41770-220, Salvador

Country :  Brazil

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

This short and informal article shows that there exists some deductive system that proves that arithmetic is both sound and complete. First, it shows that there exists some four-valued logical system that plays the same role, by presenting a four-valued logic and informally introducing a four-valued Prolog programming language. Finally, it observes that some Boolean formal system can also prove that arithmetic is both sound and complete.

Keyword :  Gödel, incompleteness theorem, four-valued logic, logic, computability theory, philosophy of computer science

For More Details https://airccj.org/CSCP/vol7/csit77002.pdf