Tuesday, March 31, 2020

AUTOMATED USABILITY EVALUATION OF E-LEARNING WEBSITES IN SAUDI ARABIA

Author :  Khalid Al-Omar

Affiliation :  Department of Information Systems, King Abdulaziz University, Jedda

Country :  Kingdom of Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract

Web usability is a significant factor in increasing user satisfaction, performance, trust, and loyalty. Web usability is particularly important for people who mostly depend on the website and for one reason or other cannot visit an institution, such as online distance education students. Accordingly, universities and educational websites need to determine the types of usability problems they have on their websites. However, far too little attention has been paid to providing detailed information regarding the types of specific usability problems that could be found on e-learning websites in general, and specifically, in the Kingdom of Saudi Arabia (KSA). The aim of this paper is to study and analyse the usability of university websites that offer distance education courses in the KSA. A total of 12 universities in Saudi Arabia were considered, which include 11 affiliated and one private university. The analysis of the data represents the level of usability of distance education websites. Results reveal that in Saudi Arabia, distance education websites are reliable, but violate basic usability guidelines.

Keyword :  University Websites, Credibility, Trustworthiness, Online Trust, Website Design, Saudi Arabia, Distance Education

For More Details :  https://airccj.org/CSCP/vol7/csit77001.pdf

Friday, March 27, 2020

A PROCESS OF LINK MINING


Author :  Dr. Zakea Il-agure

Affiliation :  Higher Colleges of Technology

Country :  United Arab Emirates

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

Abstract

Many data mining and knowledge discovery methodologies and process models have been developed, with varying degrees of success, there are three main methods used to discover patterns in data; KDD, SEMMA and CRISP-DM. They are presented in many of the publications of the area and are used in practice. To our knowledge, there is no clear methodology developed to support link mining. However, there is a well known methodology in knowledge discovery in databases, known as Cross Industry Standard Process for Data Mining (CRISPDM), developed by a consortium of several industrial companies which can be relevant to the study of link mining. In this study CRISP-DM has been adapted to the field of Link mining to detect anomalies. An important goal in link mining is the task of inferring links that are not yet known in a given network. This approach is implemented through the use of a case study of real world data (co-citation data). This case study aims to use mutual information to interpret the semantics of anomalies identified in co-citation, dataset that can provide valuable insights in determining the nature of a given link and potentially identifying important future link relationships.

Keyword :  Link mining, anomalies, mutual information

For More Details  :  https://airccj.org/CSCP/vol7/csit76709.pdf


CLUSTERING HYPERSPECTRAL DATA


Author :  Arwa Alturki

Affiliation :  Department of Computer Science, King Saud University

Country :  Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

Abstract

Spectroscopy or hyperspectral imaging consists in the acquisition, analysis, and extraction of the spectral information measured on a specific region or object using an airborne or satellite device. Hyperspectral imaging has become an active field of research recently. One way of analysing such data is through clustering. However, due to the high dimensionality of the data and the small distance between the different material signatures, clustering such a data is a challenging task.In this paper, we empirically compared five clustering techniques in different hyperspectral data sets. The considered clustering techniques are K-means, K-medoids, fuzzy Cmeans, hierarchical, and density-based spatial clustering of applications with noise. Four data sets are used to achieve this purpose which is Botswana, Kennedy space centre, Pavia, and Pavia University. Beside the accuracy, we adopted four more similarity measures: Rand statistics, Jaccard coefficient, Fowlkes-Mallows index, and Hubert index. According to accuracy, we found that fuzzy C-means clustering is doing better on Botswana and Pavia data sets, K-means and K-medoids are giving better results on Kennedy space centre data set, and for Pavia University the hierarchical clustering is better.

Keyword :  Image Processing, Hyperspectral Imaging, Imaging Spectroscopy, Clustering, FCM, K-means, K-medoids, hierarchical, DBSCAN

 For More Details :  https://airccj.org/CSCP/vol7/csit76708.pdf


Thursday, March 26, 2020

REDUCING FREQUENCY OF GROUP REKEYING OPERATION

Author :  YunSuk Yeo

Affiliation :  Computer Engineering, Sungkyunkwan University, Suwon

Country :  South Korea

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

Abstract

In the past, Ad-hoc networks were used in limited areas which require secure group communication without Internet access, such as the army or emergencies. However, Ad-hoc networks currently are widely used in variety applications like group chat, smart applications, research testbed etc. Ad-hoc network is basically group based network in the absence of access point so it is prevalent to provide group key approach to prevent information leakage. When we use group key approach, we need to consider which group key management method is the most suitable for the architecture because the cost and frequency of the rekeying operation remain as an unresolved issue. In this paper, we present analysis about existing group key management solutions for Ad-hoc network and suggest a new approach to reduce frequency of the rekeying operation.  

Keyword :  Rekeying operation, Group key management, ad-hoc networks, Frequency of rekeying, Timedriven method

For More Details :  https://airccj.org/CSCP/vol7/csit76707.pdf

Tuesday, March 24, 2020

JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DELAY ROUTING PROTOCOL IN WIRELESS MESH NETWORKS


Author :  Wang Yi-rong

Affiliation :  Beijing Guodiantong Network Technology Co.Ltd.

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

Abstract

In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization, self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.

Keyword :  Multi-channel Multi-radio, Wireless Mesh Networks, End-to-end Delay Control, Joint Design, Channel Assignment, Routing Protocols

For More Details :  https://airccj.org/CSCP/vol7/csit76706.pdf



Sunday, March 22, 2020

LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETS


Author :  Mostafa Hefnawi

Affiliation :  Department of Electrical and Computer Engineering

Country :  Canada

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

ABSTRACT

In this paper, we consider the optimization of wireless capacity-limited backhaul links in future heterogeneous networks (HetNets). We assume that the HetNet is formed with one macro-cell base station (MBS), which is associated with multiple small-cell base stations (SBSs). It is also assumed both the MBS and the SBSs are equipped with massive arrays, while all mobiles users (macro-cell and small-cell users) have single antenna. For the backhaul links, we propose to use a capacity-aware beamforming scheme at the SBSs and MRC at the MBS. Using particle swarm optimization (PSO), each SBS seeks the optimal transmit weight vectors that maximize the backhaul uplink capacity and the access uplinks signal-to-interference plus noise ratio (SINR). The performance evaluation in terms of the symbol error rate (SER) and the ergodic system capacity shows that the proposed capacity-aware backhaul link scheme achieves similar or better performance than traditional wireless backhaul links and requires considerably less computational complexity.

Keyword :  HetNets, wireless backhaul, cognitive radio, Massive MIMO, multiuser MIMO, PSO.



Friday, March 20, 2020

MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS


Author :  Moneef Almutairi

Affiliation :  School of Computing Science, Newcastle University, Newcastle Upon Tyne

Country :  UK

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

ABSTRACT

Several constraints, such as business, financial, and legal can lead organizations to outsource some of their IT services. Consequently, this might introduce different security risks to major security services such as confidentiality, integrity and availability. Analysing and managing the potential security risks in the early stages of project execution allows organizations to avoid or minimize such security risks. In this paper, we propose an approach that is capable of managing the security and compliance risks of outsourced IT projects. Such an approach aims to allow organizations to minimize, mitigate, or eliminate security risks in the early stages of project execution. It is designed to manage variation in security requirements, as well as provide a methodology to guide organizations for the purpose of security management and implementation

Keyword :  Security and compliance management, outsourced IT projects, security management approach.



Thursday, March 19, 2020

SECRET IMAGE TRANSMISSION THROUGH MOSAIC IMAGE


Author :  Shahanaz N

Affiliation :  Department of Computer Science and Engineering, M Dasan Institute of Technology

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

Abstract

A secret image hiding scheme is proposed with new security features. This scheme utilizes the mosaic images, which is created from the secret and target images. A mosaic image is similar to that of the target image. The secret image fragments are hidden in the target image by performing appropriate color transformations. The inverse color transformation is performed for the lossless recovery of secret image. The color transformation is controlled by the proper overflow /underflow methods. The relevant information for recovering the secret image is embedded in the mosaic image by a lossless data hiding with the help of a key. Only with the proper key, the secret image is retrieved from the mosaic image

Key Words:  Image hiding, Mosaic images, Color transformation, Data hiding, Image encryption





Wednesday, March 18, 2020

DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENSOR NETWORKS


Author :  Mohamed Nacer Bouatit

Affiliation :  Centre d'Etude et de Recherche en Informatique et Communications / Conservatoire National des Arts et M├ętiers

Country :  Paris

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

ABSTRACT

Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability.

Keyword :  Wireless Multimedia Sensor Networks, Fault-Tolerance, Geographic Multipath Transmission, Load Balancing.



Tuesday, March 17, 2020

FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKS


Author :  Jean Tajer

Affiliation :  University of Portmouth, School of Computing

Country :  United Kingdom

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 5, April, 2017

ABSTRACT

This paper deals with detection of flooding attacks which are the most common type of Denial of Service (DoS) attacks in a Mobile Agent World. We propose a new framework for the detection of flooding attacks by integrating Divergence measures over Sketch data structure. The performance of the proposed framework is investigated in terms of detection probability and false alarm ratio. We focus on tuning the parameter of Divergence Measures to optimize the performance. We conduct performance analysis over publicly available real IP traces, in Mobile Agent Network, integrated with flooding attacks. Our analysis results prove that our proposed algorithm outperforms the existing solutions.

Keyword :  Mobile Agents, SYN flooding, Hellinger Distance, Chi-square, Sketch Technique, IP Networks

For More Details :  https://airccj.org/CSCP/vol7/csit76701.pdf


Monday, March 16, 2020

A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK


Author :  Wassim JERBI

Affiliation :  Higher Institute of Technological Studies, 3099 El Bustan Sfax

Country :  Tunisia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, April, 2016

ABSTRACT

The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is referred to as the basic algorithm of distributed clustering protocols. LEACH allows clusters formation. Each cluster has a leader called Cluster Head (CH). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node join a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus several sensor nodes cannot reach any CH. As a result, the remaining part of the controlled field will not be covered; some sensor nodes will be outside the network. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. If a gateway node has to connect a important number of orphan nodes, thus a sub-cluster is created and the gateway node is considered as a CH’ for connected orphans. As a result, orphan nodes become able to send their data messages to the CH which performs in turn data aggregation and send aggregated data message to the CH. The WSN application receives data from the entire network including orphan nodes.

Keyword :  WSNs; routing; LEACH; O-LEACH; Orphan nodes; sub-cluster; gateway; CH’

For More Details :  https://airccj.org/CSCP/vol6/csit65112.pdf


Sunday, March 15, 2020

ASSOCIATIVE REGRESSIVE DECISION RULE MINING FOR PREDICTING CUSTOMER SATISFACTORY PATTERNS


Author :  SHUBHA. S

Affiliation :  Research Scholar, Bharathiar University

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, April, 2016

ABSTRACT

Opinion mining also known as sentiment analysis, involves customer satisfactory patterns, sentiments and attitudes toward entities, products, services and their attributes. With the rapid development in the field of Internet, potential customer’s provides a satisfactory level of product/service reviews. The high volume of customer reviews were developed for product/review through taxonomy-aware processing but, it was difficult to identify the best reviews. In this paper, an Associative Regression Decision Rule Mining (ARDRM) technique is developed to predict the pattern for service provider and to improve customer satisfaction based on the review comments. Associative Regression based Decision Rule Mining performs twosteps for improving the customer satisfactory level. Initially, the Machine Learning Bayes Sentiment Classifier (MLBSC) is used to classify the class labels for each service reviews. After that, Regressive factor of the opinion words and Class labels were checked for Association between the words by using various probabilistic rules. Based on the probabilistic rules, the opinion and sentiments effect on customer reviews, are analyzed to arrive at specific set of service preferred by the customers with their review comments. The Associative Regressive Decision Rule helps the service provider to take decision on improving the customer satisfactory level. The experimental results reveal that the Associative Regression Decision Rule Mining (ARDRM) technique improved the performance in terms of true positive rate, Associative Regression factor, Regressive Decision Rule Generation time and Review Detection Accuracy of similar pattern.

Keyword :  Associative Regression, Decision Rule Mining, Machine Learning, Bayes Sentiment Classification, Probabilistic rules.

For More Details :  https://airccj.org/CSCP/vol6/csit65111.pdf


Friday, March 13, 2020

A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELESS MESH NETWORK


Author :  Asha C N

Affiliation :  VTU Research Scholar, Department of Electronics and communication Engineering, Acharya Institute of Technology

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, April, 2016

ABSTRACT

Due to tremendous growth of the wireless based application services are increasing the demand for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization in multi-radio wireless mesh networks is a very challenging problem. WMNs have been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX (802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high collision due to improper channel slot usage approximation error. To overcome this here the author propose the cross layer optimization technique by designing a device classification based channel slot re-utilization routing strategy which considers the channel slot and node information from various layers and use some of these parameters to approximate the risk involve in channel slot re-utilization in order to improve the QoS of the network. The simulation and analytical results show the effectiveness of our proposed approach in term of channel slot re-utilization efficiency and thus helps in reducing latency for data transmission and reduce channel slot collision.

Keyword :  Multi-radio WMN, Radio channel measurement, Scheduling, Routing, Medium access control (MAC)

For More Details : https://airccj.org/CSCP/vol6/csit65110.pdf



Thursday, March 12, 2020

SEGMENTATION AND LABELLING OF HUMAN SPINE MR IMAGES USING FUZZY CLUSTERING


Author :  Jiyo.S.Athertya

Affiliation :  Department of Engineering Design, IIT-Madras

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, April, 2016

ABSTRACT

Computerized medical image segmentation is a challenging area because of poor resolution and weak contrast. The predominantly used conventional clustering techniques and the thresholding methods suffer from limitations owing to their heavy dependence on user interactions. Uncertainties prevalent in an image cannot be captured by these techniques. The performance further deteriorates when the images are corrupted by noise, outliers and other artifacts. The objective of this paper is to develop an effective robust fuzzy C- means clustering for segmenting vertebral body from magnetic resonance images. The motivation for this work is that spine appearance, shape and geometry measurements are necessary for abnormality detection and thus proper localisation and labelling will enhance the diagnostic output of a physician. The method is compared with Otsu thresholding and K-means clustering to illustrate the robustness. The reference standard for validation was the annotated images from the radiologist, and the Dice coefficient and Hausdorff distance measures were used to evaluate the segmentation.

Keyword :  Vertebra segmentation, fuzzy clustering, MRI, labelling

For More Details  :  https://airccj.org/CSCP/vol6/csit65109.pdf


Wednesday, March 11, 2020

SELECTION OF BEST ALTERNATIVE IN MANUFACTURING AND SERVICE SECTOR USING MULTI GRADE DECISION APPROACH - A REVIEW


Author :  Karuppanna Prasad N

Affiliation :  Department of Manufacturing Engineering, Pricol India Ltd

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, April, 2016

ABSTRACT

Modern manufacturing organizations tend to face versatile challenges due to globalization, modern lifestyle trends and rapid market requirements from both locally and globally placed competitors. The organizations faces high stress from dual perspective namely enhancement in science and technology and development of modern strategies. In such an instance, organizations were in a need of using an effective decision making tool that chooses out optimal alternative that reduces time, complexity and highly simplified. This paper explores a usage of new multi criteria decision making tool known as MOORA for selecting the best alternatives by examining various case study. The study was covered up in two fold manner by comparing MOORA with other MCDM and MADM approaches to identify its advantage for selecting optimal alternative, followed by highlighting the scope and gap of using MOORA approach. Examination on various case study reveals an existence of huge scope in using MOORA for numerous manufacturing and service applications.

Keyword :  MADM, MCDM, MOORA, optimization, manufacturing sector, service sector

For More Details  :  https://airccj.org/CSCP/vol6/csit65106.pdf


FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM


Author :  Shipra Mittal

Affiliation :  Department of Computer Science & Engineering, National Institute of Technology

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, November, 2016

ABSTRACT

With the increasing growth of Internet and World Wide Web, information retrieval (IR) has attracted much attention in recent years. Quick, accurate and quality information mining is the core concern of successful search companies. Likewise, spammers try to manipulate IR system to fulfil their stealthy needs. Spamdexing, (also known as web spamming) is one of the spamming techniques of adversarial IR, allowing users to exploit ranking of specific documents in search engine result page (SERP). Spammers take advantage of different features of web indexing system for notorious motives. Suitable machine learning approaches can be useful in analysis of spam patterns and automated detection of spam. This paper examines content based features of web documents and discusses the potential of feature selection (FS) in upcoming studies to combat web spam. The objective of feature selection is to select the salient features to improve prediction performance and to understand the underlying data generation techniques. A publically available web data set namely WEBSPAM - UK2007 is used for all evaluations.

Keyword :  Web Spamming, Spamdexing, Content Spam, Feature Selection & Adversarial IR

For More Details :  https://airccj.org/CSCP/vol6/csit65103.pdf


Monday, March 9, 2020

FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER


Author :  Juhyeon Oh and Chae Y. Lee

Affiliation :  Department of Industrial & Systems Engineering

Country :  KAIST

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, April, 2016

ABSTRACT

The importance of security is increasing in a current network system. We have found a big security weakness at the file integration when the people download or upload a file and propose a novel solution how to ensure the security of a file. In particular, hash value can be applied to ensure a file due to a speed and architecture of file transfer. Hash server stores all the hash values which are updated by file provider and client can use these values to entrust file when it downloads. FileShader detects to file changes correctly, and we observed that it did not show big performance degradation. We expect FileShader can be applied current network systems practically, and it can increase a security level of all internet users.

Keyword :  SHA-1, File Integration, Web Cloud, File Transfer



Sunday, March 8, 2020

COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODEL


Author :  Rafael Bello and Jorge Lloret

Affiliation :  University of Zaragoza

Country :  Spain

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 4, April, 2016

ABSTRACT

As more and more collections of data are available on the Internet, end users but not experts in Computer Science demand easy solutions for retrieving data from these collections. A good solution for these users is the conceptual query languages, which facilitate the composition of queries by means of a graphical interface. In this paper, we present (1) CoQueL, a conceptual query language specified on E/R models and (2) a translation architecture for translating CoQueL queries into languages such as XQuery or SQL.

Keyword :  Conceptual Query Language, SQL, final user



Friday, March 6, 2020

JPL : IMPLEMENTATION OF A PROLOG SYSTEM SUPPORTING INCREMENTAL TABULATION


Author :  Taher Ali

Affiliation :  Gulf University for Science and Technology

Country :  Kuwait

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 1, November, 2016

ABSTRACT

The incremental evaluation of tabled Prolog programs allows to maintain the correctness and completeness of the tabled answers under the dynamic state. This paper presents JPL implementation details. JPL is an approach to support incremental tabulation for logic programs under non-monotonic logic. The main idea is to cache the proof generated by the deductive inference engine rather than the end results. In order to be able to efficiently maintain the proof to be updated, the proof structure is converted into a justification-based truthmaintenance (JTMS) network

Keyword :  Applications of justification-based truth maintenance systems, Belief revision systems, Truth maintenance systems, Justification-based truth maintenance systems, Incremental evaluation of tabled Prolo

For More Details :  https://airccj.org/CSCP/vol6/csit64827.pdf


Thursday, March 5, 2020

A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED ON TOPOLOGICAL DISTANCES


Author :  Sergej Alekseev

Affiliation :  Frankfurt University of Applied Sciences

Country :  Germany

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 1, November, 2016

ABSTRACT

In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive. In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner. We present proofs of our algorithms as well as practical results and evaluations.

Keyword :  Distributed algorithms, peer-to-peer (P2P), hybrid, overlay multicast tree, live streaming

For More Details :  https://airccj.org/CSCP/vol6/csit64826.pdf


Wednesday, March 4, 2020

STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIBUTED EXPLICIT MODEL CHECKING


Author :  Nacer Tabib

Affiliation :  Constantine 2 University

Country :  Algeria

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 1, November, 2016

ABSTRACT

This paper proposes a new framework based on Binary Decision Diagrams (BDD) for the graph distribution problem in the context of explicit model checking. The BDD are yet used to represent the state space for a symbolic verification model checking. Thus, we took advantage of high compression ratio of BDD to encode not only the state space, but also the place where each state will be put. So, a fitness function that allows a good balance load of states over the nodes of an homogeneous network is used. Furthermore, a detailed explanation of how to calculate the inter-site edges between different nodes based on the adapted data structure is presented.

Keyword :  Graph distribution, Binary Decision Diagram, State space generation, Formal verification, Model Checking.

For More Details  :  https://airccj.org/CSCP/vol6/csit64825.pdf


Monday, March 2, 2020

A PREFIXED-ITEMSET-BASED IMPROVEMENT FOR APRIORI ALGORITHM


Author :  Yu Shoujian

Affiliation :  Donghua University

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 1, November, 2016

ABSTRACT

Association rules is a very important part of data mining. It is used to find the interesting patterns from transaction databases. Apriori algorithm is one of the most classical algorithms of association rules, but it has the bottleneck in efficiency. In this article, we proposed a prefixed-itemset-based data structure for candidate itemset generation, with the help of the structure we managed to improve the efficiency of the classical Apriori algorithm.

Keyword :  Data mining, association rules, Apriori algorithm, prefixed-itemset, hash map

For More Details :  https://airccj.org/CSCP/vol6/csit64824.pdf


Sunday, March 1, 2020

VIRTUAL SCENE CONSTRUCTION OF LARGE-SCALE CULTURAL HERITAGE : A FRAMEWORK INITIATED FROM THE CASE STUDY OF THE GRAND CANAL OF CHINA


Author :  Jian Tan

Affiliation :  Key Laboratory of Digital Earth Science

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 1, November, 2016

ABSTRACT

Virtual reality technology has been applied to the protection of cultural heritage for about 20 years. However, methods or systems of cultural heritage reported in previous studies are still unable to represent large-scale cultural heritage sites such as the Beijing-Hangzhou Grand Canal, the Struve Geodetic Arc and the boundaries of the Roman Empire. We aimed at constructing a large-scale cultural-heritage 3-D model with the focus on better management and organization of the scene. Starting from the case study of the Beijing-Hangzhou Grand Canal, we first explore various remote sensing data suitable for large-scale cultural heritage modeling, and then adopt a 3-D geographic global information system for large-scale 3-D scene organization and management.

Keyword :  Virtual scene construction, large-scale cultural heritage, the Grand Canal

For More Details :  https://airccj.org/CSCP/vol6/csit64823.pdf