International Journal of Computers


ISSN: 1998-4308
Volume 13, 2019

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of NAUN Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Main Page

Submit a paper | Submission terms | Paper format

 


Volume 13, 2019


Title of the Paper: Applying the Absorbing and the Ergodic Markov Chain Theory to CBR

 

Authors: Michael Gr. Voskoglou

Pages: 122-126

Abstract: In the present work it is shown that in cases where is possible to apply either the absorbing or the ergodig Markov chain theory for modeling purposes - by making the proper modifications to the corresponding real situation – the results obtained are equivalent. For this, the Case-Based Reasoning paradigm is used, which is the process of solving problems (frequently with the help of computer systems) based on the solutions of previously solved analogous problems


Title of the Paper: Topological Properties Assessment for Hyper Hexa-Cell Interconnection Network

 

Authors: Basel A. Mahafzah, Mohammed Alshraideh, Luay Tahat, Nada Almasri

Pages: 115-121

Abstract: The core of a parallel processing system is the interconnection network by which the system’s processors are connected. Due to the great role played by the interconnection network’s topology in improving the parallel processing system’s performance, various topologies have been proposed in the literature. This paper presents the topological structure and properties of a hybrid interconnection network topology, referred to as the Hyper Hexa-Cell (HHC), in which the topological structure is based on Hexa-Cell and hypercube. The major topological properties of the HHC topology have been presented and investigated, including its size, diameter, minimum and maximum node degree, cost, and bisection width. A comparative study is then conducted between the HHC and other interconnection networks’ topologies; including multilayer hex-cells, hex-cell, hypercube, chained-cubic tree, treehypercube, hyper-mesh, and mesh-of-trees, in terms of the above mentioned topological properties. The concluding results showed the excellence of the HHC over these interconnection networks.


Title of the Paper: A Multi-Agent Information System Architecture for Multi-modal Transportation

 

Authors: Jihane Larioui, Abdeltif Elbyed

Pages: 111-114

Abstract: Nowadays, we are witnessing a significant growth in terms of demand for public transport and the need for travel. This is due to an increase in population density, traffic congestion, lack of information and all the problems that the transport network is facing. Following the reasons cited, the movement of travelers is becoming increasingly difficult. Indeed, as soon as the trip requires the use of one or more services of a transport operator, the planning of the trip requires the traveler to collect the necessary information on the various websites of the transport operators concerned. The objective of this work is to develop an architecture of an information system for multi-modal transport, based on the notions of agents, in order to provide the users with the optimized route to follow and to avoid the consultation of several transportation websites to plan the trip. In addition to this, the system is based on the notion of multi-objective optimization to combine the different modes of transport and satisfy the different criteria such as minimization of the travel time and the number of correspondence between stations.


Title of the Paper: A New Temporal Association Rules Mining Approach for Huge Database

 

Authors: Saad M. Darwish, Abdel Rahman Mahmoud

Pages: 102-110

Abstract: The discovery of association relationship among a huge database has been known to be useful in selective marketing, decision analysis, and business management. The current model of association rule mining is not able to handle the temporal data in different database types due to the following fundamental problems, i.e., (1) lack of consideration of the exhibition period of each individual Item; (2) lack of an equitable support counting basis for each item. The area of temporal data mining has very much attention in the last decade because from the time related feature of the data, one can extract much significant information which cannot be extracted by the general methods of data mining. Most of the data mining techniques tend to treat temporal data as an unordered collection of events, ignoring its temporal information. The work proposed in this paper apply knowledge discovery techniques on series of huge datasets obtained over a partition that contains the large amount of transactions in consecutive time intervals, instead of applying on the whole database. Instead of extracting rules throughout the whole time line, we will extract the rules for consecutive time intervals with different time granularities. Experimental results validate the efficiency of the suggested Approach


Title of the Paper: Address Entities Extraction using Named Entity Recognition

 

Authors: Kanita Krdžalić-Korić, Emine Yaman

Pages: 97-101

Abstract: Due to presence of large amounts of digital data, many tools for information extraction were developed in order to provide meaningful information and knowledge that could be used in text analysis and interpretation. Machine learning, artificial intelligence and data mining can help there a lot. In this paper, program for extracting address entities is presented as task of named entity recognition. The dataset for named entity recognition are USA addresses that are labeled as one of 8 labels. The model is trained in Python with Tensorflow using pretrained word vectors taken from GloVe-Global vector word embedding. The algorithm that is used is long short-term memory (LSTM) which is special type of recurrent neural network. It was very useful for this application since it takes care of context of the input data. By using this algorithm, model was able to learn how later entities are related to previous ones and thus resolve some complex examples such as differentiating between city and state with the same name


Title of the Paper: Temporal Data Version Identification using Signature Hash

 

Authors: Michal Kvet, Karol Matiaško

Pages: 89-96

Abstract: Current applications and information systems are data oriented. Temporal characteristics covers the core principle of information system intelligence. Validity frames each data state and the whole evolution is stored allowing complex analytics, decision making and processing. Management and evaluation can use various granularity models. This paper deals with unitemporal architecture using object, column and hybrid precision. It proposes new technique for dealing with existing data tuple updates forming new versions. Whereas historical state versions could be used, reliability of the whole system can be compromised. To deal with individual versions, we propose signature data hashing to identify evaluated data image.


Title of the Paper: Innovative Approach for 3D Presentation of Plane Culturally-Historical Objects by Tactile Plates for Disadvantaged Users (Low-sighted or Visually Impaired)

 

Authors: Nikolay Stoimenov, Dimitar Karastoyanov

Pages: 84-88

Abstract:The presented paper aims to create a more affordable way to present culturally-historical objects like paintings, masterpieces, tapestries, objects, artifacts, etc., and make it more accessible to visually impaired or blind people. The State of the Art of the team shows that the already used method received good feedback at the exhibition "Battle of Pavia 1525" in Pavia, Italy, from more than 11 000 people, who take part in exhibition in Italy. This encouraged the team to continue developing the idea. An approach on the base of the Bulgarian patent application named “Tactile graphical tile for visually impaired people” is described. By using innovative methods for 3D digitalization, also by using more accessible and affordable materials for 3D printing the culturally-historical objects can be presented in schools for visually impaired or blind people. By using approaches are shown how can be reduced the time for 3D digitalization. Conclusion and future developments are presented.


Title of the Paper: Software Project Management and Cost Estimation Model

 

Authors: Debnath Bhattacharyya, Tai-hoon Kim

Pages: 79-83

Abstract: Software Cost Estimation is a forecast of the cost of the sources that will be expected to complete the majority of the work of the application project. Software has a terrible ubiquity about value assessment. Enormous software undertakings have kept up to have an exceptionally awesome consistency of routine overwhelms, value invades, incredible quality issues, and general retractions. Rather than it awful reputation, it is important that some extensive software assignments are finished on time, remain within their costs, and capacity proficiently when executed. As of now another making of use methodology and items is changing the way organizations develop application. The new methods – transformative, threat motivated and collaborative application processes; fourth creation distinctive languages and application generators; Commercial off the display (COTD) and reusing roused application methodologies; accelerate database integration approaches; application adulthood projects – lead to critical profit regarding enhanced application quality and reduced application cost, hazard and process duration. In this Paper, we proposed ACEM: Advanced cost estimation model to enhance the risk identification, cost control, asset and time management.


Title of the Paper: Using Event-B Method to Model Routing Information Protocol

 

Authors: Bahija Boulamaat, Anas Amamou, Rajaa Filali, Sanae El Mimouni and Mohamed Bouhdadi

Pages: 73-78

Abstract: Event-B is a formal method used for software development, in complex system. It uses the notion of refinement step by step modeling, going from an abstract level and add more details gradually to move on to a more concrete one. This method use proof obligations rules which based on mathematical approach to prove the consistency and the correctness of the modeling. This paper presents an incremental formal modeling of the Routing Information Protocol (RIP) using event-B method. Routing Information Protocol is a standard based, distance vector, interior gateway protocol used by routers to exchange routing information among gateways and other hosts. It plays an important role providing the shortest and best path for data to take from node to node. It permits to update periodically the routing information in the RIP network.


Title of the Paper: Shortest Path Algorithms for Large Complex Networks based on Community Detection

 

Authors: Huixiong Wang, Xing Pan

Pages: 68-72

Abstract: The shortest path query is a common task in different domains, while large network scale and large amount of processing are challenging the traditional shortest path algorithms in performance and efficiency. This article proposes a shortest path algorithm which combines the traditional algorithms with community detection. In the proposed algorithm, community detection is utilized to integrate the fuzzy structure information in the network. As a result, the scale of the network is significantly reduced, which accelerates the calculation. If the algorithm is used for multiple SP query processing, the community information can be reused, leading to considerable improvement of performance. Based on the results in evaluation, it turns out that in middle (500 nodes) and large scale (1500 or 5000 nodes) BA networks, our algorithm is more efficient than traditional Dijkstra method in both single query (5%-138%) and multiple query (104%-3905%).


Title of the Paper: Correlation - between Social Relation Value and Search Pattern in Social Networks

 

Authors: GunWoo Park

Pages: 59-67

Abstract: Social Network Service (SNS) is a popular and powerful Web service to connect and/or find friends, and the tendency of a user’s interest often affects his/her friends who have similar interests. We can ‘Collective Intelligence and Social Big Data’ through the SNS. If we can track users’ preferences in certain boundaries in terms of Web searching, we can we can improve search efficiency and reliability in view of users. In this paper, we analyze correlation - between Social Relation Value and Search Pattern of web users to improve search efficiency and. Social Relation Value indicates degree of relation on latent characteristic among web users who exist in Social Networks. We calculate Social Relation Value in granting association between ‘M’ topics and ‘L’ Attributes that are applicable to ‘N’ Factors(Similarity, Adjacency, Etc.). And then, we analyze the Correlation - between Social Relation Value and Search Pattern by comparing the search result of each web users correspond to input 'Query' based on Social Relation Value calculated according to topics. Consequently, we find that Search Pattern is similar to that of web users who have high Social Relation Value. Namely, web users who have similar characteristic and interact with each other with activity in (Online) Social Networks have high Correlation. Thus, we are able to improve search efficiency and reliability when the correlation is applied to search.


Title of the Paper: Synapse Device based on Charge-Trap Flash Memory for Neuromorphic Application

 

Authors: Yu Jeong Park, Yoon Kim

Pages: 55-58

Abstract: This paper proposes a synaptic device based on charge trap flash (CTF) memory that has good CMOS compatibility and excellent reliability compared to other synaptic devices. Using hot-electron injection (HEI) and hot-hole injection (HHI), we designed the operation method to fulfill incremental-step-pulse program (ISPP). To demonstrate the ability of the device for neuromorphic, the device simulation (TCAD) and the MATLAB simulation were performed simultaneously. We also implemented the multi-level operation.


Title of the Paper: Proposal of Software System for Automatic Reaction to Network Anomalies and Real Time Data Capturing

 

Authors: Mladen Vukašinović

Pages: 48-54

Abstract: Digital forensics has a technical component, and tools in the form of appropriate software and hardware, but also a legal component aimed at respecting certain principles, rules and methodologies. There is a number of commercial tools in the market and the selection of appropriate tools depends on their usability in specific cases. This paper proposes a software tool that could be installed on the computer system. It would automatically respond to anomalies in the system and collect digital data. Such data would be stored and later used as digital forensics evidence. This paper presents the experimental results of a simulation of the network intrusion using Back Track to host and disclosure of that host using Wireshark and Netflow Analyzer.


Title of the Paper: Preschool Smart System for Autism Children

 

Authors: Maha S. Altememe, Abdel-Badeeh M. Salem

Pages: 39-47

Abstract: This paper we focus in our research in one of the environments for children between (4-6) age Special for children autism .In this project, wedesign a smart system for children with autism and we use the design of Follow up the parents of a child in an advanced learning. Additionally, design of model for information courses to the using then of facilities for teachers and kids. Finally, We would like to encourage the exchange learning the Platform external environment and the learning resources of the Interior. We also have upgrade efficiency of the teaching and open a major opportunity for student Autism.


Title of the Paper: The Use of Computational Intelligence Paradigms in Smart Software Engineering: Techniques, Applications and Challenges

 

Authors: Kariman Ramzy ElHelow, Abdel-Badeeh M. Salem

Pages: 33-38

Abstract: Computational Intelligence (CI) is an efficient paradigm for development intelligent systems. This paradigm has resulted from a synergy between cognitive computing, fuzzy sets, Rough sets, bio-inspired computing, machine learning, computer science, engineering, statistics, mathematics, physics, psychology and social sciences. Recently, many researchers have attempted to develop CI methods and algorithms to support the decision-making in different tasks and domains. There has been a recent research in the application of CI paradigms, approaches and techniques to address software engineering(SE) problems. CI offers smart models and intelligent algorithms that can contribute greatly to design formalization and automation. In this paper we clarify many important SE issues, review some of CI techniques and their applications and also highlight challenges.


Title of the Paper: Business Intelligence in the World of IoT

 

Authors: Hanaa Mohammad Said, Abdel-Badeeh M. Salem

Pages: 28-32

Abstract: A rapidly developing area in industry is the Internet of Things (IoT). In recent years numerous IoT research and application projects have been done in a joint industry university consortium or by universities. However, an important question to be further addressed is on the value creation by IoT industry applications where these applications in the sense of this paper are solutions using IoT technologies to: improve industrial manufacturing processes, create new service or supervision means for industrial installations, enable new and efficient ways to offer an optimized infrastructure, operate production plants, reduce operational cost or improve human safety in industrial areas. The present paper brings together experts from industry, academia and research offering: a view on the IoT application in industrial environments, expected evolution of IoT technology, the challenges, and the use in future factories, on connected and holistic processes. This paper is intended to contribute to an IoT supported paradigm change in industrial service, manufacturing, and over life sustainable industrial activities, how data mining methods, tools for data warehouse, and learning algorithms can be used in the context of the Internet of the Things(IoT), the decision-making process Business intelligence, Data warehousing & Data Mining, Exploration of data (laboratory), Preparation of data, Series, Regression, Clustering, Classification, Clustering and other Examples: Marketing models, logistics and production models, data envelopment analysis and the study of methods, algorithms and tools and their implementation in real systems.


Title of the Paper: Sampling - Reconstruction Algorithms of Gaussian Narrow- Band Process Realizations with an Arbitrary Number of Samples

 

Authors: V. Kazakov, F. Mendoza

Pages: 23-27

Abstract: In contrast to the well-known method of describing the sampling-recovery algorithm (SRA) of narrow-band processes, the method based on the conditional mean rule is used. This method provides the possibility of obtaining the optimal SRA when the number and location of samples are arbitrary. The basic functions (non-SINC functions) and the error recovery functions of the SRA realizations of some narrow-band Gaussian processes are investigated.


Title of the Paper: Power Management for Energy Harvesting over LEACH Protocol

 

Authors: Moner Alsader, Al Savvaris

Pages: 18-22

Abstract: Wireless Sensor Network devices are characterized by resource constraints such as computational power, memory and energy. Since these devices are powered by batteries, it may not be possible to replace batteries for recharging and therefore, energy harvesting techniques such as Piezoelectric and Thermoelectric can be used if necessary so that the lifetime of these devices can be extended. This paper presents power management for energy harvesting over LEACH protocol. Experimental results based on the NS-3 simulation platform has shown that Low Energy Adaptive Clustering Hierarchy (LEACH) routing protocol improves the energy efficiency for Piezoelectric energy harvesting in aircraft compared to that of direct simulation.


Title of the Paper: Enhanced Performance of Developed Two-Step (Hybrid/PMU) Linear State Estimator Model

 

Authors: Shaymaa M. Khamis, Nabil H. Abbasy

Pages: 11-17

Abstract: This paper proposes a novel hybrid state estimation method. In traditional EMS (Energy Management System), the ordinary hybrid state estimation technique employs both conventional measurements from the SCADA (Supervisory Control and Data Acquisition) and PMU (Phasor Measurements Unit) measurements in the state estimation software. Alternatively PMU measurements can be added through a post-processing or pre-processing step with the results of traditional state estimator to obtain the final estimation results. While this paper presents a new two-step (hybrid/PMU) algorithm where the first step adopts a hybrid state estimation SCADA/PMU and the second step is a linear state estimation comprises PMU measurements and the state vector resulting from the first step; consequently a double hybridization is achieved. Alexandria (330 km north Cairo, Egypt) 22 -bus system is used as case study. The simulation results demonstrate that the proposed algorithm enhances the precision and accuracy of state estimation greatly because the PMU measurements hybridize in two successively steps. Better dynamic behavior as compared with other state estimators is obtained.


Title of the Paper: A Review of Commutation Problem in Matrix Converter

 

Authors: Farshad Soltanian

Pages: 1-10

Abstract: Matrix converters have attractive features including their high density power and bidirectional power flow. One of the challenges of matrix converter is commutation problem. Commutation problem in matrix converter is more complex than other common converters such as AC-DC-AC converters because there isn't any natural free – wheeling path in matrix converters. In this article, different commutation methods have been considered and compared with each other such as current sign based commutation which is a base method in these converters, voltage based commutation that decreases commutation time and improved the waveforms ,and commutation circuits that it has different circuits itself that they don't need to determine the sign of current. The simulation of two methods have been proposed and compared with each other.