International Journal of Computers

ISSN: 1998-4308
Volume 11, 2017

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of NAUN Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Main Page

Submit a paper | Submission terms | Paper format


Volume 11, 2017

Title of the Paper: Adaptation of the Analysability Metric for the Automotive Domain


Authors: Yanja Dajsuren, Eric Bouwers, Harald Altinger

Pages: 139-143

Abstract: MATLAB/Simulink is a popular model-based development language for the automotive domain. When developing a software system in Simulink, subsystems are used to decompose a (sub-) system to improve its analysability. However, it has not been investigated if decomposing a system into particular number of subsystems has impact on the analysability of the Simulink models. Existing metric known as Component Balance (CB) was designed to define the optimal decomposition of a system into toplevel components. The CB metric was used to evaluate software architecture of industrial and open source software systems. Therefore, in this paper we adapt the CB metric for Simulink models. The preliminary results indicate that the CB metric provides useful input to the analysis of the Simulink analysability and the unbalanced (sub-) systems are fault-prone.

Title of the Paper: Examining the Competitive Impact of Management Capabilities and Web-Enabled Direct Procurement


Authors: Yi-Ming Tai

Pages: 131-138

Abstract: Manufacturing firms can strengthen competitive direct procurement advantages by implementing Web-enabled direct procurement and developing appropriate management capabilities. This study investigated how Web-enabled direct procurement and management capabilities influence competitive direct procurement advantage. This study conducted an empirical survey with a valid sample of 114 manufacturing companies in Taiwan to evaluate the research model of this study. The results revealed that information-sharing, commitment-building, and integrated planning capabilities significantly influence the competitive direct procurement advantage. Moreover, this study observed that Web-enabled direct procurement alone does not directly influence the competitive direct procurement advantage. Web-enabled direct procurement plays a complementary role in reinforcing the effect of management capabilities.

Title of the Paper: Hybrid Algorithm Based on Swarm Intelligence Techniques for Dynamic Tasks Scheduling in Cloud Computing


Authors: Gamal F. Elhady, Medhat A. Tawfeek

Pages: 123-130

Abstract: Cloud computing has its characteristics along with some critical issues that should be handled to improve the performance and increase the efficiency of the cloud platform. These issues are related to resources management, security, and fault tolerance. The purpose of this research is to handle the resource management problem, which is to allocate and schedule virtual machines resources of cloud computing in a way that help providers to reduce makespan time of tasks. In this paper, a hybrid algorithm is introduced for dynamic tasks scheduling over cloud's virtual machines. This hybrid algorithm merges the behaviors of three techniques from the swarm intelligence techniques that are used to find near-optimal solutions to difficult combinatorial problems. It exploits the advantages of ant colony behavior, the behavior of particle swarm and honeybee foraging behavior. Experimental results reinforce the strength of the proposed hybrid algorithm. They also prove that the proposed hybrid algorithm is the superior and outperformed ant colony optimization, particle swarm optimization and artificial bee colony algorithms.

Title of the Paper: Effective Belief Network for Cyber Security Frameworks


Authors: Issa Atoum, Ahmed Otoom

Pages: 117-122

Abstract: Cyber security frameworks are considered high level guidance for cyber security solutions. Managing the implementation of cyber security frameworks is a difficult task due to various cyber security issues related to framework interdependent components (variables). Various works identifies these variables, but it does not show their relationships. In order to reduce potential threats at an early phase in cyber security framework implementation, a clear understanding of the relationship between these variables is desired. This article proposes a causal cyber security belief network in order to facilitate frameworks execution. The resultant belief network shows that cyber security objectives are achievable with theoretical minimum threats.

Title of the Paper: IoT and Cloud Technology as Ubiquitous Computing in Case Study of Intelligent Household


Authors: Peter Papcun, Erik Kajáti, Iveta Zolotová

Pages: 103-116

Abstract: Interest in Smart Homes is growing and this trend will not change in the coming years. More and more companies offer their own smart solutions. With this rising trend, there is also bigger need for the Internet of Things (IoT) devices that can communicate with each other, can be controlled remotely and that can provide added value to standard home appliance devices. Users want to know what is happening at their homes when they are away, they want to maintain control of their households at every time. This article describes some of the solutions that can be applied to the households and describe the building of the model house to test these solutions and to apply developed IoT devices. Moreover, there are described and tested different types of cloud services based on the location of the cloud servers. Our main aim was to create educational and research model for developing new network and control architecture via modern technology with IoT concept. Various control and communication architectures will be implemented using this model. We also describe some future plans and proposals for new ways of how to use and implement IoT devices.

Title of the Paper: The Innovative Implementation of Evaluation Mechanisms on the P4G Business Game


Authors: Zacharoula Smyrnaiou, Evangelia Petropoulou, Stefano Menon, Vincenzo Zini

Pages: 93-102

Abstract: The P4G Business Game is a simulation game that has been developed in the context of the European project PLAY4GUIDANCE. In alignment with the project objectives, the P4G online interactive space in the form of a business game is addressing both theory development issues and learning purposes and meets the conditions and specifications that attain to bring the world of education and training in close contact with the job market and match school and university curricula to the market’s real needs. In this context the business game provides a basic supplement and interactive educational approach to the core curriculum of business and economic classes. In this highly engaging and motivating environment, users are trained and guided in the use of entrepreneurial, transversal and mathematical skills. What differentiates the P4G Business Game from other relevant simulation games is its innovative implementation of a set of evaluation mechanisms that are embedded in the game aiming both to assess the users’ performance and to scaffold and guide them. The evaluation tool provides users with individual tracking of their performance on every aspect of management of a company and supports them to reflect on previous decisions, review their effect, and apply critical thinking and problem-solving skills in order to improve the problematic areas. The design and development of the P4G self-evaluation tool was realized based on a set of pilot tests and research action plans on the basis of assessing (1) players’ level of the key skills and competences highlighted in the P4G matrix and (2) players’ performance in alignment with the learning objectives highlighted by the P4G Pedagogical Framework and involved all project member countries as well as target groups: unemployed, students, teachers. The findings from the testing phase have shown a positive level of reliability of the P4G Evaluation tool regarding the assessed competences and its scaffolding nature as an entrepreneurial training tool.

Title of the Paper: Conceptual Model for Cyber Intelligence Network Security System


Authors: Roumen Trifonov, Georgi Tsochev, Radoslav Yoshinov, Slavcho Manolov, Galya Pavlova

Pages: 85-92

Abstract: With the increase in the number of devices that go to work, the need to use the Internet and access to more information resources is encouraged. This, in turn, also raises the number of accidents with network and information security. Cyber crimes and cyber threats are one of the most common in our day. This article presents a conceptual model of a penetration prevention and detection system. The methods of artificial intelligence that are applicable in this system are presented. They are divided into two main groups of traditional and adaptive optimization.

Title of the Paper: Models and Simulations of Selected Multi-Pulse Rectifiers in terms of Energoelectronic Power System, Using Matlab/Simulink in Accordance with the Concept of a More Electric Aircraft


Authors: Lucjan Setlak, Rafał Kowalik

Pages: 79-84

Abstract: The work deals with the issues of new architecture in terms of power multi-pulse rectifiers based on the 12-, 24-, and 48-pulse rectifiers, compatible with the concept of a MEA. The subject of this paper is to present the analysis, the mathematical models and simulations of the operation of a advanced multi-pulse rectifiers, used in the field of energoelectronic power systems PES, both on civil aircraft of aircraft companies Airbus and Boeing (A-380 and A-350XWB, B-787), as well as on military aircrafts of Lockheed Martin (JSF F-35 and F-22 Raptor), compatible with the trend of more electric aircraft. Based on the above, in the final part of the paper the models and analysis of simulation waveforms of considered rectifiers was made and practical conclusions were drawn in terms of advanced power systems PES according to the concept of more electric aircraft.

Title of the Paper: The Issue of Cyber-Risk Insurance from the Point of View of the Valuation of the Information System in the Organization


Authors: Lukas Pavlik, Tomas Klima, Krerk Piromsopa

Pages: 73-78

Abstract: In recent years, we could see that a lot of world organizations are contested by different ways, which we are called as cyber threats or cyber risks. Many of organizations are well secured, but the most of them admitted that they are not able to successfully prevent these attacks and they tried to find other ways to mitigate the risk. The insurance market began to respond to this fact, which began offering insurance against cyber risks. Basic problem is then how the cost of insurance should be calculated and how to assess the level of client’s IT security controls and related risk. In this article, authors propose scoring model for cyber insurance that is based on the results of internal and external audits and compliance with mandatory and voluntary standards and presented some main factors, which are most likely to affected the price of organization.

Title of the Paper: Software System for Automatic Reaction To Network Anomalies and in Real Time Data Capturing Necessary for Investigation of Digital Forensics


Authors: Mladen Vukašinović

Pages: 66-72

Abstract: Digital forensics has a technical component, and tools in the form of appropriate software and hardware, but also a legal component aimed at respecting certain principles, rules and methodologies. There is a number of commercial tools in the market and the selection of appropriate tools depends on their usability in specific cases. This paper proposes a software tool that could be installed on the computer system. It would automatically respond to anomalies in the system and collect digital data. Such data would be stored and later used as digital forensics evidence. This paper presents the experimental results of a simulation of the network intrusion using Back Track to host and disclosure of that host using Wireshark and Netflow Analyzer.

Title of the Paper: Multimodalities Pain Assessment System towards Robot Based Diagnostics


Authors: Nur F. M. Rozaini, Christina Pahl, Eko Supriyanto

Pages: 60-65

Abstract: The aim of this study is to classify pain level using different modalities including Electromyography (EMG) and Electro Interstitial Scan (EIS) for the future robot based pain assessment. Eleven subjects had participated in this study with 6 of them already prescribed with pain and another 5 was a healthy subject. The survey has been conducted to access pain level using commercial Visual Analogue Scales (VAS). Data from EMG, EIS, and VAS were analyzed using a statistical method to find correlation, sensitivity, specificity and accuracy. Test results show that EMG and EIS data has a strong correlation which is 0.85. Diagnostics accuracy of using jointly EMG and EIS data in comparison with VAS data is 81.81%. Whereas using EMG only is 72.7% and EIS only is 54.55%. This is a good sign to implement the robot based EMG and EIS pain assessment.

Title of the Paper: Genetic Folding MATLAB Toolbox: Solving Santa Fe Trail Problem


Authors: Mohammad A. Mezher, Maysam F. Abbod

Pages: 54-59

Abstract: This paper is a primarily attempt to design a toolbox for Genetic Folding algorithm using MATLAB. The toolbox was designed for training ACO in solving Santa Fe Trail problem. However, GF algorithm can encode and decode any type of problem into a linearly folding scheme. For advance or even simple type of problems, a string scheme is encoding to represent a set of operators. GF is a novel algorithm in solving optimization problems as shown in the experiments. We will also illustrate the benefits of GF algorithm conducted into ACO in order finding the best feeding function in comparison with the literature.

Title of the Paper: From Embedded Systems to Cyberphysical Systems to the Internet of Things: Consequences for STEM Education


Authors: Janusz Zalewski, Dahai Guo, Robert Kenny, Xiaoxue Wang

Pages: 48-53

Abstract: With the emergence of the Internet of Things as a new technology, STEM education is facing the problem of making readjustments in several of its main assumptions and educational solutions. For example, the possibility of integrating labs in STEM disciplines becomes one of the issues being considered. This paper’s objective is to present experiences with student lab projects aiming at gradually acquiring practical programming skills in the areas of embedded computing systems, cyberphysical systems, and the Internet of Things (IoT). Three projects are described, one per each domain: Google glass as an example of an embedded system, networking a 3D printer as an example of a cyperhysical system, and using a smatwatch to collect medical data and make them available to doctors and patients, as an IoT device. The main result of the projects is a demonstration that successive introduction of gradually more sophisticated concepts into the curriculum, via the labs, is an appropriate way for the students to acquire the entire set of skills necessary for understanding and solving practical problems. This approach appears to be suitable to work across various fields in STEM education thanks to using the concept of multilevel labs, from simple demos to exercises to experiments to full development projects.

Title of the Paper: Toward Providing Some New Technologies in Smart Cities


Authors: Dragorad A. Milovanovic, Zoran S. Bojkovic

Pages: 44-47

Abstract: When dealing with new technology infrastructure of cities there are special demands concerning objects connection, people and sensors. To realize vision of smart cities different issues such as wireless technologies and mobile computing have to be taken into account and explored. First of all, the backbone are self-sustaining buildings with their energy requirements. Next, the introduction of mobile cloud computing is necessary. In order to improve the quality of service (energy, mobility, healthcare, disaster recovering) integration of mobile edge computing, and the 5G mobile networks is one practical solution. Cell-less communication is proposed to support mobile terminals in ultra-dense networks. The presentation is concluded with an outline of smart city applications types and corresponding requirements.

Title of the Paper: On the Complexity Analysis of Message Authentication and Cryptographic Protocol Implementations in Low Cost Embedded Systems


Authors: Dimitrios A. Karras

Pages: 32-43

Abstract: This paper presents an experimental analysis and discussion on implementation issues with regards to the performance of message authentication algorithms in embedded applications. Two such algorithms, namely, MD5 and SHA-1 are investigated when implemented into two different platforms: 1. 32-Bit Processors (Intel processor (Pentium III processor at 1000 MHz)) 2. 8-bit microcontrollers ( like PHYTEC miniMODUL-537) Computational Complexity as well as CPU-processing time results, regarding the performance of these algorithms, both in the 32-bit processors case as well as in the 8-bit processors case are presented. The CPU-processing time results show that such algorithms could be easily incorporated in embedded applications relying on 8-bit microcontrollers and requiring data integrity assurance and data origin authentication. Such applications could involve electronic mail, system monitoring, data mining, biometric security, secure data communications etc. Although NIST has presented similar analyses regarding cryptographic algorithms [1], algorithms aimed on the other hand at data authentication and security protocols implementation have not been investigated in this context. This is precisely the goal and the contribution of this paper.

Title of the Paper: Hiding the SSH Port via Smart Port Knocking


Authors: Antonios S. Andreatos

Pages: 28-31

Abstract: A good security practice in web servers is to de-activate services when not needed in order to reduce the so-called attack surface. For this purpose, port-knock software has been developed; port-knock software hides a specific port (in our case, the SSH port) until a specific port sequence happens. A port-knock software for Linux servers is knockd. A knockd server listens to all traffic on an Ethernet interface, looking for special knock sequences of port-hits. This paper proposes an advanced port-knocking mechanism based on a Pseudo-Random Number Generator and a Chaotic Random Number Generator which produces proper pseudo-random knock sequences. The proposed mechanism produces different sequences each time and is highly parameterizable.

Title of the Paper: Biometric Cryptosystems vs Traditional Cryptosystems


Authors: Mirella Amelia Mioc

Pages: 23-27

Abstract: Since the beginning of civilization, the identification of a person was crucial. Security, government, communication, transportation, health care, finance and others needs to have this person identification as an integral part of the infrastructure. In traditional cryptosystems, user authentication is based on possession of secret keys, but this keys can be stole, forgotten or lost, so providing non-repudiation. Biometric authentication systems based on physiological and behavioral characteristics of a person may replace the authentication component of traditional cryptosystems. A cryptographic key can be bind with the biometric template of a user stored in the database in such a way that the key cannot be used without a biometric authentication. Traditional methods of personal recognition can be used for identification or verification of identity and so obtaining an increasing security and convenience. A brief overview of biometric methods will be presented in this paper.

Title of the Paper: Performance Evaluation of High Efficiency Video Coding (HEVC) Test Model HM-16.12 vs. HM-16.6


Authors: Zoran M. Milicevic, Zoran S. Bojkovic

Pages: 18-22

Abstract: High Efficiency Video Coding (HEVC) as a standard introduced by ITU-T Video Coding Experts Group (VCEG) and ISO/IEC Moving Picture Experts Group (MPEG) was first approved in 2013 in the ITU-T as Recommendation H.265 and ISO/IEC as International Standard 23008-2. This standard offers a new degree of compression capability for a great variety of applications and recently, it has been extended in some important ways to broad scope. In an attempt to continue with an analysis performance of different versions of HM software test models in different environments, two models HM-16.12 and HM-16.6 are compared through three fundamental parameters: signal-to-noise ratio, bit rate and time saving, while two test sequences in different resolutions are processed. Beside objective results, subjective video assessments for all tested sequences are presented, too.

Title of the Paper: Multi-Agent Model for Job Scheduling in Cloud Computing


Authors: Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem

Pages: 11-17

Abstract: Many applications are turning to Cloud Computing to meet their computational and data storage needs. Effective Cloud Computing is possible, however, only if resources are scheduled well. Nowadays, Internet of Things (IoT) paradigms, management of such huge number of job processing systems is a challenging problem. In addition, heterogeneity is a typical characteristic of today’s cloud (caused by incremental upgrades and combinations of computing architectures). This paper presents a multi-agent model for job scheduling in Cloud Computing Systems. We created a model based on the multi-agent systems paradigm. Then we got the model executed in NetLogo and the simulation input is Google Cluster Workload Traces data set. The model consist of group of autonomous agents and has an ability to cooperate with the other agents in the system. Due to these abilities of agents, the structure of the system is more suitable to handle dynamic changes and load as number of machines and requests increase. We compare different parameters for the scheduling model for hybrid and proposed multi-agent based architecture. Our simulation results indicate that a distributed architecture with multi-agent system and local blackboards for agent groups holding the cluster state yield 30% better average end-to-end resource utilization and 10% delay performance than the hybrid architecture.

Title of the Paper: Decoding-Assisted Inter Prediction for HEVC


Authors: Yi-Sheng Chang, Yinyi Lin

Pages: 6-10

Abstract: In this paper, we suggest a decoding-assisted inter prediction algorithm for HEVC to improve its coding performance. In the proposed algorithm, both sum of absolute bi-directional prediction differences (SABPD) and template matching (TM) operations are employed to help merge mode decision and inter mode decision in HEVC. The experimental results reveal that the proposed algorithm outperforms the inter prediction proposed in HEVC, and the results demonstrate that average 2.2% BDBR reduction can be achieved with 11% increase of encoding time, compared to the original HEVC inter prediction.

Title of the Paper: Intelligent Methodology for Brain Tumors Classification in Magnetic Resonance Images


Authors: Heba Mohsen, El-Sayed A. El-Dahshan, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem

Pages: 1-5

Abstract: Recently, a lot of researches have been made in the area of automatic detection and diagnosing the brain tumor type based on different medical imaging techniques. This paper presents a new intelligent methodology applying k-means segmentation technique and a hybrid support vector machine (SVM) classifier based on Linear-SVM and Multi-SVM using two feature extraction techniques, namely : Gray level co-occurrence matrix (GLCM) and discrete wavelet transform (DWT) followed by Principle component analysis (PCA) to detect brain tumors in brain magnetic resonance images (MRIs) and differentiate between three types of malignant brain tumors: glioblastoma, sarcoma and metastatic bronchogenic carcinoma. The results of the two feature extraction techniques were compared according to their accuracy, sensitivity and specificity showing good results and high robustness.