SlideShare a Scribd company logo
1 of 35
Download to read offline
January 2024-Top 10 Read Articles in
AdvancedComputing
Advanced Computing: An International
Journal ( ACIJ )
ISSN: 2229 -6727 [Online] ; 2229 - 726X [Print]
https://airccse.org/journal/acij/acij.html
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
M. MaryShanthi Rani1, K.Rosemary Euphrasia2
1Dept. of Comp. Sci. and Applications, Gandhigram Rural Institute, Deemed University
Gandhigram, TamilNadu. India.
2Department of computer Sci., Fatima College, Madurai, TamilNadu. India.
ABSTRACT
The art of information hiding has become an important issue in the recent years as security of
information has become a big concern in this internet era. Cryptography and Steganography play major
role for secured data transfer. Steganography stands for concealed writing; it hides the message inside
a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response)
Codes are 2-dimensional bar codes that encode text strings. They are able to encode information in both
vertical and horizontal direction, thus able to encode more information. In this paper a novel approach
is proposed for secret communication by combining the concepts of Steganography and QR codes. The
suggested method includes two phases: (i) Encrypting the message by a QR code encoder and thus
creating a QR code (ii) Hiding the QR code inside a colour image. This hiding process embeds the
quantised QR code so that it will not make any visible distortion in the cover image and it introduces
very minimum Bit Error Rate (BER). Experimental result shows that the proposed method has high
imperceptibility, integrity and security.
KEYWORDS
Steganography, QR code, BER
Volume URL: http://airccse.org/journal/acij/vol7.html
Full Article: https://aircconline.com/acij/V7N2/7216acij01.pdf
REFERENCES
[1] Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013,
Norwegian University of Science and Technology
[2] Kinjal H. Pandyaand Hiren J. Galiyawala, 2014.” A Survey on QR Codes: in context of Research
and Application”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4
Issue 3.,pp. 258-262Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June
2013, Norwegian University of Science and Technology
[3] QRStuff. QR Code Error Correction, 2011. QRStuff blog:http://www.qrstuff.Com
/blog/2011/12/14/QR-code-error-correction.
[4] Law, C. & So, S., 2010. “QR codes in education. Journal of Educational Technology Development
and Exchange”, Vol. 3 Issue 1, pp. 85-100
[5] Shruti Ahuja, 2014. ” QR Codes and Security Concerns”, International Journal of International
Journal of Computer Science and Information Technologies, Vol. 5 Issue 3 pp. 3878-3879
[6] Akshara Gaikwad et al, 2015. “Information Hiding using Image Embedding in QRCodes for
Colour Images: A Review”, International Journal of Computer Science and Information Technologies,
Vol. 6 Issue 1,pp. 278-283
[7] Dipika Sonawane et al., 2014. “QR based Advanced authentication for all hardware platforms
“International Journal of Scientific and Research Publications, Vol. 4(1) pp.1-4
[8] www. The-qrcode-generator.com
[9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx
[10] M. Mary Shanthi Rani and K.Rosemary Euphrasia, 2015. “Dynamic Hiding of Message in RGB
Domain based on Random Channel Indicator”, International Journal of Applied Engineering
Research, Vol.10 No.76., pp. 478-483
**********************************************************************************
SECURE CLOUD ARCHITECTURE
Kashif Munir1 and Prof Dr. Sellapan Palaniappan2
1 School of Science and Engineering, Malaysia University of Science and Technology, Selangor,
Malaysia
2 School of Science and Engineering, Malaysia University of Science and Technology, Selangor,
Malaysia.
ABSTRACT
Cloud computing is set of resources and services offered through the Internet. Cloud services are
delivered from data centers located throughout the world. Cloud computing facilitates its consumers by
providing virtual resources via internet. The biggest challenge in cloud computing is the security and
privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data
and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures
need to be developed so that organizations can be assured of security in their businesses and can choose
a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for
users to access the required services at any time on pay-per-use pattern. However this technology is still
in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users
from trusting it. Various malicious activities from illegal users have threatened this technology such as
data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result
into damaging or illegal access of critical and confidential data of users. In this paper we identify the
most vulnerable security threats/attacks in cloud computing, which will enable both end users and
vendors to know a bout the k ey security threats associated with cloud computing and propose relevant
solution directives to strengthen security in the Cloud environment. We also propose secure cloud
architecture for organizations to strengthen the security.
KEYWORDS
Cloud Computing; Security and Privacy; Threats, Vulnerabilities, Secure Cloud Architecture.
Volume URL: https://airccse.org/journal/acij/vol4.html
Full Article: https://airccse.org/journal/acij/papers/4113acij02.pdf
REFERENCES
[1] "Swamp Computing" a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved
2010- 01-25.
[2] "Thunderclouds: Managing SOA-Cloud Risk", Philip Wik". Service Technology Magazine. 2011-
10. Retrieved 2011-21-21.
[3] What cloud computing really means. InfoWorld.
http://www.infoworld.com/d/cloudcomputing/what-cloud-computing-really-means-031?page=0,0
[4] Mell P, Grance T (2011) The nist definition of cloud computing (draft).
http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf
[5] Ponemon (2011) Security of cloud computing providers study. http://www.ca.com/~/media/Files/
IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf
[6] Software as a service-Wikipedia. Wikipedia. http://en.wikipedia.org/wiki/Software_as_a_service
[7] A. Tripathi and A. Mishra, “Cloud computing security considerations” IEEE Int. conference on
signalprocessing, communication and computing (ICSPCC), 14-16 Sept., Xi'an, Shaanxi, China, 2011
[8] Vadym Mukhin, Artem Volokyta, “Security Risk Analysis for Cloud Computing Systems” The 6th
IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems:
Technology and Applications, Prague, Czech Republic, 15-17 September 2011
[9] Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International
Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 31 May -3
June 2011
[10]R. La‘Quata Sumter, ―Cloud Computing: Security Risk Classificationǁ, ACMSE 2010, Oxford,
USA [9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx
[11]Meiko Jensen ,Jorg Sehwenk et al., “On Technical Security,Issues icloud Computing ”IEEE
International conference on cloud Computing, 2009.
[12]M.Jensen ,N.Gruschka et al., “The impact of flooding Attacks on network based
services”Proceedings of the IEEE International conference on Availiabilty,Reliability and Security
(ARES) 2008.
[13] Armbrust ,M. ,Fox, A., Griffth, R., et al “Above the clouds: A Berkeley View of Cloud Computing”
, UCB/EECS-2009-28,EECS Department University of California Berkeley, 2009
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
[14] Wayne A. Jansen, ―Cloud Hooks: Security and Privacy Issues in Cloud Computingǁ, 44th Hawaii
International Conference on System Sciesnces 2011.
[15] Rituik Dubey et al., “Addressing Security issues in Cloud
Computing”http://www.contrib.andrew.cmu.edu/~rdubey/index_files/cloud%20com puting.pdf
[16]M. Okuhara et al., “Security Architecture for Cloud Computing”,
www.fujitsu.com/downloads/MAG/vol46-4/paper09.pdf
[17] “A Security Analysis of Cloud Computing” http://cloudcomputing.sys- con.com/node/1203943
[18] “Cloud Security Questions? Here are some
answers”http://cloudcomputing.syscon.com/node/1330353
[19]Cloud Computing and Security –A Natural Match, Trusted Computing Group(TCG)
http://www.trustedcomputinggroup.org
[20] “Controlling Data in the Cloud:Outsourcing Computation without outsourcing Control
http://www.parc.com/content/attachments/ControllingDataInTheCloud- CCSW-09.pdf
[21] “Amazon Web services: Overview of Security processes “ September 2008
http://aws.amazon.com
[22]T. Schreiber, “Session Riding a Widespread Vulnerability in Today'sWeb Applications” [Online],
Available: http://www.securenet.de/papers/Session_Riding.pdf, white paper, 2004. [Accessed: 20-Jul-
2011].
[23]J., Grimes, P., Jaeger, J., Lin, “Weathering the Storm: The Policy Implications of Cloud
Computing” [Online], Availablehttp://ischools.org/images/iConferences/CloudAbstract13109F
INAL.pdf , [Accessed: 19-Jul-2011].
[24]B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,”
Security & Privacy, IEEE, vol. 9, no. 2, pp.50-57, 2011.
[25]A., Greenberg, “Why Cloud Computing Needs More Chaos”
[Online],Available:http://www.forbes.com/2009/07/30/cloud-computing- security-technology-
cionetwork-cloud-computing.html, 2009, [Accessed: 20-Jul-2011].
[26] Top 7 threats to cloud computing. HELP NET SECURITY.
http://www.netsecurity.org/secworld.php?id=8943
[27] Rion Dutta, ”Planning for Single SignOn”, White Paper, MIEL e- Security Pvt
[28]M. Armbrust, et al., A view of cloud computing. Commun. ACM. vol. 53 (2010), pp. 50-58
[29]Miranda Mowbray and Siani Pearson, A client-based privacy manager for cloud computing. In Proc.
Fourth International Conference on Communication System Software and Middleware (ComsWare),
Dublin, Ireland, 16-19 June 2009.
NEO4J, SQLITE AND MYSQL FOR HOSPITAL LOCALIZATION
Anu Sebastian1 , Richa Kuriakose2 , Surekha Mariam Varghese3
Department of Computer Science and Engineering, M.A College of Engineering,
Kothamangalam, Kerala, India
ABSTRACT
Graphs are efficient ways to visualize and represent real world data. Solutions to many real time
scenarios can be easily provided when there is powerful graph databases like neo4j that can be used to
efficiently query the graphs with multiple attributes. For instance, querying a system with medical and
hospital data can be used to address the problem of location wise medical decision making. Here in this
paper we present a neo4j as a solution to medical query.
KEYWORDS
Graph databases, MySQL, SQLite, cypher query language, Neo4j, Relational databases.
Volume URL: http://airccse.org/journal/acij/vol7.html
Full Article: https://aircconline.com/acij/V7N3/7316acij03.pdf
REFERENCES
[1] Shalini Batra, Charu Tyagi. Comparative Analysis of Relational And Graph Databases.
International Journal of Soft Computing and Engineering (IJSCE), 2(2), May 2012.
[2] Renzo Angles And Claudio Gutierrez.” Survey of Graph Database Models”ACM Computing
Surveys, Vol. 40, No. 1, Article 1, Publication date: February 2008.
[3] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and
analysis of online social networks. The 5th ACM/USENIX Internet Measurement Conference,
2007.
[4] “NOSQL Databases”, http://nosql-database .org/
[5] “Neo4j,” http://neo4j.org/.
[6] Neo4jmanual, Internet: http://docs.neo4j.org/chunked/stabl e/graphdb-neo4jnodes. html ,2010
[7] J. Paredaens and B. Kuijpers, “Data Models and Query Languages for Spatial Databases,”
Data & Knowledge Engineering (DKE), vol. 25, no. 1-2, pp. 29–53, 1998
[8] P. Urb ´ on, “Nosql graph database matrix,” http://nosql.mypopescu.com/post/619181345
/nosqlgraph-databasematrix, May 2010.
[9] “Short overview on the emerging world of graph
databases,”http://www.graphdatabase.org/overview.html
[10] Michael Owens, The Definitive Guide to SQLite, USA: Apress, 2006, 341-362.
[11] SQLite homepage [EB/OL] ,http://www.sqlite.org.
[12] Florian Holzschuher, Prof. Dr. René Peinl. Performance of Graph Query Languages: Comparison
of Cypher, Gremlin and Native Access in Neo4j.EDBT/ICDT 13March 18 - 22 2013.e
[13] Szabolcs Rozsnyai, Aleksander Slominski, Yurdaer Doganata.Large-Scale Distributed Storage
System for Business Provenance.Cloud Computing (CLOUD), IEEE International Conference,2011.
[14] Ilya Katsov. NoSql Data Modeling Techniques. March 2012.
[15] Ian Robinson, Jim Webber, Emil Eifrem. Graph Databases(Early release revision 1).O̓ Reilly
Media, Inc., 02-25 2013.
[16] Apache Software Foundation.Home.http://zookeeper.apache.org, 2013.
[17] Yanmei Huo, Hongyuan Wang, Liang Hu, Hongji Yang. A Cloud Storage Architecture Model
for Data-Intentsive Applications. 2011.
EFFECTIVE WAYS CLOUD COMPUTING CAN CONTRIBUTE TO EDUCATION
SUCCESS
BV Pranay kumar1, Sumitha kommareddy2, N.Uma Rani3
1Department of information technology, CJITS, Jangaon, Warangal.
2Department of information technology, CJITS, Jangaon, Warangal.
3Department of computer science and engineering ,CJITS, Jangaon, Warangal.
ABSTRACT
Cloud computing and education sounds ambiguous on the face of it. Naturally, it’s because, very few
individuals, publishers and users alike come from the education sector. In most cases, cloud computing
is only associated with businesses and how they can leverage their efficiencies. Just to introduce how
the cloud deserves a place in our current education institution, it’s important to reiterate the education
philosophy. Its essence is knowledge. It’s this knowledge which brings advancement, achievement and
success. However, there are several things which make these parameters unattainable. In blunt language,
this is failure. Small classrooms, lack or resources, short- handed staff, lack of adequate teachers…the
list is endless. One way or the other, cloud computing can be utilized to improve education standards
and activities. The end result will be to curb the above problems and instead, boost performance.
KEYWORDS
Cloud Computing, Web service, Virtualization, Grid Computing, Virtual Computing Lab, Higher
education institutions, Remote areas.
Volume URL: https://airccse.org/journal/acij/vol4.html
Full Article: https://airccse.org/journal/acij/papers/4413acij02.pdf
REFERENCES
[1] C. Justin, B. Ivan, K. Arvind and A. Tom, Seattle: A Platform for Educational Cloud Computing,
SIGCSE09, March 37, 2009, Chattanooga,Tennessee, USA, 2009.
[2] P. Shanthi Bala, INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND
CRISIS OF DATA SECURITY IN PUBLIC CLOUDS, (IJCSE) International Journal on Computer
Science and Engineering Vol.02, No. 03, 2010, 741-745. 2007.
[3] M. Armbrust, et al, Above the clouds: A Berkeley view of Cloud Computing, UC Berkeley EECS,
2009.
[4] S. Al Noor, G. Mustafa, S. Chowdhury, Z. Hossain, and F. Jaigirdar, A Proposed Architecture of
Cloud Computing for Education System in Bangladesh and the Impact on Current Education System,
(IJCSNS) International Journal of Computer Science and Network Security, VOL.10 No.10. 2010.
[5] M. Luis, R. Luis, C. Juan and L. Maik, A Break in the Clouds: Towards a Cloud Definition, ACM
SIGCOMM Computer Communication Review, Volume 39, Number 1. 2005.
[6] Cloud Computing Articles. Cloud Computing Education,
http://www.code2cloud.com/cloudcomputing-education/
[7] Cloud Computing Articles, SaaS+PaaS+IaaS. Free Cloud Apps for Educational Institutes: Schools,
Colleges, Universities, http://www.technopulse. com/2010/08/free-cloud-apps-
educationalinstitutes.html/
[8] IBM Academic Initiative. Cloud computing: Delivering Internetbased information and technology
services in real time, https://www.ibm.com/developerworks/university/cloud/
[9] IBM Sales and Distribution - Solution Brief for Education. IBM Cloud Academy Education for a
smarter planet, ftp://dispsd-40-www3.boulder.ibm.com/
[10] R. CJB and N. Evans. A PROPOSAL FOR THE ADOPTION AND USE OF CLOUD
COMPUTING IN SECONDARY EDUCATION IN SOUTH AFRICA, 11th DIS Annual Conference
2010, 2nd 3rd September,Richardsbay, University of Zululand, South Africa, 2010.
[11] THE ABC’S OF ENGINEERING EDUCATION: ABET, BLOOM’S TAXONOMY,
COOPERATIVE LEARNING, AND SO ON
[12] K. Youry and V. Volodymyr. Cloud Computing Infrastructure Prototype for University
Education and Research, WCCCE ’10, May 78, 2010, Kelowna, Canad, 2010.
[13] M. Grimes, T. Jaeger and J. Lin. Weathering the Storm: The Policy Implications of Cloud
Computing, iConference, 2009.
[14] Microsoft Education Cloud Computing. The most comprehensive solutions for the cloud. On
earth, http://www.microsoft.com/en-us/cloud/
[15] Microsoft in Education — IT solutions. Microsoft Live@edu,
http://www.microsoft.com/education/en-us/solutions/Pages/liveedu.aspx/
[16] R. Elumalai and V. Ramachandran. A Cloud Model for Educational e-Content Sharing, European
Journal of Scientific Research, ISSN 1450-216X Vol.59 No.2, pp.200-207. 2011.
[17] N. Sultan. Cloud computing for education: A new dawn?, International Journal of Information
Management, 109116, 30 2010.
[18] M. Victoria, and D. Brbara. Cloud computing for education: A new dawn?, A design of a
postgraduate course on Google Apps based on an Institutional Personal Learning Environment (iPLE).
[19] Amazon Web Services. Overview of Amazon Web Services, http
:==media:amazonwebservices:com=AWSOverview:pdf=
[20] X. Dong and L. Hui. Reviewing some Cloud Computing Platforms, ISBN 978-952-5726-09-1,
Proceedings of the Second International Symposium on Networking and Network Security (ISNNS 10),
Jinggangshan, P. R., pp. 161-164, China. 2010.
[21] An Amazon Web Services Case Study. Migrating Applications to the Cloud,
http://www.cloudcomputingcourse.com/
[22] Amazon Web Services. AWS in Education, http://aws.amazon.com/education/
[23] MC Graw Hill. Cloud Computing Basics, Chapter 1.
[24] IBM. New IBM Cloud Services to Address Education Challenges,
http://www03.ibm.com/press/us/en/pressrelease/34642.wss/
[25] IBM Global Technology Services, Getting cloud computing right,
http://www05.ibm.com/de/cloud/pdf/Gettingcloudcomputingright.pdf/
[26] IBM Sales and Distribution, Education, Solution Brief. IBM Virtual Computing Lab Solutions
for Cloud, Solution Brief.
[27] salesforce foundation. salesforce for Higher Education,
http://www.salesforcefoundation.org/product/
[28] HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most
complete cloud system for enterprises and service providers, Hewlett-Packard Development Company.
2011.
[29] Amanda & Zmanda. Amanda and Zmanda Applications, http://www.zmanda.com/
[30] Zmanda Cloud Backup. Zmanda Cloud Backup for Windows,
http://www.zmanda.com/cloudbackup.html/
[31] Cloud Computing. Risk of Cloud Computing in Universities, http :
==www:istf:jucc:edu:hk=newsletter=IT03=IT 3CloudComputing:pdf=
[32] Microsoft, Education al in. Cloud Computing from Microsoft - Empowering Education through
Choice, https://partner.microsoft.com/NZ/40142863/
[33] P. Thomas. Cloud Computing: A potential paradigm for practicing the scholarship of teaching
and learning, Centre for Academic Development, University of Botswana.
[34] Microsoft, Cloud Computing Web Site. Cloud Computing in Education,
http://www.edutechhosting.co.uk/
[35] A Microsoft U.S. Education white paper. Cloud computing in education Savings, flexibility, and
choice for IT, http://www.microsoft.com/educloud/
[36] V. Toby, V. Anthony and E. Robert. Cloud Computing, A Practical Approach, ISBN-13: 978-0-
07- 162694-1, 353 Pages. 2009.
[37] R. Herrick. Google This! Using Google Apps for Collaboration and Productivity, SIGUCCS09,
October 1114, 2009, St. Louis, Missouri, USA. 2009.
[38] GOOGLE APPS EDUCATION EDITION. Google Apps Education Edition: communication,
collaboration, and security in the cloud, http://www.google.com/a/edu/
[39] A. Vouk. Cloud Computing Issues, Research and Implementations, Journal of Computing and
Information Technology - CIT 16, 2008, 4, 235246, doi:10.2498/cit.1001391. 2008.
[40] Amazon Web Services (AWS) Web Site. What is AWS - A comprehensive cloud computing
platform, http://aws.amazon.com/what-is-aws/
[41] Amazon Web Services, Case Study. Application Hosting,
http://aws.amazon.com/solutions/casestudies/
[42] Amazon Web Services (AWS), EC2 Web Site. Amazon Elastic Compute Cloud (Amazon EC2),
http://aws.amazon.com/ec2/
[43] AWS Case Study: Educations.com, Web Site. AWS Case Study: Educations. com,
http://aws.amazon.com/solutions/case-studies/educationscom/
[44] D. Jiabin. Virtualization, Application Streaming and Private Cloud Computing in a Training
Laboratory, JOURNAL OF SOFTWARE, VOL. 5, NO. 11,doi:10.4304/jsw.5.11.1306-1313. 2010.
[45] N. Sclater. CLOUD COMPUTING IN EDUCATION: POLICY BRIEF, UNESCO Institute for
Information Technologies in Education. 2010.
[46] Cloud-onomics in education, IBM Cloud Academy, Web Site. Cloud 9: Future Compatible
Computing in Education, http://www.ibm.com/ibm/files/T641866T23726I58/EBE03001USEN.PDF/
[47] Silanis e-SignLive Services. Software-as-a-Service (SaaS) e-Signature Service,
http://www.eignlive.com/services.html/
[48] Salesforce.com foundation, Higher Education Solution. Taking higher education to a higher
level, http://www.salesforcefoundation.org/products/discounts/higher-ed/
[49] Salesforce:com foundation, Higher Education. The Real Time Cloud for Higher Education,
http://www.salesforcefoundation.org/
[50] Cloud Computing Applications Web Site. Cloud Computing Applications and Services in
Education, http://www.shaswatpatel.com/
[51] Microsoft News Center. Windows Azure and the Azure Services Platform: Making Microsofts
Software-plus-Services Vision a Reality,
http://www.microsoft.com/presspass/features/2008/oct08/10-27pdcfeature1.mspx/
[52] Computing Edge. Analyzing the Differences between Cloud Computingand Virtualization,
http://computinged.com/insights/
[53] VCL Web Site. VCL Conceptual Overview Diagram, https://cwiki.apache.org/VCL/
[54] Understanding Cloud Computing in Education - Web Site. VCL Conceptual Overview Diagram,
http://kasunpanorama.blogspot.com/2010/07/understanding-cloudcomputing- feel-easy.html/
[55] T. Harris. Cloud Computing Services - A comparison, http://www.thbs.com/
[56] IBM Cloud Academy. Education for a Smarter Planet:Cloud Computing in Education,
http://www.cetpa-k12.org/
**********************************************************************************
FDTD COMPUTATION FOR SAR INDUCED IN HUMAN HEAD DUE TO
EXPOSURE TO EMF FROM MOBILE PHONE
Ashraf A. Aly1 and Melinda Piket-May2
1Department of Information Technology, Al Khawarizmi College, UAE
2Departement of Electrical and Computer Engineering, University of Colorado at Boulder,
USA
ABSTRACT
This aim of this paper is to investigate the specific absorption rate (SAR) distribution in a human head
by using the finite-difference time-domain (FDTD) calculations, due to exposure to EMF radiation from
a mobile phone at frequencies 900 MHz Mobile Phone model with a λ/2 monopole antenna and a hand
head phone model dimensions are 100 mm x 50 mm x 20 mm. The head model used is a sphere with a
diameter of 18 cm. The FDTD grid size used in the computation was 2.5 mm. The distance between the
antenna and head was 5 mm. To simplify the FDTD simulation, the SAR in the head was calculated
without the effect of the human body. It was found that the SAR induced in the head decreases with the
distance from the radiating source.
KEYWORDS
Specific Absorption Rate, Finite-Difference Time-Domain, Mobile Phone
Volume URL: https://airccse.org/journal/acij/vol5.html
Full Article: https://airccse.org/journal/acij/papers/5614acij01.pdf
REFERENCES
[1] Mushtaq, A. Bhat., and Vijay, K., (2013) "Calculation of SAR and Measurement of Temperature
Change of Human Head Due To The Mobile Phone Waves At Frequencies 900 MHz and 1800 MHz",
Advances in Physics Theories and Applications, Vol.16, ISSN 2225-0638.
[2] Adheed, H. S., (2012) "A Theoretical Approach for SAR Calculation in Human Head Exposed to
RF Signals", Journal of Engineering and Development, Vol. 16, No.4, ISSN 1813- 7822304.
[3] Luan, A., Mimoza, I., and Enver, H., (2010) "Computation of SAR Distribution in a Human
Exposed to Mobile Phone Electromagnetic Fields", PIERS Proceedings, Xi’an, China, 22–26.
[4] Hardell, L., Carlberg, M., Hansson, K. (2011) "Pooled of case - control studies on malignant brain
tumours and the use of mobile and cordless phones including living and deceased subjects".
International Journal of Oncology, 38(5):1465–1474.
[5] Adair, E., Kelleher, R., Mack, W., Morocco, S. (1998) "Thermophysiological responses of human
volunteers during controlled whole - body radio frequency exposure at 450 MHz". Bio electro
magnetics, 19:232–245.
[6] Schwan, H.P., (1985) "Biophysical principles of the interaction of ELF fields with living matter".
Publ. Plenum Press, New York.
[7] Montaigne, K., and Pickard, F., (2005) "Offset of the vacuolar potential of Characean cells in
response to electromagnetic radiation over the range 250 Hz - 250 kHz", Bioelectromagnetics, Volume
5, Issue 1, pages 31–38.
[8] Foster, K. R. (2000) "Thermal and Nonthermal Mechanisms of Interaction of Radio- Frequency
Energy with Biological Systems", IEEE Trans Plasm Sci 28:15-17.
[9] Frohlich, K., Nancy, R., Richmond, C. (2006) "Health disparities in Canada today: Some
evidenceand a theoretical framework", Health Policy, 79 -132–143.
[10] Pokorny, P. F., Almeida, E. C., Melo, and Vaz, W. (1998), "Kinetics of Amphiphile Association
with Two - Phase Lipid Bilayer Vesicles", IX Congresso Nacional de Bioquímica, P10-10. Tomar.
[11] Akleman, F., and Sevgi, L., (1998) "FDTD Analysis of human head - mobile phone interaction in
terms of specific absorption rate calculations and antenna design", IEEE- APS Conference, Antennas
and propagation for wireless communication, vol. 1. pp. 85- 88.
[12] Dimbylow, J., and Gandhi, O. P. (1991) “Finite-difference time-domain calculations of SAR in a
realistic heterogeneous model of the head for plane - wave exposure from 600 MHz to 3 GHz,” phys
.Med . Biol., vol. 36, pp. 1075-1089.
[13] Yee, K. S. (1966) "Numerical solution of initial boundary value problems involving Maxwell's
equations in isotropic media,'' IEEE Trans. Antennas Propagat., vol. 14, pp. 302-307.
[14] Taflove, A. (1988) "Review of the formulation and applications of the finite - difference
timedomain method for numerical modeling of electromagnetic wave interactions with arbitrary
structures'', Wave Motion, vol. 10, no. 6, pp. 547-582.
[15] Holland, R., Simpson, L., and Kunz, K. (1980) "Finite - difference analysis of EMP coupling to
lossy dielectric structures, '' IEEE Trans. Electromagn. Compat, vol. EMC- 22, pp. 203-209.
[16] Merewether, D. E., Fisher, R., and Smith, F. W. (1980) "On implementing a numeric Huygen's
source scheme in a finite difference program to illuminate scattering bodies,'' IEEE Trans. Nucl. Sci.,
vol. 27, pp. 1829-1833.
[17] Holland, R., and Williams, J. W. (1993) "Total - field versus scattered - field finite - difference
codes: A comparative assessment,'' IEEE Trans. Nucl. Sci., vol. NS-30, pp. 4583-4588. [18] Kunz, K.
S., and Luebbers, R. J. (1993) "The Finite Difference Time Domain Method for Electromagnetics",
Boca Raton, FL: CRC Press.
[19] Fang, J. (1989) "Time Domain Finite Difference Computation for Maxwell's Equations", PhD
thesis, University of California at Berkeley, Berkeley, CA.
[20] Kurt, L., Shlager., and John, Schneider, B. (1998) “A Survey of the Finite - Difference
TimeDomain Literature”, www.fdtd.org / Bibtex-db / survey-199 -html / survey.html.
[21] Yee, The Yee Method” available at www. nada.kth.se/~ulfa/CEM.html.
[22] G. Grimes & F. Barnes, (1973) “A technique for studying chemotaxis of leukocytes in
welldefined chemotactic fields”, Experimental Cell Res.,vol. 79, pp. 375–385.
[23] F. Barnes & Y. Kwon, (2005) “A theoretical study of the effects of RF field gradients in the
vicinity of membranes”, J. Bioelectromagn., vol. 26, no. 2, pp. 118–124.
[24] Ashraf A. Aly, Safaai Bin Deris, Nazar Zaki, “Research Review For Digital Image Segmentation
Techniques.International Journal of Computer Science & Information Technology (IJCSIT).Vol 3, No
5, Oct 2011.
[25] Ashraf A. Aly, Safaai Bin Deris, Nazar Zaki, "The Effects on Cells Mobility Due to Exposure to
EMF Radiation", Advanced Computing: An International Journal (ACIJ), Vol.2, No.4, July 2011.
[26] Ashraf A. Aly, and Frank S. Barnes, Effects of 900 - MHz Radio Frequencies on the Chemotaxis
of Human Neutrophils in Vitro, IEEE Transactions On Biomedical Engineering, Vol. 55, No. 2,
February 2008.
[27] Campion EW, “Power lines, Cancer, and Fear.” The New England journal of medicine, 337.1 : 44-
6, 1997. [28] Inskip PD,Tarone RE, Hatch EE,“Cellular telephone use and brain tumors,” N. Engl J
Med, 344:79- 86, 2001.
**********************************************************************************
AN APPROACH FOR BREAST CANCER DIAGNOSIS CLASSIFICATION USING
NEURAL NETWORK
Htet Thazin Tike Thein1 and Khin Mo Mo Tun2
1 Ph.D Student, University of Computer Studies, Yangon, Myanmar
2Department of Computational Mathematics, University of Computer Studies, Yangon,
Myanmar
ABSTRACT
Artificial neural network has been widely used in various fields as an intelligent tool in recent years,
such as artificial intelligence, pattern recognition, medical diagnosis, machine learning and so on. The
classification of breast cancer is a medical application that poses a great challenge for researchers and
scientists. Recently, the neural network has become a popular tool in the classification of cancer
datasets. Classification is one of the most active research and application areas of neural networks.
Major disadvantages of artificial neural network (ANN) classifier are due to its sluggish convergence
and always being trapped at the local minima. To overcome this problem, differential evolution
algorithm (DE) has been used to determine optimal value or near optimal value for ANN parameters.
DE has been applied successfully to improve ANN learning from previous studies. However, there are
still some issues on DE approach such as longer training time and lower classification accuracy. To
overcome these problems, island based model has been proposed in this system. The aim of our study
is to propose an approach for breast cancer distinguishing between different classes of breast cancer.
This approach is based on the Wisconsin Diagnostic and Prognostic Breast Cancer and the classification
of different types of breast cancer datasets. The proposed system implements the island- based training
method to be better accuracy and less training time by using and analysing between two different
migration topologies.
KEYWORDS
Neural Network, Differential Evolution, Island Model, Classification, Breast Cancer Diagnosis
Volume URL: http://airccse.org/journal/acij/vol7.html
Full Article: http://airccse.org/journal/acij/papers/6115acij01.pdf
REFERENCES
[1] Arun George Eapen, master thesis, Application of Data Mining in Medical Applications,
Waterloo, Ontario, Canada, 2004.
[2] Choi J.P., Han T.H. and Park R.W., ―A Hybrid Bayesian Network Model for Predicting Breast
Cancer Prognosisǁ, J Korean Soc Med Inform, pp. 49-57, 2009.
[3] Hassanien Ella Aboul and Ali H.M. Jafar, ―Rough set approach for generation of classification
rules of Breast Cancer data,ǁ Journal Informatica, vol. 15, pp. 23–38, 2004.
[4] Jamarani S. M. h., Behnam H. and Rezairad G. A., ―Multiwavelet Based Neural Network for
Breast Cancer Diagnosisǁ, GVIP 05 Conference, pp. 19-21, 2005.
[5] A. Cichocki and R. Unbehauen, ‗‘ Neural Networks for optimization and signal processing,‘‘ J.
Wiley, Sons Ltd. And B.G. Teubner, Stuttgart, 1993.
[6] Abdelaal Ahmed, Mohamed Medhat and Farouq Wael Muhamed, ―Using data mining for
assessing diagnosis of breast cnacer,ǁ in Proc. International multiconference on computer science and
information Technology, pp. 11 -17, 2010.
[7] Bellaachia Abdelghani and Erhan Guven, "Predicting Breast Cancer Survivability using Data
Mining Techniques," Ninth Workshop on Mining Scientific and Engineering Datasets in conjunction
with the Sixth SIAM International Conference on Data Mining,ǁ 2006.
[8] Burke H. B. Et al, ―Artificial Neural Networks Improve the Accuracy of Cancer Survival
Predictionǁ, Cancer, vol.79, pp.857-862, 1997
[9] R. Storn and K. Price, ―Differential evolution—A simple and efficient heuristic for global
optimization over continuous spaces,ǁ J. Glob. Optim., vol. 11, no. 4, pp. 341–359, Dec. 1997.
[10] K. V. Price, R. M. Storn, and J. A. Lampinen, Differential Evolution—A Practical Approach to
Global Optimization. Berlin, Germany: SpringerVerlag, 2005.
[11] Z. Skolicki and K. De Jong. The influence of migration sizes and intervals on island models. In
GECCO‘05: Proceedings of the 2005 conference on Genetic and evolutionary computation, pages
1295-1302, New York, NY, USA, ACM, 2005.
[12] Breast Cancer Wisconsin Data [online]. Available: http://archive.ics.uci.edu/ml/machine-
learningdatabases/breast-cancer-wisconsin/breast-cancer-wisconsin.data.
[13] Dr. K. U. Rani, ―Parallel Approach for Diagnosis of Breast Cancer using Neural Network
Techniqueǁ Int. J. of Computer. Application, vol. 10, no. 3, pp. 0975 – 8887, Nov. 2010.
[14] Abdul Sttar Ismail Wdaa ― Differential evolution for neural networks learning enhancement ǁ J.
of university of anbar for pure science: Vol.5: No.2: 2011.
[15] Jun Zhang MS, Haobo Ma Md MS, ―An Implementation of Guildford Cytological Grading
System to diagnose Breast Cancer Using Naïve Bayesian Classifierǁ, MEDINFO, M.Fieschi et al. (Eds),
Amsterdam: IOS Press, 2004.
[16] Kamruzzaman S.M. and Monirul Islam Md, ―Extraction of Symbolic Rules from Artificial
Neural Networksǁ Proceedings of world Academy of science, Engineering and Technology, vol. 10,
ISSN 1307-6884, Dec. 2005.
[17] Punitha A., Sumathi C.P. and Santhanam T., ―A Combination of Genetic Algorithm and ART
Neural Network for Breast Cancer Diagnosisǁ Asian Journal of Information Technology 6
(1):112-117, 2007, Medwell Journals, 2007.
[18] Rudy Setiono and Huan Liu, ―Neural-Network Feature Selectorǁ IEEE Transactions On Neural
Networks, vol. 8, No. 3, pg 664-662, May 1997.
[19] Wlodzislaw Duch and Rafal Adamczak and Krzysztof Grabczewski, ―A New methodology of
Extraction, Optimization and Application of Crisp and Fuzzy Logic Rulesǁ IEEE Transactions On
Neural Networks, vol. 12, No. 2, pp. 227-306, March 2001.
[20] Anupam Shukla, Ritu Tiwari and Prabhdeep Kaur, ―Knowledge Based Approach for Diagnosis
of Breast Cancerǁ IEEE International Advance Computing Conference, Patiala, India, pp. 6-12, March
2009.
[21] Esugasini S, Mohd Yusoff Mashor, Nor Ashidi Mat Isa and Nor Hayati Othman, Performance
Comparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer
Diagnosis, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in
Computer Science, 3682, pp. 123-130, 2005.
[22] Paulin F. and Santhakumaran A., ―Extracting Rules from Feed Forward Neural Networks for
Diagnosing Breast Cancerǁ CiiT International Journal of Artificial Intelligent Systems and Machine
Learning, vol. 1, No. 4, pp. 143-146, July 2009.
[23] D. Karaboga and S. Okdem, ―A simple and global optimization algorithm for engineering
problems: Differential evolution algorithm,ǁ Turkish J. Elect. Eng. Comput. Sci., vol. 12, no. 1, pp. 53–
60, 2004.
**********************************************************************************
IMPROVING PRIVACY AND SECURITY IN MULTI- TENANT CLOUD ERP
SYSTEMS
Djamal Ziani and Ruba Al-Muwayshir
Department of Information Systems, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of
definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their
respective challenges and issues regarding security and privacy, are provided. Next, a set of security
challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis
aims to build an effective approach to the cloud ERP security management model in terms of data
storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed
techniques are used to improve the security for multi-tenant SaaS: database virtualization,
implementation of data encryption and search functionality on databases and developed systems,
distribution of data between tenant and ERP providers, secure application deployment in multi-tenant
environments, implementation of the authentication and developed systems together as a two-factor
authentication, and improved user access control for multi-tenant ERP clouds.
KEYWORDS
ERP, ERP system, ERP problems, ERP security challenges, ERP security solutions, ERP and cloud
computing
Volume URL: https://airccse.org/journal/acij/vol8.html
Full Article: https://aircconline.com/acij/V8N5/8517acij01.pdf
REFERENCES
[1] M.A. Vouk, (2008) “Cloud computing–issues, research and implementations”, CIT. Journal of
Computing and Information Technology, Vol. 16, No. 4, pp235-246.
[2] A. Patel & M. Kumar, (2013) “A Proposed Model for Data Security of Cloud Storage Using Trusted
Platform Module”, International Journal of Advanced Research in Computer Science and Software
Engineering, Vol. 3, No. 4.
[3] D.P.D.S. Abburu, (2012). “An Approach for Data Storage Security in Cloud Computing”, IJCSI
International Journal of Computer Science Issues, Vol. 9, No. 2. government websites," Government
Information Quarterly, vol. 31, pp. 584-595, 2014.
[4] M. Almorsy, J. Grundy, & A.S. Ibrahim, (2012, June) “Tossma: A tenant-oriented saas security
management architecture”, In Cloud computing (cloud), 2012 IEEE 5th international conference on (pp.
981-988). IEEE.
[5] S. Subashini & V. Kavitha, (2010), “A Survey on Security Issues in Service Delivery Models of
Cloud Computing”, Journal of Network and Computer Applications, Vol. 34, No.1, pp1 -11.
[6] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, Konwinski, A., ... & M. Zaharia, (2010)
“A view of cloud computing”, Communications of the ACM, 53(4), 50-58.
[7] A. Azeez, S. Perera, D. Gamage, R. Linton, P. Siriwardana, D. Leelaratne, ... & P. Fremantle, (2010,
July), “Multi-tenant SOA middleware for cloud computing”, In Cloud computing (cloud), 2010 ieee
3rd international conference on (pp. 458-465). IEEE.
[8] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in cloud-based collaboration
services”, Information Systems Journal. BCG (2012).
[9] M. Armbrust et al., (2009), “A view of cloud computing”, Communications of the ACM, 53(4),
p.50. Available at: http://inst.cs.berkeley.edu/~cs10/fa10/lec/20/2010-11-10-CS10-L20-AF-Cloud
Computing.pdf [Accessed July 30, 2012].
[10] S.L. Dinesh Kumar Saini, Yousif,, J.H. Sandhya, & V. Khandage, (2011), “Cloud Computing
and Enterprise Resource Planning Systems”, Proceedings of the World Congress on Engineering, Vol.
[11] D. Harnik, B. Pinkas, A. Shulman-Peleg, (2010), “Side channels in Cloud services: deduplication
in Cloud Storage”, IEEE Security Privacy, Vol. 8, No. 6, pp40–47.
[12] E. Fathi Kiadehi, & S. Mohammadi, (2012), “Cloud ERP: Implementation of Enterprise Resource
Planning Using Cloud Computing Technology”, Journal of Basic and Applied Scientific Research, Vol.
6.
[13] U. Somani, K. Lakhani, M. Mundra, (2010), “Implementing digital signature with RSA encryption
algorithm to enhance the data Security of Cloud in Cloud Computing”, In: 1st International conference
on parallel distributed and grid Computing (PDGC), IEEE Computer Society Washington, DC, USA,
pp211–216.
[14] G. F Fathima Haseen Raihana & J. A. Jamal Mohamed College, (2012), “CLOUD ERP– A
SOLUTION MODEL”, IRACST - International Journal of Computer Science and Information
Technology & Security (IJCSITS), ISSN, Vol. 2, No. 4, pp4.
[15] S. Xiao & W. Gong, (2010), “Mobility Can help: protect user identity with dynamic credential”,
In: Eleventh International conference on Mobile data Management (MDM), IEEE Computer Society,
Washington, DC, USA, pp378–380.
[16] R. Mietzner, T. Unger, R. Titze, & F. Leymann, (2009), “Combining Different Multi-Tenancy
Patterns in Service Oriented Applications,” presented at the IEEE Enterprise Distributed Object
Conference, Auckland.
[17] E. Kimberling, (2011), “Is SaaS ERP right for your organization,” 360° ERP Blog.
[18] A. Lenart, (2011), “ERP in the Cloud–Benefits and Challenges”, In Research in systems analysis
and design: Models and methods, pp39-50, Springer Berlin Heidelberg.
[19] Md Asif Mushtaque, R. Sindhu, (2014), “A New Innovation On User’S Level Security For Storage
Data In Cloud Computing”, International Journal of Grid Distribution Computing 7.3, pp213- 220.
EVALUATING THE INTERNAL AND EXTERNAL USABILITY ATTRIBUTES OF
E-LEARNING WEBSITES IN SAUDI ARABIA
Khalid Al-Omar
Department of Information Systems, King Abdulaziz University, Jeddah, Kingdom of Saudi
Arabia
ABSTRACT
Web usability is important for users who depend on the websites they use, such as online distance
education students. Accordingly, universities and educational websites need to determine the types of
usability problems that occur on their websites. However, far too little attention has been paid to
providing detailed information regarding the types of specific usability problems that occur on e-
learning websites in general and on those in the Kingdom of Saudi Arabia (KSA) in particular. The aim
of this paper was to study and analyse the internal and external usability attributes of university websites
that offer distance education courses in Saudi Arabia. Twelve universities in Saudi Arabia were
considered—11 governmentaffiliated universities and one private university. The analysis of the data
indicates the level of usability of distance education websites. Results reveal that in Saudi Arabia,
distance education websites are reliable but violate basic usability guidelines. Furthermore, Saudi e-
learning websites need to focus on the utility of their home page search engines, provide more advanced
search functionality, and provide sitemaps linked to every page on the websites.
KEYWORDS
University websites, usability, credibility, e-learning, website design, Saudi Arabia, distance education
Volume URL: https://airccse.org/journal/acij/vol8.html
Full Article: https://aircconline.com/acij/V8N4/8417acij01.pdf
REFERENCES
[1] J.Nielsen, "How to conduct a heuristic evaluation," retrieved November, vol. 10, 2001.
[2] T.Jokela, N. Iivari, J. Matero, and M. Karukka,"The standard of user-centered design and the
standard definition of usability: analyzing ISO 13407 against ISO 9241-11," in Proceedings of the Latin
American conference on Human-computer interaction, 2003, pp. 53-60.
[3] J.Brooke,"SUS-A quick and dirty usability scale," Usability evaluation in industry, vol. 189, pp. 4-
7, 1996.
[4] G.Perlman, "Web-based user interface evaluation with questionnaires," Retrieved March, vol. 1, p.
2003, 2001.
[5] T. S. Tullis and J. N. Stetson, "A comparison of questionnaires for assessing website usability," in
Usability Professional Association Conference, 2004, pp. 1-12.
[6] J. Nielsen and R. Molich,"Heuristic evaluation of user interfaces," in Proceedings of the SIGCHI
conference on Human factors in computing systems, 1990, pp. 249-256.
[7] E. T. Hvannberg, E. L.-C. Law, and M. K. Lérusdóttir, "Heuristic evaluation: Comparing ways of
finding and reporting usability problems," Interacting with computers, vol. 19, pp. 225-240, 2007.
[8] P. G. Polson, C. Lewis, J. Rieman, and C. Wharton,"Cognitive walkthroughs: a method for theory-
based evaluation of user interfaces," International Journal of man-machine studies, vol. 36, pp. 741-
773, 1992.
[9] M. H. Blackmon, P. G. Polson, M. Kitajima, and C. Lewis, "Cognitive walkthrough for the web,"
in Proceedings of the SIGCHI conference on human factors in computing systems, 2002, pp. 463-470.
[10] K. Orfanou, N. Tselios, and C. Katsanos,"Perceived usability evaluation of learning management
systems: Empirical evaluation of the System Usability Scale," The International Review of Research in
Open and Distributed Learning, vol. 16, 2015.
[11] M. Alshammari, R. Anane, and R. J. Hendley, "Design and Usability Evaluation of Adaptive
elearning Systems Based on Learner Knowledge and Learning Style," in Human-Computer Interaction,
2015, pp. 584-591. [12] Z. Huang and M. Benyoucef, "Usability and credibility of e- government
websites," Government Information Quarterly, vol. 31, pp. 584-595, 2014.
[13] H. Gull and S. Z. Iqbal "Usability Evaluation of E-Government Websites in Saudi Arabia by
Cognitive Walkthrough," Design Solutions for User-Centric Information Systems, p. 297, 2016.
[14] B. Fogg, J. Marshall, O. Laraki, A. Osipovich, C. Varma, N. Fang, et al.,"What makes Web sites
credible?: a report on a large quantitative study," in Proceedings of the SIGCHI conference on Human
factors in computing systems, 2001, pp. 61-68.
[15] C. N. Wathen and J. Burkell,"Believe It or Not: Factors Influencing Credibility on the Web,"
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND
TECHNOLOGY, vol. 53, pp. 134-144, 2002.
[16] F. Alsudani and M. Casey, "The effect of aesthetics on web credibility," in Proceedings of the 23rd
British HCI Group Annual Conference on People and Computers: Celebrating People and Technology,
2009, pp. 512-519.
[17] L. Song, J. Lai, and J. Li, "Identifying Factors Affecting Individual Perceived Credibility on SNS,"
in Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on
SocialInformatics 2016, Data Science 2016, 2016, p. 2.
[18] J. F. George, G. Giordano, and P. A. Tilley, "Website credibility and deceiver credibility:
Expanding Prominence-Interpretation Theory," Computers in Human Behavior, vol. 54, pp. 83- 93,
2016.
[19] A. S. Tsiaousis and G. M. Giaglis, "Mobile websites: usability evaluation and design,"
International Journal of Mobile Communications, vol. 12, pp. 29-55, 2014.
[20] B. C. Zapata, J. L. Fernández-Alemán, A. Idri, and A. Toval, "Empirical studies on usability of
mHealth apps: A systematic literature review," Journal of medical systems, vol. 39, pp. 1-19, 2015.
[21] A. Hussain, E. O. Mkpojiogu, F. A. A. Nifa, M. N. M. Nawi, and A. Hussain, "Usability
evaluation techniques in mobile commerce applications: a systematic review," in AIP Conference
Proceedings, 2016, p. 020049.
[22] A. Hussain, E. O. Mkpojiogu, and F. M. Kamal, "A Systematic Review on Usability Evaluation
Methods for M-Commerce Apps," Journal of Telecommunication, Electronic and Computer
Engineering (JTEC), vol. 8, pp. 29-34, 2016.
[23] P. Rane, H. Kim, J. L. Marcano, and J. L. Gabbard, "Virtual Road Signs: Augmented Reality
Driving Aid for Novice Drivers," in Proceedings of the Human Factors and Ergonomics Society Annual
Meeting, 2016, pp. 1750-1754.
[24] A. S. Merians, D. Jack, R. Boian, M. Tremaine, G. C. Burdea, S. V. Adamovich, et al., "Virtual
reality–augmented rehabilitation for patients following stroke," Physical therapy, vol. 82, pp. 898- 915,
2002.
[25] A. Rukshan and A. Baravalle, "Automated Usability Testing: Analysing Asia Web Sites," arXiv
preprint arXiv:1212.1849, 2012.
[26] S. Kaur, K. Kaur, and P. Kaur, "Analysis of website usability evaluation methods," in Computing
for Sustainable Global Development (INDIACom), 2016 3rd International Conference on, 2016, pp.
1043-1046.
[27] M. Y. Ivory and A. Chevalier, "A study of automated web site evaluation tools," University of
Washington, Department of Computer Science2002, 2002.
[28] F. Oliha, "Web portal usability among Nigerian university students: A case study of University of
Benin, Nigeria," Nigerian Journal of Technology, vol. 33, pp. 199-206, 2014.
[29] S. Junaini, "Navigation design and usability evaluation of the Malaysian public university
websites," in Proceedings of the Second National Conference on Cognitive Science CSC, 2002, pp.
181-189.
[30] S. H. Mustafa and L. F. Al-Zoua’bi, "Usability of the academic websites of Jordan's universities
an evaluation study," in Proceedings of the 9th International Arab Conference for Information
Technology, 2008, pp. 31-40.
[31] P. Albion, "Heuristic evaluation of educational multimedia: from theory to practice," in
Proceedings ASCILITE 1999: 16th Annual Conference of the Australasian Society for Computers in
Learning in Tertiary Education: Responding to Diversity, 1999, pp. 9-15.
[32] R. Schwier and E. R. Misanchuk, Interactive multimedia instruction: Educational Technology,
1993. [33] T. C. Reeves, L. Benson, D. Elliott, M. Grant, D. Holschuh, B. Kim, et al., "Usability and
Instructional Design Heuristics for E-Learning Evaluation," 2002.
[34] B. Mehlenbacher, L. Bennett, T. Bird, M. Ivey, J. Lucas, J. Morton, et al., "Usable e-learning: A
conceptual model for evaluation and design," in Proceedings of HCI International, 2005, p. 11th.
[35] D. Squires and J. Preece, "Predicting quality in educational software: Evaluating for learning,
usability and the synergy between them," Interacting with computers, vol. 11, pp. 467-483, 1999.
[36] G. Brajnik, "Automatic web usability evaluation: what needs to be done," in Proc. Human Factors
and the Web, 6th Conference, 2000.
[37] J. Nielsen, "Designing web usability: the practice of simplicity New Riders Publishing,"
Indianapolis, Indiana, 2000.
[38] N. Bevan, "Guidelines and standards for web usability," in Proceedings of HCI International, 2005.
[39] M. A. Storey, B. Phillips, M. Maczewski, and M. Wang, "Evaluating the usability of Web-based
learning tools," Educational Technology & Society, vol. 5, pp. 91-100, 2002.
[40] C. Quinn, L. Alem, and J. Eklund, "A pragmatic evaluation methodology for an assessment of
learning effectiveness in instructional systems," Human–Computer Interaction, vol. 2, pp. 55- 56, 1997.
[41] M. Notess, "Usability, user experience, and learner experience," eLearn, vol. 2001, p. 3, 2001.
[42] S. Wong, T. Nguyen, E. Chang, and N. Jayaratna, "Usability metrics for e-learning," in On The
Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003, pp. 235-252.
[43] D. Travis, "247 web usability guidelines," Retrieved January, vol. 4, p. 2012, 2009.
*********************************************************************************
FACE RECOGNITION FROM A SINGLE SAMPLE USING RLOG FILTER AND
MANIFOLD ANALYSIS
Jaya Susan Edith. S1 and A.Usha Ruby2
1Department of Computer Science and Engineering,CSI College of Engineering,
2Research scholar, Bharath University
ABSTRACT
Face recognition is A technique that has been widely used in various important field, this process helps
in the identification of an individual by a machine for the purpose of security and ease of work. The
normal technique of face recognition usually works better when there are multiple samples for a single
person (MSSP) is available. In present applications where this technique is to be used such as in social
networks, security systems, identification cards there is only a single sample per person (SSPP) that is
readily available. This less availability of the samples causes failure in the working of conventional face
recognition techniques which require multiple samples for a particular individual. To overcome this
drawback which sets back the system from the accurate functioning of face recognition this paper puts
forward a novel technique which makes use of discriminative multi- manifold analysis (DMMA) that
extracts distinctive features using image patches. Recognition is done by the process of manifold to
manifold matching. Hence there is an increment in the accuracy rate of face recognition.
KEYWORDS
Face recognition; manifold learning; filter; clustering
Volume URL: https://airccse.org/journal/acij/vol5.html
Full Article: https://airccse.org/journal/acij/papers/5314acij04.pdf
REFERENCES
[1] Jiwen Lu, Member, IEEE, Yap-Peng Tan, Senior Member, IEEE, and Gang Wang, Member, IEEE,
Discriminative Multimanifold Analysis for Face Recognition from a Single Training Sample per
Personǁ. IEEE transactions on pattern analysis and machine intelligence, vol. 35, no. 1, January 2013.
[2] H. Hu, ―Orthogonal Neighborhood Preserving Discriminant Analysis for Face Recognition,ǁ
Pattern Recognition, vol. 41, No. 6, pp. 2045-2054, 2008.
[3] A. Lanitis, ―Evaluating the Performance of Face-Aging Algorithms,ǁProc. IEEE Int’l Conf.
Automatic Face and Gesture Recognition, pp. 1-6, 2008.
[4] S. Yan, D. Xu, B. Zhang, H. Zhang, Q. Yang, and S. Lin, ―Graph Embedding and Extensions: A
General Framework for Dimensionality Reduction,ǁ IEEE Trans. Pattern Analysis and Machine
Intelligence, vol. 29, no. 1, pp. 40-51, Jan. 2007.
[5] R. Wang and X. Chen. ǁManifold Discriminant Analysisǁ. In IEEE Conference on Computer
Vision and Pattern Recognition, pages 1–8, 2009.
[6] R. Wang, S. Shan, X. Chen, and W. Gao, ―Manifold-Manifold Distance with Application to Face
Recognition Based on Image Set,ǁ Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 1-
8, 2008.
[7] D. Zhang and Z. Zhou, ―2D2PCA: Two-Directional Two-Dimensional PCA for Efficient Face
Representation and Recognition,ǁ Neurocomputing, vol. 69, nos. 1-3, pp. 224-231, 2005.
[8] Zhenwei Miao n, Xudong Jiang School of Electrical and Electronic Engineering, Nanyang
Technological University, Nanyang Link, Singapore 639798 ,Singapore. 2013 Elsevier.
**********************************************************************************
PERFORMANCE ANALYSIS OF VITERBI DECODER FOR WIRELESS
APPLICATIONS
G.Sivasankar and L.Thangarani
Department of Electronics and Communication, Mepco Schlenk Engineering College,
Sivakasi, Tamilnadu, India
ABSTRACT
Viterbi decoder is employed in wireless communication to decode the convolutional codes; those codes
are used in every robust digital communication systems. Convolutional encoding and viterbi decoding
is a powerful method for forward error correction. This paper deals with synthesis and implementation
of viterbi decoder with a constraint length of three as well as seven and the code rate of ½ in FPGA
(Field Programmable Gate Array). The performance of viterbi decoder is analyzed in terms of resource
utilization. The design of viterbi decoder is simulated using Verilog HDL. It is synthesized and
implemented using Xilinx 9.1ise and Spartan 3E Kit. It is compatible with many common standards
such as 3GPP, IEEE 802.16 and LTE.
KEYWORDS
Convolutional encoder, Constraint length, Code rate, Viterbi decoder, Viterbi algorithm, Hamming
distance, Verilog HDL, FPGA.
Volume URL: https://airccse.org/journal/acij/vol5.html
Full Article: https://airccse.org/journal/acij/papers/5414acij01.pdf
REFERENCES
[1] A.J. Viterbi (1967) “Error bounds for Convolutional Coding and an asymptotically optimum
decoding algorithm ”, IEEE Transactions on Inform. Theory, Vol. 2, pp260-269.
[2] Mr.Vishal, G.Jadhao, Prof. Prafulla & D. Gawade (2012)“Performance analysis of linear block code
and convolutional code to study their comparative effectiveness”, IOSR Journal of Electrical and
Electronics Engineering.
[3] Hiral Pujara, Pankaj Prajapati (2013) “RTL Implementation of Viterbi Decoder using VHDL”,
IOSR Journal of VLSI and Signal Processing, Vol. 2, pp65-71.
[4] M.Gayathiri et al (2013) “FPGA implementation of high speed and low power viterbi encoder and
decoder ”, International journal of Engineering and Technology, Vol. 2, pp1315-1320.
PATH FINDING SOLUTIONS FOR GRID BASED GRAPH
Dr. R.Anbuselvi M.Sc., M.Phil. Ph.D1
1Assistant Professor in Computer Science, Bishop Heber College, Trichy-17
ABSTRACT
Any path finding will work as long as there are no obstacles on distractions along the way. A genetic
Alalgorithm has been used for more advanced environments in graph. Implementation of the path
finding algorithm for grid based graph with or without obstacles.
KEYWORDS
Path, Finding, Solution
Volume URL: http://airccse.org/journal/acij/vol7.html
Full Article: http://airccse.org/journal/acij/papers/4213acij05.pdf
REFERENCES
[1] Botea A.Muller, and Schaeffer, J 2004, near optimal hierarchical path-finding. Journal of Game
Development7.28.
[2] Hart P.Nilsson, N.J and Raphael, B.1968. A formal basis for the heuristic determination of
minimum cost paths. IEEE Transactions on System Science and Cybernetics 100.107.
[3] Holte, R.; Perez, M.; Zimmer, R.; and MacDonald, A. 1996. Hierarchical A*: Searching
abstraction hierarchies efficiently. In proceedings AAA!-96,530.535.
[4] Rabin, S. 2000.A*: Speed optimizations in Game programming Gems.272.287.
[5] Craig Reynolds's, (1999) “Sterring Behavior for Autonomous Characters”.
[6] Dave Pottinger, “Coordinated Unit Movement:” 22nd Jan 1999. Gamasutra Vol.3: Issue 3
[7] DavePottenger's “Implementing Coordinated Movement:” 29th Jan 1999. Game Developer PP 48-
58. Second in two-part series.
[8] Macro Pinter, “More Realistic Path Finding Article:” 14th March 2001. Gamasutra.
[9] Eric Marchesin, “ A Simple C# Genetic algorithm Article:” 22nd June 2003, .NET 1.0, 4.72
[10] http://www.gamasutra.com
[11] Path finding is more general tool that can be used to solve a wider variety of problems as stated
in accelerated A* path finding by sisiak(2009).
[12] A* works at the level of simple passable / un passable grid spaces as defined in Dijkstra path
finding algorithm.(2007).
**********************************************************************************
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS ANDVISAS USING
CRYPTOGRAPHY AND QR CODES
Cheman Shaik
VISH Consulting Services Inc, 6242 N Hoyne Avenue, Chicago IL 60659, USA
ABSTRACT
In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using
cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a
cryptographic key pair and publish their public key on their website. Further they are required to encrypt
the passport or visa information with their private key, encode the ciphertext in a QR code and print it on
the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app andplace it
for download on their website or Google Play Store and iPhone App Store. Anyindividual or immigration
authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which
will decrypt the ciphertext encoded in the QR code usingthe public key stored in the app memory and
displays the passport or visa information on the app screen. The details on the app screen can be compared
with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication
of forgery or fabrication.
KEYWORDS
Passport, Visa, Forgery, Fabrication, Cryptography, Encryption, Decryption, QR Code, Mobile App
Volume Link: https://airccse.org/journal/acij/vol12.html
Pdf Link: https://aircconline.com/acij/V12N1/12121acij01.pdf
REFERENCES
1. U.S Department of State, "Passport and Visa Fraud: A Quick Course", https://2009-
2017.state.gov/m/ds/investigat/c10714.htm
2. Reeta R Gupta and N Ravi, "Passport Forgery and Forensic Examination of Indian Passport",
Journal of Forensic Sciences & Criminal Investigation - Volume - 5 Issue - 1 September 2017
3.Miss A.M Investigations, “How to spot a fraudulent document”,
https://missaminvestigations.co.uk/2018/10/15/how-to-spot-a-fraudulent-document/
4. Kwang-Baek, KimYoung-Ju, KimAm-Suk Oh, "An Intelligent System for Passport
Recognition Using Enhanced RBF Network", International Conference on Computational and
Information Science CIS 2004: Computational and Information Science pp 762-767.
5. Young-Bin Kwon and J.-h. Kim, “Recognition based verification for the machine readable
travel documents,” in International Workshop on Graphics Recognition (GREC 2007), Curitiba,
Brazil. Citeseer, 2007
6. Kwang-Baek Kim, Sungshin Kim, "A passport recognition and face verification using
enhanced fuzzy ART based RBF network and PCA algorithm", Neurocomputing, Volume 71,
Issues 16–18, 2008, Pages 3202-3210
7. S. V. Patgar, K. Rani, and T. Vasudev, “An unsupervised intelligent system to detect
fabrication in photocopy document using variations in bounding box features,” in Contemporary
Computing and Informatics (IC3I), 2014 International Conference on. IEEE, 2014, pp. 670–675
8. R. Bertrand, O. R. Terrades, P. Gomez-Kramer, P. Franco, and J.-M. Ogier, “A conditional
random field model for font forgery detection,” in Document Analysis and Recognition (ICDAR),
2015 13th International Conference on. IEEE, 2015, pp. 576–580
9. VeriDoc Global, "What can be done about passport fraud right now?",
https://veridocglobal.medium.com/what-can-be-done-about-passport-fraud-b6d5cb5e0370
10. dtos-mu.com, "UnderstandingThe BasicsofPublic Key Cryptography",
https://www.dtosmu.com/understanding-the-basics-of-public-key-cryptography/
11. Scanova Blog, "What is a QR Code: A Beginner’s Guide", https://scanova.io/blog/what-is-a-
qr-code/
12. Chinmay Jathar, Swapnil Gurav, and KranteeJamdaade, "A Review on QR Code Analysis",
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Volume 8, Issue 7, July 2019
13. uQR.me, "30 Things You Should Know About QR Codes", https://uqr.me/blog/things-you-
shouldknow-about-qr-codes/
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM
MEDICAL DATA
Shokooh Taghian1,2
and Mohammad H. Nadimi-Shahraki1,2,*
1Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Iran2Big Data
Research Center, Najafabad Branch, Islamic Azad University, Najafabad, Iran
ABSTRACT
A well-constructed classification model highly depends on input feature subsets from a dataset, which
may contain redundant, irrelevant, or noisy features. This challenge can be worse while dealing with
medical datasets. The main aim of feature selection as a pre-processing task is to eliminate these features
and select the most effective ones. In the literature, metaheuristic algorithms show a successful
performance to find optimal feature subsets. In this paper, two binary metaheuristic algorithms named S-
shaped binary Sine Cosine Algorithm (SBSCA) and V-shaped binary Sine Cosine Algorithm (VBSCA)
are proposed for feature selection from the medical data. In these algorithms, the search space remains
continuous, while a binary position vector is generated by two transfer functions S-shaped and V-shaped
for each solution. The proposed algorithms are compared with four latest binary optimization algorithms
over five medical datasets from the UCI repository. The experimental results confirm that using
bothbSCA variants enhance the accuracy of classification on these medical datasets compared to fourother
algorithms.
KEYWORDS
Medical data, Feature selection, metaheuristic algorithm, Sine Cosine Algorithm, Transfer function
Volume Link: https://airccse.org/journal/acij/vol10.html
Pdf Link: https://aircconline.com/acij/V10N5/10519acij01.pdf
REFERENCES
[1] S. Gu, R. Cheng, and Y. Jin, Feature selection for high-dimensional classification using a
competitive swarm optimizer, Soft Computing, vol. 22, 2018, pp. 811-822.
[2] B. Xue, M. Zhang, W. N. Browne, and X. Yao, A survey on evolutionary computation
approaches to feature selection, IEEE Transactions on Evolutionary Computation, vol. 20, 2015,
pp. 606-626.
[3] I. Guyon and A. Elisseeff, An introduction to variable and feature selection, Journal of
machine learning research, vol. 3, 2003, pp. 1157-1182.
[4] H. Liu and L. Yu, Toward integrating feature selection algorithms for classification and
clustering, IEEE Transactions on Knowledge & Data Engineering, 2005, pp. 491-502.
[5] M. Dash and H. Liu, Feature selection for classification, Intelligent data analysis, vol. 1, 1997,
pp. 131-156.
[6] Y. Saeys, I. Inza, and P. Larrañaga, A review of feature selection techniques in
bioinformatics, bioinformatics, vol. 23, 2007, pp. 2507-2517.
[7] C. Dhaenens and L. Jourdan, Metaheuristics for big data: John Wiley & Sons, 2016.
[8] P. Luukka, Feature selection using fuzzy entropy measures with similarity classifier, Expert
Systems with Applications, vol. 38, 2011, pp. 4600-4607.
[9] E.-G. Talbi, Metaheuristics: from design to implementation vol. 74: John Wiley & Sons, 2009.
[10] D. H. Wolpert and W. G. Macready, No free lunch theorems for optimization, IEEE
transactions on evolutionary computation, vol. 1, 1997, pp. 67-82.
[11] R. Eberhart and J. Kennedy, A new optimizer using particle swarm theory in MHS'95.
Proceedings of the Sixth International Symposium on Micro Machine and Human Science, 1995,
pp. 39-43.
[12] R. Storn and K. Price, Differential evolution–a simple and efficient heuristic for global
optimization over continuous spaces, Journal of global optimization, vol. 11, 1997, pp. 341-359.
[13] D. Karaboga and B. Basturk, A powerful and efficient algorithm for numerical function
optimization: artificial bee colony (ABC) algorithm, Journal of global optimization, vol. 39, 2007,
pp. 459-471.
[14] X.-S. Yang, A new metaheuristic bat-inspired algorithm in Nature inspired cooperative
strategies for optimization (NICSO 2010), ed: Springer, 2010, pp. 65-74.
[15] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, GSA: a gravitational search algorithm,
Information sciences, vol. 179, 2009, pp. 2232-2248.
[16] S. Mirjalili, S. M. Mirjalili, and A. Lewis, Grey wolf optimizer, Advances in Engineering
Software, vol. 69, 2014, pp. 46-61.
[17] S. Mirjalili, SCA: a sine cosine algorithm for solving optimization problems, Knowledge-
Based Systems, vol. 96, 2016, pp. 120-133.
[18] H. Zamani, M. H. Nadimi-Shahraki, and A. H. Gandomi, CCSA: Conscious Neighborhood-
based Crow Search Algorithm for Solving Global Optimization Problems, Applied Soft
Computing, in press, 2019, https://doi.org/10.1016/j.asoc.2019.105583.
[19] D. E. Goldberg, Genetic algorithm, Search, Optimization and Machine Learning, 1989, pp.
343- 349.
[20] M. Dorigo, M. Birattari, C. Blum, M. Clerc, T. Stützle, and A. Winfield, Ant Colony
Optimization and Swarm Intelligence: 6th International Conference, ANTS 2008, Brussels,
Belgium, September 22-24, 2008, Proceedings vol. 5217: Springer, 2008.
[21] S. Taghian, M. H. Nadimi-Shahraki, and H. Zamani, Comparative Analysis of Transfer
Functionbased Binary Metaheuristic Algorithms for Feature Selection in 2018 International
Conference on Artificial Intelligence and Data Processing (IDAP), 2018, pp. 1-6.
[22] H. Zamani and M. H. Nadimi-Shahraki, Swarm Intelligence Approach for Breast Cancer
Diagnosis, International Journal of Computer Applications, vol. 151, 2016, pp. 40-44.
[23] M. Banaie-Dezfouli, M. H. Nadimi-Shahraki, and H. Zamani, A Novel Tour Planning Model
using Big Data in 2018 International Conference on Artificial Intelligence and Data Processing
(IDAP), 2018, pp. 1-6.
[24] H. G. Arjenaki, M. H. Nadimi-Shahraki, and N. Nourafza, A low cost model for diagnosing
coronary artery disease based on effective features, International Journal of Electronics
Communication and Computer Engineering, vol. 6, 2015, pp. 93-97.
[25] E. S. Fard, K. Monfaredi, and M. H. Nadimi-Shahraki, An Area-Optimized Chip of Ant
Colony Algorithm Design in Hardware Platform Using the Address-Based Method, International
Journal of Electrical and Computer Engineering, vol. 4, 2014, pp. 989-998.
[26] L. K. Panwar, S. Reddy, A. Verma, B. K. Panigrahi, and R. Kumar, Binary grey wolf
optimizer for large scale unit commitment problem, Swarm and Evolutionary Computation, vol.
38, 2018, pp. 251-266.
[27] X.-S. Yang, Nature-inspired metaheuristic algorithms: Luniver press, 2010.
[28] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, BGSA: binary gravitational search
algorithm, Natural Computing, vol. 9, 2010, pp. 727-745.
[29] E. Emary, H. M. Zawbaa, and A. E. Hassanien, Binary grey wolf optimization approaches
for feature selection, Neurocomputing, vol. 172, 2016, pp. 371-381.
[30] M. M. Mafarja, D. Eleyan, I. Jaber, A. Hammouri, and S. Mirjalili, Binary dragonfly
algorithm for feature selection in 2017 International Conference on New Trends in Computing
Sciences (ICTCS), 2017, pp. 12-17.
[31] S. Mirjalili, Dragonfly algorithm: a new meta-heuristic optimization technique for solving
singleobjective, discrete, and multi-objective problems, Neural Computing and Applications, vol.
27, 2016, pp. 1053-1073.
[32] H. Faris, M. M. Mafarja, A. A. Heidari, I. Aljarah, A.-Z. Ala’M, S. Mirjalili, et al., An
efficient binary salp swarm algorithm with crossover scheme for feature selection problems,
KnowledgeBased Systems, vol. 154, 2018, pp. 43-67.
[33] S. Mirjalili and A. Lewis, The whale optimization algorithm, Advances in engineering
software, vol. 95, 2016, pp. 51-67.
[34] H. Zamani and M.-H. Nadimi-Shahraki, Feature selection based on whale optimization
algorithm for diseases diagnosis, International Journal of Computer Science and Information
Security, vol. 14, 2016, pp. 1243-1247.
[35] S. Arora and P. Anand, Binary butterfly optimization approaches for feature selection, Expert
Systems with Applications, vol. 116, 2019, pp. 147-160.
[36] S. Arora, H. Singh, M. Sharma, S. Sharma, and P. Anand, A New Hybrid Algorithm Based
on Grey Wolf Optimization and Crow Search Algorithm for Unconstrained FunctionOptimization
and Feature Selection, IEEE Access, vol. 7, 2019, pp. 26343-26361.
[37] M. Taradeh, M. Mafarja, A. A. Heidari, H. Faris, I. Aljarah, S. Mirjalili, et al., An
Evolutionary Gravitational Search-based Feature Selection, Information Sciences, 2019, pp. 219-
239.
[38] A. I. Hafez, H. M. Zawbaa, E. Emary, and A. E. Hassanien, Sine cosine optimization
algorithm for feature selection in 2016 International Symposium on INnovations in Intelligent
SysTems and Applications (INISTA), 2016, pp. 1-5.
[39] K. S. Reddy, L. K. Panwar, B. Panigrahi, and R. Kumar, A New Binary Variant of Sine–
Cosine Algorithm: Development and Application to Solve Profit-Based Unit Commitment
Problem, Arabian Journal for Science and Engineering, vol. 43, 2018, pp. 4041-4056.
[40] C. L. Blake and C. J. Merz, UCI repository of machine learning databases, 1998.
[41] J. Kennedy and R. C. Eberhart, A discrete binary version of the particle swarm algorithm in
1997 IEEE International conference on systems, man, and cybernetics. Computationalcybernetics
and simulation, 1997, pp. 4104-4108.
[42] S. Mirjalili, S. M. Mirjalili, and X.-S. Yang, Binary bat algorithm, Neural Computing and
Applications, vol. 25, 2014, pp. 663-681.
[43] M. Friedman, The use of ranks to avoid the assumption of normality implicit in the analysis
of variance, Journal of the american statistical association, vol. 32, 1937, pp. 675-701.
Jan_2024_Top_read_articles_in_ACIJ.pdf

More Related Content

Similar to Jan_2024_Top_read_articles_in_ACIJ.pdf

September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research AIRCC Publishing Corporation
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Similar to Jan_2024_Top_read_articles_in_ACIJ.pdf (20)

September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its Applications
 

More from acijjournal

Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 
10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...acijjournal
 

More from acijjournal (20)

Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 
10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Jan_2024_Top_read_articles_in_ACIJ.pdf

  • 1. January 2024-Top 10 Read Articles in AdvancedComputing Advanced Computing: An International Journal ( ACIJ ) ISSN: 2229 -6727 [Online] ; 2229 - 726X [Print] https://airccse.org/journal/acij/acij.html
  • 2. DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY M. MaryShanthi Rani1, K.Rosemary Euphrasia2 1Dept. of Comp. Sci. and Applications, Gandhigram Rural Institute, Deemed University Gandhigram, TamilNadu. India. 2Department of computer Sci., Fatima College, Madurai, TamilNadu. India. ABSTRACT The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are 2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for secret communication by combining the concepts of Steganography and QR codes. The suggested method includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii) Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate (BER). Experimental result shows that the proposed method has high imperceptibility, integrity and security. KEYWORDS Steganography, QR code, BER Volume URL: http://airccse.org/journal/acij/vol7.html Full Article: https://aircconline.com/acij/V7N2/7216acij01.pdf REFERENCES [1] Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian University of Science and Technology [2] Kinjal H. Pandyaand Hiren J. Galiyawala, 2014.” A Survey on QR Codes: in context of Research and Application”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4 Issue 3.,pp. 258-262Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian University of Science and Technology [3] QRStuff. QR Code Error Correction, 2011. QRStuff blog:http://www.qrstuff.Com /blog/2011/12/14/QR-code-error-correction. [4] Law, C. & So, S., 2010. “QR codes in education. Journal of Educational Technology Development and Exchange”, Vol. 3 Issue 1, pp. 85-100 [5] Shruti Ahuja, 2014. ” QR Codes and Security Concerns”, International Journal of International Journal of Computer Science and Information Technologies, Vol. 5 Issue 3 pp. 3878-3879 [6] Akshara Gaikwad et al, 2015. “Information Hiding using Image Embedding in QRCodes for Colour Images: A Review”, International Journal of Computer Science and Information Technologies, Vol. 6 Issue 1,pp. 278-283 [7] Dipika Sonawane et al., 2014. “QR based Advanced authentication for all hardware platforms “International Journal of Scientific and Research Publications, Vol. 4(1) pp.1-4 [8] www. The-qrcode-generator.com
  • 3. [9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx [10] M. Mary Shanthi Rani and K.Rosemary Euphrasia, 2015. “Dynamic Hiding of Message in RGB Domain based on Random Channel Indicator”, International Journal of Applied Engineering Research, Vol.10 No.76., pp. 478-483 **********************************************************************************
  • 4. SECURE CLOUD ARCHITECTURE Kashif Munir1 and Prof Dr. Sellapan Palaniappan2 1 School of Science and Engineering, Malaysia University of Science and Technology, Selangor, Malaysia 2 School of Science and Engineering, Malaysia University of Science and Technology, Selangor, Malaysia. ABSTRACT Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security. KEYWORDS Cloud Computing; Security and Privacy; Threats, Vulnerabilities, Secure Cloud Architecture. Volume URL: https://airccse.org/journal/acij/vol4.html Full Article: https://airccse.org/journal/acij/papers/4113acij02.pdf REFERENCES [1] "Swamp Computing" a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved 2010- 01-25. [2] "Thunderclouds: Managing SOA-Cloud Risk", Philip Wik". Service Technology Magazine. 2011- 10. Retrieved 2011-21-21. [3] What cloud computing really means. InfoWorld. http://www.infoworld.com/d/cloudcomputing/what-cloud-computing-really-means-031?page=0,0
  • 5. [4] Mell P, Grance T (2011) The nist definition of cloud computing (draft). http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf [5] Ponemon (2011) Security of cloud computing providers study. http://www.ca.com/~/media/Files/ IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf [6] Software as a service-Wikipedia. Wikipedia. http://en.wikipedia.org/wiki/Software_as_a_service [7] A. Tripathi and A. Mishra, “Cloud computing security considerations” IEEE Int. conference on signalprocessing, communication and computing (ICSPCC), 14-16 Sept., Xi'an, Shaanxi, China, 2011 [8] Vadym Mukhin, Artem Volokyta, “Security Risk Analysis for Cloud Computing Systems” The 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Prague, Czech Republic, 15-17 September 2011 [9] Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 31 May -3 June 2011 [10]R. La‘Quata Sumter, ―Cloud Computing: Security Risk Classificationǁ, ACMSE 2010, Oxford, USA [9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx [11]Meiko Jensen ,Jorg Sehwenk et al., “On Technical Security,Issues icloud Computing ”IEEE International conference on cloud Computing, 2009. [12]M.Jensen ,N.Gruschka et al., “The impact of flooding Attacks on network based services”Proceedings of the IEEE International conference on Availiabilty,Reliability and Security (ARES) 2008. [13] Armbrust ,M. ,Fox, A., Griffth, R., et al “Above the clouds: A Berkeley View of Cloud Computing” , UCB/EECS-2009-28,EECS Department University of California Berkeley, 2009 http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf [14] Wayne A. Jansen, ―Cloud Hooks: Security and Privacy Issues in Cloud Computingǁ, 44th Hawaii International Conference on System Sciesnces 2011. [15] Rituik Dubey et al., “Addressing Security issues in Cloud Computing”http://www.contrib.andrew.cmu.edu/~rdubey/index_files/cloud%20com puting.pdf [16]M. Okuhara et al., “Security Architecture for Cloud Computing”, www.fujitsu.com/downloads/MAG/vol46-4/paper09.pdf [17] “A Security Analysis of Cloud Computing” http://cloudcomputing.sys- con.com/node/1203943 [18] “Cloud Security Questions? Here are some answers”http://cloudcomputing.syscon.com/node/1330353 [19]Cloud Computing and Security –A Natural Match, Trusted Computing Group(TCG) http://www.trustedcomputinggroup.org [20] “Controlling Data in the Cloud:Outsourcing Computation without outsourcing Control http://www.parc.com/content/attachments/ControllingDataInTheCloud- CCSW-09.pdf [21] “Amazon Web services: Overview of Security processes “ September 2008 http://aws.amazon.com [22]T. Schreiber, “Session Riding a Widespread Vulnerability in Today'sWeb Applications” [Online], Available: http://www.securenet.de/papers/Session_Riding.pdf, white paper, 2004. [Accessed: 20-Jul- 2011]. [23]J., Grimes, P., Jaeger, J., Lin, “Weathering the Storm: The Policy Implications of Cloud Computing” [Online], Availablehttp://ischools.org/images/iConferences/CloudAbstract13109F INAL.pdf , [Accessed: 19-Jul-2011]. [24]B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp.50-57, 2011. [25]A., Greenberg, “Why Cloud Computing Needs More Chaos” [Online],Available:http://www.forbes.com/2009/07/30/cloud-computing- security-technology-
  • 6. cionetwork-cloud-computing.html, 2009, [Accessed: 20-Jul-2011]. [26] Top 7 threats to cloud computing. HELP NET SECURITY. http://www.netsecurity.org/secworld.php?id=8943 [27] Rion Dutta, ”Planning for Single SignOn”, White Paper, MIEL e- Security Pvt [28]M. Armbrust, et al., A view of cloud computing. Commun. ACM. vol. 53 (2010), pp. 50-58 [29]Miranda Mowbray and Siani Pearson, A client-based privacy manager for cloud computing. In Proc. Fourth International Conference on Communication System Software and Middleware (ComsWare), Dublin, Ireland, 16-19 June 2009.
  • 7. NEO4J, SQLITE AND MYSQL FOR HOSPITAL LOCALIZATION Anu Sebastian1 , Richa Kuriakose2 , Surekha Mariam Varghese3 Department of Computer Science and Engineering, M.A College of Engineering, Kothamangalam, Kerala, India ABSTRACT Graphs are efficient ways to visualize and represent real world data. Solutions to many real time scenarios can be easily provided when there is powerful graph databases like neo4j that can be used to efficiently query the graphs with multiple attributes. For instance, querying a system with medical and hospital data can be used to address the problem of location wise medical decision making. Here in this paper we present a neo4j as a solution to medical query. KEYWORDS Graph databases, MySQL, SQLite, cypher query language, Neo4j, Relational databases. Volume URL: http://airccse.org/journal/acij/vol7.html Full Article: https://aircconline.com/acij/V7N3/7316acij03.pdf REFERENCES [1] Shalini Batra, Charu Tyagi. Comparative Analysis of Relational And Graph Databases. International Journal of Soft Computing and Engineering (IJSCE), 2(2), May 2012. [2] Renzo Angles And Claudio Gutierrez.” Survey of Graph Database Models”ACM Computing Surveys, Vol. 40, No. 1, Article 1, Publication date: February 2008. [3] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. The 5th ACM/USENIX Internet Measurement Conference, 2007. [4] “NOSQL Databases”, http://nosql-database .org/ [5] “Neo4j,” http://neo4j.org/. [6] Neo4jmanual, Internet: http://docs.neo4j.org/chunked/stabl e/graphdb-neo4jnodes. html ,2010 [7] J. Paredaens and B. Kuijpers, “Data Models and Query Languages for Spatial Databases,” Data & Knowledge Engineering (DKE), vol. 25, no. 1-2, pp. 29–53, 1998 [8] P. Urb ´ on, “Nosql graph database matrix,” http://nosql.mypopescu.com/post/619181345 /nosqlgraph-databasematrix, May 2010. [9] “Short overview on the emerging world of graph databases,”http://www.graphdatabase.org/overview.html [10] Michael Owens, The Definitive Guide to SQLite, USA: Apress, 2006, 341-362. [11] SQLite homepage [EB/OL] ,http://www.sqlite.org. [12] Florian Holzschuher, Prof. Dr. René Peinl. Performance of Graph Query Languages: Comparison of Cypher, Gremlin and Native Access in Neo4j.EDBT/ICDT 13March 18 - 22 2013.e [13] Szabolcs Rozsnyai, Aleksander Slominski, Yurdaer Doganata.Large-Scale Distributed Storage System for Business Provenance.Cloud Computing (CLOUD), IEEE International Conference,2011. [14] Ilya Katsov. NoSql Data Modeling Techniques. March 2012.
  • 8. [15] Ian Robinson, Jim Webber, Emil Eifrem. Graph Databases(Early release revision 1).O̓ Reilly Media, Inc., 02-25 2013. [16] Apache Software Foundation.Home.http://zookeeper.apache.org, 2013. [17] Yanmei Huo, Hongyuan Wang, Liang Hu, Hongji Yang. A Cloud Storage Architecture Model for Data-Intentsive Applications. 2011.
  • 9. EFFECTIVE WAYS CLOUD COMPUTING CAN CONTRIBUTE TO EDUCATION SUCCESS BV Pranay kumar1, Sumitha kommareddy2, N.Uma Rani3 1Department of information technology, CJITS, Jangaon, Warangal. 2Department of information technology, CJITS, Jangaon, Warangal. 3Department of computer science and engineering ,CJITS, Jangaon, Warangal. ABSTRACT Cloud computing and education sounds ambiguous on the face of it. Naturally, it’s because, very few individuals, publishers and users alike come from the education sector. In most cases, cloud computing is only associated with businesses and how they can leverage their efficiencies. Just to introduce how the cloud deserves a place in our current education institution, it’s important to reiterate the education philosophy. Its essence is knowledge. It’s this knowledge which brings advancement, achievement and success. However, there are several things which make these parameters unattainable. In blunt language, this is failure. Small classrooms, lack or resources, short- handed staff, lack of adequate teachers…the list is endless. One way or the other, cloud computing can be utilized to improve education standards and activities. The end result will be to curb the above problems and instead, boost performance. KEYWORDS Cloud Computing, Web service, Virtualization, Grid Computing, Virtual Computing Lab, Higher education institutions, Remote areas. Volume URL: https://airccse.org/journal/acij/vol4.html Full Article: https://airccse.org/journal/acij/papers/4413acij02.pdf REFERENCES [1] C. Justin, B. Ivan, K. Arvind and A. Tom, Seattle: A Platform for Educational Cloud Computing, SIGCSE09, March 37, 2009, Chattanooga,Tennessee, USA, 2009. [2] P. Shanthi Bala, INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS, (IJCSE) International Journal on Computer Science and Engineering Vol.02, No. 03, 2010, 741-745. 2007. [3] M. Armbrust, et al, Above the clouds: A Berkeley view of Cloud Computing, UC Berkeley EECS, 2009. [4] S. Al Noor, G. Mustafa, S. Chowdhury, Z. Hossain, and F. Jaigirdar, A Proposed Architecture of Cloud Computing for Education System in Bangladesh and the Impact on Current Education System, (IJCSNS) International Journal of Computer Science and Network Security, VOL.10 No.10. 2010. [5] M. Luis, R. Luis, C. Juan and L. Maik, A Break in the Clouds: Towards a Cloud Definition, ACM SIGCOMM Computer Communication Review, Volume 39, Number 1. 2005. [6] Cloud Computing Articles. Cloud Computing Education, http://www.code2cloud.com/cloudcomputing-education/ [7] Cloud Computing Articles, SaaS+PaaS+IaaS. Free Cloud Apps for Educational Institutes: Schools, Colleges, Universities, http://www.technopulse. com/2010/08/free-cloud-apps- educationalinstitutes.html/
  • 10. [8] IBM Academic Initiative. Cloud computing: Delivering Internetbased information and technology services in real time, https://www.ibm.com/developerworks/university/cloud/ [9] IBM Sales and Distribution - Solution Brief for Education. IBM Cloud Academy Education for a smarter planet, ftp://dispsd-40-www3.boulder.ibm.com/ [10] R. CJB and N. Evans. A PROPOSAL FOR THE ADOPTION AND USE OF CLOUD COMPUTING IN SECONDARY EDUCATION IN SOUTH AFRICA, 11th DIS Annual Conference 2010, 2nd 3rd September,Richardsbay, University of Zululand, South Africa, 2010. [11] THE ABC’S OF ENGINEERING EDUCATION: ABET, BLOOM’S TAXONOMY, COOPERATIVE LEARNING, AND SO ON [12] K. Youry and V. Volodymyr. Cloud Computing Infrastructure Prototype for University Education and Research, WCCCE ’10, May 78, 2010, Kelowna, Canad, 2010. [13] M. Grimes, T. Jaeger and J. Lin. Weathering the Storm: The Policy Implications of Cloud Computing, iConference, 2009. [14] Microsoft Education Cloud Computing. The most comprehensive solutions for the cloud. On earth, http://www.microsoft.com/en-us/cloud/ [15] Microsoft in Education — IT solutions. Microsoft Live@edu, http://www.microsoft.com/education/en-us/solutions/Pages/liveedu.aspx/ [16] R. Elumalai and V. Ramachandran. A Cloud Model for Educational e-Content Sharing, European Journal of Scientific Research, ISSN 1450-216X Vol.59 No.2, pp.200-207. 2011. [17] N. Sultan. Cloud computing for education: A new dawn?, International Journal of Information Management, 109116, 30 2010. [18] M. Victoria, and D. Brbara. Cloud computing for education: A new dawn?, A design of a postgraduate course on Google Apps based on an Institutional Personal Learning Environment (iPLE). [19] Amazon Web Services. Overview of Amazon Web Services, http :==media:amazonwebservices:com=AWSOverview:pdf= [20] X. Dong and L. Hui. Reviewing some Cloud Computing Platforms, ISBN 978-952-5726-09-1, Proceedings of the Second International Symposium on Networking and Network Security (ISNNS 10), Jinggangshan, P. R., pp. 161-164, China. 2010. [21] An Amazon Web Services Case Study. Migrating Applications to the Cloud, http://www.cloudcomputingcourse.com/ [22] Amazon Web Services. AWS in Education, http://aws.amazon.com/education/ [23] MC Graw Hill. Cloud Computing Basics, Chapter 1. [24] IBM. New IBM Cloud Services to Address Education Challenges, http://www03.ibm.com/press/us/en/pressrelease/34642.wss/ [25] IBM Global Technology Services, Getting cloud computing right, http://www05.ibm.com/de/cloud/pdf/Gettingcloudcomputingright.pdf/ [26] IBM Sales and Distribution, Education, Solution Brief. IBM Virtual Computing Lab Solutions for Cloud, Solution Brief. [27] salesforce foundation. salesforce for Higher Education, http://www.salesforcefoundation.org/product/ [28] HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers, Hewlett-Packard Development Company. 2011. [29] Amanda & Zmanda. Amanda and Zmanda Applications, http://www.zmanda.com/ [30] Zmanda Cloud Backup. Zmanda Cloud Backup for Windows, http://www.zmanda.com/cloudbackup.html/ [31] Cloud Computing. Risk of Cloud Computing in Universities, http : ==www:istf:jucc:edu:hk=newsletter=IT03=IT 3CloudComputing:pdf=
  • 11. [32] Microsoft, Education al in. Cloud Computing from Microsoft - Empowering Education through Choice, https://partner.microsoft.com/NZ/40142863/ [33] P. Thomas. Cloud Computing: A potential paradigm for practicing the scholarship of teaching and learning, Centre for Academic Development, University of Botswana. [34] Microsoft, Cloud Computing Web Site. Cloud Computing in Education, http://www.edutechhosting.co.uk/ [35] A Microsoft U.S. Education white paper. Cloud computing in education Savings, flexibility, and choice for IT, http://www.microsoft.com/educloud/ [36] V. Toby, V. Anthony and E. Robert. Cloud Computing, A Practical Approach, ISBN-13: 978-0- 07- 162694-1, 353 Pages. 2009. [37] R. Herrick. Google This! Using Google Apps for Collaboration and Productivity, SIGUCCS09, October 1114, 2009, St. Louis, Missouri, USA. 2009. [38] GOOGLE APPS EDUCATION EDITION. Google Apps Education Edition: communication, collaboration, and security in the cloud, http://www.google.com/a/edu/ [39] A. Vouk. Cloud Computing Issues, Research and Implementations, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235246, doi:10.2498/cit.1001391. 2008. [40] Amazon Web Services (AWS) Web Site. What is AWS - A comprehensive cloud computing platform, http://aws.amazon.com/what-is-aws/ [41] Amazon Web Services, Case Study. Application Hosting, http://aws.amazon.com/solutions/casestudies/ [42] Amazon Web Services (AWS), EC2 Web Site. Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2/ [43] AWS Case Study: Educations.com, Web Site. AWS Case Study: Educations. com, http://aws.amazon.com/solutions/case-studies/educationscom/ [44] D. Jiabin. Virtualization, Application Streaming and Private Cloud Computing in a Training Laboratory, JOURNAL OF SOFTWARE, VOL. 5, NO. 11,doi:10.4304/jsw.5.11.1306-1313. 2010. [45] N. Sclater. CLOUD COMPUTING IN EDUCATION: POLICY BRIEF, UNESCO Institute for Information Technologies in Education. 2010. [46] Cloud-onomics in education, IBM Cloud Academy, Web Site. Cloud 9: Future Compatible Computing in Education, http://www.ibm.com/ibm/files/T641866T23726I58/EBE03001USEN.PDF/ [47] Silanis e-SignLive Services. Software-as-a-Service (SaaS) e-Signature Service, http://www.eignlive.com/services.html/ [48] Salesforce.com foundation, Higher Education Solution. Taking higher education to a higher level, http://www.salesforcefoundation.org/products/discounts/higher-ed/ [49] Salesforce:com foundation, Higher Education. The Real Time Cloud for Higher Education, http://www.salesforcefoundation.org/ [50] Cloud Computing Applications Web Site. Cloud Computing Applications and Services in Education, http://www.shaswatpatel.com/ [51] Microsoft News Center. Windows Azure and the Azure Services Platform: Making Microsofts Software-plus-Services Vision a Reality, http://www.microsoft.com/presspass/features/2008/oct08/10-27pdcfeature1.mspx/ [52] Computing Edge. Analyzing the Differences between Cloud Computingand Virtualization, http://computinged.com/insights/ [53] VCL Web Site. VCL Conceptual Overview Diagram, https://cwiki.apache.org/VCL/ [54] Understanding Cloud Computing in Education - Web Site. VCL Conceptual Overview Diagram, http://kasunpanorama.blogspot.com/2010/07/understanding-cloudcomputing- feel-easy.html/ [55] T. Harris. Cloud Computing Services - A comparison, http://www.thbs.com/
  • 12. [56] IBM Cloud Academy. Education for a Smarter Planet:Cloud Computing in Education, http://www.cetpa-k12.org/ **********************************************************************************
  • 13. FDTD COMPUTATION FOR SAR INDUCED IN HUMAN HEAD DUE TO EXPOSURE TO EMF FROM MOBILE PHONE Ashraf A. Aly1 and Melinda Piket-May2 1Department of Information Technology, Al Khawarizmi College, UAE 2Departement of Electrical and Computer Engineering, University of Colorado at Boulder, USA ABSTRACT This aim of this paper is to investigate the specific absorption rate (SAR) distribution in a human head by using the finite-difference time-domain (FDTD) calculations, due to exposure to EMF radiation from a mobile phone at frequencies 900 MHz Mobile Phone model with a λ/2 monopole antenna and a hand head phone model dimensions are 100 mm x 50 mm x 20 mm. The head model used is a sphere with a diameter of 18 cm. The FDTD grid size used in the computation was 2.5 mm. The distance between the antenna and head was 5 mm. To simplify the FDTD simulation, the SAR in the head was calculated without the effect of the human body. It was found that the SAR induced in the head decreases with the distance from the radiating source. KEYWORDS Specific Absorption Rate, Finite-Difference Time-Domain, Mobile Phone Volume URL: https://airccse.org/journal/acij/vol5.html Full Article: https://airccse.org/journal/acij/papers/5614acij01.pdf REFERENCES [1] Mushtaq, A. Bhat., and Vijay, K., (2013) "Calculation of SAR and Measurement of Temperature Change of Human Head Due To The Mobile Phone Waves At Frequencies 900 MHz and 1800 MHz", Advances in Physics Theories and Applications, Vol.16, ISSN 2225-0638. [2] Adheed, H. S., (2012) "A Theoretical Approach for SAR Calculation in Human Head Exposed to RF Signals", Journal of Engineering and Development, Vol. 16, No.4, ISSN 1813- 7822304. [3] Luan, A., Mimoza, I., and Enver, H., (2010) "Computation of SAR Distribution in a Human Exposed to Mobile Phone Electromagnetic Fields", PIERS Proceedings, Xi’an, China, 22–26. [4] Hardell, L., Carlberg, M., Hansson, K. (2011) "Pooled of case - control studies on malignant brain tumours and the use of mobile and cordless phones including living and deceased subjects". International Journal of Oncology, 38(5):1465–1474. [5] Adair, E., Kelleher, R., Mack, W., Morocco, S. (1998) "Thermophysiological responses of human volunteers during controlled whole - body radio frequency exposure at 450 MHz". Bio electro magnetics, 19:232–245. [6] Schwan, H.P., (1985) "Biophysical principles of the interaction of ELF fields with living matter". Publ. Plenum Press, New York. [7] Montaigne, K., and Pickard, F., (2005) "Offset of the vacuolar potential of Characean cells in response to electromagnetic radiation over the range 250 Hz - 250 kHz", Bioelectromagnetics, Volume 5, Issue 1, pages 31–38. [8] Foster, K. R. (2000) "Thermal and Nonthermal Mechanisms of Interaction of Radio- Frequency
  • 14. Energy with Biological Systems", IEEE Trans Plasm Sci 28:15-17. [9] Frohlich, K., Nancy, R., Richmond, C. (2006) "Health disparities in Canada today: Some evidenceand a theoretical framework", Health Policy, 79 -132–143. [10] Pokorny, P. F., Almeida, E. C., Melo, and Vaz, W. (1998), "Kinetics of Amphiphile Association with Two - Phase Lipid Bilayer Vesicles", IX Congresso Nacional de Bioquímica, P10-10. Tomar. [11] Akleman, F., and Sevgi, L., (1998) "FDTD Analysis of human head - mobile phone interaction in terms of specific absorption rate calculations and antenna design", IEEE- APS Conference, Antennas and propagation for wireless communication, vol. 1. pp. 85- 88. [12] Dimbylow, J., and Gandhi, O. P. (1991) “Finite-difference time-domain calculations of SAR in a realistic heterogeneous model of the head for plane - wave exposure from 600 MHz to 3 GHz,” phys .Med . Biol., vol. 36, pp. 1075-1089. [13] Yee, K. S. (1966) "Numerical solution of initial boundary value problems involving Maxwell's equations in isotropic media,'' IEEE Trans. Antennas Propagat., vol. 14, pp. 302-307. [14] Taflove, A. (1988) "Review of the formulation and applications of the finite - difference timedomain method for numerical modeling of electromagnetic wave interactions with arbitrary structures'', Wave Motion, vol. 10, no. 6, pp. 547-582. [15] Holland, R., Simpson, L., and Kunz, K. (1980) "Finite - difference analysis of EMP coupling to lossy dielectric structures, '' IEEE Trans. Electromagn. Compat, vol. EMC- 22, pp. 203-209. [16] Merewether, D. E., Fisher, R., and Smith, F. W. (1980) "On implementing a numeric Huygen's source scheme in a finite difference program to illuminate scattering bodies,'' IEEE Trans. Nucl. Sci., vol. 27, pp. 1829-1833. [17] Holland, R., and Williams, J. W. (1993) "Total - field versus scattered - field finite - difference codes: A comparative assessment,'' IEEE Trans. Nucl. Sci., vol. NS-30, pp. 4583-4588. [18] Kunz, K. S., and Luebbers, R. J. (1993) "The Finite Difference Time Domain Method for Electromagnetics", Boca Raton, FL: CRC Press. [19] Fang, J. (1989) "Time Domain Finite Difference Computation for Maxwell's Equations", PhD thesis, University of California at Berkeley, Berkeley, CA. [20] Kurt, L., Shlager., and John, Schneider, B. (1998) “A Survey of the Finite - Difference TimeDomain Literature”, www.fdtd.org / Bibtex-db / survey-199 -html / survey.html. [21] Yee, The Yee Method” available at www. nada.kth.se/~ulfa/CEM.html. [22] G. Grimes & F. Barnes, (1973) “A technique for studying chemotaxis of leukocytes in welldefined chemotactic fields”, Experimental Cell Res.,vol. 79, pp. 375–385. [23] F. Barnes & Y. Kwon, (2005) “A theoretical study of the effects of RF field gradients in the vicinity of membranes”, J. Bioelectromagn., vol. 26, no. 2, pp. 118–124. [24] Ashraf A. Aly, Safaai Bin Deris, Nazar Zaki, “Research Review For Digital Image Segmentation Techniques.International Journal of Computer Science & Information Technology (IJCSIT).Vol 3, No 5, Oct 2011. [25] Ashraf A. Aly, Safaai Bin Deris, Nazar Zaki, "The Effects on Cells Mobility Due to Exposure to EMF Radiation", Advanced Computing: An International Journal (ACIJ), Vol.2, No.4, July 2011. [26] Ashraf A. Aly, and Frank S. Barnes, Effects of 900 - MHz Radio Frequencies on the Chemotaxis of Human Neutrophils in Vitro, IEEE Transactions On Biomedical Engineering, Vol. 55, No. 2, February 2008. [27] Campion EW, “Power lines, Cancer, and Fear.” The New England journal of medicine, 337.1 : 44- 6, 1997. [28] Inskip PD,Tarone RE, Hatch EE,“Cellular telephone use and brain tumors,” N. Engl J Med, 344:79- 86, 2001. **********************************************************************************
  • 15. AN APPROACH FOR BREAST CANCER DIAGNOSIS CLASSIFICATION USING NEURAL NETWORK Htet Thazin Tike Thein1 and Khin Mo Mo Tun2 1 Ph.D Student, University of Computer Studies, Yangon, Myanmar 2Department of Computational Mathematics, University of Computer Studies, Yangon, Myanmar ABSTRACT Artificial neural network has been widely used in various fields as an intelligent tool in recent years, such as artificial intelligence, pattern recognition, medical diagnosis, machine learning and so on. The classification of breast cancer is a medical application that poses a great challenge for researchers and scientists. Recently, the neural network has become a popular tool in the classification of cancer datasets. Classification is one of the most active research and application areas of neural networks. Major disadvantages of artificial neural network (ANN) classifier are due to its sluggish convergence and always being trapped at the local minima. To overcome this problem, differential evolution algorithm (DE) has been used to determine optimal value or near optimal value for ANN parameters. DE has been applied successfully to improve ANN learning from previous studies. However, there are still some issues on DE approach such as longer training time and lower classification accuracy. To overcome these problems, island based model has been proposed in this system. The aim of our study is to propose an approach for breast cancer distinguishing between different classes of breast cancer. This approach is based on the Wisconsin Diagnostic and Prognostic Breast Cancer and the classification of different types of breast cancer datasets. The proposed system implements the island- based training method to be better accuracy and less training time by using and analysing between two different migration topologies. KEYWORDS Neural Network, Differential Evolution, Island Model, Classification, Breast Cancer Diagnosis Volume URL: http://airccse.org/journal/acij/vol7.html Full Article: http://airccse.org/journal/acij/papers/6115acij01.pdf REFERENCES [1] Arun George Eapen, master thesis, Application of Data Mining in Medical Applications, Waterloo, Ontario, Canada, 2004. [2] Choi J.P., Han T.H. and Park R.W., ―A Hybrid Bayesian Network Model for Predicting Breast Cancer Prognosisǁ, J Korean Soc Med Inform, pp. 49-57, 2009. [3] Hassanien Ella Aboul and Ali H.M. Jafar, ―Rough set approach for generation of classification rules of Breast Cancer data,ǁ Journal Informatica, vol. 15, pp. 23–38, 2004. [4] Jamarani S. M. h., Behnam H. and Rezairad G. A., ―Multiwavelet Based Neural Network for Breast Cancer Diagnosisǁ, GVIP 05 Conference, pp. 19-21, 2005. [5] A. Cichocki and R. Unbehauen, ‗‘ Neural Networks for optimization and signal processing,‘‘ J. Wiley, Sons Ltd. And B.G. Teubner, Stuttgart, 1993. [6] Abdelaal Ahmed, Mohamed Medhat and Farouq Wael Muhamed, ―Using data mining for assessing diagnosis of breast cnacer,ǁ in Proc. International multiconference on computer science and information Technology, pp. 11 -17, 2010. [7] Bellaachia Abdelghani and Erhan Guven, "Predicting Breast Cancer Survivability using Data Mining Techniques," Ninth Workshop on Mining Scientific and Engineering Datasets in conjunction with the Sixth SIAM International Conference on Data Mining,ǁ 2006. [8] Burke H. B. Et al, ―Artificial Neural Networks Improve the Accuracy of Cancer Survival Predictionǁ, Cancer, vol.79, pp.857-862, 1997 [9] R. Storn and K. Price, ―Differential evolution—A simple and efficient heuristic for global optimization over continuous spaces,ǁ J. Glob. Optim., vol. 11, no. 4, pp. 341–359, Dec. 1997. [10] K. V. Price, R. M. Storn, and J. A. Lampinen, Differential Evolution—A Practical Approach to Global Optimization. Berlin, Germany: SpringerVerlag, 2005. [11] Z. Skolicki and K. De Jong. The influence of migration sizes and intervals on island models. In
  • 16. GECCO‘05: Proceedings of the 2005 conference on Genetic and evolutionary computation, pages 1295-1302, New York, NY, USA, ACM, 2005. [12] Breast Cancer Wisconsin Data [online]. Available: http://archive.ics.uci.edu/ml/machine- learningdatabases/breast-cancer-wisconsin/breast-cancer-wisconsin.data. [13] Dr. K. U. Rani, ―Parallel Approach for Diagnosis of Breast Cancer using Neural Network Techniqueǁ Int. J. of Computer. Application, vol. 10, no. 3, pp. 0975 – 8887, Nov. 2010. [14] Abdul Sttar Ismail Wdaa ― Differential evolution for neural networks learning enhancement ǁ J. of university of anbar for pure science: Vol.5: No.2: 2011. [15] Jun Zhang MS, Haobo Ma Md MS, ―An Implementation of Guildford Cytological Grading System to diagnose Breast Cancer Using Naïve Bayesian Classifierǁ, MEDINFO, M.Fieschi et al. (Eds), Amsterdam: IOS Press, 2004. [16] Kamruzzaman S.M. and Monirul Islam Md, ―Extraction of Symbolic Rules from Artificial Neural Networksǁ Proceedings of world Academy of science, Engineering and Technology, vol. 10, ISSN 1307-6884, Dec. 2005. [17] Punitha A., Sumathi C.P. and Santhanam T., ―A Combination of Genetic Algorithm and ART Neural Network for Breast Cancer Diagnosisǁ Asian Journal of Information Technology 6 (1):112-117, 2007, Medwell Journals, 2007. [18] Rudy Setiono and Huan Liu, ―Neural-Network Feature Selectorǁ IEEE Transactions On Neural Networks, vol. 8, No. 3, pg 664-662, May 1997. [19] Wlodzislaw Duch and Rafal Adamczak and Krzysztof Grabczewski, ―A New methodology of Extraction, Optimization and Application of Crisp and Fuzzy Logic Rulesǁ IEEE Transactions On Neural Networks, vol. 12, No. 2, pp. 227-306, March 2001. [20] Anupam Shukla, Ritu Tiwari and Prabhdeep Kaur, ―Knowledge Based Approach for Diagnosis of Breast Cancerǁ IEEE International Advance Computing Conference, Patiala, India, pp. 6-12, March 2009. [21] Esugasini S, Mohd Yusoff Mashor, Nor Ashidi Mat Isa and Nor Hayati Othman, Performance Comparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer Diagnosis, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Computer Science, 3682, pp. 123-130, 2005. [22] Paulin F. and Santhakumaran A., ―Extracting Rules from Feed Forward Neural Networks for Diagnosing Breast Cancerǁ CiiT International Journal of Artificial Intelligent Systems and Machine Learning, vol. 1, No. 4, pp. 143-146, July 2009. [23] D. Karaboga and S. Okdem, ―A simple and global optimization algorithm for engineering problems: Differential evolution algorithm,ǁ Turkish J. Elect. Eng. Comput. Sci., vol. 12, no. 1, pp. 53– 60, 2004. **********************************************************************************
  • 17. IMPROVING PRIVACY AND SECURITY IN MULTI- TENANT CLOUD ERP SYSTEMS Djamal Ziani and Ruba Al-Muwayshir Department of Information Systems, King Saud University, Riyadh, Saudi Arabia ABSTRACT This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds. KEYWORDS ERP, ERP system, ERP problems, ERP security challenges, ERP security solutions, ERP and cloud computing Volume URL: https://airccse.org/journal/acij/vol8.html Full Article: https://aircconline.com/acij/V8N5/8517acij01.pdf
  • 18. REFERENCES [1] M.A. Vouk, (2008) “Cloud computing–issues, research and implementations”, CIT. Journal of Computing and Information Technology, Vol. 16, No. 4, pp235-246. [2] A. Patel & M. Kumar, (2013) “A Proposed Model for Data Security of Cloud Storage Using Trusted Platform Module”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 4. [3] D.P.D.S. Abburu, (2012). “An Approach for Data Storage Security in Cloud Computing”, IJCSI International Journal of Computer Science Issues, Vol. 9, No. 2. government websites," Government Information Quarterly, vol. 31, pp. 584-595, 2014. [4] M. Almorsy, J. Grundy, & A.S. Ibrahim, (2012, June) “Tossma: A tenant-oriented saas security management architecture”, In Cloud computing (cloud), 2012 IEEE 5th international conference on (pp. 981-988). IEEE. [5] S. Subashini & V. Kavitha, (2010), “A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Journal of Network and Computer Applications, Vol. 34, No.1, pp1 -11. [6] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, Konwinski, A., ... & M. Zaharia, (2010) “A view of cloud computing”, Communications of the ACM, 53(4), 50-58. [7] A. Azeez, S. Perera, D. Gamage, R. Linton, P. Siriwardana, D. Leelaratne, ... & P. Fremantle, (2010, July), “Multi-tenant SOA middleware for cloud computing”, In Cloud computing (cloud), 2010 ieee 3rd international conference on (pp. 458-465). IEEE. [8] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in cloud-based collaboration services”, Information Systems Journal. BCG (2012). [9] M. Armbrust et al., (2009), “A view of cloud computing”, Communications of the ACM, 53(4), p.50. Available at: http://inst.cs.berkeley.edu/~cs10/fa10/lec/20/2010-11-10-CS10-L20-AF-Cloud Computing.pdf [Accessed July 30, 2012]. [10] S.L. Dinesh Kumar Saini, Yousif,, J.H. Sandhya, & V. Khandage, (2011), “Cloud Computing and Enterprise Resource Planning Systems”, Proceedings of the World Congress on Engineering, Vol. [11] D. Harnik, B. Pinkas, A. Shulman-Peleg, (2010), “Side channels in Cloud services: deduplication in Cloud Storage”, IEEE Security Privacy, Vol. 8, No. 6, pp40–47. [12] E. Fathi Kiadehi, & S. Mohammadi, (2012), “Cloud ERP: Implementation of Enterprise Resource Planning Using Cloud Computing Technology”, Journal of Basic and Applied Scientific Research, Vol. 6. [13] U. Somani, K. Lakhani, M. Mundra, (2010), “Implementing digital signature with RSA encryption algorithm to enhance the data Security of Cloud in Cloud Computing”, In: 1st International conference on parallel distributed and grid Computing (PDGC), IEEE Computer Society Washington, DC, USA, pp211–216. [14] G. F Fathima Haseen Raihana & J. A. Jamal Mohamed College, (2012), “CLOUD ERP– A SOLUTION MODEL”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN, Vol. 2, No. 4, pp4. [15] S. Xiao & W. Gong, (2010), “Mobility Can help: protect user identity with dynamic credential”, In: Eleventh International conference on Mobile data Management (MDM), IEEE Computer Society, Washington, DC, USA, pp378–380. [16] R. Mietzner, T. Unger, R. Titze, & F. Leymann, (2009), “Combining Different Multi-Tenancy Patterns in Service Oriented Applications,” presented at the IEEE Enterprise Distributed Object Conference, Auckland. [17] E. Kimberling, (2011), “Is SaaS ERP right for your organization,” 360° ERP Blog. [18] A. Lenart, (2011), “ERP in the Cloud–Benefits and Challenges”, In Research in systems analysis and design: Models and methods, pp39-50, Springer Berlin Heidelberg. [19] Md Asif Mushtaque, R. Sindhu, (2014), “A New Innovation On User’S Level Security For Storage Data In Cloud Computing”, International Journal of Grid Distribution Computing 7.3, pp213- 220.
  • 19. EVALUATING THE INTERNAL AND EXTERNAL USABILITY ATTRIBUTES OF E-LEARNING WEBSITES IN SAUDI ARABIA Khalid Al-Omar Department of Information Systems, King Abdulaziz University, Jeddah, Kingdom of Saudi Arabia ABSTRACT Web usability is important for users who depend on the websites they use, such as online distance education students. Accordingly, universities and educational websites need to determine the types of usability problems that occur on their websites. However, far too little attention has been paid to providing detailed information regarding the types of specific usability problems that occur on e- learning websites in general and on those in the Kingdom of Saudi Arabia (KSA) in particular. The aim of this paper was to study and analyse the internal and external usability attributes of university websites that offer distance education courses in Saudi Arabia. Twelve universities in Saudi Arabia were considered—11 governmentaffiliated universities and one private university. The analysis of the data indicates the level of usability of distance education websites. Results reveal that in Saudi Arabia, distance education websites are reliable but violate basic usability guidelines. Furthermore, Saudi e- learning websites need to focus on the utility of their home page search engines, provide more advanced search functionality, and provide sitemaps linked to every page on the websites. KEYWORDS University websites, usability, credibility, e-learning, website design, Saudi Arabia, distance education Volume URL: https://airccse.org/journal/acij/vol8.html Full Article: https://aircconline.com/acij/V8N4/8417acij01.pdf REFERENCES [1] J.Nielsen, "How to conduct a heuristic evaluation," retrieved November, vol. 10, 2001. [2] T.Jokela, N. Iivari, J. Matero, and M. Karukka,"The standard of user-centered design and the standard definition of usability: analyzing ISO 13407 against ISO 9241-11," in Proceedings of the Latin American conference on Human-computer interaction, 2003, pp. 53-60. [3] J.Brooke,"SUS-A quick and dirty usability scale," Usability evaluation in industry, vol. 189, pp. 4- 7, 1996. [4] G.Perlman, "Web-based user interface evaluation with questionnaires," Retrieved March, vol. 1, p. 2003, 2001. [5] T. S. Tullis and J. N. Stetson, "A comparison of questionnaires for assessing website usability," in Usability Professional Association Conference, 2004, pp. 1-12. [6] J. Nielsen and R. Molich,"Heuristic evaluation of user interfaces," in Proceedings of the SIGCHI conference on Human factors in computing systems, 1990, pp. 249-256. [7] E. T. Hvannberg, E. L.-C. Law, and M. K. Lérusdóttir, "Heuristic evaluation: Comparing ways of finding and reporting usability problems," Interacting with computers, vol. 19, pp. 225-240, 2007. [8] P. G. Polson, C. Lewis, J. Rieman, and C. Wharton,"Cognitive walkthroughs: a method for theory- based evaluation of user interfaces," International Journal of man-machine studies, vol. 36, pp. 741- 773, 1992. [9] M. H. Blackmon, P. G. Polson, M. Kitajima, and C. Lewis, "Cognitive walkthrough for the web," in Proceedings of the SIGCHI conference on human factors in computing systems, 2002, pp. 463-470. [10] K. Orfanou, N. Tselios, and C. Katsanos,"Perceived usability evaluation of learning management systems: Empirical evaluation of the System Usability Scale," The International Review of Research in Open and Distributed Learning, vol. 16, 2015.
  • 20. [11] M. Alshammari, R. Anane, and R. J. Hendley, "Design and Usability Evaluation of Adaptive elearning Systems Based on Learner Knowledge and Learning Style," in Human-Computer Interaction, 2015, pp. 584-591. [12] Z. Huang and M. Benyoucef, "Usability and credibility of e- government websites," Government Information Quarterly, vol. 31, pp. 584-595, 2014. [13] H. Gull and S. Z. Iqbal "Usability Evaluation of E-Government Websites in Saudi Arabia by Cognitive Walkthrough," Design Solutions for User-Centric Information Systems, p. 297, 2016. [14] B. Fogg, J. Marshall, O. Laraki, A. Osipovich, C. Varma, N. Fang, et al.,"What makes Web sites credible?: a report on a large quantitative study," in Proceedings of the SIGCHI conference on Human factors in computing systems, 2001, pp. 61-68. [15] C. N. Wathen and J. Burkell,"Believe It or Not: Factors Influencing Credibility on the Web," JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, vol. 53, pp. 134-144, 2002. [16] F. Alsudani and M. Casey, "The effect of aesthetics on web credibility," in Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology, 2009, pp. 512-519. [17] L. Song, J. Lai, and J. Li, "Identifying Factors Affecting Individual Perceived Credibility on SNS," in Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016, 2016, p. 2. [18] J. F. George, G. Giordano, and P. A. Tilley, "Website credibility and deceiver credibility: Expanding Prominence-Interpretation Theory," Computers in Human Behavior, vol. 54, pp. 83- 93, 2016. [19] A. S. Tsiaousis and G. M. Giaglis, "Mobile websites: usability evaluation and design," International Journal of Mobile Communications, vol. 12, pp. 29-55, 2014. [20] B. C. Zapata, J. L. Fernández-Alemán, A. Idri, and A. Toval, "Empirical studies on usability of mHealth apps: A systematic literature review," Journal of medical systems, vol. 39, pp. 1-19, 2015. [21] A. Hussain, E. O. Mkpojiogu, F. A. A. Nifa, M. N. M. Nawi, and A. Hussain, "Usability evaluation techniques in mobile commerce applications: a systematic review," in AIP Conference Proceedings, 2016, p. 020049. [22] A. Hussain, E. O. Mkpojiogu, and F. M. Kamal, "A Systematic Review on Usability Evaluation Methods for M-Commerce Apps," Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 8, pp. 29-34, 2016. [23] P. Rane, H. Kim, J. L. Marcano, and J. L. Gabbard, "Virtual Road Signs: Augmented Reality Driving Aid for Novice Drivers," in Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2016, pp. 1750-1754. [24] A. S. Merians, D. Jack, R. Boian, M. Tremaine, G. C. Burdea, S. V. Adamovich, et al., "Virtual reality–augmented rehabilitation for patients following stroke," Physical therapy, vol. 82, pp. 898- 915, 2002. [25] A. Rukshan and A. Baravalle, "Automated Usability Testing: Analysing Asia Web Sites," arXiv preprint arXiv:1212.1849, 2012. [26] S. Kaur, K. Kaur, and P. Kaur, "Analysis of website usability evaluation methods," in Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on, 2016, pp. 1043-1046. [27] M. Y. Ivory and A. Chevalier, "A study of automated web site evaluation tools," University of Washington, Department of Computer Science2002, 2002. [28] F. Oliha, "Web portal usability among Nigerian university students: A case study of University of Benin, Nigeria," Nigerian Journal of Technology, vol. 33, pp. 199-206, 2014. [29] S. Junaini, "Navigation design and usability evaluation of the Malaysian public university websites," in Proceedings of the Second National Conference on Cognitive Science CSC, 2002, pp. 181-189. [30] S. H. Mustafa and L. F. Al-Zoua’bi, "Usability of the academic websites of Jordan's universities an evaluation study," in Proceedings of the 9th International Arab Conference for Information Technology, 2008, pp. 31-40. [31] P. Albion, "Heuristic evaluation of educational multimedia: from theory to practice," in Proceedings ASCILITE 1999: 16th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education: Responding to Diversity, 1999, pp. 9-15. [32] R. Schwier and E. R. Misanchuk, Interactive multimedia instruction: Educational Technology, 1993. [33] T. C. Reeves, L. Benson, D. Elliott, M. Grant, D. Holschuh, B. Kim, et al., "Usability and Instructional Design Heuristics for E-Learning Evaluation," 2002. [34] B. Mehlenbacher, L. Bennett, T. Bird, M. Ivey, J. Lucas, J. Morton, et al., "Usable e-learning: A conceptual model for evaluation and design," in Proceedings of HCI International, 2005, p. 11th.
  • 21. [35] D. Squires and J. Preece, "Predicting quality in educational software: Evaluating for learning, usability and the synergy between them," Interacting with computers, vol. 11, pp. 467-483, 1999. [36] G. Brajnik, "Automatic web usability evaluation: what needs to be done," in Proc. Human Factors and the Web, 6th Conference, 2000. [37] J. Nielsen, "Designing web usability: the practice of simplicity New Riders Publishing," Indianapolis, Indiana, 2000. [38] N. Bevan, "Guidelines and standards for web usability," in Proceedings of HCI International, 2005. [39] M. A. Storey, B. Phillips, M. Maczewski, and M. Wang, "Evaluating the usability of Web-based learning tools," Educational Technology & Society, vol. 5, pp. 91-100, 2002. [40] C. Quinn, L. Alem, and J. Eklund, "A pragmatic evaluation methodology for an assessment of learning effectiveness in instructional systems," Human–Computer Interaction, vol. 2, pp. 55- 56, 1997. [41] M. Notess, "Usability, user experience, and learner experience," eLearn, vol. 2001, p. 3, 2001. [42] S. Wong, T. Nguyen, E. Chang, and N. Jayaratna, "Usability metrics for e-learning," in On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003, pp. 235-252. [43] D. Travis, "247 web usability guidelines," Retrieved January, vol. 4, p. 2012, 2009. ********************************************************************************* FACE RECOGNITION FROM A SINGLE SAMPLE USING RLOG FILTER AND
  • 22. MANIFOLD ANALYSIS Jaya Susan Edith. S1 and A.Usha Ruby2 1Department of Computer Science and Engineering,CSI College of Engineering, 2Research scholar, Bharath University ABSTRACT Face recognition is A technique that has been widely used in various important field, this process helps in the identification of an individual by a machine for the purpose of security and ease of work. The normal technique of face recognition usually works better when there are multiple samples for a single person (MSSP) is available. In present applications where this technique is to be used such as in social networks, security systems, identification cards there is only a single sample per person (SSPP) that is readily available. This less availability of the samples causes failure in the working of conventional face recognition techniques which require multiple samples for a particular individual. To overcome this drawback which sets back the system from the accurate functioning of face recognition this paper puts forward a novel technique which makes use of discriminative multi- manifold analysis (DMMA) that extracts distinctive features using image patches. Recognition is done by the process of manifold to manifold matching. Hence there is an increment in the accuracy rate of face recognition. KEYWORDS Face recognition; manifold learning; filter; clustering Volume URL: https://airccse.org/journal/acij/vol5.html Full Article: https://airccse.org/journal/acij/papers/5314acij04.pdf REFERENCES [1] Jiwen Lu, Member, IEEE, Yap-Peng Tan, Senior Member, IEEE, and Gang Wang, Member, IEEE, Discriminative Multimanifold Analysis for Face Recognition from a Single Training Sample per Personǁ. IEEE transactions on pattern analysis and machine intelligence, vol. 35, no. 1, January 2013. [2] H. Hu, ―Orthogonal Neighborhood Preserving Discriminant Analysis for Face Recognition,ǁ Pattern Recognition, vol. 41, No. 6, pp. 2045-2054, 2008.
  • 23. [3] A. Lanitis, ―Evaluating the Performance of Face-Aging Algorithms,ǁProc. IEEE Int’l Conf. Automatic Face and Gesture Recognition, pp. 1-6, 2008. [4] S. Yan, D. Xu, B. Zhang, H. Zhang, Q. Yang, and S. Lin, ―Graph Embedding and Extensions: A General Framework for Dimensionality Reduction,ǁ IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 1, pp. 40-51, Jan. 2007. [5] R. Wang and X. Chen. ǁManifold Discriminant Analysisǁ. In IEEE Conference on Computer Vision and Pattern Recognition, pages 1–8, 2009. [6] R. Wang, S. Shan, X. Chen, and W. Gao, ―Manifold-Manifold Distance with Application to Face Recognition Based on Image Set,ǁ Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 1- 8, 2008. [7] D. Zhang and Z. Zhou, ―2D2PCA: Two-Directional Two-Dimensional PCA for Efficient Face Representation and Recognition,ǁ Neurocomputing, vol. 69, nos. 1-3, pp. 224-231, 2005. [8] Zhenwei Miao n, Xudong Jiang School of Electrical and Electronic Engineering, Nanyang Technological University, Nanyang Link, Singapore 639798 ,Singapore. 2013 Elsevier. **********************************************************************************
  • 24. PERFORMANCE ANALYSIS OF VITERBI DECODER FOR WIRELESS APPLICATIONS G.Sivasankar and L.Thangarani Department of Electronics and Communication, Mepco Schlenk Engineering College, Sivakasi, Tamilnadu, India ABSTRACT Viterbi decoder is employed in wireless communication to decode the convolutional codes; those codes are used in every robust digital communication systems. Convolutional encoding and viterbi decoding is a powerful method for forward error correction. This paper deals with synthesis and implementation of viterbi decoder with a constraint length of three as well as seven and the code rate of ½ in FPGA (Field Programmable Gate Array). The performance of viterbi decoder is analyzed in terms of resource utilization. The design of viterbi decoder is simulated using Verilog HDL. It is synthesized and implemented using Xilinx 9.1ise and Spartan 3E Kit. It is compatible with many common standards such as 3GPP, IEEE 802.16 and LTE. KEYWORDS Convolutional encoder, Constraint length, Code rate, Viterbi decoder, Viterbi algorithm, Hamming distance, Verilog HDL, FPGA. Volume URL: https://airccse.org/journal/acij/vol5.html Full Article: https://airccse.org/journal/acij/papers/5414acij01.pdf REFERENCES [1] A.J. Viterbi (1967) “Error bounds for Convolutional Coding and an asymptotically optimum decoding algorithm ”, IEEE Transactions on Inform. Theory, Vol. 2, pp260-269. [2] Mr.Vishal, G.Jadhao, Prof. Prafulla & D. Gawade (2012)“Performance analysis of linear block code and convolutional code to study their comparative effectiveness”, IOSR Journal of Electrical and Electronics Engineering. [3] Hiral Pujara, Pankaj Prajapati (2013) “RTL Implementation of Viterbi Decoder using VHDL”, IOSR Journal of VLSI and Signal Processing, Vol. 2, pp65-71.
  • 25. [4] M.Gayathiri et al (2013) “FPGA implementation of high speed and low power viterbi encoder and decoder ”, International journal of Engineering and Technology, Vol. 2, pp1315-1320.
  • 26. PATH FINDING SOLUTIONS FOR GRID BASED GRAPH Dr. R.Anbuselvi M.Sc., M.Phil. Ph.D1 1Assistant Professor in Computer Science, Bishop Heber College, Trichy-17 ABSTRACT Any path finding will work as long as there are no obstacles on distractions along the way. A genetic Alalgorithm has been used for more advanced environments in graph. Implementation of the path finding algorithm for grid based graph with or without obstacles. KEYWORDS Path, Finding, Solution Volume URL: http://airccse.org/journal/acij/vol7.html Full Article: http://airccse.org/journal/acij/papers/4213acij05.pdf REFERENCES [1] Botea A.Muller, and Schaeffer, J 2004, near optimal hierarchical path-finding. Journal of Game Development7.28. [2] Hart P.Nilsson, N.J and Raphael, B.1968. A formal basis for the heuristic determination of minimum cost paths. IEEE Transactions on System Science and Cybernetics 100.107. [3] Holte, R.; Perez, M.; Zimmer, R.; and MacDonald, A. 1996. Hierarchical A*: Searching abstraction hierarchies efficiently. In proceedings AAA!-96,530.535. [4] Rabin, S. 2000.A*: Speed optimizations in Game programming Gems.272.287. [5] Craig Reynolds's, (1999) “Sterring Behavior for Autonomous Characters”. [6] Dave Pottinger, “Coordinated Unit Movement:” 22nd Jan 1999. Gamasutra Vol.3: Issue 3 [7] DavePottenger's “Implementing Coordinated Movement:” 29th Jan 1999. Game Developer PP 48- 58. Second in two-part series. [8] Macro Pinter, “More Realistic Path Finding Article:” 14th March 2001. Gamasutra. [9] Eric Marchesin, “ A Simple C# Genetic algorithm Article:” 22nd June 2003, .NET 1.0, 4.72 [10] http://www.gamasutra.com [11] Path finding is more general tool that can be used to solve a wider variety of problems as stated in accelerated A* path finding by sisiak(2009). [12] A* works at the level of simple passable / un passable grid spaces as defined in Dijkstra path finding algorithm.(2007). **********************************************************************************
  • 27. DETECTION OF FORGERY AND FABRICATION IN PASSPORTS ANDVISAS USING CRYPTOGRAPHY AND QR CODES Cheman Shaik VISH Consulting Services Inc, 6242 N Hoyne Avenue, Chicago IL 60659, USA ABSTRACT In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app andplace it for download on their website or Google Play Store and iPhone App Store. Anyindividual or immigration authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code usingthe public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication. KEYWORDS Passport, Visa, Forgery, Fabrication, Cryptography, Encryption, Decryption, QR Code, Mobile App Volume Link: https://airccse.org/journal/acij/vol12.html Pdf Link: https://aircconline.com/acij/V12N1/12121acij01.pdf
  • 28. REFERENCES 1. U.S Department of State, "Passport and Visa Fraud: A Quick Course", https://2009- 2017.state.gov/m/ds/investigat/c10714.htm 2. Reeta R Gupta and N Ravi, "Passport Forgery and Forensic Examination of Indian Passport", Journal of Forensic Sciences & Criminal Investigation - Volume - 5 Issue - 1 September 2017 3.Miss A.M Investigations, “How to spot a fraudulent document”, https://missaminvestigations.co.uk/2018/10/15/how-to-spot-a-fraudulent-document/ 4. Kwang-Baek, KimYoung-Ju, KimAm-Suk Oh, "An Intelligent System for Passport Recognition Using Enhanced RBF Network", International Conference on Computational and Information Science CIS 2004: Computational and Information Science pp 762-767. 5. Young-Bin Kwon and J.-h. Kim, “Recognition based verification for the machine readable travel documents,” in International Workshop on Graphics Recognition (GREC 2007), Curitiba, Brazil. Citeseer, 2007 6. Kwang-Baek Kim, Sungshin Kim, "A passport recognition and face verification using enhanced fuzzy ART based RBF network and PCA algorithm", Neurocomputing, Volume 71, Issues 16–18, 2008, Pages 3202-3210 7. S. V. Patgar, K. Rani, and T. Vasudev, “An unsupervised intelligent system to detect fabrication in photocopy document using variations in bounding box features,” in Contemporary Computing and Informatics (IC3I), 2014 International Conference on. IEEE, 2014, pp. 670–675 8. R. Bertrand, O. R. Terrades, P. Gomez-Kramer, P. Franco, and J.-M. Ogier, “A conditional random field model for font forgery detection,” in Document Analysis and Recognition (ICDAR), 2015 13th International Conference on. IEEE, 2015, pp. 576–580 9. VeriDoc Global, "What can be done about passport fraud right now?", https://veridocglobal.medium.com/what-can-be-done-about-passport-fraud-b6d5cb5e0370 10. dtos-mu.com, "UnderstandingThe BasicsofPublic Key Cryptography", https://www.dtosmu.com/understanding-the-basics-of-public-key-cryptography/ 11. Scanova Blog, "What is a QR Code: A Beginner’s Guide", https://scanova.io/blog/what-is-a- qr-code/ 12. Chinmay Jathar, Swapnil Gurav, and KranteeJamdaade, "A Review on QR Code Analysis", International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 8, Issue 7, July 2019
  • 29. 13. uQR.me, "30 Things You Should Know About QR Codes", https://uqr.me/blog/things-you- shouldknow-about-qr-codes/
  • 30. BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA Shokooh Taghian1,2 and Mohammad H. Nadimi-Shahraki1,2,* 1Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Iran2Big Data Research Center, Najafabad Branch, Islamic Azad University, Najafabad, Iran ABSTRACT A well-constructed classification model highly depends on input feature subsets from a dataset, which may contain redundant, irrelevant, or noisy features. This challenge can be worse while dealing with medical datasets. The main aim of feature selection as a pre-processing task is to eliminate these features and select the most effective ones. In the literature, metaheuristic algorithms show a successful performance to find optimal feature subsets. In this paper, two binary metaheuristic algorithms named S- shaped binary Sine Cosine Algorithm (SBSCA) and V-shaped binary Sine Cosine Algorithm (VBSCA) are proposed for feature selection from the medical data. In these algorithms, the search space remains continuous, while a binary position vector is generated by two transfer functions S-shaped and V-shaped for each solution. The proposed algorithms are compared with four latest binary optimization algorithms over five medical datasets from the UCI repository. The experimental results confirm that using bothbSCA variants enhance the accuracy of classification on these medical datasets compared to fourother algorithms. KEYWORDS Medical data, Feature selection, metaheuristic algorithm, Sine Cosine Algorithm, Transfer function Volume Link: https://airccse.org/journal/acij/vol10.html Pdf Link: https://aircconline.com/acij/V10N5/10519acij01.pdf
  • 31. REFERENCES [1] S. Gu, R. Cheng, and Y. Jin, Feature selection for high-dimensional classification using a competitive swarm optimizer, Soft Computing, vol. 22, 2018, pp. 811-822. [2] B. Xue, M. Zhang, W. N. Browne, and X. Yao, A survey on evolutionary computation approaches to feature selection, IEEE Transactions on Evolutionary Computation, vol. 20, 2015, pp. 606-626. [3] I. Guyon and A. Elisseeff, An introduction to variable and feature selection, Journal of machine learning research, vol. 3, 2003, pp. 1157-1182. [4] H. Liu and L. Yu, Toward integrating feature selection algorithms for classification and clustering, IEEE Transactions on Knowledge & Data Engineering, 2005, pp. 491-502. [5] M. Dash and H. Liu, Feature selection for classification, Intelligent data analysis, vol. 1, 1997, pp. 131-156. [6] Y. Saeys, I. Inza, and P. Larrañaga, A review of feature selection techniques in bioinformatics, bioinformatics, vol. 23, 2007, pp. 2507-2517. [7] C. Dhaenens and L. Jourdan, Metaheuristics for big data: John Wiley & Sons, 2016. [8] P. Luukka, Feature selection using fuzzy entropy measures with similarity classifier, Expert Systems with Applications, vol. 38, 2011, pp. 4600-4607. [9] E.-G. Talbi, Metaheuristics: from design to implementation vol. 74: John Wiley & Sons, 2009. [10] D. H. Wolpert and W. G. Macready, No free lunch theorems for optimization, IEEE transactions on evolutionary computation, vol. 1, 1997, pp. 67-82. [11] R. Eberhart and J. Kennedy, A new optimizer using particle swarm theory in MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, 1995, pp. 39-43. [12] R. Storn and K. Price, Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces, Journal of global optimization, vol. 11, 1997, pp. 341-359. [13] D. Karaboga and B. Basturk, A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm, Journal of global optimization, vol. 39, 2007, pp. 459-471. [14] X.-S. Yang, A new metaheuristic bat-inspired algorithm in Nature inspired cooperative strategies for optimization (NICSO 2010), ed: Springer, 2010, pp. 65-74.
  • 32. [15] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, GSA: a gravitational search algorithm, Information sciences, vol. 179, 2009, pp. 2232-2248. [16] S. Mirjalili, S. M. Mirjalili, and A. Lewis, Grey wolf optimizer, Advances in Engineering Software, vol. 69, 2014, pp. 46-61. [17] S. Mirjalili, SCA: a sine cosine algorithm for solving optimization problems, Knowledge- Based Systems, vol. 96, 2016, pp. 120-133. [18] H. Zamani, M. H. Nadimi-Shahraki, and A. H. Gandomi, CCSA: Conscious Neighborhood- based Crow Search Algorithm for Solving Global Optimization Problems, Applied Soft Computing, in press, 2019, https://doi.org/10.1016/j.asoc.2019.105583. [19] D. E. Goldberg, Genetic algorithm, Search, Optimization and Machine Learning, 1989, pp. 343- 349. [20] M. Dorigo, M. Birattari, C. Blum, M. Clerc, T. Stützle, and A. Winfield, Ant Colony Optimization and Swarm Intelligence: 6th International Conference, ANTS 2008, Brussels, Belgium, September 22-24, 2008, Proceedings vol. 5217: Springer, 2008. [21] S. Taghian, M. H. Nadimi-Shahraki, and H. Zamani, Comparative Analysis of Transfer Functionbased Binary Metaheuristic Algorithms for Feature Selection in 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), 2018, pp. 1-6. [22] H. Zamani and M. H. Nadimi-Shahraki, Swarm Intelligence Approach for Breast Cancer Diagnosis, International Journal of Computer Applications, vol. 151, 2016, pp. 40-44. [23] M. Banaie-Dezfouli, M. H. Nadimi-Shahraki, and H. Zamani, A Novel Tour Planning Model using Big Data in 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), 2018, pp. 1-6. [24] H. G. Arjenaki, M. H. Nadimi-Shahraki, and N. Nourafza, A low cost model for diagnosing coronary artery disease based on effective features, International Journal of Electronics Communication and Computer Engineering, vol. 6, 2015, pp. 93-97. [25] E. S. Fard, K. Monfaredi, and M. H. Nadimi-Shahraki, An Area-Optimized Chip of Ant Colony Algorithm Design in Hardware Platform Using the Address-Based Method, International Journal of Electrical and Computer Engineering, vol. 4, 2014, pp. 989-998. [26] L. K. Panwar, S. Reddy, A. Verma, B. K. Panigrahi, and R. Kumar, Binary grey wolf optimizer for large scale unit commitment problem, Swarm and Evolutionary Computation, vol. 38, 2018, pp. 251-266. [27] X.-S. Yang, Nature-inspired metaheuristic algorithms: Luniver press, 2010.
  • 33. [28] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, BGSA: binary gravitational search algorithm, Natural Computing, vol. 9, 2010, pp. 727-745. [29] E. Emary, H. M. Zawbaa, and A. E. Hassanien, Binary grey wolf optimization approaches for feature selection, Neurocomputing, vol. 172, 2016, pp. 371-381. [30] M. M. Mafarja, D. Eleyan, I. Jaber, A. Hammouri, and S. Mirjalili, Binary dragonfly algorithm for feature selection in 2017 International Conference on New Trends in Computing Sciences (ICTCS), 2017, pp. 12-17. [31] S. Mirjalili, Dragonfly algorithm: a new meta-heuristic optimization technique for solving singleobjective, discrete, and multi-objective problems, Neural Computing and Applications, vol. 27, 2016, pp. 1053-1073. [32] H. Faris, M. M. Mafarja, A. A. Heidari, I. Aljarah, A.-Z. Ala’M, S. Mirjalili, et al., An efficient binary salp swarm algorithm with crossover scheme for feature selection problems, KnowledgeBased Systems, vol. 154, 2018, pp. 43-67. [33] S. Mirjalili and A. Lewis, The whale optimization algorithm, Advances in engineering software, vol. 95, 2016, pp. 51-67. [34] H. Zamani and M.-H. Nadimi-Shahraki, Feature selection based on whale optimization algorithm for diseases diagnosis, International Journal of Computer Science and Information Security, vol. 14, 2016, pp. 1243-1247. [35] S. Arora and P. Anand, Binary butterfly optimization approaches for feature selection, Expert Systems with Applications, vol. 116, 2019, pp. 147-160. [36] S. Arora, H. Singh, M. Sharma, S. Sharma, and P. Anand, A New Hybrid Algorithm Based on Grey Wolf Optimization and Crow Search Algorithm for Unconstrained FunctionOptimization and Feature Selection, IEEE Access, vol. 7, 2019, pp. 26343-26361. [37] M. Taradeh, M. Mafarja, A. A. Heidari, H. Faris, I. Aljarah, S. Mirjalili, et al., An Evolutionary Gravitational Search-based Feature Selection, Information Sciences, 2019, pp. 219- 239. [38] A. I. Hafez, H. M. Zawbaa, E. Emary, and A. E. Hassanien, Sine cosine optimization algorithm for feature selection in 2016 International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), 2016, pp. 1-5. [39] K. S. Reddy, L. K. Panwar, B. Panigrahi, and R. Kumar, A New Binary Variant of Sine– Cosine Algorithm: Development and Application to Solve Profit-Based Unit Commitment Problem, Arabian Journal for Science and Engineering, vol. 43, 2018, pp. 4041-4056. [40] C. L. Blake and C. J. Merz, UCI repository of machine learning databases, 1998.
  • 34. [41] J. Kennedy and R. C. Eberhart, A discrete binary version of the particle swarm algorithm in 1997 IEEE International conference on systems, man, and cybernetics. Computationalcybernetics and simulation, 1997, pp. 4104-4108. [42] S. Mirjalili, S. M. Mirjalili, and X.-S. Yang, Binary bat algorithm, Neural Computing and Applications, vol. 25, 2014, pp. 663-681. [43] M. Friedman, The use of ranks to avoid the assumption of normality implicit in the analysis of variance, Journal of the american statistical association, vol. 32, 1937, pp. 675-701.