scispace - formally typeset
Search or ask a question

Showing papers in "Computer Science and Information Technology in 2013"


Journal ArticleDOI
TL;DR: New operations on intuitionistic neutrosophic soft sets have been introduced and some results relating to the properties of these operations have been established.
Abstract: Intuitionistic Neutrosophic soft set theory proposed by S.Broumi and F.Samarandache (28), has been regarded as an effective mathematical tool to deal with uncertainties. In this paper new operations on intuitionistic neutrosophic soft sets have been introduced . Some results relating to the properties of these operations have been established. Moreover ,we illustrate their interconnections between each other.

28 citations


Journal ArticleDOI
TL;DR: This paper examines the underlying issues behind IDM and proposes a framework which aims to achieve the identification of Things and their safe management and aims to open a research debate which will help to solve the future IoT IDM issues in healthcare applications.
Abstract: The Internet of Things (IoT) in healthcare and medical applications promises to solve many problems which are currently challenging the sector, ranging from remotely caring for our aging population to medical discoveries on incurable diseases. However, the challenges and risks of having 50 billion Things and users connected together are complex and may be detrimental to control. Concerns have been raised in relation to the IoT Identification Management (IDM) issues, in which each Thing (user and device) will be required to have a unique identity, and the IDM to be able to distinguish between a device and user, as well as ensuring identity and information context safety. This paper examines the underlying issues behind IDM and proposes a framework which aims to achieve the identification of Things and their safe management. The IDM framework is embedded in Mobile Ad Hoc Networks (MANETs) and assumes that most healthcare devices will be linked wirelessly and in mobile environments. The paper aims to open a research debate which will help to solve the future IoT IDM issues in healthcare applications.

26 citations


Journal Article
TL;DR: This paper proposes a new technique toward description of security requirements of Intrusion Tolerant Systems (ITS) using fuzzy logic and accepts partial satisfaction of security goals, which is accepted and formally described through establishment of a Goal-Based Fuzzy Grammar (GFG) and its respective goal-based language (GFL) for describing Security Requirement Model (SRM) of the target ITS.
Abstract: To care for security in early stages of software development has always been a major engineering trend. However, due to the existence of unpreventable and accidental security faults within the system, it is not always possible to entirely identify and mitigate the security threats. This may eventually lead to security failure of the target system. To avoid security failure, it is required to incorporate fault tolerance (i.e. intrusion tolerant) into the security requirements of the system. In this paper, we propose a new technique toward description of security requirements of Intrusion Tolerant Systems (ITS) using fuzzy logic. We care for intrusion tolerance in security requirements of the system through considering partial satisfaction of security goals. This partiality is accepted and formally described through establishment of a Goal-Based Fuzzy Grammar (GFG) and its respective Goal-Based Fuzzy Language (GFL) for describing Security Requirement Model (SRM) of the target ITS.

20 citations


Journal ArticleDOI
TL;DR: In this article, the authors explore different context information fusion techniques by comparing a large number of solutions, their methods, architectures and models, and compare their results with the results of the previous work.
Abstract: Sensor Networks produce a large amount of data. According to the needs this data requires to be processed, delivered and accessed. This processed data when made available with the physical device location, user preferences, time constraints; generically called as context-awareness; is widely referred to as the core function for ubiquitous systems. To our best knowledge there is lack of analysis of context information fusion for ubiquitous sensor networks. Adopting appropriate information fusion techniques can help in screening noisy measurements, control data in the network and take necessary inferences that can help in contextual computing. In this paper we try and explore different context information fusion techniques by comparing a large number of solutions, their methods, architectures and models.

16 citations


Journal ArticleDOI
TL;DR: The architecture and design of Part-A-lot, an automated parking management system that minimizes the hassles of existing issues and provides an implementable model for parking lots in an urban setting.
Abstract: This paper describes the architecture and design of Part-A-lot, an automated parking management system. It explains the working dynamics of this prototype system and its communication with the website to find a parking spot before arriving at the destination. This system proposes a solution for urban parking problems. It minimizes the hassles of existing issues and provides an implementable model for parking lots in an urban setting.

14 citations


Journal ArticleDOI
TL;DR: A solution to the scheduling problem using two different heuristics namely Simulated Annealing and Ant Colony Optimization is presented.
Abstract: The scheduling problem is one of the most challenging problems faced in many different areas of everyday life. This problem can be formulated as a combinatorial optimization problem, and it has been solved with various methods using meta-heuristics and intelligent algorithms. We present in this paper a solution to the scheduling problem using two different heuristics namely Simulated Annealing and Ant Colony Optimization. A study comparing the performances of both solutions is described and the results are analyzed.

14 citations


Journal ArticleDOI
TL;DR: The main aim of this study is to transform the digital images into different forms using mathematical morphology so that it can be suitable for the respective applications.
Abstract: The main aim of this study is to transform the digital images into different forms. Image processing techniques are used with wide varieties of applications. The requirement is different for different applications. This study is mainly focused on how to transform the image using mathematical morphology so that it can be suitable for the respective applications. Mathematical morphology has been chosen to explain how images are used to illustrate mathematical set theoretic operations, such as union, intersection by means of morphological operations like dilation and erosion. These techniques are implemented in MATLAB using image processing algorithms. MATLAB is an excellent tool to accomplish these tasks.

13 citations


Journal ArticleDOI
TL;DR: Challenges in education sector of Bangladesh are discussed and some recommendations are provided and the development of Bangladesh through the implementation of ICT in education is discussed.
Abstract: Bangladesh is a developing country with the literacy rate of 62.5%. Challenges in education sector are huge. There is no doubt that IT is going to bring about a tremendous change in education. The use of ICT in education was more student-centred learning. Because of the world moving rapidly into digital media and information, the role of ICT in education is becoming more and more important. In developing countries like Bangladesh, The implementation of ICT in education sector is a greatest challenge. In this paper, challenges are discussed and some recommendations are provided. The development of Bangladesh through the implementation of ICT in education also discussed here.

13 citations


Journal Article
TL;DR: This paper explores recently identified privacy and security issues that affect telemedicine, feature threats on security and authentication of medical records, and propose digital watermarking as a technology to curb authentication issues in telemedics.
Abstract: An Advancement in telecommunication combined with improved information infrastructures has opened up new dimensions in e-health environment Such technologies make readily available to access, store, manipulate and replicate medical information and images These technologies help reduce the time and effort in diagnosis and treatment at lower cost However, protection and authentication of such medical information and images are now becoming increasingly important in telemedicine environment, where images are readily distributed over electronic networks Intruders/hackers may gain access to confidential information, and possible alter or even delete such vital records The ultimate success of telemedicine demands an effective technology as well as privacy and security of records should be main concern This paper explores recent identified privacy and security issues that affect telemedicine by featuring threats on security and authentication of medical records Various technological methods of protecting telemedicine information were explored It was found that Digital watermarking has more advantages over other schemes Hence, Digital watermarking was proposed to curb privacy and security issues in telemedicine

13 citations


Journal ArticleDOI
TL;DR: This study utilized 206 responses from different categories mainly undergraduate students and Facebook users and concluded that the highest perceived advantage of SN is "I can search and find new and old friends (classmates & relatives)" and the highest perception disadvantage is "Excessive addiction".
Abstract: Social networks (SN) hit the Arab world strongly in the last few months, where young people communicated, collaborated, and shared all sorts of information and files through Facebook and other types of SNs. It is not clear how young people perceive this type of activity and how they are influenced in their daily livings. It is important to understand how young people see Facebook and understand its advantages and disadvantages. This study utilized 206 responses from different categories mainly undergraduate students (paper survey) and Facebook users (electronic survey) and concluded that the highest perceived advantage of SN is "I can search and find new and old friends (classmates & relatives)" and the highest perceived disadvantage is "Excessive addiction". Conclusions and future work are reported at the end.

12 citations


Journal ArticleDOI
TL;DR: This short paper derives exact formulas for the average internode distance in mesh and complete binary tree networks, particularly for networks that are not node-symmetric.
Abstract: The average internode distancein an interconnection network (or its average distance for short) is an indicator of expected message latency in that network under light and moderate network traffic. Unfortunately, it is not always easy to find an exact value for the average internode distance, particularly for networks that are not node-symmetric, because the computation must be repeated for many classes of nodes. In this short paper, we derive exact formulas for the average internode distance in mesh and complete binary tree networks.

Journal ArticleDOI
TL;DR: The team presents findings from the development process describing four periods of virtual technology development, namely telepresence, interactivity, connectivity and synthesis, which could describe the condition of thevirtual technology development.
Abstract: Although the application of virtual technology is experiencing an exponential growth during the last three to four decades, researchers still did not catch up with a clear development direction of virtual technology. There is an urge to seek the direction of virtual technology development in the future. Based on previous studies of VR and the virtual technology development process, this study aims to investigate: (1) if the direction of virtual technology development changed throughout the long process or it remained consistent over time; and (2) if there was predictable direction of virtual technology development. To understand the phenomenon, this research studies the events of virtual technology development process diachronically from 1950s to present. Our team presents findings from the development process describing four periods of virtual technology development, namely telepresence, interactivity, connectivity and synthesis. The four period of development could describe the condition of the virtual technology development. These relationships are situated within the historical contexts of the virtual technology development. With the analysis of virtual technology development in historical context, this article forecasts the future of VR development. The findings will contribute to future creation of stereoscopic virtual worlds.

Journal Article
TL;DR: In this paper, the authors present the ten major ITG audit challenges facing Australian public sector organisations today and provide insights regarding the impact of, and required effort to address these challenges.
Abstract: Information technology (IT) has been playing a powerful role in creating a competitive advantage for organisations over the past decades. This role has become proportionally greater over time as expectations for IT investments to drive business opportunities keep on rising. However, this reliance on IT has also raised concerns about regulatory compliance, governance and security. IT governance (ITG) audit leverages the skills of IS/IT auditors to ensure that IT initiatives are in line with the business strategies. ITG audit emerged as part of performance audit to provide an assessment of the effective implementation of ITG. This research attempts to empirically examine the ITG audit challenges in the public sector. Based on literature and Delphi research, this paper provides insights regarding the impact of, and required effort to address these challenges. The authors also present the ten major ITG audit challenges facing Australian public sector organisations today.

Journal ArticleDOI
TL;DR: A framework on ontology based text mining to cluster research proposals, external reviewers based on their research area and to assign concerned research proposals to reviewers systematically is presented.
Abstract: Research and development (R&D) project selection is an decision-making task commonly found in government funding agencies, universities, research institutes, and technology intensive companies. Text Mining has emerged as a definitive technique for extracting the unknown information from large text document. Ontology is a knowledge repository in which concepts and terms are defined as well as relationships between these concepts. Ontology's make the task of searching similar pattern of text that to be more effective, efficient and interactive. The current method for grouping proposals for research project selection is proposed using an ontology based text mining approach to cluster research proposals based on their similarities in research area. This method is efficient and effective for clustering research proposals. However proposal assignment regarding research areas to experts cannot be often accurate. This paper presents a framework on ontology based text mining to cluster research proposals, external reviewers based on their research area and to assign concerned research proposals to reviewers systematically. A knowledge based agent is appended to the proposed system for a retrieval of data from the system in an efficient way.

Journal ArticleDOI
TL;DR: Pre-processing and pre-segmentation steps for the detection of abnormal region in the brain image are proposed and abnormalities can be segmented by grouping homogeneous regions according to the predefined criteria.
Abstract: This paper aims to introduce the method for detection and classification of an abnormality of the brain region into infarct, haemorrhage. Initially, the image is pre-processed to remove film artifact, noise using morphological operations. And the brain image is cropped to eliminate the extra parts. Before the abnormality region (infarct, haemorrhage) is segmented, the image is pre-segmented. In this stage, the image is subdivided into four quadrants using split and merge technique to find the region that has the possibility for inclusion of abnormal areas. Thus, the unnecessary regions are no need to search and segment. This paper proposes pre-processing and pre-segmentation steps for the detection of abnormal region in the brain image. Then, abnormalities can be segmented by grouping homogeneous regions according to the predefined criteria. The accuracy of the segmentation results can be assessed by the specialist.

Journal ArticleDOI
TL;DR: A model to determine the reorder point and the optimal order quantity in a warehouse to prevent excessive inventory storage while reducing the cost on the other hand is developed.
Abstract: We develop a model to determine the reorder point and the optimal order quantity in a warehouse. Due to the maintenance costs, it is better to consider the order time period and the order quantity to prevent excessive inventory storage while reducing the cost on the other hand. In our study, we employ fuzzy logic as time decision aid and Genetic Algorithm for optimal order quantity. The decision making process is performed in an application software designed for a diary firm.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a Transcript Xpress which will open new and convenient routes to key educational solutions to information, providing application service delivery and ensure that proper records are kept in tact.
Abstract: Education is priceless and every academic institution needs to be very serious about its management and administration in order not to mess around with the students' academic headway. Therefore, there is need for them to significantly improve and incredibly convenient arrangement by which former students receive final academic transcripts. It is indeed a nightmare of unimaginable proportions to attempt to get academic records from some universities, especially in recent times. This is as a result of the administrative heedlessness of some record officials in the university. A request for an undergraduate transcript means the requestor sometime is expected to wait longer than expected with the hope of getting his results. This paper proposes a Transcript Xpress which will open new and convenient routes to key educational solutions to information, providing application service delivery and ensure that proper records are kept in tact. This will improve the university's efficiency and effectiveness through the provision of high quality information system and services. Transcript Xpress will be the catalyst for change through improved educational solutions.

Proceedings ArticleDOI
TL;DR: Ocl as mentioned in this paper is a Python library built on top of pyOpenCL and numpy that allows programming GPU devices using Python, which can be used to solve the problem of computing the covariance matrix for historical stock prices.
Abstract: We describe ocl, a Python library built on top of pyOpenCL and numpy. It allows programming GPU devices using Python. Python functions which are marked up using the provided decorator, are converted into C99/OpenCL and compiled using the JIT at runtime. This approach lowers the barrier to entry to programming GPU devices since it requires only Python syntax and no external compilation or linking steps. The resulting Python program runs even if a GPU is not available. As an example of application, we solve the problem of computing the covariance matrix for historical stock prices and determining the optimal portfolio according to Modern Portfolio Theory.

Journal ArticleDOI
TL;DR: This paper presents a visualization approach that aims to give a stable and meaningful overview of a data landscape to ease finding and selecting data sources that may be useful in a subsequent visual analysis.
Abstract: In many domains, it becomes more and more common that an analysis spans various interlinked data sources that we collectively term data landscape. Yet for the selection of appropriate data sources from the wide range of available ones, current approaches and systems rarely offer more support than a File-Open- dialog. This paper presents a visualization approach that aims to give a stable and meaningful overview of a data landscape to ease finding and selecting data sources that may be useful in a subsequent visual analysis. As such, it serves as a visual starting point from which to bootstrap a visual analysis by finding and selecting the data sources relevant to a question at hand. This approach is exemplified by applying it to a current snapshot of the data landscape from the CKAN-LOD data hub consisting of 216 data sources with 613 links between them.

Journal ArticleDOI
TL;DR: This paper proposes the utilisation of a priori conceptual relations between terms that exist independently of any documents through a controlled vocabulary known as thesaurus, which incorporates both terms and the conceptual relations among them.
Abstract: In traditional database management systems, information retrieval is often carried out using keywords contained within fields of each record. Because a term (concept) can be expressed in several ways, a significant number of records are ignored by the free text techniques which use only a posteriori relations between terms. This paper proposes the utilisation of a priori conceptual relations between terms that exist independently of any documents through a controlled vocabulary known as thesaurus, which incorporates both terms and the conceptual relations among them. The paper discusses the integration of multilingual thesauri in the set-theoretic FDB (Frame DataBase) data model, which offers by default a universal schema for all applications. All changes to the structure of the logical-level database schema can be carried out by modifying the appropriate metadata. The purpose of this extension is for the database user to be able to apply queries on a database using information through multilingual thesauri. This approach extends the FDB model so that users can apply queries to the database using both a priori and a posteriori relationships. Apart from free text retrieval and "conceptual searching" the proposed structure enables multilingual searching independently of the language used to store data itself.

Journal ArticleDOI
TL;DR: In this paper, the authors tried to support young children regarding their understanding about planets such as Sun, Moon and our planet by using technology, particularly through three-dimensional virtual environments, which whom are in primary school at the second stage, can have an early understanding about the shape of the Sun, moon, and Earth, and the relationship among them, how the moon seems to change shape and how it occurs, phenomenon of day and night, through the use of vision of 3D holograms.
Abstract: This paper tries to support young children regarding their understanding about planets such as Sun, Moon and our planet by using technology, particularly through three-dimensional virtual environments, which whom are in primary school at the second stage, can have an early understanding about the shape of the Sun, Moon, and Earth, and the relationship among them, how the moon seems to change shape and how it occurs, phenomenon of day and night, through the use of vision of 3D holograms. 3D hologram vision system may be an effective tool for the teaching on various topics, like astronomy, which interpreted the relationships between objects in Aerospace. Presently, From other hand the Indiana state standards toward science education does not refer or suggest to the learning of this area and concepts for phenomenon of astronomy clearly, before fourth stage. So far, we expect our findings indicates that the students can learn from the previous these concepts in their learning lives with the implementation of these technologies. In addition the expect that these techniques could happen revolution and a quantum leap in education and raising the ability and cognition in children regarding in the understanding of scientific topics.

Journal ArticleDOI
TL;DR: The challenges that hinder the adoption of ICT in libraries with special attention to HILs in developing countries are investigated and solutions and recommendations to address these challenges are presented with case study analysis.
Abstract: The adoption of ICT has revolutionized service provision in libraries and their general information management systems. This has transformed most services to digital: e-database (e-resources), e-catalogs, e-library and use of archiving technology like DSpace. Today, within the developing world, most libraries are moving towards transforming their existing traditional library services to digital systems - allowing them to tap and benefit from the vast advantages of ICT, for example, operation costs reduction, increased efficiency, an on-the-fly availability of information. Even with such numerous benefits, most Higher Institutions of Learning (HILs) in developing countries still lag behind on adoption of ICT in their library services. This paper seeks to investigate the challenges that hinder the adoption of ICT in libraries with special attention to HILs in developing. Further, solutions and recommendations to address these challenges are presented with case study analysis.

Journal ArticleDOI
TL;DR: The method proposed is based on YCbCr color space, single Gaussian model, Bayes rule and morphology operations, which detects regions of face and hands in complex background and non-uniform illumination.
Abstract: An accurate face and hand segmentation is the first and important step in sign language recognition systems. In this paper, we propose a method for face and hand segmentation that helps to build a better vision based sign language recognition system. The method proposed is based on YCbCr color space, single Gaussian model, Bayes rule and morphology operations. It detects regions of face and hands in complex background and non-uniform illumination. This method tested on 700 posture images of the sign language that are performed with one hand or both hands. Experimental results show that our method has achieved a good performance for images with complex background.

Journal Article
TL;DR: The methods of automatic identification of iris recognition used in different stages, in particular, Iris image acquisition, Segmentation, Normalization, Feature encoding and matching steps are studied and compared.
Abstract: In this Review paper, it is summarize and compare the methods of automatic identification of iris recognition used in different stages. In particular, Iris image acquisition, Segmentation, Normalization, Feature encoding and matching steps are studied and compared. In Segmentation and Normalization stage, iris image is converted into standard format with contrast manipulation; noise reduction by filtering process and transformation. From the rest of the acquired image segmentation process delimits that iris image. In segmentation, the number of resources which required describing large set of data should be selected and simplified.

Journal ArticleDOI
TL;DR: In this article, the impact of group members' gender and familiarity on group decision making performance has been investigated in a study at Yarmouk University in Jordan, where a sample of students performed a specific task using a GSS enabled environment and the results revealed that female-only groups have a better performance than male only groups and groups with familiar members have better influence on the quality of decisions made during group work.
Abstract: Group decision making is becoming a very common activity in human society all over the world. Business problems nowadays are increasingly involving interactivity that requires collective effort and detailed information shared by a group of people working together. This paper is concerned with measuring the impact of group members' gender and familiarity on group decision making performance. An experimental approach is adopted where a sample of students, who study at Yarmouk University in Jordan, performed a specific task using a GSS enabled environment. Results revealed that female-only groups have a better performance than male-only groups and groups with familiar members have a better influence on the quality of decisions made during group work. Conclusions, contributions and future work are reported at the end.

Journal ArticleDOI
TL;DR: The Purpose is to find a schedule, that is, an allocation of the operations to time intervals to machines that has minimal length.
Abstract: Job sequencing is the arrangement of the task that is to be performed or processed in a machine in that particular order. Job sequencing problem has become the major problem in the computer field. A finite set of n jobs where each job consists of a chain of operations and a finite set of m machines where each machine can handle at most one operation at a time. Each operation needs to be processed during an uninterrupted period of a given length on a given machine and our Purpose is to find a schedule, that is, an allocation of the operations to time intervals to machines that has minimal length.

Journal ArticleDOI
TL;DR: The types of Virtualization Technologies, hypervisors and configuration of the VMs are discussed and the performance of Virtual Machines using Kernel Based Virtual Machine - KVM, a Type2 hypervisor is analysed.
Abstract: Rapid advancement in computing technology has put forth Cloud computing as a paramount paradigm in distributed systems. It is very much essential and important too to fully understand the underlying technologies that makes clouds possible. One key technology that make makes the cloud popular is virtualization. Even though virtualization technology is not new, the concept of hypervisors with virtualization is getting popular and also well understood by many. There are a good number of hypervisors. This paper discusses the types of Virtualization Technologies, hypervisors and configuration of the VMs and analyse the performance of Virtual Machines using Kernel Based Virtual Machine - KVM, a Type2 hypervisor.

Journal Article
TL;DR: The process of hybridization of the two algorithms to solve the uncapacitated examination timetabling problems is discussed and GARRT, which aims to balance the global search and the local search, is described.
Abstract: Examination timetabling is one of the most important administrative tasks in academic institutions. They are used to schedule examinations into timeslots and rooms. Many methods have been developed to solve examination timetabling problems. Metaheuristics have shown good results especially if they are hybridized with other methods. Genetic Algorithms (GAs) are one of the techniques that have been used in optimization problems. Record-to-Record Travel (RRT) is another optimization method that has been introduced for local search. In this paper, we describe the combined use of GA and RRT, called GARRT. In particular, the process of hybridization of the two algorithms to solve the uncapacitated examination timetabling problems is discussed. GARRT aims to balance the global search (by GA) and the local search (by RRT). This work uses Carter’s benchmark datasets as the testbed. Simulation results showed that GARRT performed better when compared to the results generated by GA approach alone. A good result is achieved by minimizing the violation of the soft constraints.

Journal ArticleDOI
TL;DR: A narrative approach called CRPDS (Closed Regular Patterns in Data Streams) with vertical data format using sliding window model with results show that the proposed method is efficient and scalable in terms of memory and time.
Abstract: Mining regular patterns in data streams is an emerging research area and also a challenging problem in present days because in Data streams new data comes continuously with varying rates. Closed item set mining gained lot of implication in data mining research from conventional mining methods. So in this paper we propose a narrative approach called CRPDS (Closed Regular Patterns in Data Streams) with vertical data format using sliding window model. To our knowledge no method has been proposed to mine closed regular patterns in data streams. As the stream flows our CRPDS-method mines closed regular itemsets based on regularity threshold and user given support count. The experimental results show that the proposed method is efficient and scalable in terms of memory and time.

Journal Article
TL;DR: This paper focuses research issues in the area of Link analysis, which helps to personalize user, retrieve page and accurately pick pages for users.
Abstract: Web mining branches to three Text, Structure and Usage Mining. Structure Mining focuses on the arrangement of web pages and effective retrieval of them. Each and every page in web are inter connected through web links either pointing to the same site or pointing to another side. This can be studied through various researches in this area which helps to personalize user, retrieve page and accurately pick pages for users. This area has their co branches in Opinion Mining and mostly the concept of graph theory plays a vital role in the algorithms. This paper focuses research issues in the area of Link analysis.