scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Computing and Digital Systems in 2018"


Journal ArticleDOI
TL;DR: Comparison of PID controller, PID optimized by GA and fuzzy logic controllers for an automobile cruise control system (ACCS) where it has been used on linearized model of the cruise system indicates that the performance of fuzzy controller has better response regarding the overshoot and the settling time while the PID tuned by using GA gives the shortest rising time.
Abstract: Nowadays, automobile companies give good attention of cruise systems and cruise controllers which are considered as one of the most critical aspects that require precise controller that can accommodate the new development in technology. The movement of running automobiles is variable and complex. For this reason, cruise control system (CCS) has high non-linearity and if a traditional PID controller has been used, it will not give good results in all conditions. This paper presents comparative study of PID controller, PID optimized by GA and fuzzy logic controllers for an automobile cruise control system (ACCS) where it has been used on linearized model of the cruise system. The comparison was for the transient performance; i.e. settling time, rise time and maximum overshoot in addition to the steady state performance i.e. steady state error. MATLAB/SIMULINK and m-file have been used to show the efficiency of each method used and shows the comparison between them. The results indicate that the performance of fuzzy controller has better response regarding the overshoot and the settling time while the PID tuned by using GA gives the shortest rising time. A comparative analysis of each simulated result will be done based on the response characteristic.

15 citations


Journal ArticleDOI
TL;DR: This work presents a system for the automatic recognition of Arabic handwritten words based on statistical features extracted by Bag-of-Features framework that exploits the discriminative power of Gabor features.

14 citations


Journal ArticleDOI
TL;DR: This investigation aims to evaluate the performance of MANET routing protocols using the key performance indicators: throughput, end to end delay, and data packet delivery ratio, and results showed that DSR and AODV outperform DSDV.

9 citations



Journal ArticleDOI
TL;DR: A hardware design for drowsiness detection that consists of a non contact ECG sensor as an input source and a circuit with a two-stage amplifier to improve the ECG signal’s strength and filters to minimize noise is proposed.

6 citations



Journal ArticleDOI
TL;DR: A Content-Based Image Retrieval (CBIR) system is proposed to retrieve the Arabic manuscript images with Binary Robust Invariant Scalable Key points (BRISK) and Speeded-up Robust Feature (SURF) as features extraction techniques.
Abstract: Arabic manuscripts are worthy sources of knowledge that have been highly underutilized. Because, the vast content of the Arabic manuscript and the need of getting information from them, in a fast, efficient, and accurate way, it is essential to develop a system that supports the retrieval procedure from them. In this paper, a Content-Based Image Retrieval (CBIR) system is proposed to retrieve the Arabic manuscript images. The system has three stages: Preprocessing, feature extraction, and feature similarity matching. The features extraction techniques are the effective step for the performance of CBIR system. For this reason, we propose to apply Binary Robust Invariant Scalable Key points (BRISK) and Speeded-up Robust Feature (SURF) as features extraction techniques. The Hamming distance with BRISK and Sum of square differences (SSD) with SURF are used at the matching stage. The results of proposed system show that for SURF the average Recall is 85% and average Precision is 77%. The average time is 207.3 seconds per image. For BRISK, the average Recall is 69% and average Precision is 68%. The average time is 256.7 seconds per image. The SURF features yield the best performance for Arabic manuscript retrieval. For better time performance of the system we propose to use parallel computing as a future work.

5 citations



Journal ArticleDOI
TL;DR: An QoS model called Reconfigurable Scheduling Model (RSM) for real-time traffic in Diffserv router is designed and an improvement in QoS of voice and video traffics is shown.
Abstract: Quality of Service (QoS) is becoming increasingly important with the rise of multimedia applications (such as voice over IP (VoIP), video conferencing, and so on) in public data networks. These applications demand real-time service, while the networks should still be able to transfer also other traffic reliably (e.g., data, email, and WWW). In this paper, we concern how to improve the QoS of multimedia applications (Voice and video traffic) in DiffServ internet router by using the reconfigurable technique. Therefore we design an QoS model called Reconfigurable Scheduling Model (RSM) for real-time traffic in Diffserv router. In this model, we use the strict priority technique for the voice traffic to reduce the delay and then improve the QoS. While for video traffic, a hardware reconfigurable technique is used to provide the flexibility that improves QoS levels when compared to other techniques such as software-only implementations. This permits the run-time reconfiguration of the router resources, i.e., to change their functionality (from one scheduling algorithm to another), to adapt the fluctuation in traffic parameter. We choose two of the most widely used schedulers (CBWFQ, and MDRR) to support real-time allocations and to improve the QoS of video traffic. The reconfiguration or the switching between those two schedulers is based on queuing delay of the video traffic. To evaluate the proposed approach, the queuing model was built and simulated with MATLAB Simevents and Stateflow components. The result of simulation shows an improvement in QoS of voice and video traffics.

4 citations


Journal ArticleDOI
TL;DR: A novel protocol is proposed that aims to define a routing structure which maximizes data aggregation and minimizes the total transmission powers while ensuring a symmetric transmission power assignment to reliably deliver data.
Abstract: Data routing for in-network data aggregation is an important task in event-based wireless sensor networks. Previous works tackling this routing problem are distributed heuristics to the minimal Steiner tree. They aim to find a multihop routing structures that maximize data aggregation with the minimum number of hops. However, the nodes participating in this routing task don't have to use their maximum transmission powers, but instead, they have the potential to minimize them to conserve more energy. In this article we go further and based on the local minimum spanning tree algorithm and Ant-Colony-Optimization metaheuristic, we propose a novel protocol that aims to define a routing structure which maximizes data aggregation and minimizes the total transmission powers while ensuring a symmetric transmission power assignment to reliably deliver data. The proposal was widely compared to two other known protocols. Simulation results show the superiority of our protocol compared to these protocols.

4 citations



Journal ArticleDOI
TL;DR: In this paper, the authors explored students' attitudes towards the impact of social media on teaching writing at Buraimi University College (BUC), and found that the Facebook ''FB, henceforth'' group creates an atmosphere of active learning.
Abstract: This study explores students’ attitudes towards the impact of social media ( on teaching writing at Buraimi University College (BUC, hereafter). Facebook \"FB, henceforth” group creates an atmosphere of active learning. The participants’ attitude was measured through a questionnaire and interviews with both students and teachers. Pre-and post-writing achievement tests were administrated. So, a mixed approach was used to collect accurate data. Sixty students and fifteen EFL teachers were selected randomly. The findings showed that the FB group excelled in writing. Also, it was revealed that students learned new vocabulary through reading teacher’s and classmates’ comments and engaged in a collaborative community to produce elegant pieces of writing. Moreover, EFL teachers had positive attitudes toward social media. Furthermore, FB encouraged learners to monitor their progress, think critically, ameliorate their drafts, self-correct, receive teacher’s and partners’ feedback. These results may contribute in updating the methods of teaching writing in Omani schools.

Journal ArticleDOI
TL;DR: This paper brings out a systematic literature evaluation by spotting the light on cloud computing security necessities and it is worth mentioning that solutions for the provision of information security in cloud computing has been discussed in this research.
Abstract: a form for permitting services to user's everywhere is Cloud Computing; a suitable departure to the network is available upon request for a common set of constructive computing resources. These developments have created new security loopholes, including security issues that remain high full impressions. An up-and-coming area for study is the security of Cloud Computing, in particular for public clouds what can be provided from the infrastructure and computer resources owned by an outsourced party that provides individuals with services. One of the most complex problems in cloud computing is the security challenge. At first security challenges necessitate being addressed ahead of implementing Cloud Computing in an organization. This paper brings out a systematic literature evaluation by spotting the light on cloud computing security necessities; alongside with security issues, it is worth mentioning that solutions for the provision of information security in cloud computing has been discussed in this research.

Journal ArticleDOI
TL;DR: A modified lightweight authentication and key management protocol for wireless sensor network is introduced, employing the technique of Elliptic Curve Cryptography with Diffie-Hellman and a designed simulator that simulate the phases of authentication starting from base station tell the last sensor node is produced.
Abstract: Recently, wireless sensor networks is considered as an important part of the life. It becomes wide spread in different applications, such as military, medical and environment. In this paper, a modified lightweight authentication and key management protocol for wireless sensor network is introduced, employing the technique of Elliptic Curve Cryptography with Diffie-Hellman. In addition, A designed simulator that simulate the phases of authentication starting from base station tell the last sensor node. This simulator is produced to tackle the problem of lightweight protocol absence in the well-known simulators, such as NS2 and NS3. The modified protocol and the presented simulator are tested over different scenarios and the obtained results show the superior performance of them. Moreover, the results illustrate the high accuracy of the simulator and benefits of the modification on the lightweight protocol.

Journal ArticleDOI
TL;DR: This work adopts ontology approach as a means to acquire domain knowledge and construct a case-base and use ontological semantic retrieval as the case retrieval method, and the resulting ontology based CBR tool is experimented in fault diagnosis and repairing domain, a semi-structured decision-making environment involving multiple attributes.
Abstract: Previous research in decision making has proposed the use of a case based reasoning approach to accumulate, organize, preserve, link and share diverse knowledge coming from past experiences. However, existing CBR systems lack semantic understanding, which is important for intelligent knowledge retrieval in decision support system. To develop an intelligent CBR system which can not only carry out data matching retrieval, but also perform semantic associated data access, and improve the traditional keyword-based search. .An effective case representation method as well as an appropriate case retrieval approach must be found. Ontology technology is an ideal selection for realizing our system because owing to the good semantic understanding offered by ontology. Thus, we adopt ontology approach as a means to acquire domain knowledge and construct a case-base and use ontological semantic retrieval as the case retrieval method. The resulting ontology based CBR tool is experimented in fault diagnosis and repairing domain, a semi-structured decision-making environment involving multiple attributes. The results showed the feasibility and the applicability of our approach, and the benefit of the ontology support.


Journal ArticleDOI
TL;DR: This paper proposes an adaptive fault classifier that can be used to differentiate fault types and guides the system to use the suitable recovery strategy.
Abstract: Field Programmable Gate Array devices (FPGAs) are used in many applications. FPGAs are subjected to faults especially in the space where they are subjected to radiation. Faults in FPGAs may be recoverable (transient) or non-recoverable (permanent). Recoverable faults can be resolved by reconfiguring the system, on the other hand non-recoverable faults, require the relocation of the logic to a non-faulty area. This paper proposes an adaptive fault classifier that can be used to differentiate fault types. The classification guides the system to use the suitable recovery strategy. Experimental results show the operation of the classifier and adaptation layers, the proposed classifier layer is smaller in area compared to previous work. The adaptation layer works satisfactory to cope with environment changes. Both of the layers work independently of the design on any other layer.


Journal ArticleDOI
TL;DR: The contribution of this article is enhancing proposed protocols with as less cryptography computation overhead as possible to make it applicable in the high mobility nature of VANET using security primitives; which guarantees security while allowing fast authenticating during vehicle passing one VANet to the next one depending on its direction in the transportation networks.
Abstract: A few years ago, Automotive area in the IoT was seen as theoretical concept and today we are already seeing the possibilities of not only driverless cars, but applications of IoT in the intelligent vehicles including parking, maintaining environment, protecting lives and smoothing the flow vehicle movements. We have realized the urgent need of using simple and efficient secure protocol in Vehicular Ad Hoc Network (VANET) to be practical in the fast mobility of the network nodes, and taking advantage of the existence of base stations gateways along the road to inherit the protocol to different VANETs, this will reduce the initialization of communication overhead time and the security keys initialization each time a node passes to new base station zone. In this research, we applied security protocol used in sensor networks to achieve security in VANET, the simulation analysis shows that secure practical communication is achieved which can be inherited to other sub VANETs. The contribution of this article is enhancing proposed protocols with as less cryptography computation overhead as possible to make it applicable in the high mobility nature of VANET using security primitives; which guarantees security while allowing fast authenticating during vehicle passing one VANET to the next one depending on its direction in the transportation networks.

Journal ArticleDOI
TL;DR: A modified scheme is developed by modifying the MixColumns stage in the AES algorithm in order to increase the speed of the encryption/ decryption while maintaining the complexity level of the design to keep the security level equivalent to AES.
Abstract: Ensuring the security of data while being transmitted or stored is a very important issue for companies and end users. Cryptography is used to transfer the data in a form that is not understood by anyone apart from the intended recipients. The advanced standard encryption algorithm (AES) is one of the most secure encryption algorithms. However, due to the speed issue and computational complexity, it is not suitable for real time applications. In this paper, a modified scheme is developed for the encryption/decryption by modifying the MixColumns stage in the AES algorithm in order to increase the speed of the encryption/ decryption while maintaining the complexity level of the design to keep the security level equivalent to AES. The results show that the proposed modification increases the speed of the encryption/decryption in real time applications up to 150% in the encryption process and up to 500% in the decryption process.

Journal ArticleDOI
TL;DR: A diagnosis system of psoriasis lesion is established to ease the role of the physician in diagnosis by providing better and more reliable results, to support the expert's decision to diagnose the lesion, especially doctors with little experience.
Abstract: Psoriasis form out to be one of the weakening and persisting incendiary skin lesions. Frequently confused as a casual skin thickness, it is evaluated that around 125 million individuals overall endures because of this disease. The case is exacerbated when there is no known cure in the status norm. The common classification of psoriasis has been considered as unexpectedly separated scaly and erythematous plaque at patient's skin. This lesion could follow anyplace on the human body. Objectives: Diagnosis of psoriasis requires an experienced specialist in the field of dermatology which lead to majority cases of an error in diagnosis, incorrect disease identification is highly possible and there is no consensus on the current subjective assessment methods due to the unavoidable inter and intraobserver variances. The purpose of this study is to establish a diagnosis system of psoriasis lesion to ease the role of the physician in diagnosis by providing better and more reliable results, to support the expert's decision to diagnose the lesion, especially doctors with little experience. Methods: In this paper, the researcher is interested in the diagnosis psoriasis lesion by using color and texture features by finding the new sign (color and texture features) implementation to support the expert decision. Aggregate 200 image samples of psoriasis patients are used in our database. Machine learning using Artificial Neural Network classifier ANN to obtain optimized performance. Result: CADP system shows optimal performance of 100% accuracy, 100% sensitivity and 100% specificity for color-texture feature with RGB-Local Binary Pattern method and performance of 100% accuracy, 100% sensitivity and 100% specificity with the RGB Color Co-occurrence Matrix method. Conclusions: CAD system became a tool for physicians and therefore it is important to have accurate and reliable CAD system. The LBP and CCM texture features are powerful in psoriasis disease classification for RGB color images.

Journal ArticleDOI
TL;DR: In this article, a key aspect in the management of any societal resource not only when it is scarce but in all cases to allow for optimum benefits to be accrued to everyone in the society.
Abstract: Utilization is a key aspect in the management of any societal resource not only when it is scarce but in all cases to allow for optimum benefits to be accrued to everyone in the society. Internet ...


Journal ArticleDOI
TL;DR: The steps needed for hardening the enterprise browser ecosystem using such tailored and highgranularity hardening approach at the enterprise scale are described by using the Windows Group Policy Editor and Active Directory Services, which are in widespread use in most organizations.
Abstract: Today, web browsers are a major avenue for cyber-compromise and data breaches. Web browser hardening, through highgranularity and tailored configurations, can help prevent or mitigate many of these attack avenues. For example, an enforced configuration that allows users to use one browser to connect to critical and trusted websites and a different browser for untrusted websites, with the former web browser restricted to trusted sites and the latter with JavaScript and Plugins disabled by default, can help prevent JavaScriptand Plugin-based attacks. However, most organizations today, still allow web browsers to run with their default configurations and allow users to use the same web browser to connect to trusted and untrusted websites alike. In this tutorial article, we describe in detail the steps needed for hardening the enterprise browser ecosystem using such tailored and highgranularity hardening approach at the enterprise scale by using the Windows Group Policy Editor and Active Directory Services, which are in widespread use in most organizations. We hope that system administrators use this guide to jump-start an enterprisewide strategy for implementing high-granularity application-level hardening. This will help secure enterprise systems at the clientside, in addition to the network perimeter and server-side.



Journal ArticleDOI
TL;DR: This work identifies the main components of adaptive SVC-DASH client and proposes a streaming heuristic over dynamic multiple connections that successfully achieves interruption free streaming and results in noticeable improvements in the achieved streaming quality for large link delays.
Abstract: Dynamic Adaptive Streaming over Hypertext Transfer Protocol HTTP (DASH) has gained a significant momentum for multimedia streaming due to its ability in crossing firewalls and availability of infrastructure. In the mean time, Scalable Video Coding (SVC) is building a similar momentum as it enables efficient media storage and caching. In this work, we identify the main components of adaptive SVC-DASH client and propose a streaming heuristic over dynamic multiple connections. The proposed algorithm is experimentally tested under different connection and link configurations. Our results show that the algorithm successfully achieves interruption free streaming under all the tested BandWidth and link configurations. Additionally, the usage of multiple connections results in noticeable improvements in the achieved streaming quality for large link delays.

Journal ArticleDOI
TL;DR: A directional control system based on human eye tracking strategy using a mobile application that can control any electric device power or the movement direction for the mobile objects, such as cars, robots, and wheelchairs is proposed.
Abstract: Recently, eye tracking system occupies a wide area in the researching fields. Different applications were produced to tackle numerous problems in real-time systems. This paper proposes a directional control system based on human eye tracking strategy using a mobile application. The introduced system can control any electric device power or the movement direction for the mobile objects, such as cars, robots, and wheelchairs. The proposed mobile application, which applied to an Android smartphone, detects and tracks the human eye depending on Viola-Jones based Haar-liked features cascade classifiers algorithm. Ultimately, it estimate the eye movement direction and the blinking action. The control system includes Raspberry Pi III, which control the ON/OFF of five LEDs connected to it representing the four eye movement directions and the blinking action. The detected eye actions by the mobile application are transferred via a wireless channel (Wi-Fi) to the Raspberry Pi for controlling. The Raspberry Pi controls the LEDs status as a prototype applicable to any other device or moving object.

Journal ArticleDOI
TL;DR: A new algorithm is obtained that combines the efficiency of the RC4 and robustness of AES and is robust against most attacks, such as distinguishing attack and can be used in different protocols such as Secure Sockets Layer (SSL) Protocol, Oracle Secure SQL, and Wired Equivalent Privacy (WEP) Protocol.
Abstract: RC4 stream cipher is one of the most significant symmetric cryptosystems, it is simple and used in many commercial products. RC4 uses dynamic permutations and avoids using Linear Feed Back Shift Register (LFSR). It has many weaknesses, such as the tendency in the generated key stream that some key bytes are biased toward different values. This paper presents a new algorithm using S-box of Advanced Encryption Standard (AES) to solve the correlation between public known outputs of the internal state. The state table is filled from S-box values and additional swapping operations are used. The analysis of the proposed algorithm over variable key length produces key byte streams that have no single and double bias. This paper obtains a new algorithm that combines the efficiency of the RC4 and robustness of AES. The results show that the sequences that are generated by the developed RC4 are more random than the sequence that was generated by the RC4. Also, the developed algorithm demands little time more than RC4 execution time. Additionally, the developed algorithm is robust against most attacks, such as distinguishing attack and can be used in different protocols such as Secure Sockets Layer (SSL) Protocol, Oracle Secure SQL, and Wired Equivalent Privacy (WEP) Protocol.