SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
International Journal of New Computer Architectures and their Applications (IJNCAA)
-
ASSESSMENT PROCEDURE OF THE EM INTERACTION BETWEEN MOBILE PHONE ANTENNAE AND HUMAN BODY
This paper presents a procedure for the evaluation of the Electromagnetic (EM) interaction between the mobile phone antenna and human body, i.e., head and hand, and investigates the factors ...Authors: Salah I. Al-Mously
Year Published: May 2011 | 1-14 | IJNCAA | Vol. 1 No. 1 -
HEP: CONTEXT-AWARE COMMUNICATION SYSTEM
Users may sometimes be overloaded with work so that they become temporally unable to handle incoming communications. Context aware systems are a promising approach to facilitate daily-life ...Authors: Bachir Chihani, Emmanuel Bertin, Fabrice Jeanne, Noel Crespi
Year Published: May 2011 | 15-24 | IJNCAA | Vol. 1 No. 1 -
A MUTLI-AGENT SYSTEM FOR FIREWALL FORENSICS ANALYSIS
Computer Forensics applies law to fight against unlawful and illegitimate use of computers and networks. It employs investigation methods to solve computer crimes. Knowing that the firewall is the ...Authors: Hassina Bensefia, Nacira Ghoualmi
Year Published: May 2011 | 25-33 | IJNCAA | Vol. 1 No. 1 -
DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY
This paper presents alternative security methods based on DNA. From the available alternative security methods, symmetric DNA algorithms were developed and implemented. The first symmetric ...Authors: Radu Terec, Mircea-Florin Vaida, Lenuta Alboaie, Ligia Chiorean
Year Published: May 2011 | 34-51 | IJNCAA | Vol. 1 No. 1 -
REVERSIBLE DATA HIDING BASED ON STATISTICAL CORRELATION OF BLOCKED SUB-SAMPLED IMAGE
In this paper, a reversible data hiding scheme has been proposed which is based on correlation of subsample images. The proposed method modifies the blocks of subsampled image to prepare vacant ...Authors: Mona Nafari, Mansour Nejati Jahromi, Gholam HoseinSheisi
Year Published: May 2011 | 52-60 | IJNCAA | Vol. 1 No. 1 -
DATABASE PREPROCESSING AND COMPARISON BETWEEN DATA MINING METHODS
Database preprocessing is very important to utilize memory usage, compression is one of the preprocessing needed to reduce the memory required to store and load data for processing, the method of ...Authors: Yas A. Alsultanny
Year Published: May 2011 | 61-73 | IJNCAA | Vol. 1 No. 1 -
EVALUATING SOFTWARE MAINTENANCE TESTING APPROACHES TO SUPPORT TEST CASE EVOLUTION
Software Maintenance Testing is essential during software testing phase. All defects found during testing must undergo a re-test process in order to eliminate the flaws. By doing so, test cases ...Authors: Othman Mohd Yusop, Suhaimi Ibrahim
Year Published: May 2011 | 74-83 | IJNCAA | Vol. 1 No. 1 -
A TRAINING BASED TRANSMISSION PERIOD SETTING PROTOCOL
We have proposed Intermittent Periodic Tra nsmission (IPT forwarding) as packet relay method for wireless backhaul. In IPT forwarding, a source node sends packets to a destination node with a ...Authors: Guangri Jin, Li Gong, Hiroshi Furukawa
Year Published: May 2011 | 84-96 | IJNCAA | Vol. 1 No. 1 -
METADATA-DERIVED KEYWORDS FOR EFFECTIVE NAVIGATION AND ACCESS IN PERSONAL FILE HIERARCHIES
Computer systems provide users with abilities to create, organize, store and access information. Most of this information is in the form of documents in files organized in the hierarchical folder ...Authors: Gontlafetse Mosweunyane, Leslie Carr, Nicholas Gibbins
Year Published: May 2011 | 97-111 | IJNCAA | Vol. 1 No. 1 -
AN EFFICIENT TEMPORAL PARTITIONING ALGORITHM TO MINIMIZE COMMUNICATION COST FOR RECONFIGURABLE COMPUTING SYSTEMS
In reconfigurable computing systems, full reconfigurable FPGA are evolving rapidly, due to their flexibility and high performance. In this paper, we focus on communication cost between ...Authors: Ramzi. Ayadi, Bouaoui. Ouni, Abdellatif. Mtibaa
Year Published: May 2011 | 112-122 | IJNCAA | Vol. 1 No. 1 -
APPLICATION OF HYBRID WAVELET-FRACTAL COMPRESSION ALGORITHM FOR RADIOGRAPHIC IMAGES OF WELD DEFECTS
Based on the standard fractal transformation in spatial domain, simple relations may be found relating coefficients in detail subbands in the wavelet domain. In this work we evaluate a hybrid ...Authors: Faiza Mekhalfa, Daoud Berkani
Year Published: May 2011 | 123-132 | IJNCAA | Vol. 1 No. 1 -
EMPIRICAL INVESTIGATION ON COGNITIVE USER INTERFACE DIMENSIONS
In line to the introduction of the online museum, a user interface is a new medium to allow museum collections to be exhibited and promoted more effectively. For promoting purposes, this paper ...Authors: Natrah Abdullah, Wan Adilah Wan Adnan, Nor Laila Md Noor
Year Published: May 2011 | 133-148 | IJNCAA | Vol. 1 No. 1 -
IMPROVING TRANSPORT PROTOCOL PERFORMANCE IN MANET BY EXPLOITING THE BACKOFF ALGORITHM OF MAC PROTOCOL
In this paper, we propose an improvement to the transport protocol performance in Mobile Ad Hoc Network (MANET) by exploiting the backoff algorithm of Medium Access Control (MAC) protocol. We ...Authors: Sofiane Hamrioui, Mustapha Lalam
Year Published: May 2011 | 149-161 | IJNCAA | Vol. 1 No. 1 -
JOINT CHANNEL-DIVERSITY CODING FOR THE THREE-WAY FREE-SPACE OPTICAL SYSTEMS THROUGH ATMOSPHERIC-TURBULENCE CHANNELS
In this paper, we study the communications over the free-space optical (FSO) links in the presence of atmospheric turbulence that induces strong fading on the FSO channel. We consider the ...Authors: Chadi Abou-Rjeily
Year Published: May 2011 | 162-175 | IJNCAA | Vol. 1 No. 1 -
ENHANCEMENT OF LEARNING AND TEACHING IN COMPUTER GRAPHICS THROUGH MARKER AUGMENTED REALITY TECHNOLOGY
In this paper the experience gained at using low-cost interactive marker augmented reality (AR) technology during course Computer graphics is presented. The preliminary exploration of AR technology ...Authors: Malinka Ivanova, Georgi Ivanov
Year Published: May 2011 | 176-184 | IJNCAA | Vol. 1 No. 1 -
DIFFERENCES BETWEEN THE ANSWERS OF QUESTIONNAIRE INVESTIGATION AND REAL BEHAVIOR OF THE STUDENTS IN THE E-COURSE FOR HEALTHCARE
In the paper we describe the applicability of different types of resources and activity modules in the e-learning courses and the worthiness of their usage. The presented ideas are supported by the ...Authors: Martin Cápay, Zoltán Balogh, Michal Munk, Miroslava Mesárošová
Year Published: May 2011 | 185-198 | IJNCAA | Vol. 1 No. 1 -
COMBINING STEGANOGRAPHY AND CRYPTOGRAPHY: NEW DIRECTIONS
Our main goal in this paper is to give new insights and directions on how to improve existing methods of hiding secret messages, possibly by combining steganography and cryptography. We start by ...Authors: Khalil Challita, Hikmat Farhat
Year Published: May 2011 | 199-208 | IJNCAA | Vol. 1 No. 1 -
MAXIMUM LIKELIHOOD CURVES FOR MULTIPLE OBJECTS EXTRACTION: APPLICATION TO RADIOGRAPHIC INSPECTION FOR WELD DEFECTS DETECTION
This paper presents an adaptive probabilistic region-based deformable model using an explicit representation that aims to extract automatically defects from a radiographic film. To deal with the ...Authors: Aicha Baya Goumeidane, Mohammed Khamadja, Nafaa Nacereddine
Year Published: May 2011 | 209-222 | IJNCAA | Vol. 1 No. 1 -
SIMPLE DESIGN METHOD OF MIMO MULTIUSER DOWNLINK SYSTEM BASED ON BLOCK-DIAGONALIZATION
Block diagonalization (BD) technique is widely used in multiple input multiple output (MIMO) multiuser downlink systems because of its simplicity and high ability for eliminating the interuser ...Authors: T. taniguchi, Y. Karasawa, N. Natajima
Year Published: May 2011 | 223-235 | IJNCAA | Vol. 1 No. 1 -
A REGION-BASED MODEL AND BINARY LEVEL SET FUNCTION APPLIED TO WELD DEFECTS DETECTION IN RADIOGRAPHIC IMAGES
In this paper, we propose a model for active contours to detect boundaries’ objects in given image. The curve evolution is based on Chan-Vese model implemented via binary variational level set ...Authors: Yamina Boutiche
Year Published: May 2011 | 236-244 | IJNCAA | Vol. 1 No. 1 -
COOPERATIVE MECHANISMS TO CARRY AND FORWARD PACKETS IN A DTN VANET
The aim of this paper is to find the best strategies to carry and forward packets within VANETs that follow a Delay Tolerant Network. In this environment nodes are affected by intermittent ...Authors: Gianni Fenu, Marco Nitti
Year Published: May 2011 | 245-256 | IJNCAA | Vol. 1 No. 1 -
AN AGENT TOOL FOR INTEGRATING COMPONENT BASED APPLICATIONS
The concept of building the best component-based application becomes very attractive. But, the reusable components must comply with specific underlying middleware architecture in order to interact ...Authors: Ebtehal Alsaggaf, Prof.Dr. Fathy albouraey
Year Published: Aug. 2011 | 257-264 | IJNCAA | Vol. 1 No. 2 -
NEURAL NETWORK APPLICATION IN RESERVOIR WATER LEVEL FORECASTING AND RELEASE DECISION
Reservoir dam is one of the defense mechanism for both flood and drought disasters. During flood, the opening of the dam’s spillway gate must be adequate to ensure that the reservoir capacity will ...Authors: Wan Hussain Wan Ishak, Ku Ruhana Ku-Mahamud, Norita Md Norwawi
Year Published: Aug. 2011 | 265-274 | IJNCAA | Vol. 1 No. 2 -
SHADOW MAPPING OR SHADOW VOLUME?
In this paper two techniques of shadow generation are described. Volume shadow is geometric base but shadow mapping is image base. Silhouette detection is a most expensive step to create volume ...Authors: Hoshang Kolivand, Mohd Shahrizal Sunar
Year Published: Aug. 2011 | 275-281 | IJNCAA | Vol. 1 No. 2 -
THE USE OF SOFT COMPUTING FOR MEASURING THE QUALITY OF EDUCATION:
Fuzzy logic has been considered as a strategy to define the values of the complex realities that define every aspect of education and to demonstrate formalized educational issues. This is because ...Authors: Sergio Valdés-Pasarón, Bogart Yail Márquez, Juan Manuel Ocegueda-Hernández
Year Published: Aug. 2011 | 282-291 | IJNCAA | Vol. 1 No. 2 -
FUZZY MODELS APPLIED TO COMPLEX SOCIAL SYSTEMS: MODELING POVERTY USING DISTRIBUTED AGENCIES
This work has as its main objective to apply the distributed agency methodology, which consists of several techniques used in computer science, to solve complex social problems. This approach allows ...Authors: Bogart Yail Márquez, Manuel Castañon-Puga, Juan R. Castro, Eugenio D. Suarez, José Sergio Magdaleno-Palencia
Year Published: Aug. 2011 | 292-303 | IJNCAA | Vol. 1 No. 2 -
A BIO-INSPIRED MUSIC GENRE CLASSIFICATION FRAMEWORK USING MODIFIED AIS-BASED CLASSIFIER
For decades now, scientific community are involved in various works to automate the human process of recognizing different types of music using different elements for example different instruments ...Authors: Noor Azilah Draman, Sabrina Ahmad, Azah Kamilah Muda
Year Published: Aug. 2011 | 304-315 | IJNCAA | Vol. 1 No. 2 -
A SCALABLE BLOCK COMPENSATION WITH INDEX SELECTION MECHANISM TO ACHIEVE HIGH VIDEO QUALITY RETRIEVAL
Video quality retrieval is an important issue in reconstruction video sequences. The amounts of transmission bitstreams are very large to achieve high video quality reconstruction. Thus, high video ...Authors: Ta- Te Lu, Tsung-Hsuan Tsai, Jia-Yuan Wu
Year Published: Aug. 2011 | 316-324 | IJNCAA | Vol. 1 No. 2 -
A STUDY ON RISK ASSESSMENT FOR SMALL AND MEDIUM SOFTWARE DEVELOPMENT PROJECTS
Generally, in software development, there are large, medium, and small software projects that each of them can be affected or influenced by a risk. Therefore, it requires a distinctive assessment ...Authors: Abdullahi Mohamud Sharif, Shuib Basri
Year Published: Aug. 2011 | 325-335 | IJNCAA | Vol. 1 No. 2 -
MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL
Ad hoc On Demand Vector (AODV) is a reactive routing protocol in Mobile Ad hoc Network (MANET). Although the protocol has been around for quite some time, but there is still security issue which ...Authors: Kamarularifin Abd. Jali, Zaid Ahmad, Jamalul-Lail Ab Manan
Year Published: Aug. 2011 | 336-343 | IJNCAA | Vol. 1 No. 2 -
EVALUATION AND SELECTION COTS SOFTWARE PROCESS: THE STATE OF THE ART
In the recent years, the Commercial Off-The-Shelf (COTS) products are being increasingly used in the world of software development. Therefore, evaluating and selecting appropriate COTS product is ...Authors: Feras Tarawneh, Fauziah Baharom, Jamaiah Hj. Yahaya, Faudziah Ahmad
Year Published: Aug. 2011 | 344-357 | IJNCAA | Vol. 1 No. 2 -
HUMAN IDENTIFICATION BASED ON EXTRACTED GAIT FEATURES
This paper presents a human identification system based on automatically extracted gait features. The proposed approach consists of three parts: extraction of human gait features ...Authors: Hu Ng, Hau-Lee Ton, Wooi-Haw Tan, Timothy Tzen-Vun Yap, Pei-Fen Chong, Junaidi Abdullah
Year Published: Aug. 2011 | 358-370 | IJNCAA | Vol. 1 No. 2 -
REQUIREMENT ELICITATION: IDENTIFYING THE COMMUNICATION CHALLENGES BETWEEN DEVELOPER AND CUSTOMER
Eliciting requirements for a system is an important activity in requirement engineering. This process occur at the early stages in system development which involves communication ...Authors: Noraini Che Pa, Abdullah Mohd Zin
Year Published: Aug. 2011 | 371-383 | IJNCAA | Vol. 1 No. 2 -
AN ENHANCED REMOTE AUTHENTICATION SCHEME USING SECURE KEY EXCHANGE PROTOCOL WITH PLATFORM INTEGRITY ATTESTATION
Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other ...Authors: Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
Year Published: Aug. 2011 | 384-395 | IJNCAA | Vol. 1 No. 2 -
THE CONSTRUCTION OF BALANCED BOUNDING-VOLUME HIERARCHIES USING SPATIAL OBJECT MEDIAN SPLITTING METHOD FOR COLLISION DETECTION
Finding two or more contact points between rigid bodies simulation is always a fundamental task in virtual environment. Furthermore, the contact point needs to be accurately reported ...Authors: Hamzah Asyrani Sulaiman, Abdullah Bade
Year Published: Aug. 2012 | 396-403 | IJNCAA | Vol. 1 No. 2 -
AUTOMATIC DOCUMENT STRUCTURE ANALYSIS OF STRUCTURED PDF FILES
Portable Document Format (PDF) is the most comfortable way to publish information because of its operating system independent. However, information on PDF document is unstructured and ...Authors: Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor MaizuraMohamad Noor
Year Published: Aug. 2011 | 404-411 | IJNCAA | Vol. 1 No. 2 -
AGENT-BASED MOM INTEROPERABILITY FRAMEWORK FOR INTEGRATION AND COMMUNICATION OF DIFFERENT SOA APPLICATIONS
A lot of research works in different areas have been done on Interoperability frameworks. Each area of research has its own specification and requirements to manage a complex ...Authors: Najhan M.Ibrahim, Mohd Fadzil Hassan, Zain Balfagih
Year Published: Aug. 2011 | 412-427 | IJNCAA | Vol. 1 No. 2 -
QUANTIFYING TEXT-BASED PUBLIC'S EMOTION AND DISCUSSION ISSUES IN ONLINE FORUM
Currently, an online forum is becoming one of the trends in social media. Social media allow people to communicate interactively so they can share their feelings and opinions. Even ...Authors: Siti Z. Z. Abidin, Nasiroh Omar, Muhammad H.M. Radzi and Mohammad B.C. Haron
Year Published: Aug. 2011 | 428-436 | IJNCAA | Vol. 1 No. 2 -
GUIDELINES FOR COLLECTING AND CENTRALIZING NETWORK DIGITAL EVIDENCES
The digital evidences emphatically are commonly considered as a backbone for the forensic body in order to deliver a reliable investigation when a breach occurred since a forensic ...Authors: Mohammed Abbas, Azizah Abdul Manaf, Elfadil Sabeil
Year Published: Aug. 2011 | 437-458 | IJNCAA | Vol. 1 No. 2 -
T-WAY STRATEGIES AND ITS APPLICATIONS FOR COMBINATORIAL TESTING
The adoption of t-way strategies (also termed interaction testing) for combinatorial testing is the main focus of this paper. Unlike earlier work, this paper unifies the different ...Authors: Rozmie R. Othman, Kamal Z. Zamli
Year Published: Aug. 2011 | 459-473 | IJNCAA | Vol. 1 No. 2 -
USING SUBTHRESHOLD SRAM TO DESIGN LOW-POWER CRYPTO HARDWARE
Cryptography and Security hardware architecture designing is in essential need for efficient power utilization which is achieved earlier by giving a range of trade- off between ...Authors: Adnan Abdul-Aziz Gutub, Esam Ali Khan
Year Published: Aug. 2011 | 474-483 | IJNCAA | Vol. 1 No. 2 -
ANALYSIS OF DELAY PERFORMANCE IN EFFICIENT DBA WITH GLOBAL PRIORITY FOR EPON
In order to accommodate the needs of very high-speed broadband access, the most attractive solution that is being used nowadays is Ethernet passive optical network (EPON). In ...Authors: Nurul Asyikin Mohamed Radzi, Norashidah Md. Din, Mohammed Hayder AlMansoori, Mohd. Shahmi Abdul Majid
Year Published: Aug. 2011 | 484-489 | IJNCAA | Vol. 1 No. 2 -
COLLABORATIVE LEARNING THROUGH FACIAL EXPRESSION FOR SPECIAL CHILDREN
Due to communication impairment and delay in cognitive development, children with cerebral palsy and autism require special educational needs (SEN), where the one- to- one learning ...Authors: Nia Valeria, Lau Bee Theng
Year Published: Aug. 2011 | 490-509 | IJNCAA | Vol. 1 No. 2 -
COLLABORATION, WEALTH AND VALUE CREATION, SMES' HALAL PRODUCTS COMMUNITIES, AND INFORMATION SYSTEMS
This paper takes the form of a general review. It introduces the notion of government-industry collaboration and information sharing in the Halal industry that work together for ...Authors: Alfi Khairiansyah Machfud, Abdul Rahman Ahmad Dahlan, Jawdat Khatib, Ahmed Abdulaziz Haji-Ahmed
Year Published: Aug. 2011 | 510-518 | IJNCAA | Vol. 1 No. 2 -
REUSABILITY ASSESSMENT OF OPEN SOURCE COMPONENTS FOR SOFTWARE PRODUCT LINES
Software product lines and open source software are two emerging paradigms in software engineering. A common theme in both of these paradigms is „reuse‟. Software product lines are a reuse ...Authors: Fazal-e- Amin, Ahmad Kamil Mahmood, Alan Oxley
Year Published: Oct. 2011 | 519-533 | IJNCAA | Vol. 1 No. 3 -
DETECTING SLEEP DEPRIVATION ATTACK OVER MANET USING A DANGER THEORY-BASED ALGORITHM
MANET is a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be ...Authors: Maha Abdelhaq, Rosilah Hassan, Mahamod Ismail, Raed Alsaqour, Daud Israf
Year Published: Oct. 2011 | 534-541 | IJNCAA | Vol. 1 No. 3 -
QOS MEASUREMENT OF SINGLE-HOP PERIODIC COMMUNICATION IN VEHICULAR ENVIRONMENT
Life safety on road is the key motivation behind the research in Vehicular Ad-hoc Network (VANET). As basic communication mechanism VANET-equipped vehicles broadcast periodic safety beacons to keep ...Authors: Bilal Munir Mughal, Asif Ali Wagan, Halabi Hasbullah
Year Published: Oct. 2011 | 542-552 | IJNCAA | Vol. 1 No. 3 -
EXPLORATION ON SCALABILITY OF DATABASE BULK INSERTION WITH MULTITHREADING
The advancement of database engine and multi-core processors technologies have enable database insertion to be implemented concurrently via multithreading programming. The objective of this work is ...Authors: Boon-Wee Low, Boon-Yaik Ooi, and Chee-Siang Wong
Year Published: Oct. 2011 | 553-564 | IJNCAA | Vol. 1 No. 3 -
MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL
Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a ...Authors: Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan
Year Published: Oct. 2011 | 565-580 | IJNCAA | Vol. 1 No. 3 -
COMPUTATIONALLY INEXPENSIVE SEQUENTIAL FORWARD FLOATING SELECTION FOR ACQUIRING SIGNIFICANT FEATURES FOR AUTHORSHIP INVARIANCENESS IN WRITER IDENTIFICATION
Handwriting is individualistic. The uniqueness of shape and style of handwriting can be used to identify the significant features in authenticating the author of writing. Acquiring these significant ...Authors: Satrya Fajri Pratama, Azah Kamilah Muda, Yun-Huoy Choo, and Noor Azilah Muda
Year Published: Oct. 2011 | 581-598 | IJNCAA | Vol. 1 No. 3 -
AN EMPIRICAL FRAMEWORK DESIGN TO EXAMINE THE IMPROVEMENT IN SOFTWARE REQUIREMENTS THROUGH NEGOTIATION
Negotiation is one promising effort during requirements elicitation process to improve the quality of software requirements. When negotiation is claimed beneficial theoretically, it is important that ...Authors: Sabrina Ahmad, Noor Azilah Muda
Year Published: Oct. 2011 | 599-614 | IJNCAA | Vol. 1 No. 3 -
FACTORS FOR KMS POST ADOPTION: THE EXPLORATORY STUDY IN OIL AND GAS INDUSTRY IN MALAYSIA
This paper presents the analytical factors that influence Knowledge Management System (KMS) adoption at the individual level known as post adoption phase. Though many organizations have increasingly ...Authors: Sureena Matayong, Ahmad Kamil Bin Mahmood
Year Published: Oct. 2011 | 615-623 | IJNCAA | Vol. 1 No. 3 -
ONE-TIME KEY AND DIAMETER MESSAGE AUTHENTICATION PROTOCOL FOR PROXY MOBILE IPV6
The working group of NetLMM has proposed a new approach, known as network-based mobility management protocol that is actively standardized by Internet Engineering Task Force called Proxy Mobile IPv6 ...Authors: Md. Mahedi Hassan, Poo Kuan Hoong
Year Published: Oct. 2011 | 624-639 | IJNCAA | Vol. 1 No. 3 -
SEMANTIC WEB SERVICE COMPOSITION APPROACHES: OVERVIEW AND LIMITATIONS
Service composition is gaining popularity because the composite service presents the features that an individual service cannot present. There are multiple web services available over the web for ...Authors: Furkh Zeshan, Radziah Mohamad
Year Published: Oct. 2011 | 640-651 | IJNCAA | Vol. 1 No. 3 -
CLASSIFICATION AND MEASUREMENT ON C OVERFLOW VULNERABILITIES ATTACK
Since early 70s, software vulnerabilities have been classified and measured for various purposes including software assurance. Out of many software vulnerabilities, C vulnerabilities are the most ...Authors: Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan
Year Published: Oct. 2011 | 652-664 | IJNCAA | Vol. 1 No. 3 -
BLOG QUALITY MEASUREMENT: ANALYSIS OF CRITERIA USING THE RASCH MODEL
Research in blog quality has become increasingly important, as preferences evolve in the way people gain information. For this study, blog quality categories and criteria were derived from metadata ...Authors: Zuhaira Muhammad Zain, Abdul Azim Abd Ghani, Rusli Abdullah, Rodziah Atan, Razali Yaakob
Year Published: Oct. 2011 | 665-682 | IJNCAA | Vol. 1 No. 3 -
APPLYING ROUGH SET THEORY IN MULTIMEDIA DATA CLASSIFICATION
The huge size of multimedia data requires for efficient data classification and organization in providing effective multimedia data manipulation. Those valuable data must be captured and stored for ...Authors: M Nordin A Rahman, Yuzarimi M Lazim, Farham Mohamed
Year Published: Oct. 2011 | 683-693 | IJNCAA | Vol. 1 No. 3 -
OPTIMIZING DECISION TREE IN MALWARE CLASSIFICATION SYSTEM BY USING GENETIC ALGORITHM
Malware classification is a vital component and works together with malware identification to prepare the right and effective malware antidote. Current techniques in malware classification do not ...Authors: Mohd Najwadi Yusoff, Aman Jantan
Year Published: Oct. 2011 | 694-713 | IJNCAA | Vol. 1 No. 3 -
AN EXTENDED SIMULATION OF COMPLEX TASK PARTITIONING METHOD IN ASELF-ORGANIZED ROBOTICS SWARM
Interference and specially one of the most common kinds of it which is also known as physical interference, is among the most critical problems in terms of multi-robot co-operation. A simple way ...Authors: Mehrdad Jangjou, Alireza Bagheri, Mohammad Mansour Riahi Kashani, Koosha Sadeghi Oskooyee
Year Published: Oct. 2011 | 714-720 | IJNCAA | Vol. 1 No. 3 -
DERIVATION OF STOCHASTIC REWARD NET (SRN) FROM UML SPECIFICATION CONSIDERING COST EFFICIENT DEPLOYMENT MANAGEMENT OF COLLABORATIVE SERVICE COMPONENTS
Performance evaluation of distributed system is always an intricate undertaking where system behavior is distributed among several components those are physically distributed. Bearing this concept in ...Authors: Razib Hayat Khan, Poul E. Heegaard
Year Published: Oct. 2011 | 721-742 | IJNCAA | Vol. 1 No. 3 -
INTEGRATED KMS@EWS OF CONCEPTUAL IMPLEMENTATION MODEL FOR CLINICAL DENGUE FEVER ENVIRONMENT
Early warning system (EWS) is a technology to mitigate risk is used to disseminate timely information. Then knowledge management system (KMS) is used to support for decision facilitation will ...Authors: Norzaliha Mohamad Noor, Rusli Abdullah, Mohd Hasan Selamat
Year Published: Oct. 2011 | 743-756 | IJNCAA | Vol. 1 No. 3 -
DYNAMIC LOAD BALANCING POLICY WITH COMMUNICATION AND COMPUTATION ELEMENTS IN GRID COMPUTING WITH MULTI-AGENT SYSTEM INTEGRATION
The policy in dynamic load balancing, classification and function are variety based on the focus study for each research. They are different but employing the same strategy to obtain the load ...Authors: Bakri Yahaya, Rohaya Latip, Mohamed Othman, Azizol Abdullah
Year Published: Oct. 2011 | 757-765 | IJNCAA | Vol. 1 No. 3 -
TOWARDS A DYNAMIC FILE INTEGRITY MONITOR THROUGH A SECURITY CLASSIFICATION
File is a component of a computer system that has importance value of its own, either in terms of availability, integrity, confidentiality and functionality to a system and application. If unintended ...Authors: Zul Hilmi Abdullah, Nur Izura Udzir, Ramlan Mahmod, and Khairulmizam Samsudin
Year Published: Oct. 2011 | 766-779 | IJNCAA | Vol. 1 No. 3 -
EVALUATING COMPLEXITY OF TASK KNOWLEDGE PATTERNS THROUGH REUSABILITY ASSESSMENT
Reusability assessment of patterns is needed to help pattern designers and pattern developers to check whether a pattern is well-designed. Hence, the outcome from the assessment can be used to ...Authors: Cheah WaiShiang, Cheah WaiShiang, Edwin Mit, Azman Bujang Masli
Year Published: Oct. 2011 | 780-796 | IJNCAA | Vol. 1 No. 3 -
PROTECTION OF PERSONAL INFORMATION BASED ON USER PREFERENCE
Some of Internet services require users to provide their information such as their name, address, credit card number, and an ID-password pair. In these services, the manner in which the provided ...Authors: Kenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, Kazunori Sugahara
Year Published: Dec. 2011 | 797-809 | IJNCAA | Vol. 1 No. 4 -
SOLVING SMALL SAMPLE RECIPE GENERATION PROBLEM WITH HYBRID WKRCF-PSO
The cost of the experimental setup during the assembly process development of a chipset, particularly the under-fill process, can often result in insufficient data samples. In INTEL Malaysia, for ...Authors: Mohd Ibrahim Shapiai, Zuwairie Ibrahim, Marzuki Khalid, Lee Wen Jau, Soon-Chuan Ong, Vladimir Pavlovich
Year Published: Dec. 2011 | 810-820 | IJNCAA | Vol. 1 No. 4 -
MODEL-BASED WEB COMPONENTS TESTING: PRIORITIZATION USING MIDS AND CENTRALITY MEASURES
Web applications testing and verification is becoming a highly challenging task. A number of model-based approaches has been proposed to deal with such a challenge. However, there is no criteria ...Authors: Ahmed Al-Herz, Moataz Ahmed
Year Published: Dec. 2011 | 821-837 | IJNCAA | Vol. 1 No. 4 -
IMPROVING THE ACCURACY OF GRADIENT DESCENT BACK PROPAGATION ALGORITHM (GDAM) ON CLASSIFICATION PROBLEMS
The traditional Back-propagation Neural Network (BPNN) Algorithm is widely used in solving many real time problems in world. But BPNN possesses a problem of slow convergence and convergence to local ...Authors: M. Z. Rehman, N. M. Nawi
Year Published: Dec. 2011 | 838-847 | IJNCAA | Vol. 1 No. 4 -
SEMANTIC TECHNOLOGY AND SUPER-PEER ARCHITECTURE FOR INTERNET BASED DISTRIBUTED SYSTEM RESOURCE DISCOVERY
Resource/service discovery is a very vital issue in Internet based distributed systems such as Grid and Cloud computing. In this paper we address the RD issue in intergrid. We design a service ...Authors: Mahamat Issa Haasn
Year Published: Dec. 2011 | 848-865 | IJNCAA | Vol. 1 No. 4 -
IMPROVEMENTS OF BACK PROPAGATION ALGORITHM PERFORMANCE BY ADAPTIVELY CHANGING GAIN, MOMENTUM AND LEARNING RATE
In some practical Neural Network (NN) applications, fast response to external events within enormously short time is highly demanded. However, by using back propagation (BP) based on gradient descent ...Authors: Norhamreeza Abdul Hamid, Nazri Mohd Nawi, Rozaida Ghazali, Mohd Najib Mohd Salleh.
Year Published: Dec. 2011 | 866-878 | IJNCAA | Vol. 1 No. 4 -
ANALYSIS OF COMPOUND ENHANCEMENT ALGORITHMS (CEA) BASED ON ADAPTIVE HISTOGRAM EQUALIZATION (AHE) ON INTRA-ORAL DENTAL RADIOGRAPHS IMAGES
Abnormalities are the main interest of dentists in examining the radiographs for determining any diseases that may appear at the apices of the teeth. However poor quality radiograph produces weak ...Authors: Siti Arpah Ahmad, Mohd Nasir Taib, NoorElaiza Abd Khalid, Rohana Ahmad
Year Published: Dec. 2011 | 879-893 | IJNCAA | Vol. 1 No. 4 -
A COMPARATIVE PERFORMANCE ANALYSIS OF GAUSSIAN DISTRIBUTION FUNCTIONS IN ANT SWARM OPTIMIZED ROUGH REDUCTS
This paper proposed to generate solution for Particle Swarm Optimization (PSO) algorithms using Ant Colony Optimization approach, which will satisfy the Gaussian distributions to enhance PSO ...Authors: Lustiana Pratiwi, Yun-Huoy Choo, Azah Kamilah Muda
Year Published: Dec. 2011 | 894-910 | IJNCAA | Vol. 1 No. 4 -
BUILDING FUZZY GOAL PROGRAMMING WITH FUZZY RANDOM LINEAR PROGRAMMING FOR MULTI-LEVEL MULTI-OBJECTIVE PROBLEM
This paper proposes a fuzzy goal programming that is developed by fuzzy random regression approach, to solve a multi-level multi-objective problem. Fuzzy random regression enables us to deal with ...Authors: Nureize Arbaiy, Junzo Watada
Year Published: Dec. 2011 | 911-925 | IJNCAA | Vol. 1 No. 4 -
A STUDY ON THE EVALUATION OF UNIT TESTING FOR ANDROID SYSTEMS
Unit testing is a method for quickly assessing the building blocks of a program and for obtaining accurate error localizations. However, in order to achieve these qualities, the tests cases need to ...Authors: Ben Sadeh, Sundar Gopalakrishnan
Year Published: Dec. 2011 | 926-941 | IJNCAA | Vol. 1 No. 4 -
REVIEW ON TRADITIONAL AND AGILE COST ESTIMATION SUCCESS FACTOR IN SOFTWARE DEVELOPMENT PROJECT
Software development project is one of the important areas in software engineering. Many researches have been conducted and looked into issues in software development project such as methodology ...Authors: Zulkefli Mansor, Saadiah Yahya, Noor Habibah Hj Arshad
Year Published: Dec. 2011 | 942-952 | IJNCAA | Vol. 1 No. 4 -
A PROPOSED FRAMEWORK FOR USE CASE BASED EFFORT ESTIMATION USING FUZZY LOGIC: BUILDING UPON THE OUTCOMES OF A SYSTEMATIC LITERATURE REVIEW
Reliable and accurate software development effort estimation has always been a daunting task for project managers. More recently, the use of Use Cases for software effort estimation has gained wide ...Authors: Mohammed Wajahat Kamal, Moataz A. Ahmed
Year Published: Dec. 2011 | 953-976 | IJNCAA | Vol. 1 No. 4 -
AUGMENTING INTUITIVENESS WITH WHEELCHAIR INTERFACE USING NINTENDO WIIMOTE
The natural interaction aspects of the user interface are more significant in the devices of impaired users than the devices of healthy users. This work investigates three controls as the ...Authors: Mahmood Ashraf, Masitah Ghazali
Year Published: Dec. 2011 | 977-990 | IJNCAA | Vol. 1 No. 4 -
CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW
Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics ...Authors: Elfadil Sabeil, Azizah Bt Abdul Manaf, Zuraini Ismail, Mohamed Abas
Year Published: Dec. 2011 | 991- 1000 | IJNCAA | Vol. 1 No. 4 -
STRUCTURING THE INFORMATION SYSTEM ARCHITECTURE USING PATTERNS
Enterprise Architecture (EA) is an approach, which aims to align the business strategy and IT infrastructure in order to maximise the application and investment of IT facilities. In fact, EA is a ...Authors: Shokoofeh Ketabchi, Navid Karimi Sani, Kecheng Liu
Year Published: Dec. 2011 | 1001-1010 | IJNCAA | Vol. 1 No. 4 -
REMOVING DUPLICATIONS IN EMAIL ADDRESSES IN LINEAR TIME
Currently, many government offices and companies use mailing lists for reaching their clients. Any mailing list needs continuous updates that include removing unsubscribed emails, inserting new ...Authors: Eyas El-Qawasmeh
Year Published: Dec. 2011 | 1011-1017 | IJNCAA | Vol. 1 No. 4 -
DIMENSION REDUCTION OF HEALTH DATA CLUSTERING
The current data tends to be more complex than conventional data and need dimension reduction. Dimension reduction is important in cluster analysis and creates a smaller data in volume and has the ...Authors: Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong
Year Published: Dec. 2011 | 1018-1026 | IJNCAA | Vol. 1 No. 4 -
WEB CONTENT ADAPTATION FOR MOBILE DEVICES: A GREEDY APPROACH
Mobile internet browsing usually involves a lot of horizontal and vertical scrolling, which makes web browsing time-consuming. In addition to this, users may be interested in a section of a web page, ...Authors: Rajibul Anam, Chin Kuan Ho and Tek Yong Lim
Year Published: Dec. 2011 | 1027-1042 | IJNCAA | Vol. 1 No. 4 -
ONLINE INSTRUCTIONAL CONSULTATION FOR HIGHER EDUCATION INSTITUTIONS IN MALAYSIA: THE SYSTEM ARCHITECTURE
Evolution of communication technologies at present gives impetus to researchers and practitioners by simply put the computer-mediated communication tools on their telementoring application without ...Authors: Ang Ling Weay, Abd Hadi Bin Abd Razak
Year Published: Dec. 2011 | 1043-1055 | IJNCAA | Vol. 1 No. 4 -
EVALUATION OF STUDENT'S NOTES IN A BLENDED LEARNING COURSE
Student’s notes are evaluated to trace their learning process in a blended learning course, and the factors affecting the quality of these notes are discussed. As individual note-taking performance ...Authors: Minoru Nakayama, Kouichi Mutsuura, Hiroh Yamamoto
Year Published: Dec. 2011 | 1056-1065 | IJNCAA | Vol. 1 No. 4 -
PERFORMANCE ANALYSIS OF TWO-DIMENSIONAL SYSTOLIC ARRAY MATRIX MULTIPLICATION WITH ORTHOGONAL INTERCONNECTIONS
Parallel computing is a method of computation in which many calculations are carried out concurrently, operating on the principle that large problems can often be separated into smaller ones, which ...Authors: A.H.M. Shapri, N.A.Z. Rahman
Year Published: Dec. 2011 | 1066-1075 | IJNCAA | Vol. 1 No. 4 -
MINING FEATURE-OPINION IN EDUCATIONAL DATA FOR COURSE IMPROVEMENT
In academic institutions, student comments about courses can be considered as a significant informative resource to improve teaching effectiveness. This paper proposes a model that extracts knowledge ...Authors: Alaa El-Halees
Year Published: Dec. 2011 | 1076-1085 | IJNCAA | Vol. 1 No. 4 -
A DATA MINING APPROACH TO CONSTRUCT GRADUATES EMPLOYABILITY MODEL IN MALAYSIA
This study is to construct the Graduates Employability Model using classification task in data mining. To achieve it, we use data sourced from the Tracer Study, a web-based survey system from the ...Authors: Myzatul Akmam Sapaat, Aida Mustapha, Johanna Ahmad, Khadijah Chamili, Rahamirzam Muhamad
Year Published: Dec. 2011 | 1086-1098 | IJNCAA | Vol. 1 No. 4 -
EPS2WAY: AN EFFICIENT PAIRWISE TEST DATA GENERATION STRATEGY
Testing is a very important task to develop error free software. The funds and release time of a software product is limited, thus, it is nearly hard to execute the exhaustive test i.e., to test all ...Authors: K.F. Rabbi, Sabira Khatun, Che Yahaya Yaakub, M. F. J. Klaib
Year Published: Dec. 2011 | 1099-1109 | IJNCAA | Vol. 1 No. 4 -
AGENTS BASED ADAPTIVE HYPERMEDIA SYSTEM WITH THE COMPETENCY APPROACH
This work is motivated by the need to propose a model for the study of personalized hypermedia systems with a competency approach, which is one of United Nations Educational, Scientific and Cultural ...Authors: Jose Sergio Magdaleno-Palencia, Mario Garcia-Valdez, Manuel Castanon-Puga, Bogart Yail Marquez
Year Published: Dec. 2011 | 1110-1117 | IJNCAA | Vol. 1 No. 4 -
CONVERSION STRATEGY OF A SYSTEM OF COLLABORATING DESIGN PATTERNS INTO UML DIAGRAM FOR DESIGN PATTERN
In a past publication, a proposal of a new set of UML diagram designed to picture a software system at architectural level by showing which patterns are being used has been presented. Progressing ...Authors: Muhazam Mustapha, Nik Ghazali Nik Daud, Indika Udawatta, Manjula Atapattu
Year Published: Dec. 2011 | 1118-1132 | IJNCAA | Vol. 1 No. 4 -
SINGULAR POINT DETECTION FOR EFFICIENT FINGERPRINT CLASSIFICATION
A singular point or singularity on fingerprint is considered as a fingerprint landmark due its scale, shift, and rotation immutability. It is used for both fingerprint classification and alignment in ...Authors: Ali Ismail Awad, Kensuke Baba
Year Published: Jan. 2012 | 1-7 | IJNCAA | Vol. 2 No. 1 -
TRACING ONE NEURON ACTIVITY FROM THE INSIDE OF ITS STRUCTURE
As new areas of neural computing are trying to make at least one step beyond the definition of digital computing, the neural networks field, was developed around the idea of creating models ...Authors: Luciana Morogan
Year Published: Jan. 2012 | 8-22 | IJNCAA | Vol. 2 No. 1 -
MULTI-PEOPLE TRACKING ACROSS MULTIPLE CAMERAS
Multi-target tracking (MTT) is an active and challenging research topic. Many different approaches to MTT problem exist, yet there are still few satisfactory methods of solving multi-target ...Authors: Faouzi Alaya Cheikh, Sajib Kumar Saha, Victoria Rudakova, Peng Wang
Year Published: Jan. 2012 | 23-33 | IJNCAA | Vol. 2 No. 1 -
SESSION TIMEOUT THRESHOLDS IMPACT ON QUALITY AND QUANTITY OF EXTRACTED SEQUENCE RULES
The effort of using web usage mining methods in the area of educational data mining is to reveal the knowledge hidden in the log files of the web and database servers of contemporary virtual ...Authors: Martin Drlik, Michal Munk
Year Published: Jan. 2012 | 34-51 | IJNCAA | Vol. 2 No. 1 -
A REDUCED RANK STAP AND STAGGERED PRF FOR MULTIPLE TARGETSITUATIONS
In this paper, we first present the principles of STAP and discuss the properties of optimum detector, as well as problems associated with estimating the adaptive weights such as ambiguities and ...Authors: Samira Dib, Mourad Barkat, IEEE Fellow, Jean-Marie Nicolas, Morad Grimes
Year Published: Jan. 2012 | 52-69 | IJNCAA | Vol. 2 No. 1 -
SECURE COMMUNICATION BASED ON QI HYPER-CHAOS
Lately chaotic secure communication is attracting large interest due to the simplicity in design over other encryption methods such as conventional methods. In this paper, two message signal ...Authors: Dennis Luke Owuor, Guoyuan Qi
Year Published: Jan. 2012 | 70-80 | IJNCAA | Vol. 2 No. 1 -
ONLINE SURVEYS SYSTEM WITH ENHANCED AUTHENTICATION INTELLIGENCE: A CASE OF ONLINE COURSE EVALUATION SYSTEM
Online survey offers cheapest data collection and processing cost, efficient service, easy data processing and wide coverage over traditional paper-and-pencil surveys, due to this its adoption ...Authors: Kosmas Kapis, Sijali Petro Korojelo
Year Published: Jan. 2012 | 81-90 | IJNCAA | Vol. 2 No. 1 -
THE INTEGRATION OF ACTUAL AND VIRTUAL LEARNING SPACES IN RURALSCHOOLS
The application of internetbased technologies, particularly the integration of actual and virtual learning spaces, has enabled networks to be established for the development of small schools ...Authors: Ken Stevens
Year Published: Jan. 2012 | 91-102 | IJNCAA | Vol. 2 No. 1 -
PUBLISHING WEB SERVICES WHICH ENABLE SYSTEMATIC SEARCH
Web Services (WS) are used for development of distributed applications containing native code assembled with references to remote Web Services. There are thousands of Web Services available ...Authors: Vitezslav Nezval
Year Published: Jan. 2012 | 103-112 | IJNCAA | Vol. 2 No. 1 -
INFRASTRUCTURE SHARING: A COST EFFECTIVE ALTERNATIVE FOR RESILIENCY IN 4G-LTE MOBILE NETWORKS
With the fast growth of Internet and a new widespread interest in broadband networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and ...Authors: Venmani Daniel Philip, Yvon GOURHANT, Djamal ZEGHLACHE
Year Published: Jan. 2012 | 113-126 | IJNCAA | Vol. 2 No. 1 -
CYBER FORENSICS: COMPUTER SECURITY AND INCIDENTRESPONSE
The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, ...Authors: Virginiah Sekgwathe, Mohammad Talib
Year Published: Jan. 2012 | 127-137 | IJNCAA | Vol. 2 No. 1 -
INTELLIGENT SYSTEM FOR PERSONALIZING STUDENTS' ACADEMIC BEHAVIORS- A CONCEPTUAL FRAMEWORK
Business Intelligence (BI) refers to skills, processes, technologies, applications and practices used to support decision making. BI technologies provide historical, current, and predictive views of ...Authors: Azwa Abdul Aziz, Wan Mohd Rizhan Wan Idris, Hasni Hassan, Julaily Aida Jusoh
Year Published: Jan. 2012 | 138-153 | IJNCAA | Vol. 2 No. 1 -
WEB INTERACTIVE MULTIMEDIA TECHNOLOGY: IMPLEMENTATION FROM TWO PERSPECTIVES
Web interactive multimedia technology (WIMT), which is an information and communication system, was introduced in a large metropolitan university. Its features are outlined in this paper, from ...Authors: Asma Md Ali, Joan Richardson
Year Published: Jan. 2012 | 154-166 | IJNCAA | Vol. 2 No. 1 -
EMPLOYING SEMANTIC WEB TECHNOLOGIES IN FINANCIAL INSTRUMENTS TRADING
The lack of rapid approaches in ontology development led us to define Rapid Ontology Development (ROD) approach. The following approach includes the development process and constant evaluation of ...Authors: Dejan Lavbic, Marko Bajec
Year Published: Jan. 2012 | 167-182 | IJNCAA | Vol. 2 No. 1 -
DNA BASE DATA HIDING ALGORITHM
Proposing an algorithm by using software point of view for the purpose of implementing data hiding based on DNA sequences to increase the complexity is the main target of this paper. ...Authors: Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi, Mohammad Reza Najaf Torkaman
Year Published: Jan. 2012 | 183-192 | IJNCAA | Vol. 2 No. 1 -
AN ALGORITHM FOR DETECTING CYCLES IN UNDIRECTED GRAPHS USING CUDA TECHNOLOGY
Cycles count in a graph is an NP-complete problem. This work minimizes the execution time to solve the problem compared to the other traditional serial, CPU based one. It reduces the hardware ...Authors: Maytham Safar, Fahad Mahdi, Khaled Mahdi
Year Published: Jan. 2012 | 193-212 | IJNCAA | Vol. 2 No. 1 -
METHOD FOR GENERATING DC-DC CONVERTERS WITH REQUIRED CHARACTERISTICS
This paper proposes an algorithmic method for generating DC–DC converters with predetermined characteristics. This method uses the Main Topological Matrix MTM. The definition and attributes of ...Authors: Murad Ahmed Ali Taher
Year Published: Jan. 2012 | 213-223 | IJNCAA | Vol. 2 No. 1 -
INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USING DNA STEGANOGRAPHY
There exists a big demand for innovative secure electronic communications while the expertise level of attackers increases rapidly and that causes even bigger demands and needs for an extreme secure ...Authors: Mohammad Reza Najaf Torkaman, Nazanin Sadat Kazazi, Azizallah Rouddini
Year Published: Jan. 2012 | 224-235 | IJNCAA | Vol. 2 No. 1 -
A META-MODELING AND GRAPH GRAMMAR APPROACH FOR MODELING AND ANALYSIS OF E-ENTREPRENEURSHIP SYSTEMS
UML provides standard abstractions to simplify the documentation, understanding, and maintenance of object oriented complex software systems. UML sequence diagrams are used to describe the ...Authors: Mouna Bouarioua, Allaoua Chaoui, Raida Elmansouri
Year Published: Jan. 2012 | 236-245 | IJNCAA | Vol. 2 No. 1 -
EFFICIENT INFORMATION DISSEMINATION AND COLLECTION STRATEGIES FOR WIRELESS SENSOR NETWORKS
Advances in wireless communication as well as in sensor technology have enabled many Wireless Senor Network (WSN) applications. Unfortunately, operational challenges faced by WSNs still hinder ...Authors: S. K. Makki, B. Sun1, L. Osborne, A. Husain, James Carnley
Year Published: Jan. 2012 | 246-257 | IJNCAA | Vol. 2 No. 1 -
SUPPLIER SELECTION BASED ON MULTIPLE CRITERIA
Supplier selection is a multi-criteria decision making problem which includes both qualitative and quantitative factors. In order to select the best suppliers it is necessary to make a trade-off ...Authors: Reza Allahyari Soeini, Laleh Tashakor, Javad Tashakori Bafghi, Mohammad Mokhtari, Amin Vakili
Year Published: Jan. 2012 | 258-273 | IJNCAA | Vol. 2 No. 1 -
A STUDY OF THE TREND OF SMARTPHONE AND ITS USAGE BEHAVIOR IN MALAYSIA
The purpose of this exploratory study is to better understand the current dynamics of the Malaysian market for smartphone and the usage behaviors of consumers. This paper presents the result of a ...Authors: Mohd Azam Osman, Abdullah Zawawi Talib, Zainal Abidin Sanusi, Tan Shiang-Yen, Abdullah Sani Alwi
Year Published: Jan. 2012 | 274-285 | IJNCAA | Vol. 2 No. 1 -
PERFORMANCE INVESTIGATIONS OF SOME ACTIVE QUEUE MANAGEMENT TECHNIQUES USING SIMULATION
Congestion is a fundamental problem in computer networks. Congestion may occur at router buffers of networks when the number of incoming packets cannot be absorbed by the available network ...Authors: Hussein Abdel-jaber, Fadi Thabtah, Amjad M Daoud,Jafar Ababneh, Mahmoud Baklizi
Year Published: Jan. 2012 | 286-301 | IJNCAA | Vol. 2 No. 1 -
REALITY OF ALIGNING IT WITH BUSINESS IN CZECH ORGANIZATIONS
Information technologies (IT) supporting business strategies and business processes are often the most important factor for successful organizations. Aligning IT with the business depends on many ...Authors: Renata Kunstova
Year Published: Jan. 2012 | 302-311 | IJNCAA | Vol. 2 No. 1 -
PUBLICATIONS' CLASSIFICATION ANALYSIS USING CONCEPT LATTICES
The definitive classification of scientific journals depends on their aims and scopes details. In this paper, we present an approach to facilitate the journals classification of the DBLP datasets. ...Authors: Saleh Alwahaishi, Jan Martinovic, Vaclav Snasel
Year Published: Jan. 2012 | 312-323 | IJNCAA | Vol. 2 No. 1 -
TURBO CODES FOR PULSE POSITION MODULATION: APPLYING BCJR ALGORITHM ON PPM SIGNALS
In this paper, we consider the problem of turbo encoding/decoding for Pulse Position Modulation (PPM) that constitutes a very popular modulation scheme for Free-Space Optical (FSO) communications and ...Authors: Serj Haddad, Chadi Abou-Rjeily
Year Published: Apr. 2012 | 324-332 | IJNCAA | Vol. 2 No. 2 -
IA-TCP: IMPROVING ACKNOWLEDGEMENT MECHANISM OF TCP FOR BETTER PERFORMANCE IN MANET
A Mobile Ad hoc Network (MANET) is a collection of terminals equipped with one or several wireless network interfaces. In this paper, we suggest an improvement of the Transmission Control ...Authors: Sofiane Hamrioui, Mustapha Lalam, Pascal Lorenz
Year Published: Apr. 2012 | 333-341 | IJNCAA | Vol. 2 No. 2 -
DYNAMIC WEIGHT PARAMETER FOR THE RANDOM EARLY DETECTION (RED) IN TCP NETWORKS
This paper presents the Weighted Random Early Detection (WTRED) strategy for congestion handling in TCP networks. WTRED provides an adjustable weight parameter to increase the sensitivity of the ...Authors: Nabhan Hamadneh, David Murray, Michael Dixon, Peter Cole
Year Published: Apr. 2012 | 342-352 | IJNCAA | Vol. 2 No. 2 -
STUDY OF THE EFFECTED GENETIC WATERMARKING ROBUSTNESS UNDER DCT AND DWT DOMAINS
Watermarking becomes the suitable technology to protect multimedia in digital world. Watermarking using genetic algorithm for the optimization of the tread- off between the ...Authors: Abduljabbar Shaamala, Azizah A. Manaf
Year Published: Apr. 2012 | 353-360 | IJNCAA | Vol. 2 No. 2 -
CONTINUOUS FUNCTIONING OF SOFT SYSTEM BUS BASED CENTRALIZED PERSISTENT COMPUTING SYSTEM
Persistent Computing Systems (PCSs) were proposed as a new generation of reactive systems to provide reliable and secure computing services continuously and persistently to their users anytime and ...Authors: Quazi Mahera Jabeen, Muhammad Anwarul Azim, Yuichi Goto, Jingde Cheng
Year Published: Apr. 2012 | 361-380 | IJNCAA | Vol. 2 No. 2 -
A SURVEY ON COST ESTIMATION PROCESS IN MALAYSIA SOFTWARE INDUSTRY
One of the issues that arise within the community of software developers is the process of estimating costs. Questions such as how and what is proper and correct process has always been a matter of ...Authors: Zulkefli Mansor, Zarinah Mohd Kasirun, Saadiah Yahya, Noor Habibah Hj Arshad
Year Published: Apr. 2012 | 381-388 | IJNCAA | Vol. 2 No. 2 -
A MODIFIED COMPLEX PERMITTIVITY MEASUREMENT TECHNIQUE AT MICROWAVE FREQUENCY
Transmission/reflection coefficients measurement technique for determining materials complex permittivity at microwave (MW) frequencies with a modified inexpensive arrangement setup is ...Authors: Salah I. Yahya Al-Mously
Year Published: Apr. 2012 | 389-401 | IJNCAA | Vol. 2 No. 2 -
TRANSFORMING OBJECT ORIENTED DATA MODEL TO RELATIONAL DATA MODEL
The object oriented and relational technologies are originated in distinct paradigms. The object-oriented technology is universally accepted approach for the development of business applications ...Authors: Mohd Khalid Awang, Nur Lian Labadu
Year Published: Jul. 2012 | 402-409 | IJNCAA | Vol. 2 No. 3 -
EVOLUTIONARY TECHNIQUES IN SYNTHESIS OF MULTIPLE-VALUED LOGIC FUNCTIONS
The radix (R) used in Multiple-Valued Logic (MVL) circuits goes beyond the binary case (R = 2). MVLRead Only Memory (ROM), Random Access Memory (RAM), and Digital Signal Processing (DSP) systems have ...Authors: Mostafa Abd-El-Barr
Year Published: Jul. 2012 | 410-421 | IJNCAA | Vol. 2 No. 3 -
AUTOMATED REASONING TECHNIQUES FOR SYSTEM CORRECTNESS VERIFICATION
The functionality and complexity of software and hardware systems are steadily growing. Consequently, the probability of delicate faults existence in these systems is also rising. Some of these ...Authors: Hasan Krad
Year Published: Jul. 2012 | 422-430 | IJNCAA | Vol. 2 No. 3 -
TIMELINESS MEASUREMENT MODEL: A MATHEMATICAL APPROACH FOR MEASURING THE TIMELINESS OF HANDHELD APPLICATION USAGE
This study is aimed for developing a survey-based mathematical model specifically for measuring the timeliness of handheld applications usage. This study is designed to achieve five major objectives: ...Authors: Amalina Farhi Ahmad Fadzlah
Year Published: Jul. 2012 | 431-450 | IJNCAA | Vol. 2 No. 3 -
CONTEDI - APPLICATION DEVELOPMENT FOR TVDI
This article presents partial results of the project CONTEDI, educational content to digital television (DTV), which is an initiative within the University to go deeper into the development of ...Authors: Adriana X. Reyes G, Gustavo A. Moreno, Jovani Jimenez B.
Year Published: Jul. 2012 | 451-456 | IJNCAA | Vol. 2 No. 3 -
SERVICE AVAILABILITY AND ACCESSIBILITY OF REQUIREMENTS USINGCLUSTERING IN CLOUD ENVIRONMENT
Cloud computing is one contemporary technology in which the research community has recently embarked. Cloud computing faces many of the challenges and difficulties. Meeting the user needs is the ...Authors: Thamilvaani Arvaree Alvar, Rodziah Atan
Year Published: Jul. 2012 | 457-463 | IJNCAA | Vol. 2 No. 3 -
ANALYZING THE BASIC PERFORMANCE OF IEEE802.11G/N
This paper describes a new standardization effort – IEEE 802.11n, and its comparison with legacy standard. In this paper we present the results of a measurement campaign evaluating the performance ...Authors: Janis Jansons, Toms Dorins, Nikolajs Bogdanovs
Year Published: Jul. 2012 | 464-469 | IJNCAA | Vol. 2 No. 3 -
URBAN GROWTH SIMULATION: UTILIZING A MULTIDIMENSIONAL METHODOLOGY
This research is focused on identifying and describing important factors that influence urban growth in the city of Tijuana as well as their social development and economical implications. A ...Authors: Bogart Yail Marquez, Alejandro Brugues-Rodriguez
Year Published: Jul. 2012 | 470-480 | IJNCAA | Vol. 2 No. 3 -
FACE EXPRESSION RECOGNITION USING AUTOREGRESSIVE MODELS TO TRAIN NEURAL NETWORK CLASSIFIERS
Neural network classifying method is used in this work to perform facial expression recognition. The processed expressions were the six most pertinent facial expressions and the neutral one. This ...Authors: M. Saaidia, A. Gattal, M. Maamri, M. Ramdani
Year Published: Jul. 2012 | 481-487 | IJNCAA | Vol. 2 No. 3 -
ANALYSIS OF FIXED PRIORITY SWAP SCHEDULING POLICY FOR REAL-TIME AND NON REAL-TIME JOBS
Scheduling of real-time jobs is challenging given the fact that they are delay sensitive. In order to improve the performance of such jobs, a number of scheduling policies have been proposed. SWAP, a ...Authors: Michael Okopa, Tonny Bulega
Year Published: Jul. 2012 | 488-495 | IJNCAA | Vol. 2 No. 3 -
IEEE802.11A STANDARD PERFORMANCE IN MOBILE ENVIRONMENT
In this paper we reflect evaluation of Wireless Local Area Network (WLAN) standard in a vehicular environment. WLAN based on the IEEE802.11a standard in wireless user community is widespread and well ...Authors: Janis Jansons, Arturs Barancevs, Ernests Petersons, Nikolajs Bogdanovs
Year Published: Jul. 2012 | 496-499 | IJNCAA | Vol. 2 No. 3 -
PERFORMANCE ANALYSIS AND GRID COMPUTING ON WIDE AREA
Nowadays, the energy production system is no longer suitable to our livelihood and several issues need to be solved. Primary sources will not last forever and the environmental impact that we ...Authors: Gianni Fenu, Marco Nitti, Pier Luigi Pau
Year Published: Oct. 2012 | 500-510 | IJNCAA | Vol. 2 No. 4 -
INTEGRATING WORKFLOW-BASED MOBILE AGENTS WITH CLOUD BUSINESS PROCESS MANAGEMENT SYSTEMS
While researching integration aspects of cloud Business Process Management Systems (BPMS) with on-premises applications, authors have identified various scenarios that cannot be effectively addressed ...Authors: Antons Mislevics, Janis Grundspenkis
Year Published: Oct. 2012 | 511-530 | IJNCAA | Vol. 2 No. 4 -
REALIZATION OF IP CORE FOR ROBOT CONTROLLED TRENCHING SYSTEM
An IP Core of a Robot based Trenching System has been designed modeled on Intel's 8051 Microcontroller. The designed IP Core realizes all 256 instructions of 8051 and also the ...Authors: C. S. Mala, S. Ramachandran
Year Published: Oct. 2012 | 531-549 | IJNCAA | Vol. 2 No. 4 -
NEW WINDOWING TECHNIQUE DETECTION OF SAGS AND SWELLS BASED ON CONTINUOUS S-TRANSFORM (CST)
This paper produces a new approach for power quality analysis using a windowing technique based on Continuous S-transform (CST). This half-cycle window technique approach can detect almost correctly ...Authors: K. Daud, A. F. Abidin, N. Hamzah, H. S. Nagindar Singh
Year Published: Oct. 2012 | 550-555 | IJNCAA | Vol. 2 No. 4 -
TOWARD AN ASPECT-ORIENTED SIMULATION
Discrete event simulation (DES) projects implement several crosscutting concerns, such as event scheduling, event handling, and keeping track of a simulation’s state which tend to produce a ...Authors: Meriem Chibani, Brahim Belattar, Abdelhabib Bourouis
Year Published: Apr. 2013 | 1-10 | IJNCAA | Vol. 3 No. 1 -
REAL TIME INJURY AND RELATED ACTIVITIES MONITORING WITH SINGLE ROTATABLE INFRARED SENSOR
This paper proposed a system to perform injury recognition to assist people with multiple disabilities using single infrared sensor with rotatable capability. Our system will be installed in a room ...Authors: Ong Chin Ann, Lau Bee Theng, Hamid Bagha
Year Published: Apr. 2013 | 11-21 | IJNCAA | Vol. 3 No. 1 -
TOOTH-BASED IDENTIFICATION OF INDIVIDUALS
The use of automated biometrics-based personal identication systems is an omnipresent procedure. Many technologies are no more secure, and they have certain limitations such as in cases when bodies ...Authors: Charbel Fares, Mireille Feghali
Year Published: Apr. 2013 | 22-34 | IJNCAA | Vol. 3 No. 1 -
MEDICAL IMAGE SEGMENTATION ON A CLUSTER OF PCS USING MARKOV RANDOM FIELDS
Medical imaging applications produce large sets of similar images. The huge amount of data makes the manual analysis and interpretation a fastidious task. Medical image segmentation is thus an ...Authors: El-Hachemi Guerrout, Ramdane Mahiou, Samy Ait-Aoudia
Year Published: Apr. 2013 | 35-44 | IJNCAA | Vol. 3 No. 1 -
STUDY OF THE DYNAMIC RESPONSE AND STATUS OF THE VEHICLE SUSPENSION ELEMENTS
The current paper describes the measurement and analysis of the dynamic response and status of the vehicle suspension elements on the bases of the MEMS inertial system. It consists of an inertial ...Authors: Emil Iontchev, Rosen Miletiev, Vladimir Bashev, Ivaylo Simeonov
Year Published: Apr. 2013 | 45-51 | IJNCAA | Vol. 3 No. 1 -
SCHEDULING TECHNIQUES TO CLASSIFY WEAR PARTICLES ON MULTI-COMPUTERS
Processor scheduling techniques are used in conjunction to exploit the major paradigms of algorithmic parallelism, geometric parallelism, and processor farming. Static process scheduling techniques ...Authors: Mohammad Shakeel Laghari, Gulzar Ali Khuwaja
Year Published: Apr. 2013 | 52-71 | IJNCAA | Vol. 3 No. 1 -
PROCESSING XML WITH JAVA – A PERFORMANCE BENCHMARK
Over time, XML markup language has acquired a considerable importance in applications development, standards definition and in the representation of large volumes of data, such as databases. Today, ...Authors: Bruno Oliveira, Vasco Santos, Orlando Belo
Year Published: Apr. 2013 | 72-85 | IJNCAA | Vol. 3 No. 1 -
ULTRA-LOW COMPLEXITY CONTROL MECHANISMS FOR SENSOR NETWORKS AND ROBOTIC SWARMS
Biologically inspired swarms of autonomous robots have been used successfully in a vari-ety of robotic applications ranging from var-ious kinds of ground-based robots, to un-manned aerial vehicles. ...Authors: Matthias Scheutz, Peter Bauer
Year Published: Apr. 2013 | 86-119 | IJNCAA | Vol. 3 No. 1 -
AUTOMATIC CONTROL OF CONFIGURATION OF WEB ANONYMIZATION
Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web ...Authors: Tomas Sochor
Year Published: 2013 | 1-10 | IJNCAA | Vol. 3 No. 2 -
LARGE SENDING OFFLOAD: DESIGN AND IMPLEMENTATION FOR HIGH-SPEED COMMUNICATIONS RATE UP TO 100 GBPS
With the release of P802.3ba IEEE, send and receive data at 40 Gbps to 100 Gbps could become possible. Offloading part of the processing protocol to the network card showed success in sending data at ...Authors: Mohamed Elbeshti, Mike Dixon, Terry Koziniec
Year Published: 2013 | 11-18 | IJNCAA | Vol. 3 No. 2 -
ADAPTIVE VLSI ARCHITECTURE OF BEAM FORMER FOR ACTIVE PHASED ARRAY RADAR
This paper describes architecture for a digital beam former developed for 16 element phased array radar. The digital beam former architecture includes the complex operations such as down conversion ...Authors: D. Govind Rao, N. S. Murthy, A.Vengadarajan
Year Published: 2013 | 19-29 | IJNCAA | Vol. 3 No. 2 -
A SURVEY ON AMDAHL'S LAW EXTENSION IN MULTICORE ARCHITECTURES
Multicore architectures represent the future of computing since they provide cost effective solutions to improve throughput and performance of parallel programs while keeping power consumption ...Authors: Bashayer M. Al-Babtain, Fajer J. Al-Kanderi, Maha F. Al-Fahad, Imtiaz Ahmad
Year Published: 2013 | 30-46 | IJNCAA | Vol. 3 No. 3 -
TASK SCHEDULING IN MULTIPROCESSOR SYSTEM USING FORK-JOIN METHOD (TSFJ)
The performance of the multiprocessor system depends on how the tasks are scheduled in multiprocessors. If we allocate tasks wisely then we can get good performance of the system. The primary goal of ...Authors: Ranjit Rajak, C.P.Katti
Year Published: 2013 | 47-53 | IJNCAA | Vol. 3 No. 3 -
INTELLIGENT LICENSE PLATE RECOGNITION
In this paper we are presenting an intelligent system for License plate recognition. We need to specify the shapes that need to be detected as well as its dimensions. A comparative study is done in ...Authors: Charbel Fares
Year Published: 2013 | 54-69 | IJNCAA | Vol. 3 No. 3 -
MANAGEMENT OF TEMPORAL SYSTEM – COLUMN LEVEL
Database systems used nowadays must allow not only current valid data processing, but also managing historical data, respectively data, which will be valid in the future. Moreover, it must be able to ...Authors: Michal Kvet, Karol Matiaško
Year Published: 2013 | 70-80 | IJNCAA | Vol. 3 No. 3 -
MINING POSITIVE AND NEGATIVE ASSOCIATION RULES: AN APPROACH FOR BINARY TREES
Mining association rules and especially the negative ones has received a lot of attention and has been proved to be useful in the real world. In this work, a set of algorithms for finding both ...Authors: John Tsiligaridis
Year Published: 2013 | 81-87 | IJNCAA | Vol. 3 No. 3 -
A MODIFIED TASK SCHEDULING ALGORITHM OF TASK GRAPH WITHOUT COMMUNICATION TIME
The scheduling of tasks on the processors is considered to be a very critical problem in the multiprocessor system. Here, the problem is divided into subtasks and it is assigned on the processors. ...Authors: Ranjit Rajak, C.P.Katti, Nidhi Rajak
Year Published: 2013 | 88-93 | IJNCAA | Vol. 3 No. 4 -
SPECTRUM ANALYSIS OF THE SUSPENSION DYNAMICS MEASURED BY MEMS INERTIAL SYSTEM
The current paper compares the spectrum methods to estimate the suspension dynamics measured by the MEMS inertial data acquisition system which is installed on the vibration stand. The analysis is ...Authors: Rumenq Yordanov, Rosen Miletiev, Emil Iontchev, Ivaylo Simeonov
Year Published: 2013 | 94-99 | IJNCAA | Vol. 3 No. 4 -
DESIGN AND IMPLEMENTATION OF INTERACTIVE WEB SYSTEM FOR THE KAZAKH TEXT RECOGNITION AND CORRECTION WITH USING OF PARALLEL COMPUTING
In given paper we present the integrated interactive computer recognition system for the Kazakh language text with using of parallel computing. The design and integration methodology of the system ...Authors: Bakyt M. Kairakbay, Daniyar B. Nurseitov, Yuriy Y. Stolyarov, Ilyas E. Tursunov, Igor A. Ugay, David L. Zaurbekov
Year Published: 2013 | 100-114 | IJNCAA | Vol. 3 No. 4 -
INTEGRATED WORKFLOW-BASED SYSTEM FOR RISK MAPPING OF OIL SPILLS WITH USING HIGH PERFORMANCE CLUSTER
We present in the paper the integrated workflow-based system for risk mapping of oil spills with using high performance cluster. The design and integration methodology of the system are based on ...Authors: Kairat A. Bostanbekov, Jalal K. Jamalov, Dmitriy K. Kim, Daniyar B. Nurseitov, Ilyas E. Tursunov, Edige A. Zakarin, David L. Zaurbekov
Year Published: 2013 | 115-131 | IJNCAA | Vol. 3 No. 4 -
WHAT DOES THE FUTURE OF SEARCH ENGINE OPTIMIZATION HOLD?
Today Internet has become a vital part of our everyday life. Accordingly, for businesses to grow, being active and visible on the Internet is a new requirement. On the other hand, based on confirmed ...Authors: Saeid Saberi, Golnaz Saberi, Masnizah Mohd
Year Published: 2013 | 132-138 | IJNCAA | Vol. 3 No. 4 -
APPLICATION-AGNOSTIC INTERACTIVE DATA: MANAGING HCI COMPLEXITY AT THE SOURCE
In the domain of Human Computer Interaction (HCI), the communication between humans and software is an ongoing challenge. On the one hand, humans have growing needs and expectations. On the other ...Authors: Ashraf Gaffar
Year Published: 2014 | 1-16 | IJNCAA | Vol. 4 No. 1 -
SECURITY METHOD: CLOUD COMPUTING APPROACH BASED ON MOBILE AGENTS
The cloud computing is a new computer model that provide computer services in the form of services on demand, accessible from anywhere, anytime and by anyone, the cloud computing are mainly used for ...Authors: Ali Alwesabi, Kazar Okba
Year Published: 2014 | 17-29 | IJNCAA | Vol. 4 No. 1 -
ENERGY MANAGEMENT OF WIND/PV AND BATTERY HYBRID SYSTEM
This paper deals with power control of a wind and solar hybrid generation system for interconnection operation with electric distribution system. Power control strategy is to extract the maximum ...Authors: M. F. Almi, M. Arrouf, H.Belmili, S. Boulouma, B. Bendib
Year Published: 2014 | 30-38 | IJNCAA | Vol. 4 No. 1 -
STUDY OF MACRO-BENDING OF POLYMER FIBER IN MULTIMODE POF COUPLERS DEVELOPMENT BY LAPPING TECHNIQUE
An experimental study of coupling efficiency of a circular multimode fiber coupler dependency of radiation from macro-bending is investigated. The study is done by experimental set-up using various ...Authors: L.S. Supian, Mohd Syuhaimi Ab-Rahman, Norhana Arsad, Harry Ramza
Year Published: 2014 | 39-47 | IJNCAA | Vol. 4 No. 1 -
DEVELOPING CORE SOFTWARE REQUIREMENTS OF ENERGY MANAGEMENT SYSTEM FOR SMART CAMPUS WITH ADVANCED SOFTWARE ENGINEERING
Higher educational institutions such as universities provide campus data and information to stakeholders such as students, faculty staff, administrators, media, and community members. They also ...Authors: Shigeru Kusakabe, Hsin-Hung Lin, Yoichi Omori, Keijiro Araki
Year Published: 2014 | 48-55 | IJNCAA | Vol. 4 No. 1 -
USING SEMANTIC WEB TECHNOLOGIES IN HETEROGENEOUS DISTRIBUTED DATABASE SYSTEM: A CASE STUDY FOR MANAGING ENERGY DATA ON MOBILE DEVICES
Managing energy data from multiple distributed and heterogeneous sources is an important issue worldwide. This study focused on using semantic web technologies in an energy data management system. ...Authors: Zhan Liu, Anne Le Calvé, Fabian Cretton, Nicole Glassey
Year Published: 2014 | 56-69 | IJNCAA | Vol. 4 No. 2 -
TOWARDS MAXIMIZING THROUGHPUT FOR MULTITHREADED PROCESSES IN LINUX
CPU scheduler is a very important key concept in operating system which affects scheduling objectives and criteria. Choosing or modifying scheduling policy for running threads depends on ...Authors: Samih M. Mostafa, Shigeru Kusakabe
Year Published: 2014 | 70-78 | IJNCAA | Vol. 4 No. 2 -
ARE FIRST YEAR MEDICAL STUDENTS DISTRACTED BY ON-SCREEN EXAMS IN RELATION TO ON-PAPER EXAMS
Assessment over the electronic media has been questioned for its validity and sensitivity, especially for the purpose of evaluating a student at the university level, though not for competitive ...Authors: Mohammed Amanullah, Ayyub Patel, Khalid Mohanna, Sarah Afaq
Year Published: 2014 | 79-90 | IJNCAA | Vol. 4 No. 2 -
AUTONOMIC SERVICE MANAGEMENT IN MOBILE CLOUD INFRASTRUCTURES
With the introduction and advancement of mobile cloud computing, endless opportunities for the provision of mobile phone services have ensued. Mobile cloud computing technology has brought about a ...Authors: Aduragba Olanrewaju Tahir, Adedoyin Adeyinka
Year Published: 2014 | 91-107 | IJNCAA | Vol. 4 No. 2 -
PERFORMANCE EVALUATION OF MESSAGE PASSING VS. MULTITHREADING PARALLEL PROGRAMMING PARADIGMS ON MULTI-CORE SYSTEMS
Present and future multi-core computational system architecture attracts researchers to utilize this architecture as an adequate and inexpensive solution to achieve high performance ...Authors: Hadi Khalilieh, Nidal Kafri, Rezek Mohammad
Year Published: 2014 | 108-116 | IJNCAA | Vol. 4 No. 2 -
DATA CENTER ARCHITECTURES: CHALLENGES AND OPPORTUNITIES
Recently, data centers became a main part in information and communication technology. Data centers are facing many challenges because of the rapid and continuous growth of applications’ size and ...Authors: Rana W. Alaskar, Imtiaz Ahmad
Year Published: 2014 | 117-129 | IJNCAA | Vol. 4 No. 3 -
A CRITICAL-PATH AND TOP-LEVEL ATTRIBUTES BASED TASK SCHEDULING ALGORITHM FOR DAG (CPTL)
Parallel computing is an important area of research. It is used from scientific to commercial applications. Task scheduling is one of the important research areas of parallel computing. The major ...Authors: Nidhi Rajak, Ranjit Rajak, Anurag Dixit
Year Published: 2014 | 130-136 | IJNCAA | Vol. 4 No. 3 -
MODELING AND UTILIZATION OF AN IPMC MUSCLE
Artificial muscles are one of the most important applications of the technology of flexible structure, designed to imitate human or animal muscles and to monitor its activities and conditions. The ...Authors: Mirna Atieh, Oussama Mustapha, Hassan Tahini, Ali Zibara, Nizar F. Al Awar, Reem Abou Marak, Salahiddin Eljammal, Mohamad O. Diab, Nazih Moubayed
Year Published: 2014 | 137-145 | IJNCAA | Vol. 4 No. 3 -
TESTING A REAL TIME MONITORING SYSTEM FOR PASSIVE OPTICAL NETWORKS USING AN ARRAY OF FIBER BRAGG GRATINGS
In this paper, we propose and design a passive opti-cal network using an array of fiber Bragg gratings (FBGs) for centralized monitoring of the branched optical networks. Further, we exploit the ...Authors: Abdosllam M. Abobaker, Issa Eldbib, Abdulaziz Hasen Daw, P. Ramesh Babu
Year Published: 2014 | 146-155 | IJNCAA | Vol. 4 No. 3 -
NETWORK PERFORMANCE ANALYSIS OF CLOUD BASED MULTIMEDIA STREAMING SERVICE
Multimedia streaming is the evergreen technology brings quality on-demand and live media content to the end consumer. Streaming enables the users to view real time multimedia content on-the-go at ...Authors: Selvaraj Kesavan, J.Jayakumar
Year Published: 2014 | 156-166 | IJNCAA | Vol. 4 No. 3 -
RECENT DYNAMIC BANDWIDTH ALLOCATION ALGORITHM METHODS IN ETHERNET PASSIVE OPTICAL NETWORK
The “last mile” bandwidth bottleneck problem can be best solved by using Ethernet Passive Optical Network (EPON). EPON is a promising technology to implement the Fiber To The Home solution. ...Authors: Nurul Asyikin Mohd Radzi, Norashidah Md. Din, Mohammed Hayder Al-Mansoori, Sajaa Kh Sadon
Year Published: 2014 | 167-176 | IJNCAA | Vol. 4 No. 4 -
ADAPTIVE CACHE REPLACEMENT POLICY (ACRP): A DYNAMIC REPLACEMENT POLICY FOR CACHE MANAGEMENT
The discovery of memory access time as one of the major design issues in the processor has increased effort in the development of different cache replacement policies to manage what to be the content ...Authors: Oladayo Olakanmi
Year Published: 2014 | 177-183 | IJNCAA | Vol. 4 No. 4 -
EFFECT OF THREAD WEIGHT READJUSTMENT SCHEDULER ON FAIRNESS IN MULTITASKING OS
In this paper, we investigate the effectiveness of Thread Weight Readjustment Scheduler (TWRS) for multitasking operating systems from the view point of fairness. Fairness is one of the most ...Authors: Samih M. Mostafa, Shigeru Kusakabe
Year Published: 2014 | 184-192 | IJNCAA | Vol. 4 No. 4 -
TESTING AND DEBUGGING RESOURCE ALLOCATION FOR FAULT DETECTION AND REMOVAL PROCESS
In software development life cycle (SDLC) testing is very important step. One of the key elements of software quality is testing. Fault detection and removal process is also very important when we ...Authors: Md. Nasar, Prashant Johri
Year Published: 2014 | 193-200 | IJNCAA | Vol. 4 No. 4 -
DESIGN OF A REVERSIBLE FUSED 32-POINT RADIX -2 FLOATING POINT FFT UNIT USING 3:2 COMPRESSOR
This paper aims on the design of a reversible fused 32-Point Radix-2 single precision floating point FFT unit using 3:2 compressor. The work focuses on the realization of three reversible fused ...Authors: A.V. AnanthaLakshmi, G.F. Sudha
Year Published: 2014 | 201-210 | IJNCAA | Vol. 4 No. 4 -
PERFORMANCE EFFICIENCY OF MODIFIED AES ALGORITHM USING MULTIPLE S-BOXES
In our previous paper, we modified the Advance Encryption System (AES) algorithm by proposing to use multiple substitution boxes (S-Boxes). While many studies have been conducted specifically on ...Authors: Felicisimo V. Wenceslao, Jr.
Year Published: Mar. 2015 | 1-9 | IJNCAA | Vol. 5 No. 1 -
A NEW APPROACH FOR SOLVING EQUATIONS SYSTEMS INSPIRED FROM BRAINSTORMING
This paper proposes a metaheuristic inspired from human brainstorming combined with concepts from graph theory for solving system of equations. The proposed method is able to find solutions of a ...Authors: Liviu Octavian Mafteiu-Scai
Year Published: 2015 | 10-18 | IJNCAA | Vol. 5 No. 1 -
SENSORS-ENABLED SMART ATTENDANCE SYSTEMS USING NFC AND RFID TECHNOLOGIES
Attendance system is a system that is used to track the attendance of a particular person and is applied in the industries, schools, universities or working places. The traditional way for taking ...Authors: Cheah Boon Chew, Manmeet Mahinderjit-Singh, Kam Chiang Wei, Tan Wei Sheng, Mohd Heikal Husin, Nurul Hashimah, Ahamed Hassain Malim
Year Published: 2015 | 19-28 | IJNCAA | Vol. 5 No. 1 -
TESTING RESOURCE ALLOCATION FOR MODULAR SOFTWARE USING GENETIC ALGORITHM
Software testing is one of the important steps of SDLC. In software testing one of the important issues is how to allocate the limited resources so that we finish our testing on time and will deliver ...Authors: Md. Nasar, Prashant Johri
Year Published: 2015 | 29-38 | IJNCAA | Vol. 5 No. 1 -
DEVELOPMENT OF AN INTEGRATED INFORMATION SERVER SYSTEM FOR IT EDUCATION THROUGH SERVER VIRTUALIZATION TECHNOLOGY
Recent decade years, our educational environments have been already including several kinds of computing infrastructures according to user’s requests. But we are sometimes suffering from lack of ...Authors: Yoshio Moritoh, Yoshiro Imai
Year Published: Jan. 2015 | 39-47 | IJNCAA | Vol. 5 No. 1 -
APPLICATION OF MACHINE LEARNING TECHNIQUES FOR YIELD PREDICTION ON DELINEATED ZONES IN PRECISION AGRICULTURE
Precision agriculture is the implementation of the recent technology in agriculture. Huge amount of data is collected in agriculture and various techniques of data mining are used to make efficient ...Authors: Anshal Savla, Himtanaya Bhadada, Parul Dhawan, Vatsa Joshi
Year Published: Apr. 2015 | 48-52 | IJNCAA | Vol. 5 No. 2 -
MODELLING THE PERFORMANCE OF CLASS-BASED WEIGHTED FAIR QUEUE USING OPNET
Congestion control and internet network resources management are complex and critical issues in a high-speed packet switch data network, due to the emergence growth of modern multimedia streaming ...Authors: Idris Zakariyya, M Nordin A Rahman, Mohd Nazri Ismail
Year Published: Apr. 2015 | 53-60 | IJNCAA | Vol. 5 No. 2 -
SLA-BASED RESOURCE ALLOCATION WITHIN CLOUD NETWORKING ENVIRONMENT
Today, cloud networking which is the ability to connect users with their cloud services and to interconnect these services in an inter-cloud approach, is one of the recent research areas within the ...Authors: Mohamad T. Hamze, Nader Mbarek, Olivier Togni
Year Published: Apr. 2015 | 61-78 | IJNCAA | Vol. 5 No. 2 -
FUTURE MOTION DECISIONS USING STATE-ACTION PAIR PREDICTIONS
Robots that works in a dynamic environment must possess, the ability to autonomously cope with the changes in the environment. This paper proposes an approach to predict changes in the state and ...Authors: Masashi Sugimoto, Kentarou Kurashige
Year Published: Apr. 2015 | 79-93 | IJNCAA | Vol. 5 No. 2 -
A PARALLEL LOAD BALANCING BASED ON PSEUDO-CLIQUES
In solving systems of equations on parallel computers, one very important problem is load balancing, because this affects the process efficiency. One way of achieving this goal is a good partitioning ...Authors: Liviu Octavian Mafteiu-Scai
Year Published: Apr. 2015 | 94-101 | IJNCAA | Vol. 5 No. 2 -
HYBRID METHOD BASED RETINAL OPTIC DISC DETECTION
We propose a hybrid method based for the Optic Disc (OD) detection in the retinal image. This research consists of three main steps. First, blood vessel removal with homomorphic and median ...Authors: Arif Muntasa, Indah Agustien Siradjuddin, Moch Kautsar Sophan
Year Published: Jul. 2015 | 102-106 | IJNCAA | Vol. 5 No. 3 -
A FRAMEWORK FOR DEPLOYMENT OF EASY TO USE WIRELESS SENSOR NETWORKS FOR FARM SOIL MONITORING AND CONTROL: A CASE STUDY OF HORTICULTURE FARMS IN PWANI REGION TANZANIA
Monitoring and control of soil parameters such as temperature, moisture and micronutrients play an important role in producing quality horticulture crops. The farms at Pwani Region needed close ...Authors: Kosmas Kapis, Mathias Ombeni
Year Published: Jul. 2015 | 107-118 | IJNCAA | Vol. 5 No. 3 -
OPPORTUNITIES FOR EMPLOYING IGBT IN PHOTO-SWITCH BASED ON SILICON AVALANCHE LEDS
A comprehensive approach for the practical realization of silicon light-emitting devices (Si-LEDs) with emitting visible light in the 400 to 900 nm wavelength region is discussed. Prototype Si-LEDs ...Authors: Kaikai Xu, Siyang Liu, Jianming Zhao, Qi Yu, Weifeng Sun, Guannpyng Li
Year Published: Jul. 2015 | 119-126 | IJNCAA | Vol. 5 No. 3 -
SECURITY OF COMPOSITE ELECTRONIC SERVICES
This paper presents a new approach to the security of composite electronic services. They are defined as a part of integration platforms in the service oriented architecture. New security ...Authors: Jarosław Wilk
Year Published: Jul. 2015 | 127-140 | IJNCAA | Vol. 5 No. 3 -
DEVELOPMENT A FILE TRANSFER APPLICATION BY HANDOVER FOR 3D VIDEO COMMUNICATION SYSTEM IN SYNCHRONIZED AR SPACE
Existing video communication systems, used in business or private life, provides file data transfer function. However, these systems need many manipulation steps by using mouse and keyboard. These ...Authors: Yuki Fujibayashi, Hiroki Imamura
Year Published: 2015 | 141-147 | IJNCAA | Vol. 5 No. 4 -
OPTIMIZED ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORK ROUTING BY GENETIC ALGORITHM
The wireless sensor network is set of hundreds or thousands nodes, where each node is connected to one or sometimes several sensors. A WSN integrated circuits, sensor, embedded computing, modern ...Authors: Dadmehr Rahbari
Year Published: 2015 | 148-155 | IJNCAA | Vol. 5 No. 4 -
MONITORING SYSTEM FOR RESIDENTIAL ENERGY CONSUMPTION
The aim of the present paper is the management of the energy-consumption of a residential building, where the addressed case is to figure out the trends of reducing energy consumption through many ...Authors: Salah Bouktif, Waleed K. Ahmed
Year Published: 2015 | 156-164 | IJNCAA | Vol. 5 No. 4 -
EMERGENCY RELATED MOBILE APPLICATIONS: USABILITY FRAMEWORK AND PROPOSED IMPLEMENTATION
There are a variety of mobile applications that provide convenience to mobile device users and emergency related applications are one of them. The number of these emergency related applications has ...Authors: Hannah Soh Wen Shin, Nazreen Fatimah Dhahir, Jeyabarath A/L Jeya Mohan, Nasuha Lee Abdullah
Year Published: 2015 | 165-174 | IJNCAA | Vol. 5 No. 4 -
A PERFORMANCE OPTIMIZATION MODEL OF TASK SCHEDULING TOWARDS GREEN CLOUD COMPUTING
Cloud computing becomes a powerful trend in the development of ICT services. It allows dynamic resource scaling from infinite resource pool for supporting Cloud users. Such scenario leads to ...Authors: Masnida Hussin, Raja Azlina Raja Mahmood, Nor Azura Husin, Noris Mohd. Norowi
Year Published: Jan. 2016 | 1-8 | IJNCAA | Vol. 6 No. 1 -
BRAIN - COMPUTER INTERFACE FOR COMMUNICATION AND ESTIMATION OF HUMAN EMOTION FROM EEG AND VIDEO
The brain-computer interface (BCI) aim to use Electroencephalography (EEG) or other measures of brain functions can be implemented for communication with smart devices for disabled persons. For ...Authors: Svetla Radeva, Dimitar Radev
Year Published: Jan. 2016 | 9-15 | IJNCAA | Vol. 6 No. 1 -
ULTRASONIC SENSORS GLOVES FOR BLIND PEOPLE USING LILYPAD ARDUINO
A lots of blind people suffer in their own lives because of their vision loss. Vision is one of the five important senses in the human body. People with Vision loss have their own disability. Many ...Authors: Abdulrahman Alkandari, Areej Alajmi, Sarah Muhammad, Altaf Alshammari
Year Published: Jan. 2016 | 16-22 | IJNCAA | Vol. 6 No. 1 -
EVALUATION OF PERFORMANCE OF SMART DEVICES IN CLOSED SYSTEM MODELS
Smartphones and tablets are becoming dominant devices in the present market. Apart from offering the same features as traditional mobile phones, smart devices provide several other features as well. ...Authors: Cecilia Twinamatsiko, Kyanda Swaib Kaawaase, Michael Okopa
Year Published: Jan. 2016 | 23-33 | IJNCAA | Vol. 6 No. 1 -
A NEW GENERALIZED ASYMMETRIC MULTILEVEL INVERTER TOPOLOGY BASED ON POLYGONAL PRISMS
Multilevel inverters are widely used in power generation because they offer high performance in the electricity quality, however they require a large number of switching devices and control ...Authors: Aldo Flores-González, Gerardo Velázquez-Carrillo, César Maldonado-Mercado
Year Published: Apr. 2016 | 34-39 | IJNCAA | Vol. 6 No. 2 -
SERVICE COMPOSITION MECHANISMS IN THE MULTI-CLOUD ENVIRONMENTS: A SURVEY
Cloud computing is a serious technological creation in the area of information systems development that supplies the benefits of self-service applications, source mixing, and wide network access. ...Authors: Saied Asghari, Nima Jafari Navimipour
Year Published: Apr. 2016 | 40-48 | IJNCAA | Vol. 6 No. 2 -
CAUSALITY ISSUES IN ORIENTATION CONTROL OF AN UNDER-ACTUATED DRILL MACHINE
Modelling for Orientation control of a Drill Machine belonging to a class of under actuated system is presented by duly catering for nan-causality of the system. A single pair of electromagnetic ...Authors: Atif Ali, Mohammad Bilal Malik
Year Published: Apr. 2016 | 49-56 | IJNCAA | Vol. 6 No. 2 -
NEW VEHICLE DIAGNOSTIC SYSTEM USING DATA COMBINE AND COMMUNICATION
This paper proposed a new vehicle diagnostic system which can combine and analyze C-CAN, B-CAN and analog signals and transfer their data and analyzing results to another mobile system by using LTE. ...Authors: YoungJin Go, ByongOk Jung, Buhm Lee, Kyoung-Min Kim
Year Published: Apr. 2016 | 57-64 | IJNCAA | Vol. 6 No. 2 -
INCONSISTENCY RESOLUTION IN THE VIRTUAL DATABASE ENVIRONMENT USING FUZZY LOGIC
Data integration from different data sources may result in data inconsistencies due to different representation of the same objects at the data source. Many researchers have tried to solve this ...Authors: Amr Abdelrahman, Ali El-Bastawissy, Mohamed Kholief
Year Published: Apr. 2016 | 65-72 | IJNCAA | Vol. 6 No. 2 -
DESIGN AND SIMULATION OF AN X-BAND SOLID STATE POWER AMPLIFIER
In this paper design and simulation of an X-band Power Amplifier (9.3-9.9 GHz) has been carried out. This kind of amplifiers are used in various types of radars like weather warning radars, vehicle ...Authors: Wahid Yaqoob Malik, Touseef Hayat and Muhammad Naveed
Year Published: May 2016 | 73-77 | IJNCAA | Vol. 6 No. 3 -
BLOOD BANK SMART PHONE APPLICATION FOR MANAGING AND ORGANIZING THE BLOOD DONATION
With the revolution of communications nowadays, people needs technologies developments in all domains, especially in health domains. This paper presented an application with a system designed to ...Authors: Abdulrahman Alkandari, Fatma Eisa Alkandari, Altaf Alshammari
Year Published: Jun. 2016 | 86-91 | IJNCAA | Vol. 6 No. 3 -
POTENTIALS AND CHALLENGES OF LIGHT FIDELITY BASED INDOOR COMMUNICATION SYSTEM
In this era of modern devices and high speed communication the issues of spectral overloading is increasing with time and becoming more serious. With the advancement in LED industry, light fidelity ...Authors: Farooq Aftab
Year Published: Oct. 2016 | 91-102 | IJNCAA | Vol. 6 No. 3 -
AN EASIER WAY TO UNDERSTAND THE UNDECIDABILITY OF HALTING PROBLEM OF TURING MACHINES
This paper provides us an easier way to understand the undecidability of the halting problem of Turing machines. Our way is easier because author moves forward by discussing some past concepts in an ...Authors: Muhammad Zeeshan, Saadia Anayat, Rabia, Nabila Rehman, Nayab Nasir
Year Published: Nov. 2016 | 103-113 | IJNCAA | Vol. 6 No. 3 -
CLUSTER SAMPLING FOR THE DEMAND SIDE MANAGEMENT OF POWER BIG DATA
In view of the DSM (Demand Side Management) under the big data environment, an improved FCM (Fuzzy C-Mean) clustering with Gauss data preprocessing is proposed, and the daily load curve of ...Authors: Yongxin Zhang, Hong Shen, Shitian Xu
Year Published: Nov. 2016 | 114-121 | IJNCAA | Vol. 6 No. 4 -
ADAPTABILITY TO PERIODIC VARIABLE DISTURBANCE USING PROBABILISTIC STATE-ACTION PAIR PREDICTION
When operating a robot in a real environment, its behavior is probabilistic because of slight transition of the robot’s state or error in the action taken at a given time. In this case, it is ...Authors: Masashi Sugimoto, Naoya Iwamoto, Robert W. Johnston, Keizo Kanazawa, Yukinori Misaki, Kentarou Kurashige
Year Published: Dec. 2016 | 122-131 | IJNCAA | Vol. 6 No. 4 -
DEVELOPMENT OF 3D VIDEO COMMUNICATION SYSTEM IN THE SYNCHRONIZED AR SPACE
In recent years, with the evolution of communication technology and video technology, development of three-dimensional video communication system attracts attention. However, existing systems have ...Authors: Ismaila Idris, Ogidiagba Jones Tobi, Victor O. Waziri, John K. Alhassan, Ojeniyi Joseph
Year Published: Dec. 2016 | 132-139 | IJNCAA | Vol. 6 No. 4 -
GPU-BASED OBJECT IDENTIFICATION IN LARGE-SCALE IMAGES FOR REAL-TIME RADAR SIGNAL ANALYSIS
As the computing power of processors is being drastically improved, the sizes of image data for various applications are also increasing. However, CCL cannot be easily implemented in a ...Authors: Isamu Shioya, Tomoya Yamamoto, Takahiro Suzuki
Year Published: 2016 | 140-149 | IJNCAA | Vol. 6 No. 4 -
DEVELOPMENT OF A CITY PLANNING SIMULATION SYSTEM USING LEAP MOTION IN THE AR SPACE
Some simulation systems of the city planning in VR space have been proposed. For example, there are landscape simulation system and sunshine simulation systems. However, the conventional simulation ...Authors: Naoki Hanakawa, Hiroyuki Tominaga
Year Published: 2016 | 150-155 | IJNCAA | Vol. 6 No. 4 -
Mobile Robot Localization Based on Multi-Sensor Model for Assistance to Displacement of People with Reduce Mobility
This paper deals multi-sensor data fusion problems for mobile robot localization. In this context, we have proposed a Kalman Particle Kernel Filter (KPKF), which is based on a hybrid Bayesian filter, ...Authors: Wassila Meddeber, Youcef Touati, Arab Ali-Cherif
Year Published: Mar. 2017 | 14-17 | IJNCAA | Vol. 7 No. 1 -
A 3-Dimensional Object Recognition Method Using SHOT and Relationship of Distances and Angles in Feature Points
In recent years, a human support robot has been receiving attention. This robot is required to perform various tasks to support humans. Especially the object recognition task, which is important when ...Authors: Hiroyuki Kudo, Kazuo Ikeshiro, Hiroki Imamura
Year Published: Sep. 2017 | 149-155 | IJNCAA | Vol. 7 No. 4 -
Examining Stock Price Movements on Prague Stock Exchange Using Text Classification
The goal of the article was to examine the relationship between the content of text documents published on the Internet and the direction of movement of stock prices on the Prague Stock Exchange. ...Authors: Jonás Petrovský, Pavel Netolický, Frantisek Darena
Year Published: Mar. 2017 | 8-13 | IJNCAA | Vol. 7 No. 1 -
Reviewing and Analyzing Efficient GCD/LCM Algorithms for Cryptographic Design
In this paper, we provide a practical review with numerical example and complexity analysis for greatest common divisor (GCD) and Least Common Multiple (LCM) algorithms that are commonly used in the ...Authors: Ibrahim Marouf, Mohamad Musab Asad, Qasem Abu Al-Haija
Year Published: Mar. 2017 | 1-7 | IJNCAA | Vol. 7 No. 1 -
Dimensionality Reduction for State-action Pair Prediction based on Tendency of State and Action
This study investigates the effectiveness of reduction of training sets and kernel space for action decision using future prediction. For future prediction in a real environment, it is necessary to ...Authors: Masashi Sugimoto, Naoya Iwamoto, Robert W. Johnston, Keizo Kanazawa, Yukinori Misaki, Hiroyuki Inoue,Manabu Kato, Hitoshi Sori, Shiro Urushihara, Kazunori Hosotani,Hitoshi Yoshimura, Kentarou Kurashige
Year Published: Jan. 2017 | 18-28 | IJNCAA | Vol. 7 No. 1 -
Application of Continuous Genetic Algorithms for Optimization of Logistic Networks Governed by Order-Up-To Inventory Policy
The paper addresses the optimization problem of goods distribution process in logistic networks. The controlled nodes in the considered class of networks form a mesh structure. The stock level at ...Authors: Przemysław Ignaciuk, Łukasz Wieczorek
Year Published: Jun. 2017 | 29-36 | IJNCAA | Vol. 7 No. 1 -
Speeding Up Canny Edge Detection Using Shared Memory Processing
Image processing is a computational operation that requires many CPU cycles for simple image transformation. It takes every pixel of an image to perform a transformation to a new image. The image can ...Authors: Soha S. Zaghloul, Njood S. Alassmi
Year Published: Sep. 2017 | 68-76 | IJNCAA | Vol. 7 No. 3 -
Drone Route Planning for Military Image Acquisition Using Parallel Simulated Annealing
Recently, drones became one of the most interesting technologies used in diverse applications. One of the major challenges associated with them is to set a short route plan in the minimum period of ...Authors: Soha S. Zaghloul, Eman Alsafi
Year Published: Sep. 2017 | 77-88 | IJNCAA | Vol. 7 No. 3 -
Learning Experiences Using Neural Networks and Support Vector Machine (SVM)
This article is part of the global data mining framework, it addresses the theme of learning and classification, to identify the classes to which objects belong from using some descriptive ...Authors: Soumya ARACH, Halima BOUDEN
Year Published: Jun. 2017 | 37-44 | IJNCAA | Vol. 7 No. 2 -
Data Model Integration
There has been significant recent interest in data integration and querying heterogeneous data sources. Thus, in our work, we aim to develop a system for querying databases regardless of the nature ...Authors: Hassana NASSIRI, Mustapha MACHKOUR, Mohamed HACHIMI
Year Published: Jun. 2017 | 45-49 | IJNCAA | Vol. 7 No. 2 -
Querying XML and Relational Data
There has been a growing need for querying heterogeneous data sources, namely XML and Relational databases. Since the relational model is the most data model used to manage data for years. Similarly, ...Authors: Hassana NASSIRI, Mustapha MACHKOUR, Mohamed HACHIMI
Year Published: Jun. 2017 | 50-55 | IJNCAA | Vol. 7 No. 2 -
Introduction to Sociology of Online Social Networks in Morocco. Data Acquisition Process: Results and Connectivity Analysis
The aim of this paper is to study the Moroccan active community behavior on online social networks, firstly the choice of Facebook as OSN is justified by the statistics that ranks it in the first ...Authors: Yassine EL Moudene, Jaafar Idrais and Abderrahim Sabour
Year Published: Jun. 2017 | 56-61 | IJNCAA | Vol. 7 No. 2 -
Text Classification Using Time Windows Applied to Stock Exchange
Each day, a lot of text data is generated. This data comes from various sources and may contain valuable information. In this article, we use text classification to discover if there is a connection ...Authors: Pavel Netolicky, Jonas Petrovsky, Frantisek Darena, Jan Zizka
Year Published: Jun. 2017 | 62-67 | IJNCAA | Vol. 7 No. 2 -
A Bipolar Single Valued Neutrosophic Isolated Graphs: Revisited
In this research paper, the graph of the bipolar single-valued neutrosophic set model (BSVNS) is proposed. The graphs of single valued neutrosophic set models is generalized by this graph. For the ...Authors: Said Broumi, Assia Bakali, Mohamed Talea, Florentin Smarandache, Mohsin Khan
Year Published: Sep. 2017 | 89-94 | IJNCAA | Vol. 7 No. 3 -
Development of an Algorithm based on Conservation of Energy and on a Hierarchical Routing Protocol
Wireless Sensor Networks are a rising innovation for attraction of scientist researchers with its examination challenges and different application areas. It consists of smart sensor nodes with ...Authors: Hajar Lagraini, Abdelmoumen Tabyaoui, Mostafa Chhiba, Ahmed Mouhsen
Year Published: Sep. 2017 | 95-101 | IJNCAA | Vol. 7 No. 3 -
Hybrid Design Space Exploration Methodology for Application Specific System Design
During the application specific system design process, the designer has to take early decisions for selecting the optimal system components from the available huge design alternatives. To obtain the ...Authors: K. Balasubadra, A.P.Shanthi and V. Prasanna Srinivasan
Year Published: Sep. 2017 | 102-111 | IJNCAA | Vol. 7 No. 3 -
An Object Detection Method Using Invariant Feature Based on Local Hue Histogram in Divided Areas of an Object
In recent years, the decreasing birthrate and aging population are developing, and there is concern about the lack of labor power such as household chores and nursing care at home. Therefore, ...Authors: Tomohiro Kanda, Kazuo Ikeshiro, Hiroki Imamura
Year Published: Dec. 2017 | 112-122 | IJNCAA | Vol. 7 No. 4 -
Epidemiological Simulation Of A Nonlinear Computer Network Laboratories Using Kermack-Mckendrick Model
Computer viruses, malware, worms, spyware, and the like have shown a significant impact in the digital world today. It has shown its power to destroy computer systems and hardware and most of the ...Authors: Las Johansen B. Caluza
Year Published: Dec. 2017 | 123-129 | IJNCAA | Vol. 7 No. 4 -
Temperature and Humidity Management of the Storage Houses of Food Using Data Logger
Because of commercial fraud, and high and low temperature and humidity in the environment that lead to food spoilage and this may affect the health of the consumer. People need an efficient way to ...Authors: Abdulrahman Alkandari, Nayfah Mohsen Almutairi, Altaf Mishaal Alshammari
Year Published: Dec. 2017 | 130-139 | IJNCAA | Vol. 7 No. 4 -
Smart Taxi Navigation System Using IOS Application Case Study: Kuwait City
Developers around the world always seek to contribute to make life seem easier using technology and communications. Therefore, the technology has become involved in almost all matters of the life, ...Authors: Abdulrahman Alkandari, Nayfah Mohsen Almutairi, Samer Moein
Year Published: Dec. 2017 | 140-148 | IJNCAA | Vol. 7 No. 4 -
Acceleration of Canny Edge Detection Algorithm Using Parallel Clusters
Image processing is a computational operation that requires many CPU cycles for simple image transformation. It takes every pixel of an image to perform a transformation to a new image. The image can ...Authors: Njood S. AlAssmi, Soha S. Zaghloul
Year Published: Mar. 2018 | 1-10 | IJNCAA | Vol. 8 No. 1 -
Measuring the Performance of Data Placement Structures for MapReduce-based Data Warehousing Systems
The exponential growth of data requires systems that are able to provide a scalable and fault-tolerant infrastructure for storage and processing of vast amount of data efficiently. Hive is a ...Authors: S. Kami Makki, M. Rakibul Hasan
Year Published: Mar. 2018 | 11-20 | IJNCAA | Vol. 8 No. 1 -
Comparison of Parallel Simulated Annealing on SMP and Parallel Clusters for Planning a Drone’s Route for Military Image Acquisition
Drones are vastly used in many civil and military applications. However, there are many factors to be highly considered in military applications. Such factors should ensure the sensitivity and the ...Authors: Eman Alsafi, Soha S. Zaghloul
Year Published: Mar. 2018 | 21-32 | IJNCAA | Vol. 8 No. 1 -
A Finger-Mounted Haptic Device with Plane Interface
Recently, several researches of haptic devices have been conducted. Haptic devices provide users with sense of touching virtual objects such as Computer Graphics (CG) by force feedback. Since they ...Authors: Makoto Yoda, Hiroki Imamura
Year Published: Mar. 2018 | 33-40 | IJNCAA | Vol. 8 No. 1 -
A 3-Dimensional Object Recognition Method Using Relationships between Feature Points, and Invariance of Local Hue Histogram
In recent years, there is concern about the lack of labor power such as household chores and nursing care at home due to advancement of the declining birthrate and an aging population. Accordingly, ...Authors: Tomohiro Kanda, Kazuo Ikeshiro and Hiroki Imamura
Year Published: Mar. 2018 | 41-52 | IJNCAA | Vol. 8 No. 1 -
A Study for Dynamically Adjustmentation for Exploitation Rate using Evaluation of Task Achievement
Until now, in reinforcement learning, a ratio of a random action as known as exploration often has not been adjusted dynamically. However, this ratio will be an index of performance in the ...Authors: Masashi SUGIMOTO
Year Published: Jun. 2018 | 53-60 | IJNCAA | Vol. 8 No. 2 -
Control of a Powerpoint Presentation Using Eye Movements
The purpose of this paper is to present a system capable of helping a person to control the slide shows during his/her presentation without the use of his/her hands. In fact, a particular movement ...Authors: Roy Abi Zeid Daou, Elie Geagea, Miguel Sfeir, Ali Hayek, Josef Borcsok
Year Published: Jun. 2018 | 61-64 | IJNCAA | Vol. 8 No. 2 -
Diversifying Search Result Leveraging Aspect-based Query Expansion
Web search queries are short, ambiguous and tend to have multiple underlying interpretations. To reformulate such queries, query expansion is aprominent method that leads to retrieve a set of ...Authors: Md Shajalal, Masaki Aono, Muhammad Anwarul Azim
Year Published: Jun. 2018 | 65-77 | IJNCAA | Vol. 8 No. 2 -
Interactive Face Robot
Abstract- The interaction between humans and robots has increased and become more personalized in this century. Robots are being used in various fields such as medicine, manufacturing, automation, ...Authors: Michel J. Owayjan, Fady C. Elias-Sleiman, Hasan A. Ezzidine, and Nourhane H. Haidar
Year Published: Jun. 2018 | 78-82 | IJNCAA | Vol. 8 No. 2 -
Power Efficient Gurumukhi Unicode Reader Design and Implementation on FPGA
Abstract—Gurumukhi is found to be the most widely used language of Pakistan, and it is ranked 3rd in Canada, 7th in India and almost 4th most spoken language in U.K. This Unicode Reader is cost ...Authors: D M Akbar Hussain, Amanpreet Kaur, Sunny Singh, Bishwajeet Pandey, Nisha Pandey
Year Published: Jun. 2018 | 83-88 | IJNCAA | Vol. 8 No. 2 -
An Experimental Platform for QoE Studies of WebRTC-based Multi-Party Video Communication
Web Real-Time Communication (WebRTC) enables easy to use, no installation, in browser applications such as Google hangout and appear.in. To increase the understanding of the Quality of Experience ...Authors: Doreid Ammar, Katrien De Moor, Poul Heegaard
Year Published: Jun. 2018 | 89-94 | IJNCAA | Vol. 8 No. 2 -
Evaluation of Mobile Application Prototype in Context of Design Against Human and Computer Interaction
Application design is part of a process to produce a prototype or multimedia product by integrating several multimedia elements, including text, graphics, audio, video and animation. In the process, ...Authors: Mat Redhuan Samsudin, Tan Tse Guan, Anuar Mohd Yusof
Year Published: Jun. 2018 | 95-101 | IJNCAA | Vol. 8 No. 2 -
Solving Equations Systems Using Artificial Intelligence - a Survey
Even if solving equations systems is a very old and discussed problem in Algebra, this issue continues to be of great interest to both mathematicians and computer scientists, the proof being the ...Authors: Liviu Mafteiu-Scai, Emanuela Mafteiu, Roxana Mafteiu-Scai
Year Published: Sep. 2018 | 102-118 | IJNCAA | Vol. 8 No. 3 -
Content Based Image Retrieval using Multimodal Data based on CCA
The development of CBIR is based on Multimodal analysis, especially for a set of images associated with some text. Multimodality is used in multimedia to improve data retrieval from the multimedia ...Authors: Ismail A. El Sayad, Mohammad A. Bazzoun, Hawraa I. Younes, Laila M. Ghoteime, Samih Abdulnabi
Year Published: Sep. 2018 | 119-124 | IJNCAA | Vol. 8 No. 3 -
A New Visual Vocabulary for Object Recognition
Images can be represented at different levels, many approaches in the domain of image representation were developed to move from low-level to high-level image representation like Collocation patterns ...Authors: Ismail A. El Sayad, Mohammad A. Bazzoun, Ola S. Shamieh, Samah B. El-Kashoua, Samih Abdulnabi
Year Published: Sep. 2018 | 125-128 | IJNCAA | Vol. 8 No. 3 -
An Enhanced Algorithm for Cloud Scheduling with Setup Cost
The study aimed at investigating the problem of online task scheduling of identifying job of MapReduce on cloud computing infrastructures. It was proposed that the virtualized cloud computing setup ...Authors: Redwan Al-Dilami, Adnan Zain Al-Saqqaf, Ammar Thabit Zahary
Year Published: Sep. 2018 | 129-141 | IJNCAA | Vol. 8 No. 3 -
Proportional Weighted Round Robin: A Proportional Share CPU Scheduler in Time Sharing Systems
In time sharing systems, many processes reside in the ready queue and compete for execution by the processor. Therefore, scheduling these processes on CPU as it can run only one process at a time is ...Authors: Samih M. Mostafa
Year Published: Sep. 2018 | 142-147 | IJNCAA | Vol. 8 No. 3 -
Comparison of Parallel Simulated Annealing on SMP and Parallel Clusters for Planning a Drone’sRoute for Military Image Acquisition
Drones are vastly used in many civil and military applications. However, there are many factors to be highly considered in military applications.. In order to send a military drone with the aim of ...Authors: Eman Alsafi, Soha S. Zaghloul
Year Published: Sep. 2018 | 148-159 | IJNCAA | Vol. 8 No. 3 -
A Comprehensive Survey of Security Related Challenges in Internet of Things
The IoT network is a decentralized type of network which can sense information and transmit the information to a base station. Due to small size of the sensor nodes, energy consumption and securityis ...Authors: E. Ezema, A.Abdullah, NFM Sani
Year Published: Sep. 2018 | 160-167 | IJNCAA | Vol. 8 No. 3 -
Parallel k means Clustering Algorithm on SMP
The 𝑘-means clustering algorithm is one of the popular and simplest clustering algorithms. Due to its simplicity, it is widely used in many applications. Although 𝑘-means has low computational ...Authors: Athari M. Alrajhi, Soha S. Zaghloul
Year Published: Dec. 2018 | 168-178 | IJNCAA | Vol. 8 No. 4 -
Circuit Analyses and Considerations on Advanced Inverters Constructed by Minimum Circuit Components - Pursuit for concise PCS of photovoltaicic power generations
Photovoltaic power generations (PVG) have been used generally and applied widely. Various power conditioning systems-PCS used in PVG have been also working on by many researchers. In addition to ...Authors: Keiju Matsui, Eiji Oishi, Mikio Yasubayashi, Yuuichi Hirate, Sudip Adhikari, Masaru Hasegawa
Year Published: Dec. 2018 | 179-185 | IJNCAA | Vol. 8 No. 4 -
A Study for Development of Autonomous Paddy-weeding Robot System –An experimentation for autonomously straight-running based on compass-compensation
In the agricultural field of Japan, there is two is-sues are facing; population aging and labor short-age are progressing, rapidly. In order to solve these problems, it is indispensable to create a ...Authors: Masashi SUGIMOTO, Yasuhiro INOKI, Tomoki SHIRAKAWA, Kanta TAKEUCHI, Daiki YOSHIOKA, Haruki FUKITA, Toshiyuki YAMAJI, Mio ENDO, Patchara NAMEEYA, Hiroyuki INOUE, Manabu KATO, Shiro URUSHIHARA, Kazunori HOSOTANI, Hitoshi SORI
Year Published: Dec. 2018 | 186-197 | IJNCAA | Vol. 8 No. 4 -
Variation Effect of Silicon Film Thickness on Electrical Properties of NANOMOSFET
Owing to the fact that metal oxide semiconductor field effect transistors (MOSFETs) can be effortlessly assimilated into ICs, they have become the heart of the growing semiconductor industry. The ...Authors: A Tijjani, G.S.M. Galadanci, G. Babaji and S.M. Gana
Year Published: Dec. 2018 | 198-205 | IJNCAA | Vol. 8 No. 4 -
Forecasting of Traffic Load for 3G Networks Using Conventional Technique
The degrading performance of network coverage, resource allocation, and utilization is due to the rapidly increasing number of cellular subscribers, which is immensely difficult to predict the ...Authors: G.S.M. Galadanci, S.B. Abdullahi, Z.A. Bature
Year Published: Dec. 2018 | 206-213 | IJNCAA | Vol. 8 No. 4 -
Forecasting of HOSR for Different Mobile Carriers in Kano Using Conventional and Intelligent Techniques
Handover is the key concept to achieve mobility and its success rate determine the subscriber satisfaction. It is a critical process and if performed incorrectly can result in the loss of calls. ...Authors: S. B. Abdullahi, M. S. Gaya
Year Published: Mar. 2019 | 1-10 | IJNCAA | Vol. 9 No. 1 -
Further Development of Boost Chopper for Power Conditioners - Pursuit of ideal PCS for photovoltaic power generations -
Under an environment of praise for renewable energy, photovoltaic power generations (PVG) have been applied generally and spread broadly. Various power conditioning systems (PCS) used in those have ...Authors: Keiju Matsui, Eiji Oishi, Masayoshi Umeno, Mikio Yasubayashi, Yuuichi Hirate, Sudip Adhikari, Masaru Hasegawa
Year Published: 2019 | 11-18 | IJNCAA | Vol. 9 No. 1 -
A REVIEW ON SPIDER ROBOTIC SYSTEM
The spider robot is a device used in monitoring surroundings wirelessly. This review work will assist in solving the weak adaptive ability of ordinary existing robots. The spider robots function ...Authors: Mehmet Cavas, Muhammad Baballe Ahmad
Year Published: 2019 | 19-24 | IJNCAA | Vol. 9 No. 1 -
Automatic Identification of Plant Physiological Disorders in Plant Factories with Artificial Light Using Convolutional Neural Networks
Plant factories with artificial light (PFAL) are attracting worldwide attention as a technology for stably producing crops. One of the problems of PFAL is tipburn which is a physiological disorder of ...Authors: Shigeharu Shimamura, Kenta Uehara, Seiichi Koakutsu
Year Published: 2019 | 25-30 | IJNCAA | Vol. 9 No. 1 -
An Experimental Study for Exploration-oriented Behavior in Maze-solving using Reinforcement Learning based on Communication Protocol
In this study, the reinforcement learning agent under the situation of communicable as multi-agent system will be improved efficiency. In reinforcement learning, this method will be supposed that ...Authors: Masashi SUGIMOTO, Shunsuke INADA, Haruka MATSUFUJI, Shiro URUSHIHARA, Kazunori HOSOTANI, Manabu KATO, Hitoshi SORI, Shinji TSUZUKI, Hiroyuki INOUE
Year Published: 2019 | 31-37 | IJNCAA | Vol. 9 No. 2 -
A REVIEW ADVANCEMENT OF SECURITY ALARM SYSTEM USING INTERNET OF THINGS (IoT)
The objective of today’s pervasive computing is implanting a wireless and computational transmission unit into every physical item that individuals need to intermingle with starting from house ...Authors: Mehmet Cavas, Muhammad Baballe Ahmad
Year Published: 2019 | 38-49 | IJNCAA | Vol. 9 No. 2 -
The Various Types of sensors used in the Security Alarm system
The most basic definition of any security system is generated from its name; it is literally a means or method by which something is secured through a system of inter working components and devices. ...Authors: Muhammad Baballe Ahmad, Abdullahi Abba Abdullahi, Abubakar Sadiq Muhammad, Yusuf Bello Saleh, Usman Bukar Usman
Year Published: 2019 | 50-59 | IJNCAA | Vol. 9 No. 2 -
A Study for Improvement for Reinforcement Learning based on Knowledge Sharing Method — Adaptability to a situation of intermingled of complete and incomplete perception under an maze—
This study aims to improve maze-solving technique, efficiency by which to the reinforcement learning agent under the situation of using incomplete sensors. In Reinforcement Learning, this method will ...Authors: Masashi SUGIMOTO, Hiroya YASHIRO, Kazuma NISHIMURA, Shinji TSUZUKI, Kentarou KURASHIGE
Year Published: Jun. 2019 | 60-67 | IJNCAA | Vol. 9 No. 2 -
NEED FOR SECURITY ALARM SYSTEM INSTALLATION AND THEIR CHALLENGES FACED
The household automation and security system permit us to curb house devices such as our lights, fans, air conditions (AC), door, and so on. The household automation system does not only reduce ...Authors: Muhammad Baballe Ahmad, Abubakar Sadiq Muhammad, Abdullahi Abba Abdullahi, Abdulrazak Tijjani, Auwal Sani Iliyasu, Ibrahim Mahdi Muhammad, Isa Ibrahim, Sani Tijjani, Yusuf Idris, Ibrahim Kabiru Dahiru, Abubakar Abdullahi Umar, Jamilu Sulaiman, Aliyu Lawan Musa, Sani Abdullahi Mohammed, Shamsu Idris Abdullahi, Abdulkadir Habibu Kofar Naisa, Munzali Surajo, Sani Ahmad Muhammad, Bello Abubakar Imam, Shehu Hassan Ayagi, Khadija Mahmoud Sani
Year Published: Sep. 2019 | 68-76 | IJNCAA | Vol. 9 No. 3 -
A Study on Model-Based Development of Embedded System using Open Source Computational Environment
In recently, the technique of the model-based development has come to be used more widely on the site of the embedded system development. In the present study, we propose the technique for ...Authors: Kengo MASUMI, Shinji TSUZUKI, Masashi SUGIMOTO, Hitoshi YOSHIMURA
Year Published: Dec. 2019 | 77-82 | IJNCAA | Vol. 9 No. 4 -
A Study for Development of Route Prediction Method for Vessel using SVR
Nowadays, vessels such as cargo vessels, ferries, and fishing boats are constantly coming and going on all over the sea. On the other hands, unfortunately, collisions among vessels account for about ...Authors: Kotetsu KAWAKAMI, Jumpei MATSUE, Ryota ISOZAKI, Shunsuke INADA, Masashi SUGIMOTO, Shinji TSUZUKI, Kazuhiko NAGAO
Year Published: Mar. 2020 | 1-9 | IJNCAA | Vol. 10 No. 1 -
Hardware-based scheduling and synchronization for light-weight, fine-grained multi-threading
Fine-grained, light-weight multi-threading enhances the performance and scalability of many applications due to its ability to hide memory and network latency and enhance load balance, however, it ...Authors: Samer Haddad, Jeanine Cook
Year Published: Mar. 2020 | 10-22 | IJNCAA | Vol. 10 No. 1 -
Network Traffic Classification Using Ensemble Learning with Time Related Features
Network traffic classification has become important with the rapid growth of the Internet and online applications. Though, there were researches that applied different machine learning algorithms for ...Authors: Muhammad Anwarul Azim, Tanvir and Mohammad Khairul Islam
Year Published: 2020 | 23-31 | IJNCAA | Vol. 10 No. 2 -
An Experimental Study for Tracking Ability of Deep Q-Network
Reinforcement Learning (RL) had been attracting attention for a long time that because it can be easily applied to real robots. On the other hand, in Q-Learning, since the Q-table is updated, a large ...Authors: Masashi SUGIMOTO, Ryunosuke UCHIDA, Kentarou KURASHIGE, Shinji TSUZUKI
Year Published: 2020 | 32-38 | IJNCAA | Vol. 10 No. 3 -
Improved Certificate Creation and Verification Architecture Using Hybrid Blockchain
Certificates containing proof of certain aspects of an entity are mostly given as printed papers by government institutes and their supporting organizations in some countries. The verification of ...Authors: Muhammad Anwarul Azim, Md. Jawwad Bin Zahir
Year Published: Dec. 2020 | 39-48 | IJNCAA | Vol. 10 No. 4 -
Segmentation-free Bangladeshi License Plate Recognition Using YOLO with Heuristic Bounding Box Refinement
Automatic License Plate Recognition is the core of Intelligent Transportation System because of its diverse set of applications. There are some online APIs such as OpenALPR, Sighthound, etc. ...Authors: Mahmudul Hasan Bhuiyan, Muhammad Anwarul Azim, Mohammad Khairul Islam, Farah Jahan
Year Published: Mar. 2021 | 1-9 | IJNCAA | Vol. 11 No. 1 -
DESIGN AND SIMULATION OF CROSSED WALLS SECURITY DETECTION SYSTEM
The security detection system is exactly a method by which something is secure through a system of interworking components and devices. The rate of abduction and theft in the world is growing by the ...Authors: Muhammad Baballe Ahmad, Mukhtar Ibrahim Bello, Abubakar Sadiq Muhammad, Abubakar Bello Imam
Year Published: Mar. 2021 | 10-21 | IJNCAA | Vol. 11 No. 1 -
The need of using a Radio Frequency Identification (RFID) System
The Radio Frequency Identification (RFID), is a wireless technology system that is used for identifying an individual or objects through the means of radio waves which transfer information from an ...Authors: Muhammad Baballe Ahmad, Fatima Alkasim Nababa2
Year Published: Jun. 2021 | 22-29 | IJNCAA | Vol. 11 No. 2 -
Performance Analysis of LTE Technology in Unlicensed Spectrum for Mobile Communication
Long Term Evolution is the mobile technology that designed for high-speed internet connection. This was due to previous mobile technologies to provide low unsatisfactory data rate expectancy to the ...Authors: Kadoke Marco, Kilavo Hassan
Year Published: 2022 | 1-9 | IJNCAA | Vol. 12 No. 1