Imeh J. Umoren, D. Asuquo, Onukwugha Gilean, Mfon Esang
{"title":"Performability of Retransmission of Loss Packets in Wireless Sensor Networks","authors":"Imeh J. Umoren, D. Asuquo, Onukwugha Gilean, Mfon Esang","doi":"10.5539/CIS.V12N2P71","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P71","url":null,"abstract":"Latest progress in wireless communication technology has enabled the development of low-cost sensor networks with major concern on quality of service (QoS) provisioning. Wireless sensor networks (WSNs) can be adopted in various application domains but each use is likely to pose peculiar technical issues. Basically, we demonstrate that congestion, packet loss and delay have strong influence on the performance of WSNs. In order to implement a realistic sensor network policy to resolve the problem of data delay and avoidance of collisions that lead to packet losses, we develop a system that guarantees QoS in WSNs using Fuzzy Logic Controller (FLC) for sensitivity analysis of the effect of adaptive forward error correction (AFEC). The AFEC approach improves the throughput by dynamically tuning FEC subject to the nature of wireless channel loss thereby optimizing throughput, sensor power utilization, while minimizing traffic retransmission, bit error rate (BER), and energy consumption. Basically, parameters such as packet delivery ratio, packet loss, delay, error rate, and throughput are appraised. The system has a spread procedure which is able to schedule the transmission of the nodes in order to have a data flow that converges from the furthest nodes toward the fusion centre. The key benefit of the scenario showed that, after extensive simulation using realistic field data, the procedure permits a practical approach to obtaining optimal solution to loss packets retransmission problem in WSNs giving a strong improvement on QoS provisioning.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"7 1","pages":"71-86"},"PeriodicalIF":0.0,"publicationDate":"2019-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91349232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Packaging: A Pattern Based Approach Towards Service Delivery","authors":"M. A. Talib, M. N. Talib, Madiha Akhtar","doi":"10.5539/cis.v12n2p14","DOIUrl":"https://doi.org/10.5539/cis.v12n2p14","url":null,"abstract":"Authentication, authorization, billing and monitoring are all common service delivery functions that are generally required to be added on to core business services in order for them to be delivered online commercially. Extending core services with these service delivery functions requires considerable effort if implemented ground-up and can be subject to limitations if outsourced to a service broker or a conventional middleware platform. Because of the ubiquitous nature of these service delivery functions, we see them as reusable patterns for service delivery. In this paper we have introduce an approach to implementing and applying these patterns in business to consumer e-commerce. We name the approach Service Packaging. Through the approach, generic implementations (or service packages) of the various service delivery patterns can be incrementally applied to core services, thus enabling flexible and systematic service delivery. A core service, regardless of its business domain does not require any structural or behavioral modifications in order to conform to a specific service delivery requirement and hence can be used out of the box. We also present a prototype middleware platform for the design-time modeling and implementation of service packages as well as their runtime execution.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"1 1","pages":"14-34"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90250371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Web Credibility Evaluation Tool Using PROMETHEE Method","authors":"Mona Alghamdi, Khalid Alomar","doi":"10.5539/cis.v12n2p46","DOIUrl":"https://doi.org/10.5539/cis.v12n2p46","url":null,"abstract":"In recent years, the Internet has become an indispensable way for users to find information which is almost instantaneously available. However, the presence of information on different websites makes the user needs to pre-check the credibility of the selected websites. Most users find it difficult to assess website credibility in terms of its particular characteristics or factors. Accordingly, we proposed an automated evaluation tool which considers various factors to assess the credibility of different websites and rank them from the highest credibility score to the lowest in order to allow the user to select the most credible website. We used the Preference Ranking Organization Method for Enrichment Evaluations (PROMOTHEE). The latter is one of the Multi-Criteria Decision Making methods (MCDM). It combines pairwise comparison and outranking methods in order to give more accurate and superior credibility scores due to its enrichment evaluations. For the proposed tool to be acceptable, we carried out a correlation analysis to determine the coefficient of correlation between human judges and the proposed tool. We found the coefficient of correlation rho is 0.943 which indicates that there is a strong correlation between the human judges’ ranking and the ranking given by the proposed website evaluation tool.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"61 8","pages":"46-57"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91473335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Multi-User k-Means Clustering Based on Encrypted IoT Data","authors":"Yanling Li, Chuansheng Wang, Qi Wang, Jieling Dai, Yushan Zhao","doi":"10.5539/cis.v12n2p35","DOIUrl":"https://doi.org/10.5539/cis.v12n2p35","url":null,"abstract":"IoT technology collects information from a lot of clients, which may relate to personal privacy. To protect the privacy, the clients would like to encrypt the raw data with their own keys before uploading. However, to make use of the information, the data mining technology with cloud computing is used for the knowledge discovery. Hence, it is an emergent issue of how to effectively performing data mining algorithm on the encrypted data. In this paper, we present a k-means clustering scheme with multi-user based on the IoT data. Although, there are many privacy-preserving k-means clustering protocols, they rarely focus on the situation of encrypting with different public keys. Besides, the existing works are inefficient and impractical. The scheme we propose in this paper not only solves the problem of evaluation on the encrypted data under different public keys but also improves the efficiency of the algorithm. It is semantic security under the semi-honest model according to our theoretical analysis. At last, we evaluate the experiment based on a real dataset, and comparing with previous works, the result shows that our scheme is more efficient and practical.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"19 1","pages":"35-45"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75591323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Portrait Extraction Algorithm Based on Face Detection and Image Segmentation","authors":"Chongyi Yang, Wanyu Huang, Ruoqi Zhang, Rui Kong","doi":"10.5539/cis.v12n2p1","DOIUrl":"https://doi.org/10.5539/cis.v12n2p1","url":null,"abstract":"Aiming to solve a series of problems in photo collection over citizen’s license, this paper proposes Portrait Extraction Algorithm over our face based on facial detection technology and state-of-the-art image segmentation algorithm. Considering an input image where the foreground stands a man with unfixed size and its background is all sorts of complicated background, firstly we use Haar&Adaboost facial detection algorithm as a preprocessing method so as to divide the image into different sub-systems, and we get a fix-sized image of human face. Then we use GrabCut and closed-form algorithm to segment the preprocessed image and output an image which satisfies our requirements (i.e. the fixed size and fixed background). Up to now the GrabCut and closed-form algorithm has been realized, both of which have its own advantages and shortages.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"117 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79395057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Channel Digital Oscilloscope Implementation over Android Device","authors":"Chongyi Yang, Chanpin Chen, Zhenhao Wu, Jiashun Jiang, Sicheng Su, Xue Kang, Qingping Dou","doi":"10.5539/cis.v12n2p58","DOIUrl":"https://doi.org/10.5539/cis.v12n2p58","url":null,"abstract":"Signal monitoring and waveform analysis play a significant role in state-of-the-art signal processing and electronic measurement. Traditional oscilloscopes tend to be heavy and huge, which makes it impossible for outdoor signal measurement. In addition, most of those oscilloscopes can measure merely two signals simultaneously. This article proposes the design of multi-channel digital oscilloscope over common Android mobile device. In our system we use STM32 development board to implement up to eight input channels, data processing and wireless transmission. In addition, an Android application is designed for Wi-Fi data reception, respective waveform demonstration and derivation of each signal’s amplitude and frequency. In order to transmit up to eight digital signals simultaneously as fast as possible, we designed an algorithm where all signals’ data can be transmitted within a surprisingly small amount of wireless data. In our system test, wireless data transmission is implemented and each waveform can be recovered and demonstrated basically.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"17 1","pages":"58-70"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87090760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Maturity Model for Assessing IS Risk Management Activity Considering the Dependencies Between Its Elements","authors":"Mina Elmaallam, Hicham Bensaid, A. Kriouile","doi":"10.5539/cis.v12n1p98","DOIUrl":"https://doi.org/10.5539/cis.v12n1p98","url":null,"abstract":"The information systems (IS) are a key asset for organizations. Therefore, managing IS risks becomes more and more important especially within a world in perpetual change. Since IS risk management creates added-value, it must follow a process of continuous improvement orchestrated by a maturity model that figures out available pathways for a better improvement. The studied literature shows the lack of an IS risk management maturity model that considers all IS components and specificities of risk management activity. The present article shows first this lack in the section related to the comparative analysis of the existing models. Then, it proposes a maturity model to address this issue. The proposed model aims to assess the information system risk management activity while considering the dependencies between its elements.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"42 1","pages":"98-111"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77517887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review","authors":"A. Habboush","doi":"10.5539/cis.v12n1p82","DOIUrl":"https://doi.org/10.5539/cis.v12n1p82","url":null,"abstract":"Application of mobile ad hoc networks (MANETs) has gained significant popularity among researchers in the field of data communication networks. However, a MANET operating in a wireless environment imposes a number of challenges for the implementers so far as routing of packets across it is concerned. There is a wide range of research contributions are available in the literature wherein authors propose various solutions to overcome the problems and bottleneck related to routing in MANET. Especially soft computing techniques and Ant Colony Optimization (ACO) in particular has been significantly popular among the researchers to resolve MANET routing issues. This technique plays a vital role in route discovery in particular. In this paper, we have conducted a comprehensive review of this technique applied to routing in MANET with respect to various criteria. Hopefully this paper serves to a perfect document for researchers in this field.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"65 1","pages":"82-92"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78587355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Stage Image Restoration in High Noise and Blur Settings","authors":"S. Voronin","doi":"10.5539/cis.v12n1p72","DOIUrl":"https://doi.org/10.5539/cis.v12n1p72","url":null,"abstract":"We describe a simple approach useful for improving noisy, blurred images. Our approach is based on the use of a parallel block-based low rank factorization technique for projection based reduction of matrix dimensions and on a customized iteratively reweighted CG approach followed by the use of a Fourier Wiener filter. The regularization scheme with a transform basis offers variable residual penalty and increased per-iteration performance. The outlined approach is particularly aimed at high blur and noise settings.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"76 2 1","pages":"72-81"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89711085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applicability Analysis of Semi-Network Operating System","authors":"Yin Sheng Zhang","doi":"10.5539/cis.v12n1p93","DOIUrl":"https://doi.org/10.5539/cis.v12n1p93","url":null,"abstract":"Innovation of computing technology is either to improve the security and performance, or to improve the convenience of user operation of system, networking and device, but sometimes it’s hard to get a very good balance between the two, in particular, the traditional localized OS and computing devices are inherently incompatible in some respects with today's network environment, therefore, although many innovations help to improve the safety, autonomy and controllability of system and device, but they are still always lacking the trustworthiness of users, one of the reasons is that their performance is lower than user's expectation, but their operation become more complicated than before. \u0000 \u0000The semi-network operating system is designed according to user's actual experience, which not only utilizes the shared attributes of network to increase the flexibility of OS, but also utilizes the stability and user-autonomy attributes of local platform ensure the base functions of OS, in addition, it can greatly reduce the burden on user’s operation and maintenance of computing system, so which will be a trustworthy system architecture for users.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"60 1","pages":"93-97"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84471178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}