{"title":"Feature Selection Algorithm Used to Classify Faults in Turbine Bearings","authors":"M. Khalil, Joelle Al Hage, K. Khalil","doi":"10.12783/ijcsa.2015.0401.01","DOIUrl":"https://doi.org/10.12783/ijcsa.2015.0401.01","url":null,"abstract":"Feature Selection is a very important step that select a few number of feature used for the classification in order to reduce execution time, to improve accuracy and to enhance performance of the identification system. In this paper we propose new feature selection methods by combining between relief, mutual information and sequential selection. The new approach is compared with other existing and we demonstrate some improvement when they are applied to a random dataset and on real data acquired from wind turbine bearings aiming to detect fault in the turbine using vibration signal.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84992041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Further Considerations about Relationship between Framework and Application Components","authors":"Reishi Yokomori, Harvey P. Siy, Norihiro Yoshida, Masami Noro, Katsuro Inoue","doi":"10.12783/ijcsa.2015.0401.03","DOIUrl":"https://doi.org/10.12783/ijcsa.2015.0401.03","url":null,"abstract":"A large number of software applications are used over ten years, and are subjected to continuous maintenance activities to improve their operability, functionality, stability and so on. Through such maintenance activities, the internal structure of the software system becomes more complex. We believe that studying how the complexity has evolved is important for understanding the actual maintenance activities. In a previous experiment, we analyzed how code clones and use relations between application and framework components change through a longitudinal study of open source software. However, we performed our analysis over only one set of framework and application, so we would like to discuss how our findings generalize. In this paper, we replicate the previous experiment, targeting several open source projects. By comparing with the result of the past experiment, we will discuss about generalities of our findings. Moreover, we study the differences between the trends for both incoming and outgoing edges, how use relations increase and decrease through long term development, and how code clones are introduced in the software in the early period of the development. These analyses have a certain level of commonality for understanding actual developers' activities.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80396469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Auday H. Al-Wattar, R. Mahmod, Z. Zukarnain, N. Udzir
{"title":"Generating a new S-Box inspired by biological DNA","authors":"Auday H. Al-Wattar, R. Mahmod, Z. Zukarnain, N. Udzir","doi":"10.12783/IJCSA.2015.0401.04","DOIUrl":"https://doi.org/10.12783/IJCSA.2015.0401.04","url":null,"abstract":"Many scholars have attempted to use new methods inspired by DNA bio-techniques in the domains of cryptography and steganography. In this article, a new S-Box was designed inspired by biology DNA techniques to be used for SPN symmetric block ciphers. The new S-Box is used in order to make use of biological process as inspiration in creating the S-Box as simple and secure approach. This article uses the new S-Box within the AES (Advanced Encryption Standard) .The National Institute of Standard and Technology (NIST) tests have been used to test the cipher which uses this new S-Box. The results of the tests demonstrate that it effectively passed all the randomness tests of NIST. In addition, the S-Box testing criteria were conducted to test the security of the new S-Box; the results of these tests indicate that the new S-Box has good security.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84719382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novelty Approach on Forgery Digital Image Detection based Image Source Identification ANN","authors":"K. Kumar","doi":"10.5121/IJCSA.2015.5105","DOIUrl":"https://doi.org/10.5121/IJCSA.2015.5105","url":null,"abstract":"In imaging science, the photo editing software packages can alter the original images without any detecting traces of tampering. Hence, the image forgery detection technique plays an important role in verifying the integrity of digital image forensics for authentication. The techniques such as watermarking are used for authentication but it can be modified through third parties attack through extraction. Malicious and digital imaging (digital products) tamper detection is the subject of this article. In particular, we focus on a special type of digital forgery detection - copy attack campaign, in which part of the image is copied and pasted into the image and the cover features a large image of intentions another. In this paper, we investigate the dynamic forged copy detection problem, and describes a highly efficient and reliable detection method that based on image source ANN identification.. Even when the region is enhanced copy / retouching and background merger, and the method can successfully identify counterfeit forgery when images are saved in a lossy format (such as JPEG). The performance of the method's performance several forged images.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"9 1","pages":"51-60"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73921586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adil Mobarek, Siddig Abdelrhman, Areege Abdel-Mutal, S. Adam, Nawal Elbadri, T. M. Ahmed
{"title":"TRANSACTION PROCESSING, TECHNIQUES IN MOBILE DATABASE: An OVERVIEW","authors":"Adil Mobarek, Siddig Abdelrhman, Areege Abdel-Mutal, S. Adam, Nawal Elbadri, T. M. Ahmed","doi":"10.5121/IJCSA.2015.5101","DOIUrl":"https://doi.org/10.5121/IJCSA.2015.5101","url":null,"abstract":"The advancement in mobile technology and wireless network increase the using of mobile device in database driven application, these application require high reliability and availability due to nature inheritance of mobile environment, transaction is the center component in database systems, In this paper we present useful work done in mobile transaction, we show the mobile database environment and overview a lot of proposed model of mobile transaction and show many techniques used to enhance transaction execution.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"39 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80022129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Traffic Sign Board Classification System","authors":"Geetha Guttikonda, Chandra sekhar Potumeraka","doi":"10.5121/IJCSA.2015.5106","DOIUrl":"https://doi.org/10.5121/IJCSA.2015.5106","url":null,"abstract":"Automated Traffic sign board classification system is one of the key technologies of Intelligent Transportation Systems (ITS). Traffic Surveillance System is being more and important with improving urban scale and increasing number of vehicles. This Paper presents an intelligent sign board classification method based on blob analysis in traffic surveillance. Processing is done by three main steps: moving object segmentation, blob analysis, and classifying. A Sign board is modelled as a rectangular patch and classified via blob analysis. By processing the blob of sign boards, the meaningful features are extracted. Tracking moving targets is achieved by comparing the extracted features with training data. After classifying the sign boards the system will intimate to user in the form of alarms, sound waves. The experimental results show that the proposed system can provide real-time and useful information for traffic surveillance.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"36 1","pages":"61-69"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82207549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SURVEY : EARLY DETECTION OF ALZHEIMER 'S DISEASE USING DIFFERENT TECHNIQUES","authors":"S. Mareeswari, G. Jiji","doi":"10.5121/IJCSA.2015.5103","DOIUrl":"https://doi.org/10.5121/IJCSA.2015.5103","url":null,"abstract":"Alzheimer’s disease(AD) is a neurological disease. It affects memory. The livelihood of the people that are diagnosed with AD. In this paper, we have discussed various imaging modalities, feature selection and extraction, segmentation and classification techniques.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"14 1","pages":"27-37"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76445355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOTION DETECTION APPLIED TO MICROTECTONICS MODELLING","authors":"M. A. J. Guerra, Vania V. Estrela","doi":"10.5121/IJCSA.2014.4604","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4604","url":null,"abstract":"The foremost by-product of this paper is the automation of geological undertakings, for instance, dealing with exceptionally thin sections of rocks that were subjected to deformation alongside finite steps of time which can be recorded in video for later analysis using image processing and numerical analysis procedures. Markers are used in order to trace gradients of deformation over a sample and study other mechanical properties. Image processing and video sequence analysis can be a very powerful investigation tool and this paper shows preliminary results from its use on microtectonics. The proposed algorithm is a combination of two well-known approaches: feature extraction and block matching.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"4 1","pages":"47-56"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81381506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Yakubu, A. Chukwu, Bamiduro Timothy Adebayo, Amahia Godwin Nwanzo
{"title":"Effects of missing observations on predictive capability of central composite designs","authors":"Y. Yakubu, A. Chukwu, Bamiduro Timothy Adebayo, Amahia Godwin Nwanzo","doi":"10.5121/ijcsa.2014.4601","DOIUrl":"https://doi.org/10.5121/ijcsa.2014.4601","url":null,"abstract":"Quite often in experimental work, many situations arise where some observations are lost or become unavailable due to some accidents or cost constraints. When there are missing observations, some desirable design properties like orthogonality, rotatability and optimality can be adversely affected. Some attention has been given, in literature, to investigating the prediction capability of response surface designs; however, little or no effort has been devoted to investigating same for such designs when some observations are missing. This work therefore investigates the impact of a single missing observation of the various design points: factorial, axial and center points, on the estimation and predictive capability of Central Composite Designs (CCDs). It was observed that for each of the designs considered, precision of model parameter estimates and the design prediction properties were adversely affected by the missing observations and that the largest loss in precision of parameters corresponds to a missing factorial point.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"8 1","pages":"1-18"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91047384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DATA ANALYSIS BY USING MACHINE LEARNING ALGORITHM ON CONTROLLER FOR ESTIMATING EMOTIONS","authors":"Tanu Sharma, Bhanu Kapoor","doi":"10.5121/IJCSA.2014.4602","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4602","url":null,"abstract":"Emotions are an unstoppable and uncontrollable aspect of mental state of human. Some bad situations give stress and leads to different sufferings. One can’t avoid situation but can have awareness when body feel stress or any other emotion. It becomes easy for doctors whose patient is not in condition to speak. In that case person’s physiological parameters are measured to decide emotional status. While experiencing different emotion, there are also physiological changes taking place in the human body, like variations in the heart rate (ECG/HRV), skin conductance (GSR), breathing rate(BR), blood volume pulse(BVP),brain waves (EEG), temperature and muscle tension. These were some of the metrics to sense emotive coefficient. This research paper objective is to design and develop a portable, cost effective and low power embedded system that can predict different emotions by using Naive Bayes classifiers which are based on probability models that incorporate class conditional independence assumptions. Inputs to this system are various physiological signals and are extracted by using different sensors. Portable microcontroller used in this embedded system is MSP430F2013 to automatically monitor the level of stress in computer. This paper reports on the hardware and software instrumentation development and signal processing approach used to detect the stress level of a subject.To check the device's performance, few experiments were done in which 20 adults (ten women and ten men) who completed different tests requiring a certain degree of effort, such as showing facing intense interviews in office.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"19-31"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84561993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}