Accepted papers

 

  • Novel Logic Circuits Dynamic Parameters Analysis
    Nicolae Galupa, Ras al Khaimah, UAE
    ABSTRACT
    Combinational logic circuit timing analysis is an important issue that all designers need to address. The present paper presents a simple and compact analysis procedure. We follow the guidelines drawn by previous methods, but we shall define new time-dependent logic variables that help us improve their efficiency. By using the methodology suggested, we shall replace a very laborious technique (pure delay circuit + time constants method) with a simpler procedure that can pinpoint the specific conditions for a logic circuit’s anomalous behaviour within a few simple steps. Considering the logic function implemented the methodology presented will require analysis of only a limited number of situations/combinations to determine the presence of an anomalous behaviour. When anomalous behaviour is identified, the methodology provides a clear timing description.
  • Digital Interactive Storytelling Approaches : A Systematic Review
    Islam Sharaha1 and Amal AL Dweik2, 1Master of Informatics, Palestine and 2Palestine Polytechnic University (PPU), Palestine
    ABSTRACT
    Interactive Digital Storytelling (IDS) is concerned with the creation of a new media art form that allows real-time interaction with a developing narratives. IDS is important learning, training, testing and entertainment tool. This paper makes a systematic review that compares several approaches used in (IDs) in terms of user interaction type, degree of interaction importance, classification of approaches types, and comparing approaches in terms of some performance factors.
  • Security System for Data using Steganography and Cryptography (SSDSC)
    Ayman Wazwaz, Khalil Abu-haltam, Sawan Atawneh, Areej Idaes and Dalal Salem, Palestine Polytechnic University, Palestine
    ABSTRACT
    Security System for Data using Steganography and Cryptography is a system that will be used to send secured documents through the internet. The system will consist of two parts: software and hardware. some of software will loaded into microcontrollers in order to increase its complexity and security. The data will be encrypted using the AES algorithm with a key from the Raspberry PI and hiding it in image using LSB algorithm, so the data will be invisible. The image will be transmitted and received through the internet, the receivers will extract the hidden data from the image and decrypt it to have the original data with the image. Complicating the steps of hiding and encryption will reduce the possiblity of intrusin of secured documents, and will increase security without affecting the users' behavior in secured documents exchange.
  • Remote Network Laboratory to Support Multi-Level Network Practice
    Ninghan Zheng, Chengbin Quan, Xiaojun Wu, Shanshan Li and Yongqiang Chen, Tsinghua University, China
    ABSTRACT
    The Computer Network Laboratory of Computer Science department in Tsinghua University provides experimental environment for undergraduate computer network serial courses offered by CS Dept. In order to meet the demand of different elective students, we combed experimental teaching system of computer network serial courses, then designed and implemented a remote network laboratory supported multi-level network practice. We mainly deployed three series of experimental system: Virtual Network Experiment System based on commercial network equipment, Network Protocols Experiment System named NetRiver and IPv4/IPv6 Transition Technologies Experiment System based on 4over6 tunneling technology. With the help of our network laboratory, the following goals can be achieved: 1) Remote. Students can access experimental environment from classroom, dormitory and etc.; 2) Multi-level. Experimental contents include both network principle and commercial realization, include both classical sliding window protocol, IPv4 or IPv6 data transceiver protocol, IPv4 or IPv6 data forwarding protocol, routing protocol and up-to-date IPv4/IPv6 Transition Technologies. Every network course can construct experimental content by combination of them; 3) Up-to-date. We introduced the latest technology in the field of computer network research, such as IPv6 network protocol and 4over6 tunneling technologies.
  • Basic Evaluation of antennas used in microwave imaging for breast cancer detection
    Mazher B Tayel, Nouralhuda A. Hassan and Moustafa M Ahmed, Pharos University, Egypt
    ABSTRACT
    Microwave imaging is one of the most promising techniques in diagnosis and screening of breast cancer and in the medical field that currently under development.it is nonionizing (safe), noninvasive (comfortable), sensitive (to tumors), specific (to cancers), and low-cost.The microwave measurements can be carried out either in the frequency domain or in the time domain. In order to develop a clinically viable medical imaging system, it is important to understand the characteristics of the microwave antenna. In this paper we reviewed some antenna and discussion is done to find out the limitations of existing and proposed systems.
  • Explore The Effects of Emoticons on Twitter Sentiment Analysis
    Katarzyna Wegrzyn-Wolska, Lamine Bougueroua, Haichao Yu and Jing Zhong, Private University in Villejuif, France
    ABSTRACT
    In recent years, Twitter Sentiment Analysis (TSA) has become a hot research topic. The target of this task is to analyse the sentiment polarity of the tweets. There are a lot of machine learning methods specifically developed to solve TSA problems, such as fully supervised method, distantly supervised method and combined method of these two. Considering the specialty of tweets that a limitation of 140 characters, emoticons have important effects on TSA. In this paper, we compare three emoticon pre-processing methods: emotion deletion (emoDel), emoticons 2-valued translation (emo2label) and emoticon explanation (emo2explanation). Then, we propose a method based on emoticon-weight lexicon, and conduct experiments based on Naive Bayes classifier, to validate the crucial role emoticons play on guiding emotion tendency in a tweet. Experiments on real data sets demonstrate that emoticons are vital to TSA.
  • E-Learning : on The Uptake of Modern Technologies for online Education
    Nouzha Harratiy, Imed Bouchrikay and Zohra Mahfouf, University of Souk Ahras, Algeria
    ABSTRACT
    The use of online technology has become ubiquitous and integral part of our daily life from education to entertainment. Because of the ubiquity of e-learning and vital influence for engineering the educational process, it is no surprise that many research studies are conducted to explore different aspects covering the use of e-learning in higher education. The assessment and evaluation aspects are considered arguably the most influential part for measuring the success and effectiveness of e-learning experience. As more and more universities worldwide has opted to use online technology for their course delivery, research in elearning systems have attracted considerable interest in order to apprehend how effective and usable e-learning systems in terms of principles related to human computer interaction.
  • Survey of QNX: A Real-Time operating Systems in The Medical Field
    Jeanne Capaz, Alex Malos, Ruchita Stephens, and Sudip Chakraborty, Valdosta State University, United States of America
    ABSTRACT
    Since QNX Software Systems’ inception in the early 1980s, they have specialized in real-time operating systems (RTOS) existing in today’s medical, transportation, cell phone and automation industries. Businesses including Honeywell, GE Energy and Cisco have QNX at the foundation of their software solutions, and it's used in everything from wind turbines to home dialysis machines. One of QNX’s primary focuses is on providing software for therapeutic, diagnostic, and medical imaging devices. The recently enhanced QNX Neutrino® RTOS contains a software microkernel that is adaptable across a range of medical devices. This paper surveys QNX, investigate its structure and functionalities, and examine how it is applied in the medical field.
  • Exploring the dynamic integration of heterogeneous services
    Makaziwe Makamba, Jabu Mtsweni and Enerst Ketcha Ngassam, UNISA, South Africa
    ABSTRACT
    The proliferation of service enterprise environment has increased the development of heterogeneous services across the world. In today’s world, services are the key component of communication across the globe. Since Internet has stimulated the use of services, different services have been developed for different purposes. As the development of heterogeneous services is increasing, the challenges of integrating these heterogeneous services are enormous. Traditionally, integration is achieved by using gateways, which require considerable configuration effort. Many approaches and frameworks have been developed by different researchers to overcome these challenges, but up to date the challenges of integration heterogeneous services with minimal user-involvement still exist. In this paper, we are exploring the challenges of heterogeneous services and characteristics thereof with an aim of developing a seamless approach that will alleviate some of these challenges in near future. It is therefore of outmost important to understand the challenges and characteristics of heterogeneous services before developing a mechanism that could eliminate these challenges.
  • Key Management Scheme for Secure Group Communication in WSN With Multiple Groups
    H.S.Annapurna and M.Siddappa, Sri Siddhartha Academy of Higher Education, India
    ABSTRACT
    Security is one of the inherent challenges in the area of Wireless Sensor Network (WSN). At present, majority of the security protocols involve massive iterations and complex steps of encryptions thereby giving rise to degradation of quality of service. Many WSN applications are based on secure group communication. In this paper, we have proposed a scheme for secure group key management with simultaneous multiple groups. The scheme uses a key-based approach for managing the groups and we show that membership change events can be handled with less storage, communication and computation cost. The scheme also offers authentication to the messages communicated within and among the groups.
  • Applying a Systematic Review on Adaptive Security for DSPL
    Mohamed AMOUD and Ounsa ROUDIES, Mohammed V University in Rabat, Morocco
    ABSTRACT
    SProviding security and privacy to Dynamic Software Product Lines (DSPL) is very challenging. DSPL is becoming the system with high vulnerability in which the security is a difficult task and critical for it to operate. Adaptive security is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. This paper presents a literature review of security adaptation approaches for DSPL, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve. This work will be done following the Systematic Review approach. Our results concluded that the research field of security approaches for DSPL is still poor of methods and metrics for evaluating and comparing different techniques.
Copyright © CSEN 2016