

PBVMLBA: Priority Based Virtual Machine Load Balancing Algorithm for Cloud Computing |
Pages: 233-238 (6) | [Full Text] PDF (477 KB) |
DS Kumar, EGDP Raj |
Research Scholar , School of Computer Science ,Engineering and Applications, Bharathidasan University, Tiruchirappalli, Tamil Nadu, IndianAssistant Professor, School of Computer Science ,Engineering and Applications, Bharathidasan University, Tiruchirappalli, Tamil Nadu, Indian |
Abstract - Cloud computing is a fast growing area in computing research and industry today that offers vast benefits such as reduced time, unlimited computing power and flexible computing capabilities. It is a model that provides an on-demand network access to a shared pool of computing resources It comprises a huge number of concepts primarily Load Balancing, Scheduling, etc. The number of users in cloud computing is growing in an exponential rate at every day. The number users access cloud server by sending enormous request for many application which lead to high load on cloud server. To reducing the heavy load on server, the virtual machines are allocated for resources based on priority. Allocating the resources on virtual machines based on priority achieves the better response time and processing time. The main aim of the system is to minimize the makespan and to maximize the resource utilization and user satisfaction. This proposed algorithm is implemented using Microsoft azure real time cloud and Microsoft azure as a deployment tool. |
Index Terms - Cloud Computing, Load balancing, Virtual Machine |
C itation - DS Kumar, EGDP Raj. "PBVMLBA: Priority Based Virtual Machine Load Balancing Algorithm for Cloud Computing." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 233-238. |
A Proposed Computer Based Information System; Sealed Radioactive Sources Licensing |
Pages: 239-243 (5) | [Full Text] PDF (649 KB) |
RMA Lashin, LKA El-Aziz, NS Mahmoud |
Operation Safety and Human Factors Dept. Egyptian Nuclear & Radiological Regulatory Authority (ENNRA), Cairo |
Abstract - Nowadays nuclear energy and applications has gained a great interest. Consequently, the nuclear security became a hot spot. The IAEA define the nuclear security as the prevention of, detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Herein, all radioactive sources shall be subjected to instructions, serious regulations and laws. In order to implement these functions, it is necessary to establish an appropriate information system to the regulatory body. This system shall depend on modern technology to perform the work in more accurate and comprehensive manner. This paper introduces a software package for sealed radioactive sources licensing according to IAEA standards as a part of NRRA Data Bank (DB), which is a national database system that organize regulatory and scientific information in NRRA. The implemented software speeding up the licensing process as will as documentation of the, information concerns sources type, storage area, workers, personnel equipment for dose measurement, and number of sources used. The experimental results verify the software reliability. |
Index Terms - Sealed Sources, Information System, DataBank |
C itation - RMA Lashin, LKA El-Aziz, NS Mahmoud. "A Proposed Computer Based Information System; Sealed Radioactive Sources Licensing." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 239-243. |
Conceptual Design for Smart First Aid System |
Pages: 244-251 (8) | [Full Text] PDF (413 KB) |
H AL-TAMEEMI, T Ibrahim, A Erdan |
MODES Department, Atilim University, Ankara, Turkey |
Abstract - In recent years, we have noticed the effective of information technology to develop societies. In addition, the role of e-government in providing services to citizens. Health scope is one of the important scopes for citizen that invested these technologies to develop providing healthcare services.In this article, the authors will propose a conceptual design to build a smart first aid to provide medical services in real time, this design based to connect all people with a smart first aid center to send an immediate medical intervention. Authors try to address the citizen needs by covering some previous articles to clarify the objectives, follow that identify the main and sub functions that satisfied the user needs, until reach to the domain stage of design. |
Index Terms - E-Health, Health Information System, Engineering Design, Smart First Aid |
C itation - H AL-TAMEEMI, T Ibrahim, A Erdan. "Conceptual Design for Smart First Aid System." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 244-251. |
GSAD-IV; Analytical Software Model for Assessing the Generic Transport of Low and Intermediate Radioactive Wastes in an Aquifer |
Pages: 252-257 (6) | [Full Text] PDF (1.02 MB) |
NS Mahmoud, RMA Lashin, LK Abdul-Aziz |
Nuclear Installations Safety Division, Egyptian Nuclear & Radiological Regulatory Authority (ENNRA), Cairo Operation Safety and Human Factors Dept. Egyptian Nuclear & Radiological Regulatory Authority (ENNRA), Cairo |
Abstract - System Analyst Group (SAG) of the Databank in nuclear/radiological regulatory authority, as an import role, has the duty to build national software codes. The present work describes a part from an integrated computer code; the generic modeling of radionuclide transport in an aquifer. This part is consider from the the generic safety assessment of low and intermediate radioactive waste disposal site. The code is preparing intentially for the praticallity of juniors from a side. From the other side, it is building to reduce the time for seniors to reach their decisions concerning a given disposal site from operators. The code is an analytical model of the dispersion-advection equations using Greens functions solutions for instantaneous release of radionuclides in an aquifer in one direction. The Code is using Oracle language under XP window platform. The code performed fulfills the target of the databank. Meanwhile, it represents for the SAG the challenge of easy learn easy use. |
Index Terms - Generic Safety Assessment, Disposal Site, Aquifer, Green Functions |
C itation - NS Mahmoud, RMA Lashin, LK Abdul-Aziz. "GSAD-IV; Analytical Software Model for Assessing the Generic Transport of Low and Intermediate Radioactive Wastes in an Aquifer." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 252-257. |
Arabic Text Classification Process |
Pages: 258-265 (8) | [Full Text] PDF (752 KB) |
R Elhassan, M Ali |
Information Systems Department, King Khalid University, Khamis Mushait, 61961 , Kingdom of Saudi ArabiaFaculty of Mathematical Science, University of Khartoum, Khartoum, 11115, Sudan |
Abstract - Due to the richness of the language, the ordinary Arabic Text classification of the content is very complex, difficult and challenging task. This resulted as unavailable benchmarking Arabic corpus, limitation of research and ambiguous processing phases in the field of Arabic text classification, This paper presents the complex nature of Arabic language, poses the problems of lacking free public Arabic corpora, explain the Classification phases throw the literature Arabic text classification. |
Index Terms - Arabic Text Classification, Data Preprocess, Feature Selection, Classifier |
C itation - R Elhassan, M Ali. "Arabic Text Classification Process." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 258-265. |
Investigating the Effectiveness of Arabic Language for Free-text Keystroke Dynamics Authentication |
Pages: 266-272 (7) | [Full Text] PDF (579 KB) |
SA Alsuhibany, M Almushyti, F Alkhudier, N Alghasham |
Department of Computer Science, Qassim University, Qassim, Saudi ArabiaDeanship of Educational Services, Qassim University, Qassim, Saudi ArabiaInformation Technology Qassim University, Qassim, Saudi Arabia |
Abstract - Online services depend greatly on authentication mechanisms in order to give a sufficient protection to the provided data. Since various security and usability drawbacks have been reported, this paper investigates a free-text keystroke dynamic authentication approach which provides acceptable security and usability levels. In particular, this study extends previous studies in which the Arabic language is incorporated by investigating the utilization of different timing features, as well as applying different classification methods. Based on a controlled experiment for Arabic language, a better False Acceptance Rates (FAR) was achieved, which is equal to 2% by using both Euclidean and Bhattacharyya distance measures, while the False Rejection Rates (FRR) was 0.0 using Euclidean Distance and 0.06 using Bhattacharyya Distance. The results showed that the system performance is improved compared to other studies. |
Index Terms - Keystroke Dynamic, Authentication, Security, Usability, Bhattacharyya Distance, Euclidean Distance, Free-text, Arabic language |
C itation - SA Alsuhibany, M Almushyti, F Alkhudier, N Alghasham. "Investigating the Effectiveness of Arabic Language for Free-text Keystroke Dynamics Authentication." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 266-272. |
Towards an MDD Based Framework for Self Adaptive IoT Applications Development |
Pages: 273-283 (11) | [Full Text] PDF (478 KB) |
Y Abuseta |
Computer Science Department, Faculty of Science, Al-Jabal Al-Gharbi University, Zintan, Libya |
Abstract - As technology and communication advances, more devices (and things) are able to connect to the Internet and talk to each other to achieve a common goal which results in the emergence of the Internet of Things (IoT) era. It is believed that IoT will bring up a limitless number of applications and business opportunities that will affect almost every aspect of our life. Research has already been conducted to investigate the challenges that obstruct the realization of IoT along with the promising solutions that pave the way for the acceptance and enabling of IoT. Among the research areas that is of a great importance to making IoT paradigm possible is the presence of a unified programming framework that masks the heterogeneity of the involved devices of the IoT platform. Such a framework guides system developers throughout the IoT application development process. In this paper, we investigate the IoT concept and its high level architecture in general and focus more on the application development aspect. We believe that IoT applications are highly dynamic in nature and thus need to be engineered with the self adaptive and autonomic concepts in mind. Therefore, our proposed IoT software development lifecycle was based on the IBM architecture blueprint for autonomic systems. To cater for the runtime dynamic and heterogeneity aspects of IoT applications, we adopt the MDD paradigm for our proposed development framework. We highlight the core requirements of a resilient development framework that accommodates the necessary concepts and processes for a successful IoT application. |
Index Terms - IoT, Framework Design, SAS, Feedback Control Loop |
C itation - Y Abuseta. "Towards an MDD Based Framework for Self Adaptive IoT Applications Development." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 273-283. |
Analyze Medical Image and Compress It by Different Algorithms |
Pages: 284-293 (10) | [Full Text] PDF (707 KB) |
H AL-TAMEEMI, T Ibrahim |
MODES Department, Atilim University, Ankara, Turkey |
Abstract - Compression is used just about everywhere. All the images you get on the web are compressed, and the medical image is one of these images. In this paper we analyze the standard medical color image and 3D medical image, after that use different algorithm methods to compress it. The results that obtained it are compared to conclude the paper purpose, and finally we suggest the future works, which related with the compression schemes. |
Index Terms - Data Compression, Lossy Compression, Lossless Compression |
C itation - H AL-TAMEEMI, T Ibrahim. "Analyze Medical Image and Compress It by Different Algorithms." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 284-293. |