International Journal of Computer Science and Software Engineering (IJCSSE)

Volume 6, Issue 11, November 2017

 

 

PBVMLBA: Priority Based Virtual Machine Load Balancing Algorithm for Cloud Computing
 

PBVMLBA: Priority Based Virtual Machine Load Balancing Algorithm for Cloud Computing

Pages: 233-238 (6) | [Full Text] PDF (477 KB)
DS Kumar, EGDP Raj
Research Scholar , School of Computer Science ,Engineering and Applications, Bharathidasan University, Tiruchirappalli, Tamil Nadu, Indian
Assistant Professor, School of Computer Science ,Engineering and Applications, Bharathidasan University, Tiruchirappalli, Tamil Nadu, Indian

Abstract -
Cloud computing is a fast growing area in computing research and industry today that offers vast benefits such as reduced time, unlimited computing power and flexible computing capabilities. It is a model that provides an on-demand network access to a shared pool of computing resources It comprises a huge number of concepts primarily Load Balancing, Scheduling, etc. The number of users in cloud computing is growing in an exponential rate at every day. The number users access cloud server by sending enormous request for many application which lead to high load on cloud server. To reducing the heavy load on server, the virtual machines are allocated for resources based on priority. Allocating the resources on virtual machines based on priority achieves the better response time and processing time. The main aim of the system is to minimize the makespan and to maximize the resource utilization and user satisfaction. This proposed algorithm is implemented using Microsoft azure real time cloud and Microsoft azure as a deployment tool.
 
Index Terms - Cloud Computing, Load balancing, Virtual Machine

Citation - DS Kumar, EGDP Raj. "PBVMLBA: Priority Based Virtual Machine Load Balancing Algorithm for Cloud Computing." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 233-238.

A Proposed Computer Based Information System; Sealed Radioactive Sources Licensing
 

A Proposed Computer Based Information System; Sealed Radioactive Sources Licensing

Pages: 239-243 (5) | [Full Text] PDF (649 KB)
RMA Lashin, LKA El-Aziz, NS Mahmoud
Operation Safety and Human Factors Dept. Egyptian Nuclear & Radiological Regulatory Authority (ENNRA), Cairo

Abstract -
Nowadays nuclear energy and applications has gained a great interest. Consequently, the nuclear security became a hot spot. The IAEA define the nuclear security as the prevention of, detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Herein, all radioactive sources shall be subjected to instructions, serious regulations and laws. In order to implement these functions, it is necessary to establish an appropriate information system to the regulatory body. This system shall depend on modern technology to perform the work in more accurate and comprehensive manner. This paper introduces a software package for sealed radioactive sources licensing according to IAEA standards as a part of NRRA Data Bank (DB), which is a national database system that organize regulatory and scientific information in NRRA. The implemented software speeding up the licensing process as will as documentation of the, information concerns sources type, storage area, workers, personnel equipment for dose measurement, and number of sources used. The experimental results verify the software reliability.
 
Index Terms - Sealed Sources, Information System, DataBank

Citation - RMA Lashin, LKA El-Aziz, NS Mahmoud. "A Proposed Computer Based Information System; Sealed Radioactive Sources Licensing." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 239-243.

Conceptual Design for Smart First Aid System
 

Conceptual Design for Smart First Aid System

Pages: 244-251 (8) | [Full Text] PDF (413 KB)
H AL-TAMEEMI, T Ibrahim, A Erdan
MODES Department, Atilim University, Ankara, Turkey

Abstract -
In recent years, we have noticed the effective of information technology to develop societies. In addition, the role of e-government in providing services to citizens. Health scope is one of the important scopes for citizen that invested these technologies to develop providing healthcare services.In this article, the authors will propose a conceptual design to build a smart first aid to provide medical services in real time, this design based to connect all people with a smart first aid center to send an immediate medical intervention. Authors try to address the citizen needs by covering some previous articles to clarify the objectives, follow that identify the main and sub functions that satisfied the user needs, until reach to the domain stage of design.
 
Index Terms - E-Health, Health Information System, Engineering Design, Smart First Aid

Citation - H AL-TAMEEMI, T Ibrahim, A Erdan. "Conceptual Design for Smart First Aid System." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 244-251.

GSAD-IV; Analytical Software Model for Assessing the Generic Transport of Low and Intermediate Radioactive Wastes in an Aquifer
 

GSAD-IV; Analytical Software Model for Assessing the Generic Transport of Low and Intermediate Radioactive Wastes in an Aquifer

Pages: 252-257 (6) | [Full Text] PDF (1.02 MB)
NS Mahmoud, RMA Lashin, LK Abdul-Aziz
Nuclear Installations Safety Division, Egyptian Nuclear & Radiological Regulatory Authority (ENNRA), Cairo
Operation Safety and Human Factors Dept. Egyptian Nuclear & Radiological Regulatory Authority (ENNRA), Cairo

Abstract -
System Analyst Group (SAG) of the Databank in nuclear/radiological regulatory authority, as an import role, has the duty to build national software codes. The present work describes a part from an integrated computer code; the generic modeling of radionuclide transport in an aquifer. This part is consider from the the generic safety assessment of low and intermediate radioactive waste disposal site. The code is preparing intentially for the praticallity of juniors from a side. From the other side, it is building to reduce the time for seniors to reach their decisions concerning a given disposal site from operators. The code is an analytical model of the dispersion-advection equations using Greens functions solutions for instantaneous release of radionuclides in an aquifer in one direction. The Code is using Oracle language under XP window platform. The code performed fulfills the target of the databank. Meanwhile, it represents for the SAG the challenge of easy learn easy use.
 
Index Terms - Generic Safety Assessment, Disposal Site, Aquifer, Green Functions

Citation - NS Mahmoud, RMA Lashin, LK Abdul-Aziz. "GSAD-IV; Analytical Software Model for Assessing the Generic Transport of Low and Intermediate Radioactive Wastes in an Aquifer." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 252-257.

Arabic Text Classification Process
 

Arabic Text Classification Process

Pages: 258-265 (8) | [Full Text] PDF (752 KB)
R Elhassan, M Ali
Information Systems Department, King Khalid University, Khamis Mushait, 61961 , Kingdom of Saudi Arabia
Faculty of Mathematical Science, University of Khartoum, Khartoum, 11115, Sudan

Abstract -
Due to the richness of the language, the ordinary Arabic Text classification of the content is very complex, difficult and challenging task. This resulted as unavailable benchmarking Arabic corpus, limitation of research and ambiguous processing phases in the field of Arabic text classification, This paper presents the complex nature of Arabic language, poses the problems of lacking free public Arabic corpora, explain the Classification phases throw the literature Arabic text classification.
 
Index Terms - Arabic Text Classification, Data Preprocess, Feature Selection, Classifier

Citation - R Elhassan, M Ali. "Arabic Text Classification Process." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 258-265.

Investigating the Effectiveness of Arabic Language for Free-text Keystroke Dynamics Authentication
 

Investigating the Effectiveness of Arabic Language for Free-text Keystroke Dynamics Authentication

Pages: 266-272 (7) | [Full Text] PDF (579 KB)
SA Alsuhibany, M Almushyti, F Alkhudier, N Alghasham
Department of Computer Science, Qassim University, Qassim, Saudi Arabia
Deanship of Educational Services, Qassim University, Qassim, Saudi Arabia
Information Technology Qassim University, Qassim, Saudi Arabia

Abstract -
Online services depend greatly on authentication mechanisms in order to give a sufficient protection to the provided data. Since various security and usability drawbacks have been reported, this paper investigates a free-text keystroke dynamic authentication approach which provides acceptable security and usability levels. In particular, this study extends previous studies in which the Arabic language is incorporated by investigating the utilization of different timing features, as well as applying different classification methods. Based on a controlled experiment for Arabic language, a better False Acceptance Rates (FAR) was achieved, which is equal to 2% by using both Euclidean and Bhattacharyya distance measures, while the False Rejection Rates (FRR) was 0.0 using Euclidean Distance and 0.06 using Bhattacharyya Distance. The results showed that the system performance is improved compared to other studies.
 
Index Terms - Keystroke Dynamic, Authentication, Security, Usability, Bhattacharyya Distance, Euclidean Distance, Free-text, Arabic language

Citation - SA Alsuhibany, M Almushyti, F Alkhudier, N Alghasham. "Investigating the Effectiveness of Arabic Language for Free-text Keystroke Dynamics Authentication." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 266-272.

Towards an MDD Based Framework for Self Adaptive IoT Applications Development
 

Towards an MDD Based Framework for Self Adaptive IoT Applications Development

Pages: 273-283 (11) | [Full Text] PDF (478 KB)
Y Abuseta
Computer Science Department, Faculty of Science, Al-Jabal Al-Gharbi University, Zintan, Libya

Abstract -
As technology and communication advances, more devices (and things) are able to connect to the Internet and talk to each other to achieve a common goal which results in the emergence of the Internet of Things (IoT) era. It is believed that IoT will bring up a limitless number of applications and business opportunities that will affect almost every aspect of our life. Research has already been conducted to investigate the challenges that obstruct the realization of IoT along with the promising solutions that pave the way for the acceptance and enabling of IoT. Among the research areas that is of a great importance to making IoT paradigm possible is the presence of a unified programming framework that masks the heterogeneity of the involved devices of the IoT platform. Such a framework guides system developers throughout the IoT application development process. In this paper, we investigate the IoT concept and its high level architecture in general and focus more on the application development aspect. We believe that IoT applications are highly dynamic in nature and thus need to be engineered with the self adaptive and autonomic concepts in mind. Therefore, our proposed IoT software development lifecycle was based on the IBM architecture blueprint for autonomic systems. To cater for the runtime dynamic and heterogeneity aspects of IoT applications, we adopt the MDD paradigm for our proposed development framework. We highlight the core requirements of a resilient development framework that accommodates the necessary concepts and processes for a successful IoT application.
 
Index Terms - IoT, Framework Design, SAS, Feedback Control Loop

Citation - Y Abuseta. "Towards an MDD Based Framework for Self Adaptive IoT Applications Development." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 273-283.

Analyze Medical Image and Compress It by Different Algorithms
 

Analyze Medical Image and Compress It by Different Algorithms

Pages: 284-293 (10) | [Full Text] PDF (707 KB)
H AL-TAMEEMI, T Ibrahim
MODES Department, Atilim University, Ankara, Turkey

Abstract -
Compression is used just about everywhere. All the images you get on the web are compressed, and the medical image is one of these images. In this paper we analyze the standard medical color image and 3D medical image, after that use different algorithm methods to compress it. The results that obtained it are compared to conclude the paper purpose, and finally we suggest the future works, which related with the compression schemes.
 
Index Terms - Data Compression, Lossy Compression, Lossless Compression

Citation - H AL-TAMEEMI, T Ibrahim. "Analyze Medical Image and Compress It by Different Algorithms." International Journal of Computer Science and Software Engineering 6, no. 11 (2017): 284-293.