14

ADVANCES in INFORMATION SCIENCE - WSEAS in INFORMATION SCIENCE ... Recent Advances in Computer Engineering Series ... The Role of Information Technology Studies’ in Software Product

  • Upload
    voduong

  • View
    217

  • Download
    3

Embed Size (px)

Citation preview

ADVANCES in INFORMATION SCIENCE and COMPUTER ENGINEERING

Proceedings of the 9th International Conference on Computer Engineering and Applications (CEA '15)

Dubai, United Arab Emirates February 22-24, 2015

Scientific Sponsor

University of Naples Federico II, Italy

Recent Advances in Computer Engineering Series | 26

ISSN: 1790-5109 ISBN: 978-1-61804-276-7

ADVANCES in INFORMATION SCIENCE and COMPUTER ENGINEERING Proceedings of the 9th International Conference on Computer Engineering and Applications (CEA '15) Dubai, United Arab Emirates February 22-24, 2015 Published by WSEAS Press www.wseas.org Copyright © 2015, by WSEAS Press All the copyright of the present book belongs to the World Scientific and Engineering Academy and Society Press. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the Editor of World Scientific and Engineering Academy and Society Press. All papers of the present volume were peer reviewed by no less that two independent reviewers. Acceptance was granted when both reviewers' recommendations were positive.

ISSN: 1790-5109 ISBN: 978-1-61804-276-7

ADVANCES in INFORMATION SCIENCE and COMPUTER ENGINEERING

Proceedings of the 9th International Conference on Computer Engineering and Applications (CEA '15)

Dubai, United Arab Emirates February 22-24, 2015

Editors: Prof. Nikos E. Mastorakis, Technical University of Sofia, Bulgaria Prof. Imre J. Rudas, Obuda University, Hungary Committee Members-Reviewers: Jun Wang Demetri Terzopoulos Josip Music Gen Qi Xu Alexander Gelbukh Dimitri Bertsekas Maurice Margenstern Georgios B. Giannakis Theodore B. Trafalis Claudio Talarico Zhuo Li Charles Suffel Shuliang Li Dimitrios A. Karras Kun Chang Lee Andre A. Keller Vaclav Skala Sergio Lopes Clement Kleinstreuer Timon Rabczuk George Vachtsevanos Pierre-yves Manach Hongli Dong Paolo Fuschi Chang Nyung Kim Yumin Cheng ZhuangJian Liu Nam-il Kim Mehmet Firat Jia-Jang Wu Ali Akdagli Xinwang Liu Ahmed Elaraby Al Emran Ismail Alina Adriana Minea Anastasios Salis Arun Kumar P Caio Fernando Fontana Calbureanu Popescu Madalina Xenia Daniel Hunyadi Dharmpal Singh Ehsan Kamrani Emmanouil Zoulias Ganesh Kumar T Hishamuddin Jamaluddin Ioana Adrian Jianqiang Gao Jose Manuel Mesa Fernández Jothilakshmi Vishnu Prakash Jui-Jen Chen Kandarpa Kumar Sarma Mohd Faizal Bin Abdollah Muhammad Naufal Mansor

Nikos Loukeris Nor Azliana Akmal Jamaludin P. Suresh Panagiotis Gioannis Sandor Szenasi Saravanan Saravanan Kumarasamy Sawtantar Singh Khurmi Seyed Hesam Asgari Shrishailappa Patil Snezhana Georgieva Gocheva-Ilieva T.D. Subash Tiberiu Socaciu Wen-Pin Hu Xiaoguang Yue Zaharia Sebastian Zahéra Mekkioui Zakaria Zubi Zanariah Abdul Majid

Preface This year the 9th International Conference on Computer Engineering and Applications (CEA '15) was held in Dubai, United Arab Emirates, February 22-24, 2015. The conference provided a platform to discuss network architecture, wireless networks, data mining, software engineering, software maintenance, hardware engineering, mobile computing, cryptology, algorithms etc. with participants from all over the world, both from academia and from industry.

Its success is reflected in the papers received, with participants coming from several countries, allowing a real multinational multicultural exchange of experiences and ideas.

The accepted papers of this conference are published in this Book that will be sent to international indexes. They will be also available in the E-Library of the WSEAS. Extended versions of the best papers will be promoted to many Journals for further evaluation.

Conferences such as this can only succeed as a team effort, so the Editors want to thank the International Scientific Committee and the Reviewers for their excellent work in reviewing the papers as well as their invaluable input and advice.

The Editors

Table of Contents

Identity Based Cryptography for Smart-grid Protection 15 Mickael Avril, Laurie Basta, Laurent Bouillet, Abderrahman Daif, Gregory Landais, Cedric Tavernier Big Data Analysis and Reporting with Decision Tree Induction 25 Petra Perner Numerical Solution of Crown Forest Fire Spread Around the Forest Glade 35 Valeriy Perminov Strict and Heuristic Optimization of Virtual Machine Placement and Migration 42 Satoru Ohta Method of Building an Intelligent Computing Systems for Diagnostics using Volterra Kernels Moments

52

Oleksandr Fomin, Mohannad Masri, Vitaliy Pavlenko Improved QoE in Mobile Telephony Through QoS-Sensitive (HOCIS) Convenience Messages 57 Thomas Schildhauer, Claudia Nichterlein, Felix Urban, Annalies Beck, Daniela Doischer, Ivan Ivanovic

A Formal Methodology for Quantifying Overt Hardware Attacks 63 Samer Moein, Fayez Gebali Application of Computational Approach in Pavement Engineering 70 Bao Thach Nguyen, Abbas Mohajerani Main Memory Configuration Quality for Random Page Replacement Policy 76 Ricardo L. Piantola, Edson T. Midorikawa Positive and Stable Time-Varying Discrete-Time Linear Systems 81 Tadeusz Kaczorek Quantifying Covert Hardware Attacks: using ART Schema 85 Samer Moein, Fayez Gebali Accelerating Haskell on a Dataflow Architecture: A Case Study Including Transactional Memory

91

Roberto Giorgi Communication Tool to Improve the Collaborative Work Using Emerging Mobile Technologies 101 Roberto Berjón, Mª Encarnación Beato, Montserrat Mateos, Ana Mª Fermoso The Role of Information Technology Studies’ in Software Product Quality Improvement 110 Rudite Cevere, Sandra Sproge

Diagnostic System of Wheeled Tractors Detecting Four Defect’s Categories 120 Ryszard Arendt, Ryszard Michalski Seismic Performance of R.C. Framed Buildings Retrofitted using Modern Techniques: FRP versus Base-Isolation and Added Damping

130

Mazza Fabio, Mazza Mirko Production Time Necessary for Model Prototyping on Small FDM Device 138 Juraj Beniak, Peter Križan, Miloš Matúš, Ľubomír Šooš Study of Reliability Modeling and Performance Analysis of Haul Trucks in Quarries 143 Dascar Secara Monia Camelia, Nan Marin Silviu, Dascar Emil A Zone-Based Clustering Protocol for Wireless Sensor Networks 151 S. A. Sahaaya Arul Mary, Gnanadurai Jasmine Beulah Customer Segmentation Using Neural Networks 162 Dajana Ćorić, Katarina Ćurko, Mladen Varga The Impact of Geometric and Motion Features on Sign Language Translators 170 Sara Bilal, Rini Akmeliawati "Wormhole" and "Blackhole" Attacks on Ad-hoc Networks Prevention Methods 180 Dmitry Moskvin, Denis Ivanov, Dmitry Zegjda Application of ANFIS Models for Prediction of Forest Fires in the U.S.A. - Preliminary Results 185 Yaroslav Vyklyuk, Milan M. Radovanović, Milan Milenković, Ana Jovanović, Darko Vuković, Milan Stevančević, Nataliya Matsiuk

Preemptive Multitasking on Atmel® AVR® Microcontroller 196 Habibur Rahman, Senthil Arumugam Muthukumaraswamy Approaches for the Improvement of the Seismic Performance of Masonry Constructions 205 Ileana Corbi, Ottavia Corbi, Francisco Javier Pallarés Rubio, Luis Pallarés Rubio Zero-day Polymorphic Worms Detection Using Aho-Corasick Algorithm 211 Mohssen M. Z. E. Mohammed, Eisa Aleisa, Neco Ventura Intense Explore Algorithm – A Proactive Way to Eliminate PUE Attacks in Cognitive Radio Networks

217

A. C. Sumathi, R. Vidhyapriya A Study of Mutation Magic Square in Authentication Communication 225 Chenglian Liu Identifying Skylines in Dynamic Incomplete Database 231 Ghazaleh Babanejad, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi, Ghoncheh Babanejad, Ali A. Alwan

Efficient Estimation of Energy Bounds to Ensure Predictability in Clustered Sensor Networks 237 E. Srie Vidhya Janani, P. Ganeshkumar Adaptive Neural Control of a Two-Link Flexible Manipulator 247 Amin Riad Maouche, Hosna Meddahi Detection of Communities in Complex Graphs based on the Normalized Covariance between Vertices

255

Abderrahim Ghadi, Mohamed Ben Ahmed, A. Anouar Boudhir, Mohamed Bouhorma Candidate Graph Generation Algorithm 265 Nouf M. Kh. Alsudairy, Alaaeldin M. Hafez, Vijay V. Raghavan, Hassan I. Mathkour Appropriate Technologies for the Design of the Portal for Microsoft Dynamics CRM at Initial Conditions

271

Matus Peci, Pavel Vazan, Vladimir Surka A View based Approach for Enhancing Web Services Availability 276 Hela Limam, Jalel Akaichi A Novel Design and Analysis of Non-Linear Autopilot System 288 Khushboo Haresh Wadhwani, Senthil Arumugam Muthukumaraswamy, Mehdi Nazarinia Artificial Neural Network based Relevance Feedback for Intermediate Feature Based Image Retrieval

296

Dipankar Hazra, Debnath Bhattacharyya, Tai-hoon Kim Digitalization and Quality Enhancement Initiatives in SW Assisted Design Processes in Building and Construction Industries

300

Markku Rossi, Bhargav Dave How Security Issues Can Influence on Usage of Electronic Services 310 Hamed Taherdoost, Shamsul Sahibuddin, Neda Jalaliyoon Key Frame Extraction using Faber-Schauder Wavelet 317 Assma Azeroual, Karim Afdel, El Hajji Mohamed, Hassan Douzi An Effective Histogram Equalization Method by Changing Pixel Value with the Help of Cumulative Frequency

323

Papiya Chakraborty, Debnath Bhattacharyya, Tai-Hoon Kim Hiding Cryptographic Keys of Embedded Systems 329 Rafael Costa, Davidson Boccardo, Luci Pirmez, Luiz Fernando Rust Combining Classifiers for Enhanced Face Recognition 339 Salima Nebti, Boukemara Fadila

Multi-Objective Aircraft Trajectory Optimization for Weather Avoidance and Emissions Reduction

346

G. Serafino NoSQL Document Datastore as a Backend of the Visualization Platform for ECM System 354 Juris Rats Using Cluster Technique to Distribute and Track Containers 360 Lamiaa Fattouh Ibrahim, Maysoon Abulkhair, Abrar Alnaji, Fatima Duaiji, Nouf Aqeeli, Nuha Al-Amer, Nuha Alghamdi, Shahad Battar

Development and Verification of Software Component Level Fault Injection for Safety-Critical Automotive Ethernet Control System

366

Scalable Flexibility of Manufacturing used CORBA 376 Popp Ilie Octavian Multi Order Minimum Error Boundary Cut Patch Based Algorithm: Innovative Image Inpainting Application

384

Hardik Modi Information System for Seed Management Unit 390 Retno Sri Hartati Mulyandari, Deliana Putri Pre-processing of Carved Fragmented JPEG Image and Thumbnail 400 Nurul Azma Abdullah, Kamaruddin Malik Mohamad, Rosziati Ibrahim Designing a Gamified System using QR Codes via an Android Application for Power Management

408

Mariano Jesus Cayabyab Jr., Maria Rosa Santiago, Samuel Matthew Dumlao, Rosula Reyes Examining the Policy Environment for the Cloud in the UAE 415 Maurice Danaher, Saif Al Rumaithy Secure Route Selection Based on Resource Estimation Methodology using Agent-Based Systems for Limited Resources WSNs

423

Ma’en Saleh, Ahmad Aljaafreh, Naeem Al-Oudat Applying Classifier Algorithms to Organizational Memory to Build an Attrition Predictor Model

429

K. M. Suceendran, R. Saravanan, Divya Ananthram, S. Poonkuzhali, R. Kishore Kumar, K.Sarukesi A New Key Management Scheme Based on Smart Grid Requirements 436 Madjid Merabti, Bashar Alohali, Kashif Kifayat Big Data, Natural Language Understanding and Intelligent Agent based Web 444 Emdad Khan

Cheng-Yu Liu

Torque and Ripple Analyses of a Small BLDC Motor for a Medical Hand-piece 454 Mingzhe Li, Cheol Kim, Seungyoon Lee, Se-Ho Kwak Stock Market Prediction Using Clustering with Meta-Heuristic Approaches 460 S. Prasanna, D. Ezhil Maran Automated Model in the Loop for Embedded Systems Testing 471 Samaa A. Abdel Samie Particle Swarm Optimization Based Intrusion Detection for Mobile Ad-hoc Networks 477 Bhushan S. Chaudhari, Rajesh S. Prasad Biodeterioration of Building Timbers in the High Water Activity Built Environment of Nigerian 483 Isa Hassa-Enua Mshelgaru, Kabir Bala, Sani Usman Kunya Visualization of Strain Influence on Cutting Edge of Different Austempered Ductile Iron (ADI) Products: FEA in Dozer Blade with ANSYS R 15.0

491

Dalgobind Mahto, N. E. Mastorakis Architecture of Decentralized Multicast Network Using Quantum Key Distribution and Hybrid WDM-TDM

504

A. F. Metwaly, Nikos E. Mastorakis Process Migration In Heterogeneous Linux Environments 519 M . V. Nimbalkar, Ganesh R. Pathak, Hema Nagargoje, Mundhe Vishnudas B. Data Mining Technology for Countering Cybercrime - A Computational Intelligence Perspective

522

Aboubekeur Hamdi-Cherif, Chafia Kara-Mohamed Security Issues in Cloud Computing and Associated Mitigation Techniques 528 A. Viswanadham, D. Malathy Authors Index 541