ADVANCES in INFORMATION SCIENCE and COMPUTER ENGINEERING
Proceedings of the 9th International Conference on Computer Engineering and Applications (CEA '15)
Dubai, United Arab Emirates February 22-24, 2015
Scientific Sponsor
University of Naples Federico II, Italy
Recent Advances in Computer Engineering Series | 26
ISSN: 1790-5109
ISBN: 978-1-61804-276-7
ADVANCES in INFORMATION SCIENCE and COMPUTER ENGINEERING
Proceedings of the 9th International Conference on Computer Engineering and Applications (CEA '15)
Dubai, United Arab Emirates February 22-24, 2015
Published by WSEAS Press
www.wseas.orgCopyright © 2015, by WSEAS Press
All the copyright of the present book belongs to the World Scientific and Engineering Academy and Society Press. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the Editor of World Scientific and Engineering Academy and Society Press.
All papers of the present volume were peer reviewed by no less that two independent reviewers.
Acceptance was granted when both reviewers' recommendations were positive.
ISSN: 1790-5109
ISBN: 978-1-61804-276-7
ADVANCES in INFORMATION SCIENCE and COMPUTER ENGINEERING
Proceedings of the 9th International Conference on Computer Engineering and Applications (CEA '15)
Dubai, United Arab Emirates
February 22-24, 2015
Editors:
Prof. Nikos E. Mastorakis, Technical University of Sofia, Bulgaria Prof. Imre J. Rudas, Obuda University, Hungary
Committee Members-Reviewers:
Jun Wang
Demetri Terzopoulos Josip Music
Gen Qi Xu
Alexander Gelbukh Dimitri Bertsekas Maurice Margenstern Georgios B. Giannakis Theodore B. Trafalis Claudio Talarico Zhuo Li
Charles Suffel Shuliang Li
Dimitrios A. Karras Kun Chang Lee Andre A. Keller Vaclav Skala Sergio Lopes
Clement Kleinstreuer Timon Rabczuk George Vachtsevanos Pierre-yves Manach Hongli Dong Paolo Fuschi Chang Nyung Kim Yumin Cheng ZhuangJian Liu Nam-il Kim Mehmet Firat Jia-Jang Wu Ali Akdagli Xinwang Liu Ahmed Elaraby Al Emran Ismail Alina Adriana Minea Anastasios Salis Arun Kumar P
Caio Fernando Fontana
Calbureanu Popescu Madalina Xenia Daniel Hunyadi
Dharmpal Singh Ehsan Kamrani Emmanouil Zoulias Ganesh Kumar T
Hishamuddin Jamaluddin Ioana Adrian
Jianqiang Gao
Jose Manuel Mesa Fernández Jothilakshmi Vishnu Prakash Jui-Jen Chen
Kandarpa Kumar Sarma Mohd Faizal Bin Abdollah Muhammad Naufal Mansor
Nikos Loukeris
Nor Azliana Akmal Jamaludin P. Suresh
Panagiotis Gioannis Sandor Szenasi
Saravanan Saravanan Kumarasamy Sawtantar Singh Khurmi
Seyed Hesam Asgari Shrishailappa Patil
Snezhana Georgieva Gocheva-Ilieva T.D. Subash
Tiberiu Socaciu Wen-Pin Hu Xiaoguang Yue Zaharia Sebastian Zahéra Mekkioui Zakaria Zubi
Zanariah Abdul Majid
Preface
This year the 9th International Conference on Computer Engineering and Applications (CEA '15) was held in Dubai, United Arab Emirates, February 22-24, 2015. The conference provided a platform to discuss network architecture, wireless networks, data mining, software engineering, software maintenance, hardware engineering, mobile computing, cryptology, algorithms etc.
with participants from all over the world, both from academia and from industry.
Its success is reflected in the papers received, with participants coming from several countries, allowing a real multinational multicultural exchange of experiences and ideas.
The accepted papers of this conference are published in this Book that will be sent to international indexes. They will be also available in the E-Library of the WSEAS. Extended versions of the best papers will be promoted to many Journals for further evaluation.
Conferences such as this can only succeed as a team effort, so the Editors want to thank the International Scientific Committee and the Reviewers for their excellent work in reviewing the papers as well as their invaluable input and advice.
The Editors
Table of Contents
Identity Based Cryptography for Smart-grid Protection 15
Mickael Avril, Laurie Basta, Laurent Bouillet, Abderrahman Daif, Gregory Landais, Cedric Tavernier
Big Data Analysis and Reporting with Decision Tree Induction 25 Petra Perner
Numerical Solution of Crown Forest Fire Spread Around the Forest Glade 35 Valeriy Perminov
Strict and Heuristic Optimization of Virtual Machine Placement and Migration 42 Satoru Ohta
Method of Building an Intelligent Computing Systems for Diagnostics using Volterra Kernels Moments
52 Oleksandr Fomin, Mohannad Masri, Vitaliy Pavlenko
Improved QoE in Mobile Telephony Through QoS-Sensitive (HOCIS) Convenience Messages 57 Thomas Schildhauer, Claudia Nichterlein, Felix Urban, Annalies Beck, Daniela Doischer, Ivan
Ivanovic
A Formal Methodology for Quantifying Overt Hardware Attacks 63 Samer Moein, Fayez Gebali
Application of Computational Approach in Pavement Engineering 70 Bao Thach Nguyen, Abbas Mohajerani
Main Memory Configuration Quality for Random Page Replacement Policy 76 Ricardo L. Piantola, Edson T. Midorikawa
Positive and Stable Time-Varying Discrete-Time Linear Systems 81 Tadeusz Kaczorek
Quantifying Covert Hardware Attacks: using ART Schema 85
Samer Moein, Fayez Gebali
Accelerating Haskell on a Dataflow Architecture: A Case Study Including Transactional Memory
91 Roberto Giorgi
Communication Tool to Improve the Collaborative Work Using Emerging Mobile Technologies 101 Roberto Berjón, Mª Encarnación Beato, Montserrat Mateos, Ana Mª Fermoso
The Role of Information Technology Studies’ in Software Product Quality Improvement 110 Rudite Cevere, Sandra Sproge
Advances in Information Science and Computer Engineering
ISBN: 978-1-61804-276-7 9
Diagnostic System of Wheeled Tractors Detecting Four Defect’s Categories 120 Ryszard Arendt, Ryszard Michalski
Seismic Performance of R.C. Framed Buildings Retrofitted using Modern Techniques: FRP versus Base-Isolation and Added Damping
130 Mazza Fabio, Mazza Mirko
Production Time Necessary for Model Prototyping on Small FDM Device 138 Juraj Beniak, Peter Križan, Miloš Matúš, Ľubomír Šooš
Study of Reliability Modeling and Performance Analysis of Haul Trucks in Quarries 143 Dascar Secara Monia Camelia, Nan Marin Silviu, Dascar Emil
A Zone-Based Clustering Protocol for Wireless Sensor Networks 151 S. A. Sahaaya Arul Mary, Gnanadurai Jasmine Beulah
Customer Segmentation Using Neural Networks 162
Dajana Ćorić, Katarina Ćurko, Mladen Varga
The Impact of Geometric and Motion Features on Sign Language Translators 170 Sara Bilal, Rini Akmeliawati
"Wormhole" and "Blackhole" Attacks on Ad-hoc Networks Prevention Methods 180 Dmitry Moskvin, Denis Ivanov, Dmitry Zegjda
Application of ANFIS Models for Prediction of Forest Fires in the U.S.A. - Preliminary Results 185 Yaroslav Vyklyuk, Milan M. Radovanović, Milan Milenković, Ana Jovanović, Darko Vuković, Milan
Stevančević, Nataliya Matsiuk
Preemptive Multitasking on Atmel® AVR® Microcontroller 196
Habibur Rahman, Senthil Arumugam Muthukumaraswamy
Approaches for the Improvement of the Seismic Performance of Masonry Constructions 205 Ileana Corbi, Ottavia Corbi, Francisco Javier Pallarés Rubio, Luis Pallarés Rubio
Zero-day Polymorphic Worms Detection Using Aho-Corasick Algorithm 211 Mohssen M. Z. E. Mohammed, Eisa Aleisa, Neco Ventura
Intense Explore Algorithm – A Proactive Way to Eliminate PUE Attacks in Cognitive Radio Networks
217 A. C. Sumathi, R. Vidhyapriya
A Study of Mutation Magic Square in Authentication Communication 225 Chenglian Liu
Identifying Skylines in Dynamic Incomplete Database 231
Ghazaleh Babanejad, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi, Ghoncheh Babanejad, Ali A.
Alwan
Advances in Information Science and Computer Engineering
ISBN: 978-1-61804-276-7 10
Efficient Estimation of Energy Bounds to Ensure Predictability in Clustered Sensor Networks 237 E. Srie Vidhya Janani, P. Ganeshkumar
Adaptive Neural Control of a Two-Link Flexible Manipulator 247 Amin Riad Maouche, Hosna Meddahi
Detection of Communities in Complex Graphs based on the Normalized Covariance between Vertices
255 Abderrahim Ghadi, Mohamed Ben Ahmed, A. Anouar Boudhir, Mohamed Bouhorma
Candidate Graph Generation Algorithm 265
Nouf M. Kh. Alsudairy, Alaaeldin M. Hafez, Vijay V. Raghavan, Hassan I. Mathkour
Appropriate Technologies for the Design of the Portal for Microsoft Dynamics CRM at Initial Conditions
271 Matus Peci, Pavel Vazan, Vladimir Surka
A View based Approach for Enhancing Web Services Availability 276 Hela Limam, Jalel Akaichi
A Novel Design and Analysis of Non-Linear Autopilot System 288 Khushboo Haresh Wadhwani, Senthil Arumugam Muthukumaraswamy, Mehdi Nazarinia
Artificial Neural Network based Relevance Feedback for Intermediate Feature Based Image Retrieval
296 Dipankar Hazra, Debnath Bhattacharyya, Tai-hoon Kim
Digitalization and Quality Enhancement Initiatives in SW Assisted Design Processes in Building and Construction Industries
300 Markku Rossi, Bhargav Dave
How Security Issues Can Influence on Usage of Electronic Services 310 Hamed Taherdoost, Shamsul Sahibuddin, Neda Jalaliyoon
Key Frame Extraction using Faber-Schauder Wavelet 317
Assma Azeroual, Karim Afdel, El Hajji Mohamed, Hassan Douzi
An Effective Histogram Equalization Method by Changing Pixel Value with the Help of Cumulative Frequency
323 Papiya Chakraborty, Debnath Bhattacharyya, Tai-Hoon Kim
Hiding Cryptographic Keys of Embedded Systems 329
Rafael Costa, Davidson Boccardo, Luci Pirmez, Luiz Fernando Rust
Combining Classifiers for Enhanced Face Recognition 339
Salima Nebti, Boukemara Fadila
Advances in Information Science and Computer Engineering
ISBN: 978-1-61804-276-7 11
Multi-Objective Aircraft Trajectory Optimization for Weather Avoidance and Emissions Reduction
346 G. Serafino
NoSQL Document Datastore as a Backend of the Visualization Platform for ECM System 354 Juris Rats
Using Cluster Technique to Distribute and Track Containers 360 Lamiaa Fattouh Ibrahim, Maysoon Abulkhair, Abrar Alnaji, Fatima Duaiji, Nouf Aqeeli, Nuha Al-
Amer, Nuha Alghamdi, Shahad Battar
Development and Verification of Software Component Level Fault Injection for Safety-Critical Automotive Ethernet Control System
366
Scalable Flexibility of Manufacturing used CORBA 376
Popp Ilie Octavian
Multi Order Minimum Error Boundary Cut Patch Based Algorithm: Innovative Image Inpainting Application
384 Hardik Modi
Information System for Seed Management Unit 390
Retno Sri Hartati Mulyandari, Deliana Putri
Pre-processing of Carved Fragmented JPEG Image and Thumbnail 400 Nurul Azma Abdullah, Kamaruddin Malik Mohamad, Rosziati Ibrahim
Designing a Gamified System using QR Codes via an Android Application for Power Management
408 Mariano Jesus Cayabyab Jr., Maria Rosa Santiago, Samuel Matthew Dumlao, Rosula Reyes
Examining the Policy Environment for the Cloud in the UAE 415
Maurice Danaher, Saif Al Rumaithy
Secure Route Selection Based on Resource Estimation Methodology using Agent-Based Systems for Limited Resources WSNs
423 Ma’en Saleh, Ahmad Aljaafreh, Naeem Al-Oudat
Applying Classifier Algorithms to Organizational Memory to Build an Attrition Predictor Model
429 K. M. Suceendran, R. Saravanan, Divya Ananthram, S. Poonkuzhali, R. Kishore Kumar, K.Sarukesi
A New Key Management Scheme Based on Smart Grid Requirements 436 Madjid Merabti, Bashar Alohali, Kashif Kifayat
Big Data, Natural Language Understanding and Intelligent Agent based Web 444 Emdad Khan
Advances in Information Science and Computer Engineering
ISBN: 978-1-61804-276-7 12
Cheng-Yu Liu
Torque and Ripple Analyses of a Small BLDC Motor for a Medical Hand-piece 454 Mingzhe Li, Cheol Kim, Seungyoon Lee, Se-Ho Kwak
Stock Market Prediction Using Clustering with Meta-Heuristic Approaches 460 S. Prasanna, D. Ezhil Maran
Automated Model in the Loop for Embedded Systems Testing 471
Samaa A. Abdel Samie
Particle Swarm Optimization Based Intrusion Detection for Mobile Ad-hoc Networks 477 Bhushan S. Chaudhari, Rajesh S. Prasad
Biodeterioration of Building Timbers in the High Water Activity Built Environment of Nigerian 483 Isa Hassa-Enua Mshelgaru, Kabir Bala, Sani Usman Kunya
Visualization of Strain Influence on Cutting Edge of Different Austempered Ductile Iron (ADI) Products: FEA in Dozer Blade with ANSYS R 15.0
491 Dalgobind Mahto, N. E. Mastorakis
Architecture of Decentralized Multicast Network Using Quantum Key Distribution and Hybrid WDM-TDM
504 A. F. Metwaly, Nikos E. Mastorakis
Process Migration In Heterogeneous Linux Environments 519
M . V. Nimbalkar, Ganesh R. Pathak, Hema Nagargoje, Mundhe Vishnudas B.
Data Mining Technology for Countering Cybercrime - A Computational Intelligence Perspective
522 Aboubekeur Hamdi-Cherif, Chafia Kara-Mohamed
Security Issues in Cloud Computing and Associated Mitigation Techniques 528 A. Viswanadham, D. Malathy
Authors Index 541
Advances in Information Science and Computer Engineering
ISBN: 978-1-61804-276-7 13
Authors Index
Advances in Information Science and Computer Engineering
ISBN: 978-1-61804-276-7 541
Abdullah, N. A. 400 Ćurko, K. 162 Malathy, D. 528 Abulkhair, M. 360 Daif, A. 15 Maouche, A. R. 247
Afdel, K. 317 Danaher, M. 415 Maran, D. E. 460
Ahmed, M. B. 255 Dascar, E. 143 Mary, S. A. S. A. 151 Akaichi, J. 276 Dascar, S. M. C. 143 Masri, M. 52 Akmeliawati, R. 170 Dave, B. 300 Mastorakis, N. E. 491, 504 Al Rumaithy, S. 415 Doischer, D. 57 Mateos, M. 101 Al-Amer, N. 360 Douzi, H. 317 Mathkour, H. I. 265
Aleisa, E. 211 Duaiji, F. 360 Matsiuk, N. 185
Alghamdi, N. 360 Dumlao, S. M. 408 Matúš, M. 138
Aljaafreh, A. 423 Fadila, B. 339 Mazza, F. 130
Alnaji, A. 360 Fermoso, A. M. 101 Mazza, M. 130
Alohali, B. 436 Fomin, O. 52 Meddahi, H. 247
Al-Oudat, N. 423 Ganeshkumar, P. 237 Merabti, M. 436 Alsudairy, N. M. Kh. 265 Gebali, F. 63, 85 Metwaly, A. F. 504 Alwan, A. A. 231 Ghadi, A. 255 Michalski, R. 120 Ananthram, D. 429 Giorgi, R. 91 Midorikawa, E. T. 76 Aqeeli, N. 360 Hafez, A. M. 265 Milenković, M. 185 Arendt, R. 120 Hamdi-Cherif, A. 522 Modi, H. 384
Avril, M. 15 Hazra, D. 296 Moein, S. 63, 85
Azeroual, A. 317 Ibrahim, H. 231 Mohajerani, A. 70 Babanejad, Gha. 231 Ibrahim, L. F. 360 Mohamad, K. M. 400 Babanejad, Gho. 231 Ibrahim, R. 400 Mohamed, El H. 317 Bala, K. 483 Ivanov, D. 180 Mohammed, M. M. Z. E. 211
Basta, L. 15 Ivanovic, I. 57 Moskvin, D. 180
Battar, S. 360 Jalaliyoon, N. 310 Mshelgaru, I. H.-E. 483 Beato, M. E. 101 Janani, E. S. V. 237 Mulyandari, R. S. H. 390 Beck, A. 57 Jovanović, A. 185 Muthukumaraswamy, S. A. 196, 288 Beniak, J. 138 Kaczorek, T. 81 Nagargoje, H. 519 Berjón, R. 101 Kara-Mohamed, C. 522 Nan, M. S. 143 Beulah, G. J. 151 Khan, E. 444 Nazarinia, M. 288 Bhattacharyya, D. 296, 323 Kifayat, K. 436 Nebti, S. 339
Bilal, S. 170 Kim, C. 454 Nguyen, B. T. 70
Boccardo, D. 329 Kim, T.-H. 296, 323 Nichterlein, C. 57 Boudhir, A. A. 255 Križan, P. 138 Nimbalkar, M. V. 519 Bouhorma, M. 255 Kumar, R. K. 429 Octavian, P. I. 376
Bouillet, L. 15 Kunya, S. U. 483 Ohta, S. 42
Cayabyab Jr., M. J. 408 Kwak, S.-H. 454 Pathak, G. R. 519
Cevere, R. 110 Landais, G. 15 Pavlenko, V. 52
Chakraborty, P. 323 Lee, S. 454 Peci, M. 271
Chaudhari, B. S. 477 Li, M. 454 Perminov, V. 35
Corbi, I. 205 Limam, H. 276 Perner, P. 25
Corbi, O. 205 Liu, C. 225 Piantola, R. L. 76
Ćorić, D. 162 Liu, C.-Y. 366 Pirmez, L. 329
Costa, R. 329 Mahto, D. 491 Poonkuzhali, S. 429
Advances in Information Science and Computer Engineering
ISBN: 978-1-61804-276-7 542
Prasad, R. S. 477 Samie, S. A. A. 471 Tavernier, C. 15 Prasanna, S. 460 Santiago, M. R. 408 Udzir, N. I. 231
Putri, D. 390 Saravanan, R. 429 Urban, F. 57
Radovanović, M. M. 185 Sarukesi, K. 429 Varga, M. 162 Raghavan, V. V. 265 Schildhauer, T. 57 Vazan, P. 271
Rahman, H. 196 Serafino, G. 346 Ventura, N. 211
Rats, J. 354 Sidi, F. 231 Vidhyapriya, R. 217
Reyes, R. 408 Šooš, L. 138 Vishnudas, B. M. 519
Rossi, M. 300 Sproge, S. 110 Viswanadham, A. 528
Rubio, F. J. P. 205 Stevančević, M. 185 Vuković, D. 185 Rubio, L. P. 205 Suceendran, K. M. 429 Vyklyuk, Y. 185 Rust, L. F. 329 Sumathi, A. C. 217 Wadhwani, K. H. 288
Sahibuddin, S. 310 Surka, V. 271 Zegjda, D. 180
Saleh, M. 423 Taherdoost, H. 310