International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 7, No. 12, Nov. 2015

Cover page and Table of Contents: PDF (size: 235KB)

Table Of Contents

REGULAR PAPERS

The Choice of the Best Proposal in Tendering with AHP Method: Case of Procurement of IT Master Plan’s Realization

By Amadou Diabagate Abdellah Azmani Mohamed El Harzli

DOI: https://doi.org/10.5815/ijitcs.2015.12.01, Pub. Date: 8 Nov. 2015

The computer system has become one of the centerpieces in the functioning of organizations hence the importance of an IT (Information Technology) master plan to manage its development. To find a provider for the IT master plan's realization, organizations are increasingly using tendering as the mode of awarding contracts.
This article focuses on the use of multi-criteria decision-making method AHP for analysis and evaluation of tenders during the awarding of contracts of IT master plan's realization. To achieve this goal, a painstaking work was realized, on the one hand, for making an inventory of criteria and sub-criteria involved in the evaluation of bids and on the other hand for specifying the degrees of preference for each pair of criteria and each pair of sub-criteria. Finally, a test was performed by using fictitious tenders.
The goals of this work are to make available to members of tenders committee a decision support tool for evaluating tenders of IT master plan's realization submitted by bidders and endow the organizations with effective IT master plans in order to increase the performance of their information systems.

[...] Read more.
An Iterated Function System based Method to Generate Hilbert-type Space-filling Curves

By Ruisong Ye Li Liu

DOI: https://doi.org/10.5815/ijitcs.2015.12.02, Pub. Date: 8 Nov. 2015

Iterated function system has been found to be an important method to generate fractal sets. Hilbert space-filling curve is one kind of fractal sets which has been applied widely in digital image processing, such as image encoding, image clustering, image encryption, image storing/retrieving, and pattern recognition. In this paper, we will explore the generation of Hilbert-type space-filling curves via iterated function system based approach systematically. Cooperating a recursive calling of the common Hilbert's original space-filling curve at resolution n-1 and an IFS consisting of four affine transformations, one can generate the vertices for Hilbert-type space-filling curves at any resolution n. The merit is that the recursive algorithm is easy to implement and can be generalized to produce any other Hilbert-type space-filling curves and their variation versions.

[...] Read more.
A Temporal Reasoning System for Diagnosis and Therapy Planning

By Akash Rajak

DOI: https://doi.org/10.5815/ijitcs.2015.12.03, Pub. Date: 8 Nov. 2015

The research is based on the designing of Clinical Temporal Mediator for medical domain. The Clinical Temporal Mediator incorporates the concept of artificial intelligence for performing temporal reasoning tasks. The designing of reasoning system involves the implementation of various mathematical models of insulin-glucose metabolism. The reasoning system consists of three subsystems: Nuti-Diet subsystem, Insulin-Glucose subsystem and Therapy Planner and Diagnosis subsystem. The paper discusses about the designing of TPD subsystems. The temporal mediator perform diagnosis on patient's time oriented database and also suggest therapy planning for diabetes mellitus patient.

[...] Read more.
SQUIREL: Semantic Querying Interlinked OWLS traveling Process Models

By Afaf Merazi Mimoun Malki

DOI: https://doi.org/10.5815/ijitcs.2015.12.04, Pub. Date: 8 Nov. 2015

With the advent of new forms of information and communication technologies, the consumer needs to combine and customize different travel components as a complete travel package, namely: Dynamic Packaging Technology. Nevertheless, disparate tourist offers and services make it difficult for consumer to use them effectively. Therefore, our paper presents an intelligent querying framework of OWL-S travel services, called SQUIREL composition engine. It uses Semantic Web Services (SWSs) technologies combined with the useful of Linked e-tourism Data concept to fulfill the preferences and constraints of the e-tourist any time. This purpose supports SWSs pre-selection through the valuation of the rewritten SPARQL consumer query at runtime that manages dynamic service dependencies extracted from Linked e-tourism Data and returns the SWSs endpoint. Then, SQUIREL catches this endpoint and makes the necessary optimizations to refine it to its relevant atomic processes needed to be composed using matrix computation. However, the experimental results indicate that this method owns both lower computation cost and higher success ratio of fine-grained discovery-based atomic processes composition.

[...] Read more.
Relative Performance of Certain Meta Heuristics on Vehicle Routing Problem with Time Windows

By Sandhya V. Katiyar

DOI: https://doi.org/10.5815/ijitcs.2015.12.05, Pub. Date: 8 Nov. 2015

Solving Vehicle Routing Problem (VRP) and its variants arise in many real life distribution systems. Classical VRP can be described as the problem of finding minimum cost routes with identical vehicles having fixed capacity which starts from a depot and reaches a number of customers with known demands with the proviso that each route starts and ends at the depot and the demand of each customer does not exceed the vehicle capacity is met. One of the generalizations of standard VRP is Vehicle Routing Problem with Time Windows (VRPTW) with added complexity of serving every customer within a specified time window. Since VRPTW is a NP hard meta heuristics have often been designed for solving it. In this paper we compare the performance of Simulated Annealing (SA), genetic Algorithm (GA) and Ant Colony Optimization (ACO) for solving VRPTW based on their performance using different parameters taking total travel distance as the objective to be minimized. The results indicate that ACO is in general slightly more efficient then SA and GA.

[...] Read more.
Selection of Optimum Rule Set of Two Dimensional Cellular Automata for Some Morphological Operations

By Anand Prakash Shukla Suneeta Agarwal

DOI: https://doi.org/10.5815/ijitcs.2015.12.06, Pub. Date: 8 Nov. 2015

The cellular automaton paradigm is very appealing and its inherent simplicity belies its potential complexity. Two dimensional cellular automata are significantly applying to image processing operations. This paper describes the application of cellular automata (CA) to various morphological operations such as thinning and thickening of binary images. The description about the selection of the optimum rule set of two dimensions cellular automata for thinning and thickening of binary images is illustrated by this paper. The selection of the optimum rule set from large search space has been performed on the basis of sequential floating forward search method. The misclassification error between the images obtained by the standard function and the one obtained by cellular automata rule is used as the fitness function. The proposed method is also compared with some standard methods and found suitable for the purpose of morphological operations.

[...] Read more.
Noise and Feedback in Online Communication on Sex: A Study of Nigerian’s Conversations on Pornography in Nollywood on Social Networks

By F. P. C. Endong

DOI: https://doi.org/10.5815/ijitcs.2015.12.07, Pub. Date: 8 Nov. 2015

Social networks constitute a suitable forum for debate, and exchange on any sort of topic especially highly sensitive issues. They offer a fertile platform for debate on thorny societal issues such as politics, sex, culture and religion among others. Given the fact that they favor anonymity, openness and non-accountability for voiced opinion, a good number of Nigerians have found them suitable for, "hot", "aggressive" and very passionate discussions over subjects like sex, sexuality and religious convictions – issues which have remarkably remained somehow taboos in the Nigerian society. This paper investigates the conduct of online debates and opinion formation on sex in the prolific Nigerian motion picture industry (Nollywood). It is based on the content analysis of 516 comments by Nigerians, reacting or debating online (in social networks) on pornography in the Nigerian film industry. The paper seeks to explore and quantify the phenomenon of noise in online communication (conservation and debate) on sex by Nigerians. It equally examines how this noise affects communication flow in online debate on pornography in the Nigerian film industry. It argues that being somewhat considerable, noise in such a communication context, is mainly psychological in nature, due principally to the dominance of conservative beliefs on sex and pornography in the Nigerian society. This conservatism motivates most Nigerians to mainly have preconceived stereotypes, notions and biases on sex and pornography and to adopt judgmental and censuring reactions to most attempts to celebrate pornography. The effect of the psychological noise (as observed in online conversation on pornography) is mainly to orchestrate a change of topic from sex to other sensitive issues as politics and religion or engender insults and counter insults which further negatively affect communication.

[...] Read more.
Early Detection and Classification of Melanoma Skin Cancer

By Abbas Hanon. Alasadi Baidaa M.ALsafy

DOI: https://doi.org/10.5815/ijitcs.2015.12.08, Pub. Date: 8 Nov. 2015

Melanoma is a form of cancer that begins in melanocytes (cells that make the pigment melanin). It can affect the skin only, or it may spread to the organs and bones. It is less common, but more serious and aggressive than other types of skin cancer. Melanoma can be of benign or malignant. Malignant melanoma is the dangerous condition, while benign is not. In order to reduce the death rate due to malignant melanoma skin cancer, it is necessary to diagnose it at an early stage.
In this paper, a detection system has been designed for diagnosing melanoma in early stages by using digital image processing techniques. The system consists of two phases: the first phase detects whether the pigmented skin lesion is malignant or benign; the second phase recognizes malignant melanoma skin cancer types. Both first and second phases have several stages. The experimental results are acceptable.

[...] Read more.
A Review of Various Transform Domain Digital Image Fusion for Multifocus Colored Images

By Arun Begill Sankalap Arora

DOI: https://doi.org/10.5815/ijitcs.2015.12.09, Pub. Date: 8 Nov. 2015

Image fusion is the idea to enhance the image content by fusing two or more images obtained from visual sensor network. The main goal of image fusion is to eliminate redundant information and merging more useful information from source images. Various transform domain image fusion methods like DWT, SIDWT and DCT, ACMax DCT etc. are developed in recent years. Every method has its own advantages and disadvantages. ACMax Discrete cosine transform (DCT) is very efficient approach for image fusion because of its energy compaction property as well as improve quality of image. Furthermore, this technique has also some disadvantages like color artifacts, noise and degrade the sharpness of edges. In this paper ACMax DCT method is integrated with saturation weighting and Joint Trilateral filter to get the high quality image and compare with traditional methods. The results have shown that ACMax DCT with Saturation weighting and Joint Trilateral filter method has outperformed the state of art techniques.

[...] Read more.
Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

By N. Senthil Kumar Anthoniraj Amalanathan

DOI: https://doi.org/10.5815/ijitcs.2015.12.10, Pub. Date: 8 Nov. 2015

Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner. The development of this build up will result in tight coupling of authorization mechanisms within the enterprise applications. In many enterprises setup, the implicit authorization processes are embedded within the application and promote error prone accessing of requested policies. This sort of embedded authorization will let the users to carry out the specific actions without knowing the access control policy as well as its embedded setup with the help of third party involvement. But this approach has some serious effects in controlling the issues such as skipping the trust based applications, violates the policy setups and pave the way to exploit the authorized data to the end users. Many enterprises had faced serious problem in controlling its sensitive data from this implicit authorization decisions and hence decided to develop a security mechanism which can be totally controlled by centralized way of access policy. Therefore, the eXtensible Access Control Markup Language (XACML) provides a very simple and powerful remedy for authorization mechanism and for the access policy set ups.

[...] Read more.