"Annals. Computer Science Series" Journal
Romania, 300559 Timişoara, 6 Lascăr Catargiu str.
Phone: 004 0256 220 687 | Fax: 004 0256 220 690
E-mail: conference.fcia [@] tibiscus [.] ro | conference.fcia [@] gmail [.] com



Web design:
Ovidiu Crista
Updating:
Tiberiu Marius Karnyanszky
Editor-in-Chief

Annals. Computer Science Series
Tome 15, Fasc. 2


ISSN: 1583-7165 (printed journal)
ISSN: 2065-7471 (e-journal)
Owner: "Tibiscus" University of Timişoara, România
Editor: Mirton Publishing House of Timişoara, România
Distributor: "Tibiscus" University of Timişoara, România
Appearance: December, 2017


Next papers follows the review process for the Journal inclusion:

  • Abhinaw Anand, Dr. Sumathy Eswaran - A Survey of Open Source Learning Management Systems
  • Hambali Moshood Abiola, Akinyemi Adesina A. , Luka Joy D. - Expert System For Lassa Fever Diagnosis Using Rule Based Approach
  • Saheed Y.K., Arowolo M.O., Ibrahim S.A. - Artificial Neural Network For Breast Cancer Diagnosis
  • Nacer Ghadbane - A Construction and Representation of some Variable Length Codes
  • A. Audu, A. A. Adewara - Efficiency Of Audu & Adewara (2017) Two-Phase Factor-Type Estimators With Two Auxiliary Variables In Sample Survey
  • Fashoto, SG, Ogunleye, GO, Adabara, I. - Evaluation of Network and Systems Security using Penetration Testing in a Simulation Environment
  • Taye T. Alawode, Kehinde O. Alawode - Structural Elucidation of Guaiane Sesquiterpenes from 13C Data using Generalized Regression Neural Network (GRNN) and Scatter Plots Methods
  • G. Ojemeri, S. Abdulsalam, J. F. Yayock - Mathematical Modeling of Radiative Heat Source and Magnetic Field Effects on Free Convection Flow Embedded in a Moving Vertical Permeable Plate in the Presence of Porous Medium
  • Y.K. Saheed, K. A. Gbolagade - Chinese Remainder Theorem Based Domain Name Security System
  • Bashiru Kehinde Adekunle, Fasoranbaku A.O., Adebimpe Olukayode and Ojurongbe T.A. - Stability analysis of Mother – to – Child Transmission of HIV/AIDS Dynamic Model with Treatment
  • Ifeyinwa Vivian Omekam, Adebowale Olusola Adejumo - Derivations for the Families of Generalized Distributions
  • Mohd Nazri Ismail - Implementation of Intrusion Detection System (IDS) to Prevent and Detect Multiple Attacks
  • Popoola, Osuolale Peter and Afolabi, Mary Antinuke - Factorial analysis to investigate the effect of different levels of NPK fertilizer application on the yield of white yam
  • Abikoye Oluwakemi Christiana, Garba Qudus Adeshola, Akande Noah Oluwatobi - Implementation of Textual Information Encryption using 128, 192 and 256 Bits Advanced Encryption Standard Algorithm
  • Yakubu A. Ibrahim, Tunji S. Ibiyemi - Automatic Speech Recognition using MFCC in Feature Extraction Based HMM for Human Computer Interaction in Hausa
  • Oloyede I. - Bootstrapping Supervised classifier paradigm
  • Agunbiade D.A., Adesina O.S. - Modeling Claims of Oil & Gas Nigeria Insurance Class of Business with Extreme Value Theory
  • K.O. Aremu, A.H. Ibrahim, S. Buoro, F.A. Akinola - Pattern Popularity in Γ1 − Non Deranged Permutations: An Algebraic and Algorithmic Approach
  • I. A. Osinuga, S. O. Yusuff - Construction Of A Broyden-Like Method For Nonlinear Systems Of Equations
  • Zakari, Y., Yau, S. A., Usman, U. - Handling Multicollinearity; A Comparative Study Of The Prediction Performance Of Some Methods Based On Some Probabiltiy Distributions
  • Muhsin Hassanu Saleh, Mukhtar Bello - Online Hospital Management System

    Next papers follows the Journal publication process:

  • Le Trung Hieu - Integrating Science in Mathematics Teaching in Vietnamese Elementary Schools
  • Abdul Orunsolu - A Smart phone-based Phishing Detector app for Electronic mails
  • Zakir Hussain, Syed Raziuddin - Completely Informed Artificial Bee Colony for Dynamic Problems and Optimal Sensor Placement
  • Paridhi Singh, Prapti Goyal,Varun S Gajendragadkar, Sayantan Pal, Vignesh S, Supreeta Balasubramanian, Sanjiban Sekhar Roy - Model analysis on Job Shop Scheduling in automobile industry using Ant Colony Optimization and Particle Swarm Optimization
  • Moses Timothy, Odey Adinye John, Okwori Anthony Okpe - An Enhanced Round Robin Virtual Machine Load Balancer for Cloud Infrastructure
  • Muhammad Farooq, Waqas Mehmood - Web 3.0 for E-Commerce Portal


    » An Enhanced Algorithm for Constructing Optimal Space-Filling Designs using Hadamard Matrices of Orders 4λ and 8λ

    » Kazeem A. Osuolale, Babatunde L. Adeleke and Waheed B. Yahya

    ABSTRACT:

    Orthogonal array Latin hypercube designs have become popular in practice among strategies used for developing computer experiments. Hadamard matrices have been used to construct orthogonal arrays based on the connection between Hadamard matrices and orthogonal arrays (OAs). A Hadamard matrix is a square matrix of +1 and -1 whose rows are orthogonal. This study aimed at proposing an enhanced algorithm that employed the maximin criterion in the k-Nearest Neighbour with Euclidean distance for constructing optimal space-filling design called Orthogonal Array Latin Hypercube Design (OALHD). Orthogonal arrays (OAs) were constructed from Hadamard matrices of orders 4λ and 8λ which are subsequently used to construct the desired OALHD. The Orthogonal array (n, k) Latin hypercube designs were constructed at parameter values of OA (n, k, s, t, λ) = (8, 7, 2, 2, 2) and (16, 8, 2, 3, 2). The OA (8, 7) LHD and OA (16,8) LHD constructed have better space-filling properties and they achieve uniformity in each dimension. MATLAB 2015 computer package was used for the development of the algorithm that constructs the OALHDs.

    KEYWORDS:

    Computer experiments, Hadamard matrices, Latin hypercube designs, Orthogonal array, Space-filling designs.

    » Received: 20 November 2016
    » Accepted: 21 July 2017

    9 - 17

    imag/pdf.ico.gif PDF

    » Development Teachers’ Mathematics Competency through Teaching Complex Numbers in High School in Vietnam

    » Tran Trung Tinh

    ABSTRACT:

    In teaching mathematics at high schools, the mathematics competency of teacher is an important procedure in teaching process. This paper, I pointed out some application of complex numbers in mathematics. And i hope it will help the teachers to develop high school their mathematics competency in Vietnam.

    KEYWORDS:

    Teachers’ mathematics competency, complex numbers, teaching methods.

    » Received: 23 May 2016
    » Accepted: 07 August 2017

    18 - 23

    imag/pdf.ico.gif PDF

    » Teaching Mathematical Modelling: Connecting to Classroom and Practice

    » Tran Viet Cuong and Le Hong Quang

    ABSTRACT:

    Teaching through the application of mathematical modelling has been concerned in recent years in Vietnam high schools. In which it clearly shows the application of the mathematical modelling with parts of life. This paper mentions to teaching and learning the AM-GM inequality and its application from theory and practice.

    KEYWORDS:

    Mathematical modelling, mathematics teaching methods, the AM-GM Inequality, theoretical and practical.

    » Received: 27 April 2017
    » Accepted: 07 August 2017

    24 - 28

    imag/pdf.ico.gif PDF

    » Contemporary Issues in Cognitive Radio Network

    » R. O. Oladele and Damilola N. Ajobiewe

    ABSTRACT:

    The paper examines contemporary issues with cognitive radio networks as it relates to spectrum scarcity and the demand of users. With recent advancement in technology and increase in the need for wireless communication systems, this has given rise to search for desirable spectrum bands for transmission. Cognitive Radios renders an answer to the trouble by sensing the idle (licensed) bands and allowing (secondary) users to broadcast and transmit in these idle spaces. Spectrum sensing forms the main block of cognition cycle. However research has shown by previous researchers that radio spectrums are being under- utilized in most cases. This paper attempts to profound a solution to efficient and effective spectrum utilization has identified the current challenges and issues faced by spectrum sensing for cognitive networks. The principal issues with cognitive radios are that it should not interfere with the primary users and should vacate the band when it is required. For this sole reason, energy detector system model was used in this paper and performance evaluation was calculated. The performance evaluation is done for cooperative spectrum sensing schemes under non fading environment This paper provides a clear understanding of cognitive radio technology, and its role in national development. Then several challenges and security issues are discussed.

    KEYWORDS:

    Cognitive Radio; Spectrum Sensing; Primary Users; Secondary Users; Wireless Communication; Spectrum Hole; Cognitive Cycle; Cognitive Capabilities.

    » Received: 26 May 2017
    » Accepted: 07 August 2017

    29 - 33

    imag/pdf.ico.gif PDF

    » Machine to Man Communication in Yoruba Language

    » Abimbola Akintola and Tunji Ibiyemi

    ABSTRACT:

    Man communicates with man by natural language, sign language, or/and gesture but communicates with machine via electromechanical devices such as mouse, and keyboard. The media of effecting machine to man be enhanced using language technology. This paper proposed a man to machine communication through Text-To-Speech system for Yoruba language. The process used involves text analysis, natural language processing and digital signal processing. The developed system shows an exhaustive representation of Yoruba language through concatenation of possible syllables in the language. The proposed model was evaluated using mean opinion score. Results showed a significant performance with an average of 92% for similarity and naturalness in the samples.

    KEYWORDS:

    Tex-To-Speech, Yoruba Language, Syllable Structure, Similarity, Naturalness, Communication.

    » Received: 22 June 2017
    » Accepted: 17 August 2017

    34 - 42

    imag/pdf.ico.gif PDF

    » Efficient RSA Cryptosystem Decryption Based on Chinese Remainder Theorem and Strong Prime

    » Saheed Yakub Kayode and Gbolagade Kazeem Alagbe

    ABSTRACT:

    Number theory has turned out to be one of the useful when it comes to computer security. For instance, number theory helps to protect sensitive data such as credit card numbers when you shop online, when online transactions is performed. The prime application of it’s is in the RSA cryptosystem. Rivest Shamir Adleman (RSA) algorithm is known to be a slower algorithm. The modular arithmetic in RSA is computationally expensive. In view of this, it has become a major challenge to implement RSA decryption in a faster manner. In this paper, we proposed an efficient method to implement RSA decryption based on Chinese Remainder Theorem and Strong prime. Three different operations, primitive traditional method, Chinese Remainder Theorem method and Chinese Remainder Theorem and strong prime criterion were used for comparisons. Our proposal achieves about 60% computational cost reduction of traditional method using Chinese Remainder method. More interesting, if the method based on Chinese Remainder Theorem and strong prime is implemented, about 84% computational cost can be reduced. Also, comparing to the Chinese Remainder method, the method based on Chinese Remainder Theorem and strong prime of RSA criterion takes about 37% of computational cost, almost 3.2 times faster than the Chinese Remainder Theorem based method. Theoretically, it was observed that our scheme is faster and it is also cheaper.

    KEYWORDS:

    RSA, RSA-CRT, Number theory, computational cost, CRT-strong prime criterion.

    » Received: 31 May 2017
    » Accepted: 07 August 2017

    43 - 47

    imag/pdf.ico.gif PDF

    » Comparative Analysis of the Efficiencies on Methods of Handling Multicollinearity in Regression Analysis

    » E. O. Ogunjobi, D. A. Agunbiade and O. A. Ayansola

    ABSTRACT:

    This paper considers three different approaches of handling multicollinearity in regression analysis using economic data. These techniques were applied to study determinants of money supply of the sector of the economy. The goal is to determine which of the economic variables included in the factors that influence money supply (either in the broad ‘M1’ or the narrow ‘M2’sense) is not actually contributing to the effect of money supply by monetary authority of the sector of the economy. A comparative analysis of the three methods using the adjusted R2 , Mean Square Error and Root Mean Error, as the statistics criteria, revealed that the result obtained from the Ridge Regression gave the outstanding performance as compared with the other two techniques. On the overall, it was found that the Ridge Regression performed best, followed by Principal Component Regression, while Latent Root Regression performed least.

    KEYWORDS:

    Multicollinearity, Ordinary Least Squares, Principal Component Regression, Latent Root Regression and Ridge Regression

    » Received: 01 July 2017
    » Accepted: 31 August 2017

    48 - 55

    imag/pdf.ico.gif PDF

    » Two-Phase Sampling for Stratification: Application to Software Industry

    » D. A. Agunbiade, S. O. Folorunso, K.-K. A. Abdullah and P. I. Ogunyinka

    ABSTRACT:

    Many authors have applied Two-Phase Sampling for Stratification (TFSS) to different areas of specialization. It was observed that such application is yet to be extended to the software industry. This research applied TFSS to the comparison of the two software types, Free and Open Source Software (FOSS) and Proprietary Software (PS). The estimated FOSS mean (4.5749) compared to PS mean (3.6390) revealed that FOSS is more rated than PS. The minimum estimated variance in FOSS (0.0046) over PS (0.0484) showed that FOSS is efficient than PS. The relative efficiency further confirmed that FOSS is 1052.17% efficient over PS. FOSS user rating has higher precision with Coefficient of Variation (CV) of 0.0148 as against PS user rating CV of 0.0605. It was, finally, concluded that FOSS is efficiently rated than PS by the software users.

    KEYWORDS:

    Two-phase Sampling for Stratification, User rating, Free-and-Open-Source Software, Proprietary Software

    » Received: 11 July 2017
    » Accepted: 31 August 2017

    56 - 60

    imag/pdf.ico.gif PDF

    » A Comparative Survey of DTW And HMM using Hausa Isolated Digits Recognition in Human Computer Interaction System

    » Yakubu A. Ibrahim and Tunji S. Ibiyemi

    ABSTRACT:

    Speech Recognition is a vital part of different computer-based applications in communication and security systems. However, there has been very little research in the aspect of speech Human Computer Interaction system for African languages such as Hausa, hence, the need to extend the research in order to bring in, the different systems based on speech recognition. Also, Hausa is an important ethnic tribe of lingua franca in both west and central Africa countries. Isolated word recognition is an easy speech type because it demands the user to pause between each word. In this study, the two algorithms that were used to implement a system of Recognition of Hausa isolated digits are Dynamic Time Warping and Hidden Markov Model. To perform the recognition efficiently, speech endpoint, framing blocking, speech normalization, vector quantization and Mel Frequency Cepstral Coefficient techniques were used to process the speech. The accuracy of about 94% was obtained for recognition with HMM-based system. In a very noisy environment, the performance of the two techniques is bad but the pattern matching using HMM is better than the pattern matching using DTW.

    KEYWORDS:

    DTW, Hausa Language, HMM, Speech Recognition, MFCC.

    » Received: 9 June 2017
    » Accepted: 31 August 2017

    61 - 67

    imag/pdf.ico.gif PDF

  • 
    » www.fcia.tibiscus.ro |  » www.ccsitia.tibiscus.ro |  » www.geogebra.tibiscus.ro |  » www.tibiscus.ro |  © 2003-2017, Last update: 10.10.2017 / 13:30