Pub Date : 2018-12-31DOI: 10.5121/IJCSES.2018.9601
Eman Mohamed Nabil Alkholy, M. Haggag, A. Aboutabl
computing environment In real world that using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems ,that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , so this survey paper provides an overview on what Question-Answering is and its system ,as well as the previous related research with respect to approaches that were followed.
{"title":"Question Answering Systems: Analysis and Survey","authors":"Eman Mohamed Nabil Alkholy, M. Haggag, A. Aboutabl","doi":"10.5121/IJCSES.2018.9601","DOIUrl":"https://doi.org/10.5121/IJCSES.2018.9601","url":null,"abstract":"computing environment In real world that using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems ,that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , so this survey paper provides an overview on what Question-Answering is and its system ,as well as the previous related research with respect to approaches that were followed.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-30DOI: 10.5121/ijcses.2018.9501
C. ChethanK, G. BasavarajuT
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
{"title":"Performance Analysis of Wireless Mesh Network Using Adaptive Informant Factor Based Optimized Channel Allocation","authors":"C. ChethanK, G. BasavarajuT","doi":"10.5121/ijcses.2018.9501","DOIUrl":"https://doi.org/10.5121/ijcses.2018.9501","url":null,"abstract":"Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115999257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-30DOI: 10.5121/IJCSES.2018.9301
M SomashekharB, Nijagunarya Y.S
{"title":"Face and Fingerprint Fusion System for Identity Authentication Using Fusion Classifiers","authors":"M SomashekharB, Nijagunarya Y.S","doi":"10.5121/IJCSES.2018.9301","DOIUrl":"https://doi.org/10.5121/IJCSES.2018.9301","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116192612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-31DOI: 10.5121/IJCSES.2017.8401
A. Y. Egwoh, O. Nonyelum
Software engineering provides methodologies, concepts and practices, which are used for analyzing, designing, building and maintaining the information in a software industry. Software Development Life Cycle (SDLC) model is an approach used in the software industry for the development of various size projects: small scale projects, medium scale projects and large scale projects. A software project of any size is developed with the co-ordination of development team. It is therefore important to assign resources intelligently to the different phases of the software project by the project manager. This study proposes a model for the spiral development process with the use of a simulator (Simphony.NET), which helps the project manager in determining how to increase the productivity of a software firm with the use of minimum resources (expert team members). This model increase the utilization of different development processes by keeping all development team members busy all the time, which helps in decreasing idle and waste time.
{"title":"A Software System Development Life Cycle Model for Improved Students Communication and Collaboration","authors":"A. Y. Egwoh, O. Nonyelum","doi":"10.5121/IJCSES.2017.8401","DOIUrl":"https://doi.org/10.5121/IJCSES.2017.8401","url":null,"abstract":"Software engineering provides methodologies, concepts and practices, which are used for analyzing, designing, building and maintaining the information in a software industry. Software Development Life Cycle (SDLC) model is an approach used in the software industry for the development of various size projects: small scale projects, medium scale projects and large scale projects. A software project of any size is developed with the co-ordination of development team. It is therefore important to assign resources intelligently to the different phases of the software project by the project manager. This study proposes a model for the spiral development process with the use of a simulator (Simphony.NET), which helps the project manager in determining how to increase the productivity of a software firm with the use of minimum resources (expert team members). This model increase the utilization of different development processes by keeping all development team members busy all the time, which helps in decreasing idle and waste time.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-30DOI: 10.5121/IJCSES.2017.8301
E. Karanja, S. Masupe, Jeffrey Mandu
{"title":"Internet of Things Malware : A Survey","authors":"E. Karanja, S. Masupe, Jeffrey Mandu","doi":"10.5121/IJCSES.2017.8301","DOIUrl":"https://doi.org/10.5121/IJCSES.2017.8301","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"5 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114117332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.5121/IJCSES.2017.8201
S. Umeshini, P. SumathiC.
{"title":"A Survey on Data Mining in Steel Industries","authors":"S. Umeshini, P. SumathiC.","doi":"10.5121/IJCSES.2017.8201","DOIUrl":"https://doi.org/10.5121/IJCSES.2017.8201","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132194640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.5121/IJCSES.2017.8202
Muhamad Azhar Abdilatef AL-Obaidy
This paper presents a study for the orientation effectiveness on the detected areas for many sampled objects when many type of the edges detection are applied. The Canny, Laplace, Prewitt and Sobel are applied for three objects (pencils’ sharpeners with different colors). The MBR (Minimal Bounding Rectangular) are used to calculate the area in pixels, centroid and the orientation. The MR (Misclassification Ratio) is used to find the different between the edges detection techniques. The Canny edges detection technique gives the best result for the three used object using all orientations.
{"title":"Orientation Effectiveness in the Objects Detected Areas Using Different Types of Edges Detection Techniques","authors":"Muhamad Azhar Abdilatef AL-Obaidy","doi":"10.5121/IJCSES.2017.8202","DOIUrl":"https://doi.org/10.5121/IJCSES.2017.8202","url":null,"abstract":"This paper presents a study for the orientation effectiveness on the detected areas for many sampled objects when many type of the edges detection are applied. The Canny, Laplace, Prewitt and Sobel are applied for three objects (pencils’ sharpeners with different colors). The MBR (Minimal Bounding Rectangular) are used to calculate the area in pixels, centroid and the orientation. The MR (Misclassification Ratio) is used to find the different between the edges detection techniques. The Canny edges detection technique gives the best result for the three used object using all orientations.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-28DOI: 10.5121/IJCSES.2017.8101
M. Rhudy, R. Salguero, Keaton Holappa
This paper presents a tutorial on Kalman filtering that is designed for instruction to undergraduate students. The idea behind this work is that undergraduate students do not have much of the statistical and theoretical background necessary to fully understand the existing research papers and textbooks on this topic. Instead, this work offers an introductory experience for students which takes a more practical usage perspective on the topic, rather than the statistical derivation. Students reading this paper should be able to understand how to apply Kalman filtering tools to mathematical problems without requiring a deep theoretical understanding of statistical theory.
{"title":"A Kalman Filtering Tutorial for Undergraduate Students","authors":"M. Rhudy, R. Salguero, Keaton Holappa","doi":"10.5121/IJCSES.2017.8101","DOIUrl":"https://doi.org/10.5121/IJCSES.2017.8101","url":null,"abstract":"This paper presents a tutorial on Kalman filtering that is designed for instruction to undergraduate students. The idea behind this work is that undergraduate students do not have much of the statistical and theoretical background necessary to fully understand the existing research papers and textbooks on this topic. Instead, this work offers an introductory experience for students which takes a more practical usage perspective on the topic, rather than the statistical derivation. Students reading this paper should be able to understand how to apply Kalman filtering tools to mathematical problems without requiring a deep theoretical understanding of statistical theory.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"203 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120886341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.5121/IJCSES.2016.7601
Mohammed Abulamddi
{"title":"A Survey on Techniques Requirements for Integrateing Safety and Security Engineering for Cyber-Physical Systems","authors":"Mohammed Abulamddi","doi":"10.5121/IJCSES.2016.7601","DOIUrl":"https://doi.org/10.5121/IJCSES.2016.7601","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126894882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-30DOI: 10.5121/IJCSES.2016.7501
Mohamed Amoud, O. Roudiès
{"title":"tate of the Art Survey on DSPL Security Challenges","authors":"Mohamed Amoud, O. Roudiès","doi":"10.5121/IJCSES.2016.7501","DOIUrl":"https://doi.org/10.5121/IJCSES.2016.7501","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114511797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}