School period for teenagers can be considered as a challenging and critical stage for them. This is because, at this stage, many teenagers facing a challenge of identity crisis and intend to explore and addicted to the internet easily. Overuse the internet may lead to an individual psychology include mental and emotional. The field of cyberpsychology is the fastest growing technology and closely related to the study of cyber behavior. The goal of the study to examine the relevant cyberpsychology factors which is Impulsivity, Passions, Social Provision that leads into Internet Addiction behavior among school teenagers. Study and understanding the cyberpsychology factors associated with Internet Addiction is important to predict and diagnose the condition of an individual.
{"title":"The Cyberpsychology Factors of Internet Addiction among School Teenagers","authors":"Siti Nubailah Mohd Yusof, S. H. Othman","doi":"10.11113/IJIC.V8N3.193","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.193","url":null,"abstract":"School period for teenagers can be considered as a challenging and critical stage for them. This is because, at this stage, many teenagers facing a challenge of identity crisis and intend to explore and addicted to the internet easily. Overuse the internet may lead to an individual psychology include mental and emotional. The field of cyberpsychology is the fastest growing technology and closely related to the study of cyber behavior. The goal of the study to examine the relevant cyberpsychology factors which is Impulsivity, Passions, Social Provision that leads into Internet Addiction behavior among school teenagers. Study and understanding the cyberpsychology factors associated with Internet Addiction is important to predict and diagnose the condition of an individual.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"45 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89199424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The deployment of Linear Wireless Sensor Network (LWSN) in underwater environment has attracted several research studies in the underwater data collection research domain. One of the major issues in underwater data collection is the lack of robust structure in the deployment of sensor nodes. The challenge is more obvious when considering a linear pipeline that covers hundreds of kilometers. In most of the previous work, nodes are deployed not considering heterogeneity and capacity of the various sensor nodes. This lead to the problem of inefficient data delivery from the sensor nodes on the underwater pipeline to the sink node at the water surface. Therefore, in this study, an Enhanced Underwater Linear Wireless Sensor Network Deployment (EULWSND) has been proposed in order to improve the robustness in linear sensor underwater data collection. To this end, this paper presents a review of related literature in an underwater linear wireless sensor network. Further, a deployment strategy is discussed considering linearity of the underwater pipeline and heterogeneity of sensor nodes. Some research challenges and directions are identified for future research work. Furthermore, the proposed deployment strategy is implemented using AQUASIM and compared with an existing data collection scheme. The result demonstrates that the proposed EULWSND outperforms the existing Dynamic Address Routing Protocol for Pipeline Monitoring (DARP-PM) in terms of overhead and packet delivery ratio metrics. The scheme performs better in terms of lower overhead with 17.4% and higher packet delivery with 20.5%.
{"title":"An Enhanced Underwater Linear Wireless Sensor Network Deployment Strategy for Data Collection","authors":"Z. Ahmed, K. A. Bakar","doi":"10.11113/IJIC.V8N3.195","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.195","url":null,"abstract":"The deployment of Linear Wireless Sensor Network (LWSN) in underwater environment has attracted several research studies in the underwater data collection research domain. One of the major issues in underwater data collection is the lack of robust structure in the deployment of sensor nodes. The challenge is more obvious when considering a linear pipeline that covers hundreds of kilometers. In most of the previous work, nodes are deployed not considering heterogeneity and capacity of the various sensor nodes. This lead to the problem of inefficient data delivery from the sensor nodes on the underwater pipeline to the sink node at the water surface. Therefore, in this study, an Enhanced Underwater Linear Wireless Sensor Network Deployment (EULWSND) has been proposed in order to improve the robustness in linear sensor underwater data collection. To this end, this paper presents a review of related literature in an underwater linear wireless sensor network. Further, a deployment strategy is discussed considering linearity of the underwater pipeline and heterogeneity of sensor nodes. Some research challenges and directions are identified for future research work. Furthermore, the proposed deployment strategy is implemented using AQUASIM and compared with an existing data collection scheme. The result demonstrates that the proposed EULWSND outperforms the existing Dynamic Address Routing Protocol for Pipeline Monitoring (DARP-PM) in terms of overhead and packet delivery ratio metrics. The scheme performs better in terms of lower overhead with 17.4% and higher packet delivery with 20.5%.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"41 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87484627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we have presented a new hybrid optimization method called hybrid Electro-Search algorithm (Eo) and Flower Pollination Optimization Algorithm (FPA) which introduces Eo to FPA. EO-FPA combines the merits of both Eo and FPA by designing on the local-search strategy from Eo and global-search strategy from FPA. The results of the experiments performed with twenty-two well-known benchmark functions show that the proposed algorithm possesses outstanding performance in statistical merit as compared to the original and variant FPA. It is proven that the EO-FPA algorithm requires better formulation to achieve efficiency and high performance to work out with global optimization problems.
{"title":"A Hybrid Algorithm Based on Flower Pollination Algorithm and Electro Search for Global Optimization","authors":"Fadil Md Esa, N. Mustaffa, N. Radzi","doi":"10.11113/ijic.v8n3.216","DOIUrl":"https://doi.org/10.11113/ijic.v8n3.216","url":null,"abstract":"In this paper, we have presented a new hybrid optimization method called hybrid Electro-Search algorithm (Eo) and Flower Pollination Optimization Algorithm (FPA) which introduces Eo to FPA. EO-FPA combines the merits of both Eo and FPA by designing on the local-search strategy from Eo and global-search strategy from FPA. The results of the experiments performed with twenty-two well-known benchmark functions show that the proposed algorithm possesses outstanding performance in statistical merit as compared to the original and variant FPA. It is proven that the EO-FPA algorithm requires better formulation to achieve efficiency and high performance to work out with global optimization problems.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"21 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90684278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Myoelectric control prostheses hand are currently popular developing clinical option that offers amputee person to control their artificial hand by analyzing the contacting muscle residual. Myoelectric control system contains three main phase which are data segmentation, feature extraction and classification. The main factor that affect the performance of myoelectric control system is the choice of feature extraction methods. There are two types of feature extraction technique used to extract the signal which are the Hudgins feature consist of Zero Crossing, Waveform Length (WL), Sign Scope Change (SSC) and Mean Absolute Value (MAV), the single Root Mean Square (RMS). Then, the combination of both is proposed in this study. An analysis of these different techniques result were examine to achieve a favorable classification accuracy (CA). Our outcomes demonstrate that the combination of RMS and Hudgins feature set demonstrate the best average classification accuracy for all ten fingers developments. The classification process implemented in this studies is using Support Vector Machine (SVM) technique.
{"title":"Electromyography (EMG) based Classification of Finger Movements using SVM","authors":"Nurazrin Mohd Esa, A. Zain, M. Bahari","doi":"10.11113/IJIC.V8N3.181","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.181","url":null,"abstract":"Myoelectric control prostheses hand are currently popular developing clinical option that offers amputee person to control their artificial hand by analyzing the contacting muscle residual. Myoelectric control system contains three main phase which are data segmentation, feature extraction and classification. The main factor that affect the performance of myoelectric control system is the choice of feature extraction methods. There are two types of feature extraction technique used to extract the signal which are the Hudgins feature consist of Zero Crossing, Waveform Length (WL), Sign Scope Change (SSC) and Mean Absolute Value (MAV), the single Root Mean Square (RMS). Then, the combination of both is proposed in this study. An analysis of these different techniques result were examine to achieve a favorable classification accuracy (CA). Our outcomes demonstrate that the combination of RMS and Hudgins feature set demonstrate the best average classification accuracy for all ten fingers developments. The classification process implemented in this studies is using Support Vector Machine (SVM) technique.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"14 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75506758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siti Fadzlun Md Salleh, M. F. Rohani, M. A. Maarof
Copy-move forgery detection (CMFD) has become a popular an important research focus in digital image forensic. Copy-move forgery happens when a region in an image is copied and paste into the same image. Apart from the main problem of detection robustness and accuracy, CMFD is struggle with time complexity issue. One of the options to resolve this problem was by including pre-processing step in CMFD pipeline. This paper reviews on the importance of pre-processing step, and available techniques in reducing time complexity of copy-move forgery detection. An experiment using discrete wavelet transform (DWT) as a pre-processing technique was carried out to evaluate the performance of adopting pre-processing technique in CMFD pipeline. The experimental result has shown a significant reduction in processing time with some trade off to detection accuracy.
{"title":"Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques","authors":"Siti Fadzlun Md Salleh, M. F. Rohani, M. A. Maarof","doi":"10.11113/IJIC.V8N3.213","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.213","url":null,"abstract":"Copy-move forgery detection (CMFD) has become a popular an important research focus in digital image forensic. Copy-move forgery happens when a region in an image is copied and paste into the same image. Apart from the main problem of detection robustness and accuracy, CMFD is struggle with time complexity issue. One of the options to resolve this problem was by including pre-processing step in CMFD pipeline. This paper reviews on the importance of pre-processing step, and available techniques in reducing time complexity of copy-move forgery detection. An experiment using discrete wavelet transform (DWT) as a pre-processing technique was carried out to evaluate the performance of adopting pre-processing technique in CMFD pipeline. The experimental result has shown a significant reduction in processing time with some trade off to detection accuracy.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"18 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81815496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Ali Nassiri Abrishamchi, A. Cheok, A. Abdullah, K. Bielawski
Always-on cameras, microphones, and devices are increasingly intruding on private environments due to their promising applications in regard with the better quality of life. But they can also be exploit by adversaries as surveillance systems, introducing a matter of concern for privacy. Intruders can observe and record in-home activities for further malicious aims. Due to this vulnerability, it is important that privacy issue in this case, being addressed properly. Since perception of privacy varies among different cultures, privacy priorities of each culture should be investigated separately. In order to provide a better insight into Malaysians opinions about their highly private in-home activities for designers of visual smart household systems, we conducted an anonymous survey with 217 respondents. In this paper, we discuss the outcomes of our survey in order to provide a reference for engineers working for the Malaysian market.
{"title":"In-Home Surveillance Systems and Privacy Considerations for Malaysians: A Survey","authors":"Mohammad Ali Nassiri Abrishamchi, A. Cheok, A. Abdullah, K. Bielawski","doi":"10.11113/IJIC.V8N3.198","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.198","url":null,"abstract":"Always-on cameras, microphones, and devices are increasingly intruding on private environments due to their promising applications in regard with the better quality of life. But they can also be exploit by adversaries as surveillance systems, introducing a matter of concern for privacy. Intruders can observe and record in-home activities for further malicious aims. Due to this vulnerability, it is important that privacy issue in this case, being addressed properly. Since perception of privacy varies among different cultures, privacy priorities of each culture should be investigated separately. In order to provide a better insight into Malaysians opinions about their highly private in-home activities for designers of visual smart household systems, we conducted an anonymous survey with 217 respondents. In this paper, we discuss the outcomes of our survey in order to provide a reference for engineers working for the Malaysian market.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"12 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88778926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lim Kah Seng, N. Ithnin, Syed Zainudeen Mohd Shaid
Automated web application penetration testing has emerged as a trend. The computer was assigned the task of penetrating web application security with penetration testing technique. Relevant computer program reduces time, cost, and resources required for assessing a web application security. At the same time, scaling down tester reliance on human knowledge. Web application security scanner is such kind of program that is designed to assess web application security automatically with penetration testing technique. The downside is that computer is not well-formed as human. Consequently, web application security scanner often found generating the false alarms, especially in a testing environment, which web application source codes are unreachable. Thus, in this paper, the state-of-the-art of black box web application security scanner is systematically reviewed, to investigate the approaches for detecting web application vulnerability in an ambiguous testing environment. This survey is critical in providing insights on how to design efficient algorithms for assessing web application security with penetration testing technique in the ambiguous environment.
{"title":"Automating Penetration Testing Within Ambiguous Testing Environment","authors":"Lim Kah Seng, N. Ithnin, Syed Zainudeen Mohd Shaid","doi":"10.11113/IJIC.V8N3.180","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.180","url":null,"abstract":"Automated web application penetration testing has emerged as a trend. The computer was assigned the task of penetrating web application security with penetration testing technique. Relevant computer program reduces time, cost, and resources required for assessing a web application security. At the same time, scaling down tester reliance on human knowledge. Web application security scanner is such kind of program that is designed to assess web application security automatically with penetration testing technique. The downside is that computer is not well-formed as human. Consequently, web application security scanner often found generating the false alarms, especially in a testing environment, which web application source codes are unreachable. Thus, in this paper, the state-of-the-art of black box web application security scanner is systematically reviewed, to investigate the approaches for detecting web application vulnerability in an ambiguous testing environment. This survey is critical in providing insights on how to design efficient algorithms for assessing web application security with penetration testing technique in the ambiguous environment.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"53 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78200636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noor Irliana Mohd Rahim, A. Abdul Rahman, Noorminshah A. Iahad
In recent decades, working from home (WFH) method has spread their wings beyond of normal boundaries for many sectors in working organization. Work nowadays can be categorized as “unbounded activity” environment and freely conducted at anywhere and anytime. In Malaysia as a developing country, WFH approach is not being implemented widely but there are limited group who has implement WFH unofficially after having an agreement from organization. This research study will cover the important elements for implementing WFH in HEI context. The elements are not limited on HEI context but it able to be use in other field. The university itself will be an organization who involving the employees as well as the employers. To understand more about WFH requirement, current issues and required WFH approach from organization will be consider. The overview of elements consideration will be discussed and a conceptual model is derived to support WFH for HEI. At the end of the study, a framework will be developed in order to support above elements for both employees and employers in the organization itself. The aim of this study is to increase productivity, efficiency and quality of work while the organization allows a flexible working style such as WFH to the lecturers in HEI. The result of this paper is to derive a conceptual model, which are the main elements in conducting WFH for the whole research study.
{"title":"The Overview for Implementing Work from Home (WFH) in Malaysia Higher Education Institution (HEI) Context","authors":"Noor Irliana Mohd Rahim, A. Abdul Rahman, Noorminshah A. Iahad","doi":"10.11113/ijic.v8n3.182","DOIUrl":"https://doi.org/10.11113/ijic.v8n3.182","url":null,"abstract":"In recent decades, working from home (WFH) method has spread their wings beyond of normal boundaries for many sectors in working organization. Work nowadays can be categorized as “unbounded activity” environment and freely conducted at anywhere and anytime. In Malaysia as a developing country, WFH approach is not being implemented widely but there are limited group who has implement WFH unofficially after having an agreement from organization. This research study will cover the important elements for implementing WFH in HEI context. The elements are not limited on HEI context but it able to be use in other field. The university itself will be an organization who involving the employees as well as the employers. To understand more about WFH requirement, current issues and required WFH approach from organization will be consider. The overview of elements consideration will be discussed and a conceptual model is derived to support WFH for HEI. At the end of the study, a framework will be developed in order to support above elements for both employees and employers in the organization itself. The aim of this study is to increase productivity, efficiency and quality of work while the organization allows a flexible working style such as WFH to the lecturers in HEI. The result of this paper is to derive a conceptual model, which are the main elements in conducting WFH for the whole research study.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"90 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83548522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The process for analyzing and extracting useful information from a large database that employs one or more machine learning techniques is Data Mining. There are many data mining methods that can be used in a variety of data patterns. One of them is prediction modeling. This study compares several data mining performance methods for prediction such as Naïve Bayes, Random Tree, J48, and Rough Set to get the most powerful classifier to extract the knowledge of air pollution data. The parameters being used for observation in the performance of the prediction methods are correctly and incorrectly classified instances, the time taken, and kappa statistic. The experimental result reveals that Rough Set is extremely good for classifying the Air Pollutant Index (API) data from Malaysia and Singapore. Rough Set has the lowest error and the highest performance compared to other methods with the accuracy more than 97%.
{"title":"Comparison of Prediction Methods for Air Pollution Data in Malaysia and Singapore","authors":"Merlinda Wibowo, Sarina Sulaiman, S. Shamsuddin","doi":"10.11113/IJIC.V8N3.202","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.202","url":null,"abstract":"The process for analyzing and extracting useful information from a large database that employs one or more machine learning techniques is Data Mining. There are many data mining methods that can be used in a variety of data patterns. One of them is prediction modeling. This study compares several data mining performance methods for prediction such as Naïve Bayes, Random Tree, J48, and Rough Set to get the most powerful classifier to extract the knowledge of air pollution data. The parameters being used for observation in the performance of the prediction methods are correctly and incorrectly classified instances, the time taken, and kappa statistic. The experimental result reveals that Rough Set is extremely good for classifying the Air Pollutant Index (API) data from Malaysia and Singapore. Rough Set has the lowest error and the highest performance compared to other methods with the accuracy more than 97%.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"9 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78126072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maged Nasser, Hentabli Hamza, N. Salim, Faisal Saeed
The urge of producing new chemical compounds under eco-friendly production restriction and with minimum side effects is significantly rising, considering the difficulties that conventional methods are dealing with, from financial investments and being time consuming to multi resistance microorganisms and untreatable diseases. Rational molecular design methods like Computer Aided Molecular Design (CAMD) and Quantitative Structure Activity Relationship (QSAR) allow the production of new substances with pre-decided properties and correlate the structure to biological activity, which influences the drug development process and minimizes the financial investment involved in the process. QSAR employs several descriptors to decode the molecular configuration of a compound, which facilitate the understanding of its physical and biological properties. There are various conditions such as the selection of compounds and descriptors that must be accomplished for developing an applicable model of QSAR. The underlining principles and steps of QSAR are explained in this review paper.
{"title":"The Measurement of Molecular Biological Activity based on Quantitative Structure Activity Relationships","authors":"Maged Nasser, Hentabli Hamza, N. Salim, Faisal Saeed","doi":"10.11113/IJIC.V8N3.185","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.185","url":null,"abstract":"The urge of producing new chemical compounds under eco-friendly production restriction and with minimum side effects is significantly rising, considering the difficulties that conventional methods are dealing with, from financial investments and being time consuming to multi resistance microorganisms and untreatable diseases. Rational molecular design methods like Computer Aided Molecular Design (CAMD) and Quantitative Structure Activity Relationship (QSAR) allow the production of new substances with pre-decided properties and correlate the structure to biological activity, which influences the drug development process and minimizes the financial investment involved in the process. QSAR employs several descriptors to decode the molecular configuration of a compound, which facilitate the understanding of its physical and biological properties. There are various conditions such as the selection of compounds and descriptors that must be accomplished for developing an applicable model of QSAR. The underlining principles and steps of QSAR are explained in this review paper.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"10 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84804779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}