Next Issue
Volume 5, December
Previous Issue
Volume 5, June
 
 

Computers, Volume 5, Issue 3 (September 2016) – 7 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
6468 KiB  
Article
Fractal Aspects in Classical Parallel Computing
by Mitică Craus, Vlad-Sergiu Bîrlescu and Maricel Agop
Computers 2016, 5(3), 19; https://doi.org/10.3390/computers5030019 - 12 Sep 2016
Viewed by 6825
Abstract
In this paper, we prove that many parallel communication topologies and several parallel algorithms have fractal properties, which leads to the idea that there is a strong connection between the classical parallel computing and a plausible computing on a fractal medium. Furthermore, we [...] Read more.
In this paper, we prove that many parallel communication topologies and several parallel algorithms have fractal properties, which leads to the idea that there is a strong connection between the classical parallel computing and a plausible computing on a fractal medium. Furthermore, we show that some parallel algorithms are suitable for incursive and hyperincursive computation, which links parallel computing to quantum computing and a possible fractal computing. Full article
Show Figures

Figure 1

9330 KiB  
Article
A University-Based Smart and Context Aware Solution for People with Disabilities (USCAS-PWD)
by Ghassan Kbar, Mustufa Haider Abidi, Syed Hammad Mian, Ahmad A. Al-Daraiseh and Wathiq Mansoor
Computers 2016, 5(3), 18; https://doi.org/10.3390/computers5030018 - 29 Jul 2016
Cited by 5 | Viewed by 9777
Abstract
(1) Background: A disabled student or employee in a certain university faces a large number of obstacles in achieving his/her ordinary duties. An interactive smart search and communication application can support the people at the university campus and Science Park in a number [...] Read more.
(1) Background: A disabled student or employee in a certain university faces a large number of obstacles in achieving his/her ordinary duties. An interactive smart search and communication application can support the people at the university campus and Science Park in a number of ways. Primarily, it can strengthen their professional network and establish a responsive eco-system. Therefore, the objective of this research work is to design and implement a unified flexible and adaptable interface. This interface supports an intensive search and communication tool across the university. It would benefit everybody on campus, especially the People with Disabilities (PWDs). (2) Methods: In this project, three main contributions are presented: (A) Assistive Technology (AT) software design and implementation (based on user- and technology-centered design); (B) A wireless sensor network employed to track and determine user’s location; and (C) A novel event behavior algorithm and movement direction algorithm used to monitor and predict users’ behavior and intervene with them and their caregivers when required. (3) Results: This work has developed a comprehensive and universal application with a unified, flexible, and adaptable interface to support the different conditions of PWDs. It has employed an interactive smart based-location service for establishing a smart university Geographic Information System (GIS) solution. This GIS solution has been based on tracking location service, mobility, and wireless sensor network technologies. (4) Conclusion: The proposed system empowered inter-disciplinary interaction between management, staff, researchers, and students, including the PWDs. Identifying the needs of the PWDs has led to the determination of the relevant requirements for designing and implementing a unified flexible and adaptable interface suitable for PWDs on the university campus. Full article
(This article belongs to the Special Issue Theory, Design and Prototyping of Wearable Electronics and Computing)
Show Figures

Figure 1

3441 KiB  
Article
Color Reduction in an Authenticate Live 3D Point Cloud Video Streaming System
by Zainab Sultani, Rana F. Al-Tuma and Sandro Wefel
Computers 2016, 5(3), 17; https://doi.org/10.3390/computers5030017 - 26 Jul 2016
Cited by 1 | Viewed by 8246
Abstract
In this paper, an authenticate live 3D point cloud video streaming system is presented, using a low cost 3D sensor camera, the Microsoft Kinect. The proposed system is implemented on a client-server network infrastructure. The live 3D video is captured from the Kinect [...] Read more.
In this paper, an authenticate live 3D point cloud video streaming system is presented, using a low cost 3D sensor camera, the Microsoft Kinect. The proposed system is implemented on a client-server network infrastructure. The live 3D video is captured from the Kinect RGB-D sensor, then a 3D point cloud is generated and processed. Filtering and compression are used to handle the spatial and temporal redundancies. A color histogram based conditional filter is designed to reduce the color information for each frame based on the mean and standard deviation. In addition to the designed filter, a statistical outlier removal filter is used. A certificate-based authentication is used where the client will verify the identity of the server during the handshake process. The processed 3D point cloud video is live streamed over a TCP/IP protocol to the client. The system is evaluated in terms of: compression ratio, total bytes per points, peak signal to noise ratio (PSNR), and Structural Similarity (SSIM) index. The experimental results demonstrate that the proposed video streaming system have a best case with SSIM 0.859, PSNR of 26.6 dB and with average compression ratio of 8.42 while the best average compression ratio case is about 15.43 with PSNR 18.5128 dB of and SSIM 0.7936. Full article
Show Figures

Figure 1

2998 KiB  
Article
Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks
by Khattab M. Ali Alheeti, Anna Gruebler and Klaus McDonald-Maier
Computers 2016, 5(3), 16; https://doi.org/10.3390/computers5030016 - 22 Jul 2016
Cited by 58 | Viewed by 10714
Abstract
Vehicular ad hoc networks (VANETs) play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs) [...] Read more.
Vehicular ad hoc networks (VANETs) play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs) exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS) that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions. Full article
Show Figures

Figure 1

2387 KiB  
Article
Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors
by Ali A. Yassin, Jian Yao and Shiyao Han
Computers 2016, 5(3), 15; https://doi.org/10.3390/computers5030015 - 11 Jul 2016
Cited by 5 | Viewed by 8194
Abstract
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation [...] Read more.
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation attacks and insider attacks could be effective. To overcome these drawbacks, we propose a secure biometric-based remote authentication scheme using biometric characteristics of hand-geometry, which is aimed at withstanding well-known attacks and achieving good performance. Furthermore, our work contains many crucial merits such as mutual authentication, user anonymity, freely chosen passwords, secure password changes, session key agreements, revocation by using personal biometrics, and does not need extra device or software for hand geometry in the login phase. Additionally, our scheme is highly efficient and withstands existing known attacks like password guessing, server impersonation, insider attacks, denial of service (DOS) attacks, replay attacks, and parallel-session attacks. Compared with the other related schemes, our work is powerful both in communications and computation costs. Full article
Show Figures

Figure 1

9111 KiB  
Article
A New Scalable, Distributed, Fuzzy C-Means Algorithm-Based Mobile Agents Scheme for HPC: SPMD Application
by Fatéma Zahra Benchara, Mohamed Youssfi, Omar Bouattane and Hassan Ouajji
Computers 2016, 5(3), 14; https://doi.org/10.3390/computers5030014 - 11 Jul 2016
Cited by 3 | Viewed by 7240
Abstract
The aim of this paper is to present a mobile agents model for distributed classification of Big Data. The great challenge is to optimize the communication costs between the processing elements (PEs) in the parallel and distributed computational models by the way to [...] Read more.
The aim of this paper is to present a mobile agents model for distributed classification of Big Data. The great challenge is to optimize the communication costs between the processing elements (PEs) in the parallel and distributed computational models by the way to ensure the scalability and the efficiency of this method. Additionally, the proposed distributed method integrates a new communication mechanism to ensure HPC (High Performance Computing) of parallel programs as distributed one, by means of cooperative mobile agents team that uses its asynchronous communication ability to achieve that. This mobile agents team implements the distributed method of the Fuzzy C-Means Algorithm (DFCM) and performs the Big Data classification in the distributed system. The paper shows the proposed scheme and its assigned DFCM algorithm and presents some experimental results that illustrate the scalability and the efficiency of this distributed method. Full article
(This article belongs to the Special Issue High Performance Computing for Big Data)
Show Figures

Figure 1

4371 KiB  
Article
Prediction of Dermoscopy Patterns for Recognition of both Melanocytic and Non-Melanocytic Skin Lesions
by Qaisar Abbas, Misbah Sadaf and Anum Akram
Computers 2016, 5(3), 13; https://doi.org/10.3390/computers5030013 - 24 Jun 2016
Cited by 11 | Viewed by 8446
Abstract
A differentiation between all types of melanocytic and non-melanocytic skin lesions (MnM–SK) is a challenging task for both computer-aided diagnosis (CAD) and dermatologists due to the complex structure of patterns. The dermatologists are widely using pattern analysis as a first step with clinical [...] Read more.
A differentiation between all types of melanocytic and non-melanocytic skin lesions (MnM–SK) is a challenging task for both computer-aided diagnosis (CAD) and dermatologists due to the complex structure of patterns. The dermatologists are widely using pattern analysis as a first step with clinical attributes to recognize all categories of pigmented skin lesions (PSLs). To increase the diagnostic accuracy of CAD systems, a new pattern classification algorithm is proposed to predict skin lesions patterns by integrating the majority voting (MV–SVM) scheme with multi-class support vector machine (SVM). The optimal color and texture features are also extracted from each region-of-interest (ROI) dermoscopy image and then these normalized features are fed into an MV–SVM classifier to recognize seven classes. The overall system is evaluated using a dataset of 350 dermoscopy images (50 ROIs per class). On average, the sensitivity of 94%, specificity of 84%, 93% of accuracy and area under the receiver operating curve (AUC) of 0.94 are achieved by the proposed MnM–SK system compared to state-of-the-art methods. The obtained result indicates that the MnM–SK system is successful for obtaining the high level of diagnostic accuracy. Thus, it can be used as an alternative pattern classification system to differentiate among all types of pigmented skin lesions (PSLs). Full article
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop