INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY https://rajpub.com/index.php/ijct KHALSA PUBLICATIONS en-US INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2277-3061 Model-Based Parallelization for Simulink Models on Multicore CPUs and GPUs https://rajpub.com/index.php/ijct/article/view/8533 <p>In this paper we propose a model-based approach to parallelize Simulink models of image processing algorithms on homogeneous multicore CPUs and NVIDIA GPUs at the block level and generate CUDA C codes for parallel execution on the target hardware. In the proposed approach, the Simulink models are converted to directed acyclic graphs (DAGs) based on their block diagrams, wherein the nodes represent tasks of grouped blocks or subsystems in the model and the edges represent the communication behaviors between blocks. Next, a path analysis is conducted on the DAGs to extract all execution paths and calculate their respective lengths, which comprises the execution times of tasks and the communication times of edges on the path. Then, an integer linear programming (ILP) formulation is used to minimize the length of the critical path of the DAG, which represents the execution time of the Simulink model. The ILP formulation also balances workloads on each CPU core for optimized hardware utilization. We parallelized image processing models on a platform of two homogeneous CPU cores and two GPUs with our approach and observed a speedup performance between 8.78x and 15.71x.</p> Zhaoqian Zhong Masato Edahiro Copyright (c) 2020 Zhaoqian Zhong, Masato Edahiro 2020-01-04 2020-01-04 20 1 13 10.24297/ijct.v20i.8533 Medical Device Integration with Electronic Health Records: A Case Study of University of Nairobi Health Services, Kenya https://rajpub.com/index.php/ijct/article/view/8480 <p>In this study, we describe a demonstration in which available electronic medical records system (EMR) was successfully integrated with a wireless blood pressure monitor (BPM). This was implemented by adopting the use of RESTful Application Programming Interface (API) technologies and commonly established standards designed for medical devices interoperability. Before deploying the prototype, we conducted pilot tests at the University of Nairobi, nursing station to get feedback on the time spent using the conventional blood pressure data capture methods and the newly integrated application. Clinical data from the device was exchanged adhering to the HL7/XML standard communication protocol. The findings indicate a positive outcome was availed on the time taken for the blood pressure readings, time spent by the patient at the nursing station, doctor’s time to search the patients’ blood pressure readings as well as the data accuracy fed in the EMR system.</p> <p>&nbsp;</p> David Muchangi Mugo Benard Mutisya Nzyoka Nzyoka Stephen Mburu Ng’ang’a Copyright (c) 2020 David Muchangi Mugo, Benard Mutisya Nzyoka Nzyoka, Stephen Mburu Ng’ang’a 2020-01-06 2020-01-06 20 14 21 10.24297/ijct.v20i.8480 Twitter Privacy Concern: The Effect of Twitter Profile https://rajpub.com/index.php/ijct/article/view/8563 <p>Privacy concern vary from one to another. Sensitive information related to finance and health are most of the concern. The vast spread of using social media/ micro-blogging platforms, i.e. Twitter, as a desirable channel of online communication, has changed the peoples' understanding of what is private communication and whether they should or should not be concerned about their privacy. This paper examines the relationship between the level of privacy concern of Twitter users and their gender, experience on Twitter, type of their Twitter account and type of their username. A survey in the form of a questionnaire has been conducted in Saudi Arabia. The research compares privacy concern from the perspective of male and female, old and new Twitter users, private and public account holders and nickname and real name username holders. Determining the Chi square and using T-test and ANOVA, this research shows that the individual’s privacy concerns are affected by the Twitter users’ profile; gender, number of the years on Twitter, the type of Twitter account and username.</p> Jehad Al Amri Copyright (c) 2020 Jehad Al Amri 2020-01-06 2020-01-06 20 22 37 10.24297/ijct.v20i.8563 A Comparison of two Multilingual Meeting Systems https://rajpub.com/index.php/ijct/article/view/8636 <p>Multilingual meeting software is still somewhat rare, but at least three systems can provide support to large groups in multiple languages. This paper compares two (Microsoft Live Translator and an academic system called Polyglot). Results show there were no significant differences between the two in terms of perceived translation accuracy, usefulness, ease of use, and design quality. However, Polyglot provides support for more languages (103 versus 66). These and other results are discussed along with directions for future research.</p> Milam Aiken Mina Park Copyright (c) 2020 Milam Aiken, Mina Park 2020-02-07 2020-02-07 20 38 44 10.24297/ijct.v20i.8636 Designing remote education in a VUCA world https://rajpub.com/index.php/ijct/article/view/8713 <p>The goal of this article is to identify and share the best practices and innovations to enable teaching and learning to take place during times of VUCA (Volatile, Uncertain, Complex, and Ambiguous) such as the coronavirus pandemic. This will help lay the foundations for more inclusive and equitable approaches to education when the crisis subsides. The main response to school closures is to dive headlong into academic cyberspace and remote learning, creating a human-machine symbiosis. Ideally, specific contents, learning outcomes, and a set of instructions are desirable. Different media and technologies can be used to assist students to learn in different ways and achieve different outcomes, thus also individualizing learning more. Technologies can be compared along several characteristics. These characteristics form a basis for analyzing new technologies, to see where they fit within the existing environment, and to evaluate their potential benefits and limitations. Nowadays, technologies have a tendency to become more ‘communicative’ and ‘media rich’, thus offering educators and students powerful tools to attain desired learning outcomes.</p> Anand Pultoo Avinash OOJORAH Copyright (c) 2020 Anand Pultoo, Dr Avinash Oojorah https://creativecommons.org/licenses/by/4.0 2020-05-11 2020-05-11 20 45 52 10.24297/ijct.v20i.8713 Design and Implement Beacon based scheme for Node Localization in Underwater Acoustic Network https://rajpub.com/index.php/ijct/article/view/8756 <p>A network that can sense the surroundings and collected all the information from the sensor nodes and passed it to the base station is known as a wireless sensor network. The underwater acoustic networks are the type of network deployed under the oceans and passed information to the base station. Due to the dynamic nature of the network, nodes change their location at any time. To maximum aggregate information from the sensor nodes, to estimate exact node location is very important. The sensor node position estimation is a major issue of the underwater acoustic network. The process of estimating node position is called node localization. In the existing RSSI based approach for the node, localization has a high delay, which reduces its efficiency. The technique needs to be designed, which localizes more nodes in less amount of time. This research is based on the advancement of the range based scheme for node localization. In the proposed scheme, mobile beacons are responsible for node localization. The beacon nodes send beacon messages in the network, and sensor nodes respond back with a reply message. When two beacons receive the reply of a sensor node that is considered as a localized node, the sensor nodes which are already localized will not respond back to the beacon messages, which reduce delay in the network for node localization.</p> Puneetpal Kaur Mohit Marwaha Baljinder Singh Copyright (c) 2020 Puneetpal Kaur, Mohit Marwaha, Baljinder Singh https://creativecommons.org/licenses/by/4.0 2020-06-05 2020-06-05 20 53 64 10.24297/ijct.v20i.8756 Dynamic Flight Routing Using Internet of Things Framework https://rajpub.com/index.php/ijct/article/view/8771 <p>With increased demand of quicker travel, both for passengers and cargo, there has been major advancements in commercial airlines and number of flights have increased significantly over the last few years. Novel challenges have been introduced due to the rising number of flights in the areas of safety, route planning and maintenance. In addition, for commercial flights, the surge in the number of passengers have also exposed avenues for improving the quality of flight travel, from entering the airport premises to leaving the same at the destination. Although there are many areas of flight and airport operations that can benefit from leveraging technological advancements, choosing safe flight path and making dynamic modifications to it is the critical aspect that needs to be addressed. Comprehending available information to adhere to the provided route and also avoiding known areas of air turbulence, adds to the financial benefit of the commercial airline as well as the safety of the airplane and the passengers are ensured. In this paper, the various aspects of improving the flight routing by providing dynamic intelligent path options to ensure adherence to the provided flight path possible is studied; options for improving the flight safety and turbulence avoidance, which benefits both the passengers and the aircraft are also explored. In addition, keeping aircraft away from conflict zones or war zones, and also from areas of natural disaster, like erupting volcanic ash or forest fires is relevant. Although these issues have been studied before, most of the techniques depend heavily on infrastructure that is on the ground. The basic model requires constant communication with an air traffic control tower, that would provide updates and changes to the flight path as necessary. This leads to some of these methods being unusable on flights operating on oceanic routes and away from the communication zone of the devices placed on land masses. Therefore, in this paper an Internet of Things based framework is proposed to address and handle the above mentioned issues. The framework is structured on the communication model of information exchange among aircraft within the range, as well as taking advantage of ground infrastructure if there is a possible network link to the same. A number of algorithms are proposed for dynamic intelligent routing of flights as well as detection and avoidance of air turbulence. The implementations of the proposed algorithms show improvements ranging from 10% to 30% in the methods as compared to using the infrastructure based conventional techniques.</p> Amlan Chatterjee Copyright (c) 2020 Amlan Chatterjee Chatterjee https://creativecommons.org/licenses/by/4.0 2020-06-22 2020-06-22 20 65 80 10.24297/ijct.v20i.8771 SSAAR: An enhanced System for Sentiment Analysis of Arabic Reviews https://rajpub.com/index.php/ijct/article/view/8827 <p>Sentiment Analysis, or Opinion Mining, has recently captivated the interest of scientists worldwide. With the increasing use of the internet, the web is becoming overloaded by data that contains useful information, which can be used in different fields. In fact, many studies have shed light on Sentiment Analysis of online data in different languages. However, the amount of research dealing with the Arabic language is still limited. In this paper, an empirical study is led to Sentiment Analysis of online reviews written in Modern Standard Arabic. A new system called SSAAR (System for Sentiment Analysis of Arabic Reviews) is proposed, allowing computational classification of reviews into three classes (positive, negative, neutral). The input data of this system is built by using a proposed framework called SPPARF (Scraping and double Preprocessing Arabic Reviews Framework), which generates a structured and clean dataset. Moreover, the provided system experiments two improved approaches for sentiment classification based on supervised learning, which are: Double preprocessing method and Feature selection method. Both approaches are trained by using five algorithms (Naïve Bayes, stochastic gradient descent Classifier (SGD), Logistic Regression, K-Nearest Neighbors, and Random Forest) and compared later under the same conditions. The experimental results show that the feature selection method using the SGD Classifier performs the best accuracy (77.1%). Therefore, the SSAAR System proved to be efficient and gives better results when using the feature selection method; nevertheless, satisfying results were obtained with the other approach, considered consequently suitable for the proposed system.</p> Manal Nejjari Abdelouafi Meziane Copyright (c) 2020 Manal Nejjari, Abdelouafi Meziane https://creativecommons.org/licenses/by/4.0 2020-08-17 2020-08-17 20 81 95 10.24297/ijct.v20i.8827 Design and Implementation of A Network Security Management System https://rajpub.com/index.php/ijct/article/view/8841 <p>In recent years, the emerged network worms and attacks have distributive characteristics, which can spread globally in a short time. Security management crossing network to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. This paper proposes a hierarchical distributed network security management system (HD-NSMS), which can centrally manage security across networks. First describes the system in macrostructure and microstructure; then discusses three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; at last, it describes the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).</p> Zhiyong Shan Vinod Namboodiri Copyright (c) 2020 Zhiyong Shan, Vinod Namboodiri https://creativecommons.org/licenses/by/4.0 2020-09-10 2020-09-10 20 96 109 10.24297/ijct.v20i.8841 Malicious node identification routing and protection mechanism for VANET against various attack https://rajpub.com/index.php/ijct/article/view/8852 <p>With the help of road side unit vehicles communicate among themselves. This technique termed as VANET. This network helps us to improve the safety and efficiency of the occupants during travelling in vehicles. The basic idea of this technique is to send information about the traffic information to the road side unit or other vehicles. These vehicles get safe from attacks and misuse of their private data. The objective of this paper to secure the communication among the vehicles and the road side unit. In this technique the communication mainly dependant on the safety of the road such as vehicles tracking, emergency situations and message monitoring. There are various attacks like Sybil and Gray hole attack are vulnerable to VANET. To protect from these attacks our technique provide malicious node identification mechanism that help us to provide better facility to send data to vehicles safely. To avoid these types of attacks, our propose technique include feature like key management system to prevent the communication among the vehicles. Our proposed system mostly focus on Bandwidth, packet loss and packet delivery ratio [12].</p> Er. Ritika Saini Harish Kundra Copyright (c) 2020 Er. Ritika Saini, Harish Kundra https://creativecommons.org/licenses/by/4.0 2020-09-21 2020-09-21 20 110 122 10.24297/ijct.v20i.8852 Intelligent Key (IKey) The key of Securing Cars https://rajpub.com/index.php/ijct/article/view/8859 <p>With the advancement of technology, applications have become an indispensable part of daily life to solve many problems. Technology is one of the important contents that promotes communication between people and enhances the acquisition and acquisition of information. Therefore, the development of information technology is the reason for the major scientific and knowledge revolution, which has an impact on the convenience of human life in various scientific journals.</p> <p>To recognize our responsibility, we came up with the idea of replacing physical objects with applications that increase usability in our life. As we strive to develop a smart car control application, the application can save the driver from the car key. Therefore, the application controls certain functions in the car, such as opening and closing doors and starting and stopping the engine. By connecting the app to the car and ensuring that the user does not need to carry the car key. As a result, now we are able to provide convenience and luxury to our customers and end-users.</p> Sultan Saad Alshamrani Abdulaziz Othman Ahmed Saad Salem Alaidaros Feras Abo Alaoun Mohammed Sadiq Ramiz Farouq Copyright (c) 2020 Sultan Saad Alshamrani, Abdulaziz Othman, Ahmed Saad, Salem Alaidaros , Feras Abo Alaoun , Mohammed Sadiq , Ramiz Farouq https://creativecommons.org/licenses/by/4.0 2020-09-28 2020-09-28 20 123 136 10.24297/ijct.v20i.8859