Annals of Emerging Technologies in Computing (AETiC) |
 |
|
Paper #1
|
Filling Factors of Sunspots in SODISM Images
Amro F. Alasta, Abdrazag Algamudi, Fatma Almesrati, Mustapha Meftah and Rami Qahwaji
Abstract: The calculated filling factors (FFs) for a feature reflect the fraction of the solar disc covered by that feature, and the assignment of reference synthetic spectra. In this paper, the FFs, specified as a function of radial position on the solar disc, are computed for each image in a tabular form. The filling factor (FF) is an important parameter and is defined as the fraction of area in a pixel covered with the magnetic field, whereas the rest of the area in the pixel is field-free. However, this does not provide extensive information about the experiments conducted on tens or hundreds of such images. This is the first time that filling factors for SODISM images have been catalogued in tabular formation. This paper presents a new method that provides the means to detect sunspots on full-disk solar images recorded by the Solar Diameter Imager and Surface Mapper (SODISM) on the PICARD satellite. The method is a totally automated detection process that achieves a sunspot recognition rate of 97.6%. The number of sunspots detected by this method strongly agrees with the NOAA catalogue. The sunspot areas calculated by this method have a 99% correlation with SOHO over the same period, and thus help to calculate the filling factor for wavelength (W.L.) 607nm.
Keywords: Sunspots; SODISM; PICARD; Wavelength 607nm; Parametric; non-parametric statistics; discrete wavelet; Filling Factors catalogue.
Download Full Text
|
|
Paper #2
|
IoT Energy Efficiency through Centrality Metrics
Majed Alhaisoni
Abstract: The Internet of Things is the current and next revolution in integrating various technologies and wireless communications. It has been shown to make an important contribution in various modes of communication, in homes, offices and other buildings. However, certain research issues are still remain, such as life span of the network and a definition of the most influential nodes in communications, which affect the overall energy distribution. This paper introduces a new approach to enhance the communication over the internet of things, by combining two different domains, the computer network and network science. Various scenarios have been thoroughly implemented and tested over different network topologies. The results show clear enhancements on network centrality and overall energy distribution.
Keywords: Internet of Things; Computer Networks; Network Science; Energy Efficiency.
Download Full Text
|
|
Paper #3
|
Some Challenges in Using Computer-Aided Translation Tools to Facilitate Second Language Fluency in Education
Dianne Excell
Abstract: At every level of education, from early years to postgraduate, students can arrive in the UK (or US) classroom with little or no English language ability. It is impossible for teachers to have knowledge of every first language that students bring into the classroom and thus they may rely on a computer-aided translation tool so that their students can have access to the English needed in all subjects across the curriculum. At the same time, students need to move from basic English skills in listening, speaking, reading and writing towards the subtleties of academic English which they must achieve in order to reach the UK government’s required standards in English at every level of assessment. Using her extensive knowledge of the challenges that students learning English as an Additional Language (EAL) and their teachers face in the classroom situation and the English needed in assessments, the author examines possible benefits of computer-aided translation tools such as Google Translate and Talking Pen and outlines some of the problems and drawbacks with such tools that create barriers to acquiring full academic fluency, thus posing challenges to future translation tool developers.
Keywords: Computer Aided Translation; eLearning; e-translation Tools; English as an Additional Language (EAL).
Download Full Text
|
|
Paper #4
|
Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks
Mohammad Riyaz Belgaum, Shahrulniza Musa, MazlihamMohd Su’ud, Muhammad Alam, Safeeullah Soomro and Zainab Alansari
Abstract: Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are considered in this study. In order to transmit the packets safely, a secured approach using triple factor has been proposed. This triple factor computes the trust by using the direct information then verifies the reputation by collecting the information from the neighbouring nodes called distributed factor and uses cryptographic algorithm to ensure security. And to ensure that there are routes available to perform the routing process, the reasons for such attacks are studied so as to re-integrate back the nodes in to the network, once it has repented for being malicious before. The availability of routes increases the throughput.
Keywords: MANET; IoT; Dynamic Source Routing protocol; Ad Hoc on Demand Distance Vector Protocol; Threats.
Download Full Text
|
|
Paper #5
|
Rethinking Digital Forensics
Andrew Jones and Stilianos Vidalis
Abstract: In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour. There has been an exponential increase in the complexity of the networks with the rise of the Internet of Things, cloud technologies and fog computing altering business operations and models. Adding to the problem are the increased capacity of storage devices and the increased diversity of devices that are attached to networks, operating autonomously. We argue that the laws and standards that have been written, the processes, procedures and tools that are in common use are increasingly not capable of ensuring the requirement for scientific integrity. This paper looks at a number of issues with current practice and discusses measures that can be taken to improve the potential of achieving scientific rigour for digital forensics in the current and developing landscape.
Keywords: Digital forensics; scientific rigour; standards; procedures; tools.
Download Full Text
|
International Association for Educators and Researchers (IAER), registered in England and Wales - Reg #OC418009 Copyright © IAER 2019 | |
|