Volume 1 Number 2 June 2022

    
Security Processes as Machines: A Case Study

Sabah Al-Fedaghi, Manal Alsharah

https://doi.org/10.6025/dspaial/2022/1/2/49-61

Abstract Business processes (called machines in this paper) are indispensable instruments for the realization of business activities of production and services. Business security processes (machines) are a type of machines whose role involves decreasing risks, responding to incidents, limiting exposure to liability and increase financial, physical, and personal risk values. Security machines are one of the most important nonfunctional business processes... Read More


Empirical Analysis on the Efficiency of Clustering Algorithms Based on the Significance of Cluster Size

Sunitha Cheriyan, Shaniba Ibrahim, Susan Treesa

https://doi.org/0.6025/dspaial/2022/1/2/62-72

Abstract This paper mainly focuses on the performance of the various clustering algorithm on a particular dataset based on the number of clusters defined. The analysis is performed on the iris dataset from the dataset library. It also compares the performance of the algorithms based on the number of clusters defined. The various algorithms used for the comparison includes K-Means, Hierarchical,... Read More


Wavelength Assignment for Conducting Exchanged Folded Hypercube Communication Pattern on Optical Bus

Yu-Liang Liu

https://doi.org/10.6025/dspaial/2022/1/2/73-83

Abstract The (s + t + 1)-dimensional exchanged folded hypercube, denoted by EFH(s,t), is a brand-new interconnection network proposed by Qi et al. Besides, the bus topology is the simplest topology in optical networks, which can be modeled by a linear array graph, denoted by LAn. In this paper, the Routing and Wavelength Assignment (RWA) problem for conducting EFH(s, t) communication... Read More


A Security And Performance Review of IoT Encryption Algorithms

Hesham Hasan, Ghassan Ali, Wael Elmedany, Chitra Balakrishna

https://doi.org/10.6025/dspaial/2022/1/2/84-92

Abstract Internet of Things (IoT) is a trending new technology based on networking and microcomputing. It transfers normal devices into smart devices capable of communicating with other devices and the Internet. IoT-enabled devices are often resource-constrained devices. They have weak processors, small memory and low power supply. This hindered the implementation of the same security protocols and standards used in normal... Read More


An Image Recognition-Based System for Correcting Body Posture

Hung-Yuan Chung, Yao-Liang Chung, Chih-Yen Liang

https://doi.org/10.6025/dspaial/2022/1/2/93-99

Abstract In this study, a novel system for correcting posture was developed through the application of wearable sensing technology. This system comprises three subsystems, namely, a smart necklace, smart phone, and notebook computer. The smart necklace houses an MPU- 6050 sensor that can collect and analyze gravitational acceleration data when the necklace is worn, and use that data to determine a... Read More