International Journal of Computers and Communications

ISSN: 2074-1294
Volume 12, 2018

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of NAUN Journals is adapted to the 'continuously updated' model. What this means is that instead of being seperated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Main Page

Submit a paper | Submission terms | Paper format


Volume 12, 2018

Title of the Paper: Medical Ontology Maintenance: A Multiple Sclerosis Case Study


Authors: Mariam Gawich, Marco Alfonse, Mostafa Aref, Abdel-Badeeh M. Salem

Pages: 10-14

Abstract: The medical ontology is used to represent and reorganize the medical knowledge that can be shared by medical information systems. In order to ensure the reliability and the novelty of the medical knowledge (new treatments and tests) provided by the ontology, it should be maintained in a consistent way. This paper presents the maintenance of the Multiple Sclerosis (MS) disease ontology. The treatments of this disease evolve regularly. The maintenance of MS is realized by the use of a medical ontology maintenance system. The maintenance of MS ontology is done through evolution and pruning. The evolution focuses on the addition of the new treatments applied for the MS and the pruning focuses on removing the ontology elements that are irrelevant to the MS disease. Three additional classes are added to the maintained ontology during the evolution process while 68 terms (classes and individuals) are removed from it during the pruning process.

Title of the Paper: An Alternative Method of Construction of Resilient Functions


Authors: Aissa Belmeguenai, Salim Ouchtati, Youcef Zennir

Pages: 7-9

Abstract: In this paper, we present the modified Tarannikov’s construction. This method allows improving the cryptographic criteria: algebraic degree, resiliency, nonlinearity and algebraic immunity. Thus, we can use this iteratively construction to build: from any optimal resilient functions achieving Siegenthaler’s bound and Sarkar et al.’s bound, a large class of optimal function achieving Siegenthaler’s bound and Sarkar et al.’s bound. Index Terms—Resilient Function, Stream Cipher, Siegenthaler’s construction, Tarannikov’s construction.

Title of the Paper: Testing HEVC Model HM-16.15 on Objective and Subjective Way


Authors: Zoran M. Miličević, Jovan G. Mihajlović, Zoran S. Bojković

Pages: 1-6

Abstract: This paper seeks to provide performance analysis for High Efficient Video Coding (HEVC) HM-16.15 reference coder for same resolution test sequences and picture structure. Two test sequences (resolutions) i.e., PeopleonStreet (2560x1600) and Traffic (2560x1600) are considered. The HEVC coder is tested for the fixed Quantization Parameter (QP) value in lowdelay and randomaccess configurations, with Main profile when B pictures are processed in IBBB format, respectively. Comparisons were performed with respect to the change of Signal-to-Noise Ratio (SNR), the change of data bit-rate and the change of encoding time saving, respectively. Simulation results have shown small differences in SNR values and obvious differences for bit rate and encoding time values. Beside objective results, subjective video assessments for all tested sequences are presented, as well as present of intra and inter prediction in total amount encoder compression values. At the end, motion vectors and coded block structures are analyzed.