International Journal of Intelligent Information Systems

Special Issue

Research and Practices in Information Systems and Technologies in Developing Countries

  • Submission Deadline: Nov. 30, 2014
  • Status: Submission Closed
  • Lead Guest Editor: Amin Mobasheri
About This Special Issue
Recent developments in Computer Engineering and applications, Information Systems and related technologies have shown great advancement towards Intelligent and smart services and devices. This greatly improves the process of data collection, analysis as well as visualization for any application domain. This research and practice trend, however, is quite different in developing countries. Due to limitations in developing countries such as lack of proper infrastructures, modern laboratory tools and devices, limited budgets, and limited expertise and standards in specific areas of IT, developing countries mostly take different research line and approaches that need less proper infrastructure. The practices and results of projects is however different as they are inter-related with the society and governmental needs. Therefore, this special issue is dedicated research and practice of Information Systems and Technologies in developing countries in order to demonstrate their different nature and needs, as well as the interesting outputs and results that they offer.

Special issue welcomes submissions on (but not limited to) the following topics:

• Database systems & management technologies • Distributed systems/databases • Mobile databases • Active and dynamic databases • Software engineering • Computer science • Data warehousing and data mining • E-business models & architectures • M-commerce models & architectures • Empirical software engineering • Enterprise systems • Supply chain integration • Extreme modeling • Extreme programming • Information retrieval systems • Intelligent information systems • Information engineering and technology • Intelligent agents • Agent-based simulations & applications • Knowledge based systems • Semantic web technology & ontology • Web-based information systems Distributed systems • Domain-driven development • Component engineering • Intelligent communication systems • Semi-structured systems • Computer networks • Artificial Intelligence • Computer Architecture • Modeling • Security • Information technology and Electrical Intelligent Systems • WIFI technology • Ad-Hoc networks • IP/MPLS • Robotics • Artificial Intelligence • Image and signal processing • Expert systems & applications • WIFI technology • Fuzzy systems • Text processing • Game theory • Computer architecture and its dependencies • Data modeling • System and Network security • WIFI technology • Remote Sensing and its applications
Lead Guest Editor
  • Amin Mobasheri

    Delft University of Technology, Delft, Netherlands

Guest Editors
  • Baskar Bas

    Department of Computer Science, Government Arts College, Bharathiar University, Coimbatore, India

  • Muhammad Bakhs

    IT Center, Pakistan Academy for Rural Development, Peshawar, Pakistan

Published Articles
  • Hospital Information Systems: A Survey of the Current Situation in Iran

    Mohsen Pourali , Abbas Ghodrat Panah

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 115-119
    Received: Nov. 08, 2014
    Accepted: Nov. 12, 2014
    Published: Nov. 17, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.31
    Downloads:
    Views:
    Abstract: The main objective of hospital information systems (HIS) is to support hospital activities at practical, tactical and strategic levels. Computer based hospital information systems use computer hardware and software to collect, store, process, review and establish link with administrative data related to all hospital activities and to satisfy all th... Show More
  • The Magnetic Induction Communications for the Wireless Underground Sensor Networks

    Farzam Saeednia , Shapour Khorshidi , Mohssen Masoumi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 109-114
    Received: Nov. 06, 2014
    Accepted: Nov. 10, 2014
    Published: Nov. 12, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.30
    Downloads:
    Views:
    Abstract: The most important difference between the wireless underground sensor networks (WUSNs) andthe wireless ground sensor networksis the propagation environment of the signal .In fact, the underground environments consist of soil, rock and water instead of the air. The challenging reasons of these environments to propagate the wireless signal via the El... Show More
  • Modeling and Prediction of Changes in Anzali Pond Using Multiple Linear Regression and Neural Network

    Farshad Parhizkar Miandehi , Erfan Zidehsaraei , Mousa Doostdar

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 103-108
    Received: Nov. 03, 2014
    Accepted: Nov. 06, 2014
    Published: Nov. 11, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.29
    Downloads:
    Views:
    Abstract: Iranian ponds and water ecosystems are valuable assets which play decisive roles in economic, social, security and political affairs. Within the past few years, many Iranian water ecosystems such asUrmia Lake, Karoun River and Anzali Pond have been under disappearance threat. Ponds are habitats which cannot be replaced and this makes it necessary t... Show More
  • Color Image Encryption by Code Image and Hill Algorithm

    Ali Moradmard , Mohammad Tahghighi Sharabiani

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 98-102
    Received: Nov. 01, 2014
    Accepted: Nov. 05, 2014
    Published: Nov. 11, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.28
    Downloads:
    Views:
    Abstract: Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different ... Show More
  • Integrating Type-1 Fuzzy and Type-2 Fuzzy Clustering with K-Means for Pre-Processing Input Data in Classification Algorithms

    Vahid Nouri , Mohammad Reza Akbarzadeh , Tootoonchi , Alireza Rowhanimanesh

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 91-97
    Received: Oct. 10, 2014
    Accepted: Oct. 14, 2014
    Published: Nov. 06, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.27
    Downloads:
    Views:
    Abstract: In several papers, clustering has been used for preprocessing datasets before applying classification algorithms in order to enhance classification results. A strong clustered dataset as input to classification algorithms can significantly improve the computation time. This can be particularly useful in “Big Data” where computation time is equally ... Show More
  • Automatic Persian Text Summarizer Using Simulated Annealing and Genetic Algorithm

    Elham Mahdipour , Masoumeh Bagheri

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 84-90
    Received: Oct. 07, 2014
    Accepted: Oct. 11, 2014
    Published: Nov. 06, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.26
    Downloads:
    Views:
    Abstract: Automatic text summarization is a process to reduce the volume of text documents using computer programs to create a text summary with keeping the key terms of the documents. Due to cumulative growth of information and data, automatic text summarization technique needs to be applied in various domains. The approach helps in decreasing the quantity ... Show More
  • Utilizing Automatic Recognition and Classification of Images for Pattern Recognition

    Mohammad Hadi Yousofi , Habib Yousofi , Sayyed Amir Mohammad Razavi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 80-83
    Received: Oct. 27, 2014
    Accepted: Oct. 30, 2014
    Published: Nov. 05, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.25
    Downloads:
    Views:
    Abstract: Pattern recognition is a scientific approach for categorizing objects to class or subject numbers. These subjects need to be classified based on their applications (can be image, signal or any other type of measurements). Occupation, automation, military information, communication, industry and commercial applications and many other fields can bene... Show More
  • Solving Quadratic Assignment Problem Using Water Cycle Optimization Algorithm

    Maryam Parhizgar , Farhad Mortezapour Shiri

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 75-79
    Received: Oct. 24, 2014
    Accepted: Oct. 27, 2014
    Published: Nov. 03, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.24
    Downloads:
    Views:
    Abstract: The Quadratic Assignment Problem (QAP) is one of combinatorial optimization problems which devote some facilities to some locations. The aim of this problem is assignment of each facility to a location which minimizes total cost. Because the QAP is NP-hard, so it couldn’t be solved by exact methods. In recent years, meta-heuristic algorithms are us... Show More
  • An Introduction to Software-Defined Networking

    Babak Darabinejad , Seyed Rasoul Mousavi Fayyeh

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 71-74
    Received: Oct. 24, 2014
    Accepted: Oct. 27, 2014
    Published: Nov. 03, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.23
    Downloads:
    Views:
    Abstract: Although computer networks have spread worldwide, organizations that use networking technologies, have complained about the fact that no new feature has been added. Due to their newly emerged needs, they also prefer to automate many tasks. Moreover, they prefer their networks to be developed using software, rather than expensive and new hardware. S... Show More
  • Area and Depth Investigation of Anzali Pond Using Satellite Imageries and Group Method of Data Handling Neural Network

    Farshad Parhizkar Miandehi , Asadollah Shahbahrami

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 67-70
    Received: Oct. 21, 2014
    Accepted: Oct. 23, 2014
    Published: Oct. 31, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.22
    Downloads:
    Views:
    Abstract: Analysis of changes in natural resources is one of the fundamental issues in remote sensing. Several research studies regarding the process of changes in natural resources using satellite imageries and image processing techniques have been done. Anzali pond is one of the important ecosystems in Iran that under the impact of some factors such as dro... Show More
  • Software Development for Identifying Persian Text Similarity

    Elham Mahdipour , Rahele Shojaeian Razavi , Zahra Gheibi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 61-66
    Received: Oct. 21, 2014
    Accepted: Oct. 23, 2014
    Published: Oct. 29, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.21
    Downloads:
    Views:
    Abstract: The vast span of nouns, words and verbs in Persian language and the availability of information in all fields in the form of paper, book and internet arises the need of a system to compare texts and evaluate their similarities. In this paper a system has been presented for comparing the text and determining the degree of Persian (Farsi) text simila... Show More
  • Presenting an Algorithm for Choosing an Optimum Local Service Based on the Qualitative Feature of Combining

    Aalia Hemmati , Sima Emadi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 56-60
    Received: Oct. 21, 2014
    Accepted: Oct. 23, 2014
    Published: Oct. 29, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.20
    Downloads:
    Views:
    Abstract: The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the users’ needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different com... Show More
  • A new Method to Detect Circles in Images Based on Genetic Algorithms

    Navid Khalili Dizaji , Nazila Masoudi , Aidin Sakhvati

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 49-55
    Received: Oct. 21, 2014
    Accepted: Oct. 23, 2014
    Published: Oct. 27, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.19
    Downloads:
    Views:
    Abstract: Object detection is one of the key issues in digital image processing. Over the years, many algorithms have been created for detecting meaningful objects on the image which are based on specific characteristics of object or complex mathematical methods. Circle detection is one of these types of methods. One of the best methods for circle detection ... Show More
  • Segmentation of Cells from 3-D Confocal Images of Live Embryo

    Ali Zeynali Aaq Qaleh , Seyyed Mahdi Haji Mirahmadi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 45-48
    Received: Oct. 10, 2014
    Accepted: Oct. 14, 2014
    Published: Oct. 27, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.18
    Downloads:
    Views:
    Abstract: Partial-differential-equation- based segmentation has been employed to accurately extract the shapes of membranes and nuclei from time lapse confocal microscopy images, taken throughout early Zebrafish embryogenesis. This strategy is a prerequisite for an accurate quantitative analysis of cell shape and morphodynamics during organogenesis and is th... Show More
  • An Efficient Approach Toward Increasing Wireless Sensor Networks Lifetime Using Novel Clustering in Fuzzy Logic

    Morteza Asghari Reykandeh , Ismaeil Asghari Reykandeh

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 38-44
    Received: Oct. 07, 2014
    Accepted: Oct. 11, 2014
    Published: Oct. 27, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.17
    Downloads:
    Views:
    Abstract: Wireless sensor network (WSN) is composed of a large number of sensor nodes that are connected to each other. In order to collect more efficient information, wireless sensor networks are classified into groups. Classification is an efficient way to increase the lifetime of wireless sensor networks. In this network, devices have limited power proces... Show More
  • Malware Detection Using Data Mining Techniques

    Sara Najari , Iman Lotfi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 33-37
    Received: Oct. 08, 2014
    Accepted: Oct. 11, 2014
    Published: Oct. 20, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.16
    Downloads:
    Views:
    Abstract: Nowadays, malicious software attacks and threats against data and information security has become a complex process. The variety and number of these attacks and threats has resulted in providing various type of defending ways against them, but unfortunately current detection technologies are ineffective to cope with new techniques of malware design... Show More
  • Measuring the Qualitative Feature of Combined Services

    Aalia Hemmati , Sima Emadi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 28-32
    Received: Oct. 08, 2014
    Accepted: Oct. 11, 2014
    Published: Oct. 20, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.15
    Downloads:
    Views:
    Abstract: The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the user’s needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different com... Show More
  • Improving Honeyd for Automatic Generation of Attack Signatures

    Motahareh Dehghan , Babak Sadeghiyan

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 23-27
    Received: Oct. 07, 2014
    Accepted: Oct. 11, 2014
    Published: Oct. 20, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.14
    Downloads:
    Views:
    Abstract: In this paper, we design and implement a new Plugin to Honeyd which generates attack signature, automatically. Current network intrusion detection systems work on misuse detectors, where the packets in the monitored network are compared against a repository of signatures. But, we focus on automatic signature generation from malicious network traffi... Show More
  • A New Organization Model for Self-Organizing Multi-Agent Systems Based on Self-Adaptation Features

    Amin Rahmanzadeh , Ali Farahani , Eslam Nazemi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 15-22
    Received: Sep. 30, 2014
    Accepted: Oct. 05, 2014
    Published: Oct. 17, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.13
    Downloads:
    Views:
    Abstract: Complexity of information technology systems is increasing continually. A very good solution would be using agents in implementing and controlling these systems. Multi-Agent Systems are good examples of using agents for system control and implementation. On the other hand, Multi-Agent systems need to be controlled and managed too. Using organizatio... Show More
  • Parallel Image Processing Using Algorithmic Skeletons

    Sare Eslami Khorami

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 10-14
    Received: Sep. 30, 2014
    Accepted: Oct. 05, 2014
    Published: Oct. 17, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.12
    Downloads:
    Views:
    Abstract: In the last few decades, image processing has achieved significant theoretical and practical progress. It has been so fast that image processing can be easily traced in several disciplines and industries. At present, various methods have been proposed to implement image processing. The present paper aims to present a technique for image processing ... Show More
  • Effective Load Balancing in Cloud Computing

    Zeinab Goudarzi , Ahmad Faraahi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 1-9
    Received: Sep. 18, 2014
    Accepted: Sep. 22, 2014
    Published: Sep. 27, 2014
    DOI: 10.11648/j.ijiis.s.2014030601.11
    Downloads:
    Views:
    Abstract: Internet, from its beginning so far, has undergone a lot of changes which some of them has changed human’s lifestyle in recent decades. One of the latest changes in the functionality of the Internet has been the introduction of Cloud Computing. Cloud Computing is a new internet service, which involves virtualization, distributed computing, networki... Show More