|
|
Issue
1, Volume 8, January 2009
Title of the Paper: Industrial
Machinery Optimization and Maintenance System via World Wide Web
DOWNLOAD
FULL PDF
Authors:
A. Etxebarria, R. Barcena, J. J. Valera
Abstract: Nowadays, it is frequent that engineering companies use Internet as
the main working environment for the complementary services offered to their
customers. Furthermore, Internet allow the development of powerful tools
dedicated to the remote maintenance, on-line supervision and performance
optimisation of the industrial machinery. In this paper, a extensive set of
complementary services via Internet denominated IngeRASTM that provide rapid
and effective access to industrial machinery, supplied by the Basque company
Ingelectric S. A., is described. Additionally, a new remote system dedicated
to the hardware-in-the-loop (HIL) experimentation concerning the optimisation
of the performance of industrial controllers installed by the company, is
presented. Such a system, now under construction, exploits the rapid
prototyping strategy of real-time computer controlled systems and is expected
to be added to IngeRASTM in the near future in order to be used remotely by
the engineers by means of virtual instrumentation.
Keywords: Remote experimentation, Teleoperation, Virtual instrumentation,
Internet, Telelaboratory, Realtime control
Title of the Paper: A
Dynamic-Balanced Scheduler for Genetic Algorithms for Grid Computing
DOWNLOAD
FULL PDF
Authors:
A. J. Sanchez Santiago, A. J. Yuste, J. E. Munoz Exposito, S. Garcia Galan, J.
M. Maqueira Marin, S. Bruque
Abstract: The new paradigm of distributed computation, grid computing, has
given rise to a large amount of research on resource scheduling. Unlike the
distributed computation, grid computing uses heterogeneous resources, for what
grid computing entails new challenges as the adaptation of parallel algorithms
before developed for homogeneous resources cluster to the dynamic and
heterogeneous resources. In this paper we present a dynamic-balanced scheduler
for grid computing that solves two typical kinds of problems of grid
computing, using for them the cycles of some resources of the grid. The first
problem is based on iterative tasks that usually appear in optimization
problems. The second problem is a directed acyclic graph (DAG) problem.
Experimental results using dynamic-balanced scheduler show that it is possible
to obtain an improved use of the resources in the grid. This strategy enables
to adapt the length of a task to the computing capacity of each resource at
any given moment. Furthermore, this scheduling strategy enables to execute all
the tasks in a shorter time.
Keywords: Grid computing, dynamic-balanced scheduler, genetic algorithm,
optimization problem
Title of the Paper: The
Software Quality Economics Model for Software Project Optimization
DOWNLOAD
FULL PDF
Authors:
Ljubomir Lazic, Amel Kolasinac, Dzenan Avdic
Abstract: There are many definitions of quality being given by experts that
explains quality for manufacturing industry but still unable to define it with
absolute clarity for software engineering. To enable software designers to
achieve a higher quality for their design, a better insight into quality
predictions for their design choices is given. In this paper we propose a
model which traces design decisions and the possible alternatives. With this
model it is possible to minimize the cost of switching between design
alternatives, when the current choice cannot fulfill the quality constraints.
With this model we do not aim to automate the software design process or the
identification of design alternatives. Much rather we aim to define a method
with which it is possible to assist the software engineer in evaluating design
alternatives and adjusting design decisions in a systematic manner. As of
today there is very little knowledge is available about the economics of
software quality. The costs incurred and benefits of implementing different
quality practices over the software development life cycle are not well
understood. There are some prepositions, which are not being tested
comprehensively, but some useful Economic Model of Software Quality Costs (CoSQ)
and data from industry are described in this article. Significant research is
needed to understand the economics of implementing quality practices and its
behaviour. Such research must evaluate the cost benefit trade-offs in
investing in quality practices where the returns are maximized over the
software development life cycle. From a developer’s perspective, there are two
types of benefits that can accrue from the implementation of good software
quality practices and tools: money and time. A financial ROI calculation of
cost savings and the schedule ROI calculation of schedule savings are given.
Keywords: Software Quality, Quality Cost Model, TQM, Cost optimization, ROI
calculation
Title of the Paper: Realization
of E-University for Distance Learning
DOWNLOAD
FULL PDF
Authors:
Hazem M. El-Bakry, Nikos Mastorakis
Abstract: In previous work [27], the authors proposed an E-University but they
did not take into account some essential parts. In this paper, the system
presented in [27] is modified and developed. New critical important items such
as security in E-Learning, learning management, business continuity management
and science park are added to the proposed university. According to the great
development of IT, the current Web-based learning systems need to be as
effective as human tutors. Recently, intelligent agents became one of the most
interesting subjects of modern information technology. Agent-based technology
has been taken as an important approach for developing advanced E-Learning
systems. This paper presents architecture for implementing a multi-agent
system within the context of a learning environment. The roles of intelligent
agents within an E-Learning system, called E-University, are presented. The
agents perform specific tasks on the behalf of students, professors,
administrators, and other members of the university. Also a group of
intelligent agents for learning activities such as user interface agents, task
agents, knowledge agents and mobile agents is developed. Using the multi-agent
technology in E-Learning system, gives user interaction facility to both users
and designers, and adds ability to exchange information between different
objects in a flexible way.
Keywords: Intelligent learning systems, Agent technology, E-Learning system,
Science park, Security, Learning management, Business continuity management,
and Multimedia.
Title of the Paper: A
Sampling-based Method for Dynamic Scheduling in Distributed Data Mining
Environment
DOWNLOAD
FULL PDF
Authors:
Jifang Li
Abstract: In this paper, we propose a new solution for dynamic task scheduling
in distributed environment. The key issue for scheduling tasks is that we can
not obtain the execution time of irregular computations in advance. For this
reason, we propose a method which is based on sampling to some typical data
mining algorithm. We argue that a function is existed in the items: execution
time, the size of data and the algorithm, therefore we can deduce the
execution time of a data mining task from the corresponding the size of data
and algorithm. The experimental results show that almost all the algorithms
exhibits quasi linear scalability, but the slope of different algorithms is
different. We adopt this sampling method for process the tasks scheduling in
distributed data mining environment. The experimental results also show the
sampling method is applicable to task scheduling in dynamic environment and
can be adopted to obtain a higher result.
Keywords: Sampling, Data Mining, Distributed Computing
Title of the Paper: New
Discussion on Information Communication Model and Process Model in Software
Organization
DOWNLOAD
FULL PDF
Authors:
Xuejun Liu
Abstract: A lot of process models for software development such as waterfall
model and so on are almost based on description of the relationship between
the scale and complex of software project and technology tasks and methods in
every phase of development as the main content. They are suitable for the
technique works of software development, but ignore the connotation of the
management work in software process. Especially that they ignore the
connotation of the management relevant with concrete business and for process
management it is not enough to be only with technical standard. In this
article, we propose an information communication model of software process and
a software process model including concrete business and describe the basic
tasks of team software process and relationship between the layers of software
process. Starting from this, it can guide the process operation of software
team, provide a new solution for theoretical research and description of the
software engineering subject and provide a framework concept for the auxiliary
system tools for the research of software engineering.
Keywords: Process models, software development, waterfall model
Title of the Paper: Research
and Application of SQLite Embedded Database Technology
DOWNLOAD
FULL PDF
Authors:
Chunyue Bi
Abstract: The embedded database SQLite is widely applied in the data
management of embedded environment such as mobile devices, industrial control,
information appliance etc., it has become the focus of the development of
related areas. For its advantages of stability and reliability, fast and high
efficiency, portability and so on, which occupies the unique advantages among
many of the main embedded databases. This paper first describes the
definition, basic characteristics, structure and the key technologies of
embedded database, analyses the features, architecture and the main interface
functions of SQLite, gives a detailed porting process from SQLite to ARM-Linux
platform, and discusses concrete application of SQLite in embedded system
through a development case about the home gateway based on ARM-Linux.
Keywords: Embedded Database, SQLite, Porting, ARM-linux, Home Gateway
Title of the Paper: Design
and Implementation Mobile Payment Based on Multi-Interface of Mobile Terminal
DOWNLOAD
FULL PDF
Authors:
Zhong Wan, Weifeng Yin, Ronggao Sun
Abstract: Resulting in the security of mobile payment are the two main
problems of the mobile terminal itself and the process of wireless
communication. As the mobile terminal's own unique portability, small size and
low cost nature,it cause that the mobile terminal weak ability of computing
encryption. The emergence of mobile phone virus is also a potential security
threat to mobile payment. At the same time, the openness characteristic of
wireless communication decide to a radio channel can be easily tapped by
illegal user. Illegal user can tamper with, delete the intercepted information
or pretend legal user to access communication networks to communication. This
article presents a mobile payment implement solution with distributed key
based on the current mobile multi-interface. Analyzes the workflow of mobile
payment and the reasons that cause the security in the process of mobile
payment. Uses the additional equipment to achieve the secret keys distributed
storage to improve the ability of test and verify in system and enhance the
computing encryption capability of mobile terminal. At the same time, based on
the J2ME security architecture using the encryption methods of data
encryption, digital signature, identity authentication to ensure the security
of wireless communication. Gives the hardware design and software design of
multi-interface data encryption equipment. And gives the some processes design
of mobile client’s software. This solution realizes the high security and low
cost of mobile payment, has good applied value and marketable foreground.
Keywords: Payment Security, Mobile Payment, Data Encryption, Mobile Terminal,
J2ME, Mobile interface
Title of the Paper: An
Anycast Routing Algorithm Based on Genetic Algorithm
DOWNLOAD
FULL PDF
Authors:
Chun Zhu, Min Jin
Abstract: Anycast refers to the transmission of data from a source node to
(any) one member in the group of designed recipients in a network, which has
been defined a standard communication model of IP version 6. In order to
implement multi-destination and multi-path anycast routing on the heavy load
network, this paper proposes a new anycast routing algorithm based on genetic
algorithm and presents a heuristic genetic algorithmic to solve shortest path
routing optimization problem. The network simulation experimental results show
that this algorithm can capable of finding optimization anycast routing path
and getting more resolution at less time and more balanced network load,
enhancing the search ratio.
Keywords: Anycast Routing, Anycast Routing Algorithm, Genetic Algorithm,
Service Model
Title of the Paper: A
Distributed E-Business System Based on Conic Curve
DOWNLOAD
FULL PDF
Authors:
Xinxia Song, Zhigang Chen
Abstract: A distributed E-Business System based on conic curve is proposed.
This scheme is composed of two parts, constructing license and validating
license. Because he security of license is determined by private key, not the
arithmetic itself, user can not construct new license by given license and the
public key as long as the private key is not leaked. Since encoding and
decoding over conic are easily implement on conic curves, it has enabled our
scheme to greatly enhance efficiency. We also analysis its security. The
entire process guarantees the security and reliability.
Keywords: Conic curve, E-Business system, public-key cryptosystem, digital
signature, proxy signature
Title of the Paper: The
Study of Terrain Simulation based on Fractal
DOWNLOAD
FULL PDF
Authors:
Deng Fang
Abstract: In this paper the principle of fractal theory and fractal Brownian
motion (FBM) are analyzed in detail. The Diamond-Square algorithm is
introduced. And it introduces the process of generating three dimensional
terrain, cloud and sky by this algorithm. There also analyses the physical
meaning of FBM’s two parameters H and σ . Through the analysis of the effect
of different parameters, there is proposed a method of controllable fractal
terrain based on parameters. Simulated a controlled fractal scene via VC ++
and OpenGL. And the same time, points the limitation of this algorithm. But as
this algorithm’s generating speed is faster, it also has validity and
practicability.
Keywords: Fractal, FBM, Diamond-Square, 3D terrain, OpenGL
Title of the Paper: Face
Recognition based on Multi-scale Singular Value Features
DOWNLOAD
FULL PDF
Authors:
Ran Jin, Zhuojun Dong
Abstract: Singular value vecto r of an image is a valid feature for
identification. But the recognition rate is low when only one scale singular
value vector is used for face recognition. An algorithm was developed to
improve the recognition rate. Many subimages are obtained when the face image
is divided in different scales, with all singular values of each subimage
organized and used as an eigenvector of the face image. Faces are then
verified by linear discriminant analysis (LDA) under these multiscale singular
value vectors. These multiscale singular value vectors include all features of
an image from local to the whole, so more discriminant information for pattern
recognition is obtained. Experiments were made with ORL human face image
databases. The experimental results show that the method is obviously superior
to the corresponding algorithms with a recognition rate of 97. 38%.
Keywords: Multiscale, singular value decomposition (SVD) , feature
combination, face recognition, Fisher, ORL, subimage
Title of the Paper: Robust
Denoising of Point-Sampled Surfaces
DOWNLOAD
FULL PDF
Authors:
Jifang Li, Renfang Wang
Abstract: Based on sampling likelihood and feature intensity, in this paper, a
feature-preserving denoising algorithm for point-sampled surfaces is proposed.
In terms of moving least squares surface, the sampling likelihood for each
point on point-sampled surfaces is computed, which measures the probability
that a 3D point is located on the sampled surface. Based on the normal tensor
voting, the feature intensity of sample point is evaluated. By applying the
modified bilateral filtering to each normal, and in combination with sampling
likelihood and feature intensity, the filtered point-sampled surfaces are
obtained. Experimental results demonstrate that the algorithm is robust, and
can denoise the noise efficiently while preserving the surface features.
Keywords: Moving least squares surface, sampling likelihood, normal voting
tensor, feature intensity, bilateral filtering, point-sampled surfaces
denoising
Title of the Paper: An
Adaptive Requirement Framework for SCUDWare Middleware in Ubiquitous Computing
DOWNLOAD
FULL PDF
Authors:
Qing Wu, Danzhen Wang
Abstract: Due to high dynamic computing environments of ubiquitous computing,
it poses many challenges for software middleware technologies. The
component-based middleware systems should possess self-adjusting functions for
adapt to internal and external environments variation. This paper firstly
describes a middleware called SCUDWare for smart vehicle space in ubiquitous
Computing. Then we propose a middleware requirement model including users’ and
resources’ variable requirements. After that, a component dynamic behavior
model is presented. Next, an adaptive requirement framework is given in
detail, which can automatically tune middleware configuration parameters, and
conduct a safe and dynamic component composition to preserve the middleware
QoS requirements. Finally, it is prototyped and validated by using a mobile
music program to analyze performance of this framework.
Keywords: Ubiquitous Computing, Adaptive middleware, Component-based
technology
Title of the Paper: Blind
Watermark Algorithm Based on HVS and RBF Neural Network in DWT Domain
DOWNLOAD
FULL PDF
Authors:
Yanhong Zhang
Abstract: This paper proposes a new blind watermarking scheme based on
discrete wavelet transform(DWT) domain. The method uses the HVS model, and
radial basis function neural networks(RBF). RBF will be implemented while
embedding and extracting watermark. The human visual system (HVS) model is
used to determine the watermark insertion strength. The neural networks almost
exactly recover the watermarking signals from the watermarked images after
training and learning. The experimental results show that the watermark
proposed in this paper is invisible ( the PSNR is higher than 41) and is
robust in the case of against some normal at tacks such as JPEG compression ,
additive noise and filtering , etc.
Keywords: Blind digital watermarking, wavelet transform, RBF neural network,
robustness
Title of the Paper: Research
and Practice of Distributed Test Platform
DOWNLOAD
FULL PDF
Authors:
Feng Qinqun, Yun Wenfang, Peng Sheqiang
Abstract: After concise introduction of Software test and its significance, an
integration environment of Distributed Test Platform for software testing is
proposed and its two departments, including Test Server and Test Driver, are
described subsequently. The composition of Test Server based on Metadata
Service is presented. The Metadata Service’s element and its runtime principle
are described in details. Finally summarization is listed.
Keywords: Software Test, Distributed Test Platform, Test Driver , Test Server,
Metadata Service
Issue
2, Volume 8, February 2009
Title of the Paper: A
Fast Geometric Rectification of Remote Sensing Imagery Based on Feature Ground
Control Point Database
DOWNLOAD
FULL PDF
Authors:
Jian Yang, Zhongming Zhao
Abstract: This paper, on the basis of the traditional design of database for
ground control point, tries to founded a fast auto-correction method of
satellite remote sensing imagery based on feature ground control point
database which brings local feature points as the effective supplement and
aims to achieve the automatic matching between feature ground control points
and original images that need geometric correction and improve the rectified
process utilizing random sample consensus (RANSAC algorithm). In this method,
the author realize the auto-extraction of feature ground control points for
ensuring speed and precise geometric correction of a high volume of satellite
remote sensing images by means of analyzing feature ground control point
database algorithm.
Keywords: Ground Control Point (GCP) Database, feature matching, local
invariance, feature ground control points
Title of the Paper: Mitigation
of the Effects of Selfish and Malicious Nodes in Ad-hoc Networks
DOWNLOAD
FULL PDF
Authors:
Houssein Hallani, Seyed A. Shahrestani
Abstract: A wireless Ad-hoc network is a group of wireless devices that
communicate with each other without utilising any central management
infrastructure. The operation of Ad-hoc networks depends on the cooperation
among nodes to provide connectivity and communication routes. However, such an
ideal situation may not always be achievable in practice. Some nodes may
behave maliciously, resulting in degradation of the performance of the network
or even disruption of its operation altogether. To mitigate the effect of such
nodes and to achieve higher levels of security and reliability, this paper
expands on relevant fuzzy logic concepts to propose an approach to establish
quantifiable trust levels between the nodes of Ad-hoc networks. These trust
levels are then used in the routing decision making process. Using OPNET and
MATLAB simulators, the proposed approach is validated and further studied. The
findings show that when the proposed approach is utilised, the overall
performance of the Ad-hoc network is significantly improved.
Keywords: Ad-hoc networks, Behavior analysis, Malicious attacks, Simulation,
Throughput
Title of the Paper: Modal
Learning Neural Networks
DOWNLOAD
FULL PDF
Authors:
Dominic Palmer-Brown, Sin Wee Lee, Chrisina Draganova, Miao Kang
Abstract: This paper will explore the integration of learning modes into a
single neural network structure in which layers of neurons or individual
neurons adopt different modes. There are several reasons to explore modal
learning. One motivation is to overcome the inherent limitations of any given
mode (for example some modes memorise specific features, others average across
features, and both approaches may be relevant according to the circumstances);
another is inspiration from neuroscience, cognitive science and human
learning, where it is impossible to build a serious model without
consideration of multiple modes; and a third reason is non-stationary input
data, or time-variant learning objectives, where the required mode is a
function of time. Two modal learning ideas are presented: The Snap-Drift
Neural Network (SDNN) which toggles its learning between two modes, is
incorporated into an on-line system to provide carefully targeted guidance and
feedback to students; and an adaptive function neural network (ADFUNN), in
which adaptation applies simultaneously to both the weights and the individual
neuron activation functions. The combination of the two modal learning
methods, in the form of Snap-drift ADaptive FUnction Neural Network (SADFUNN)
is then applied to optical and pen-based recognition of handwritten digits
with results that demonstrate the effectiveness of the approach.
Keywords: Modal Learning, Snap-drift, ADFUNN, SADFUNN, e-learning,
Personalized Learning, Diagnostic Feedback, Multiple Choice Questions
Title of the Paper: An
Improved BP Neural Network for Wastewater Bacteria Recognition Based on
Microscopic Image Analysis
DOWNLOAD
FULL PDF
Authors:
Li Xiaojuan, Chen Cunshe
Abstract: The microscopic images of wastewater bacteria are analysed, and a
scheme for classification and recognition for wastewater bacteria based on
microscopic images analysis are put forward in the paper. An adaptive and
enhanced edge detection solution for the images of wastewater bacteria is
proposed, which can effectively remove noises in the images and get clear
edges of microscopic image by optimizing segmentation threshold and the varied
order of edge detection. Seven contour invariant moment features and four
morphological features are extracted by analysis of microscopic images of
wastewater bacteria in which six features are chosen by PCA in order to reduce
the dimensionality of the features extracted from the images. A self-adaptive
accelerated BP algorithm is developed for training the classification of
bacteria microscopic images. The proposed method is tested with CECC database
and the results show that the presented image recognition solution is
effective and can greatly improve the speed and consistency in performing
large-scale surveys or rapid determination of bacterial abundance, morphology.
Keywords: BP Neural Network, Edge Detection ,Wastewater Bacteria, Contour
Invariant moment
Title of the Paper: Algorithm
for Optimal Dimensioning of Three Phase and Mono Phase Electric Power Lines
Implemented in Java
DOWNLOAD
FULL PDF
Authors:
Cristian Abrudean, Manuela Panoiu
Abstract: In this paper it was present a Java software package useful for
dimensioning of low voltage lines mono phase and three phases (AC and DC). For
electric grid modelling it was use tree type. This package software allows the
estimation and calculation of parameters of power transmission lines of
electric power. The software have a graphical user interface, so the user has
the possibility to input of data and other characteristics of the electric
line, passing to the calculation stage when the data are correctly and
completely entered. It was use a recursive algorithm in order to calculate the
total active and reactive currents and the admissible loss voltage based on
the users (consumers) characteristics. The output of the results is shown on
the screen.
Keywords: Computer software, electrical grid, optimal dimensioning, Java
Title of the Paper: Visual
Interactive Environment for doing Geometrical Constructions
DOWNLOAD
FULL PDF
Authors:
Anca Iordan, George Savii, Manuela Panoiu, Caius Panoiu
Abstract: In this work will be presented the elaboration of an educational
informatics system for doing geometry on a computer. In a way it replaces
pencil, paper, ruler and compass with equivalent computer tools. The achieved
informatics system will be able to be used for teachning Euclidean geometry,
both in pre-university and in university education.
Keywords: Dynamical software, Euclidean geometry, Java, distance education
Title of the Paper: UML4ODP:
OCL 2.0 Constraints Specification & UML Modeling of Interfaces in the
Computational Metamodel
DOWNLOAD
FULL PDF
Authors:
Oussama Reda, Bouabid El Ouahidi, Daniel Bourget
Abstract: The purpose of this work is analysis of computational language
concepts and introduction of novel pertinent ones in order to provide a new
computational metamodel of interaction signatures in UML4ODP FDIS. we mainly
introduce the concept of Functional computational interface which unify signal
and operation interfaces notions. The unification of signal and operation
interactions concepts is presented by introducing the Parameterized
interaction concept. We show that parameterized interactions are of two main
kinds; namely, primitives and compounds. we also introduce the notion of
incoming and outgoing primitives. As an application of our modeling choices we
redefine interaction, refinement and type checking rules in a concise manner,
and then specify them using the useful specification functionalities of OCL
2.0, showing how novel definitions as well as their specification are easy to
read, write and understand.
Keywords: RM-ODP, UML4ODP, Computational language, Meta-modeling,
Computational interface, Interaction Signature, type checking, Interaction
refinements
Title of the Paper: Towards
a Study Opportunities Recommender System in Ontological Principles-based on
Semantic Web Environment
DOWNLOAD
FULL PDF
Authors:
Ana Maria Borges, Richard Gil, Marla Corniel, Leonardo Contreras, Rafael H.
Borges
Abstract: A professional career selection is a complicated process for
university student candidates and often little technical tolls are available
for who aim to enter to the superior education system, since it is necessary
to consider the incidence of a multiplicity of variables to obtain a
“satisfactory answer” that comes near to the idea that they have preconceived.
These variables build up a complex relations map that requires the formulation
of an exhaustive and rigorous conceptual scheme.
In this research a domain ontological model is presented as support to the
student’s decision making for opportunities of University studies level of the
Venezuelan education system. For the declaration of the domain ontological
model developed, the information provided by two organisms (OPSU & CNU) is
used. Both are responsible to design the policies and strategies for the
superior education in Venezuela. The ontology is designed and created using
Methontology approach, since this methodology offers the possibility of
improving the progressive creation or captures and knowledge articulation, its
elements and relations. In order to represent the ontology Protege 3.1.1 tool
is used, based on the ontological language for the Web: OWL (Web Ontology
Language) and; finally, to accede and to visualize the ontology, an
application based on the Semantic Web is developed.
In the field of the computation, computer science and systems, the concept of
profiles or users models has many meanings and connotations, its first and
greater diffusion arise with the development and use of on-line increasing
systems; however, they have gain great preponderance recently, not only to
refer and/or to respond to the passive user who approaches “the system”, but
for the possibility of taking care of a user stimulated and attracted by “the
system”. In that sense, the possibility of this “personalized attention”
and/or recommendations from “the system” will be obviously conditioned by the
user context.
Centered on the possibility of giving that “customized attention” from which
they must select an option between many, it is tried in the future to
construct a meta-ontology that integrates the domain ontology with a user
profile ontology, thus aiming towards to a Semantic Recommendation System
under Multiagent approach in the future, that could be useful to support
students decision making process for career selection over different study
opportunities in Higher Education level in Venezuela.
Keywords: Study Opportunities, Ontology, Semantic Web, Ontology Development,
User Profiles, User Context, Intelligent Agents
Title of the Paper: Tactile
Fabric Comfort Prediction Using Regression Analysis
DOWNLOAD
FULL PDF
Authors:
Les M. Sztandera
Abstract: In this paper we explore complex relationships between mechanical
and sensory properties of fabrics, and the perceived tactile comfort.
Mechanical properties, measured objectively by Kawabata Evaluation System for
Fabrics (KES-FB), and handfeel properties, measured subjectively by sensory
expert panel, are related to the tactile comfort of fabrics using statistical
regression approaches. A universe of 48 fabrics is examined to analyze and map
the relations. The initial 17 mechanical and 17 handfeel parameter sets were
reduced to 4 and 5 properties, respectively. Adjusted R2 values were 0.657 for
mechanical and 0.863 for handfeel parameters, reflecting sound goodness-of-fit
measures, and providing reasonable ways for prediction of tactile fabric
comfort from mechanical and handfeel parameters.
Keywords: Tactile perception, fabric mechanical properties, regression
analysis, textile property analysis
Title of the Paper: Identification
of the Most Significant Properties Influencing Tactile Fabric Comfort Using
Regression Analysis
DOWNLOAD
FULL PDF
Authors:
Les M. Sztandera
Abstract: Engineered fabrics are being used increasingly in commercial and
domain-specific systems. Such fabrics with specified consumer-desired
characteristics can be computationally designed. Through the use of an
extensive database that correlates sensory and mechanical properties with
tactile comfort assessments, desired comfort can be predicted by measuring a
limited number of properties. In this paper we are focusing on the most
significant sensory and mechanical properties influencing tactile fabric
comfort. Output systems can be optimized to exhibit the highest level of
comfort by engineering a fabric with specific sensory and mechanical
properties. This paper examines stepwise regression analysis and identifies
the most significant properties influencing tactile fabric comfort. The
reported Beta coefficients are the standardized regression coefficients. Their
absolute magnitudes reflect their relative importance in predicting comfort
values. A universe of 48 fabrics is examined to analyze and map the relations.
The initial 17 mechanical and 17 sensory parameter sets are reduced to sets of
1 to 4 and 1 to 5 properties, respectively. Adjusted R2 values were 0.360 to
0.657 for mechanical and 0.713 to 0.863 for sensory parameters, reflecting
sound goodness-of-fit measures, and providing reasonable ways for identifying
the mechanical and sensory properties that are most significant influences on
tactile fabric comfort. Elongation and hysteresis of shear force were found to
be the most influential mechanical properties, while compression resilience
rate and graininess were found to be the sensory properties that most impacted
comfort.
Keywords: Tactile perception, fabric mechanical properties, stepwise
regression analysis, standardized importance factors, textile property
analysis
Title of the Paper: Web-based
Multiuser Interior Design with Virtual Reality Technology
DOWNLOAD
FULL PDF
Authors:
Yen-Chun Lin, Chen-Chuan Pan
Abstract: A Web-based interior design application system, named Multiuser
Interior Design (MID), is presented. Technologies from virtual reality (VR),
the Web, and database are used to implement MID. It allows users to operate in
the VR fashion, interacting with 3D virtual objects and spaces through a Web
browser. Users can view and elaborate designs, examine furniture, and even
place purchase orders of furniture. MID contains various features, including
multiuser collaboration and concurrent display of multiple views of a scene.
MID can be modified for other e-commerce purposes; many of the functions serve
as a reusable framework.
Keywords: E-commerce, Interior design, Internet, Multiuser collaboration,
Reusable framework, Three-tier architecture, Virtual reality, Web-based
Title of the Paper: Digital
Game-Based Learning (DGBL) Model and Development Methodology for Teaching
History
DOWNLOAD
FULL PDF
Authors:
Nor Azan Mat Zin, Wong Seng Yue, Azizah Jaafar
Abstract: History subject plays a vital role in instilling the spirits of
patriotism among the students; to nourish and instill love and loyalty to
one’s country and to be a true citizen. The lack of creativity in history
teaching caused process effectively and interestingly especially among young
learners. Digital Game Based Learning (DGBL) approach utilizes the game as a
medium for conveying learning contents. There are many models for educational
games development which combined the Instructional Design (ID) and game
development process. However, there is still a conflict on how to merge ID and
game development effectively. Therefore, we looked into the pedagogy and game
design aspects. We then propose a DGBL model for History educational games
design and a development methodology which combined the ID and game
development process, named DGBL-ID model. The DGBL-ID model consists of five
phases: analysis, design, development, quality assurance as well as
implementation and evaluation.
Keywords: Serious games, DGBL, Instructional Design (ID), History educational
game, video games
Title of the Paper: Adaptive
Multi-Constraints in Hardware-Software Partitioning for Embedded
Multiprocessor FPGA Systems
DOWNLOAD
FULL PDF
Authors:
Trong-Yen Lee, Yang-Hsin Fan, Chia-Chun Tsai
Abstract: An embedded multiprocessor field programmable gate array (FPGA)
system has a powerful and flexible architecture that the interaction between
hardware circuits and software applications. Modern electronic products, such
as portable devices, consumer electronics and telematics, can be evaluated
rapidly in this platform via the implementation of a set of hardware and
software tasks. However, the functionality is markedly increased, resulting in
a significant raise in the number of hardware and software tasks.
Consequently, too large of a solution space is formed to achieve
hardware-software partitioning. Moreover, a partitioning result with low power
consumption and fast execution time is difficult to obtain since meeting
simultaneously multi-constraints from hundreds of thousands of combinations of
hardware-software partitions is difficult. Thus, this work presents a
hardware-software partitioning scheme that can obtain a partitioning result
that satisfies multi-constraints from massive solution space. Specifically,
this study attains a partitioning result with low power consumption and fast
execution time. The effectiveness of the proposed approach is demonstrated by
assessing a JPEG encoding system and a benchmark with 199 tasks.
Keywords: Adaptive multi-constraints partitioning, hardware-software
partitioning, embedded multiprocessor system, FPGA system, hardware-software
codesign
Title of the Paper: Intelligent
Entry Control
DOWNLOAD
FULL PDF
Authors:
Erik Dovgan, Matjaz Gams
Abstract: Entry control is an important issue for security and optimization
reasons. Input sensors based on biometrics and intelligent methods that learn
from experience are used to recognize terrorists or simply to detect an
unusual behavior of regular stuff. We have designed and developed an
intelligent entry system consisting of four independent modules: expert
system, micro learning, macro learning and camera. In the experimental set-up,
there are four input sensors: a door sensor, an identity card reader, a
fingerprint reader and a camera. Each of the four modules produces an
explanation that categorizes an event as alarm or normal, and the system
proposes the final suggestion with explanation.
Keywords: Ambient intelligence, access control, event classification
Title of the Paper: Activate
the Dynamic Delegation Process in X.509 Certification via a New Extension
DOWNLOAD
FULL PDF
Authors:
Moutasem Shafa'amry, Nisreen Alam Aldeen
Abstract: The increasing number of clients and users of e-banking,
e-government and e-application through digital communications, made it a must
to develop new methods and solutions for authentications and secure access.
Digital certificates are one of these methods for secure transactions, X.509
certificate is one standard for these digital certificates, Despite the fact
that x.509 certificate is of high level of security and authenticity, it has
many weaknesses as not applying dynamic delegation to it.. The efficiency of
proxy certificate which proposed as a practical solution in the field of
dynamic delegation could not find solutions for its weaknesses Which were the
main motivation to work on this research trying to come up with new solution
which integrates the pros of X.509 and the pros of Proxy certificate to
benefit from the specifications of each one and to avoid the weaknesses of
them. this paper will cover the standard of Digital certificates and its
relation with dynamic delegation, focusing on the weaknesses of applying these
standards to dynamic delegation then we propose our solution to make it
applicable and more efficient to apply dynamic delegation to digital
certificate standards. Finally we will cover the pros and cons of our new
solution, some conclusions and future work.
Keywords: Digital certification systems, X.509 standard, Proxy Certificates,
authentication (PCA), Dynamic delegation, Identity verification, Network
security, e-security
Title of the Paper: Using
Palette and Minimum Spanning Tree for True-Color Image Steganography
DOWNLOAD
FULL PDF
Authors:
Show-Wei Chien, Yung-Fu Chen, Pei-Wei Yen, Hsuan-Hung Lin
Abstract: Steganography is an application of data hiding which can attain
camouflage and increase security by embedding the secret message into digital
media for sending to the receiver without leaking to the third party. Several
proposed methods which construct stegoimage by embedding the secret message
into the colour palette. The person who receives the stegoimage can extract
the secret message from the palette obtained by the received image. This
method, however, greatly degrades the quality of the stegoimage and tends to
arouse the intention of the intruders. In this paper, we propose a method for
constructing stegoimages with high quality which greatly eliminate the above
problem. The advantage of the proposed method is that the image quality is
highly improved by accompanying with improvement of security and camouflage of
the secret message. In order to avoid the intruder to attack the generated
palette when transmission, the sender does not need to send the palette to the
receiver directly, but instead asking the receiver to own a copy of the
original secret image or obtain one when needed for extracting the secret
message. Fortunately, there are several image pools which contain a lot of
images allowing to be accessed by the public. The experimental results show
that our method outperforms EZ stego and the methods proposed by Fridrich and
Wu et al.
Keywords: Steganography, Palette optimization, Minimum Spanning Tree
Title of the Paper: A
Novel Field-Source Reverse Transform for Image Structure Representation and
Analysis
DOWNLOAD
FULL PDF
Authors:
X. D. Zhuang, N. E. Mastorakis
Abstract: The image source-reverse transform is proposed for image structure
representation and analysis, which is based on an electro-static analogy. In
the proposed transform, the image is taken as the potential field and the
virtual source of the image is reversed imitating the Gauss’s law. Region
border detection is effectively implemented based on the virtual source
representation of the image structure. Moreover, the energy concentration
property of the proposed transform is investigated for promising application
in lossy image compression. Experimental results indicate that the proposed
source-reverse transform can achieve efficient representation of image
structure, and has promising application in image processing tasks.
Keywords: Source-reverse transform, electro-static field, region border
detection, lossy image compression
Title of the Paper: Identifying
Crosscutting Concerns using Partitional Clustering
DOWNLOAD
FULL PDF
Authors:
Gabriela Czibula, Grigoreta Sofia Cojocar, Istvan Gergely Czibula
Abstract: Aspect mining is a research direction that tries to identify
crosscutting concerns in already developed software systems, without using
aspect oriented programming. The goal is to identify them and then to refactor
them to aspects, to achieve a system that can be easily understood, maintained
and modified. In this paper we aim at presenting a partitional clustering
algorithm for identifying crosscutting concerns in existing software systems.
We experimentally evaluate our algorithm using the open source JHotDraw case
study, for three distance functions, providing a comparison of the proposed
approach with similar existing approaches. The experimental evaluation
conducts us to the best semi-metric distance function to be used in the
clustering process.
Keywords: Aspect mining, crosscutting concerns, clustering
Title of the Paper: FF-Based
Feature Selection for Improved Classification of Medical Data
DOWNLOAD
FULL PDF
Authors:
Yan Wang, Lizhuang Ma
Abstract: In processing the medical data, choosing the optimal subset of
features is important, not only to reduce the processing cost but also to
improve the classification performance of the model built from the selected
data. Rough Set method has been recognized to be one of the powerful tools in
the medical feature selection. However, the high storage space and the
time-consuming computation restrict its application. In this paper, we propose
two new concepts: discernibility string and feature forest, and an efficient
algorithm, the Feature Forest Based (FF-Based) algorithm, for generation of
all reducts of a medical dataset. The algorithm consists of two phases:
feature forest construction phase and disjunctive normal form computation
phase. In the first phase, the discernibility strings that are the
concatenation of some of features between two different cases construct the
feature forest. In the second phase, the disjunctive normal form is computed
to reduct features based on feature forest. The experimental results on the
medical datasets of UCI machine learning repository and a real liver cirrhosis
dataset show that the algorithms of this paper can efficiently reduce storage
cost and improve the classification performance.
Keywords: Feature selection, rough set, disjunctive normal form, feature
forest, discernibility string
Title of the Paper: Analysis
of System Bus Transaction Vulnerability based on FMEA Methodology in SystemC
TLM Design Platform
DOWNLOAD
FULL PDF
Authors:
Yung-Yuan Chen, Chung-Hsien Hsu, Kuen-Long Leu
Abstract: Intelligent safety-critical systems, such as intelligent automotive
systems or intelligent robots, require a stringent reliability while the
systems are in operation. As system-on-chip (SoC) becomes prevalent in the
intelligent system applications, the reliability issue of SoC is getting more
attention in the design industry while the SoC fabrication enters the very
deep submicron technology. The system bus, such as AMBA AHB, provides an
integrated platform for IP-based SoC. Apparently, the robustness of system bus
plays an important role in the SoC reliability. In this study, we propose a
useful bus system vulnerability model and present a thorough analysis of
system bus vulnerability in SystemC transaction-level modeling (TLM) design
level by injecting faults into the bus signals, which can assist us in
predicting the robustness of the system bus, in locating the weaknesses of the
bus system, and in understanding the effect of bus faults on system behavior
during the SoC design phase. The impact of benchmarks on system bus
vulnerability is also addressed. The contribution of this work is to promote
the dependability verification to TLM abstraction level that can significantly
enhance the simulation performance, and provide the comprehensive results to
validate the system bus dependability in early design phase for
safety-critical applications.
Keywords: Fault injection, reliability, SystemC, system bus dependability,
system-on-chip (SoC)
Issue
3, Volume 8, March 2009
Title of the Paper: Implementing
Lightweight Reservation Protocol for Mobile Network Using Hybrid Schema
DOWNLOAD
FULL PDF
Authors:
Abdullah Gani, Lina Yang, Nor Badrul Anuar, Omar Zakaria, Ros Surya Taher
Abstract: This paper presents our method to improve lightweight reservation
protocol. This was inspired by the ever increasing volume of multimedia
traffic over the Internet which demanding quality of service beyond the
traditional best-effort. The Integrated Services model relies on the Resource
reservation Protocol (RSVP) for signaling and reserving resources. RSVP uses
the receiver-initiated reservation mechanism to set up the reservation which
executes protocol complexity and incurs additional processing and storage
overheads on the routers. Due to heavyweight characteristic, many researchers
changed the focus to the lightweight reservation protocol. In this paper, we
propose a lightweight signaling protocol of Sender-initiated and
Mobility-support Reservation Protocol (SMRP) with Crossover Router (COR) as an
extension to SMRP. COR scheme cannot provide smooth handover as it affects the
SMRP in Mobile hosts. This is the main disadvantage of COR scheme. Pointer
Forwarding Scheme makes an advance resource reservation only a forwarding
one-step path from the sender along the forwarding chains. In order to make
SMRP more suitable for Mobile hosts, we propose a hybrid method combining the
advantages of COR scheme with Pointer Forwarding scenarios. We use ns2 Java
version network simulator to test it. We evaluate the performance of SMRP in a
mobile network environment. The results show that the hybrid scheme can
support seamless and also efficient SMRP path rerouting during handoff in
respect of decreased the drop probability.
Keywords: QoS, Wireless Network, RSVP, SMRP, Hybrid Schemes, Resource
Reservation
Title of the Paper: A
Method for Land Consolidation Progress Assessment Based on GPS and PDA
DOWNLOAD
FULL PDF
Authors:
Guangming Zhu, Yingyi Chen, Daoliang Li
Abstract: Field survey is a traditional method in the process of land
consolidation. But it has such as low efficiency, long time, and some other
shortcomings in measuring length, area and calculating the amount of small
object, especially for the project area with more complex terrain. The paper
puts forward using GPS/PDA to calculate progress for project of land
consolidation, which propels the application of GPS/PDA in the fields of land
consolidation. The paper introduces the principle of GPS, interface of GPS and
PDA, realize real time interaction between the field of project area and the
electronic maps by using GPS’s location function, on the basis of which
accomplishes real time judgment for project land features’ progress,
quantities and some other accuracy of information.
Keywords: GPS, PDA, land consolidation, progress
Title of the Paper: A
Spatial Decision Support System for Land-use Structure Optimization
DOWNLOAD
FULL PDF
Authors:
Xiaoli Li, Yingyi Chen, Daoliang Li
Abstract: This article describes a decision support system for land-use
structure optimization and land-use allocation. This system was established
for the rural land managers to explore their land use options. It integrated
database technology, expert system technology and spatial decision support
system technology. The DSS consist of four components: a geographic
information system (GIS), land use modules, a graphical user interface and
land use planning tools. The linear programming, fuzzy clustering, and other
land-use structure optimization algorithms are implemented on the ArcEngine
software platform. The system has been applied in Beijing Pinggu area. The
results suggest that this system can be a useful tool to support management
decisions.
Keywords: Land-use Structure Optimization, Land use allocation, ComGIS, DSS
Title of the Paper: Application
of Image Texture Analysis to Improve Land Cover Classification
DOWNLOAD
FULL PDF
Authors:
Xiaochen Zou, Daoliang Li
Abstract: Image texture analysis has received a considerable amount of
attention over the last few years as it has played an important role in the
classification of the remote sensing images. This paper provides an overview
of several different approaches to image texture analysis and demonstrates
their use on the problem of land cover classification. We used grey level
co-occurrence matrix (GLCM) method to assistant the land cover classification
and then compared and evaluated all of the result of classifications. In the
experimentation, by comparing the classification result of contrast, energy
and entropy we find out that the preferable texture features of grey level co-
occurrence matrices method was contrast. In this thesis, it used the feature
images helping the classification of remote sensing and obtained good result.
And it also used C++ programming language to write a programme to compute the
number of the feature of texture.
Keywords: Land cover classification, Texture analysis, Grey level
co-occurrence matrices method, Texture feature
Title of the Paper: A
Knowledge Management Practice Investigation in Romanian Software Development
Organizations
DOWNLOAD
FULL PDF
Authors:
Iuliana Scorta
Abstract: Knowledge plays an increasingly larger role in organizations and
many consider it the most important factor of production in a knowledge
economy. Knowledge is dynamic and evolves with technology, organizational
culture and the changing needs of organization’s software development
practices. In this paper I frame my research by discussing the importance of
knowledge management in software engineering. After presenting the landscape
inspiring the study research questions I conduct an investigation for
evaluating aspects of knowledge management practice in Romanian software
engineering industry and discuss the major findings.
Keywords: Tacit knowledge, Explicit knowledge, Knowledge management, Romanian
software engineering
Title of the Paper: Quality
Control and ISO Quality Compliance in the Product Lifecycle Management at
Siemens
DOWNLOAD
FULL PDF
Authors:
Clotilde Rohleder
Abstract: From our experience with customers who deploy customized software
products, we have learned that deriving products from shared software assets
requires more than complying with quality standards like ISO9126.
Additionally, developers must consider what we call the quality profile of the
final product. A process that matches the quality profile of final product
during product derivation helps provide and validate industrial software
application solutions. This paper describes this matching concept and its
application in a case study of the development of a product lifecycle
reporting tool at a large organization. Also we propose a tool to improve
compliance with ISO Quality Standards and that could enhance quality control
in derivation process.
Keywords: Quality Product Derivation, Requirements Engineering, Non-Functional
Requirements, ISO Quality Standards, Quality Compliance
Title of the Paper: A New
Iterative Approach for Dominant Points Extraction in Planar Curves
DOWNLOAD
FULL PDF
Authors:
Cecilia Di Ruberto, Andrea Morgera
Abstract: In this paper the problem of dominant point detection on digital
curves is addressed. Based on an initial set of curvature points, our approach
adds iteratively significant points by looking for the higher curvature
contour points. The process continues until all the sums of the distances of
contour points in the arcs subtended to the chord between two next dominant
points is less then a predefined threshold. A final refinement process adjusts
the position of located dominant points by a minimum integral square error
criterion. We test our method by comparing its performance with other well
known dominant point extraction techniques successfully. In the last section
some examples of polygonal approximation are shown.
Keywords: Curvature, Digital Curve, Dominant Points, Polygonal Approximation
Title of the Paper: 'No
Representation without Information Flow' - Measuring Efficacy and Efficiency
of Representation: An Information Theoretic Approach
DOWNLOAD
FULL PDF
Authors:
Junkang Feng, Yang Wang
Abstract: Representation is a key concept for semiotics and for information
systems. Stamper’s framework may be seen outlining what is required for the
efficacy of signs in standing for (i.e., representing) something else in an
organization, among many others. We explore how the efficacy and the
efficiency of representation may be measured, which seems overlooked in
available literature of information systems and organizational semiotics. And
we approach this problem from the perspective of what we call the ‘information
carrying’ relation between the representation and the represented. We model
the represented as an information source and the representation an information
carrier, and the ‘representing’ relationship between them as that of
‘information carrying’. That is, information is carried and therefore flows.
These then are further modeled mathematically as random variables and random
events, and a special relationship between random events. This approach
enables us to reveal a necessary condition for the efficacy and the efficiency
of representation, and to measure it. To this end we extend Dretske’s semantic
theory of information. The conviction that we put forward here is ‘No
representation without information flow’, based upon which the efficacy and
efficiency of a representation system may be measurable.
Keywords: Representation, Information systems, Information theory, Information
content, Database design
Title of the Paper: Nighttime
Vehicle Light Detection on a Moving Vehicle using Image Segmentation and
Analysis Techniques
DOWNLOAD
FULL PDF
Authors:
Yen-Lin Chen
Abstract: This study proposes a vehicle detection system for identifying the
vehicles by locating their headlights and rear-lights in the nighttime road
environment. The proposed system comprises of two stages for detecting the
vehicles in front of the camera-assisted car. The first stage is a fast
automatic multilevel thresholding, which separates the bright objects from the
grabbed nighttime road scene images. This proposed automatic multilevel
thresholding approach provide the robustness and adaptability for the system
to operate on various illuminated conditions at night. Then the extracted
bright objects are processed by the second stage – the proposed
knowledge-based connected-component analysis procedure, to identify the
vehicles by locating their vehicle lights, and estimate the distance between
the camera-assisted car and the detected vehicles. Experimental results
demonstrate the feasibility and effectiveness of the proposed approach on
vehicle detection at night.
Keywords: Computer vision, vehicle detection, image segmentation, image
analysis, multilevel thresholding, autonomous vehicles
Title of the Paper: Triplet-Based
Topology for On-Chip Networks
DOWNLOAD
FULL PDF
Authors:
Wang Zuo, Zuo Qi, Li Jiaxin
Abstract: Most CMPs use on-chip network to connect cores and tend to integrate
more simple cores on a single die. As the number of cores increases, on-chip
network will play an important role in the performance of future CMPs. Due to
the tradeoff between the performance and area constraint in on-chip network
designs, we propose the use of triplet-based topology in on-chip
interconnection networks and demonstrate how a 9-node triplet-based topology
can be mapped to on-chip network. By using group-caching protocol to exploit
traffic locality, triplet-based topology achieve lower latency and energy
consumption than 2D-MESH. We run multithreaded commercial benchmarks on
multi-core simulator GEMS to generate practical traffics and simulate these
traffics on network simulator Garnet. Our experiment results show that
triplet-based network can increase the work-related throughput by 3%~11% and
reduce average network latency by 24%~32% compared with 2D-MESH, with the
router energy consumption reduced by 13%~16% and the link energy consumption
reduced by 14%~16%.
Keywords: On-chip network, Cache protocol, Network latency, Energy
consumption, Performance, Mapping
Title of the Paper: Neural
Architectures Optimization and Genetic Algorithms
DOWNLOAD
FULL PDF
Authors:
Mohamed Ettaouil, Youssef Ghanou
Abstract: The artificial neural networks (ANN) have proven their efficiency in
several applications: pattern recognition, voice and classification problems.
The training stage is very important in the ANN’s performance. The selection
of the architecture of a neural network suitable to solve a given problem is
one of the most important aspects of neural network research. The choice of
the hidden layers number and the values of weights has a large impact on the
convergence of the training algorithm. In this paper we propose a mathematical
formulation in order to determine the optimal number of hidden layers and good
values of weights. To solve this problem, we use genetic algorithms. The
numerical results assess the effectiveness of the theorical results shown in
this paper and computational experiments are presented, and the advantages of
the new modelling.
Keywords: Artificial neural networks (ANN), Non-linear optimization, Genetic
algorithms, Supervised Training, Feed forward neural network
Title of the Paper: Performance
Analysis of Mobile IP Registration Protocols
DOWNLOAD
FULL PDF
Authors:
Rathi S, Thanushkodi K
Abstract: Mobile IPv6 will be an integral part of the next generation Internet
protocol. The importance of mobility in the Internet gets keep on increasing.
Current specification of Mobile IPv6 does not provide proper support for
security in the mobile network and there are other problems associated with
it. This paper is concerned with security aspects of the Registration
protocols in Mobile IP. Providing security in Mobile IP registration is highly
important. The registration part must be guarded against any malicious attacks
that might try to take illegitimate advantage from any participating
principal. This paper deals with the performance analysis of various protocols
available for Mobile IP registration. The parameters considered for comparison
are: Data confidentiality, Authentication, Attack prevention, Registration
delay and Computational complexity. This paper aims to determine the protocol
which outperforms others when the parameters mentioned above are taken into
consideration.
Keywords: Mobile IP, Mobility Agents, Confidentiality, Authentication, Attack
prevention and Registration delay
Title of the Paper: Architecture
for Address Auto-Configuration in MANET based on Extended Prime Number Address
Allocation (EPNA)
DOWNLOAD
FULL PDF
Authors:
Harish Kumar, R. K. Singla
Abstract: An efficient technique for IP address auto-configuration for nodes
is an important component in the MANET setup. Previously proposed approaches
either need a broadcast over complete network and / or need a duplicate
address detection mechanism leading to an inefficient latency and overhead in
assignment of addresses. In this paper, an Extended Prime Number Address
Allocation (EPNA) technique has been proposed that is conflict free and
distributed technique. EPNA does not require broadcast and address assignment
can be completed with in maximum of four hop communications. In this technique
a large number of nodes are empowered to act as proxies to assign the
addresses and most of the time it is one-hop communication. Analytical results
show that EPNA is capable of auto-configuring any node without much latency
and overhead irrespective of address space. The proposed algorithm also gives
even IP address distribution and low complexity for small as well large sized
MANET.
Keywords: Auto-configuration architecture, Duplicate address detection, MANET,
IP address, EPNA
Title of the Paper: Association
Rules Mining Including Weak-Support Modes Using Novel Measures
DOWNLOAD
FULL PDF
Authors:
Jian Hu, Xiang-Yang Li
Abstract: In association rules mining application, some rules can provide a
lot of useful knowledge for us, though these rules have the lower Support,
called weak-support mode in this paper. However, in existing
Support-Confidence framework, the rules with lower Support will be lost. Thus,
this paper puts forward a new association rules mining technique, which sets
up the lower support threshold value to ensure the weak-support rules to be
mined and applies Csupport measure to recognise weak-support mode. Then, a new
measure, called as N-confidence, is used to restrict mining size in generation
frequent sets, which can strain away the weaksupport rules without
correlation. Furthermore, this paper puts forward a new interesting measure to
distinguish from the association rules interesting degree. In order to enhance
mining efficiency, a novel algorithm, namely FT-Miner, is presented to
discover association rules in a forest by using two new data structures,
including UFP-Tree and FP-Forest. The experimentation shows that the algorithm
not only mines useful and weaksupport rules, but also has better capability
than classical association rules mining algorithms.
Keywords: Data mining, Association rules, Weak-support mode, UFP-Tree,
FP-Forest
Title of the Paper: Automatic
Discovery of Data Resources in the E-Government Grid
DOWNLOAD
FULL PDF
Authors:
Xianhu Meng, Yan Wang, Wenyu Zhang, Jinqi Meng
Abstract: Nowadays, there is a growing number of e-government portals and
solutions that provide integrated governmental data resources to the customers
(citizens, enterprises or other public sectors). However, the administration
of distributed data resources are faced with increasing challenges caused by
the discovery difficulties across the internet. To overcome this, this paper
puts forward the concept of a model for automatic data resource discovery in
the data grid environment for e-government applications. The paper elaborates
the rule of global naming, brings forward metadata’s registration and storage
on the naming rule, and explores how to use it to find out the long-distance
data resources rapidly. The paper also sets forth the method for restraining,
sending and accessing data resources repeatedly by searching “comparison
table” and using the time marker under the multiple data grid nodes, and
points out that “comparison table” should adopt the strategy of prefering
frequently used data and clearing rarely used data.
Keywords: Data grid, E-government; Metadata; Global naming; Data discovery
Issue
4, Volume 8, April 2009
Title of the Paper: Analysis
of Alzheimer's Disease Progression in Structural Magnetic Resonance Images
DOWNLOAD
FULL PDF
Authors:
B. S. Mahanand, M. Aswatha Kumar
Abstract: Structural magnetic resonance imaging (MRI) of the brain is an
increasingly useful tool in the study of neurodegenerative diseases. MRI is
currently the fastest developing medical imaging modality which is applied to
an increasingly number of different medical diagnostic situations. Serial
acquisition structural images of a subject’s brain are acquired over time
offers opportunities to monitor the progression of tissue volume changes in
fine detail at all anatomical locations. As a result, the analysis of
structural MRI data has been an active area of image analysis research for
many years especially in early diagnosis, tracking of disease progression,
which makes it possible to investigate how, for instance, a patient responds
to treatment. The aim of the paper is to investigate and analyze brain tissue
changes in Alzheimer’s disease using nonrigid medical image registration and
statistical analysis techniques. In our proposed approach, first the source
and the target images are affinely registered to correct global differences
between the images and then non-rigid registration based on free-form
deformation using B-spline approximation is performed on the images. The
resulting displacement values from the non-rigid registration are further
investigated for deformation in the entire brain to detect typical deformation
patterns. Finally, statistical method namely t-test is performed for analysis
of the results. The initial results indicate that the tissue volume change in
the brain occurs predominantly in the hippocampus of the brain.
Keywords: Magnetic resonance imaging, Image registration, Free-form
deformation, Alzheimer’s disease, Statistical analysis, T-test
Title of the Paper: Public
Institutions’ Investments with Data Mining Techniques
DOWNLOAD
FULL PDF
Authors:
Adela Bara, Ion Lungu, Simona Vasilica Oprea
Abstract: Developing Decision Support Systems in public institutions such as
the National Power Grid Companies require applying very efficient methods in
order to support the decisions. The decision support system in the National
Power Grid Companies can integrate the energy prediction achieved by some data
mining algorithms that help managers to fundament their investment decisions
in order to justify the financial feasibility. This is done by estimating all
the benefits and costs during the life cycle. In order to estimate the
revenues, we need to know with certain accuracy the output of these power
plants. Due to the fact that the wind speed significantly fluctuates even
during a day at the same location, the wind power output is difficult to be
forecasted by statistical methods. In this paper we apply the data mining
techniques on the available measured weather data in order to predict the wind
power output and determine the financial feasibility of investment.
Keywords: Data Mining (DM), Decision support systems (DSS), Wind Power Plant (WPP),
wind power forecast, measured weather parameters
Title of the Paper: Improving
Performance in Integrated DSS with Object Oriented Modeling
DOWNLOAD
FULL PDF
Authors:
Adela Bara, Vlad Diaconita, Ion Lungu, Manole Velicanu
Abstract: The development cycle of a decision support system involves many
resources, time and high cost and above all, the database schema used in the
system is built only for some specific tasks. So, a relational database schema
or a data warehouse prototype cannot be easily mapped and reused in multiple
DSS projects. In this paper we propose an object-oriented (OO) approach and an
OO database schema to accomplish the DSS implementation which require a
multidimensional modeling at the conceptual level using fundamental concepts
of OO (class, attribute, method, object, polymorphism, inheritance, hierarchy)
to represent all multidimensional properties of a data warehouse, at both the
structural and dynamic levels.
Keywords: Decision support systems (DSS), SQL optimization, integration,
object-oriented modeling, object-oriented databases
Title of the Paper: Grammatical
Inference Methodology for Control Systems
DOWNLOAD
FULL PDF
Authors:
Aboubekeur Hamdi-Cherif, Chafia Kara-Mohammed
Abstract: Machine Learning is a computational methodology that provides
automatic means of improving programmed tasks from experience. As a subfield
of Machine Learning, Grammatical Inference (GI) attempts to learn structural
models, such as grammars, from diverse data patterns, such as speech,
artificial and natural languages, sequences provided by bioinformatics
databases, amongst others. Here we are interested in identifying artificial
languages from sets of positive and eventually negative samples of sentences.
The present research intends to evaluate the effectiveness and usefulness of
grammatical inference (GI) in control systems. The ultimate far-reaching goal
addresses the issue of robots for self-assembly purposes. At least two
benefits are to be drawn. First, on the epistemological level, it unifies two
apparently distinct scientific communities, namely formal languages theory and
robot control communities. Second, on the technological level, blending
research from both fields results in the appearance of a richer community, as
has been proven by the emergence of many multidisciplinary fields. Can we
integrate diversified works dealing with robotic self-assembly while
concentrating on grammars as an alternative control methodology? Our aim is to
answer positively this central question. As far as this paper is concerned, we
set out the broad methodological lines of the research while stressing the
integration of these different approaches into one single unifying entity.
Keywords: Machine learning, robot control, grammatical inference, graph
grammar, formal languages for control, self-assembly, intelligent control,
emergent control technologies
Title of the Paper: Web
Service-Driven Framework for Maintaining Global Version Consistency in
Distributed Enterprise Portal
DOWNLOAD
FULL PDF
Authors:
Hui-Ling Lin, Shao-Shin Hung, Derchian Tsaih, Chiehyao Chang
Abstract: The explosion of the web has led to a situation where a majority of
the traffic on the Internet is web related. Today, practically all of the
popular web sites arc served from single locations. This necessitates frequent
long distance network transfers of data (potentially repeatedly) which results
in a high response time for users, and is wasteful of the available network
bandwidth. This paper presents a new approach to web replication, where each
of the replicas resides in a different part of the network, and the browser is
automatically and transparently directed to the “best” server. This paper
presents a transnational hierarchical global patch consistent model called
THGPCM (Transnational Hierarchical Global Patch Consistent Model). Improving
the OPDS (Original Patching Data Source) enabled network equipments, capable
of updating patch parameter that existed in enterprise with specified OPDS
partially dependency relationships. Apply scenario can reduce the global patch
service cost of transnational enterprise network equipments and minimum the
turnaround time of patch service delay.
Keywords: Service-oriented, patch, consistency, routing, distributed
Title of the Paper: An
Effective Sampling Method for Decision Trees Considering Comprehensibility and
Accuracy
DOWNLOAD
FULL PDF
Authors:
Hyontai Sug
Abstract: Because the target domain of data mining using decision trees
usually contains a lot of data, sampling is needed. But selecting proper
samples for a given decision tree algorithm is not easy, because each decision
tree algorithm has its own property in generating trees and selecting
appropriate samples that represent given target data set well is difficult. As
the size of samples grows, the size of generated decision trees grows with
some improvement in error rates. But we cannot use larger and larger samples,
because it’s not easy to understand large decision trees and data overfitting
problem can happen. This paper suggests a progressive approach in determining
a proper sample size to generate good decision trees with respect to generated
tree size and accuracy. Experiments with two representative decision tree
algorithms, CART and C4.5 show very promising results.
Keywords: Decision trees, proper sample size determination
Title of the Paper: Semantic
Networks-Based Teachable Agents in an Educational Game
DOWNLOAD
FULL PDF
Authors:
Harri Ketamo
Abstract: The aim of the study was to apply teachable agents into educational
game meant for children less than 12 years of age and evaluate the outcome in
context of cognitive psychology of learning. The study was done in two phases:
design phase and evaluation phase (N=300). The design of the game was done in
order to support relatively free use of teachable agents in an easy-to-use
environment. The main findings of the study were a clear causality between
quality of the taught semantic networks in game world and players' knowledge
in real life and an evidence that learning away is an important feature when
trying to enable conceptual change in educational games.
Keywords: Game AI, Reinforcement learning, Conceptual learning, Semantic
networks, Serious games
Title of the Paper: Higher
Education ERPs: Implementation Factors and their Interdependecies
DOWNLOAD
FULL PDF
Authors:
Ana-Ramona Bologa, Mihaela Muntean, Gheorghe Sabau, Iuliana Scorta
Abstract: In this paper we have analyzed some critical implementation factors
of an ERP project implementation in universities and their interdependencies.
Taking into consideration that for industry implementations there are already
many performed studies we started by considering university implementations as
a particular case for the industry ones. Starting from this, we have
identified and analyzed differences for the case of universities regarding
communication structure, management involvement, organization, implementation
team competences, legacy systems, inter-department communication, user
training, suppliers/ customers’ partnership, external consultants. The
conclusions of this study are going to be used in developing an evaluation
framework of ERP solutions for higher education management.
Keywords: ERP systems, critical success factors, higher education, university
management
Title of the Paper: Interactive
Natural Language Interface
DOWNLOAD
FULL PDF
Authors:
Faraj A. El-Mouadib, Zakaria Suliman Zubi, Ahmed A. Almagrous, I. El-Feghi
Abstract: To override the complexity of SQL, and to facilitate the
manipulation of data in databases for common people (not SQL professionals),
many researches have turned out to use natural language instead of SQL. The
idea of using natural language instead of SQL has prompted the development of
new type of processing method called Natural Language Interface to Database
systems (NLIDB). The NLIDB system is actually a branch of more comprehensive
method called Natural Language Processing (NLP). In general, the main
objective of NLP research is to create an easy and friendly environment to
interact with computers in the sense that computer usage does not require any
programming language skills to access the data; only natural language (i.e.
English) is required. Many systems have been developed to use the concept of
NLP in different varieties of domains, for example the system LUNAR [19] and
the system LADDER [8]. One drawback of previous systems is that the grammar
must be tailor-made for each given database. Another drawback is that many NLP
systems cover only a small domain of the English language questions. In this
paper we present the design and implementation of a natural language interface
to a database system. The system is called Generic Interactive Natural
Language Interface to Databases (GINLIDB). It is designed by the use of UML
and developed using Visual Basic.NET-2005. Our system is generic in nature
given the appropriate database and knowledge base. This feature makes our
system distinguishable.
Keywords: SQL, NLP, database, UML, NLIDB, DBMS, ATN
Title of the Paper: Latent
Knowledge Structures of Traversal Behavior in Hypertext Environment
DOWNLOAD
FULL PDF
Authors:
Perwaiz B. Ismaili
Abstract: In this paper, we introduce “Knowledge Diagraph Contribution” (KDC)
analysis as a novel categorical time-series method in observing underlying
traversal knowledge structure of experts by exploiting varying hypertext (web)
presentation formats and knowledge domains. The navigation behaviors were
studied by designing hypertext presentation formats and domain text that
adheres to content design principles inspired by discourse and text
comprehension scholars. As a continuation of previous study by Ismaili &
Golden [1], twenty undergraduate psychology students from University of Texas
at Dallas participated in this study. Students traversed through different
Hypertext (web) presentation formats while reading content from three
different knowledge domains controlled for micro (web-page, web-site) and
macro (consistent semantic connections across knowledge domains)
characteristics. The influence of expertise and web traversal behavior in
deriving underlying knowledge structures is presented using KDC analysis. In
addition, previously reported Classical data analysis (ANOVA) are compared
with KDC analysis in highlighting quantitative and qualitative differences of
these derived latent knowledge structures. As compared with novice, experts
tend to exhibit sequential and semantic traversal patterns across all three
web formats, whereas, novices are more influenced by and therefore tend to
employ random navigation strategies.
Keywords: Hypertext, Knowledge Structures, Navigation, Traversal Patterns,
Content Design, Expertise
Title of the Paper: Performance
Assessment of Search Management Agent under Asymmetrical Problems and Control
Design Applications
DOWNLOAD
FULL PDF
Authors:
Jukkrit Kluabwang, Deacha Puangdownreong, Sarawut Sujitjorn
Abstract: The article presents the performance evaluation of the management
agent (MA) containing the adaptive tabu search (ATS) as its search core. In
particular, asymmetrical surface optimization problems have been considered.
It has been found that symmetrical property of the problems has a significant
effect on search performance of the ATS, but MA(ATS). As an average, the
MA(ATS) is about 2 times faster than the ATS under both symmetrical and
asymmetrical problems. The article also gives reviews on the ATS and the
MA(ATS) algorithms. An application on controller design for a coupled system
with three-degree-of-freedom is also elaborated.
Keywords: Asymmetrical surface optimization problems, adaptive tabu search,
management agent
Title of the Paper: Redundancy
and its Applications in Wireless Sensor Networks: A Survey
DOWNLOAD
FULL PDF
Authors:
Daniel-Ioan Curiac, Constantin Volosencu, Dan Pescaru, Lucian Jurca, Alexa
Doboli
Abstract: In this paper we presented and classified various approaches for
redundancy in the area of wireless sensor networks, related to sensing,
communication and information processing. Sometimes an ally, sometimes a foe,
redundancy is an inherent feature of sensor networks that has to be very
carefully examined in order to improve important aspects of their functioning.
Moreover, this paper presents two methodologies: one that implies both
components of spatial redundancy and one that implies the use of temporal
redundancy for achieving the objective of fault-tolerant and safe operation.
In the end, the fields in which the redundancy could be applied with
significant results are highlighted.
Keywords: Wireless sensor networks, redundancy, sensing coverage,
communication
Title of the Paper: Testing
Inertial Sensor Performance as Hands-Free Human-Computer Interface
DOWNLOAD
FULL PDF
Authors:
Josip Music, Mojmil Cecic, Mirjana Bonkovic
Abstract: The paper introduces hands-free human-computer interface designed
around commercially available inertial sensor pack. It is primarily intended
to provide computer access for people with little or no upper-limb
functionality, but can be used by able bodied subject in certain application
scenarios. The performance of the proposed device was evaluated on twelve
healthy subjects performing multi-directional point-and-select task with
throughput as the main performance parameter. The system was tested using two
different pointer control schemes, as well as three selection techniques. Test
subjects were given two questionnaires (one per control scheme) in order to
provide comfort assessment of the device and short post-measurement interviews
with test subjects provided user feedback. Obtained performance and comfort
assessment results are presented and discussed.
Keywords: Inertial sensors, head-joystick, throughput, performance evaluation,
human-computer interface
Title of the Paper: A
Mobile Location-based Information Recommendation System Based on GPS and
WEB2.0 Services
DOWNLOAD
FULL PDF
Authors:
Fan Yang, Zhi-Mei Wang
Abstract: Combining the GPS location-based services and the latest Web2.0
technologies, this paper builds a scalable personalized mobile information
pushing platform, which can provide user-friendly and flexible location-based
service. We first propose a Location-based Data and Service Middleware based
on Service-Oriented Architecture in order to implement Mobile Information
Pushing System involved in a variety of formats of data integration and
conversion, as well as a combination of a wide range of services. Then, we
propose a novel 3-D Tag-Cloud module, so that it can visualize useful
retrieval information even in the limited mobile screen. Especially, we design
a multi-dimensional collaborative filtering algorithms, in order to achieve
dynamic personalized recommendation and mobile information sharing.
Cooperating with some restuarants, we also develop a dynamic restaurant mobile
location-based recommendation and discount counpons pushing system. The
successful application of the application system do show the efficiency of our
ideas.
Keywords: Mobile Information Pushing, GPS, Web2.0, Location Based Service
(LBS), Tagging, Collaborative Filtering, Personalized Recommendation
Title of the Paper: Schedule
Risk Management for Business M-Applications Development Projects
DOWNLOAD
FULL PDF
Authors:
Paul Pocatilu, Marius Vetrici
Abstract: The grand majority of software development projects are known to be
late and over the budget. Several surveys performed during the last 15 years
expose a relatively poor performance in delivering successful software
projects. Most of the projects hit schedule and budget overruns of 25% to 100%
and sometimes even more. Even though m-applications development is a new
software development field, still this type of projects is not secured against
the common flaws of software development projects. Therefore, the main goal of
this paper is to reduce the gap between the estimated duration of the
m-application development project and the actual elapsed time. We find that
legacy and proven best practices project management techniques can be
successfully employed for schedule risk management. Furthermore, we present
three proven software project management techniques that were successfully
adapted to the development of m-applications. The first one is the estimation
of m-application project duration using top-down and bottom-up approaches. The
second one is the use of a set of performance metrics for project quality
assessment. And the last one is the Extended Metrix model, a stochastic
project duration estimation model with schedule risk analysis elements.
Keywords: Mobile applications, software development, project duration,
schedule risk management, Monte Carlo simulation
Issue
5, Volume 8, May 2009
Title of the Paper: Dealings
with Problem Hardness in Genetic Algorithms
DOWNLOAD
FULL PDF
Authors:
Stjepan Picek, Marin Golub
Abstract: Genetic algorithms (GA) have been successfully applied to various
problems, both artificial as well as real-world problems. When working with
GAs it is important to know those those kinds of situations when they will not
find the optimal solution. In other words, to recognize problems that are
difficult for a GA to solve. There are various reasons why GAs will not
converge to optimal solutions. By combining one or more of these reasons a
problem can become a GA-hard problem. Today, there are numerous methods for
solving GA-hard problems; every measure has its specific advantages and
drawbacks. In this work the effectiveness of one of these measures is
evaluated, namely the Negative Slope Coefficient (NSC) measure. A different
measure is proposed, called the New Negative Slope Coefficient (NNSC) measure,
which aims to address certain drawbacks of the original method. Possible
guidelines for further development of this, and comparable methods are
proposed.
Keywords: Genetic Algorithm, Unitation, Fitness Landscape, Negative Slope
Coefficient, Hardness, Difficulty, Deception
Title of the Paper: Encrypting
Messages with Visual Key
DOWNLOAD
FULL PDF
Authors:
Dusmanescu Dorel
Abstract: This paper presents a method for encrypting messages, which uses for
this operation an image or a part of an image as an encryption/decryption key.
The need to encrypt messages for protecting their content knew an increase
from the apparition of Internet and electronic transactions. The great number
of messages that flows in a computer network and over the Internet is
requiring very fast encrypt/decrypt processes for assuring real-time secured
communications. Complex algorithms used in present for encrypting/decrypting
messages use complex keys and complex encrypt/decrypt functions that need an
increased computer power for real-time applications (media).
Keywords: Message, image, key, encrypting, decrypting, visual key
Title of the Paper: Analysis
of M-Learning Applications Quality
DOWNLOAD
FULL PDF
Authors:
Catalin Boja, Lorena Batagan
Abstract: The exponential growth of mobile technology in recent years,
increasing availability of network infrastructures, advances in wireless
technologies and popularity of handheld devices, have opened up new
accessibility opportunities for education. In his research Kinshuk (2003),
[2], concludes that the true potential of e-learning as “anytime and anywhere”
has finally started to be realized with the advent of mobile learning,
m-learning. A characteristic of today’s society is the increasing use of
modern information and communication technologies in all areas. Investment in
mobile device is an important step to improve the quality of life in our
dynamic society. The paper analyses the impact of m-learning on the
educational process and describes software characteristics of m-learning
applications. There are taken into consideration the fields that define
m-learning processes as education, technology and software development. For
the evaluation of characteristics levels are described metrics and measured
values are used to determine the m-learning application overall quality level.
The value is determined by aggregating each factor value and taking into
consideration importance coefficient.
Keywords: Quality, software, m-learning, mobile learning, characteristic,
mobile devices, mobile technologies, handheld device
Title of the Paper: A
Persistent Cross-Platform Class Objects Container for C++ and wxWidgets
DOWNLOAD
FULL PDF
Authors:
Michal Bliznak, Tomas Dulik, Vladimir Vasek
Abstract: This paper introduces a new open-source cross-platform software
library written in C++ programming language which is able to serialize and
deserialize hierarchically arranged class instances and their data members via
XML files. The library provides easy and efficient way for processing, storing
and managing complex object-oriented data with relationships between object
instances. The library is based on mature cross-platform toolkit called
wxWidgets and thus can be successfully used on many target platforms such as
MS Windows, Linux or OS X. The library is published under open source licence
and can be freely utilised in both open source and commercial projects. In
this article, we describe the inner structure of the library, its key
algorithms and principles and also demonstrate its usage on a set of simple
examples.
Keywords: Data, class, persistence, container, serialization, XML, tree, list,
C++, wxWidgets, wxXmlSerializer, wxXS
Title of the Paper: An
RDF-based Distributed Expert System
DOWNLOAD
FULL PDF
Authors:
Napat Prapakorn, Suphamit Chittayasothorn
Abstract: An expert system or knowledge-based system comprises of a knowledge
base and an inference engine in which their expertise knowledge is
represented. The knowledge can be called upon when needed to solve a problem
by the inference engine. In a large expert system, the knowledge base can be
represented using frames. Hence they are called frame-based expert system or
frame-based system. To avoid too many communication traffics during
inferences, a distributed expert system, an expert system with an inference
engine on its external knowledge base side is presented. It is an expert
system which has an RDF external knowledge base for improved flexibility and
mobility in knowledge sharing. This research presents a design and
implementation of a Frame-based RDF expert system which has a RDF/XML database
as its external knowledge base. The external knowledge base uses frame as its
knowledge representation stored in RDF/XML format so that it can be placed on
the WWW (World Wide Web) which is, ideally, accessible from anywhere. With
this capability, an expert system will be enriched with flexibility and
mobility in knowledge sharing.
Keywords: Frames, Expert system, Knowledge base, RDF, RDF/XML, Ontology
Title of the Paper: Design
of an Intrusion Detection System Based on Bayesian Networks
DOWNLOAD
FULL PDF
Authors:
Milan Tuba, Dusan Bulatovic
Abstract: This paper describes a structure of a standalone Intrusion Detection
System (IDS) based on a large Bayesian network. To implement the IDS we
develop the design methodology of large Bayesian networks. A small number of
natural templates (idioms) are defined which make the design of Bayesian
network easier. They are related to specific fragments of Bayesian networks
representing the basic elements in reasoning about uncertain events. The
idioms represent the graphical structure, without the probabilistic tables.
The use of idioms speeds-up the development of Bayesian networks and improves
their quality. Example network is constructed and examined. Such Bayesian
network can represent an independent agent in a distributed system. Results
are promising since with very limited computation and low sensitivity to the
quality of prior knowledge, potentially dangerous situations are successfully
detected and classified.
Keywords: Privacy, Security, Networks, Data protection, Bayesian network,
Intrusion detection system (IDS)
Title of the Paper: Information
Architecture for Intelligent Decision Support in Intensive Medicine
DOWNLOAD
FULL PDF
Authors:
M. F. Santos, F. Portela, M. Vilas-Boas, J. Machado, A. Abelha, J. Neves, A.
Silva, F. Rua
Abstract: Daily, a great amount of data that is gathered in intensive care
units, which makes intensive medicine a very attractive field for applying
knowledge discovery in databases. Previously unknown knowledge can be
extracted from that data in order to create prediction and decision models.
The challenge is to perform those tasks in real-time, in order to assist the
doctors in the decision making process. Furthermore, the models should be
continuously assessed and optimized, if necessary, to maintain a certain
accuracy. In this paper we propose an information architecture to support an
adjustment to the INTCare system, an intelligent decision support system for
intensive medicine. We focus on the automatization of data acquisition
avoiding human intervention, describing its steps and some requirements.
Keywords: Real-time data acquisition, knowledge discovery in databases,
intensive care, INTCare, intelligent decision support systems, information
models.
Title of the Paper: A
Grid Data Mining Architecture for Learning Classifier Systems
DOWNLOAD
FULL PDF
Authors:
M. F. Santos, W. Mathew, T. Kovacs, H. Santos
Abstract: Recently, there is a growing interest among the researchers and
software developers in exploring Learning Classifier System (LCS) implemented
in parallel and distributed grid structure for data mining, due to its
practical applications. The paper highlights the some aspects of the LCS and
studying the competitive data mining model with homogeneous data. In order to
establish more efficient distributed environment, in the current work, Grid
computing architecture is considered a better distributed framework in
Supervised Classifier System (UCS). The fundamental structure of this work
allows each site of the distributed environment to manage independent UCS and
such local sites transmit learning models to the global model for making
complete knowledge of the problem. The Boolean 11-multiplexer problems are
used for the execution. Hence, the main objective of this work is to keep the
average accuracy of distributed mode without loosing accuracy rate compared to
models. The experimental results showed that the testing accuracy of
distributed mode is higher than other models.
Keywords: Learning Classifier Systems, UCS, Genetic Algorithm, Fitness,
Accuracy, Data Mining, Grid computing, Cloud computing, Grid Data Mining
Title of the Paper: The
Effects of Data Mining in ERP-CRM Model – A Case Study of Madar
DOWNLOAD
FULL PDF
Authors:
Abdullah S. Al-Mudimigh, Farrukh Saleem, Zahid Ullah
Abstract: As Enterprise Resource Planning (ERP) implementation has become more
popular and suitable for every business organization, it has become a
essential factor for the success of a business. This paper shows the best
integration of ERP with Customer Relationship Management (CRM). Data Mining is
overwhelming the integration in this model by giving support for applying best
algorithm to make the successful result. This model has three major parts,
outer view-CRM, inner view-ERP and knowledge discovery view. The CRM collect
the customer’s queries, EPR analyze and integrate the data and the knowledge
discovery gave predictions and advises for the betterment of an organization.
For the practical implementation of presented model, we use MADAR data and
implemented Apriori Algorithm on it. Then the new rules and patterns suggested
for the organization which helps the organization for solving the problem of
customers in future correspondence.
Keywords: Apriori Algorithm, CRM, ERP
Title of the Paper: Parallel
Difference Method on Diffusion Equations
DOWNLOAD
FULL PDF
Authors:
Qinghua Feng, Bin Zheng
Abstract: In this paper, we present a high order unconditionally stable
implicit scheme for diffusion equations. Based on the scheme a class of
parallel alternating group explicit method is derived, and stability analysis
is given. Then we present another parallel alternating group explicit
iterative method, and finish the convergence analysis. Numerical experiments
show that the two methods are of higher accuracy than the original alternating
group method.
Keywords: Diffusion equation, parallel computation, finite difference,
iterative method, alternating group
Title of the Paper: Alternating
Group Explicit-Implicit Method and Crank-Nicolson Method for
Convection-Diffusion Equation
DOWNLOAD
FULL PDF
Authors:
Qinghua Feng, Bin Zheng
Abstract: Based on the concept of alternating group and domain decomposition,
we present a class of alternating group explicit-implicit method and an
alternating group Crank-Nicolson method for solving convection-diffusion
equation. Both of the two methods are effective in convection dominant cases.
The concept of the construction of the methods is also be applied to 2D
convection-diffusion equations. Numerical results show the present methods are
superior to the known methods in [6,11,16].
Keywords: Convection-diffusion equation, finite difference, parallel
computation, exponential-type transformation, alternating group
Title of the Paper: Online
Slant Signature Algorithm Analysis
DOWNLOAD
FULL PDF
Authors:
Azlinah Mohamed, Rohayu Yusof, Sofianita Mutalib, Shuzlina Abdul Rahman
Abstract: A vector rule-based approach and analysis to on-line slant signature
recognition algorithm is presented. Extracting features in signature is an
intense area due to complex human behavior, which is developed through
repetition. Features such as direction, slant, baseline, pressure, speed and
numbers of pen ups and downs are some of the dynamic information signature
that can be extracted from an online method. This paper presents the variables
involve in designing the algorithm for extracting the slant feature. Signature
Extraction Features System (SEFS) is used to extract the slant features in
signature automatically for analysis purposes. The system uses both local and
global slant characteristics in extracting the feature. Local slant is the
longest slant among the detected slant while the global slant represents the
highest quantity of classified slant whether the slant are leftward, upright
or rightward. Development and analysis are reported on a database comprises of
20 signatures from 20 subjects. The system is compared to human expert
evaluation. The results demonstrate a competitive performance with 85%
accuracy.
Keywords: Slant feature, Online signature, Signature recognition, Signature
analysis, Dynamic signature
Title of the Paper: A
Magneto-statics Inspired Transform for Structure Representation and Analysis
of Digital Images
DOWNLOAD
FULL PDF
Authors:
Xiao-Dong Zhuang, Nikos E. Mastorakis
Abstract: Physical-field inspired methodology has become a new branch in image
processing techniques. In this paper, a novel image transform is proposed
imitating the source reverse of magneto-static field. The image is taken as a
vertical magnetic field, and its curl is estimated as the virtual source of
the field for image structure representation and analysis. The restoration
from the virtual source to the image is also investigated, based on which a
method of image estimation and restoration from its gradient field is
proposed. The experimental results indicate that the proposed curl source
reverse provides effective image structure representation, which can be
exploited in further image processing tasks.
Keywords: Image transform, curl source reverse, magneto-static, image
structure, image restoration
Title of the Paper: Design
and Evaluation of FPGA Based Hardware Accelerator for Elliptic Curve
Cryptography Scalar Multiplication
DOWNLOAD
FULL PDF
Authors:
Kapil A. Gwalani, Omar Elkeelany
Abstract: Embedded systems find applications in fields such as defense,
communications, industrial automation and many more. For majority of these
applications, security is a vital issue. Over the last decade, security has
become the primary concern when discussing e-commerce. The rapid development
in the field of information technology has led to the increase in need of
techniques capable of providing security. Cryptography plays an important role
in providing data security. Until recently, symmetric key encryption schemes
were used for a majority of these applications. Now however, asymmetric key
encryption schemes such as Elliptic curve cryptography are gaining popularity
as they require less computational power and memory and are still capable of
providing equivalent security when compared to their counterparts. Elliptic
curve cryptography was first introduced in 1985 and has always been around
since. Scalar or point multiplication in elliptic curve cryptography has been
a topic of research interest. Improving the performance of scalar
multiplication can improve the overall performance of elliptic curve
cryptography. One popular method to improve scalar multiplication is by means
of hardware accelerators. The authors of this paper have implemented scalar
multiplication, the most time consuming operation in elliptic curve
cryptography using binary non-adjacent form algorithm. The results of the
software implementation have been presented in section- 4. Methodology to
improve the performance of the scalar multiplication by use of hardware
accelerators has also been presented in this paper.
Keywords: Binary Non-adjacent Form, ECC, Prime Field, System on Programmable
Chip
Issue
6, Volume 8, June 2009
Title of the Paper: Efficient
Message Authentication Protocol for WSN
DOWNLOAD
FULL PDF
Authors:
Moises Salinas Rosales, Gina Gallegos Garcia, Gonzalo Duchen Sanchez
Abstract: This paper describes a solution for nodes and message authentication
problems in wireless sensor networks, this solution allows effectively
avoiding node-impersonation and messaging falsification among the WSN nodes.
The resulting protocol address authentication at two level using identity
based cryptography and message authentication codes with SHA-1, for node and
message authentication respectively. An implementation of the message
authentication process into a TinyOS-based node is presented; also power
consumption measurements obtained are discussed. Based in experimental results
we show that message authentication process is suitable in terms of power
consumption.
Keywords: WSN, Authentication, MAC codes, Cryptography, Pairings, TinyOS
Title of the Paper: Neural
Network based Attack Detection Algorithm
DOWNLOAD
FULL PDF
Authors:
Araceli Barradas-Acosta, Eleazar Aguirre Anaya, Mariko Nakano-Miyatake, Hector
Perez-Meana
Abstract: The influence of computer technology on the human activities has
greatly increased during the last three decades, due to major developments in
the VLSI technology. However this widespread use of computer equipments has
generated computer a considerable increase of computer crimes. To reduce this
problem it is necessary to carried out a network analysis using the computer
network traffic. However the increase of network traffic is huge, doing the
analysis of traffic data complicated. Thus it is required to develop an
effective and automatic algorithm to carry out the traffic network analysis,
facilitating I such way the expert forensic work. This paper proposes a
network analysis algorithm using recurrent neural network that can analyze
computer network attacks facilitating the evidence extraction. Proposed
algorithm can reduce time and cost of forensic.
Keywords: Computer network, Forensic analysis, Recurrent neural network,
Forensic, Attacks
Title of the Paper: A
Dual Simulation Environment for Simulating MAS in Telecommunication Networks
DOWNLOAD
FULL PDF
Authors:
Nada Meskaoui, Dominique Gaiti, Karim Y. Kabalan
Abstract: This paper presents a dual simulation environment for simulating
different type of telecommunication networks integrating intelligent agents.
Agents are considered as advanced tools for resolving complex issues in
networking based on intelligent and dynamic features. To test the efficiency
of these proposals, new simulation environments, integrating both agents and
network components, are required. In this paper we propose an extension with
intelligent capabilities to a networking platform. This dual simulation
environment has been tested for implementing agents in a DiffServ network to
improve its performance. Simulation results show the efficiency of integrating
agents within telecommunication networks and also prove that such a dual
simulation environment is needed to test new techniques based on agents and
multi-agent systems in networking.
Keywords: Artificial intelligence, telecommunication, networks, single-agent
systems, multi-agent systems, Diffserv network, platforms
Title of the Paper: Improving
the Accuracy of Effort Estimation through Fuzzy Set Combination of Size and
Cost Drivers
DOWNLOAD
FULL PDF
Authors:
Ch. Satyananda Reddy, Kvsvn Raju
Abstract: In this research, it is investigated the precision of size and cost
drivers in the estimation of effort using Constructive Cost Model (COCOMO). It
is imperative to stress that uncertainty at the input level of the COCOMO
yields uncertainty at the output, which leads to gross estimation error in the
effort estimation. Instead of using a single number to represent the size, it
can be characterized as a fuzzy value. Cost drivers also expressed through an
unclear category which needs subjective assessment. Fuzzy logic has been
applied to the COCOMO using the symmetrical triangles and trapezoidal
membership functions to represent the cost drivers and size. Using trapezoidal
membership function for the size and cost drivers, a few attributes are
assigned the maximum degree of compatibility when they should be assigned
lower degrees. To overcome the above limitations, in this work, it is
concentrated to use Gaussian membership function for the COCOMO parameters. In
addition, this paper proposes to incorporate both size and cost drivers
together, with a fuzzy set using Gaussian membership function. The present
work is based on COCOMO dataset and the experimental part of the study
illustrates the approach and compares it with the standard version of the
COCOMO. It has been found that the proposed method is performing better than
ordinal COCOMO and the achieved results were closer to the actual effort.
Keywords: Constructive Cost Model, COCOMO, Fuzzy based Effort Estimation,
Gaussian Membership Function, Software Cost Estimation, Software Effort
Estimation, Software Size and Project Management.
Title of the Paper: Agent-Based
Mediation System to Facilitate Cooperation in Distributed Design
DOWNLOAD
FULL PDF
Authors:
Victoria Eugenia Ospina, Alain-Jerome Fougeres
Abstract: In this article we present the use of knowledge for a Mediation
System, developed to give support to participants in
mechanical-system-designer activities. To use a cooperative system sufficient
assistance is needed to facilitate and coordinate actors’ activities. To
accomplish this goal we introduce an artificial actor: Mediator. The Mediator
forms part of the group of collaborative, with the specific role of
facilitating the cooperative activity. This role of assistance, differentiate
the Mediator from other actors. This one is endowed with specific skills of
cooperation (communication; awareness, coordination, co-memorization),
requiring some acquired knowledge, which allow them to give assistance to the
human actors. We will define the types of knowledge defined for our proposed
Mediation System. Then we will illustrate the use of memorized knowledge by
the Mediator during an activity of technical functional analysis.
Keywords: CSCW, Intelligent Agent System, Knowledge and Data technology,
Mediation System
Title of the Paper: A
Wavelet-Based Voice Activity Detection Algorithm in Variable-Level Noise
Environment
DOWNLOAD
FULL PDF
Authors:
Kun-Ching Wang
Abstract: In this paper, a novel entropy-based voice activity detection (VAD)
algorithm is presented in variable-level noise environment. Since the
frequency energy of different types of noise focuses on different frequency
subband, the effect of corrupted noise on each frequency subband is different.
It is found that the seriously obscured frequency subbands have little word
signal information left, and are harmful for detecting voice activity segment
(VAS). First, we use bark-scale wavelet decomposition (BSWD) to split the
input speech into 24 critical subbands. In order to discard the seriously
corrupted frequency subband, a method of adaptive frequency subband extraction
(AFSE) is then applied to only use the frequency subband. Next, we propose a
measure of entropy defined on the spectrum domain of selected frequency
subband to form a robust voice feature parameter. In addition, unvoiced is
usually eliminated. An unvoiced detection is also integrated into the system
to improve the intelligibility of voice. Experimental results show that the
performance of this algorithm is superior to the G729B and other entropy-based
VAD especially for variable-level background noise.
Keywords: Voice activity detection, Bark-scale wavelet decomposition, Adaptive
frequency subband extraction
Title of the Paper: Research
on Protocol-Level Behavioral Substitutability of Software Components in
Component-based Software System
DOWNLOAD
FULL PDF
Authors:
Haiyang Hu, Hua Hu
Abstract: The component-based software development (CBSD) has been paid more
attention by software practicers in recent years. How to analyze and verify
behavior-level component substitutability is very important when the
component-based software system needs upgrading or maintaining. Concentrating
on the component-based software system, this paper formally specifies the
components and their interaction behaviors, analyzes the behavior of the new
component compared with the old one, and then presents a set of rules for
verifying behavioral substitutability of components in software system to
ensure the behavioral compatibility whenever a component is replaced by a new
one. Finally, an example of e-commerce is presented to illustrate the
feasibility and pertinence of this approach.
Keywords: Software component component composition behavioral compatibility
behavioral substitutability
Title of the Paper: A
Hybrid Approach for Indexing and Searching Protein Structures
DOWNLOAD
FULL PDF
Authors:
Tarek F. Gharib
Abstract: Searching for structural similarities of proteins has a central role
in bioinformatics. Most tasks of bioinformatics depends on investigating the
homologous protein's sequence or structure these tasks vary from predicting
the protein structure to determine sites in protein structure where drug can
be attached. Protein structure comparison problem is extremely important in
many tasks. It can be used for determining function of protein, for clustering
a given set of proteins by their structure, for assessment in protein fold
prediction. Protein Structure Indexing using Suffix Array and Wavelet (PSISAW)
is a hybrid approach that provides the ability to retrieve similarities of
proteins based on their structures. Indexing the protein structure is one
approach of searching for protein similarities. The suffix arrays are used to
index protein structure and the wavelet is used to compress the indexed
database. Compressing the indexed database is supposed to make the searching
time faster and memory usage lower but it affects the accuracy with accepted
rate of error.The experimental results, which are based on the structural
classification of proteins (SCOP) dataset, show that the proposed approach
outperforms existing similar techniques in memory utilization and searching
speed. The results show an enhancement in the memory usage with factor 50%.
Keywords: Protein structures, indexing, suffix array, wavelet
Title of the Paper: Symbolic
Algorithmic Verification of Generalized Noninterference
DOWNLOAD
FULL PDF
Authors:
Conghua Zhou
Abstract: In this paper we propose an algorithmic verification technique to
check generalized noninterference. Our technique is based on the
counterexamples search strategy mainly which generating counterexamples of
minimal length. In order to make the verification procedure terminate as soon
as possible we also discuss how to integrate the window induction proof
strategy in our technique. We further show how to reduce counterexamples
search and induction proof to quantified propositional satisfiability. This
reduction enables us to use efficient quantified propositional decision
procedures to perform generalized noninterference checking.
Keywords: Generalized noninterference, Quantified propositional satisfiability,
Multilevel security
Title of the Paper: DRILA:
A Distributed Relational Inductive Learning Algorithm
DOWNLOAD
FULL PDF
Authors:
Saleh M. Abu-Soud, Ali Al-Ibrahim
Abstract: This paper describes a new rule discovery algorithm called
Distributed Relational Inductive Learning DRILA, which has been developed as
part of ongoing research of the Inductive Learning Algorithm (ILA) [11], and
its extension ILA2 [12] which were built to learn from a single table, and the
Relational Inductive Learning Algorithm (RILA) [13], [14] which was developed
to learn from a group of interrelated tables, i.e. a centralized database.
DRILA allows discovery of distributed relational rules using data from
distributed relational databases. It consists of a collection of sites, each
of which maintains a local database system, or a collection of multiple,
logically interrelated databases distributed over a computer network. The
basic assumption of the algorithm is that objects to be analyzed are stored in
a set of tables that are distributed over many locations. Distributed
relational rules discovered would either be used in predicting an unknown
object attribute value, or they can be used to extract the hidden relationship
between the objects' attribute values. The rule discovery algorithm,
developed, was designed to use data available from many locations (sites), any
possible ‘connected’ schema at each location where tables concerned are
connected by foreign keys. In order to have a reasonable performance, the
‘hypotheses search’ algorithm was implemented to allow construction of new
hypotheses by refining previously constructed hypotheses, thereby avoiding the
work of re-computing. Unlike many other relational learning algorithms, the
DRILA algorithm does not need its own copy of distributed relational data to
process it. This is important in terms of the scalability and usability of the
distributed relational data mining solution that has been developed. The
architecture proposed can be used as a framework to upgrade other
propositional learning algorithms to relational learning.
Keywords: Distributed Relational Rule Induction, Rule Selection Strategies,
Inductive Learning, ILA, ILA2, RILA, DRILA
Title of the Paper: Research
on Cyclic Mapping Model and Solving Approach for Conceptual Design
DOWNLOAD
FULL PDF
Authors:
S. Zhang
Abstract: An ideal conceptual design model should support multi-level
innovative design through rational mapping layer and mapping relationship. In
this paper, five existing conceptual design models are reviewed from this
perspective, and a new model which supports the alternation of cyclic mappings
among functional decomposition,functional solving and combination of solutions
in turn is presented. Then the knowledge representation scheme for principle
solving and the feature-based scheme for interface representation are
discussed. Finally a cyclic solving approach to conceptual design is put
forward, and an interface matrix is applied to facilitate computer processing.
Keywords: Computer aided design, Conceptual design model, Knowledge
representation scheme, Design catalogue, Feature model, Interface matrix
Title of the Paper: RFID
based Learning Assessment System
DOWNLOAD
FULL PDF
Authors:
V. Drona, S. Drona, C. Rusell, M. H. N. Tabrizi
Abstract: Learning Assessment or traditional testing is typically performed
with the participation of a proctor, who must be physically present in the
classroom at all times. Protecting the integrity of learning assessments, in
any form, often involves complicated procedures and adjustments to the
assessment process and environment. The Radio Frequency Identification (RFID)
based Learning Assessment System (RLAS) is aimed at removing the need for a
human proctor and reducing the complexity involved in the assessment. This is
particularly important when assessment is more complex than a traditional
pencil and paper variety. RLAS integrates RFID tags, Pocket PC (PDA’s) and a
server to create a complete learning assessment system. RFID tags are used to
track students’ movements and PDAs are used as communication devices. Students
are then monitored by a virtual proctor on a server. In this paper the
development of the RLAS system is described and its use as a tool to develop
and execute individualized learning environments for students in K-12 is
considered. The system integrates audio, video and common textual learning
tools depending on the student’s location and learning style needs. The system
further assesses the effectiveness of the chosen tools in the student’s
learning process.
Keywords: Learning Assessment, Proctor, RFID, Sensors, Communication
Title of the Paper: Solving
Traveling Salesman Problem on Cluster Compute Nodes
DOWNLOAD
FULL PDF
Authors:
Izzatdin A. Aziz, Nazleeni Haron, Mazlina Mehat, Low Tan Jung, Aisyah Nabilah
Mustapa, Emelia Akashah Patah Akhir
Abstract: In this paper, we present a parallel implementation of a solution
for the Traveling Salesman Problem (TSP). TSP is the problem of finding the
shortest path from point A to point B, given a set of points and passing
through each point exactly once. Initially a sequential algorithm is
fabricated from scratch and written in C language. The sequential algorithm is
then converted into a parallel algorithm by integrating it with the Message
Passing Interface (MPI) libraries so that it can be executed on a cluster
computer. Our main aim by creating the parallel algorithm is to accelerate the
execution time of solving TSP. Experimental results conducted on Beowulf
cluster are presented to demonstrate the viability of our work as well as the
efficiency of the parallel algorithm.
Keywords: Traveling Salesman Problem (TSP), High Performance Computing (HPC),
Message Passing Interface (MPI)
Title of the Paper: The
Investigation of Discovering Potential Musical Instruments Teachers by
Effective Data Clustering Scheme
DOWNLOAD
FULL PDF
Authors:
Cheng-Fa Tsai, Yu-Tai Su, Chiu-Yen Tsai, Chun-Yi Sung
Abstract: Data clustering plays an important role in various fields. Data
clustering approaches have been designed in recent years. This investigation
aims to present data clustering algorithm to identify potential musical
instruments teachers. With a total of 5125 candidates registered respectively
in 9 grades of Taiwan United Music Grade Test during 2000-2008. Moreover, this
study proposes a new data clustering algorithm called MIDBSCAN and an existing
well-known neural network called self-organizing map (SOM) to perform data
clustering applications for discovering potential musical instruments
teachers. The processing procedure of searching for neighbors (neighborhood
data points) is very time consuming in the existing well-known DBSCAN and
IDSCAN algorithms. Therefore, to shorten the time consumed, the proposed
MIDBSCAN algorithm focuses lowering the number of expansion seeds added into
the neighborhood data in this procedure, thus reducing the time cost of
searching for neighbors. According to our simulation results, the proposed
MIDBSCAN approach has low execution time cost, a maximum deviation in
clustering correctness rate and a maximum deviation in noise data filtering
rate. MIDBSCAN outperforms SOM in execution time cost. It is feasible to
perform data clustering analysis in various data mining applications using the
proposed MIDBSCAN algorithm.
Keywords: Data clustering, data mining, effective teaching, music examine
Issue
7, Volume 8, July 2009
Title of the Paper: A
Nonce-Based Mutual Authentication System with Smart Card
DOWNLOAD
FULL PDF
Authors:
Chin-Ling Chen, Wei-Chech Lin, Zong-Min Guo, Yung-Fa Huang, Neng-Chung Wang
Abstract: User authentication is an important security mechanism for
recognizing legal remote users. We propose an available and secure
authentication scheme for service provider to verify users without using
verification table. It can resist most of the attacks by improving nonce-based
mutual authentication mechanism, and ensure the security by dynamic session
key. User may change his password freely. Our scheme compared with other
related schemes for security efficiency.
Keywords: Mutual authentication, RSA, smart card
Title of the Paper: Mathematical
Modeling and Numerical Analysis of the Programming Field in
PEO10LiCF3SO3-Polypyrrole Neural Switch
DOWNLOAD
FULL PDF
Authors:
Mahmoud Z. Iskandarani
Abstract: The design and numerical modeling using Finite Element Analysis (FEA)
of electric field strength in a programmable neural switch is carried out. The
obtained model provided good approximation to the derived complex analytical
solution, which is carried out by means of complex mathematical analysis
employing SCHWARZ-CHRISTOFFEL transform. Effect of electrode separation and
field spread in both x and y directions are studied and explained. Boundary
effects on field strength representation is discussed and numerically reduced
through increasing the number of nodes for each element in the finite grid.
Edge effect on field strength is also eliminated using semi-infinite coplanar
electrode approximation. Such a switch will function as a synaptic processor
behaving in an adaptive manner and suitable to be used as a compact
programmable device with other artificial neural network hardware.
Keywords: Neural, Numerical, Finite Element, Mathematical, Memory, Information
Processing, Polymers
Title of the Paper: Recent
Advances in Data Management
DOWNLOAD
FULL PDF
Authors:
Zeljko Panian
Abstract: To increase the value of data as a business asset, companies and
government organizations need to establish standards, policies, and processes
for the usage, development, and management of data, to create the right
organizational structure, and to develop the supporting technology
infrastructure. As a practice with roots in corporate and information
technology (IT) governance, data governance emerged. Data governance can be
defined as the processes, policies, standards, organization, and technologies
required to manage and ensure the availability, accessibility, quality,
consistency, auditability, and security of data in an organization.
Keywords: Information technology (IT), data management, data integration,
corporate governance, IT governance, data governance, compliance
Title of the Paper: Toward
Developing Medium-long Term Spot Trading E-Transaction Platform for Bulk
Agricultural Product in China
DOWNLOAD
FULL PDF
Authors:
Zheng Xiaoping, Wang Ruimei, Tian Dong, Zhang Xiaoshuan
Abstract: Medium-long term spot trading has developed rapidly in China. This
paper describes the feature of medium-long term spot trading, and develops
e-commerce platform for bulk agricultural product based on medium-long term
spot trading model. Finally, benefit and challenges to medium-long term spot
trading are discussed. The establishment of medium-long transactions plays a
significant role in the regulation of supply and demand, reducing price
volatility and price discovery. However, medium-long spot trading is still at
the exploratory stage, there are many problems and challenges.
Keywords: Medium-long term spot trading, E-commerce platform, Bulk
agricultural product, China
Title of the Paper: A
Study of Mobile E-learning-Portfolios
DOWNLOAD
FULL PDF
Authors:
Hsieh-Hua Yang, Jui-Chen Yu, Lung-Hsing Kuo, Li-Min Chen, Hung-Jen Yang
Abstract: Based on the applications of e-portfolios, a mobile system
infrastructure was designed with the discussion of information flow scenarios.
This study intended to figure out the impacts that mobile technology has
exerted on the educational system through the portfolio. To fully understand
the potential impact of the mobile electronic learning portfolio system on
education, institutions need to take into account the current environment
within higher education. Evaluating student performances always has been an
important issue for academia. This study proposed a four-step-model of mobile
e-learning-portfolios. Those are steps of accumulating, revealing, proposing
and publishing.
Keywords: Mobile learning, E-learning-Portfolio
Title of the Paper: An
Imprecise Computation Framework for Fault Tolerant Control Design
DOWNLOAD
FULL PDF
Authors:
Addison Rios-Bolivar, Luis Parraguez, Francisco Hidrobo, Margarita Heraoui,
Julima Anato, Francklin Rivas
Abstract: In this work the existing relations between the imprecise
computation and the fault tolerant control (FTC) are analyzed. From those
relations, there are constructed FTC systems according to the model of
imprecise computation. The found relations establish that the obligatory tasks
in the model of imprecise computation correspond with the mission of
maintaining the stability of the systems under FTC according to the redundancy
degree that assure the structural properties of the systems. On the other
hand, the optional tasks in imprecise computation correspond to performance
criteria of the systems under FTC are satisfied, which can be degraded under
adverse conditions of operation of the system. These correspondences are
probed in an example.
Keywords: Imprecise Computation, Fault Tolerant Control, Real-Time, Fault
Detection, Anytime Computation
Title of the Paper: Adaptive
Knowledge Discovery for Decision Support in Intensive Care Units
DOWNLOAD
FULL PDF
Authors:
Pedro Gago, Manuel Filipe Santos
Abstract: Clinical Decision Support Systems (CDSS) are becoming commonplace.
They are used to alert doctors about drug interactions, to suggest possible
diagnostics and in several other clinical situations. One of the approaches to
building CDSS is by using techniques from the Knowledge Discovery from
Databases (KDD) area. However using KDD for the construction of the knowledge
base used in such systems, while reducing the maintenance work still demands
repeated human intervention. In this work we present a KDD based architecture
for CDSS for intensive care medicine. By resorting to automated data
acquisition our architecture allows for the evaluation of the predictions made
and subsequent action aiming at improving the predictive performance thus
enhancing adaptive capacities.
Keywords: Clinical Decision Support, Intelligent Decision Support Systems,
Knowledge Discovery, Intensive care, Ensembles, Multi-Agent Systems
Title of the Paper: Towards
A Utility Based Computational Model for Negotiation between Semantic Web
Services
DOWNLOAD
FULL PDF
Authors:
Sandeep Kumar, Nikos E. Mastorakis
Abstract: Using the utility-theory for the decision-making process during the
negotiation between semantic web services is an appealing one. This paper
proposes a computational model for the calculation of utilities of the
negotiating semantic web services. The proposed model uses multiple attribute
in the utility function and uses the basic values of these attributes such as
values for offered price, quality and others. The model is based on a novel
understanding that a service requester should remain indifferent to the
changes in price or other such values if the corresponding quality has also
been changed accordingly. A prototype system has been implemented in support
of the proposed model. The work has been evaluated and the betterment has been
reported.
Keywords: Utility, semantic web, semantic web services, negotiation,
computation
Title of the Paper: Information
Analysis of Rail Track for Predictive Maintenance
DOWNLOAD
FULL PDF
Authors:
R. B. Faiz, S. Singh
Abstract: Track defects are deviation of actual from theoretical values of the
tracks geometrical characteristics. Track defects are macroscopic and
geometric in nature and are exclusively the consequence of train traffic. [5]
Rail track maintenance in terms of track geometry and other modalities like
rail profile, ultrasonic’s etc has been typically based on use of reactive
maintenance. In case of such reactive maintenance discrete exeecedence of
track geometry parameter measurements are compared against a pre-set threshold
such that if they exceed the threshold then reactive maintenance is required
to be done. This is particularly so in cases when current practices rely on
conservative, engineering, decision. Besides it will not inform staff
regarding defects in rail track which can subsequently helps in predictive
maintenance. This paper focuses on variable and time based linear regression
analysis of track geometry parameters which can lead to significant predictive
maintenance of track geometry. The over all aim of this research paper is to
propose a predictive maintenance frame work that would assist in predicting
future changes in rail track geometry measurements. Such framework can
evaluate and prioritise track geometry maintenance effort across network rail.
It will cause alarms before the defects will actually happen. Such research
will result in effective and efficient rail track maintenance management
resulting in low operating cost better train transit times for rail industry
[2].
Keywords: Predictive Maintenance Management, Rail Track Geometry, CURV, Cant
Def, Cross Level, Dipped Left, Gauge
Title of the Paper: Implementation
and Evaluation of a Peer Assessment System for Enhancing Students' Animation
Skills
DOWNLOAD
FULL PDF
Authors:
Jung-Chuan Yen, Songshen Yeh, Jin-Lung Lin
Abstract: A web-based peer-assessment system for enhancing students'
creativity and animation skills is presented. Through a quasi-experiment
instruction, this paper was to examine the learning effects of the system with
mechanisms of diverse assessment. Participants were 88 sophomores of 2D
animation courses taught by the same instructor. A two-way ANOVA was conducted
to analyze the independent variables by self-regulation (high vs. low) and
perceived initiative (stronger vs. weaker) on project performance as the
dependent variables. The results revealed that (a) there are no significantly
interactions between self-regulation and perceived initiative, (b) students of
the high-group of self-regulation outperformed the low-group on the peer
assessment, (c) students who showed stronger initiative outperformed the
weaker ones on the tutor assessment, (d) most of the learners showed positive
attitude toward peer-assessment.
Keywords: E-learning, Animation skill, Peer-assessment, Self-regulation,
Social cognitive
Title of the Paper: Data
Attribute Reduction using Binary Conversion
DOWNLOAD
FULL PDF
Authors:
Fengming M. Chang
Abstract: While learning with data having large number of attribute, a system
is easy to freeze or shut down or run for a long time. Therefore, the proposed
Binary Conversion (BC) is a novel method to solve this kind of large attribute
problem in machine learning. The purpose of BC is to reduce data dimensions by
a binary conversion process. All the attributes are reserved but combined into
few numbers of new attributes instead of that some attributes are removed. To
prevent the information loss problem during the conversion, each binary type
data value occupies its own digital position in BC. In addition, 4 data sets:
nbuses, ACLP, MONK3, and Buseskod data are used in this study to test and
compare the learning accuracies and learning time. The results indicate that
the proposed BC can keep about the same level of accuracy but increase the
learning efficiency.
Keywords: Binary conversion, Large attribute, Machine learning, Neuro-fuzzy,
Mega-fuzzificaiton
Title of the Paper: Performance
Analysis for A Web Based Session and Error Management Agent on Home Network
Environment
DOWNLOAD
FULL PDF
Authors:
Eung-Nam, Ko
Abstract: This paper describes a web based session and error management with a
whiteboard agent running on home network environment. It suggests a system
that is capable of detecting and recovering software error for distributed
multimedia with an integrated whiteboard model which supports object drawing,
application sharing, and web synchronization methods of sharing information
through a common view between concurrently collaborating users for home
network environment. DOORAE is a framework of supporting development on
multimedia application for distributed multimedia running on home network
environment. This paper explains a performance analysis for a session and
error management agent based on home network environment by using the
rule-based DEVS(Discrete Event System Specification) modeling and simulation
techniques. In DEVS, a system has a time base, inputs, states, outputs, and
functions. The DEVS formalism introduced by Zeigler provides a means of
specifying a mathematical object called a system.
Keywords: A session and error management, a whiteboard agent, home network
environment, software error, DEVS modeling, discrete event mode
Title of the Paper: Personal
Identification by Finger Vein Images Based on Tri-value Template Fuzzy
Matching
DOWNLOAD
FULL PDF
Authors:
Liukui Chen, Hong Zheng
Abstract: To reduce the effect of fuzzy vein edges and tips of the infrared
finger vein recognition, this paper presents a tri-value template fuzzy
matching algorithm, which segments the vein feature image into three areas:
subject area, fuzzy area and background area, and computes the average
distance of non-background point to non-background area as the dissimilarity
score between the two templates. The proposed matching method is robust
against the fuzzy edges and tips. The experimental results show that the
proposed method is feasible and practical by the recognition accuracy rate,
99.46 %, to 456 near-infrared finger vein images.
Keywords: Personal identification; Infrared finger vein; Tri-value template;
Fuzzy matching
Title of the Paper: The
Relationship of Sample Size and Accuracy in Radial Basis Function Networks
DOWNLOAD
FULL PDF
Authors:
Hyontai Sug
Abstract: Even though radial basis function networks are known to have good
prediction accuracy in several domains, it is not known to decide a proper
sample size like other data mining algorithms, so the task of deciding proper
sample sizes for the networks tends to be arbitrary. As the size of samples
grows, the improvement in error rates becomes better slowly. But we cannot use
larger and larger samples, because we have limited training examples, and
there is some fluctuation in accuracy depending on the sample sizes. This
paper suggests a progressive resampling technique to cope with the fluction of
prediction accuracy values for better radial basis function networks. The
suggestion is proved by experiments with promising results.
Keywords: Neural networks, radial basis function networks, sampling
Title of the Paper: Computer
Simulation and Experimental Research of the Vehicle Impact
DOWNLOAD
FULL PDF
Authors:
Daniel Trusca, Adrian Soica, Bogdan Benea, Stelian Tarulescu
Abstract: This paper investigates the vehicle rear impact and its consequences
and analyzes the research developed in this field. In road traffic, especially
in urban traffic, numerous rear collisions have taken place, resulting in
serious injuries for passengers. The numerous studies that have been carried
out lead to today’s internationally recognized demand on the car driver’s head
restraint adjustment for an optimal protection of the neck spinal column (HWS)
with regard to rear end collisions. Mathematical modeling of passenger
movement during head impact may be a successful tool in establishing the neck
injury mechanism, especially when working in parallel with experimental
studies. In order to accomplish experimental studies for data acquisition and
video and image samples analysis, the preparation of testing device are
needed. Validation mathematical models using experimental tests, offers a vast
range of their use. Thus, the simulation on the computer of the phenomena that
take place during road events can be studied more comprehensively, and may
allow optimize passive safety systems in order to diminish adverse effects of
these phenomena.
Keywords: Modeling, collision, simulation, experimentation, safety, validation
Title of the Paper: An
Efficient Garment Visual Search based on Shape Context
DOWNLOAD
FULL PDF
Authors:
Chin-Hsien Tseng, Shao-Shin Hung, Jyh-Jong Tsay, Derchian Tsaih
Abstract: In recent years, the theoretical models of mass consumer behavior
have change to buy from websites rather than in stores. Because the
high-growing of e-commerce, a new demand emerges: the special-purpose search
engine for searching goods from network shop. How to meet the customer’s
requirement in product search is an import problem. Although it is easy for
human eyes to determine the existence of clothes styles, recognizing it
automatically from a computer program is not a trivial problem. Our work
focuses on the garment retrieval from the e-shopping database, which supports
feature-based retrieval by shape categories and styles. Traditionally the
rigid shape-based algorithms unable to apply well on garment images. Because
the clothing is essentially a non-rigid soft object: it is apt to
self-occlusion, folding, and has deformation among every part (such as sleeve
and tube). While producing deformation, it also influenced by light which lead
to various kinds of shade at clothes, and the surface might include various
kinds of pattern, texture, little piece, and decorate, these will all cause
the great interference on image analysis.
Keywords: Visual Search, Visual Similarity, Garment, CBIR, Non-Rigid Matching,
Shape Context
Title of the Paper: A
Visual Αnalysis of Calculation-Paths of the Mandelbrot Set
DOWNLOAD
FULL PDF
Authors:
Raka Jovanovic, Milan Tuba
Abstract: In this paper we present a new method for analyzing some properties
of the Mandelbrot Set. The algorithm used for our visual analysis is closely
connected to Pickover Stalks and Buddhabrot method. Pickover Stalks method
created biomorphs, diverse and complicated forms greatly resembling
invertebrate organisms. Our method extends these previously developed methods
that introduce the concept of preserving information about calculation steps
when calculating the Mandelbrot Set. We create images that visualize
statistical information for the calculation-paths of points tested for
belonging to the Mandelbrot Set. Two variations of this method are presented:
one that only takes into account the paths taken and one that also uses
information about their lengths. We have developed software that enables us to
analyze new properties of the Mandelbrot Set that can be seen when these new
display methods are used. In this paper we also present in detail important
features of our software.
Keywords: Mandelbrot, Buddhabrot, Fractal, Algorithm, Pickover Stalks
Title of the Paper: Mining
the Body Features to Develop Sizing Systems to Improve Business Logistics and
Marketing Using Fuzzy Clustering Data Mining
DOWNLOAD FULL PDF
Authors:
Chih-Hung Hsu, Tzu-Yuan Lee, Hui-Ming Kuo
Abstract: Business logistics have played an important role of business
operations of procurement, purchasing, inventory, warehousing, distribution,
transportation, customer support, financial and human resources. Human body
type classifications are also very crucial issue for garment manufacturing.
Data mining has been widely used in many fields. But, there is lack of
research in the area of establishing of garment-sizing systems for business
logistics. This research aims to establish sizing systems of body types from
the anthropometric data of females by using a fuzzy clustering-based data
mining approach. Certain advantages may be observed when the sizing systems
are established, using fuzzy clustering-based data mining procedure. Body
types could be accurately classified for garment production according the
newly the sizing systems. This approach is found to be effective in processing
the anthropometric data, and obtaining regular rules for the development of
sizing systems. The results of this study can provide an effective procedure
of identifying the clusters of human body type to establish the sizing systems
for integrating logistics operations internally with different functions
inside the organization and also externally with business partners.
Keywords: Data mining; Fuzzy clustering; Sizing systems; Business logistics
Issue
8, Volume 8, August 2009
Title of the Paper: A
Framework for Teaching Introductory Software Development
DOWNLOAD
FULL PDF
Authors:
Zaigham Mahmood
Abstract: Software development (SD) refers to design and development of
software applications. Most educational institutions teach programming using a
procedural paradigm and an imperative language where the emphasis is often on
learning a computer language and not on problem solving or the modeling of
realistic computational problems. Thus, the teaching is dependent on the
chosen language, which is not entirely appropriate for teaching principles of
programming or SD as an engineering activity. This paper discusses the
traditional method of teaching programming and suggests an objects-first
approach where students adopt a top-down method of learning to develop
software. Our model introduces functions and modules as basic building blocks
for producing software. Thus, students' first programs are written as
sequences, selections and iterations of given functions and it is in the later
stages of the course, that they learn the basic constructs of the language.
This paper outlines a complete framework for teaching a first course in
programming. It also discusses the characteristics of a good teaching language
to help academics to choose an appropriate first programming language.
Keywords: Software engineering, Software development, Programming, Computer
languages, Teaching
Title of the Paper: The
Web 2.0 Movement: MashUps Driven and Web Services
DOWNLOAD
FULL PDF
Authors:
Chang-Chun Tsai, Cheng-Jung Lee, Shung-Ming Tang
Abstract: Service-Oriented Architecture (SOA) can be viewed as a philosophy
that drives the development of components by defining their interfaces clearly
and in a way that relates to real needs. It is the key to IT and business
flexibility and receives a lot of attention from academia and industry as a
means to develop flexible and dynamic software solutions. Web 2.0 world is
wide and rich. Although significant progress is being made in several fronts,
many other researchers speak of Web 2.0 applications; they tend to focus on
the technology aspects of the environment. However, the real impact of
integrating Web 2.0 technologies is to tie the flexibility of Web 2.0 to
service-oriented principles of loose coupling, encapsulation, and reuse that
are the heart and soul of SOA. Today’s sites are no longer limited to
exchanging links and interacting via hypertext; instead, the
interconnectedness of the Internet has become progressively more important
with the rise of web services. This paper presents web 2.0 mashups remixing
data and Web Services. The purpose of this paper is to propose a flexibility
solution and new mashup platforms for e-applications and interactive services.
Flexibility is the key driver of Web 2.0 success—the flexible delivery of data
through the combination of services and disparate data sources through
mash-ups, real-time data feeds, and rich interactions. In this paper we also
explore the architectural basis, technologies, frameworks and tools considered
necessary to face this novel vision of Web 2.0—all of which adds business
value and helps companies utilizes the rich collaboration and communication of
the Internet today.
Keywords: SOA, Web services, marhups, web 2.0, Service-Oriented, platform,
blogs
Title of the Paper: Variable
Precision Distance Search for Random Fractal Cluster Simulations
DOWNLOAD
FULL PDF
Authors:
Sosa-Herrera Antonio, Rodriguez-Romo Suemi
Abstract: A simple an effective algorithm for performing distance queries
between a large number of points stored in quadtrees and octrees. The
algorithm is developed and tested for the construction of diffusion-limited
aggregates. To achieve an enhancement on the searching time we accept
approximate distance values with low precision at the first levels of the
hierarchical structure, and accurate ones at the last level. The structure of
the trees is the only feature used for the determination of approximate
distances at any stage. These techniques allowed us to build DLA clusters with
up to 109 particles for the two-dimensional case and up to 108 particles for
the three-dimensional case. We also worked with the PDLA model obtaining
fractal clusters with up to 1010 and 109 particles for two and three dimension
clusters respectively. We worked on a supercomputer to run the PDLA
simulations, as well as a high performance server for DLA simulations. We
employed POSIX threads to provide parallelization and mutexes as control
mechanisms to achieve synchronization between groups of 4 processors, hence
simulating PDLA clusters with early convergence to the DLA model.
Keywords: DLA , PDLA, distance queries, nearest neighbor, fractal cluster,
quadtree, octree
Title of the Paper: Program
Recursive Forms and Programming Automatization for Functional Languages
DOWNLOAD
FULL PDF
Authors:
N. Archvadze, M. Pkhovelishvili, L. Shetsiruli, M. Nizharadze
Abstract: The automatic programming system has been considered by means of
which it becomes easier to carry out traditional programming stages. There is
discussed both recursive forms: parallel, interrecursion and recursion of high
level that exist for functional programming languages and induction methods
for the purpose of their verification. The way how to present imperative
languages easy and double cycles by means of recursion forms is shown, the
possibility of verification has been studied for each recursion form.
Keywords: Functional Programming Languages, Recursive Forms, Programs
Verification
Title of the Paper: About
Flow Problems in Networks with Node Capacities
DOWNLOAD
FULL PDF
Authors:
Laura Ciupala
Abstract: In this paper, we study different network flow problems in networks
with node capacity. The literature on network flow problems is extensive, but
these problems are described and studied in networks in which only arcs could
have finite capacities. There are several applications that arise in practice
and that can be reduced to a specific network flow problem in a network in
which also nodes have limited capacity. This is the reason for focusing on
maximum flow problem, minimum flow problem and minimum cost flow problem in a
network with node capacities.
Keywords: Network flow; Network algorithms; Minimum cost flow problem Network
algorithms; Maximum flow; Minimum flow; Minimum cost flow; Minimum cut
Title of the Paper: Achieving
Intelligent Agents and its feasibility in Swarm-Array Computing?
DOWNLOAD
FULL PDF
Authors:
Blesson Varghese, Gerard Mckee
Abstract: The work reported in this paper proposes ‘Intelligent Agents’, a
Swarm-Array computing approach focused to apply autonomic computing concepts
to parallel computing systems and build reliable systems for space
applications. Swarm-array computing is a robotics a swarm robotics inspired
novel computing approach considered as a path to achieve autonomy in parallel
computing systems. In the intelligent agent approach, a task to be executed on
parallel computing cores is considered as a swarm of autonomous agents. A task
is carried to a computing core by carrier agents and can be seamlessly
transferred between cores in the event of a predicted failure, thereby
achieving self-* objectives of autonomic computing. The approach is validated
on a multi-agent simulator.
Keywords: Autonomic computing, Swarm-array computing, Intelligent agents,
Carrier agents
Title of the Paper: Developing
Ontology Based Applications with O3L
DOWNLOAD
FULL PDF
Authors:
Agostino Poggi
Abstract: Ontologies have been gaining interest and their use has been
spreading in different applications fields. However, their use in the
realization of applications might be further increased by the availability of
more usable and efficient software library for the management of ontologies.
In this paper, an object-oriented software library for the management of OWL
ontologies is presented. This software library, called O3L (Object-Oriented
Ontology Library), provides a complete representation of ontologies compliant
with OWL 2 W3C. O3L has not the goal to be use for the creation and
manipulation of ontologies, but provides a simplified and efficient API for
the realization of applications, that interoperate through the use of shared
ontologies, and allows: i) the use of OWL individuals as data of the
applications, ii) the exchange of OWL individuals between applications, iii)
the reasoning about OWL individuals, and iv) the classification of OWL classes
and properties. This software library has been experimented in the realization
of some e-business applications showing both high effortlessness in the
development of the applications and high performances in their execution.
Keywords: OWL, object-oriented model, ontology based applications, ontology
reasoning, semantic Web, Java
Title of the Paper: The
Application of the Finite Element Method in the Biomechanics of the Human
Upper Limb and of some Prosthetic Components
DOWNLOAD
FULL PDF
Authors:
Antoanela Naaji, Daniela Gherghel
Abstract: The inclusion of analytical and experimental models in biomechanical
studies leads to the obtainment of important data for the research concerning
the human skeleton, its traumas and diseases. The paper showcases a number of
results regarding the static and dynamic analysis of some biomechanical
components by using the finite element method (FEM). Models, representing
parts of the human upper limb, have been studied using static trials.
Considering the fact that we wish to emphasize the way in which such analyses
can be done with a finite element method, we shall present only a few relevant
examples for which we have experimental data, namely: analysis of the
compression, bending and stretching of the humerus and bending of the radius
and the ulna. Another study was carried out in order to determine the dynamic
behavior of the model for total arm prosthesis, using FEM. The models were
created with the aid of the SolidWorks program and the trials with the
HyperMesh program.
Keywords: FEA, static analysis, dynamic analysis, biomechanics
Title of the Paper: An
Algorithm for the Guillotine Restrictions Verification in a Rectangular
Covering Model
DOWNLOAD
FULL PDF
Authors:
Daniela Marinescu, Alexandra Baicoianu
Abstract: We consider the Cutting and Covering problem with guillotine
restrictions. In one of our previous works, we have shown the connection
between the connex components of a graph representation for the covering model
and the guillotine cuts. Based on this, in this paper we propose an algorithm
which can be used to verify guillotine restrictions in a two-dimensional
covering model.
Keywords: Bidimensional covering problem, guillotine restrictions, conex
components of a graph
Title of the Paper: Improved
Algorithm for Minimum Flows in Bipartite Networks with Unit Capacities
DOWNLOAD
FULL PDF
Authors:
Eleonor Ciurea, Adrian Deaconu
Abstract: The theory and applications of network flows is probabily the most
important single tool for applications of digraphs and perhaps even of graphs
as a whole. In this paper we study minimum flow an algorithm in bipartite
networks with unit capacities combining an algorithm for minimum flow in
bipartite networks with an algorithm for minimum flow in unit capacity
networks. Finally, we present the applications of the minimum flow problem in
bipartite networks with unit capacities.
Keywords: Network flows, minimum flow problem, unit capacity networks,
bipartite networks, maximum cut
Title of the Paper: Transaction-item
Association Matrix-Based Frequent Pattern Network Mining Algorithm in
Large-scale Transaction Database
DOWNLOAD
FULL PDF
Authors:
Wei-Qing Sun, Cheng-Min Wang, Tie-Yan Zhang, Yan Zhang
Abstract: To increase the efficiency of data mining is the emphasis in this
field at present. Through the establishment of transaction-item association
matrix, this paper changes the process of association rule mining to
elementary matrix operation, which makes the process of data mining clear and
simple. Compared with algorithms like Apriori, this method avoids the demerit
of traversing the database repetitiously, and increases the efficiency of
association rule mining obviously in the use of sparse storage technique for
large-scale matrix. To incremental type of transaction matrix, it can also
make the maintainment of association rule more convenient in the use of
partitioning calculation technique of matrix. On the other and, aiming at the
demerits in FP-growth algorithm, this paper proposes a FP-network model which
compresses the data needed in association rule mining in a FP-network.
Compared with the primary FP-tree model, the FP-network proposed is
undirected, which enlarge the scale of transaction storage; furthermore, the
FP-network is stored through the definition of transaction-item association
matrix, it is convenient to make association rule mining on the basic of
defining node capability. Experiment results show that the FP-network mining
association rule algorithm proposed by this paper not only inherits the merits
of FP-growth algorithm, but also maintains and updates data conveniently. It
improves the efficiency of association rule mining significantly.
Keywords: Association rule, association matrix, data mining, FP-growth
algorithm, FP-network algorithm, frequent itemset
Title of the Paper: A
Program that Acquires how to Solve Problems in Mathematics
DOWNLOAD
FULL PDF
Authors:
Machiko Fujiwara, Kenzo Iwama
Abstract: In mathematics, a sequence of sentences describes how to solve a
problem; for instance, sentences, “Calculate the least common multiple of 10
and 15. Firstly divide 10 and 15 by 2. Results are ‘5’ and ‘cannot divide’.
‘5’ and ‘cannot divide’ are not 1 and 1. Divide 5 and 15 by 2. Results are
‘cannot divide’ and ‘cannot divide’.” and so on, describe how to calculate the
least common multiple of 10 and 15. While example sequences of sentences are
given to our program, the program transforms the example sequences to generate
a procedure, pG, to solve a problem. For instance, a generated procedure, pGp,
checks if a given number is a prime number, another procedure, pGc, calculates
the least common multiple of any two numbers, and another procedure, pGf, adds
given two fractions. This paper explains our program that generates
procedures, one after another, each of which solves one mathematical problem.
The paper also argues, as a result of generating a procedure, pG, the meaning
of a sentence (or sentences) is represented in the generated procedure, pG.
Keywords: Acquisition of how to solve problems, Generation of programs from
examples, Meaning of a sentence
Title of the Paper: A
Program that Acquires how to Execute Sentences
DOWNLOAD
FULL PDF
Authors:
Machiko Fujiwara, Kenzo Iwama
Abstract: One writes example sequences of sentences so that one sequence
solves an instance of a problem, and writes how each example runs on a
computer. For instance, the one writes a sentence “From 1 to 10, repeat Body”,
and also writes how the sentence Body repeats its execution on the computer.
Then the one gives them to a program, pI, and lets the initial program
generalize how the example sequences run and generate a procedure, pg. When
the program, pI, gets a new example sequence to solve a new instance of the
problem, the program, pI, executes the procedure, pG. For instance, the one
writes a sentence “From 5 to 8, repeat Body”, and then the procedure, pG,
repeats the sentence Body four times. As a result of generating a procedure,
pG, the program, pI, acquires implicitly rules of a grammar that produce
sentences. Since the generated procedures, pG’s, describe how to execute
sentences of conditional branches, varying number of repetitions, and varying
depth of recursive calls, this paper argues our program, pI, acquires a
grammar of a language that is equivalent to that used in a conventional
programming language.
Keywords: Generation of procedures from examples, Acquiring how to execute
sentences from examples, Acquisition of a language grammar.
Title of the Paper: Adaptive
Life-Cycle and Viability based Paramecium-Imitated Evolutionary Algorithm
DOWNLOAD
FULL PDF
Authors:
Ming-Shen Jian, Ta Yuan Chou, Kun-Sian Sie, Long-Yeu Chung
Abstract: This paper proposes a sim-paramesium genetic algorithm to enhance
the searching and optimizing speed of classical genetic algorithms. Based upon
classical genetic algorithms, the sim-paramesium genetic algorithm employs
additional operators, such as asexual reproduction, competition, and
livability in the survival operation. Taking the advantages of these three
operators, the searching and optimizing speed can be increased. Experiments
indicate that simulations with the proposed algorithm have a 47% improvement
in convergence speed on the traveling salesman problem. Also, while applying
the proposed method to solve the graph coloring problem, the proposed
algorithm also has a 10% improvement in solution qualities. Furthermore, since
these operators are additional parts to the original GA, the algorithm can be
further improved by enhancing the operators, such as selection, crossover, and
mutation.
Keywords: Genetic algorithm, paramecium, traveling salesman problem, graph
coloring problem, evolutionary algorithm
Title of the Paper: Design
& Development of Collaborative Workflow for Lean Production in a Repair &
Overhaul Industry
DOWNLOAD
FULL PDF
Authors:
Teh Ying Wah, Ng Hooi Peng, Ching Sue Hok, Lai Mei Yoon
Abstract: Aerospace fuel nozzles maintenance, repair and overhaul operation is
a dynamic process as the work flow is unpredictable. Further detail checking
and analyzing on defects are needed in order to determine the workflow. The
traditional paper based of work in progress information had been implementing
as to manage the nozzles production. However, paper based of work in progress
information is inefficient in dealing with these unpredictable and complex
workflows. There is a probability of entering or recording the error
information when it is in paper based system. This wrong information will
cause problem in production line as the results are inconsistent. Furthermore,
this inaccurate result will lead to difficulty in tracking the nozzles.
Excessive time is needed and wasted in indentifying and correcting the errors.
Hence, an electronic based of work in progress system is apparently required
as to overcome the shortcoming of the paper based tracking and also to enhance
the efficiency of production line. This paper will describe the configurable
and customizable work in progress tracking system as a mean to improve over
the traditional paper based system.
Keywords: Work Flow, Configurable, Tracking System
Title of the Paper: Some
Considerations About Collaborative Systems Supporting Knowledge Management in
Organizations
DOWNLOAD
FULL PDF
Authors:
Mihaela I. Muntean, Diana Tarnaveanu
Abstract: In the present global economy, strongly influenced by IT
(information technology) and information systems evolution, the modern
organizations try to face the challenges by adjusting their strategies and
restructuring their activities, for aligning them to the new economy
requirements. It is certain, that the enterprise’s performance will depend on
the capacity to sustain collaborative work. The evolution of information
systems in these collaborative environments led to the sudden necessity to
adopt, for maintaining the virtual activities/processes, the latest
technologies/systems that are capable to support integrated collaboration in
business services. Stating this, we mean collaborative systems of different
type: conversational tools, multi-agent systems, and all these, among various
enterprise applications, integrated in portal-based IT platforms. It is
obvious, that all collaborative environments (workgroups, practice
communities, collaborative enterprises) are based on knowledge, and between
collaboration and knowledge management (KM) there is a strong interdependence.
Therefore, we focused on how collaborative systems are capable to sustain
knowledge management and their impact on optimizing the KM life cycle. We
explore some issues regarding collaborative systems and propose a portal-based
IT solution that sustains the KM life cycle through a distributed
architecture. All considerations have a strong research background, our
portal-based proposal for sustaining knowledge management in organizations
being subject of some Romanian research projects that are fitting in the
European research demarches.
Keywords: Collaboration, collaborative environments, knowledge management,
distributed knowledge management, collaborative systems, portals, knowledge
portals.
Title of the Paper: A
Multiagent Grid Metascheduler
DOWNLOAD
FULL PDF
Authors:
Jose Aguilar, Rodolfo Sumoza
Abstract: This work proposes a Metascheduler for GRID platforms based on the
Interaction Protocols of the Multiagent Systems. These protocols use the
paradigm of economic models to define the coordination mechanisms in agent
communities. Specifically, in this work we use auction and tender economical
models. We propose an adaptive Metascheduler for GRID platforms using these
ideas. According to the number of available resources one of these models is
used to coordinate the assignment of resources.
Keywords: GRID, Metascheduler, Multiagents Systems, Auction, Tender,
Assignment problem
Title of the Paper: A
Security Incidents Management for a CERT based on Swarm Intelligence
DOWNLOAD
FULL PDF
Authors:
Jose Aguilar, Blanca Abraham, Gilberto Moreno
Abstract: This paper proposes an incident management system based on the swarm
intelligence in order to keep updated the information about computational
security. Particularly, swarm intelligence is an extension of the multiagents
theory, where reactive agents follow very simple rules. We propose a search
and selection method based on swarm intelligence, where the agents search
previous answers to incidents of security on Internet.
Keywords: Incident Management System, Swarm Intelligence, Security Systems,
CERT, Search Algorithm, Multiagent Systems
Title of the Paper: Case-Based
Reasoning and Fuzzy Logic in Fault Diagnosis
DOWNLOAD
FULL PDF
Authors:
Viriato Marques, J. Torres Farinha, Antonio Brito
Abstract: This paper is divided into four parts: the first one introduces
SADEX, a fuzzy Case Based Reasoning (CBR) System for fault diagnosis. The
second focus on its observation relevance factors and shows how the results
are in complete agreement with the relevance concept introduced by Robertson
and Spark-Jones in their well known and proved technique for document
retrieval. The third describes how equipment composition information can be
used to generalize and adapt case solutions to new and unknown occurrences;
this generalization is based on a taxonomic similarity between functionally
autonomous modules (FAMs). Finally the MKM - Maintenance Knowledge Manager
system is introduced.
Keywords: Case-based Reasoning, Fuzzy Systems, Relevance, Taxonomies,
Knowledge Management
Issue
9, Volume 8, September 2009
Title of the Paper: Crossing
Genetic and Swarm Intelligence Algorithms to Generate Logic Circuits
DOWNLOAD
FULL PDF
Authors:
Ceciia Reis, J. A. Tenreiro Machado
Abstract: Genetic Algorithms (GAs) are adaptive heuristic search algorithm
based on the evolutionary ideas of natural selection and genetic. The basic
concept of GAs is designed to simulate processes in natural system necessary
for evolution, specifically those that follow the principles first laid down
by Charles Darwin of survival of the fittest. On the other hand, Particle
swarm optimization (PSO) is a population based stochastic optimization
technique inspired by social behavior of bird flocking or fish schooling. PSO
shares many similarities with evolutionary computation techniques such as GAs.
The system is initialized with a population of random solutions and searches
for optima by updating generations. However, unlike GA, PSO has no evolution
operators such as crossover and mutation. In PSO, the potential solutions,
called particles, fly through the problem space by following the current
optimum particles. PSO is attractive because there are few parameters to
adjust. This paper presents hybridization between a GA algorithm and a PSO
algorithm (crossing the two algorithms). The resulting algorithm is applied to
the synthesis of combinational logic circuits. With this combination is
possible to take advantage of the best features of each particular algorithm.
Keywords: Artificial Intelligence, Computational Intelligence, Evolutionary
Computation, Genetic Algorithms, Particle Swarm Optimization, Digital Circuits
Title of the Paper: Prediction
of Disulfide Bonding Pattern Based on Support Vector Machine with Parameters
Tuned by Multiple Trajectory Search
DOWNLOAD
FULL PDF
Authors:
Hsuan-Hung Lin, Lin-Yu Tseng
Abstract: The prediction of the location of disulfide bridges helps solving
the protein folding problem. Most of previous works on disulfide connectivity
pattern prediction use the prior knowledge of the bonding state of cysteines.
In this study an effective method is proposed to predict disulfide
connectivity pattern without the prior knowledge of cysteins’bonding state. To
the best of our knowledge, without the prior knowledge of the bonding state of
cysteines, the best accuracy rate reported in the literature for the
prediction of the overall disulfide connectivity pattern (Qp) and that of
disulfide bridge prediction (Qc) are 48% and 51% respectively for the dataset
SPX. In this study, the cystein position difference, the cystein index
difference, the predicted secondary structure of protein and the PSSM score
are used as features. The support vector machine (SVM) is trained to compute
the connectivity probabilities of cysteine pairs. An evolutionary algorithm
called the multiple trajectory search (MTS) is integrated with the SVM
training to tune the parameters for the SVM and the window sizes for the
predicted secondary structure and the PSSM. The maximum weight perfect
matching algorithm is then used to find the disulfide connectivity pattern.
Testing our method on the same dataset SPX, the accuracy rates are 54.5% and
60% for disulfide connectivity pattern prediction and disulfide bridge
prediction when the bonding state of cysteines is not known in advance.
Keywords: Disulfide bonding pattern, SVM, multiple trajectory search
Title of the Paper: Adapting
the Ticket Request System to the Needs of CSIRT Teams
DOWNLOAD
FULL PDF
Authors:
Pavel Kacha
Abstract: CSIRTs (Computer Security Response Teams) are the natural response
to the widespread internet threats. Many of them have grown of small, but
focused groups of people, by streamlining and expanding of what they have been
already doing as part of their IT administrative work. Formalisation of the
procedures and workflows brings the need for specialised tools, helping with
incident categorisation, authorisation of incident origin and general
workflow. Also, special nature of incoming report emails introduces a new
issues to otherwise well-known spam and backscatter fighting methods. As well
as low level know-how, important part of security team practices are also
higher level statistical analyses for pinpointing potential threats and
trends. This paper proposes approaches to these problems and describes their
implementation as modifications and supportive applications for Open Ticket
Request System (OTRS), as well as experience from usage in the real world
medium-sized security team.
Keywords: OTRS, CSIRT, CERT, security incident, metadata, issue management,
Bayesian analysis, antispam, backscatter, statistics
Title of the Paper: Audit
System at CESNET-CERTS
DOWNLOAD
FULL PDF
Authors:
Pavel Vachek
Abstract: CESNET-CERTS, the Computer Security Incident Response Team of the
CESNET Association in Prague, Czech Republic, uses several security tools
based on freely licensed programs. One of them is an enhanced system for host
security auditing which is based on Nessus and runs on a PC server under
Linux. An e-mail interface developed in-house allows users to perform basic
host security audits simply and securely without having to study the extensive
Nessus manuals and/or installing the Nessus server. The use of a similar
open-source program OpenVAS within the Audit System is also considered.
Keywords: Cesnet Association, Host security audit, Nessus, OpenVas, Pc, Linux,
E-mail interface
Title of the Paper: A New
Method for Clustering Heterogeneous Data: Clustering by Compression
DOWNLOAD
FULL PDF
Authors:
Dorin Carstoiu, Alexandra Cernian, Valentin Sgarciu, Adriana Olteanu
Abstract: Nowadays, we have to deal with a large quantity of unstructured
data, produced by a number of sources. For example, clustering web pages is
essential to getting structured information in response to user queries. In
this paper, we intend to test the results of a new clustering technique –
clustering by compression – when applied to heterogeneous sets of data. The
clustering by compression procedure is based on a parameterfree, universal,
similarity distance, the normalized compression distance or NCD, computed from
the lengths of compressed data files (singly and in pair-wise concatenation).
Compression algorithms allow defining a similarity measure based on the degree
of common information, whereas clustering methods allow clustering similar
data without any previous knowledge.
Keywords: Custering, heterogeneous data, clustering by compression, Normalized
Compression Distance (NCD), FScore
Title of the Paper: Effectiveness
and Accuracy of Wireless Positioning Systems
DOWNLOAD
FULL PDF
Authors:
Sebastian Fuicu, Marius Marcu, Bogdan Stratulat, Anania Girban
Abstract: Localization or positioning is an important aspect of mobile
applications in order to achieve contextaware applications. The main goal for
localization process is estimating the position of a mobile device in its
environment based on a set of sensors with known positions. Modern mobile
devices produced nowadays, and almost all smartphones and PDAs, have one or
more wireless communication interfaces in order to communicate with other
devices. WLAN infrastructure is a widely accepted and implemented
communication standard in many indoor environment, therefore many buildings
are already equipped with IEEE 802.11 WLAN infrastructure access points.
Wireless adapters the modern mobile devices are equipped with can monitor
radio power strength of the emitting sources nearby. Based on the received
radio signal strength an estimation of distance between the device and power
source can be computed. In this paper we want to describe and conclude our
work regarding the possibility to design a simple and energy efficient
positioning solution to be implemented on mobile devices with limited
resources.
Keywords: Wireless positioning systems, radio signal strength, energy
efficiency, trilateration
Title of the Paper: Application
of ε-Testers Algorithms under Sketch and Streaming Calculation Model in Robot
Navigation
DOWNLOAD
FULL PDF
Authors:
Carlos Rodriguez Lucatero
Abstract: The goal of this article is the application of efficient approximate
testing methods for the robot tracking problem as well as for the building map
problem . In the Databases field, one wish to classify uncertain data and to
answer queries in an approximated way in the case that data sources are
incoherent. Our interest is based on the fundamental problems in the
randomized approximate testing algorithms. Concerning robot navigation we
would like to apply efficient data sketching algorithms for testing the
automata inferred on robot motion tracking problems as well as on maps
sensorialy generated by robot exploration and building map process. In the
case of the information generated by sensors, given that we have no complete
access to the information, and given the inherent limitations on memory space,
we will apply streaming algorithms for approximate efficiently the solution of
computational problems that take place on robot navigation problems.
Keywords: Robot navigation, Motion tracking, Exploration, Sketching and
streaming algorithms, Testability
Title of the Paper: Three
Different Designs for Packet Classification
DOWNLOAD
FULL PDF
Authors:
Hatam Abdoli
Abstract: If we analyze real life filter sets (classifiers) and also packet
classification requirements, it seems that distribution of rule scope is
non-uniform and in some sub spaces is denser inside the total space of
classifiers. These features guided us to add "cut point heuristic" to HiCuts,
one of the most efficient algorithms and resulted in two new optimized designs
for HiCuts, named B-HiCuts and Hist. Also one of the hardware based and fast
solution for classification is use of TCAM memory to implement classifiers,
but TCAMs are expensive and are not efficient for range fields. The third
approach in this paper introduces a hybrid scheme to do a part of search on
prefix fields in TCAM and then to check other fields, the search process will
be traversed to RAM section in the second level. Synthetic classifiers are
made by ClassBench and used to simulate and evaluate performance of proposed
designs. The most specifications of proposed methods are balancing of decision
trees and reducing the consumed memory for B-HiCuts and Hist and also solving
range to prefix conversion and multi match classification problems in the last
proposed design.
Keywords: Balanced tree, HiCuts, Heuristic, Packet classification, Packet
filter, Router, TCAM
Title of the Paper: Empirical
Determination of Sample Sizes for Multi-layer Perceptrons by Simple RBF
Networks
DOWNLOAD
FULL PDF
Authors:
Hyontai Sug
Abstract: It’s well known that the computing time to train multilayer
perceptrons is very long because of weight space of the neural networks and
small amount of adjustment of the wiights for convergence. The matter becomes
worse when the size of training data set is large, which is common in data
mining tasks. Moreover, depending on samples, the performance of neural
networks change. So, in order to determine appropriate sample sizes for
multilayer perceptrons this paper suggests an effective approach with the help
of simple radial basis function networks that work as a guide. Experiments
with the two different data sets that may represent business and scientific
domain well showed the effectiveness of the suggested method.
Keywords: Multilayer perceptron, sample size, radial basis function network,
data mining
Title of the Paper: Sensitivity
Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
DOWNLOAD
FULL PDF
Authors:
Rachid Sammouda
Abstract: This paper presents a study of the sensitivity analysis of the
artificial Hopfield Neural Network (HNN) when segmenting natural color images.
The color distinction or vision system relies on two step process which, first
classifies the different regions in the scene into a given number of clusters,
and then assigns to each cluster a color that is likely to one of its
corresponding region in the raw image. The classification process is performed
using the minimization of an energy function typically the Sum of Squared
Errors (SSE). The optimization process is found sensitive to the step taken by
the network in its way to the global minimum. The color assignment to the
clusters is performed based on combination of information from the color
palette used in the raw image and the last distribution of the pixels among
clusters. Applying the system to a gold standard color image, the results show
that HNN natural color segmentation accuracy can be significantly improved if
we control its step size when modifying its weights between its neurons each
iteration. The color matching process shows a lot of consistency when tested
with natural color images as shown in the results presented here.
Keywords: Hopfield Neural Network, Sensitivity analysis, Segmentation, Natural
Color Image matching, RGB Color Space
Title of the Paper: An
Advanced Hybrid Machine Learning Approach for Assessment of the Change of Gait
Symmetry
DOWNLOAD
FULL PDF
Authors:
Jianning Wu
Abstract: The quantitative assessment of the change of gait symmetry has
played a very important role in the clinical diagnostics. This paper
investigated the application of an advanced hybrid machine learning approach
such as the combining kernel-based principal component analysis (KPCA) with
support vector machine (SVM) to evaluate the change of gait symmetry
quantitatively based on the basic idea that the discrimination of the
functional change of between human lower extremities can be hypothesized as
binary classification task. To assess the change of gait symmetry accurately,
more nonlinear principal components extracted by using KPCA were employed to
initiate the training set of SVM, which could enhance the generalization
performance of SVM. The foot-ground force gait data of 24 elderly participants
were acquired using a strain gauge force platform during normal walking, and
were analyzed with our proposed model. The test results demonstrated that ,
when compared to the SVM-based classification models, our proposed technique
with superior classification performance could discriminate difference between
the right and left side gait function of lower limbs accurately, and that more
principal components extracted by KPCA with polynomial kernel (=3) could
capture more useful information about intrinsic nonlinear dynamics of human
gait in comparison to the some key gait variables selected. The proposed
hybrid model could function as an effective tool for clinical diagnostics in
the future clinical circumstance.
Keywords: Gait analysis, Gait symmetry, Kernel principal component analysis,
Support vector machine, Gait classification, Kinetic gait data
Title of the Paper: Model
Validation for GPS Total Electron Content (TEC) using 10th Polynomial Function
Technique at an Equatorial Region
DOWNLOAD
FULL PDF
Authors:
Norsuzila Ya'Acob, Mardina Abdullah, Mahamod Ismail, Azami Zaharim
Abstract: GPS receivers have been profitably employed by researchers for
investigations into ionospheric and atmospheric science. However, a number of
improvements in measurement accuracy are necessary for today’s applications.
The ionosphere has practical importance in GPS applications because it
influences transionospheric radio wave propagation. Total Electron Content
(TEC) is one of the parameters of the ionosphere that produces the most
effects in many radio applications such as radio communications, navigation
and space weather. Delays in GPS signals affect the accuracy of GPS
positioning. The determination of the TEC will aid in reliable space-based
navigation system. By modelling this TEC parameter, the evaluation of the
ionospheric error and the correction of these ionospheric errors for
differential GPS can be done. Determination of the differential ionospheric
error to sub-centimetre accuracy is described in this paper utilizing a
developed model. An ionospheric delay model was developed to accurately
determine the difference in ionospheric delay expected over a short baseline
so that a more accurate differential GPS correction could be made. An
ionospheric error correction model should be made applicable to any location
including the equatorial region. The results showed that the developed
algorithm is a function of elevation angle and TEC from the reference station
path to the satellite and could give differential ionospheric delay in sub-centimetre
accuracy.
Keywords: GPS, TEC, ionosphere, baseline, differential GPS, transionospheric
Title of the Paper: Filtering
vs. Nonlinear Estimation Procedures for Image Enhancement
DOWNLOAD
FULL PDF
Authors:
Barbara Dzaja, Mirjana Bonkovic, Spomenka Bovan
Abstract: Image enhancement methods can be divided into two groups: the ones
that use only one single image and the ones that rely on specific training set
or use multiple images. In this paper an iterative algorithm, based on the
quasi-Newton methods, is introduced with the objective to enhance resolution
only by one single image. In the paper there will be compared results gained
depending on the used method: nonlinear iterative algorithm vs. filtering
algorithm with EMD. Empirical Mode Decomposition can be treated as filtering
procedure for image enhancement.
Keywords: Image enhancement, Broyden algorithm, Iterative algorithms,
Empirical Mode Decomposition
Title of the Paper: Inverse
Dynamic Compound Control for Intelligent Artificial Leg Based on PD-CMAC
DOWNLOAD
FULL PDF
Authors:
Hong-Liu Yu, Zhao-Hong Xu, Xing-San Qian, Zhan Zhao, Ling Shen
Abstract: Traditional mathematic model is not suitable for actual control,
because the knee torque of intelligent artificial leg (IAL) is indirectly
caused by the nonlinear damping. An inverse dynamic compound control for
intelligent artificial leg was studied. A dynamics model of hydraulic IAL with
the nonlinear damper control parameters and hip torque was set up, and an
inverse dynamic compound controller based on PD-CMAC for tracking the knee
swing was designed. The simulation results show that an arbitrary trajectory
such as a desired walking pattern can be tracked in less than 0.5 seconds,
which proves that the controller meets real time and precision demanded.
Keywords: Intelligent artificial leg, compound control, dynamic model,
cerebellar model articulation controller
Title of the Paper: Numerical
Simulation of Bridge Damage under Blast Loads
DOWNLOAD
FULL PDF
Authors:
Rong-Bing Deng, Xian-Long Jin
Abstract: The numerical simulation of the structural damage of a steel truss
bridge subjected to blast loading with the aid of a hydrocode is presented in
this paper. A three-dimensional nonlinear finite element model of an actual
bridge has been developed based on the drawing design of the Minpu II Bridge
in Shanghai. The effects of mesh size on pressure distribution produced by
explosions are also studied. Through the comparison between the calculation
results and the experimental values, the reliability of the calculation is
validated. All the process from the detonation of the explosive charge to deck
crack, including the propagation of the blast wave and its interaction with
the structure is reproduced. The numerical results show the damage of bridge
parts and provide a global understanding of bridge under blast loads. It may
be generated to supplement experimental studies for developing appropriate
blast-resistant design guidelines for bridges in the future.
Keywords: Steel truss bridge, blast load, hydrocode, bridge damage, ALE
method, numerical simulation
Title of the Paper: Texture
Defect Detection System with Image Deflection Compensation
DOWNLOAD
FULL PDF
Authors:
Chun-Cheng Lin, Cheng-Yu Yeh
Abstract: Image textural analysis technology has been widely used in the
design of automated defect detection systems. Because the presence of defects
may change the textural features of an image, a reference image without
defects can be compared with the test image to detect whether there are any
defects. However, besides defects, the deflection of the input test image
could also change its textural features. When there is any angular difference
between the reference and test images, their textural features would also be
different, even if there is no defect in the test image. As a result,
misjudgment of the defect detection system may occur. Most of the previous
studies have focused on the development of textural analysis technology which
could decrease the effect of test image deflection. This study aimed to
estimate the deflection angle of test images through polar Fourier transform
and phase correlation analysis, and rotate the reference image by the same
angle to compensate for the deflection of the test image. After the angles of
the reference and test images were brought into line, the textural analysis
based on the gray level co-occurrence matrix was applied to analyze and
compare the textural features of the two images. The results of actual texture
defect detection demonstrated that the angular differences between the
reference and test images could be estimated correctly, with an estimation
error of only 0° to 0.5°. By compensating for the deflection of the test
image, the accuracy of the texture defect detection could be effectively
enhanced.
Keywords: Texture defect detection, Image deflection compensation, Polar
Fourier transform, Phase correlation analysis, Gray level co-occurrence matrix
Title of the Paper: Fault-Tolerant
Mapping of a Mesh Network in a Flexible Hypercube
DOWNLOAD
FULL PDF
Authors:
Jen-Chih Lin
Abstract: The Flexible Hypercube FHN is an important variant of the Hypercube
Hn and possesses many desirable properties for interconnection networks. This
paper proposes a novel algorithm of fault-tolerant method for mapping a mesh
network in a Flexible Hypercube. The main results obtained (1) a searching
path of a FHN is including approximate to (n+1) nodes, where n=2logN.
Therefore, there are O() faults, which can be tolerated. (2) Our results for
the mapping methods are optimized mainly for balancing the processor and
communication link loads. These results mean that the parallel algorithms
developed by the structure of mesh network can be executed in a faulty FHN.
The useful properties revealed and the algorithm proposed in this paper can
find their way when the system designers evaluate a candidate network’s
competence and suitability, balancing regularity and other performance
criteria, in choosing an interconnection network.
Keywords: Hypercube, Flexible Hypercube, Mesh Network, Fault-Tolerant,
embedding
Title of the Paper: Τhe
Function Block Model in Embedded Control and Automation from IEC61131 to
IEC61499
DOWNLOAD
FULL PDF
Authors:
Kleanthis Thramboulidis
Abstract: The Function Block (FB) model was first standardized by the 1131
standard of the International Electrotechnical Commission (IEC) for
programmable controllers. This standard was successfully adopted by the
industry but it seems to have several constraints for the development of
today’s complex embedded control and automation systems. These constraints are
mainly imposed by the procedural programming paradigm and the device centric
approach that are adopted by the standard. The IEC to address these
constraints proposed the 61499 standard that is an attempt to exploit
object-orientation and the application-centric paradigm in the control and
automation domain. In this paper, the FB models of 1131 and 61499 are briefly
described and several unclear issues related to the programming paradigms
adopted, interoperability, composability and execution semantics of these FB
models are clarified. The paper focuses on the execution semantics of the
61499 standard since this is one of the most important reasons that the
industry has not yet accepted this standard.
Keywords: Embedded control and automation systems, IEC 61131, IEC 61499, 1131
Function Block Model, IEC61499 execution environment, execution model
semantics, Factory Automation
Title of the Paper: An
Environment for Describing Software Systems
DOWNLOAD
FULL PDF
Authors:
Adel Smeda, Adel Alti, Abbdellah Boukerram
Abstract: Describing the architecture of complex software systems need a
comprehensive models and complete tools. The description of software systems
can be achieved by using an architecture description language (ADL) or an
object oriented modeling language. In this article, we show how we can build a
hybrid model to describe the architecture of software systems. This model is
based on the two approaches. First we define a metamodel for software
architecture, next based on this metamodel we implement an environment for
describing the architecture of software systems.
Keywords: Software Architecture, COSA, Architecture Description Languages, UML
2.0 Modeling Language, Component, Connector
Issue
10, Volume 8, October 2009
Title of the Paper: Opportunities
in ICT Education
DOWNLOAD
FULL PDF
Authors:
Seyed Shahrestani
Abstract: While cost saving is at the forefront of the reasons for offshoring
to low wage countries, the moves relevant to ICT are also motivated by
difficulty in finding the right talents inside the country. One of the root
causes for such a difficulty, is related to the drastic fall in the number of
students in field like computer engineering and ICT. To combat that, there
have been serious changes in national education policies, and the way
universities and other training institutions conduct their business to inspire
young students to choose ICT for their studies. Although as a consequence of
those, in some parts of the world, the number of students enrolling in these
fields have stabilized or even increased, given the number of years it takes
to educate a graduate, the number of graduates has been dropping at alarming
rates. Furthermore, the ICT skills shortages for experienced professionals, in
most industrialized countries can be expected to get worse, before they
eventually get better. There is also a strong case for retraining many people
who already have tertiary education, whether in the workforce or not, to
overcome to ominous ICT skills dilemma. This paper reports on the examination
of these problems. It also reports on the advantages of taking a more
broad-spectrum view, requiring a combination of many existing solutions along
with novel approaches and realistic analysis of the acceptance of the current
global ICT services and education environments to overcome these problems.
Keywords: ICT Education, Higher Education, Offshoring, Skills Shortage
Title of the Paper: A
Closer Look to the V-Model Approach for Role Engineering
DOWNLOAD
FULL PDF
Authors:
Radu Constantinescu, Andrei Toma
Abstract: Role engineering is a both necessary and critical topic in the
development of Role Based Access Control system, which seems to be the most
proficient access control approach nowadays. Even if the maturity of the RBAC
model has been already achieved, the role engineering process is not a
standardized approach. The paper aims to illustrate an enhanced process model
for role engineering. The model is focused on the intuitive discovering of the
roles and their assignment with permissions, using a test-driven approach.
Keywords: Access control systems, role based access control systems – RBAC,
role engineering, authorization, roles, permissions, constraints, role
hierarchies.
Title of the Paper: Improving
Organizational Efficiency and Effectiveness in a Romanian Higher Education
Institution
DOWNLOAD
FULL PDF
Authors:
Scorta Iuliana, Bara Adela, Constantinescu Radu, Zota Razvan, Nastase Floarea
Abstract: In response to the significant changes in the competitive climate of
public sector higher education institutions (HEIs), the Romanian universities
face the need to improve operational efficiency by implementing advanced
information systems. The purpose of this paper is to provide a solution for an
ERP (Enterprise Resource Planning) system that could integrate all of a
Romanian HEI’s department functionalities, to propose a model that describes
how the concepts of user competence and role may optimize an ERP system
implementation in a Romanian HEI and to provide a possible architectural
solution for developing a decision support system that can extract and report
the information from the proposed ERP system.
Keywords: ERP, HEI, DSS, Competencies, Roles, Knowledge
Title of the Paper: New
Families of Computation-Efficient Parallel Prefix Algorithms
DOWNLOAD
FULL PDF
Authors:
Yen-Chun Lin, Li-Ling Hung
Abstract: New families of computation-efficient parallel prefix algorithms for
message-passing multicomputers are presented. The first family improves the
communication time of a previous family of parallel prefix algorithms; both
use only half-duplex communications. Two other families adopt collective
communication operations to reduce the communication times of the former two,
respectively. The precondition of the presented algorithms is also given.
These families each provide the flexibility of either fewer computation time
steps or fewer communication time steps to achieve the minimal running time
depending on the ratio of the time required by a communication step to the
time required by a computation step. Relative merits and drawbacks of parallel
prefix algorithms are described and illustrated to provide insights into when
and why the presented algorithms can be best used.
Keywords: Collective communication, Computation-efficient parallel prefix,
Half-duplex communication, Message-passing multicomputer, Parallel algorithm,
Precondition, Prefix computation
Title of the Paper: New
Computation of Normal Vector and Curvature
DOWNLOAD
FULL PDF
Authors:
Hyoung-Seok Kim, Ho-Sook Kim
Abstract: The local geometric properties such as curvatures and normal vectors
play important roles in analyzing the local shape of objects. The result of
the geometric operations such as mesh simplification and mesh smoothing is
dependent on how to compute the normal vectors and the curvatures of vertices,
because there are no exact definitions of the normal vector and the discrete
curvature in meshes. Therefore, the discrete curvature and normal vector
estimation play the fundamental roles in the fields of computer graphics and
computer vision. In this paper, we propose new methods for computing normal
vector and curvature well, which are more intuitive than the previous methods.
Our normal vector computation algorithm is able to compute the normal vectors
more accurately and is available to meshes of arbitrary topology. It is due to
the properties of local conformal mapping and the mean value coordinates.
Secondly, we point out the fatal error of the previous discrete curvature
estimations, and then propose a new discrete sectional-curvature estimation to
be able to overcome the error. The method is based on the parabola
interpolation and the geometric properties of Bezier curve. It is confirmed by
experiment that the normal vector and the curvature generated by our algorithm
are more accurate than that of the previous methods.
Keywords: Normal vector, curvature, local geometric property, mesh
segmentation
Title of the Paper: Auction
Resource Allocation Mechanisms in Grids of Heterogeneous Computers
DOWNLOAD
FULL PDF
Authors:
Timothy M. Lynar, Ric D. Herbert, Simon
Abstract: This paper examines economic resource allocation through a number of
auction types for a grid of ewaste computers. It examines the time to complete
tasks and the energy usage of completing the tasks on a grid. A model of a
simulated grid is developed and used to evaluate the resource allocation
mechanisms. The model is an agent-based simulation where by user agents submit
tasks to node agents that process these tasks. We evaluate three types of
resource-allocator agents which all use a type of auction. The auction types
are batch auction, continuous double auction and a pre-processed batch
auction. The pre-processed batch auction is developed to try to have the
advantages of both the continuous double auction and the batch auction. The
simulated grid is calibrated to a real e-waste grid where each node has a
performance index. This grid is a test grid of eight nodes of heterogenous
computer hardware and with differing computational ability and energy usage.
We simulate the auction types under the same task input streams. We consider a
task impulse response stream on energy usage and time to complete all tasks
and a input stream step response. Finally we consider the three auction
allocation mechanisms under a random task stream. The paper finds that the
choice of auction method makes a substantial difference in the time to
complete tasks and in total energy consumption.
Keywords: Grid computing, resource allocation, auctions, e-waste, energy
consumption
Title of the Paper: Improving
the ETL Process and Maintenance of Higher Education Information System Data
Warehouse
DOWNLOAD
FULL PDF
Authors:
Igor Mekterovic, Ljiljana Brkic, Mirta Baranovic
Abstract: HEIS (Higher Education Information System) is a project funded by
the Croatian Ministry of Science, Education and Sports started in the year
2001. HEIS is a comprehensive information system that provides support for
education related processes taking place within a higher education
institution. As a part of the project, a data warehouse was developed to
provide reporting and analytical features. This paper presents the HEIS data
warehouse architecture, comments on the data model and addresses issues (and
our solutions) that arose during the seven-year development and maintenance
period. Foremost, we address improvements in the ETL process and maintenance
process.
Keywords: Data warehouse, Higher education information system, ETL,
Maintenance, Dimensional model
Title of the Paper: Traceability-based
Incremental Model Synchronization
DOWNLOAD
FULL PDF
Authors:
Istvan Madari, Laszlo Angyal, Laszlo Lengyel
Abstract: Model transformation is a crucial aspect of Model-Driven Software
Development. With the help of model transformation, we can generate source
code or other artifacts from software models. However, a recurring problem in
software development is the fact that source and target models coexist and
they evolve independently. In general, a modeled system is composed of several
models that are often related to one another. Consequently, the related models
will not be consistent anymore if one of them is altered in the development
process. For that reason, a model synchronization method is necessiated to
resolve inconsistency between the modified models. Performing synchronization
manually can be an error prone task due to the number and complexity of model
elements. In model-driven technologies, where processing is carried out as a
series of model transformations, applying model transformations can also be a
reasonable option for the reconciliation. This paper presents an approach that
uses trace models and model transformations to facilitate incremental model
synchronization.
Keywords: Model transformation, Model synchronization, Traceability, Trace
mode
Title of the Paper: Semantic
Processing based on Eye-Tracking Metrics
DOWNLOAD
FULL PDF
Authors:
Robert Andrei Buchmann, Alin Mihaila, Radu Meza
Abstract: This paper proposes a framework for capturing semantics from eye
tracking data during the process of text skimming/scanning by readers of
electronic documents and HTML user interfaces. RDFa and HTML microformats are
some of the easier ways proposed by the Semantic Web paradigm for embedding
semantics in web pages. XSLT transformations or specialized parsers may easily
convert such documents to RDF/XML semantic repositories. However, semantics do
not usually have an absolute character. Although a variety of web 2.0 oriented
ontologies and microformats have been widely adopted or even standardized
(Dublin Core, FOAF, XFN etc.), in order to achieve semantic interoperability,
there are scenarios in which user-relative semantics are especially important,
such as in the development of customization engines (web session
customization, recommender systems, targeted advertising), when a certain user
must only share semantics with himself or with similar persons. Having the
same web document, different readers would attach various semantics and
relevance to the ideas, concepts or structural blocks of the document. Eye
tracking is an emerging field with multiple applications in medicine,
marketing, cognitive sciences and others, which allows the extraction of data
regarding the eye activity of a user during human-computer interaction. Eye
tracking data is valuable in measuring reading patterns, user experience and
reflects the specific parts of an image or documents that attract the user’s
interest.
Keywords: Eye tracking, semantics, text skimming, microformats
Title of the Paper: Improved
Performance Model for Web-Based Software Systems
DOWNLOAD
FULL PDF
Authors:
Agnes Bogardi-Meszoly, Tihamer Levendovszky, Hassan Charaf
Abstract: The performance of web-based software systems is one of the most
important and complicated consideration. With the help of a proper performance
model and an appropriate evaluation algorithm, performance metrics can be
predicted. The goal of our work is to introduce and verify an improved
multi-tier queueing network model for web-based software systems. In our work,
an evaluation and prediction technique applying dominant factors in point of
response time and throughput performance metrics has been established and
investigated. The Mean-Value Analysis algorithm has been improved to model the
behavior of the thread pool. The proposed algorithm can be used for
performance prediction. The convergence and limit of the algorithm have been
analyzed. The validity of the proposed algorithm and the correctness of the
performance prediction have been proven with performance measurements.
Keywords: Web-based software systems, Queueing model, Mean-Value Analysis,
Thread pool, Performance prediction, Convergence
Issue
11, Volume 8, November 2009
Title of the Paper: A
Flexible Implementation of a Web-based Election System for Educational
Organizations
DOWNLOAD
FULL PDF
Authors:
Sharil Tumin, Sylvia Encheva
Abstract: Web-based on-line voting and on-line election systems provide
benefits of usability, manageability and security. A particular workflow in
any phase of on-line election process can be modeled and implemented securely
by employing basic security applications readily provided by well established
cryptographic technologies. By analyzing data-flow between di erent phases in
the workflow, secure processes can be implemented using Web, database and
cryptographic techniques. The implementation has to deliver a system that
provides performance properties mandatory of an on-line election system of
authentication, democracy, anonymity, non-coercion, accuracy, reliability,
veracity, verifiability, neutrality, and likability.
Keywords: e-Voting, e-Election, Applications security, Multi-tiers Web-based
application, Secure Workflow Modeling, Practical Cryptographic Applications
Title of the Paper: A
Utility based, Multi-Attribute Negotiation Approach for Semantic Web Services
DOWNLOAD
FULL PDF
Authors:
Sandeep Kumar, Nikos E. Mastorakis
Abstract: Apart from some other important Semantic Web service related
processes such as discovery, selection, composition etc., the process of
negotiation is also generally required in the semantic web based systems.
Before taking the services of a service provider, the service requester may
need to negotiate with it on various issues. A utility-based, multi-attribute
negotiation approach capable of providing negotiation between participating
semantic web services has been presented in this paper. The approach is based
upon the use of utility functions in the negotiation process and uses multiple
attributes as the basis of negotiation. A communication model describing the
negotiation process has been presented. The paper also presents the algorithms
for various activities involved in the negotiation process. The work also
proposes a novel concept of negotiation-feedback using a novel data-structure,
Agreement Table. This concept can be helpful in expediting the negotiation
process by decreasing the number of negotiation steps in which the agreement
is reached. An evaluation of the work has been presented and a prototype
system providing negotiation between semantic web services has been
implemented.
Keywords: Semantic web, utility, semantic web service, negotiation
Title of the Paper: A
Online Retrieving Method for Product Functional and Structural Information
based FGT Model
DOWNLOAD
FULL PDF
Authors:
Feng Qi
Abstract: In reusable design, the reusability of product information model is
a key criterion for design efficiency. In order to improve the reusability for
product information model, a online retrieving method of product functional
and structural information has been discussed, based on the feature graph-tree
model. In the model, a structural Graph-Tree has been constituted by assembly
feature as a basic unit. Furthermore, a notation system has been presented for
representation of the model. Based on the proposal feature mapping arithmetic,
the assembly model is been built easily. Mapping between functions and
structures has been realized easily and the instance of closed loop in
constrain resolve has been avoided successfully. Finally, the integration of
conceptual design and detail design has been well realized.
Keywords: Assembly model, Feature, reusable design, CAD
Title of the Paper: Alghorithm
for Map Color
DOWNLOAD
FULL PDF
Authors:
Marius-Constantin Popescu, Liliana Popescu, Nikos Mastorakis
Abstract: In this paper are followed the necessary steps for the realisation
of the map’s coloring, matter that stoud in the attention of many
mathematicians for a long time. It is debated the matter of the four colors,
but also the way of solving by implementing of an algorithm in the MAP-MAN
application. Also, it is tackled the maps drawing in real time within GPS
system satellites, using more colors depending on the covered route and the
landforms met.
Keywords: The issue of the fourth colors, The MAP-MAN application, Software
for GPS
Title of the Paper: Scoring
Functions of Approximation of STRIPS Planning by Linear Programming – Block
World Example
DOWNLOAD
FULL PDF
Authors:
Adam Galuszka
Abstract: STRIPS planning is a problem of finding of a set of actions that
transform given initial state to desired goal situation. It is hard
computational problem. In this work an approximation of STRIPS block world
planning by linear programming is shown. The cost of such approach is that
algorithm can results in non-interpretable solutions for some initial states
(what is followed by assumption P ? NP). This is because the discrete domain
(truth or false) is transformed to continuous domain (LP program).
Additionally two scoring functions have been introduced to estimate quality of
the plan. Proposed approach is illustrated by exemplary simulation.
Keywords: STRIPS planning, Block world, computational efficiency, linear
programming
Title of the Paper: Hierarchical
Clustering of Distributed Object-Oriented Software Systems: A Generic Solution
for Software-Hardware Mismatch Problem
DOWNLOAD
FULL PDF
Authors:
Amal Abd El-Raouf
Abstract: During the software lifecycle, the software structure is subject to
many changes in order to fulfill the customer’s requirements. In Distributed
Object Oriented systems, software engineers face many challenges to solve the
software-hardware mismatch problem in which the software structure does not
match the customer’s underlying hardware. A major design problem of Object
Oriented software systems is the efficient distribution of software classes
among the different nodes in the system while maintaining two features:
low-coupling and high software quality. In this paper, we present a new
methodology for efficiently restructuring Distributed Object Oriented software
systems to improve the overall system performance and to solve the
software-hardware mismatch problem. Our method has two main phases. In the
first phase, we use the hierarchical clustering method to restructure the
target software application. As a result, all the possible clustering
solutions that could be applied to the target software application are
generated. In the second phase, we decide on the best-fit clustering solution
according to the customer hardware organization.
Keywords: Software restructuring, hierarchical clustering, distributed
systems, object oriented software, performance analysis, low coupling
Title of the Paper: An
Evaluation Framework for Higher Education ERP Systems
DOWNLOAD
FULL PDF
Authors:
Gheorghe Sabau, Mihaela Munten, Ana-Ramona Bologa, Razvan Bologa, Traian
Surcel
Abstract: A Higher Education ERP system can be used as a solution to integrate
and increase the efficiency of the Romanian university processes. This paper
examines the application of ERP software in Romanian Universities. We made an
SWOT analysis for implementing an ERP system in Romanian Universities. Also,
we proposed a comparison framework of ERP solutions for higher education
management using as starting point the requirements of a Romanian University.
The framework was applied to four of the top Higher Education management
solutions. The process of evaluating an ERP system for use in higher education
requires that a university compare the existing ERP software available to
their current processes and see which ERP solution will best fit the existing
procedures.
Keywords: Higher Education, University Management, ERP Systems, Integration,
Quality Services, Evaluation Framework
Title of the Paper: Statistical
Methods and Applied Computing in Academic Educational Marketing
DOWNLOAD
FULL PDF
Authors:
Angela Repanovici, Bogdan Alexandrescu, Razvan Enoiu
Abstract: The mission of universities and staff is to generate knowledge
through scientific research. Their moral obligation to society who is paying
for these researches is to provide free access to the research results for
everyone, everywhere. Along with Open Access journals, the institutions needed
to create institutional repositories for storing the universities’ scientific
production. A marketing research is proposed, in form of an exploring,
stratified inquiry, which was conducted inside “Transilvania” University of
Brasov, regarding the attitude and behaviour of the academic community for the
creation of a digital, free access repository. Google Scholar is the
scientometric data base which can be consulted free of charge on the internet
and which indexes academic papers, identifying also the afferent citations.
The free Publish and Perish software can be used as an analysis instrument of
the impact of the researches by analysing the citations through the h index.
We present the exploratory study of Transilvania University of Brasov
regarding the impact and the visibility of the scientific researches.
Keywords: Statistical methods, institutional repositories, open access,
marketing research, h index, scientometric indicators
Title of the Paper: Power-Aware,
Depth-Optimum and Area Minimization Mapping of K-LUT Based FPGA Circuits
DOWNLOAD
FULL PDF
Authors:
Ion Bucur, Nicolae Cupcea, Adrian Surpateanu, Costin Stefanescu, Florin
Radulescu
Abstract: This paper introduces an efficient application intended for mapping
under complex criteria applied to K-LUT based FPGA implemented circuits. This
application is based on an algorithm that was developed taking into
consideration a significant design factor - power consumption. Power
consumption is considered in addition to other design factors that are
traditionally used. To increase performance, it was used a flexible mapping
tool based on exhaustive generation of all K-bounded sub-circuits rooted in
each node of the circuit. Achieved information about logic dissipated power
was obtained using an efficient dedicated simulator. In addition to lower
power consumption, we devised several effective mapping techniques designed
for reducing area and optimum depth.
Keywords: Power-aware, optimal area, K-LUT based FPGA, logic activity
simulator, functional power
Title of the Paper: Innovation:
Web 2.0, Online-Communities and Mobile Social Networking
DOWNLOAD
FULL PDF
Authors:
Cheng-Jung Lee, Chang-Chun Tsai, Shung-Ming Tang, Liang-Kai Wang
Abstract: Recently, an online social network phenomenon has swept over the Web
and the signs say that Social Networking Sites (SNS) are growing in importance
not just as places for individuals to communicate, network, and express
themselves but also as advertising and marketing vehicles. Combining social
networks to the mobile environment is a growing interest as it allows users to
be in their online social community despite their mobility. To date, several
surveys and studies have brought some insights into this field. However,
methods are often not general or detailed enough for evaluation and
comparison. In this study we highlight latest trends and evolution of Mobile
Social Networking and Online-Communities. The existing research is reviewed
and organized to summarize what we know about their usage. This paper
concludes with discussion of new developments, challenges and opportunities.
There are many opportunities for future research and organizational
applications of SNS as SNS adoption grows at incredible rates. What we present
in this study can be generalized for other enterprise-grade Social Networks,
either for their own business purposes or as a contract job for another
company.
Keywords: Mobile, Social Networking, Web 2.0, E-Communities, Social Networks,
Social Web
Issue
12, Volume 8, December 2009
Title of the Paper: Clustering
the Source Code
DOWNLOAD
FULL PDF
Authors:
Nadim Asif, Faisal Shahzad, Najia Saher, Waseem Nazar
Abstract: The systems are required to understand and present at higher levels
of abstractions to perform the changes and meet the current requirements. When
the changes are performed, the source code drifts away from the existing
available system documentation (specifications, design, manuals), which
represent the functionality of the software systems. The software systems are
developed using the multi-languages with different dialects and scripts. This
paper presents a clustering approach using the available source code,
documentation, experience and knowledge about the domain and application to
cluster the source code. The source code clustering is used for the purpose of
recovering the artifacts, understanding the system and identifying the
relationships among the source code to plan, design and execute the changes in
the software systems.
Keywords: Source Code Clustering, Source Code Analysis, Re-Engineering,
Reverse Engineering, Design Recovery, Program Understanding, Software
Maintenance, Clustering.
Title of the Paper: Research
of Replication Mechanism in P2P Network
DOWNLOAD
FULL PDF
Authors:
Dongming Huang, Zong Hu
Abstract: P2P network is a dynamic self-organization network, in which peer
can freely join or leave, so there will lost a lot of important data when some
important nodes fail, and there exists load imbalance of node in the P2P
network. These features are not good to the expansion of the P2P application,
so this paper introduce replicate mechanism, not only enhances the reliability
of the network, but also lets the network load balance, at the same time this
paper introduce synchronize mechanism to solve the problem of data update
consistency in the p2p network.
Keywords: P2P Network, Replication Mechanism, Load Transfer, Synchronize
Mechanism, Data Update Consistency, Load Balance, Reliability
Title of the Paper: A New
Recognition Method for Natural Images
DOWNLOAD
FULL PDF
Authors:
Weiren Shi, Zuojin Li, Xin Shi, Zhi Zhong
Abstract: Natural images recognition is an important area of machine vision.
This paper presents a novel approach for natural images recognition, based on
the non-Gaussian distribution property of natural images. In this new method
for recognition, first supervised classification is conducted to the natural
images based on their label value, then independent components linear
transforms are conducted to each category of samples, high-dimensional data
are transformed to irrelevant independent components, and finally the
probability distance between independent component subspaces is used for
unsupervised classification. This classification tree also shows some features
of signal processing of biological optic nerve. Experiment on ORL Face
Database identity recognition shows that this method is featuring high
recognition rate and low time consumption; meanwhile, another experiment is
conducted on direction determination of intelligent robots autonomous
navigation, also producing a good result.
Keywords: Natural image, independent component subspace, hierarchical
discriminant regression, recognition of face, robot navigation
Title of the Paper: The
Continuous Hopfield Networks (CHN) for the Placement of the Electronic
Circuits Problem
DOWNLOAD
FULL PDF
Authors:
M. Ettaouil, K. Elmoutaouakil, Y. Ghanou
Abstract: The Placement of the Electronic Circuits Problem (PECP) is
considered as one of the most difficult optimization problems. The PECP has
been expressed as a Quadratic Knapsack Problem (QKP) with linear constraints.
The goals of this work are to solve the Placement of the Electronic Circuits
Problem (PECP) using the Continuous Hopfield Networks (CHN) and to illustrate,
from a computational point of view, the advantages of CHN by its implement in
the PECP. The resolution of the QKP via the CHN is based on some energy or
Lyapunov function, which diminishes as the system develops until a local
minimum value is obtained. The Decomposition approach was used to solve the
PECP. This method suffers from problems of feasibility of solutions and long
training time. Unlike the decomposition approach, the CHN is much faster and
all the solutions are feasible. Finally, some computational experiments
solving the PECP are included.
Keywords: Placement of the Electronic Circuits Problem (PECP), Continuous
Hopfield Networks (CHN), Quadratic Knapsack Problem (QKP), combinatorial
problems, satisfaction of the PECP constraints
Title of the Paper: JEA
K-128: A Novel Encryption Algorithm Using VHDL
DOWNLOAD
FULL PDF
Authors:
Jamal N. Bani Salameh
Abstract: Data security is an important issue in computer networks and
cryptographic algorithms are essential parts in network security. In this
paper a new block- ciphering algorithm, JEA K-128 (for Jamal Encryption
Algorithm with a Key of length 128 bits) is described. JEA K-128 is a
symmetric block cipher suitable for hardware or software implementations. JEA
K-128 has a 64-bit word size, 4-rounds, and 128-bit is the length of the
secret key. New cryptographic features in our work include the use of many
successive XORing for the plaintext with sub-keys, and the use of multiple
multiplexers in sub-keys generator. The main goal of designing JEA K-128
algorithm is to reach the condition of having almost every bit of the
ciphertext depend on every bit of the plaintext and every bit of the key as
quickly as possible. Simulation study shows that JEA K-128 gives a strong
Avalanche effect, when there is a change in one bit of the plaintext or one
bit of the key; almost all bits in the ciphertext were changed. All codes for
our algorithm were captured by using VHDL, with structured description logic.
The reason for choosing VHDL is its suitability for hardware implementation.
The design principles of JEA K-128 are given together with results and
analyses to define the encryption algorithm precisely.
Keywords: Data encryption, block cipher, cryptography, key generator, VHDL
implementation
Title of the Paper: The
Modelling and Designing of E-Supervised (E-SUV) for Distance Learning Centre
DOWNLOAD
FULL PDF
Authors:
Salehuddin Shuib, Suhardi Hamid, H. S. Hanizan, Roshidi Din, Kamaruzaman
Jusoff
Abstract: E-services is a suite of web-based products brings profound changes
in business models and value chains especially for Professional and Continuing
Education Centre (PACE) environment due to its responsibility to manage all
courses provided by every faculty to private colleges. PACE is currently
running resourcefully but it is facing a few problems such as the difficulties
of each faculty officer to get information about private colleges, and a lack
of information management in private colleges itself. Therefore, the objective
of this study is to propose a model of e-service application called
E-Supervised (E-SUV) to provide the information related to twinning programmes
between Universiti Utara Malaysia (UUM) and private colleges by enabling users
to interact via portal by using the UML-based Web Engineering (UWE) approach.
This methodology includes four modeling activities which are requirement
analysis, conceptual model, navigation model and presentation model. This
research results in a web-based environment consisting of major modules such
as profiles, forums, and email service for users to utilize. In a nutshell,
UWE approach is a viable option to facilitate e-services in education
environment and thus could serve as a guideline model of future e-distance
learning centre. Rigorous tests to see how this model behaves under real-life
practice would be a way forward to identifying its effectiveness.
Keywords: E-Services, UML, UWE, PACE, UUM, E-SUV
Title of the Paper: A
Consistency Maintenance Project Independent Relationship of Distributed Data
Copy for Supply Chain Management
DOWNLOAD
FULL PDF
Authors:
Jui-Wen Hung
Abstract: With global transnational enterprise layout trend, data consistency
convergence study is a key of improving competitions and Bullwhip Effect
problem in Supply Chain. This paper proposed a specific ODMS dependent
replicas correctness maintenance engineering project. A resolution model
provides adaptive adjustability update routing policies in hierarchical
enterprise database. On the basis of real time updating process framework,
several models are built. Different value added update service schema was also
analyzed. A comprehensive update of the enterprise data that resident in
internal heterogeneity of supply chain knowledge base existed partially
dependency relationships with specified ODMS. With this paper on a
comprehensive update mechanism of the organization in both dependencies spread
copy of the data using flexibility and globally consistence maintenance
mechanisms to reach enterprise internal and external data consistency.
Keywords: Internet Data Base Original Source (IDBOS), Region Data Content
Proxy (RDCP), ODMS, portal Agent, global consistency, Supply Chain Management
Title of the Paper: The C
Compiler Generating a Source File in VHDL for a Dynamic Dataflow Machine being
Executed Direct into a Hardware
DOWNLOAD
FULL PDF
Authors:
Jorge Luiz E. Silva, Kelton A. P. Da Costa, Valentin Obac Roda
Abstract: In order to convert High Level Language (HLL) into hardware, a
Control Dataflow Graph (CDFG) is a fundamental element to be used. Related to
this, Dataflow Architecture, can be obtained directly from the CDFG. The
ChipCflow project is described as a system to convert HLL into a dynamic
dataflow graph to be executed in dynamic reconfigurable hardware, exploring
the dynamic reconfiguration. The ChipCflow consists of various parts: the
compiler to convert the C program into a dataflow graph; the operators and its
instances; the tagged-token; and the matching data. In this paper, a C
compiler to convert C into a dataflow graph and the graph implementation in
VHDL is described. Some results are presented in order to show a
proof-of-concept for the project.
Keywords: C Compiler, Dynamic Dataflow Architecture, Dynamic Reconfigurable
Hardware, Tagged-token, Matching-Data
Title of the Paper: Rotary-Code:
Efficient MDS Array Codes for RAID-6 Disk Arrays
DOWNLOAD
FULL PDF
Authors:
Yulin Wang, Guangjun Li
Abstract: Low encoding/decoding complexity is essential for practical RAID-6
storage systems. In this paper, we describe a new coding scheme, which we call
Rotary-code, for RAID-6 disk arrays. We construct Rotary-code based on a bit
matrix-vector product similar to the Reed-Solomon coding, and provide the
geometry encoding method and detailed non-recursive decoding algorithms. The
capability of two-disk fault-tolerance and the property of Maximum Distance
Separable (MDS) are proved in Rotary-code. The key novelty in Rotary-code is
that the Rotary-code has optimal encoding complexity and optimal decoding
complexity comparing with existing RAID-6 codes.
Keywords: Array code; MDS; RAID; Two-disk fault-tolerance; Efficient decoding;
Decoding complexity
|
|
|