|
|
Issue
1, Volume 9, January 2010
Title of the Paper: A New
Semantic Similarity Measuring Method Based on Web Search Engines
DOWNLOAD
FULL PDF
Authors:
Gang Lu, Peng Huang, Lijun He, Changyong Cu, Xiaobo Li
Abstract: Word semantic similarity measurement is a basic research area in the
fields of natural language processing, intelligent retrieval, document
clustering, document classification, automatic question answering, word sense
disambiguation, machine translation, etc.. To address the issues existing in
current approaches to word semantic similarity measurement, such as the low
term coverage and difficult update, a novel word semantic similarity
measurement method based on web search engines is proposed, which exploits the
information, including page count and snippets, in retrieved results to do
calculation. The proposed method can resolve the issues mentioned above due to
the huge volumes of information in the Web. The experimental results
demonstrate the effectiveness of the proposed methods.
Keywords: Web Search Engine, Semantic Similarity, Intelligent Retrieval, Word
semantics, WordNet
Title of the Paper: A
Dijkstra's Mobile Web Application Engine for Generating Integrated Light Rail
Transit Route
DOWNLOAD
FULL PDF
Authors:
A. M. Haziq Lim, N. S. Wan Sazli, B. Hussin, A. A. Azlianor, S. M. Suhaizan,
K. Massila
Abstract: In the capital city of Malaysia, Integrated Light Rail Transit (LRT)
System is one of the most importance public transportation as it connects some
key districts to historical, interesting places, business areas and shopping
malls are concentrated. The train services are running independently but have
interchanges to integrate from one different LRT lines to the others. These
interchanges could cause traveler a troublesome when they are choosing
incorrect destination station especially on different LRT lines which
contribute to time consuming and high costing. In previous research we are
implemented the mobile web application using rules based algorithm where the
destination-oriented routes need to be dynamically generated by determining
the nearest station according to the specific places. Currently, our research
is focusing on Dijkstra’s algorithms to provide more effective and intelligent
shortest path system to provide the solution for traveler to reach the desired
destination. In this paper, we discuss the results from our Dijkstra’s
application prototype.
Keywords: Mobile application, Shortest path, Dijkstra, Dynamic route map
Title of the Paper: Usability
User Testing of Selected Web-based GIS Applications
DOWNLOAD FULL PDF
Authors:
Jitka Komarkova, Martin Jedlicka, Miloslav Hub
Abstract: Web-based geographic information systems (WGIS) are focused on
end-users who have only a very limited knowledge of GIS, if any. For this
reason, WGIS applications have to be user-friendly. In the terms of a software
quality, WGIS applications have to be usable. Lately, many various usability
evaluation methods have been developed. Real users or their representatives
are included in some of them. Other methods are based only on GIS experts’
evaluation of applications. Advantage of deploying real users or at least
their representatives is clear – they are able to identify some usability
problems which could not be identified by experts. The problem is that
usability evaluation in a real situation done by real users is quite
difficult. Experimental user usability testing done by representatives of
users is the next possibility. In this case, artificial environment is
prepared in a laboratory and the whole experiment must be precisely conducted
and controlled. In all cases usability testing method must be precisely
proposed and/or adapted for the given situation and conditions. Aim of the
paper is to propose a suitable experimental method based on usability user
testing to identify the most serious usability problems of 14 equal WGIS
applications (all applications are run by the Czech Regional Authorities and
they are targeted at citizens and other end users). The proposed method is
qualitative, so its main aim is to identify the most serious usability
problems of the evaluated applications. The proposed method, results of
testing and identified problems are described in the end of the paper.
Keywords: Usability, User Testing, Web-based GIS
Title of the Paper: Coupling
Metrics for Business Process Modeling
DOWNLOAD
FULL PDF
Authors:
Wiem Khlif, Nahla Zaaboub, Hanene Ben-Abdallah
Abstract: Modeling business processes is vital when improving or automating
existing business processes, documenting processes properly or comparing
business processes. In addition, it is necessary to evaluate the quality of a
business process model through a set of quality metrics. One specific
categorie of such metrics is coupling which measures the functional and
informational dependencies between the tasks/processes in a business process
model. Our contribution in this paper consists in adapting object oriented
software coupling metrics for business process models. This adaptation is
based on correspondences we establish between concepts of the Business Process
Modeling Notation and object oriented concepts. The new adapted coupling
metrics offer more information about the dependencies among processes and
their tasks in terms of data and control. They can be used, for instances to
evaluate the transferability effects of errors occurring in a particular
task/process. Finally, we validate theoretically the proposed metrics.
Keywords: Coupling quality metrics, coupling measurement, quality metrics,
business process models
Title of the Paper: Measuring
the Efficiency of Cloud Computing for E-learning Systems
DOWNLOAD
FULL PDF
Authors:
Paul Pocatilu, Felician Alecu, Marius Vetrici
Abstract: As with rapid growth of the cloud computing architecture usage, more
and more industries move their focus from investing into processing power to
renting processing power from a specialized vendor. Education field is no
different. E-learning systems usually require many hardware and software
resources. There are numerous educational institutions that cannot afford such
investments, and cloud computing is the best solution for them. The
implementation of a cloud computing e-learning system has its peculiarities
and needs a specific approach. This paper measures the positive impact of
using cloud computing architectures upon e-learning solutions development. We
advance a set of cloud computing efficiency metrics for enhanced e-learning
implementation process control. Also, the long term overall efficiency of the
cloud computing usage in the field of e-learning system is evaluated.
Keywords: Cloud computing, E-learning, Mobile learning, Project management,
Paretto Principle
Title of the Paper: Structures
used in Secure Automatic Ticketing System
DOWNLOAD
FULL PDF
Authors:
Marius Popa, Cristian Toma
Abstract: The paper presents a solution for an automatic ticketing system and
some aspects regarding security assurance of this kind of system. Some
concepts and terms used in development of secure automatic ticketing system
are presented. It is depicted an architecture o secure automatic ticketing
system with its components and their roles in this architecture. Also, there
are highlighted technical details of the cards used in implementation of
secure automatic ticketing system.
Keywords: Ticketing System, Distributed Informatics System, Informatics
Security, Smart Card
Title of the Paper: Identity
based Threshold Cryptography and Blind Signatures for Electronic Voting
DOWNLOAD
FULL PDF
Authors:
Gina Gallegos-Garcia, Roberto Gomez-Cardenas, Gonzalo I. Duchen-Sanchez
Abstract: Recently, there has been an increasing interest to improve the
efficiency in election processes which has brought as a consequence a wide
range of proposals for electronic voting. Electronic voting protocols are a
reasonable alternative to conventional elections. Nevertheless, they are
facing an evolution due to its requirements, especially the ones needed to
provide full security considered to represent a democratic electronic vote. In
the literature, different protocols based on public key schemes have been
proposed to meet such security requirements. In this paper, we propose the use
of bilinear pairings in order to provide the security requirements that an
electronic voting protocol must meet, without requiring the entire
infrastructure needed in a public key scheme. Proposed protocol considers two
cryptographic primitives as main building blocks: threshold and blind
signature schemes. It is divided in four main stages: set-up, authentication,
voting and counting. Moreover, it meets privacy, accuracy and robustness by
using bilinear pairings. We make a comparative analysis, which is based on its
performance and the key pairs, Trust and Certification Authorities it
requires.
Keywords: Bilinear pairings, Blind signatures, Electronic voting protocols,
Identity based cryptography, Public key cryptography, Security requirements,
Threshold cryptography
Title of the Paper: A New
Immune Algorithm and its Application
DOWNLOAD
FULL PDF
Authors:
Guo Meng, Chen Qiuhong
Abstract: The traditional single clonal selection algorithm has a lot of
disadvantages, for example, it is easy to be trapped into local optima, and it
has a lot of massive redudacy iteration in its later period and inferior
global search ability and so on. In this paper, a new artificial immune
algorithm is proposed based on the clonal selection theory and the structure
of anti-idiotype(IAAI), which is improved as follows: firstly, IAAI constructs
a dynamic clonal expansion, secondly clonal mutation, thirdly dislocated line
clonal recombinant, lastly clonal selection. Through the above mentioned
several key steps, IAAI is improved in order to achieve the evolution of the
whole antibody population, then the new algorithm can have strong search
capabilities which make it reach better performance by perfoming global search
and local search in many directions in the solution space. Then the global
convergence of the new algorithm is analyzed from the test of several typical
complex functions. The result shows that the algorithm can effectively
overcome the premature problem, and improve the ability of global
optimization, the speed of convergence.
Keywords: Immune algorithm, clonal selection, dynamic clonal expansion, clonal
mutation, dynamic adjustment, anti-idiotype
Title of the Paper: Comparison
of Different Topologies for Island-Based Multi-Colony Ant Algorithms for the
Minimum Weight Vertex Cover Problem
DOWNLOAD
FULL PDF
Authors:
Raka Jovanovic, Milan Tuba, Dana Simian
Abstract: The aim of this paper is compare the effect of using different
topologies or connections between separate colonies in island based parallel
implementations of the Ant Colony Optimization applied to the Minimum Weight
Vertex Cover Problem. We investigated the sequential Ant Colony Optimization
algorithms applied to the Minimum Weight Vertex Cover Problem before.
Parallelization of population based algorithms using the island model is of
great importance because it often gives super linear increase in performance.
We observe the behavior of different parallel algorithms corresponding to
several topologies and communication rules like fully connected, replace
worst, ring and independent parallel runs. We also propose a variation of the
algorithm corresponding to the ring topology that maintains the diversity of
the search, but still moves to areas with better solutions and gives slightly
better results even on a single processor with threads.
Keywords: Ant colony optimization, Minimum weight vertex cover problem,
Parallel computing, Combinatorial optimization, Evolutionary computing
Title of the Paper: Research
on the Evaluation Methods of Bid of Construction Project Based on Improved BP
Neural Network
DOWNLOAD
FULL PDF
Authors:
Jie Yang, Hongjian Qu, Liang Zhou
Abstract: Bid and tender is the core stage in construction project, however,
many evaluation factors can be handled easily by qualitative analysis, which
is hard to avoid subjectivity. In this paper, a new evaluation index system is
proposed to use quantitative analysis in order to avoid error which is induced
by subjectivity, firstly. Secondly, an improved BP neural network is proposed
as an evaluation method. The results indicated that the process of evaluation
is simple and practical, and the accuracy can satisfy the actual requirement
based on this new evaluation index system and the improved BP neural network.
Keywords: Decision processes, construction project, BP neural network, Bid,
tender, evaluation index system
Issue
2, Volume 9, February 2010
Title of the Paper: Study
on the Dual Tender Offer Information Leakage: Based on Residual Error Ratio
Model
DOWNLOAD
FULL PDF
Authors:
Zhang Yi, Qu Hongjian, Qi Yuan, Xu Qifan
Abstract: Information leakage, generated inside trading and stock price
manipulation of listed corporations, has highlighted in the academic research,
and has also been terribly serious on basis of most conclusions. Therefore,
new academics significance will be back to the study on finding some more
effective means to solve these problems. While “dual tender offer” is a
characteristic feature of Chinese capital market as the transition of
market-oriented mergers and acquisitions, it has very important significance
for the study of “dual tender offer” information leakage. From the traditional
perspective of stock price abnormal fluctuation, this paper adopts a new
theoretical approach –“residual error ratio model” to test the stock price
performances before the first annoucement of “dual tender offer” information
and indicate the result that the method is convenient and practical, and can
also make up for the limitation that “temporary suspension system” discovers
abnormal fluctuation of share price.
Keywords: Information Leakage, Stock Price Abnormal Fluctuation, Residual
Error Ratio Model, Dual Tender Offer
Title of the Paper: Data
Mining Based on Rough Sets in Risk Decision-making: Foundation and Application
DOWNLOAD
FULL PDF
Authors:
Li Wanqing, Ma Lihua, Wei Dong
Abstract: In order to solve the problem of the redundant information to
distinguish in the risk decision-making, in this paper, the data mining
algorithms based on Rough Sets is studied. And we know the risk
decision-making is an important aspect in the management practice. In the risk
decision process of a project decision-making, it is necessary to use the
algorithm to discover valuable knowledge and make a right decision. In the
paper, a data mining method called Rough Sets is introduced in the field. And
the algorithmic process of data mining based on Rough Set is studied.
According to the Rough Sets theory, firstly, the factors set is established
including condition attribute and decision attribute. Secondly, experts
qualitatively describe risk factors and establish a decision database, called
decision table. Thirdly, the attribute reduction algorithm based on Rough Sets
is used to eliminate the redundant risk factor and its value of decision
table. Fourthly, the minimum decision rules are abstracted based on data
mining technology. Finally, the process of risk decision based on data mining
of Rough Sets is analyzed in a case study.
Keywords: Data mining, Rough Sets, minimum decision rule, attribute reduction,
risk decision, project decision-making
Title of the Paper: A New
Model for Solving Portfolio Selections Based on Fuzzy Goals of Investors
DOWNLOAD
FULL PDF
Authors:
Jie Yang, Hongjian Qu, Hejing Ge, Bai Xiaojuan
Abstract: Since the 1960s, lots of scholars had begun to research in the
portfolio selections based on the theory of mean-variance of Markowitz
portfolio and relevant methods. All of these studies are under certainly of
the assumption term, and then the researchers can get efficient set of
portfolio selection. However, alone with the finance environment increasing of
complexity, it is becoming more complex to build a model of portfolio
selection, which requires further inquiries on its part based on the fact. In
this paper, a new model of portfolio selection is proposed, and it is based on
the fuzzy goals between risk and return which is made up of subjective measure
factors. These factors can represent the investors’ subjective thinking, and
they are given before building the model of portfolio selection. Therefore,
this goal will not change with the change of the portfolio strategy. The
theory and empirical studies show that the new model is close to the practical
finance environment and it simplify the process of solving and be valuable.
Keywords: Markowitz Portfolio Selection Model, fuzzy goals, subjective measure
factors, subjective risk, subjective return
Title of the Paper: Social
Network Sites and Protection of Children: Regulatory Framework in Malaysia,
Spain and Australia
DOWNLOAD
FULL PDF
Authors:
Jawahitha Sarabdeen, Maria De-Miguel-Molina
Abstract: The open nature of the social network sites facilitates many
opportunities for children but also makes them vulnerable for abuses from
various parties. Obscenity, hate speech, and indecent contents that are not
suitable for children are very common in the social network sites. The
Malaysian, Spanish and Australian government regulate these contents as they
regulate the contents in other traditional mass media. For the purpose of
regulatory compliance most social networks do not allow children under 13-14
to access their services. However, the technology that controls this
restriction can easily be evaded and the service providers are still uncertain
how to label contents appropriate to child access. Both Governments and
corporations agree that control is insufficient and so companies embark on
self-regulation of themselves through Codes of Conduct. The objective of this
paper is to compare how far the regulation and self-regulation protect
children in social networks sites and what need to be done to improve the
effectiveness of regulation. The paper compares social networks in Malaysia,
Spain and Australia to find strengths and opportunities that could enrich
regulation of social networks in those countries.
Keywords: Online, protection, children, social network, regulation, data
privacy
Title of the Paper: A
Novel Meta Predictor Design for Hybrid Branch Prediction
DOWNLOAD
FULL PDF
Authors:
Young Jung Ahn, Dae Yon Hwang, Yong Suk Lee, Jin-Young Choi, Gyungho Lee
Abstract: Recent systems have been paved the way for being high-performance
due to the super-pipelining, dynamic scheduling and superscalar processor
technologies. The performance of the system is greatly affected by the
accuracy of the branch prediction because the overhead of each misprediction
has grown due to greater number of instructions per cycle and the deepened
pipeline. Hybrid branch prediction is usually used to increase the prediction
accuracy on such high-performance systems. Normally hybrid branch prediction
uses several branch predictors. A meta-predictor selects which branch
predictor should be used corresponding to the program context of the branch
instruction instance for the branch prediction. In this paper, we discuss
about the saturating counter within meta predictor. The design of the
saturating counter which selects a predictor that has high-prediction ratio
has brought out the high accuracy of the prediction for the branch predictor.
Keywords: Branch Prediction, Saturating Counter, Prediction Accuracy, Hybrid
Branch Predictor, Meta Predictor
Title of the Paper: Adding
Semantics to Software-as-a-Service and Cloud Computing
DOWNLOAD
FULL PDF
Authors:
Francisco Garcia-Sanchez, Eneko Fernandez-Breis, Rafael Valencia-Garcia,
Enrique Jimenez, Juan M. Gomez, Javier Torres-Nino, Daniel Martinez-Maqueda
Abstract: The Web is evolving from a mere repository of information to a new
platform for business transactions and information interchange. Large
organizations are increasingly exposing their Business Processes throughWeb
Services Technology for the large-scale development of software, as well as
for the sharing of their services within and outside the organization. New
paradigms for Software and Services Engineering such as the Software-asa-Service
(SaaS) and the cloud computing model promise to create new levels of
efficiency through large-scale sharing of functionality and computing
resources. However, there are few academic works in this area and many gaps
are still open. In this paper, we present a Business Process based on
Semantics platform where services are executed from a SaaS perspective. The
SITIO platform allows external developers to create add-on applications that
integrate into the main SITIO application and are hosted on Cloud Computing
infrastructure.
Keywords: Cloud Computing, Software-as-a-Service, Business Process Management,
Semantic Technology
Title of the Paper: Prostate
Cancer Prognosis Evaluation Assisted by Neural Networks
DOWNLOAD
FULL PDF
Authors:
Corina Botoca, Razvan Bardan, Mircea Botoca, Florin Alexa
Abstract: Neural networks (NN) are new promising tools that can assist the
clinicians in the diagnosis process and in therapy decision making, because
they can deal with a great number of parameters, learning from examples and
assessing any nonlinear relationships between inputs and outputs. In this
paper, the problem of prostate cancer evolution prediction is approached using
NN. The original database contained 650 records of patients, which underwent
radical prostatectomy for prostate cancer. The NN variables were the
parameters with the highest prognostic value selected and pre-processed from
the original database. Different NN architectures and NN parameters have been
tested in order to obtain the best complexity/accuracy ratio. The input data
were structured, according to the latest statistical and representation
concepts used in the current medical practice, aiming to improve the global
performance. Different experiments were done using the rough database and the
structured database. The NN performances were compared with the most widely
used prediction statistical method, the logistic regresion. All NN models
performed better than the logistic regression. The best obtained global
prediction of correct classification 96.94% is better than the results of
similar experiments available in literature. The NN prediction performance
might be improved, because, in our opinion, its limits are given by the
relatively small number of cases and the methods of collecting data.
Keywords: Neural networks, prostate cancer, prediction, capsule penetration
Title of the Paper: Using
Parallel Signal Processing in Real-Time Audio Matrix Systems
DOWNLOAD
FULL PDF
Authors:
Jiri Schimmel
Abstract: The paper deals with design and performance analysis of algorithms
that utilize parallel signal-processing methods and SIMD technology for
multiply-and-add algorithm for digital audio signal processing. This algorithm
is used for summing the gained input signals on output buses in applications
for distributing, mixing, effect-processing, and switching multi-format
digital audio signal in an audio signal network on desktop processors
platforms. The subjective evaluation of latency caused by principle of the
real-time digital audio processing is also studied in the paper Results of an
analysis of speed-up and real-time performance of several summing algorithms
are presented in the paper as well as subjective evaluation of the latency
depending on the audio buffer size.
Keywords: Parallel processing, Parallel algorithms, Audio systems,
Optimization methods, SIMD, Digital audio processing
Title of the Paper: Applications
of Virtual Reality for Visually Impaired People
DOWNLOAD
FULL PDF
Authors:
Torres-Gil, M. A., Casanova-Gonzalez, O., Gonzalez-Mora, J. L.
Abstract: This paper describes in detail the development and applications of a
Virtual Reality Simulator for Visually Impaired People. It makes an auditory
representation of the virtual environment, rendering the virtual world
entirely through the hearing. The simulator has these main purposes:
validation of auditory representation techniques, 3d sensor emulation for
environment recognition and hardware integration, training of visually
impaired users with these new auditory representation, and acoustic perception
experiments aimed to improve the auditory rendering. The interaction with the
simulator is made by a 3d tracking system to locate user’s head orientation
and position. This means the user interaction is as natural as possible, all
performed by just “walking through” the environment, and at the same time, the
user perceives the environment through acoustic information.
Keywords: Virtual reality, visually impaired, spatial sound, electromagnetic
position tracker
Title of the Paper: Automated
Quantitative Assessment of Perifollicular Vascularization Using Power Doppler
Ultrasound Images
DOWNLOAD
FULL PDF
Authors:
Boris Cigale, Smiljan Sinjur, Damjan Zazula
Abstract: In this paper a prototype of automated quantitative assessment of
perifollicular vascularisation is described. Assessment of perifollicular
vascularisation is important in the research, perfomed by medical team at the
Teaching Hospital of Maribor, if the application of hormonal therapy after
follicle puncture in natural cycles is really always needed. The proposed
algorithm works with 3D power Doppler ultrasound images and consists of
several steps. At the first step the position and shape of the dominant
follicle is determined. The procedure based on the continuous wavelet
transform is utilized. Then vessels contained in 5 mm thick layer around the
follicle are categorized according to their diameter. The vessel thickness at
certain point is defined as diameter of the largest sphere which includes
points and fits entirely inside vessels. The results are statistically
evaluated by the histograms of vessel diameters. To improve the visual results
the vessel reconstruction, based on minimal spanning trees, is done at the
end.
Keywords: 3D ultrasound image segmentation, vessel thickness assessment,
vessel reconstruction
Issue
3, Volume 9, March 2010
Title of the Paper: Feature
Selection of RAPD Haplotypes for Identifying Peach Palm (Bactris Gasipaes)
Landraces using SVM
DOWNLOAD
FULL PDF
Authors:
Jose Luis Vasquez, Javier Vasquez, Juan Carlos Briceno, Elena Castillo, Carlos
M. Travieso
Abstract: This present work presents a robust system for the feature
reduction, using Deoxyribonucleic Acid (DNA) primer. This system reaches up to
100% classes identification based on Support Vector Machines (SVM). In
particular, the biochemical parameterization has 89 Random Amplified
polymorphic DNA (RADP) primers of Pejibaye Palm races, and it has been reduced
to 10 RADP primers. The development of this application provides economic and
computational advantages. When it is reduced the number of primers, this
application reduces the economic cost, being a process so much cheaper, up to
11.24% from the initial process. On the other hand, the use of our supervised
classification system is faster in order to do a method of origin denomination
plant certification, due to reduce the dataset up to 11.24%.
Keywords: Dimensionality Reduction, feature selection, DNA analysis,
supervised classification, SVM, Artificial Neuronal Network, Cluster analysis
Title of the Paper: Traveling
Wave Solutions for the Generalized Burgers Equation and the (2+1) Dimensional
Dispersive Equation By (G'/G)-Expansion Method
DOWNLOAD
FULL PDF
Authors:
Qinghua Feng, Bin Zheng
Abstract: In this paper, we test the validity and reliability of the
(G'/G)-expansion method by applying it to get the exact travelling wave
solutions of the generalized Burgers equation and the (2+1) dimensional
dispersive equation. The traveling wave solutions are obtained in three forms.
Being concise and less restrictive, the method can also be applied to many
other nonlinear partial differential equations.
Keywords: (G'/G )-expansion method, Traveling wave solutions, generalized
Burgers equation, (2+1) dimensional dispersive equation, exact solution,
evolution equation, nonlinear equation
Title of the Paper: Traveling
Wave Solutions for Three Non-linear Equations By (G'/G)-Expansion Method
DOWNLOAD
FULL PDF
Authors:
Qinghua Feng, Bin Zheng
Abstract: In this paper, we will try to obtain the new exact solutions of the
DSSH equation, the KP-BBM equation and the (3+1) dimensional potential-YTSF
equation. The three nonlinear equations are reduced to nonlinear ordinary
differential equations (ODE) by using a simple transformation respectively.
Then we construct the traveling wave solutions of the equations in terms of
the hyperbolic functions, trigonometric functions and the rational functions
by the (G'/G )-expansion method.
Keywords: (G'/G )-expansion method, Traveling wave solutions, DSSH equation,
KP-BBM equation, (3+1) dimensional potential-YTSF equation, exact solution,
evolution equation, nonlinear equation
Title of the Paper: Integrating
Weighted LCS and SVM for 3D Handwriting Recognition on Handheld Devices using
Accelerometers
DOWNLOAD
FULL PDF
Authors:
Wang-Hsin Hsu, Yi-Yuan Chiang, Jung-Shyr Wu
Abstract: Based on accelerometer, we propose a 3D handwriting recognition
system in this paper. The system is consists of 4 main parts: (1) data
collection: a single tri-axis accelerometer is mounted on a handheld device to
collect different handwriting data. A set of key patterns have to be written
using the handheld device several times for consequential processing and
training. (2) data preprocessing: time series are mapped into eight octant of
three-dimensional Euclidean coordinate system. (3) data training: weighted LCS
and SVM are combined to perform the classification task. (4) pattern
recognition: using the trained SVM model to carry out the prediction task. To
evaluate the performance of our handwriting recognition model, we choose the
experiment of recognizing a set of English words. The accuracy of
classification could be achieved at about 96.85%.
Keywords: Accelerometer, gesture recognition, handwriting recognition, LCS,
SVM
Title of the Paper: The
Use of Radon Transform in Handwritten Arabic (Indian) Numerals Recognition
DOWNLOAD
FULL PDF
Authors:
Sabri A. Mahmoud, Marwan H. Abu-Amara
Abstract: This paper describes a technique for the recognition of off-line
handwritten Arabic (Indian) numerals using Radon and Fourier Transforms.
Radon-Fourier-based features are used to represent Arabic digits. Nearest Mean
Classifier (NMC), K-Nearest Neighbor Classifier (K-NNC), and Hidden Markov
Models Classifier (HMMC) are used. Analysis using different number of
projections, varying the number of Radonbased features, and the number of
samples used in the training and testing of this technique is presented using
the NMC and K-NNC. A database of 44 writers with 48 samples per digit each
totaling 21120 samples are used for training and testing of this technique.
The training and testing of the HMMC is different than that of the NMC and
KNNC in its internal working and in the way data is presented to the
classifier. Since the digits have equal probability the randomization of the
digits is necessary in the training of the HMMC. 80% of the data was used in
training and the remaining 20% in testing of the HMMC. Radon-based features
are extracted from Arabic numerals and used in training and testing of the
HMM. In this work we didn’t follow the general trend, in HMMC, of using
sliding windows in the direction of the writing line to generate features.
Instead we generated features based on the digit as a unit. Several
experiments were conducted for estimating the suitable number of states for
the HMM. In addition, we experimented with different number of observations
per digit. The Radon-Fourier-based features proved to be simple and effective.
The classification errors were analyzed. The majority of errors were due to
the misclassification of digit 7 with 8 and vice versa. Hence, a second
Structural Classifier is used in a cascaded (second) stage for the NMC, K-NNC,
and HMMC. This stage, which is based on the structural attributes of the
digits, enhanced the average overall recognition rate from 3.1% to 4.05%
(Recognition rates of 98.66%, 98.33%, 97.1% for NMC, K-NNC, HMMC,
respectively).
Keywords: Arabic numeral recognition, OCR, Hidden Markov Models, Handwritten
Digit recognition, Nearest neighbor classifier
Title of the Paper: WxShapeFramework:
An Easy Way for Diagrams Manipulation in C++ Applications
DOWNLOAD
FULL PDF
Authors:
Michal Bliznak, Tomas Dulik, Vladimir Vasek
Abstract: wxShapeFramework is new cross-platform software library written in
C++ programming language which is suitable for creation of software
applications manipulating diagrams, images and other graphical objects. Thanks
to the underlying technologies such as wxWidgets toolkit and its XML-based
persistent data container add-on called wxXmlSerializer it is an ideal
solution for rapid and easy cross-platform visualisation software development.
The paper reveals how the wxSF allows user to easily create applications able
to interactively handle various scenes consisting of pre-defined or
user-defined graphic objects (both vector- and bitmap-based) or GUI controls,
store them to XML files, export them to bitmap images, print them etc.
Moreover, thanks to applied software licence the library can be used for both
open-source and commercial projects on all main target platforms including MS
Windows, MacOS and Linux.
Keywords: Diagram, vector, bitmap, GUI, wxWidgets, wxXmlSerializer,
wxShapeFramework, wxSF, C++
Title of the Paper: Interactive
Compression of Books
DOWNLOAD
FULL PDF
Authors:
Bruno Carpentieri
Abstract: In this paper we study interactive data compression and present
experimental results on the interactive compression of textual data (books or
electronic newspapers) in Italian or English language. The main intuition is
that when we have already compressed a large number of similar texts in the
past, then we can use this previous knowledge of the emitting source to
increase the compression of the current text and we can design algorithms that
efficiently compress and decompress given this previous knowledge. By doing
this in the fundamental source coding theorem we substitute entropy with
conditional entropy and we have a new theoretical limit that allows for better
compression. Moreover, if we assume the possibility of interaction between the
compressor and the decompressor then we can exploit the previous knowledge
they have of the source. The price we pay is a very low possibility of
communication errors.
Keywords: Data Compression, Interaction, Dictionary based compression,
Fingerprinting
Title of the Paper: CROVALLEX
Lexicon Improvements: Subcategorization and Semantic Constraints
DOWNLOAD
FULL PDF
Authors:
Nives Mikelic Preradovic
Abstract: The paper describes the Croatian valence verb lexicon (CROVALLEX)
that contains information on syntactic subcategorization and semantic
restrictions of 1739 most frequent Croatian verbs. These 1739 verbs are
associated with 5118 valence frames and enriched with 72 broad semantic
classes with two further levels of subdivision (173 classes in total). The
evaluation shows that syntacto-semantic verb classification helps in capturing
the relation between the syntax and semantics of Croatian verbs and therefore
reduces the redundancy in the lexicon. Unfortunately, classes in the current
version of CROVALLEX do not provide a means for full inference of the verb
semantics on the basis of its syntactic behavior. Therefore, in the improved
version we plan to introduce the more distinctive semantic roles. In the
improved version of CROVALLEX the semantic typing will be based on EuroWordNet
Top Ontology. We believe that with such improvements we can solve the problem
of sense differentiability and get a finer grained semantic classification of
verbs in Croatian language.
Keywords: Croatian verb valence lexicon, Valence frames, Syntacto-semantic
classes, Verb synsets
Title of the Paper: Enhancing
Enterprise Service Bus Capability for Load Balancing
DOWNLOAD
FULL PDF
Authors:
Aimrudee Jongtaveesataporn, Shingo Takada
Abstract: ESB is a core middleware technology which can support the
integration of services according to the Service Oriented Architecture. A
major responsibility of ESB is to route messages to heterogeneous services.
However, conventional ESBs support only static routing, i.e. the service to
which a message is sent must be fixed a priori. Thus, even if there are many
services that can satisfy the same request, the request is always sent to the
same service without considering the service status, e.g., load, at that time.
This situation may lead to a low throughput performance on the service side
and low satisfaction on the consumer side. This paper aims to enhance the ESB
capability by supporting load balancing. Our approach focuses on balancing
among a group of different services with the same function. We introduce the
concept of service type and show the results of an experiment.
Keywords: ESB, Middleware Message Balancing, Web Services, Load Balancing, SOA
Title of the Paper: Implementing
Time Series Identification Methodology Using Wireless Sensor Networks
DOWNLOAD FULL PDF
Authors:
Daniel-Ioan Curiac, Ovidiu Banias, Constantin Volosencu
Abstract: Wireless sensor networks being a collection of numerous sensor
nodes, each with sensing (temperature, humidity, sound level, light intensity,
magnetism, etc.) and wireless communication capabilities, provide huge
opportunities for monitoring and mathematical modeling of the time-evolution
of the physical quantities under investigation. Starting from the measurements
collected by the sensor nodes inside an investigated spatial distributed
system, this paper offers an efficient methodology to identify time series.
Keywords: Time series, system identification, sensor networks, interpolation
Issue
4, Volume 9, April 2010
Title of the Paper: Synchronized
Alternating Turing Machines on Four-Dimensional Input Tapes
DOWNLOAD
FULL PDF
Authors:
Makoto Sakamoto, Tomoya Matsukawa, Ryoju Katamune, Hiroshi Furutani, Michio
Kono, Satoshi Ikeda, Takao Ito, Yasuo Uchida, Tsunehiro Yoshinaga
Abstract: Synchronized alternating machine is an alternating machine with a
special subset of internal states called synchronizing states. This paper
introduces a four-dimensional synchronized alternating Turing machine
(4-SATM), and investigates fundamental properties of 4-SATM’s. The main topics
of this paper are: (1) a relationship between the accepting powers of 4-SATM’s
and four-dimensional alternating Turing machines with small space bounds, (2)
a relationship between the accepting powers of seven-way and eight-way
4-SATM’s, (3) a relationship between the accepting powers of 4-SATM’s and
four-dimensional nondeterministic Turing machines. In this paper, we let each
sidelength of each input tape of these automata be equivalent in order to
increase the theoretical interest.
Keywords: Alternation, computational complexity, configuration,
four-dimensional Turing machine, synchronization
Title of the Paper: Hardware
Hierarchies and Recognizabilities of Four-Dimensional Synchronized Alternating
Turing Machines
DOWNLOAD
FULL PDF
Authors:
Makoto Sakamoto, Ryoju Katamune, Tomoya Matsukawa, Hiroshi Furutani, Michio
Kono, Satoshi Ikeda, Takao Ito, Yasuo Uchida, Tsunehiro Yoshinaga
Abstract: The recent advances in computer animation, motion image processing,
robotics and so on prompted us to analyze computational complexity of
four-dimensional pattern processing. Thus, the research of four-dimensional
automata as a computational model of four-dimensional pattern processing has
also been meaningful. From this viewpoint, we introduced a four-dimensional
alternating Turing machine (4-ATM) operating in parallel. In this paper, we
continue the investigations about 4-ATM’s, deal with a four-dimensional
synchronized alternating Turing machine (4-SATM), and investigate some
properties of 4-SATM’s which each sidelength of each input tape is equivalent.
The main topics of this paper are: (1) hierarchies based on the number of
processes of 4-SATM’s, and (2) recognizability of connected pictures by
4-SATM’s.
Keywords: Alternation, four-dimensional Turing machine, hierarchy,
recognizability, synchronization
Title of the Paper: Novel
Models for Multi-Agent Negotiation based Semantic Web Service Composition
DOWNLOAD
FULL PDF
Authors:
Sandeep Kumar, Nikos E. Mastorakis
Abstract: Multi-agent based semantic web service composition involves the
composition of semantic web services considering each of the agent capability
to serve a particular service request. This paper presents the two variations
of semantic web service composition process based on the timing of negotiation
in composition process. The variations are based on the concept that the
negotiation between the service requester and the service providers has been
performed before the selection of final service provider or after the final
service provider has been selected. Further, based upon one of the model, a
novel multi-agent based semantic web service composition approach has been
presented.
Keywords: Agent, composition, negotiation, semantic web
Title of the Paper: A
Scheme for Salt and Pepper Noise Reduction and its Application for OCR Systems
DOWNLOAD
FULL PDF
Authors:
Nucharee Premchaiswadi, Sukanya Yimgnagm, Wichian Premchaiswadi
Abstract: This paper presents an algorithm for Salt and Pepper noise reduction
which can be applied to binary, gray scale, and color formatted documents. The
scheme combines the characteristics of the Applied kFill Algorithm and Median
Filter Algorithm by using window sizes of 3x3 and 5x5, depending on the size
of the Salt and Pepper noise. The goal of this technique is to increase the
PSNR of picture images and improve the quality for scanning documents when
using an optical character recognition (OCR) system. The experimental results
show that the proposed scheme can remove Salt and Pepper noise better than the
Applied kFill Algorithm and Median Filter Algorithm and can significantly
improve the recognition accuracy of an optical character recognition (OCR)
system.
Keywords: Applied kFill, kFill Algorithm, Image Processing, Median Filter,
Noise Reduction, OCR systems, Salt and Pepper Noise
Title of the Paper: Improving
Performance in Adaptive Fault Tolerance Structure with Investigating the
Effect of the Number of Replication
DOWNLOAD
FULL PDF
Authors:
Negar Mosharraf, Mohammad Reza Khayyambashi
Abstract: Regarding the wide use of distributed systems in various areas,
having a system with fault tolerance ability would be an import
characteristic. And in designing the real time distributed systems, this seems
to be more considerable. With regard using some middleware like CORBA in
designing such systems, and in order to increase their compatibility, speed,
performance, to simplify the network programs and other characteristics there
is no supporting program to have distributed real time system and fault
tolerance at the same time. In fact, adaptive means taking into account the
properties of both structures so that the requirements of these two structures
are met during performance and this is usually created by a trade off between
specifications of both real time and fault tolerance systems. In this study,
the FT-CORBA structure as a structure used for supporting fault tolerance
programs as well as relative important parameters including replication style
and number of replica, which play further role in improved performance and
make it adaptive to real time distributed system have been reviewed. Studying
these specifications a structure adaptive to real time systems with higher
performance than FT-CORBA structure have been made and, finally, the
implementation of the said structure and determination of the number of
replica and the objects replication style as well as the significance of
related parameters have been investigated.
Keywords: Middleware, Fault Tolerant, Trade-offs, Replication, Real time
Title of the Paper: Use
of GA based Approach for Engineering Design through WWW
DOWNLOAD
FULL PDF
Authors:
Shu-Tan Hsieh
Abstract: Today’s industrial environment requires engineering design to be
achieved by geographically distributed engineering teams who may work on
different computer platforms, so the analogy can be presented as the
distributed constraint optimization problems. This paper presents an agile
approach that carries out a concurrent optimization of a product design and
its associate constraint satisfaction in manufacturing perspective. Also, the
approach has been implemented through the World Wide Web (WWW) regardless of
the geographical constraints and different platforms used. In this paper, the
hybrid evolution computation (EC) approaches combing genetic algorithm and
stochastic annealing algorithms are applied to find optimal or near optimal
solutions for two engineering design cases. The main contribution of this
paper is to provide an agile approach for solving the engineering design
problem which is modeled by the nonlinear programming model, and the approach
is implemented through the WWW regardless of the geographical constraints and
different platforms used. Experimental results are presented to exhibit the
superior performance of the proposed methodology.
Keywords: Evolutionary computation, genetic algorithm, stochastic annealing,
nonlinear programming, world wide web
Title of the Paper: A
Study of Computer and Information Course Curricula for the General Education
in Taiwan University
DOWNLOAD
FULL PDF
Authors:
Lung-Hsing Kuo
Abstract: The contemporary university education should not only be able to
help students develop the professional knowledge or skills, but need to
consider how it can really be for the country, develop a rational thinking,
human literacy, and social care professionals. The study focused on the
numbers and social network analysis of "Computer and Information Course" for
general education curriculum, in order to understand the current Taiwan higher
education institutions. In this study we use university school curriculum
resource network (http://ucourse.tvc.ntnu.edu.tw/) to obtain sample resources
and use, and the software UCINET6.198 to analyze the social network variables
to define the network position.
Keywords: Social network, Computer and Information Course, General Education,
UCINET
Title of the Paper: Rethinking
Database Updates using a Multiple Assignment-based Approach
DOWNLOAD
FULL PDF
Authors:
Elizabeth Hudnott, Jane Sinclair, Hugh Darwen
Abstract: We investigate the problems involved in efficient implementation of
multiple assignment to database tables, as suggested by Date and Darwen in
their Third Manifesto proposal for future database systems [10]. We explain
the connection between assignment and the insert, delete and update operations
and why multiple assignments executed simultaneously are preferable to
deferred constraint checking. Our contributions are twofold. Firstly, we
enable the user to specify updates either in terms of the changes needed to
the existing state or as the final table contents directly, with no
degradation in performance. Secondly, when multiple tables are updated SQL
places the responsibility on the user to order the update statements
correctly. Integrity constraints must either be preserved in the unnecessary
intermediate states or else deferred. Multiple assignment accepts updates
across the entire database simultaneously and makes the system responsible for
scheduling them correctly. We present methods for a proposed implementation
that can potentially exceed the performance of SQL DBMSs by employing
parallelism and multi-query optimization.
Keywords: Constraints, Multiple assignment, Multi-query optimization, Parallel
updates, Query independence, Simultaneous assignment
Title of the Paper: Integrating
Machine Learning in Intelligent Bioinformatics
DOWNLOAD
FULL PDF
Authors:
Aboubekeur Hamdi-Cherif
Abstract: Machine learning is the adaptive process that makes computers
improve from experience, by example, and by analogy. Learning capabilities are
essential for automatically enhancing the performance of a computational
system over time on the basis of previous history. Bioinformatics is the
interdisciplinary science of interpreting biological data using information
technology and computer science. The field of bioinformatics main objective is
to develop relevant computational systems for biological purposes. In this
paper, we study how machine learning can help in developing better
bioinformatics methods and tools in a coherent manner. We attempt to integrate
the multitude of existing methods and tools in a unifying framework as a
prelude to showing how machine learning can uncover even more useful
structures hidden in biological sequences.
Keywords: Intelligent Bioinformatics, Machine learning, Soft computing, Data
mining, Grammatical inference
Issue
5, Volume 9, May 2010
Title of the Paper: TAR
Based Shape Features in Unconstrained Handwritten Digit Recognition
DOWNLOAD
FULL PDF
Authors:
P. Ahamed, Yousef Al-Ohali
Abstract: In this research, the recognition accuracy of triangle-area
representation (TAR) based shape feature is measured in recognizing the
totally unconstrained handwritten digits. The TAR features for different
triangles of variable side lengths that are formed by taking the combinations
of different contour points were computed. The set of contour points that
yielded the best features was experimentally discovered. For classification a
curve matching technique is used. Several experiments were conducted on
real-life sample data that was collected from postal zip codes written by mail
writers. The highest recognition result of 98.5 % was achieved on the training
data set and 98.3% on the test data set.
Keywords: Triangle area representation, Shape descriptors, Digit recognition,
Contour points, and zip codes
Title of the Paper: A
Dynamic Dataflow Architecture using Partial Reconfigurable Hardware as an
Option for Multiple Cores
DOWNLOAD
FULL PDF
Authors:
Jorge Luiz E. Silva, Joelmir Jose Lopes
Abstract: Different from traditional processors, Moore/s Law was one of the
reasons to duplicate cores, and at least until today it is the solution for
safe consumption and operation of systems using millions of transistors. In
terms of software, parallelism will be a tendency over the coming years. One
of the challenges is to create tools for programmers who use HLL (High Level
Language) producing hardware directly. These tools should use the utmost
experience of the programmers and the flexibility of FPGA (Field Programmable
Gate Array). The main aspect of the existing tools which directly convert HLL
into hardware is dependence graphics. On the other hand, a dynamic dataflow
architecture has implicit parallelism. ChipCflow is a tool to convert C
directly into hardware that uses FPGA as a partial reconfiguration based on a
dynamic dataflow architecture. In this paper, the relation between traditional
dataflow architecture and contemporary architecture, as well as the main
characteristics of the ChipCflow project will be presented.
Keywords: Dataflow Architecture; Reconfigurable Hardware; Tagged-token;
Run-time Reconfiguration; Protocol for dataflow
Title of the Paper: Fault-Tolerant
Meshes and Tori Embedded in a Faulty Supercube
DOWNLOAD
FULL PDF
Authors:
Jen-Chih Lin, Shih-Jung Wu, Huan-Chao Keh, Lu Wang
Abstract: Hypercubes, meshes, and tori are well known interconnection networks
for parallel computing. The Supercube network is a generalization of the
hypercube. The main advantage of this network is that it has the same
connectivity and diameter as that of the hypercube without the constraint that
the number of nodes be a power of 2. This paper proposes novel algorithms of
fault-tolerant meshes and tori embedded in supercubes with node failures. The
main results obtained (1) a replacing sequence of a supercube is including
approximate to (2logN????+1) nodes. Therefore, there are O() faults, which can
be tolerated. (2) The result implies that optimal simulation of mesh and torus
in a faulty supercube for balancing the processor and communication link loads
at present. According to the result, we can easily port the parallel or
distributed algorithms developed for these structures to the supercubes.
Therefore, these methods of reconfiguring enable extremely high-speed parallel
computation.
Keywords: Fault-tolerant, mesh, tori, graph embedding, supercube
Title of the Paper: A
Novel Object Detection Approach Based on the Boundary Shape Information from
High Resolution Satellite Imagery
DOWNLOAD
FULL PDF
Authors:
Xiaoshu Si, Xuemin Hu, Hong Zheng
Abstract: This paper presents a novel approach of detecting special objects
from high resolution satellite imagery. In this approach, a bilateral
filtering is used to denoise firstly, and a new morphological approach which
combines gray scale morphological processing and binary morphological
processing is proposed for ROI extraction and feature enhancement. A detection
operator based on the boundary shape information (BSI) is developed to detect
enhanced objects. The experiments on images from Google Earth are discussed in
the paper. The experimental results show that proposed approach is effective
and feasible. Compared with other object detection approaches from high
resolution satellite imagery such as PCA or MSNN, the proposed approach has
better detection performance.
Keywords: BSI, Detection template, Object detection, Vehicle, Aircraft, High
resolution satellite imagery
Title of the Paper: On-line
Content-Based Image Retrieval System using Joint Querying and Relevance
Feedback Scheme
DOWNLOAD
FULL PDF
Authors:
Wichian Premchaiswadi, Anucha Tungkatsathan
Abstract: In a high-level semantic retrieval process, we utilize the search
engine to retrieve a large number of images using a given text-based query. In
a low-level image retrieval process, the system provides a similar image
search function for the user to update the input query for image similarity
characterization. This paper presents an On-line Content-Based Image Retrieval
System using joint querying and relevance feedback scheme based on both
high-level and low-level features. We also introduce fast and efficient color
feature extraction namely auto color correlogram and correlation (ACCC) based
on color correlogram (CC) and autocorrelogram (AC) algorithms, for extracting
and indexing low-level features of images. To incorporate an image analysis
algorithm into the text-based image search engines without degrading their
response time, the framework of multi-threaded processing is proposed. The
experimental evaluations based on coverage ratio measure show that our scheme
significantly improves the retrieval performance of existing image search
engine.
Keywords: Joint querying, image retrieval, ACCC, on-line CBIR, CBIR, relevance
feedback
Title of the Paper: Investigating
Better Multi-layer Perceptrons for the Task of Classification
DOWNLOAD
FULL PDF
Authors:
Hyontai Sug
Abstract: The task of deciding proper sample sizes for multi-layer perceptrons
tends to be arbitrary so that, depending on sample data sets, the performance
of trained multi-layer perceptrons has a tendency of some fluctuation. As
sample size grows, multi-layer perceptrons have the property that performance
in prediction accuracy becomes better slowly with some fluctuation. In order
to exploit this property this paper suggests a progressive and repeated
sampling technique for better multi-layer perceptrons to cope with the
fluctuation of prediction accuracy that depend on samples as well as the size
of samples. Experiments with six different data sets in UCI machine learning
repository showed very good results.
Keywords: Multi-layer perceptrons, neural networks, data mining,
classification
Title of the Paper: A
Robust Watermarking Technique for Copyright Protection Using Discrete Wavelet
Transform
DOWNLOAD
FULL PDF
Authors:
Wen-Tzeng Huang, Sun-Yen Tan, Yuan-Jen Chang, Chin-Hsing Chen
Abstract: The arrival of digital world coming soon, the digital media content
can be easily altered, duplicated, and spread, which causes the copyright of
media are violated. Therefore, attention is to discuss the protection of the
intellectual property (IP) rights of digital media. Then, the digital
watermarking can be a simple and effective approach to provide copyright
protection of IP. In this study, a method of robustness and blind extraction
watermark for static images is proposed. It utilizes discrete wavelet
transform and applies three coding methods according to the different
characteristics of band coefficients: lattice code based on the communication
principle, modification of insignificant coefficients based on the
just-noticeable distortion of the human visual model, and quantization index
modulation based on singular value decomposition. Together, these methods
embed a watermark while maintaining image fidelity. From our experimental
results in this study, all of them can indicate that the proposed approach is
high robust against frequency-based and time domain geometric attacks.
Additionally, since our approach produces a blind watermark and thus neither
the original image nor any of its related information is needed, it is a very
convenient and practical watermarking technique for applications.
Keywords: Digital watermark, Discrete wavelet transform, Copyright protection,
Blind watermark, Watermark Extraction procedure
Title of the Paper: Ground
Penetrating Radar Slice Reconstruction for Embedded Object in Media with
Target Follow
DOWNLOAD
FULL PDF
Authors:
Qeethara Kadhim Al-Shayea, Itedal S. H. Bahia
Abstract: The detection of embedded object from ground penetrating radar GPR
imagery is our goal. The GPR image is a cross sectional slices. The embedded
objects are metal and/or plastic type. In many fields demand for visualizing
objects scanned as cross sectional slices is growing. This research has many
real world applications, such as robotic environments, medicine, remote
sensing, inspection of industrial parts and geology. An even better way is to
visualize the underground object by reconstruction a three-dimensional model
of those objects from the slices. Objects here are stable underground while,
camera is moving. The task of object track in a cross sectional slices
consists of two parts: first gather information on changes between succeeding
slices (object detection), and second process this information appropriately
to obtain the track of an object. If the object is like cable or pipe. The
proposed method starts with two dimensional 2D image preprocessing for each
slice. The preprocessing involves multispectral to gray conversion, contrast
enhancement, segmenting, thresholding and denoising to modify each 2D image
slice individually. Preprocessing algorithms involved in this paper are chosen
appropriately to have image without noise, with object detected and with
object eliminated. After a preprocessing step the proposed algorithm for
object detection starts with objects contour finding in each slice, 2D objects
transparency and transformation. The last step is the proposed interpolation
technique to build the successive slices until the spaces is filled to find
out the embedded object.
Keywords: Object Detection, Object Recognition, Ground Penetrating Radar
(GPR), Volume Reconstruction, Interpolation, Image Processing, Target Follow
Title of the Paper: A
Knowledge-Based System for Knowledge Management Capability Assessment Model
Evaluation
DOWNLOAD
FULL PDF
Authors:
Javier Andrade, Juan Ares, Rafael Garcia, Santiago Rodriguez, Sonia Suarez
Abstract: It is now commonly accepted that high quality knowledge management
programmes lead to competitive advantages for the organizations. Several
knowledge management maturity models have been proposed with the aim of
evaluating the quality of knowledge management programmes in organizations.
These models are classified into two large groups: CMM-based models and models
that are not CMM-related. One of the best known CMM-based models is the
Knowledge Management Capability Assessment (KMCA) model. Even so, the
acquisition of a knowledge management level may imply a considerable amount of
audits. It is therefore very interesting to minimise the costs by paying only
for the truly indispensable audits. This article proposes a Knowledge-Based
System that makes it possible to evaluate an organization at a KMCA maturity
level. It limits the services of an auditor to those cases in which the
system’s response complies with the requested knowledge management maturity
level. This clearly implies an important cost reduction for audits with
negative results. The design of this system is based on the CommonKADS
methodology, and its implementation was carried out with the Clips tool.
Keywords: Audit, Clips, CommonKADS, Knowledge-Based System, Knowledge
Management, Maturity Model
Title of the Paper: A
Sweeping Fingerprint Verification System using the Template Matching Method
DOWNLOAD
FULL PDF
Authors:
Sun-Yen Tan, Wen-Tzeng Huang, Chin-Hsing Chen, Yuan-Jen Chang
Abstract: Electronic products have adopted the technology of the fingerprint
recognition system to offer protection mechanism. The characteristics of
Line-Sensor are smaller size, lower power consumption, and lower cost.
Therefore, it is suitable for designing fingerprint sensor in embedded
systems. Generally, a Line-Sensor builds up a completed picture through
assembling the image segments received after one sweeping the fingerprint.
However, sometimes, the sweeping rate is unstable and the pressing strength is
varied. To avoid such problems influencing the final results, the Fast
Normalized Cross Correlation (FastNCC) algorithm is employed here to process
and correct the image data. Moreover, the Group Delay Spectrum (GDS) and
Dynamic Programming (DP) are implemented to complete fingerprint comparisons.
Two different fingerprint matching algorithms are to exploit and demonstrate
the verification rate of the system. FastNCC results in 93.8% of the
verification rate, while SSD obtains 92.5% of the verification rate.
Keywords: Line-Sensor, Normalized Cross Correlation, Template matching, GDS,
DP matching, Threshold
Title of the Paper: Providing
Flexibility in the Vehicle Route Optimization for the AVL based Transport
Monitoring System
DOWNLOAD
FULL PDF
Authors:
S. Masrom, Siti Z. Z. Abidin, P. N. Hashimah, A. S. Abd. Rahman
Abstract: Automated Vehicle Location (AVL) based Transport Monitoring System
(TMS) has generated some interest within the research community since decades
ago. The emergence of enabling technologies such as the Global Positioning
System (GPS) and advanced cellular communication systems has opened up new
opportunity to this area of research. Vehicle location is now determined in
real time and data can be transferred instantaneously to either centralized or
decentralized processors. Implementation of a full fledge TMS requires
components such as communication module, Geographical Information System
(GIS), databases and monitoring application to be incorporated into the system
architecture. Once all the elements are gathered, the project will inevitably
become very complex and difficult to deploy efficiently and in a timely
manner. In this paper, we propose a new approach for the design and
implementation of a TMS. The approach that we are proposing relies on the
strength and modular nature of a language-based platform. The platform will
not only make the project more manageable but will also enhance it by offering
extended collaborative features. It will also allow modular experimentation of
various optimization algorithms in different Vehicle Routing Problem (VRP)
model to be designed and tested for better system performance. With the
proposed framework, AVL based TMS can be built economically and efficiently.
Analysis and comparison among current AVL based systems are also performed in
order to investigate the feasibility of the project.
Keywords: Automated Vehicle Location (AVL), Collaborative environment,
Multimedia communication, Vehicle Routing Problem (VRP), Route optimization,
Scripting language
Title of the Paper: A
Model Driven Engineering Design Approach for Developing Multi-Platform User
Interfaces
DOWNLOAD
FULL PDF
Authors:
Eman Saleh, AMR Kamel, Aly Fahmy
Abstract: The wide variety of interactive devices and modalities an
interactive system must support has created a big challenge in designing a
multi-platform user interface and poses a number of issues for the design
cycle of interactive systems. Model-Based User Interface Design (MBUID)
approaches can provide a useful support in addressing this problem. In MBUID
the user interface is described using various models; each describes a
different facet of the user interface. Our methodology is based on task models
that are attributed to derive a dialog model, from which different concrete
models with different appearances can be generated. This paper presents a
semi-automatic Model-Based transformational methodology for multi-platform
user interface (MPUI) design. The proposed methodology puts dialog modeling in
the center of the design process. A core model is integrated in the design
process namely our Dialog-States Model (DSM); which represents our initial
step to adapting to multiple target platforms by assigning multiple
Dialog-State models to the same task model. A multi-step reification process
will be taken from abstract models to more concrete models until reaching a
final user interface customized according to the target platform.
Keywords: ConcurTaskTrees, Dialog model, Model-Based User Interface Design,
StateCharts, UsiXML
Issue
6, Volume 9, June 2010
Title of the Paper: Automating
Ontology Based Information Integration Using Service Orientation
DOWNLOAD
FULL PDF
Authors:
Bostjan Grasic, Vili Podgorelec
Abstract: With the rise of the Internet, globalization and the increasing
number of applications used inside organizations, there is an emerging need to
integrate information across heterogeneous information systems. Service
oriented architecture (SOA) is seen as a general answer to intraorganisational
as well as interorganisational integration problems. While service oriented
systems have been well studied, there are still some challenges remaining
unanswered. One of them is automation of service execution. This paper
proposes a method for automated execution of Web Services. Based on Web
Service execution automation, the proposed approach is bridging the gap
between ontology based integration and service oriented architecture by
enabling dynamic and transparent integration of information which is provided
by services.
Keywords: Service execution, Web services, Soa, Information integration,
Semantic Web
Title of the Paper: A
Framework for Eliciting Value Proposition from Stakeholders
DOWNLOAD
FULL PDF
Authors:
Ghulam Murtaza, Naveed Ikram, Abdul Basit
Abstract: Eliciting the value proposition in Value Based Software Engineering
(VBSE) is critical. Everything within VBSE is dependent on the value
propositions of success critical stakeholder (SCSs). This paper present
presents a novel approach for elicitation of value from the SCSs from
different dimensions. We propose a Value Elicitation Framework (VEF) in order
to resolve the problem of selection and application of appropriated value
elicitation technique for a given situation. We applied the VEF on a small
commercial project to demonstrate the execution of VEF in practice and
evaluate its effectiveness. Results show that decision makers felt more
confident in decision making while using VEF as decisions are taken on basis
of actual value rather than mere guess. We also found that SCSs were mainly
using Business, Economic and Technical Values in making decisions.
Keywords: Value Elicitation, Success Critical Stakeholders (SCS), Stakeholder
Identification, Stakeholder Identification Techniques, Value Elicitation
Techniques, Value Dimensions, Value Elicitation Framework
Title of the Paper: Visual
Microcontroller Programming Using Extended S-System Petri Nets
DOWNLOAD
FULL PDF
Authors:
Kok Mun Ng, Zainal Alam Haron
Abstract: In this paper, we present the development work on a visual
microcontroller programming tool based on an extended form of S-System Petri
Nets (SSPN). By using the extended form of SSPNs we were able to describe in
visual form subroutines, interrupts, I/O operations, arithmetic operations,
and other programming constructs in a microcontroller application program.
Construction of the visual programming tool included the development of a
drawing editor which utilized directed graphs as internal model for created
SSPN diagrams, and a parser to check for correct diagram and sentence syntax.
The parser developed uses context-free diagram and string grammars for the
diagram and sentence syntax checking, and upon successful parsing the tool
automatically translates the SSPN-represented application program into
assembly code for a target microcontroller.
Keywords: S-System Petri Net (SSPN), S-System Petri Net Generator (S-PNGEN),
Directed Graph Structure, Context-free Graph Grammar, Graph Transformation
Title of the Paper: Online
PCA with Adaptive Subspace Method for Real-Time Hand Gesture Learning and
Recognition
DOWNLOAD
FULL PDF
Authors:
Minghai Yao, Xinyu Qu, Qinlong Gu, Taotao Ruan, Zhongwang Lou
Abstract: The learning method for hand gesture recognition that compute a
space of eigenvectors by Principal Component Analysis(PCA) traditionally
require a batch computation step, in which the only way to update the subspace
is to rebuild the subspace by the scratch when it comes to new samples. In
this paper, we introduce a new approach to gesture recognition based on online
PCA algorithm with adaptive subspace, which allows for complete incremental
learning. We propose to use different subspace updating strategy for new
sample according to the degree of difference between new sample and learned
sample, which can improve the adaptability in different situations, and also
reduce the time of calculation and storage space. The experimental results
show that the proposed method can recognize the unknown hand gesture,
realizing online hand gesture accumulation and updating, and improving the
recognition performance of system.
Keywords: Online Learning , Online PCA , Adaptive Subspace , Camshift, Hand
Tracking, Hand Gesture Recognition
Title of the Paper: The
New Architecture of Chinese Abacus Multiplier
DOWNLOAD
FULL PDF
Authors:
Chien-Hung Lin, Yun-Fu Huang, Der-Her Lee, Pao-Hua Liao, Chih-Wei Hsu
Abstract: This study demonstrated a 4x4 bits multiplier that was based on the
Chinese abacus. Comparing the simulation results of this work with the speed
and power consumption of the 4x4 bits Braun array multiplier, this 4x4 bits
abacus multiplier showed a 19.7% and 10.6% delay improvement in 0.35?m and
0.18?m technology respectively than that of the 4x4 bits Braun array
multiplier, while power consumption of the 4x4 bits abacus multiplier was 8.7%
and 18% lower respectively.The performance: power-consumption*delay of the
abacus multiplier is respectively,less about 23.2% and 23.5% also.
Keywords: Performance, Tree-based multipliers, Braun array multiplier,Function
table, Chinese abacus multiplier, Delays, Thermometric
Title of the Paper: Introducing
an Intelligent Computerized Tool to Detect and Predict Urban Growth Pattern
DOWNLOAD
FULL PDF
Authors:
Siti Z. Z. Abidin, M. N. Fikri Jamaluddin, M. Zamani Z. Abiden
Abstract: Urban growth pattern is usually detected using spatial analysis.
Spatial analysis is widely used in scientific research especially in the field
of statistics, image processing and geoinformatics. In modeling urban growth,
the analysis is mostly performed using statistical and mathematical
techniques. With the advance computer technology, physical land (ground)
situation for a place of interest can be represented in digital computerized
form with the accurate and appropriate scale. In this way, measurement can be
made on the digitized presentation for performing analysis. The change in land
use is affected by many factors such as population growth, economic change,
social structure, the change in rules and regulation, and many more. These
influential factors have dynamic behaviors that require complex solutions.
Much research has been undertaken to use several methods such as geographical
information system (GIS) and cellular automata theory, to model the urban
growth. Recently, an intelligent approach has been introduced that features
dynamic behavior. Artificial Neural Network (ANN) has the capability to learn
dynamic behavior and performs prediction based on its learning process. In
this paper, we present an intelligent computerized tool, called
DIGMAP-Detector. This tool is able to learn a pattern of urban growth based on
at least two digital maps (with 4-bit/pixel bitmaps or 8-bit/pixel bitmap in
Bitmap File Format (BMP)). Implemented using Java programming language, the
tool reads digital map files with the size of 847 pixels length and 474 pixels
width. Classification on the map with two independent binary classes (value 1
for urban and 0 for rural) are prepared using GIS software. By applying a
cellular automata theory that considers the affect on a center pixel is
influenced by its surrounding pixels (eight pixels), the tool uses a back
propagation neural network to read the values of surrounding pixels as its
input layer nodes and the center pixel as the output node. Several analyses
are performed to determine the appropriate values for the neural network
configuration before its learning engine starts to learn the pattern of
dynamic urban changes based on the digital map patterns. When the neural
network engine has learnt the pattern, prediction can be carried out to
predict the missing years and future urban growth. With good prediction
accuracy, urban planning and monitoring can be performed with maintaining good
ecological and environmental system. In addition, better planning also gives
benefit to economic values.
Keywords: Computerized tool, Artificial Neural Network, Digital map, Urban
Growth, Urban pattern, Cellular automata
Title of the Paper: Traveling
Wave Solutions for the (2+1) Dimensional Boussinesq Equation and the
Two-Dimensional Burgers Equation by (G''/G')-Expansion Method
DOWNLOAD
FULL PDF
Authors:
Bin Zheng
Abstract: In this paper, we demonstrate the effectiveness of the
(G''/G')-expansion method by seeking more exact solutions of the (2+1)
dimensional Boussinesq equation and the two-dimensional Burgers equation. By
the method, the two nonlinear evolution equations are separately reduced to
non-linear ordinary differential equations (ODE) by using a simple
transformation. As a result, the traveling wave solutions are obtained in
three arbitrary functions including hyperbolic function solutions,
trigonometric function solutions and rational solutions. When the parameters
are taken as special values, we also obtain the soliton solutions of the
fifth-order Kdv equation. The method appears to be easier and faster by means
of a symbolic computation system.
Keywords: (G''/G')-expansion method, Traveling wave solutions, (2+1)
dimensional Boussinesq equation, twodimensional Burgers equation, exact
solution, evolution equation, nonlinear equation
Title of the Paper: New
Exact Traveling Wave Solutions for Three Nonlinear Evolution Equations
DOWNLOAD
FULL PDF
Authors:
Bin Zheng
Abstract: In this paper, we demonstrate the effectiveness of the
(G''/G')-expansion method by seeking more exact solutions of the SRLW
equation, the (2+1) dimensional PKP equation and the (3+1) dimensional
potential-YTSF equation. By the method, the two nonlinear evolution equations
are separately reduced to non-linear ordinary differential equations (ODE) by
using a simple transformation. As a result, the traveling wave solutions are
obtained in three arbitrary functions including hyperbolic function solutions,
trigonometric function solutions and rational solutions. When the parameters
are taken as special values, we also obtain the soliton solutions of the
fifth-order Kdv equation. The method appears to be easier and faster by means
of a symbolic computation system.
Keywords: (G''/G')-expansion method, Traveling wave solutions, SRLW equation,
(2+1) dimensional PKP equation, (3+1) dimensional potential-YTSF equation,
exact solution, evolution equation, nonlinear equation
Title of the Paper: The
Evaluation Of Nearly Singular Integrals in the Direct Regularized Boundary
Element Method
DOWNLOAD
FULL PDF
Authors:
Yaoming Zhang, Yan Gu, Bin Zheng
Abstract: The numerical analysis of boundary layer effect is one of the major
concerned problems in boundary element method (BEM). The accuracy of this
problem depends on the precision of the evaluation of the nearly singular
integrals. In the boundary element analysis with direct formulation, the
hyper-singular integral will arise from the potential derivative boundary
integral equations (BIEs). Thus the nearly strong singular and hyper-singular
integrals need to be calculated when the interior points are very close to the
boundary. For nearly hyper-singular integrals, it is thought, generally, more
difficult to calculate. In this paper, a general nonlinear transformation is
adopted and applied to calculating the potential and its derivative at the
interior points very close to the boundary. Numerical examples demonstrate
that the present algorithm is efficient and can overcome the boundary layer
effect successfully even when the interior points are very close to the
boundary.
Keywords: BEM, potential problems, nearly singular integrals, boundary layer
effect, transformation, Numerical method
Title of the Paper: Social
Awareness: The Power of Digital Elements in Collaborative Environment
DOWNLOAD
FULL PDF
Authors:
Zainura Idrus, Siti Z. Z. Abidin, R. Hashim, N. Omar
Abstract: Awareness is the sense of what is happening, who is around, what
they are doing, what their states of emotion and whether or not they notice
you. Social awareness and how they are promoted by digital elements in
networked collaborative virtual environment (NCVE) is the main focus of this
study. Social awareness is defined as the understanding of a contextual
situation at a present time. In networked collaborative virtual environments
(NCVE), awareness plays an important role for achieving an effective digital
communication. For a particular virtual environment, participants should be
aware of the people whom they are interacting with, their responsibilities and
contributions, the collaborative activities and their progress level. This
paper discusses the digital elements that are used to support awareness during
virtual collaboration by exploring their characteristics and the differences
in terms of their specific roles in promoting awareness. With the main focus
on social awareness, eight different awareness types (presence, turn taking,
emotion, identities, state, role, contextual and conversational) are presented
with respect to these digital elements. The impacts of using each digital
element in various applications are also identified in order to enhance the
usage of these elements when they are applied to their relevant networked
collaborative applications. Thus, with appropriate use of digital elements,
awareness in such situation can be improved.
Keywords: Networked Collaborative Virtual Environment (NCVE), Awareness,
Digital elements, Social awareness, Communication, Interactive collaborative
applications.
Title of the Paper: A New
Accurate Technique for Iris Boundary Detection
DOWNLOAD
FULL PDF
Authors:
Mahboubeh Shamsi, Puteh Bt Saad, Subariah Bt Ibrahim, Abdolreza Rasouli,
Nazeema Bt Abdulrahim
Abstract: The Iris based identification systems have been noticed exceedingly,
presently. In this process, the iris should be segmented from captured eye
image. The low contrast between pupil and iris, usually, will harden the
segmenting process and will decrease the accuracy of detecting boundary
between them. In order to segment the iris more precise, we propose a new
technique using a difference function and a factor matrix. We also modify the
segmentation operator to detect the pupil and iris as ellipse instead of
circle. Experiments show that the proposed technique can segment the iris
region and pupil region precisely. Based on our result, 99.34% of eyes have
been segmented accurately in 1.24s averagely.
Keywords: Daugman’s method, Average Square Shrinking, Difference Function,
Contour Factor Matrix
Issue
7, Volume 9, July 2010
Title of the Paper: A
Novel Text Modeling Approach for Structural Comparison and Alignment of
Biomolecules
DOWNLOAD
FULL PDF
Authors:
Jafar Razmara, Safaai B. Deris
Abstract: Within this paper, a novel strategy for structural alignment of
proteins based on text modeling techniques is introduced. The method
summarizes the protein secondary and tertiary structure in two textual
sequences. The first sequence is used to initial superposition of secondary
structure elements and the second sequence is employed to align the
3D-structure of two compared structures. The comparison technique used by the
method has been inspired from computational linguistics for analysing and
quantifying textual sequences. In this strategy, the cross-entropy measure
over n-gram models is used to capture regularities between sequences of
protein structures. The performance of the method is evaluated and compared
with CE and SSM methods. The results of the experiments reported here provide
evidence for the preference and applicability of the new approach in terms of
efficiency and effectiveness.
Keywords: Protein structure alignment, n-gram modeling, cross-entropy
Title of the Paper: The
Theory and Application of an Adaptive Moving Least Squares for Non-uniform
Samples
DOWNLOAD
FULL PDF
Authors:
Xianping Huang, Qing Tian, Jianfei Mao, Li Jiang, Ronghua Liang
Abstract: Moving least squares (MLS) has wide applications in scattering
points approximation fitting and interpolation. In this paper, we improve a
novel MLS approach, adaptive MLS, for non-uniform sample points fitting. The
size of radius for MLS can be adaptively adjusted according to the consistency
of the sampled data points. Experiments demonstrate that our method can
produce higher quality approximation fitting results than the MLS.
Keywords: MLS, Sample Points, Non-uniform, Points Set, Approximation Fitting,
Interpolation
Title of the Paper: Data
Simulation of Matern Type
DOWNLOAD
FULL PDF
Authors:
Jia-Yue Li, Xin Lu, Ming Li, Shengyong Chen
Abstract: Recently, the correlation function of the Matern’s receives
increasing interests in geostatistics. This paper discusses our work in
synthesizing the random data based on the Matern’s correlation function. The
analysis in this paper exhibits that the data of the Matern type are in the
domain of fractal time series. The present results suggest that the power
spectrum (PSD) based method may be efficiently for synthesizing the random
data of the Matern type. We shall explain the reason to select the PSD based
method and give the demonstrations of simulations. This paper may yet provide
a pavement towards the generation of multidimensional random fields of the
Matern type.
Keywords: Random data generation, Geostatistics, Fractal time series,
Fractional Langevin equation, Fractional oscillator processes, The Matern
correlation function
Title of the Paper: FGN
Based Telecommunication Traffic Models
DOWNLOAD
FULL PDF
Authors:
Ming Li, Wei Zhao, Shengyong Chen
Abstract: This paper addresses three models of traffic based on fractional
Gaussian noise (fGn). The first is the standard fGn (fGn for short) that is
characterized by a single Hurst parameter. The second is the generalized fGn
(GfGn) indexed by two parameters. The third the local Hurst function. The
limitation of fGn in traffic modeling is explained. We shall exhibit that the
model of GfGn can be used to release that limitation. Finally, we discuss the
local Hurst function to interpret that it is a simple model to express the
multifractal property of traffic on a point-by-point basis.
Keywords: Internet traffic modeling; Fractional Gaussian noise; Fractal time
series; Statistical computing
Title of the Paper: Web
Client Server Systems with Advanced Asynchronous Communication, their
Architecture and Applications
DOWNLOAD
FULL PDF
Authors:
Filip Maly, Antonin Slaby
Abstract: This article extends ideas and results presented in our contribution
in Hangzhou WSEAS conference. In the paper we describe one way of solution of
important and difficult problem of finding suitable ways of communications in
special client server systems having hybrid and as to functionality point of
view restricted client. We also describe basic improvements of client enabling
running of more sophisticated software processes. In addition to it there is
shown common concept and architecture of web client server systems that use
asynchronous communication through one always open port (port No. 80). These
systems have wide use and a lot of applications. On of them is mentioned in
case study.
Keywords: Client server systems, asynchronous communication, hybrid client,
software processes, learning management systems
Title of the Paper: Developing
Question Answering (QA) Systems using the Patterns
DOWNLOAD
FULL PDF
Authors:
Maria Moise, Ciprian Gheorghe, Marilena Zingale
Abstract: This paper describes a way to use Natural Language Processing (NLP)
techniques in order to gain faster access to information from a closed domain.
Using traditional graphical user interfaces built as a tree structure, such as
menus, determine users to browse irrelevant information. To avoid this, we use
one of the major tasks in NLI, Question Answering (QA) and build with Visual
FoxPro 9.0 a demonstrating application. We impose restrictions related to the
domain of use that of tourist attractions in Romania, and restrictions related
to natural language input method. We use tags to represent words or groups of
words and patterns to symbolize questions. We use this representation in order
to provide to user a non-traditional human-computer interaction. The QA system
rely on a database where we store specific information on chosen domain and
related data in order to accomplish the task of providing an answer. The
answering mechanism uses a knowledge engineering with syntactic and semantic
approach. At the end of this paper we discuss the QA System Evaluation.
Keywords: Tag, Pattern, Natural Language Processing, Question Answering
Title of the Paper: The
Malaysia IT Outsourcing Industry Skill-Sets Requirements of Future IT
Graduates
DOWNLOAD
FULL PDF
Authors:
Abdul Rahman Ahlan, Yusri Arshad, Mohd Adam Suhaimi, Husnayati Hussin
Abstract: IT changes very quickly and influences business, industry and the
public in an enormous manner. The issue of IT outsourcing (ITO) impact on IT
workforce has been discussed widely in many developed countries so much so
that the concerns have been tense in that more IT jobs will be transferred to
developing countries which provide IT outsourcing services. In addition, with
the growth of IT outsourcing and emerging new outsourcing business models such
as utility demand, application service provider, business process outsourcing,
offshore outsourcing and many more servicing different industry vertical
sectors increase the demand for multiple IT skills and capabilities of IT
workforce. In this study, we review relevant literature, newspapers and
non-academic articles, websites of companies, governments and non-governmental
organisations and others. An outsourcing Malaysia (OM) CEO roundtable
discussion is also held to get inputs from the practitioners on the topic. In
addition, we seek in-depth insights from seven senior executive managements in
service provider firms on the skill sets requirements of fresh IT graduates to
fulfill the market needs of IT outsourcing in Malaysia. The four-member
research team found that technical, soft and problem-solving skills are the
main concerns raised by the key informants. This is in line with the
literature review and also the present higher education policy concerns by the
Malaysia government.
Keywords: Malaysia, IT outsourcing, skill-sets, workforce, curriculum,
developing country
Title of the Paper: An
Comparative Analysis of the Current Status of Digital Divide in Taiwan
DOWNLOAD
FULL PDF
Authors:
Ruey-Gwo Chung, Chih-Wei Li, Chen-Liao Chen
Abstract: Information technology and network communications are playing a very
important role in today's modern society, and they have a significant
influence on the policy-making in the country. In education, their importance
is reflected by the sought-after IT courses and information-integrated
teaching. “Digital divide” is an issue caused by a delay in the introduction
of information technology to different ethnic and social groups, lower
availability of information equipment, and different abilities to access the
Internet. In order to understand the accessibility of and ability to access
information equipment in different regions in Taiwan, the Research,
Development, and Evaluation Commission of the Executive Yuan (RDEC) started
conducting surveys on domestic digital divide since 2001 and using the
findings as references for formulating policies that address the issue. The
purpose of this paper is to use secondary data to analyze the latest “2009
Digital Divide Survey” by RDEC and to describe the current status of digital
divide in Taiwan. Research indicates that at the moment, digital divide in
Taiwan is mainly caused by a lack of the willingness and ability to learn
among those with a lower educational background and/or who are older
individuals. This is significantly different from the causes of digital divide
found in 2002 which included expensive computer equipment and Internet access
fees, poor connectivity and bandwidth, and a lack of access in public places.
When aiming at reducing digital divide, the government is advised to adjust
its strategies accordingly and meet the changes in society.
Keywords: Digital divide, information technology, technical network,
disadvantaged groups, information literacy, information education
Title of the Paper: Craniofacial
Reconstruction Based on MLS Deformation
DOWNLOAD
FULL PDF
Authors:
Li Jiang, Xiangyin Ma, Yaolei Lin, Lewei Yu, Qianwei Ye
Abstract: Craniofacial reconstruction aims at estimating the facial outlook
associated to an unknown specimen. Craniofacial reconstruction is generally
based on the statistical tissue thickness on anthropometric landmarks.
However, the features points alone are not enough for realistic
reconstruction. So, in our paper, we take advantage of a reference facial
model, through measuring the differences between the target facial feature
points and the reference facial feature points, a novel craniofacial
reconstruction algorithm based on moving least squares deformation is
presented. The 3D skull mesh model is obtained with Marching Cube Algorithm,
which extract the iso-surfaces from a complete head CT slices datum. The holes
detected in the 3D skull model can be repaired with different methods after
the holes are clarified. Then, the craniofacial is reconstructed using MLS
deformation with the constraint of a reference facial model. The experimental
results show that the methods can produce more desirable results than others’.
Keywords: Craniofacial reconstruction, Deformation, MLS, Feature points, Hole
repairing
Title of the Paper: Using
Multiple Imputation to Simulate Time Series: A Proposal to Solve the Distance
Effect
DOWNLOAD
FULL PDF
Authors:
Sebastian Cano, Jordi Andreu
Abstract: Multiple Imputation (MI) is a Markov chain Monte Carlo technique
developed to work out missing data problems, specially in cross section
approaches. This paper uses Multiple Imputation from a different point of
view: it intends to apply the technique to time series and develops that way a
simpler framework presented in previous papers. Here, the authors’ idea
consists basically on an endogenous construction of the database (the use of
lags as supporting variables supposes a new approach to deal with the distance
effect). This construction strategy avoids noise in the simulations and forces
the limit distribution of the chain to convergence well. Using this
approximation, estimated plausible values are closer to real values, and
missing data can be solved with more accuracy. This new proposal solves the
main problem detected by the authors in [1] when using MI with time series:
the previously commented distance effect. An endogenous construction when
analyzing time series avoids this undesired effect, and allows Multiple
Imputation to benefit from information from the whole data base. Finally, new
R computer code was designed to carry out all the simulations and is presented
in the Appendix to be analyzed and updated by researchers.
Keywords: Missing data, Multiple Imputation, Time Series, MCMC, Simulation
Algorithms, R Programming
Title of the Paper: A
Real-Time Data Acquisition System for the Laguna Verde Nuclear Power Plant
DOWNLOAD
FULL PDF
Authors:
Ilse Leal Aulenbacher, Jose Maria Suarez Jurado, Efren R. Coronel Flores
Abstract:This paper focuses on a Data Acquisition Real-Time System developed
for the Laguna Verde Nuclear Power Plant in Veracruz, Mexico. Due to the fact
that the data acquisition modules needed to be replaced, the need for a New
Acquisition System arose. Replacing the former data acquisition system has
several technical challenges, including the fact that it must work together
with the former system. Additionally, it must remain online during the whole
process, since the Data Acquisition System is one of the nuclear power plant
most important monitoring systems and it is required for its operation. This
paper focuses on the key software design aspects of the New Acquisition
System, which were used to address the main system requirements: Integration
with the former data system, multiple data source support, high-frequency data
storage and high-speed data access. The New Acquisition System is composed of
a vast number of modules. This paper specifically focuses on Acquisition
Subsystems, the Central Acquisition Process and the Master Historical Archive
Process.
Keywords: Data acquisition system, Real-time, Linux, Software, Design,
Archive, Acquisition Subsystem
Title of the Paper: The
Access of Persons with Visual Disabilities at the Scientific Content
DOWNLOAD FULL PDF
Authors:
Narcisa Isaila, Ion Smeureanu
Abstract: The access to scientific content, for people with disabilities,
involves a number of problems both in reading web documents, which contain the
elements as images, with or without alternative text and reading from files,
especially if these contain mathematical expressions. From this point of view,
the applications' utility for synthesizing artificial language, starting from
a written text in Romanian language, is undeniable, given that, the concerns
have increased for creation of facilities designed to contribute to a better
integration of persons with disabilities in society. The purpose of this paper
is the result of research into education, for the access to science of people
with disabilities, by integrating the facilities the audio presentation of
information, in Romanian and provides a way to integrate assistive components
in an open source learning platform.
Keywords: Accessibility, Vocal synthesizers, Assistive technologies, Web
service, Mathematics, W3C
Issue
8, Volume 9, August 2010
Title of the Paper: Program-Operators
to Improve Test Data Generation Search
DOWNLOAD
FULL PDF
Authors:
Mohammad Alshraideh, Mohammad Qatawneh, Wesam Al Mobaiden, Azzam Sleit
Abstract: There has recently been a great deal of interest in search based
test data generation, with many local and global search algorithms being
proposed. In this paper, the program operations, in the form of the
program-specific operations used to increase the performance in the generation
of test data. The efficacy and performance of the proposed testing approach is
assessed and validated using a variety of sample programs, and the empirical
investigation is shown to give more than eightfold increase in performance.
Keywords: Genetic algorithms, program-Search operators, cost function,
branch-coverage, software testing, dynamic testing, search-based
Title of the Paper: Alternative
A(H1N1) Suspects Management
DOWNLOAD
FULL PDF
Authors:
Dan Adrian Marior, Radu Zglimbea, Constantin Carciumaru
Abstract: This paper deals with the differential diagnostics process behind
the verdict of AH1N1 infection or not for the swine flu suspects. The
application was designed as a support for doctors was built with ASP.NET 3.5
technology, the broad spectrum development platform, and it enabled us to
create a web application that could be accessible from anywhere on the
internet, assist the doctor in the diagnostics process, filter out false
positives, manage the patients, and also generate sets of statistical charts
for case evolution analysis.
Keywords: A(H1N1), application, diagnostic, management, charts
Title of the Paper: Web
Page Analysis Based on HTML DOM and Its Usage for Forum Statistics, Alerts and
Geo Targeted Data Retrieval
DOWNLOAD
FULL PDF
Authors:
Robert Gyorodi, Cornelia Gyorodi, George Pecherle, George Mihai Cornea
Abstract: Message boards are part of the Internet known as the 'Invisible Web'
and pose many problems to traditional search engine spiders. The dynamic
content is usually very deep and difficult to search. In addition, many of
these sites change their locations, servers, or URLs almost daily creating
problems with the indexing process. However, during the growth of the World
Wide Web and with the help of search engines, they represent an important
source of information to solve different problems. Another interesting feature
of this type of web pages is that a big community has been developed,
expressing different opinions and discussing various topics. Using special
retrieval and indexing algorithms, mostly based on the HTML DOM tree, we have
developed an algorithm to obtain detailed and accurate trend statistics that
can be used for different marketing solutions and analysis tools. Combined
with the services provided by traffic ranking sites like Alexa.com, we can
also provide geo targeting functionality to deliver even more accurate results
to the end user, such as what percentage of the users who are visiting a
certain forum is coming from a certain country.
Keywords: Data analysis, data models, HTML DOM, information extraction, text
recognition, geo targeting
Title of the Paper: Using
Text Mining Techniques in Electronic Data Interchange Environment
DOWNLOAD
FULL PDF
Authors:
Zakaria Suliman Zubi
Abstract: The internet is a huge source of documents, containing a massive
number of texts in multilingual languages on a wide range of topics. These
texts are demonstrating in an electronic documents format hosted on the web.
The documents exchanged using special forms in an Electronic Data Interchange
(EDI) environment. Using web text mining approaches to mine documents in EDI
environment could be new challenging guidelines in web text mining. Applying
text-mining approaches to discover knowledge previously unknown patters
retrieved from the web documents by using partitioned cluster analysis methods
such as k- means methods using Euclidean distance measure algorithm for EDI
text document datasets is unique area of research these days. Our experiments
utilize the standard K-means algorithm on EDI text documents dataset that most
commonly used in electronic interchange and we report some results using text
mining clustering application solution called WEKA. This study will provide
high quality services to any organization that is willing to use the system.
Keywords: Electronic Data Interchange (EDI), Web Mining, Text Mining,
Clustering, K-mean algorithm, Similarity Measures, Partitioned Cluster
Analysis
Title of the Paper: Concept
Structure based on Response Pattern Detection of S-P Chart with Application in
Algebra Learning
DOWNLOAD
FULL PDF
Authors:
Jeng-Ming Yih, Yuan-Horng Lin
Abstract: The main purpose of this study is to provide an integrated method
for personal concept structure analysis. Based on the utility of S-P chart
(student problem chart) to deal with classification for learning style,
students of different learning style display its own features of concept
structure. In this study, S-P chart is used to classify learning styles of
students. Concept structure analysis (CSA) could display personalized concept
structure. CSA algorithm is the major methodology and its foundation is fuzzy
logic model of perception (FLMP) and interpretive structural modeling (ISM).
CSA could clearly represent hierarchies and linkage among concepts. Therefore,
CSA will be effectively to display features of personal concept structures. In
this study, an empirical data for concepts of linear algebra from university
students is discussed. The results show that students of varied learning
styles own distinct knowledge structures. CSA combined with S-P chart could be
feasible for cognitive diagnosis. According to the findings and results, some
suggestions and recommendations for future research are discussed.
Keywords: Concept structure, cognitive diagnosis, FLMP, ISM, S-P chart
Title of the Paper: Integrated
Thallassaemia Decision Support System
DOWNLOAD
FULL PDF
Authors:
Rached Omer Agwil, Divya Prakash Shrivastava
Abstract: Thalassaemia is a genetic blood disorder where the blood cells are
unable to carry sufficient oxygen supply for the organs. The Thalassaemia has
a distribution concomitant with areas where P. Falciparum malaria is common.
The alpha Thalassaemia is concentrated in Southeast Asia, Malaysia, and
southern China. The beta Thalassaemia is seen primarily in the areas
surrounding Mediterranean Sea, Africa and Southeast Asia. Due to global
migration patterns, there has been an increase in the incidence of
Thalassaemia in North America in the last ten years, primarily due to
immigration from Southeast Asia (The Reader’s Digest, 1989). The increment of
the cases forces the government hospital to have an alternative method in
diagnosing Thalassaemia than only depend on the Hematologist. Case-Based
Reasoning is a subset of an Artificial Intelligence technique utilizes the
specific knowledge of previous experiences to solve new problems by
remembering previous similar cases. It is highly suitable for medical domain.
Hence, this work provides model that demonstrates how Thalassaemia can be
diagnosed via Integrated Thalassaemia Decision Support System (ITDSS).
Keywords: DSS, CBR, ITDSS, Thallassaemia , Medical Application, Diagnose
Disease, AI
Title of the Paper: The
Use of Domain Ontologies for the Virtual Scenes Management
DOWNLOAD
FULL PDF
Authors:
Crenguta Bogdan, Dorin Mircea Popovici
Abstract: In this paper, an object-oriented software system for the management
of virtual scenes is presented. This system, called OntSceneBuilder, uses a
domain ontology in order to obtain at least three benefits: accuracy, ease of
content reuse and management of virtual scenes. The accuracy is ensured by
default, since any ontology provides a precise specification of the concepts
and their relations of a domain. Each concept is associated with 2D and 3D
resources and a virtual artifact. The graph of the virtual artifacts forms a
virtual scene of a virtual exposition. The paper also presents some models of
the system development process, mainly realized during the analysis and design
activities. Our aim was to analyze the OntSceneBuilder from the functional and
interactional viewpoints and to create its software use case diagram.
Furthermore, each software use case was designed from the structural and
dynamical viewpoints. At the same time we also constructed the system software
architecture. Some classes of the software architecture manage the concepts of
the domain ontology associated with the topic chosen by user. The system has
been experimented in the realization of virtual scenes of a virtual historic
exposition.
Keywords: Virtual scene, domain ontology, concept, virtual artifact, software
analysis, software architecture, virtual historic exposition
Title of the Paper: A
Potable Biometric Access device using Dedicated Fingerprint Processor
DOWNLOAD
FULL PDF
Authors:
Hatim A. Aboalsamh
Abstract: Biometric signatures, or biometrics, are used to identify
individuals by measuring certain unique physical and behavioral
characteristics. Individuals must be identified to allow or prohibit access to
secure areas—or to enable them to use personal digital devices such as,
computer, personal digital assistant (PDA), or mobile phone. Virtually all
biometric methods are implemented using the following 1) sensor, to acquire
raw biometric data from an individual; 2) feature extraction, to process the
acquired data to develop a feature-set that represents the biometric trait; 3)
pattern matching, to compare the extracted feature-set against stored
templates residing in a database; and 4) decision-making, whereby a user’s
claimed identity is authenticated or rejected. A typical access control system
uses two components. First component is a fingerprint reader that is connected
to a database to match the pre stored fingerprints with the one obtained by
the reader. The second component is an RFID card that transmits information
about the person that requests an access. In this paper, a compact system that
consists of a CMOS fingerprint sensor (FPC1011F1) is used with the FPC2020
power efficient fingerprint processor ; which acts as a biometric sub-system
with a direct interface to the sensor as well as to an external flash memory
for storing finger print templates. The small size and low power consumption
enables this integrated device to fit in smaller portable and battery powered
devices utilizing high performance identification speed. An RFID circuit is
integrated with the sensor and fingerprint processor to create an electronic
identification card (e-ID card). The e-ID card will pre-store the fingerprint
of the authorized user. The RFID circuit is enabled to transmit data and allow
access to the user, when the card is used and the fingerprint authentication
is successful.
Keywords: Access control, RFID, Fingerprint processor, Fingerprint
authentication, Biometrics
Title of the Paper: Software
Implementation of Hydraulic Shock Numerical Computation in the Pressure
Hydraulic Systems without Protection Devices
DOWNLOAD
FULL PDF
Authors:
Ichinur Omer
Abstract: This paper presents software for calculus of hydraulic shock
phenomenon in pressure hydraulic systems without protection device. The
program is written in Java programming language and responds to the following
requirements: easy management of several projects, easy introduction, editing
and change of data entry, and proper display of the program output: the
hydraulic load and speed for every moment of time. To numerical solve the
equations of the hydraulic shock phenomenon we apply the method of
characteristics. The output data are the values of speeds and hydraulic loads
of the sections along the pipeline, elements that can assess system behavior
in a given situation.
Keywords: Hydraulic shock (water hammer), pressure hydraulic system, method of
characteristics, software, flowchart, graphical interface
Title of the Paper: Influence
of Noise on the Results of Rigid Registration of Segmented Ovarian Volumes
Using Spherical Correlation in Frequency Domain
DOWNLOAD
FULL PDF
Authors:
Boris Cigale, Damjan Zazula
Abstract: The influence of noise on the results of rigid registration of
segmented ultrasound volumes is studied in this paper. Binary volumes result
from a segmentation of ovarian ultrasound volumes. Rigid registration is
preformed in frequency domain, where the rotation and translation can be
calculated separately. The calculation of rotation is done using the amplitude
spectrum and sphere correlation. The method was tested on pairs of synthetic
volumes where ovarian follicles in one volume were altered and, thus,
simulated different kinds of noise (non-rigid changes) characteristic for
segmented volumes. We systematically assessed the performance of our
registration algorithm by changing the number of follicles, their position,
orientation and size. Hundred volume pairs were involved in each experiment.
The method proved sensitive to the change of follicle size but resistive to
all other kinds of destruction we simulated.
Keywords: Image registration, rigid registration in frequency domain,
spherical correlation
Title of the Paper: Textual
Data Compression Speedup by Parallelization
DOWNLOAD
FULL PDF
Authors:
Goran Martinovic, Caslav Livada, Drago Zagar
Abstract: When the omnipresent challenge of space saving reaches its full
potential so that a file cannot be compressed any more, a new question arises:
“How can we improve our compression even more?”. The answer is obvious:”Let/s
speed it up!”. This article tries to find the meeting point of space saving
and compression time reduction. That reduction is based on a theory in which a
task can be broken into smaller subtasks which are simultaneously compressed
and then joined together. Five different compression algorithms are used two
of which are entropy coders and three are dictionary coders. Individual
analysis for every compression algorithm is given and in the end compression
algorithms are compared by performance and speed depending on the number of
cores used. To summarize the work, a speedup diagram is given to behold if Mr.
Amdahl and Mr. Gustafson were right.
Keywords: Data compression, lossless coding, entropy coder, dictionary coder,
parallel computing, compression time speed up
Issue
9, Volume 9, September 2010
Title of the Paper: Computer
Modeling and Simulation of the Nanoaggregation and Solubility of Crude Oil
Asphaltenes
DOWNLOAD
FULL PDF
Authors:
Francesco Frigerio
Abstract: The methodology of classical molecular dynamics provides useful
tools for the simulation of the solution behaviour of asphaltenes. The
aggregation and the solubility properties of this class of molecules are
studied at a full atomistic level. Average three-dimensional asphaltene models
are built on the basis of experimental data, collected from a series of crude
oil samples. The simulation of two such asphaltene models in four different
solvents puts into evidence the formation of oligomeric clusters. Their
analysis gives clues to the initial stages of asphaltene aggregation at the
nanometer scale. The Hildebrand solubility parameter is calculated for the
whole collection of asphaltene models. This is a practical example of
obtaining useful physicochemical properties from molecular simulations applied
to average asphaltene structures.
Keywords: Simulation, Model building, Molecular dynamics, Asphaltene, Oil,
Aggregation, Solubility, Hildebrand
Title of the Paper: A
Novel Object Detection Approach Based on the Boundary Shape Information from
High Resolution Satellite Imagery
DOWNLOAD
FULL PDF
Authors:
Xiaoshu Si, Xuemin Hu, Hong Zheng
Abstract: This paper presents a novel approach of detecting special objects
from high resolution satellite imagery. In this approach, a bilateral
filtering is used to reduce noise, and a new hybrid morphological approach is
proposed for ROI extraction and feature enhancement. A detection operator
based on the boundary shape information (BSI) is developed to detect
preprocessed objects. The images from Google Earth are tested in the paper.
Comparisons with popular object detection approaches are also discussed. The
experimental results show that proposed approach is effective and feasible.
Keywords: BSI, Detection template, Object detection, High resolution satellite
imagery, Vehicles, Aircrafts
Title of the Paper: Data
Wiping System with Fully Automated, Hidden and Remote Destruction Capabilities
DOWNLOAD
FULL PDF
Authors:
George Pecherle, Cornelia Gyorodi, Robert Gyorodi, Bogdan Andronic
Abstract: In this article, we will describe a method to securely erase
sensitive data in fully automated and hidden mode and with remote data
destruction capabilities. Compared to other similar technologies, our method
has two main advantages. The first one is the ability to run in a fully
automated mode, in other words the system is configured once and the computer
is protected without requiring any user intervention. The second advantage is
the ability to run in a so-called hidden mode, in which the system looks like
a different software, for the main purpose of confusing other users. Also, our
system can be useful to prevent data loss in stolen laptops, by triggering
remote wiping of sensitive data. This is done by overwriting the encryption
key of an encrypted volume, that makes the data completely unrecoverable. Some
tests and results that show data is not recoverable are also presented at the
end of the paper. We will describe the structure and functionality of our
system, and some of the most important technologies and algorithms that we
have used.
Keywords: Security, data wiping, data recovery, automation, scheduling,
patterns, overwrite data
Title of the Paper: Modelling
using UML Diagrams of an Intelligent System for the Automatic Demonstration of
Geometry Theorems
DOWNLOAD
FULL PDF
Authors:
Anca Iordan, Manuela Panoiu, Ioan Baciu, Corina Daniela Cuntan
Abstract: In this work will be presented the design of an intelligent system
destined for development process of demonstrating abilities for geometry
theorems. This system will make available to user a proof assistant which will
allow interactive vizualization of several demonstrations for the same
theorem, demonstrations that have been generated by using three specific
methods for automatic demonstration of theorems: area method, full-angle
method and inferences accomplishment. For the implementation of the component
used to represent knowledge and proof mechanisms will be used Prolog language
and for the achievement of geometric construction associated to the theorem
will be used Java language.
Keywords: Intelligent Software, Geometry, Java, Prolog, Automatic
Demonstration Theorems
Title of the Paper: Design
Using UML Diagrams of an Educational Informatics System for the Study of
Computational Geometry Elements
DOWNLOAD
FULL PDF
Authors:
Anca Iordan, Manuela Panoiu
Abstract: This paper presents the necessary stages in implementing an
informatics system used for the study of computational geometry elements, such
as determining the parallel and perpendicular to a given line through a point,
to verify the property that a point lies within a triangle, verification of
the convex or concave property of a polygon, the determination of the convex
hull of a set of points. The modeling of the system is achieved through
specific UML diagrams representing the stages of analysis, design and
implementation, the system thus being described in a clear and concise manner.
Keywords: Educational Software, Computational Geometry, Java, Distance
Education
Title of the Paper: A
Study on Multiple Objects Detection, Loading and Control in Video for
Augmented Reality
DOWNLOAD
FULL PDF
Authors:
Sungmo Jung, Jae-Gu Song, Seoksoo Kim
Abstract: Since the researches on augmented reality have recently received
attention, M2M market started to be activated and there are numerous efforts
to apply this to the real life in all sectors of society. However, with the
existing marker-based augmented reality technology, a designated object only
can be loaded from one marker and one marker has to be added to load the same
object additionally. To solve this problem, the relevant marker should be
extracted and printed in screen so that loading of the multiple objects is
enabled. However, since the distance between markers will not be measured in
the process of detecting and copying markers, the markers can be overlapped
and thus the objects would not be augmented. To solve this problem, a circle
having the longest radius needs to be created from a focal point of a marker
to be copied, so that no object is copied within the confines of the circle.
Therefore, in this paper, multiple objects detection and loading using PPHT
has been developed. And markers overlapping control according to multiple
objects control has been studied using Bresenham and Mean Shift algorithm.
Keywords: Multiple Objects Detection, Multiple Objects Loading, Multiple
Objects Control, Computer Vision, PPHT, Bresenham Algorithm, Mean Shift
Algorithm, Augmented Reality
Title of the Paper: Research
on A-Key Distribution Algorithms for Protecting Data of RS-485-based
Industrial Infrastructure
DOWNLOAD
FULL PDF
Authors:
Jae-Gu Song, Sungmo Jung, Seoksoo Kim
Abstract: The RS-485 protocol is a Modbus serial communication, mainly used by
SCADA(Supervisory Control And Data Acquisition). Most industrial
infrastructure using this communication protocol is designed not to be exposed
to an open network environment, seriously vulnerable to security threats.
Therefore, this study examines key management architecture in order to suggest
a key exchange algorithm suitable for the RS-485 protocol. The suggested
algorithm can support both 1:1 and 1:N communications as well as minimize the
amount of loads arising from encoding/decoding so as to increase its
application.
Keywords: RS-485, Modbus, SCADA, Security, Infrastructure, Key Distribution
Algorithms, Key Management
Title of the Paper: An
Approach to QoS based Selection and Composition of Semantic Web Services based
upon Multi-Agent Negotiation
DOWNLOAD
FULL PDF
Authors:
Sandeep Kumar, Nikos E. Mastorakis
Abstract: This paper presents a QoS (Quality of Service) based selection and
composition model for semantic web services in which the negotiation is
performed with all the discovered service providers and the negotiation
results are used in the selection process. In semantic web service
composition, the selection can also be performed after negotiating with all
the discovered service providers and the negotiation-agreements generated from
the negotiation can also be used in the selection process. This paper presents
a semantic web service selection and composition model based upon this
concept. In this paper, a multi-agent negotiation based semantic web service
composition approach has been presented. A negotiation agreement based
selection model has also been presented that uses the assessment of the
various quality parameters included in the negotiation agreement for rating
the service provider agents. The implementation issues in the work has been
discussed and the comparative analysis has been performed.
Keywords: Semantic web, negotiation, multi-agent system, selection,
composition
Title of the Paper: Application
of Unified Smart Classification and Modified Weight Elimination Algorithms to
Damage Evaluation in Composite Structures
DOWNLOAD
FULL PDF
Authors:
Mahmoud Z. Iskandarani
Abstract: Unified Smart Classification Algorithm (USCA) for the purpose of
data processing and classification of data obtained from different testing
techniques is designed and tested. The developed algorithm conditions data
taken from damaged composite structures such as modern car bodies and Plane
frame structure. It is used in conjunction with a Modified Weight Elimination
Neural Networks Algorithm (MWEA) to provide predictive models for impact
damage in composite structures. The developed neural models correlated between
various NDT testing techniques, such that in the absence of one technique, its
results are predicted by the Neural Network through interrogation of available
data obtained using other testing methods. The real and predicted data showed
good agreements in terms of classification and prediction.
Keywords: Neural Networks, Classification, Damage, Composites, Algorithm,
Prediction, Weight Elimination, Pruning
Title of the Paper: Methodology
for SIP Infrastructure Performance Testing
DOWNLOAD
FULL PDF
Authors:
Miroslav Voznak, Jan Rozhon
Abstract: This paper deals with a testing method suitable for SIP
infrastructure. The performance testing is an issue of research and no
standardized methodology has been adopted yet. We present the main ideas of
the methodology that allows for testing the keystone of SIP based
infrastructure – the SIP Server – in both SIP Proxy and B2BUA (Back to Back
User Agent) configurations. Our methodology has its foundations in the work of
the IT Company Transnexus and these foundations have been enhanced with the
ideas reflecting the nature of the SIP protocol. In addition, the entirely new
methodology for benchmarking the SIP server in the B2BUA configuration has
been introduced. This method utilizes one of the attributes of the B2BUA – the
flow of media passing through the B2BUA – and measures the effectiveness of
codec translation, which relates to the performance measured in cases without
codec translation. Our approach offers the complex method for testing SIP
infrastructure, which has been verified experimentally. The outcoming results
are the part of this paper together with appropriate comments and conclusions.
Keywords: Asterisk, B2BUA, codec translation, Opensips, Performance testing,
SIP Proxy
Title of the Paper: Development
of an Effective Assessment and Training Support System for Cognitive Ability
for Special Children
DOWNLOAD
FULL PDF
Authors: Tan
Meng Kuan, Eko Supriyanto, Yeo Kee Jiar, Yap Ee Han
Abstract: In definition, special children include children who are having Down
syndrome, autism, global delay, epilepsy, slow learner and others. In this
study, the special children are focused on children with Down syndrome. Down
syndrome occurs due to an extra copy of chromosome 21 in the children’s
chromosome. Early intervention Program (EIP) is a systematic program with
therapy, exercises, and activities which designed to help children especially
special children. Cognitive development is the construction of thought
processes, which is one of the most important skills that have to be developed
for Down syndrome children in order to lead a normal life. This support system
is focused mainly to help them improving their logical thinking and memory
skills. This cognitive assessment and training support system utilizes the
radio frequency identification (RFID) technology implemented in C Sharp
programming language. The completed system was then tested and feedback was
obtained from parents or trainers of Down syndrome children. The results show
that the system can generate results in graphical form stably and training for
improving the cognitive ability of the children is reliable based on global
recognized curriculum. In conclusion, the system can be used in order to help
trainers or parents to improve the cognitive ability of children with Down
syndrome.
Keywords: Support system, cognitive ability, special children, RFID, Early
Intervention Program, Assessment and Training
Title of the Paper: Fuzzy
ART for the Document Clustering By Using Evolutionary Computation
DOWNLOAD
FULL PDF
Authors:
Shutan Hsieh, Ching-Long Su, Jeffrey Liaw
Abstract: Many clustering techniques have been widely developed in order to
retrieve, filter, and categorize documents available in the database or even
on the Web. The issue to appropriately organize and store the information in
terms of documents clustering becomes very crucial for the purpose of
knowledge discovery and management. In this research, a hybrid intelligent
approach has been proposed to automate the clustering process based on the
characteristics of each document represented by the fuzzy concept networks.
Through the proposed approach, the useful knowledge can be clustered and then
utilized effectively and efficiently. In literature, artificial neural network
have been widely applied for the document-clustering applications. However,
the number of documents is huge so that it is hard to find the most
appropriate ANN parameters in order to get the most appropriate clustering
results. Traditionally, these parameters are adjusted manually by the way of
trial and error so that it is time consuming and doesn’t guarantee an optimum
result. Therefore, a hybrid approach incorporating an evolutionary computation
(EC) approach and a Fuzzy Adaptive Resonance Theory (Fuzzy-ART) neural network
has been proposed to adjust the Fuzzy-ART parameters automatically so that the
best results of the document clustering can be obtained. The proposed approach
is tested by using ninety articles in three different fields. The experimental
results show that the proposed hybrid approach could generate the most
appropriate parameters of Fuzzy-ART for getting the most desired clusters as
expected.
Keywords: Documents Clustering, Evolutionary Computation, Fuzzy ART, Knowledge
Discovery
Title of the Paper: A
Power-Efficient Secure Routing Protocol for Wireless Sensor Networks
DOWNLOAD
FULL PDF
Authors:
Iman Almomani, Emad Almashakbeh
Abstract: Wireless Sensor Network (WSN) is a hot research area due to its use
in many military and civilian applications. WSN consists of distributed small,
low power and limited capabilities sensors that are scattered in the network
field to sense different parameters in the environment. The sensed data will
be sent to a more powerful node called sink node (Base Station). The sink node
is usually connected to a power supply and is used to process the data and to
connect the sensor network to other networks like the Internet. One of the
major challenges in such networks is how to provide connection between the
sensors and the sink node and how to exchange the data while maintaining the
security requirements and taking into consideration their limited resources in
terms of energy, memory and available bandwidth. In this paper a
power-efficient, secure routing protocol is proposed to help managing the
resources in WSN networks. The proposed protocol is a hybrid of two major
categories of protocols in WSNs, namely tree-based and cluster-based
protocols. The proposed protocol is combined with a Fuzzy Logic inference
system to aid in the selection of the best route based on a combination of
three factors: the path length, the available power and the node reputation
resulted from the Intrusion Detection System (IDS). The proposed protocol uses
three Fuzzy Inference Systems (FIS) that are implemented in two tiers. Tier
one will choose the best route in terms of shortest length and high power.
Tier two provides a security assessment for the selected route.
Keywords: Wireless Sensor Network (WSN), Security; Routing, Power Saving,
Clustering, Intrusion Detection System (IDS), Fuzzy Logic
Title of the Paper: Sound-Colour
Synaesthesia, Chromatic Representation of Sounds Waves in Java Applets
DOWNLOAD
FULL PDF
Authors:
Stela Dragulin, Livia Sangeorzan, Mircea Parpalea
Abstract: The paper herein presents a way in which sound waves are
chromatically represented in Java language. It intends to be, as its’ title
reveals, an instructional material providing help in developing interactive
tools for efficient education in sciences, especially in the field of
acoustics. The developed java applets illustrate the main aspects regarding to
sound phenomena. It realizes a direct correspondence between visible
frequencies of the light and frequencies of sound waves via a sound wave
frequency range transformation into a linear scale. The construction of the
natural light spectrum was explained in detail, indicating the source code
used in applets. Java written software was developed for converting sound wave
intensities in colour saturation coefficients. The application allows further
development in order to generate a colour visual interpretation of the musical
atmosphere and also to develop the performer’s creativity. The article
addresses the reality in a sensitive manner creating in an undifferentiated
manner bridges between face colours and the artistic sensitivity of the human
hearing.
Keywords: RGB light, Java Applets, sounds waves, music, education
Title of the Paper: Comparison
of a Crossover Operator in Binary-Coded Genetic Algorithms
DOWNLOAD
FULL PDF
Authors:
Stjepan Picek, Marin Golub
Abstract: Genetic algorithms (GAs) represent a method that mimics the process
of natural evolution in effort to find good solutions. In that process,
crossover operator plays an important role. To comprehend the genetic
algorithms as a whole, it is necessary to understand the role of a crossover
operator. Today, there are a number of different crossover operators that can
be used in binary-coded GAs. How to decide what operator to use when solving a
problem? When dealing with different classes of problems, crossover operators
will show various levels of efficiency in solving those problems. A number of
test functions with various levels of difficulty has been selected as a test
polygon for determine the performance of crossover operators. The aim of this
paper is to present a larger set of crossover operators used in genetic
algorithms with binary representation and to draw some conclusions about their
efficiency. Results presented here confirm the high-efficiency of uniform
crossover and two-point crossover, but also show some interesting comparisons
among others, less used crossover operators.
Keywords: Evolutionary computation, Genetic algorithms, Crossover operator,
Efficiency, Binary representation, Test functions
Issue
10, Volume 9, October 2010
Title of the Paper: Probabilistic
Model for Accuracy Estimation in Approximate Monodimensional Analyses
DOWNLOAD
FULL PDF
Authors:
Carlo Dell'Aquila, Francesco Di Tria, Ezio Lefons, Filippo Tangorra
Abstract: Approximate query processing is often based on analytical
methodologies able to provide fast responses to queries. As a counterpart, the
approximate answers are affected with a small quantity of error. Nowadays,
these techniques are being exploited in data warehousing environments, because
the queries devoted to extract information involve high-cardinality relations
and, therefore, require a high computational time. Approximate answers are
profitably used in the decision making process, where the total precision is
not needed. Thus, it is important to provide decision makers with accuracy
estimates of the approximate answers; that is, a measure of how much reliable
the approximate answer is. Here, a probabilistic model is presented for
providing such an accuracy measure when the analytical methodology used for
decisional analyses is based on polynomial approximation. This probabilistic
model is a Bayesian network able to estimate the relative error of the
approximate answers.
Keywords: Analytic query processing, Approximate query answer, Polynomial
approximation, Accuracy estimation, Probabilistic model
Title of the Paper: The
Relative Potential Field as a Novel Physics-Inspired Method for Image Analysis
DOWNLOAD
FULL PDF
Authors: X.
D. Zhuang, N. E. Mastorakis
Abstract: In this paper, the relative potential field is proposed as a novel
image transform inspired by the physical electro-static field. A general form
of image potential field is presented, based on which the relative potential
is defined by introducing the factor of gray-scale difference into the
potential field. The properties of the relative potential are investigated
experimentally and analyzed, based on which an image segmentation method is
proposed by region division and merging in the relative potential field.
Experimental results prove the effectiveness of the proposed image
segmentation method, and also indicate the promising application of the
relative potential in image processing tasks.
Keywords: Relative potential field, electro-static, image transform, image
segmentation
Title of the Paper: A
Study on the Feasibility of the Inverse Maximum Flow Problems and Flow
Modification Techniques in the Case of Non-Feasibility
DOWNLOAD
FULL PDF
Authors:
Adrian Deaconu, Eleonor Ciurea, Corneliu Marinescu
Abstract: The feasibility of the inverse maximum flow problems (denoted IMFG)
is studied. The feasibility can be tested in linear time. In the case of IMFG
not being feasible, a new inverse combinatorial optimization problem is
introduced and solved. The problem is to modify as little as possible the flow
so that the problem becomes feasible for the modified flow. An example is
presented.
Keywords: Inverse optimization, maximum flow
Title of the Paper: Application
of Genetic Algorithm for Designing Cellular Manufacturing System Incrementally
DOWNLOAD
FULL PDF
Authors: J.
Rezaeian, N. Javadian, R. Tavakkoli-Moghaddam
Abstract: One important issue regarding the implementation of cellular
manufacturing systems relates to deciding whether to convert an existing job
shop into a cellular manufacturing system comprehensively in a single go, or
in stages incrementally by forming cells one after the other taking the
advantage of the experiences of implementation. In this paper two heuristic
methods based on multi-stage programming and genetic algorithm are proposed
for incremental cell formation. The results show that the multi-stage
programming solves small problems faster than exact algorithms such as branch
and bound. A heuristic procedure based on genetic algorithm is developed on
the multi-stage programming to test larger problem sizes.
Keywords: Incremental cell formation, Cellular manufacturing system,
Multi-Stage programming, Genetic algorithm, Job shop, Comprehensive cell
formation
Title of the Paper: Romanian
Black Sea Resorts. Study on the Summer Offers
DOWNLOAD
FULL PDF
Authors:
Mirela-Catrinel Voicu
Abstract: In Romania, the Black Sea seaside is one of the most popular places
for the summer holidays. In this paper we present a database model including
information about resorts, hotels, hotel star classifications, hotel room
types, room amenities, hotel facilities, the holiday time period, the number
of days for a holiday stay, meal types, rates for accommodation, etc. We built
this database model based on data presented in travel agencies' catalogues. To
explore the database data, we apply algorithms of aggregation. Our study is
focused on detecting the best rates (depending on tourist preferences) for the
summer holiday according to some other features.
Keywords: Tourism, seaside summer offer, database, algorithms
Title of the Paper: Electronic
Tools for Support of Strategic Human Resource Management
DOWNLOAD
FULL PDF
Authors:
Elissaveta Gourova, Kostadinka Toteva
Abstract: The present paper considers the importance of human resources
management for the success of organisations in the knowledge society. It
provides a short theoretical background on commitment and motivation of
employees and the importance of human resource management for meeting
organisational goals and achieving its strategy. The deployment of information
and communication technologies in this process facilitates the work of
managers, as well as provides them with better tools for enhancing employees’
articipation and involvement in the organisations processes. The paper
presents new electronic tools developed as an extension to existing human
resources management software, aimed at collecting objective and subjective
feedback from employees. An example of the application of these tools is
provided and an analysis of the results of the improvement of human resources
management in the organisation.
Keywords: Software applications, employees’ commitment, motivation, human
resources management
Title of the Paper: HDS:
a Software Framework for the Realization of Pervasive Applications
DOWNLOAD
FULL PDF
Authors:
Agostino Poggi
Abstract: Nowadays pervasive computing is one of the most active research
fields because it promises the creation of environments where computing and
communication devices are gracefully integrated with users so that
applications can provide largely invisible support for tasks performed by
users. This paper presents a software framework, called HDS (Heterogeneous
Distributed System), that tries to simplify the realization of pervasive
applications by merging the client-server and the peer-to-peer paradigms and
by implementing all the nteractions among the processes of a system through
the exchange of typed messages and the use of composition filters for driving
and dynamically adapting the behavior of the system. Typed messages and
computational filters are the elements that mainly characterize such a
software framework. In fact, typed messages can be considered an
object-oriented “implementation” of the types of message defined by an agent
communication language and so they are means that make HDS a suitable software
framework both for the realization of multi-agent systems and for the reuse of
multi-agent model and techniques in non-agent based systems. Composition
filters drive and adapt the behavior of a system by acting on the exchange of
messages. In fact, on the one hand, composition filters can constrain the
exchange of messages (e.g., they can block the sending/reception of some
messages to/from some processes), they can modify the flow of messages (e.g.,
they can redirect some messages to another destination) and they can
manipulate messages (e.g., they can encrypt and descript messages). On the
other hand, processes can dynamically add and remove some composition filters
to adapt the behavior of a system to any hardware and software new
configuration and to any new user requirement.
Keywords: Typed messages, Composition filters, Software framework, Pervasive
systems, Multi-agent systems, Java
Title of the Paper: An
Algorithm for Determination of the Guillotine Restrictions for a Rectangular
Cutting-Stock Pattern
DOWNLOAD
FULL PDF
Authors:
Daniela Marinescu, Alexandra Baicoianu
Abstract: Starting from a two-dimensional rectangular Cutting-Stock pattern
with gaps, this paper is focuses on the problem of determination if the
pattern is with guillotine restrictions or not and proposes an algorithm for
solving it. First we present two new graph representations of the cutting
pattern, weighted graph of downward adjacency and weighted graph of rightward
adjacency. Using these representations we propose a method to verify
guillotine restrictions of the pattern which can be apply for cutting-stock
pattern with gaps but also for the cutting or covering pattern without gaps
and overlapping.
Keywords: Two-dimensional cutting-stock problems, cutting pattern
representation, guillotine restrictions
Title of the Paper: Modelling
of Web Domain Visits by IF-Inference System
DOWNLOAD
FULL PDF
Authors:
Vladimir Olej, Petr Hajek, Jana Filipova
Abstract: This paper presents basic notions of web mining and fuzzy inference
systems based on the Takagi-Sugeno fuzzy model. On the basis of this fuzzy
inference system and IF-sets introduced by K.T. Atanassov novel IF-inference
systems can be designed. Thus, an IF-inference system is developed for time
series prediction. In the next part of the paper we describe web domain visits
prediction by IF-inference systems and the analysis of the results.
Keywords: Web mining, IF- inference system, fuzzy inference system, web domain
visits, prediction, time series
Title of the Paper: Grid
Infrastructure Development as Support for e-Science Services
DOWNLOAD
FULL PDF
Authors:
Gabriel Neagu, Alexandru Stanciu
Abstract: During last years the e-Infrastructure concept has been extensively
elaborated and promoted as an essential pillar for the implementation of ERA
(European Research Area). The main components of this infrastructure are the
network for education and research and the Grid infrastructures. At the
European level important efforts and resourced have been devoted to the
development of both components, with joint financial support provided by
Framework Programmes 6 and 7 of EU and national research programmes. At the
national level, the high-speed communication network for education and
research, and national grid infrastructure for esearch are included in the
list of priority investment projects in the Information and Communications
Technologies domain. The main financial support for the development of these
projects is provided by the Sectorial Operational Programme “Increase of
Economic Competitiveness”. ICI Bucharest is among beneficiary organizations of
this support. This paper presents the European context for e-Infrastructure
development as support for e-Science concept implementation, the evolution and
current status of Grid infrastructures at the European and national levels, a
short review of the development of Grid computing at ICI Bucharest, the main
objectives and activities of the structural funds grant awarded to the
institute for a significant upgrade of the current grid site RO-01-ICI.
Keywords: E-Infrastructure, e-Science, Grid infrastructure, EGEE, SEE-GRID,
EGI, RoGrid, GridMOSI, Virtual organization, RO-01-ICI grid site
Title of the Paper: RC5-Based
Security in Wireless Sensor Networks: Utilization and Performance
DOWNLOAD
FULL PDF
Authors:
Juha Kukkurainen, Mikael Soini, Lauri Sydanheimo
Abstract: Information transferred in a wireless sensor network can be
sensitive, hence it is vital to secure the data on the network. Enhancing the
network’s security affects the network operation, by increasing the data’s
handling time. In this paper, the trade-offs between enhanced security and
sensor network performance is discussed. The studies concentrate on the
increase in computation time and energy consumption as enhanced security
features and levels are utilized. This paper presents, RC5-based encryption
and CMAC authentication, used to achieve data confidentiality, freshness,
replay protection, authentication, and integrity. These features enhance data
security but can also decrease sensor network operability, because of the
added load in computation and communication. By selecting a suitable algorithm
and operation conditions for encryption and authentication, the data security
in wireless sensor networks can be improved with minor resource losses.
Keywords: Consumption, KILAVI sensor network platform, performance trade-offs,
wireless sensor network security
Title of the Paper: Generating
Logic Representations for Programs in a Language Independent Fashion
DOWNLOAD
FULL PDF
Authors:
Ciprian-Bogdan
Chirila,
Calin Jebelean, Titus Slavici, Vladimir Cretu
Abstract: In today’s software engineering program analysis and program
transformation are operations that strongly rely on software models. One
important share in this direction is held by logic based models, described in
a declarative language such as Prolog. There are some approaches used to
represent information about software systems while at the same time preserving
the logic relations between entities, but they are normally limited to
software systems written in a certain programming language. There are also
language independent approaches to logic based representation of programs, but
they are usualy based on syntactic information about the modeled program and
provide little information about the logic relations between entities at the
semantic level. This paper describes a methodology that would unite the two
kinds of approaches, being both language independent and expressive at the
semantic level at the cost of a more complex generation process.
Keywords: Program transformation, semantical actions , metamodel conforming
logic representation
Title of the Paper: SVM-based
Supervised and Unsupervised Classification Schemes
DOWNLOAD
FULL PDF
Authors:
Luminita State, Iuliana Paraschiv-Munteanu
Abstract: The aim of the research reported is to propose a training algorithm
for support vector machine based on kernel functions and to test its
performance in case of non-linearly separable data. The training is based on
the Sequential Minimal Optimization introduced by J.C. Platt in 1999. Several
classifications schemes resulted by combining the SVM and the 2-means methods
are proposed in the fifth section of the paper. A series of conclusions
derived experimentally concerning the comparative analysis of the performances
proved by the proposed methods are summarized in the final part of the paper.
The tests were performed on samples randomly generated from Gaussian
two-dimensional distributions, and on data available in Wisconsin Diagnostic
Breast Cancer Database.
Keywords: Support Vector Machine, Pattern recognition, Statistical learning
theory, Kernel functions, Principal Components Analysis, k-means Algorithm
Title of the Paper: Identifying
the Course Network Structures Based upon Records of In-service Learning
Database
DOWNLOAD
FULL PDF
Authors:
Lung-Hsing Kuo, Hsieh-Hua Yang, Jui-Chen Yu, Hung-Jen Yang, Lydia Lin
Abstract: The purpose of this study focused on the social network structure of
in-service development for the Chinese literature expertise teachers in Taiwan
High school. Social network analysis methods include the core measures,
identification of groups to analyze the role, figure based on the statistical
analysis and so on. In this study we use 2009 National Teacher in-service
Education Information Network (http://inservice.edu.tw/) database to obtain
5,417 sample resources. The expected result should be able to understand
Chinese literature teacher in-service refresher training expertise in the
overall network of centricity, teachers participate in studies course subject
categories and countries connected, education seminar for subgroups generated
number, subgroups on overall network impact, etc.
Keywords: In-service development, Social network structure, High school,
UCINET, Chinese literature teacher
Title of the Paper: A
Framework for Schema Matcher Composition
DOWNLOAD
FULL PDF
Authors:
Balazs Villanyi, Peter Martinek, Bela Szikora
Abstract: Enterprise schemas tend to be different, which is the key issue when
the seamless communication between systems is of utmost importance. One
solution could be the development of standards which then could be enforced,
however, vendors seem to be reluctant to comply with them and communication
between existing and legacy systems still remains unsolved. Other solution
could be schema matching, which resolves the matter on data level and the
process do not require vendors to adhere to any kind of predefined schemas.
The task is very complex on the other hand, even for human evaluators. Some of
the solutions aired so far are fairly promising, however, their accuracy
varies. Our goal was to find means by which the results could be enhanced. We
have been focusing on the development of solutions which do not change the
concept of the algorithms, but fine-tune them so that they achieve higher
accuracy. Our experiments showed that the results of the matchers may vary on
a large scale depending on the actual parameter settings. It has also turned
out that the parameters should set for each scenario individually, as the best
results are warranted only this way. In this article, we present a general
approach for optimally dissembling existing solutions, and combining some of
the resulting components in a way that the new matcher supersedes the donor
ones. The composition and the optimal parameter setting combined provide a
framework, which is capable of an enhanced performance. Improved accuracy
lessens the need for the follow-up human supervision.
Keywords: Schema matching, optimization, algorithm analysis, performance
improvement, framework definition
Issue
11, Volume 9, November 2010
Title of the Paper: Assessment
of Evapotranspiration Using Remote Sensing Data and Grid Computing and
Application
DOWNLOAD
FULL PDF
Authors:
Cristina Serban, Carmen Maftei, Alina Barbulescu
Abstract: The estimation of evapotranspiration (ET) plays an essential role in
all activities related to water resources management. In this study we
developed a procedure to calculate the spatial distribution of
evapotranspiration using remote sensing data. What distinguishes it from other
procedures is the use of Grid Computing technique to calculate the
evapotranspiration at regional scale and to manage the distributed data sets.
One other merit is that it requires a small number of inputs, all other data
such net radiation, soil heat flux, albedo, etc., were obtained from remote
sensing data. This procedure calculates also the NDVI (Normalized Difference
Vegetation Index) and LST (Land Surface Temperature) and offer as a result the
corresponding thematic maps. A Web-based client interface has been also built
in order to provide the application with Internet-based accessibility. The
procedure has been applied to the Dobrogea region located in the south-east of
Romania, using a Landsat ETM+ image acquired in 7th June 2000. The
evapotranspiration was retrieved during satellite overpass and integrated for
24 hours on pixel-by-pixel base for daily estimation. The estimated
evapotranspiration has been compared with local measurements. The results
obtained are promising and appear to provide acceptable estimation over the
study area.
Keywords: Remote sensing, Grid computing, evapotranspiration, land surface
temperature
Title of the Paper: Municipal
Revenue Prediction by Ensembles of Neural Networks and Support Vector Machines
DOWNLOAD
FULL PDF
Authors:
Petr Hajek, Vladimir Olej
Abstract: Municipalities have to to pay increasing attention to the importance
of revenue prediction due to fiscal stress. Currently, judgmental,
extrapolative, and deterministic models are used for municipal revenue
prediction. In this paper we present the designs of neural network and support
vector machine ensembles for a real-world regression problem, i.e. prediction
of municipal revenue. Base learners, as well as linear regression models are
used as benchmark methods. We prove that there is no single ensemble method
suitable for this regression problem. However, the ensembles of support vector
machines and neural networks outperformed the base learners and linear
regression models significantly.
Keywords: Municipal revenue, prediction, regression, support vector machine
ensembles, modelling, neural network ensembles
Title of the Paper: Performance
Evaluation of Intel's Quad Core Processors for Embedded Applications
DOWNLOAD
FULL PDF
Authors:
Jareer H. Abdel-Qader, Roger S. Walker
Abstract: Recently, multiprocessing is implemented using either chip
multiprocessing (CMP) or Simultaneous multithreading (SMT). Multi-core
processors, represent CMP processors, are widely used in desktop and server
applications and are now appearing in real-time embedded applications. We are
investigating optimal configurations of some of the available multi-core
processors suitable for developing real-time software for a multithreaded
application used for pavement performance measurements. For the application
discussed in this paper we are considering the use of either the Intel core 2
quad or the core i7 (a quad core processor with hyper threading (HT)
technology.) Processor performance is a major requirement in this set of
real-time, computational intensive embedded applications. The performance of
both processors is measured and evaluated using single and multithreaded
workloads supplied by different benchmark suites. As for the core i7 processor
we also provide an evaluation for the HT technology implemented in each core
of this processor.
Keywords: Quad core processors, Multi-threading, Performance Evaluation,
Benchmark, Memory bandwidth, Memory Latency
Title of the Paper: Design
and Implementation of Real-Time EP80579 Based Embedded System
DOWNLOAD
FULL PDF
Authors:
Jareer H. Abdel-Qader, Roger S. Walker
Abstract: With the advances in integration of different units such as I/O
controllers and network interfaces in a single chip, Intel introduced the low
power EP80579 embedded processor. This processor is the first IA based
system-on-chip (SoC) with an IA-32 processor core, North and South Bridges,
and integrated Accelerator and network interface. In this paper we will show
main steps to design a real-time embedded system along with identifying the
hardware and software requirements to implement such system. The embedded
system introduced in this work will perform several tasks regarding road
surface conditions based on multiple sensor readings. The sensor data will be
processed in real-time to reconstruct the road profile and provide an estimate
for the texture contents of the road surface. The EP80579 SoC will be used in
the design of such a system. Modeling will be done with the aid of UML profile
for modeling and analysis of real-time and embedded (MARTE) systems.
Keywords: System-on-a-chip, Modeling Real-time systems, parallel processing
modeling, MARTE, Embedded Application, Road Profiler
Title of the Paper: Supplying
Goods and Materials to the Offshore Islands Using ILP
DOWNLOAD
FULL PDF
Authors:
Yu-Cheng Lin, Shin-Jia Chen, Ping-Liang Chen, Jui-Jung Liu, Fan-Chen Tseng,
La-Ting Song
Abstract: Many of problems are proved to be NP-complete or NP-hard problems.
To solve these problems and to obtain the optimal solutions, it is usual to
transfer the problems to Integer Linear Programming formulations. Coast Guard
Administration (CGA), an agency intermingles jurisdiction over both coastal
and oceanic affairs, CGA is in charge of harbor security check, resolving
fishery conflict, investigating smuggling, and illegal immigration or
emigration on various outlying islands, including Kinmen, Mazu, Penghu,
Pengjiayu, Guishandao, Xiaoliuqiu, Ludao and Lanyu. To supply livelihood
materials, including drinking water, rice, and oil, for those officers station
on different outlying islands, becomes a critical issue. In the paper, we will
discuss the demand of the rice and the drinking water for the supply of the
people on the set of large islands. This research is to explore and assess the
model of supply of livelihood material to those outlying islands. By
calculating and fitting an optimally supplying model, this research expects
that such supplying model can decrease the budget or cost of supply and
improve the quality of livelihood materials for the stationing officers on
outlying islands.
Keywords: Integer Linear Programming, Supplying, Coast Guard Administration,
Offshore islands
Title of the Paper: The
Effect of Training Set Size for the Performance of Neural Networks of
Classification
DOWNLOAD
FULL PDF
Authors:
Hyontai Sug
Abstract: Even though multilayer perceptrons and radial basis function
networks belong to the class of artificial neural networks and they are used
for similar tasks, they have very different structures and training
mechanisms. So, some researchers showed better performance with radial basis
function networks, while others showed some different results with multilayer
perceptrons. This paper compares the classification accuracy of the two neural
networks with respect to training data set size, and shows the performance of
the two neural networks can be differently dependent on training data set
size. Experiments show the tendency that multilayer perceptrons have better
performance in relatively larger training data sets for some data sets, even
though radial basis function networks have better performance in relatively
smaller training set size for the same data sets. The experiment was done with
four real world data sets.
Keywords: Neural networks, multilayer perceptrons, radial basis function
networks, training data set, prediction
Title of the Paper: A
Semantic Schema - based Approach for Natural Language Translation
DOWNLOAD
FULL PDF
Authors:
Mihaela Colhon, Nicolae Tandareanu
Abstract: Processing natural language statements to obtain equivalent
translations in a different language has long been an area of research in
Artificial Intelligence. In machine translation systems, an intermediate
representation of inputs is necessary to express the result of the phrase
analysis. These representations treat each phrase as a character string and
construct the corresponding syntactic and/or semantic representation
structure. In the proposed approach, representation is made by means of a
semantic network type structure, named semantic schema, with focus on the
dependency relations existing between the sentence words. The resulted schema
components are further evaluated (using an interpretation system) with the
corresponding constructions from the language into which translation occurs.
Keywords: Semantic Schema, Natural Language, Machine Translation,
Morpho-syntactic data, Dependency Relationships
Title of the Paper: Knowledge
Processing in Contact Centers using a Multi-Agent Architecture
DOWNLOAD
FULL PDF
Authors:
Claudiu Ionut Popirlan
Abstract: The explosion of multimedia data, the continuous growth in computing
power, and advances in machine learning and speech and natural language
processing are making it possible to create a new breed of virtual intelligent
agents capable of performing sophisticated and complex tasks that are
radically transforming contact centers. These virtual agents are enabling
ubiquitous and personalized access to communication services from anywhere. As
contact centers grow and become more complex in their function and
organization, the knowledge processes become more formal to ensure consistency
of advice and efficiency. This paper suggests a multi-agent approach for
distributed knowledge processing and discusses the use of enhanced mobile
agent architecture (EMA) [12] in context of contact centers to advance and
frame future discussion of these knowledge intensive environments. We prove
the benefits of the enterprise resource planning (ERP) management using
multi-agent systems for contact centers with distributed knowledge,
considering an adequate case study and providing experimental results.
Keywords: Multi-Agent Systems, Software Agent, Mobile Agent, Contact Centers,
Distributed Knowledge, Enterprise Resource Planning (ERP)
Title of the Paper: A
Computerized Technique for Multi-Criteria Analysis of Seismic Disasters -
GESKEE Database
DOWNLOAD
FULL PDF
Authors:
Cosmin Filip, Cristina Serban, Mirela Popa, Gabriela Draghici
Abstract: Econometric scaling approach of vulnerability and risk on building
stock to major seismic events is essential for understanding the impact and
the consequences of these earthquakes. It also has a predictive value for loss
estimation of next events. Due to use of a large amount of information in such
multi-criteria approaches, it is a high necessity to develop computerized
techniques to automate the calculation process, to manage the data easier and
also to represent the results in a manner as suggestive as possible.
Therefore, the paper presents the GESKEE (Global Econometric Scaling using
Knowledge on Earthquake Effects) Database developed by authors which is an
indispensable tool for econometric scaling approach for seismic risk
assessment. For this aim, the database was structured starting from special
requirements imposed by GESKEE Disaster Scale (2010 version). As a result,
according to necessity of econometric calculation and graphical representation
of GESKEE Disaster Scale (2010 version), a flexible and helpful database
(GESKEE Database) was developed. Actually, building up this Database was the
main key to improving, developing, updating and to a better interpretation of
the GESKEE Disaster Scale (from 1998 version to 2010 version). The results are
promising and appear to provide an increased predictive value for the GESKEE
Disaster Scale. We consider that this application will be greatly useful and
convenient for a transparent and a more efficient seismic risk assessment and
loss scaling, providing a better understanding of past seismic events impact
and so, a real help in calibration of earthquake disaster prevention policies.
In order to point out the innovative edge of GESKEE Database, which is an
important tool in social and economic quantification of seismic vulnerability
of building stocks and earthquake loss, we present some examples of graphic
representations and also some interpretations of the results.
Keywords: GESKEE Database, GESKEE Disaster Scale, seismic risk assessment,
econometric scale, Earthquake, seismic vulnerability, disaster mitigation
Title of the Paper: A
New System Architecture for Flexible Database Conversion
DOWNLOAD
FULL PDF
Authors:
Siti Z. Z. Abidin, Suzana Ahmad, Wael M. S. Yafooz
Abstract: Much research has been undertaken to work on database sharing,
integration, conversion, merging and migration. In particular, database
conversion has attracted researchers’ attention due to the rapid change in the
computer technology. There are also several tools available on the Web for
free usage on handling database conversion. All of these works are focusing on
the relational database which consists of an integrated collection of
logically related records. Database plays an important role in an area of
computing when there is a lot of data and information need to be stored and
retrieved. Today, databases are used in many disciplines such as business,
education, general administration, medicine and many more. Research in
database works have been advanced from file management system to data
warehousing with the discussion of how a database can be significantly
sustainable and have the potential to be added and modified to suit the
current situation and technology. In this paper, we propose a new method on
doing database conversion by providing a single master database that can
accept multiple databases of any type through the use of Java Database
Connectivity (JDBC) and application program interface (API). The key
contribution of this method is the ability to accept a single record, multiple
records or the whole records of a database to be converted into any other
database type. Thus, any existing form of database can be integrated and
updated without the need to design new database system for coping with the new
technology. In this way, the old or existing databases can be used for an
unlimited lifetime and a broader scope of application domains.
Keywords: Database, Data sharing, Integration, Conversion, Access, Integrity,
Migration
Title of the Paper: Threats
to Voice over IP Communications Systems
DOWNLOAD
FULL PDF
Authors:
Miroslav Voznak, Filip Rezac
Abstract: This article deals with various techniques of VoIP attacks and VoIP
communication security. These threats are divided in several categories
according to their specific behaviour and their impact on the affected system.
We describe effective methods to prevent or mitigate these attacks. Our work
was especially focused on Spam over Internet Telephony (SPIT) as a real threat
for the future and we consider spam in IP telephony to be very serious due to
situation we face in e-mail communication. We have developed both an AntiSPIT
tool defending communication systems against SPIT attacks and a tool
generating SPIT attacks. AntiSPIT represents an effective protection based on
statistical blacklist and works without participation of the called party
which is significant advantage, AntiSPIT was implemented into Asterisk
open-source platform and became one way of protection against the voice spam
expected in near future.
Keywords: IP telephony, DoS, Security, Attack, AntiSPIT, Asterisk
Title of the Paper: Analysis
of Intra-Person Variability of Features for Off-line Signature Verification
DOWNLOAD
FULL PDF
Authors:
Bence Kovari, Hassan Charaf
Abstract: One of the major challenges in off-line signature verification is
the fact that a person’s own signature is influenced by a number of external
and internal factors. This influence results in a high variability even
between signatures written by the same signer. This paper proposes a method
which is able to model the intra-person variability of a signature feature and
also to identify and eliminate the effects of external factors. To demonstrate
the efficiency of the algorithm, a sample signature verifier is constructed
and evaluated on the Signature Verification Competition 2004 database.
Experiments have shown that by using 3 features (endings, loops and skew
vectors) an average error rate of 12% can be achieved by the system. These
results may be further improved by increasing the number of features, used
during the comparison of signatures.
Keywords: Signature verification; off-line; classification, normal
distribution
Title of the Paper: Identifying
the Technology Trend of Visual Language Researches
DOWNLOAD
FULL PDF
Authors: Yu
L. Gingchi, Shih-Fann Chao, Hung-Jen Yang
Abstract: The major developments of visual language enhancement and brain
visualize that will change our future knowledge of ecological but also will
lead us to a glimpse into the brain, mysterious performance. Knowledge of
graphic, drawing, information design, visual communication, visual language,
and visual literacy was important for our ability to better produce effective
messages. In this study, visual learning would be explored by identifying
characteristics of visual language and its converging technology. According to
theories of visual perceptual cognitive and visualizes’ attributes, text
design, representation, image design, graphic design and brain processes were
discussed. The goals of visual language and recording brain activity were
identified based upon meta-analysis.
Keywords: Visual Language, Visual Converging Technology, Brain Technology
Issue
12, Volume 9, December 2010
Title of the Paper: A
New Image Edge Detection Method Inspired from Biological Visual Cortex
DOWNLOAD
FULL PDF
Authors:
Zuojin Li, Liukui Chen, Hongpeng Yin, Jia Yu
Abstract: Gabor function can be expressed as the alternate dual-function of
the positioning of the characteristics and selectivity of the spatial
frequency of the receptive field, which can effectively describe the property
of the receptive field of the simple cells in human visual cortex. However,
the existing literature provides no strict mathematical proof for this fact.
This work integrates Gabor function into the integral framework, and proves
that the integral transformation of Gabor nuclear possesses the quality of
responding to the edge stimuli as the visual cortex. Experiments show that the
integral transformation can extract the features of image edge.
Keywords: Gabor function, Integral transformation, Edge detection
Title of the Paper: Performance
Analysis of Maintaining Mobile-Based Social Network Models
DOWNLOAD
FULL PDF
Authors:
Peter Ekler, Mark Asztalos
Abstract: Although social networks are becoming more and more important in
everyday life, their support is still not satisfactory in mobile devices. The
automatic synchronization of the phone books in mobile phones with the data of
the members of the social networks needs special and efficient algorithms.
These algorithms cover the management of the global network model and the
client software that runs on different mobile devices. In this work, we
present Phonebookmark, a mobile-based social network implementation, which has
been tested by hundreds of registered members. We present the mathematical
model of the system in general that makes formal analysis possible. We
introduce algorithms for the automatic discovery of similarities between
contacts and members and for maintaining these similarities in the global
models. We show an estimation of the complexity of the presented algorithms,
which enables to extend other existing social networks by capabilities for
supporting mobile devices as specified in this paper.
Keywords: Social networks, Modeling, Graph transformation, Complexity
estimation, Mobile phones, Phonebook
Title of the Paper: Effect
of Serialized Routing Resources on the Implementation Area of Datapath
Circuits on FPGAS
DOWNLOAD
FULL PDF
Authors:
Sebastian Ip, Andy Gean Ye
Abstract: In this work, we investigate the effect of serialization on the
implementation area of datapath circuits on FPGAs. With ever-increasing logic
capacity, FPGAs are being increasingly used to implement large datapath
circuits. Since datapath circuits are designed to process multiple-bit wide
data, FPGA routing resources, which typically consist of a significant amount
of FPGA area, are routinely being used to transport multiple-bit wide signals.
Consequently, it is important to design efficient routing architectures for
transporting multiple-bit wide signals on FPGAs. Serialization, where several
bits of a signal are first time-multiplexed and then transported over a single
wire, has been effectively used to increase the I/O bandwidth of FPGAs. Recent
work has proposed to use serialization to increase the area efficiency of FPGA
routing resources for transporting multiple-bit wide signals. Most of the
work, however, has focused on circuit-level design issues. Little work has
been done on the overall effect of serialization on the area efficiency of
FPGAs. In this work, we investigate the overall effect of serialization on the
area efficiency of FPGAs. We propose a detailed FPGA routing architecture,
which contains a set of serialization routing resources, and its associated
routing tool. Using the architecture and the tool, we measure the effect of
serialization on active area and track count. We found that, for benchmarks
that contain four-bit wide datapath circuits, serialization can achieve a
maximum active area reduction of 6.4% and a routing track reduction of 29%.
Keywords: Field-Programmable Gate Arrays, Serial Routing Resources, Routing,
Area Efficiency
Title of the Paper: Toward
a Unique Person Identifier Model in the Slovak Republic
DOWNLOAD
FULL PDF
Authors:
Ladislav Huraj
Abstract: A national identification number of natural persons is used by the
governments of many countries in various ways. The main objective is to
improve security in online services and unify authentication. In the Slovak
Republic, National identification number based on birth date is currently
used, which does not correspond with EU legislation. In our article we
describe our new prototypes of Unique Person Identifier prepared on the basis
of request of the Ministry of Interior of the Slovak Republic. The scheme is
based on the idea of the Austrian system. Moreover, an introduction of
proposal of an electronic system for identity management (IDM) in the Slovak
Republic is presented.
Keywords: Identification, Unique person identifier, Sector-specific personal
identifier, Meaningless identifier
|
|
|