WSEAS CONFERENCES. WSEAS, Unifying the Science

Main Page of the Journal                                                           Main Page of the WSEAS

WSEAS TRANSACTIONS on
COMPUTER RESEARCH

 Volume 3, 2008
ISSN: 1991-8755

 
 

 

 

 

 

 

 


Issue 1, Volume 3, January 2008


Title of the Paper:  Shuffle from Sequential to Parallel in Production Planning

DOWNLOAD FULL PDF

Authors: Adalbert Golomety, Alina Pitic, Iulia Golomety, Antoniu Pitic

Abstract: This paper presents an implementation of shuffle operation in production planning. We present a computational formula for shuffle and some optimizations to reduce the sets of shuffle strings. Our idea is to combine shuffle with parallelism for a planning of production phases.


Keywords: shuffle, production phases, production planning, linguistic model, execution time.


Title of the Paper:  LabVIEW Electrocardiogram Event and Beat Detection

DOWNLOAD FULL PDF

Authors: Mihaela Lascu, Dan Lascu

Abstract: QRS and ventricular beat detection is a basic procedure for electrocardiogram (ECG) processing and analysis. Large variety of methods have been proposed and used, featuring high percentages of correct detection. Nevertheless, the problem remains open especially with respect to higher detection accuracy in noisy ECGs. LabVIEW ( Laboratory Virtual Instrument Engineering Workbench) is a graphical programming language that uses icons instead of lines of text to create programs. We developed in LabVIEW the filtering for removal of artifacts in biomedical signals and the Pan-Tompkins algorithm. We have investigated problems posed by artifact, noise and interference of various forms in the acquisition and analysis of several biomedical signals. We have also established links between the characteristics of certain epochs in a number of biomedical signals and the corresponding physiological or pathological events in the biomedical systems of concern. Event detection is an important step that is required before we may attempt to analyze the corresponding waves in more detail. A real-time detection method is proposed, based on comparison between absolute values of summed differentiated electrocardiograms of one of more ECG leads and adaptive threshold. Also, a cardiac beat recognition based on continuous wavelet transform is presented.

Keywords: biomedical signal, database, electrocardiogram ECG, artifact, noise, graphical programming language LabVIEW, filtering, notch filter, event detection, Pan-Tompkins algorithm, adaptive threshold.


Title of the Paper:  Resource Allocation in Grid Computing: An Economic Model

DOWNLOAD FULL PDF

Authors: Massimiliano Caramia, Stefano Giordani

Abstract: Grid scheduling, that is, the allocation of distributed computational resources to user applications, is one of the most challenging and complex task in Grid computing. The problem of allocating resources in Grid scheduling requires the definition of a model that allows local and external schedulers to communicate in order to achieve an efficient management of the resources themselves. To this aim, some economic/market-based models have been introduced in the literature, where users, external schedulers, and local schedulers negotiate to optimize their objectives. In this paper, we propose a tender/contract-net model for Grid resource allocation, showing the interactions among the involved actors. The performance of the proposed market-based approach is experimentally compared with a round-robin allocation protocol.

Keywords: Grid computing, Resource Management, Economic models, Scheduling, Simulation.


Title of the Paper:  Software Products and Technologies for the Development and Implementation of SOA

DOWNLOAD FULL PDF

Authors: Zaigham Mahmood

Abstract: Service Oriented Architecture (SOA) is an emerging organisational and technical framework to enable an enterprise to deliver self-describing and platform independent business functionality. Businesses are required to be agile and dynamic and IT managers are being asked to deliver improved functionality while leveraging existing IT investment. Globalisation, tighter economies, business process outsourcing and ever increasing regulatory environments are forcing the large enterprises to transform the way they operate. In this context, SOA promises better alignment of IT with business, seamless integration of business functions and reduced costs of development and the industry is keen to embrace this new architectural style. Realising the opportunity, major enterprise software vendors have released a number of development tools. However, a majority of these are difficult to use and do not deliver the benefits they claim. In this paper, we introduce the SOA approach, present the benefits it offers, discuss some of the frameworks, tools and products offered by major software vendors and provide a general guidance for building and implementing SOA. The objective is to provide enough background information that enterprises wishing to embark on the road to SOA have a better understanding

Keywords: Service oriented architecture, SOA, Enterprise applications integration, Web services, Service-orientation, XML.


Title of the Paper:  About Preflow Algorithms for the Minimum Flow Problem

DOWNLOAD FULL PDF

Authors: Laura Ciupala, Eleonor Ciurea

Abstract: In this paper, we describe the highest-label preflow algorithm for minimum flow. This algorithm is a special implementation of the generic preflow algorithm developed by Ciurea and Ciupală in [8], obtained by imposing in the generic preflow algorithm the rule that the algorithm must always select an active node with the highest distance label. Our new algorithm runs in O(n2m1/2) time, which is substantially better than the running time of the generic preflow algorithm, that is O(n2m). Moreover, the highest-label preflow algorithm is the fastest polynomial algorithm for minimum flow problem.In this paper, we describe the highest-label preflow algorithm for minimum flow. This algorithm is a special implementation of the generic preflow algorithm developed by Ciurea and Ciupală in [8], obtained by imposing in the generic preflow algorithm the rule that the algorithm must always select an active node with the highest distance label. Our new algorithm runs in O(n2m1/2) time, which is substantially better than the running time of the generic preflow algorithm, that is O(n2m). Moreover, the highest-label preflow algorithm is the fastest polynomial algorithm for minimum flow problem.

Keywords: Network flow; Network algorithms; Minimum flow problem; Scaling technique


Title of the Paper:  Macula Precise Localization Using Digital Retinal Angiographies

DOWNLOAD FULL PDF

Authors: C. Marino, S. Pena, M. G. Penedo, M. Ortega, J. Rouco, A. Pose-Reino, M. Pena

Abstract: The fovea is a spot located in the center of the macula, and responsible for sharp central vision. In this paper a method to detect the macula location and size is presented, as a first step towards the fovea location. Prior to the macula detection, the optic disk size and position is computed. This is performed through the combination of two stages: firstly, a clustering algorithm is used to select the regions which contain the pixels with the highest gray levels. A correlation filter is applied to these regions to compute the approximate center of the optic disk. Then, in order to extract the optic disk, a deformable model which is used. Then, following the morphological properties of the eye, the macula location and size is determined by means of a new correlation filter. Search with this filter is performed in a reduced area of interest, whose size and position is determined by means, again, of the morphological properties of the eye. The algorithm has proven to be fast and accurate in the set of test images, composed by 135 digital retinal images, where the tests have been performed by comparing our results with those obtained by two expert clinicians from two different hospital centers.

Keywords: Optic disk, macula, fovea, correlation filter, deformable model.


Title of the Paper:  ICT Sufficiency in Cooperative Projects via the Internet

DOWNLOAD FULL PDF

Authors: Nesrin Ozdener, Murat Oztok

Abstract: The aim of this study is to determine the effects of cooperative projects implemented via the Internet on students’ ICT skills. Within the scope of the study, it was attempted to determine the ICT skills frequently used in cooperative projects via the Internet, and it was also attempted to examine the level of students’ and teachers’ ICT skills. At the first stage of the study, the survey method was used to determine the basic ICT skills that might be needed by 8th grade students in their cooperative project works. It was also attempted to examine the existing level of the basic ICT skills of the 8th grade students. At the second stage of the study, the survey method was used to examine the level of the basic ICT skills of teachers. At the third stage of the study, the research population consisted of 58 students studying in the 8th grade at two different schools. The post-test control group experimental model was used to determine the effects of cooperative project works implemented via the Internet on students’ ICT skills. Project groups were asked to implement one of two different projects. Two counselor teachers monitored projects and assisted students during the study. At the end of the training, the counselor teachers of the project groups evaluated the projects implemented. The data collection tools were practical examinations, which were used to measure the teachers’ and students’ ICT skills and the cooperative projects implemented via the Internet. At the end of the study, the skills required for students to have with respect to ICT were determined, and it was observed that students who were involved in projects were more successful compared to those not involved also in terms of the sub-components constituting ICT, just as in the use of ICT. Also in the study, it is shown that teachers have significant insufficiencies in terms of use of ICT. Results obtained from the study emphasize the necessity to create areas where students can use computers and the Internet actively, instead of explaining to them these technologies.

Keywords: Computer, Internet, Multi Media, ICT, Collaborative Projects, Curriculum


Title of the Paper:  Point-based Simplification Algorithm

DOWNLOAD FULL PDF

Authors: Pai-Feng Lee, Bin-Shyan Jong

Abstract: This study presents a novel, rapid, and effective point simplification algorithm based on a point cloud without any normal and connectivity information. This study is initiated with a scattered sampled point set in three dimensions, and the final output is a triangular mesh model, which is simplified according to a restrictive criteria. The proposed method reduces the number of calculations required to establish the relation between triangulation and the connectivity. Due to the continuous development of computer graphics technology, diversified virtual reality applications are being increasingly adopted. Recently, the efficient and vivid portrayal of 3D objects in the real world in virtual scenes has become a crucial issue in computer graphics. A triangular mesh is one of the most popular data structures for representing 3D models in applications. Numerous methods currently exist for constructing objects using surface reconstruction. The data required for the sampled points are generally obtained from a laser scanner. However, the extracted sampled points are frequently affected by shape variation. The number of triangles created increases with the number of points sampled from the surface of a 3D object, which helps in the reconstruction of the correct model. Nevertheless, subsequent graphics applications, such as morphing or rendering, increase the computation costs. Appropriate relevant points should be chosen so as to retain the object features and reduce the storage space and calculation costs.

Keywords: point simplification, discrete shape operator, feature extraction, curvature, torsion.


Title of the Paper:  Design of UML Models and their Simulation using ARENA

DOWNLOAD FULL PDF

Authors: Artis Teilans, Arnis Kleins, Yuri Merkuryev, Andris Grinbergs

Abstract: While developing new business systems and reengineering already existing ones, many organizations use the Unified Modelling Language (UML) to design a system’s structure and describe system’s behaviour. In spite of describing system’s behaviour with the UML model, the model itself is static. UML does not provide a possibility of running the model and studying the system’s behaviour. In such a situation the necessity arises to simulate the UML model. To provide that possibility, the designed UML diagrams could be transformed into a simulation model to be run within a specialized simulation environment. The paper discusses a transformation of that kind using the Arena simulation environment. In order to design UML models, a meta-modelling approach is explored.

Keywords: Simulation, Arena, UML modelling, transformation of models, meta-model


Title of the Paper:  Applying Mathematical Programming Elements to Answer Market Needs: Case Studies of Optimization of Electrical Power Flow

DOWNLOAD FULL PDF

Authors: Emerson Eustaquio Costa, Luiz Danilo Barbosa Terra, George Leal Jamil

Abstract: This paper seeks to investigate the application of mathematical programming, considering it as a tool for optimal electrical power generation and management. Nowadays, observing signals of crisis in various countries, electrical power emerges not only as a commodity but as a valuable, renewable and sometimes rare resource. Modeling and studying electrical power systems with application of mathematical programming can produce alternatives for optimal management of resources and allow better consumer satisfaction, impacting positively as a typical marketing indicator.

Keywords: Mathematical Programming; Linear Programming; Energy flow in electrical energy networks and markets; Optimum Power Flow DC; Marketing theory.


Issue 2, Volume 3, February 2008


Title of the Paper:  Guided Waves Damage Identification in Beams with Test Pattern Dependent Series Neural Network Systems

DOWNLOAD FULL PDF

Authors: C. K. Liew, M. Veidt

Abstract: In regression neural networks for pattern recognition of preprocessed guided waves signals in beams, a trained network produced large errors when identifying a test pattern not found in the training set. To improve the accuracy of results, a new neural network procedure was introduced where progressive training was performed in a series combined network with the integration of a weight-range selection (WRS) technique that was dependent on the test pattern. The WRS method was applied for a supervised multi-layer perceptron operating with one hidden layer of neurons and trained using a backpropagation algorithm. The system was able to achieve average predictions accurate to 2.5% and 7.8% of the original training range sizes for the damage location and depth, respectively, while the WRS provided up to 13.9% improvement compared to equivalent conventional neural networks.

Keywords: multi-layer perceptron, combined neural networks, generalization, ultrasonic guided waves, quantitative nondestructive evaluation, structural health monitoring


Title of the Paper:  Pseudo-Random Sequence Generators based on Cellular Automata and Bent Functions

DOWNLOAD FULL PDF

Authors: Francisco J. Garcai, Veronica Requena, Virtudes Tomas

Abstract: In this article we construct different pseudo-random sequences using cellular automata where the local transition functions are based on balanced functions which are obtained from bent functions.

Keywords: Pseudo-random sequence, cellular automata, bent function, balanced function.


Title of the Paper:  Robust Romanian Language Automatic Speech Recognizer Based on Multistyle Training

DOWNLOAD FULL PDF

Authors: Doru-Petru Munteanu, Constantin-Iulian Vizitiu

Abstract: This paper presents solutions for increasing environmental robustness of a Romanian language continuous speech recognizer, previously developed. All state-of-the-art automatic speech recognizers (ASR) are data-driven and rely heavily on huge speech data for estimating the model parameters. Most of the available speech corpora used for this training phase contain clean speech recorded in low noise and reverberation free environments with high quality audio equipment. However, in real-world ASR are facing various acoustic conditions, speech signal being degraded by noise, reverberations, convolution distortions, etc. The acoustic mismatches between the training conditions and testing conditions are the main cause of ASR performance degradation. For instance, the word error rate may be an order of magnitude higher in an office environment than in a clean laboratory environment. There are a lot of methods and techniques aiming to keep the ASR performances at an acceptable in various acoustic conditions. In this paper we are presenting a special strategy called multistyle training for building a robust Romanian language ASR system. The method is based on training the recognizer with degraded speech signal obtained by adding to clean speech various levels artificial noise. Experimental results presented, prove that this scheme strongly increase the system robustness to additive noise. The system architecture based on context-dependent HMM phonemes is also described in detail.

Keywords: continuous speech recognition, environmental robustness, multistyle training, context dependent models, hidden Markov models


Issue 3, Volume 3, March 2008


Title of the Paper:  Algorithms for Data Warehouse Design to Enhance Decision-Making

DOWNLOAD FULL PDF

Authors: Ziyati Elhoussaine, Driss Aboutajdine, El Qadi Abderrahim

Abstract: On-line analytical processing (OLAP) queries are strongly affected by the amount data needed to be accessed from the disk. Therefore, there is a need to employ techniques that can facilitate efficient execution of these queries. There has been a lot of work to optimize the performance of relational data warehouses. Among the two fragmentation techniques, vertical fragmentation is often considered more complicated than horizontal, it nearly impossible to obtain an optimal solution. Data partitioning concept that has been studied in the context of relational databases aims to reduce query execution time and facilitate the parallel execution of queries. In this paper, we develop a new framework based on genetic algorithm for applying the partitioning technique on relational DW schema (star schema) to minimize the total query execution cost. We develop an analytical cost model for executing a set of OLAP queries on a partitioned star schema. We conduct experiments to evaluate the utility of partitioning in efficiently executing OLAP queries. Finally, we show how partitioning can be used to facilitate parallel execution of OLAP queries.

Keywords: Partitioning, warehouse, OLAP queries, Genetic algorithm, penalty function, query optimization.


Title of the Paper:  Online Signature Slant Feature Identification Algorithm

DOWNLOAD FULL PDF

Authors: Mohd Razif Shamsuddin, Azlinah Mohamed

Abstract: According to the American National Science and Technology Council (NSTC), the first signature recognition system was developed in 1965. Then the research continued in 1970 focusing on the potential of geometric characteristic of a signature rather than dynamic characteristic. Nowadays, signature is a commonly used identification procedure. Everyone would be required having a signature for authorization and other important tasks that needs identification. Thus, signature has become one of a method to represent its writer uniquely. Signature has many hidden features that are difficult to extract. Some of the identified features that a signature should have are slanting, baseline, proportion and size. This paper covers the area of signature slant identification. Signatures are captured using a tablet and saved in a digitized format of x and y values. Then it is filtered and calculated for its angle and degree. In the end the signature will be classified to its slant category. A slant algorithm is created and coded into a functional system. An experiment consisting of 50 signatures are tested and the finding shows the angle and degree of the slant in every signature. The result is then tested for its accuracy with an available 10 sample of created proofed signatures. The result shows a favorable accuracy of 80% correct slant identification. The creation of this algorithm would be able to give some degree of contribution in the area of signature recognition.

Keywords: Slant, Slant Recognition, Signature Recognition, Online Signature, Curved Stroke, Curved Slant


Title of the Paper:  Hardware IP for Scheduling of Periodic tasks in Multiprocessor Systems

DOWNLOAD FULL PDF

Authors: Habibullah Jamal, Zeeshan A. Khan

Abstract: The article presents an Intellectual Property (IP) for scheduling of multiprocessor systems that is designed using FPGA. The purpose of the IP is to minimize the processor time for scheduling activity by implementing the functionality in hardware. The algorithm implemented clusters the similar tasks on the same processor. Processors not in use are switched to power saving mode and they are only turned on if there is no other processor to take on the required activity.

Keywords: FPGA, Hardware scheduler, multiprocessor systems, real-time systems, scheduling algorithm.


Title of the Paper:  Protocol – Based With Feature Selection in Intrusion Detection

DOWNLOAD FULL PDF

Authors: Kun-Ming Yu, Ming-Feng Wu, Wai-Tak Wong

Abstract: A lightweight network intrusion detection system is more efficient and effective for real world requirements. Higher performance may result if insignificant and/or useless features are eliminated, so choice a well feature selection method is important. Logistic Regression is one of powerful feature selection method. In this study, protocol type and Logistic Regression were used to pick up the feature sets and build different protocol detection model which can get surmount performance than the full feature using a Support Vector Machine. Evaluation was done over a benchmark dataset used KDD CUP'99. In terms of time efficiency, the proposed method performs more than seven times better than other feature selection methods.

Keywords: Intrusion detection, Logistic Regression, Protocol, Support Vector Machine


Title of the Paper:  Application of Self Organizing Map Approach to Partial Discharge Pattern Recognition of Cast-Resin Current Transformers

DOWNLOAD FULL PDF

Authors: Wen-Yeau Chang, Hong-Tzer Yang

Abstract: Partial discharge (PD) measurement and recognition is a significant tool for potential failure diagnosis of a power transformer. This paper proposes the application of self organizing map (SOM) approach to recognize partial discharge patterns of cast-resin current transformer (CRCT). The PD patterns are measured by using a commercial PD detector. A set of features, used as operators, for each PD pattern is extracted through statistical schemes. The proposed SOM classifier has the advantages of high robustness to ambiguous patterns and is useful in recognizing the PD patterns of electrical transformers. To verify the effectiveness of the proposed method, the classifier was verified on 250 sets of field-test PD patterns of CRCTs. The test results show that the proposed approach may achieve quite satisfactory recognition of PD patterns.

Keywords: Cast-resin current transformer, Partial discharge, Pattern recognition, Self organizing map


Title of the Paper:  Efficient Iris Recognition Scheme Based on Difference of Filters

DOWNLOAD FULL PDF

Authors: G. S. El -Taweel, A. K. Helmy

Abstract: With a growing emphasis on human identification, iris recognition has recently received increasing attention. In this paper, an efficient biometric scheme for iris recognition system with high performance is introduced. First, the irises are localized using an effective integral differential operator. Then the localized iris image is normalized to handle different size, variation in illumination and pupil dilation. Finally, we propose a novel and efficient approach to iris feature extraction using a set of filters, called difference-of-sum filters .These filters can take advantage of a pre-computed integral image, which makes the filtering process take constant computation time no matter how big the filters are. Experimental evaluation shows that the new method has higher recognition accuracy and is faster than previous methods. The false acceptance rate was reduced by 7% in comparison with the iris code method.

Keywords: Biometrics, Iris normalization, Iris localization, Iris Recognition, Feature Extraction, Difference of Sum Filters.


Title of the Paper:  How Magnification of the Root-Mean-Square Deviation (RMSD) Value Affects the Convergence Speed of Hopfield Neural Network Classifier

DOWNLOAD FULL PDF

Authors: Rachid Sammouda

Abstract: The Root Mean Square-Deviation (RMSD) or Root Mean Square Error (RMSE) is the frequently used measure of the difference between values predicted by a model or an estimator and the values actually observed from that which is being modelled or estimated. In this paper, we show that the magnification of the RMSE, when used with the classifier Hopfield Neural Network (HNN), may help the network to converge earlier to the same optima reached using the simple RMSE. The segmentation problem of liver pathological images is formulated in energy function as a magnified sum of all neurons’ deviations from their actual clusters, and HNN iterates with respect to the winner-takes-all rule in order to minimize the energy function to a local optimum close to the global one. Twenty liver color images were used in this study. Their segmentation results with their corresponding quantitative analysis show that our approach makes the results more reliable for use as input data to a computer aided diagnosis of liver cancer.

Keywords: Hopfield Neural Network, Optimization, Mean-Square-Error, Magnification, Segmentation, pathological liver color image


Title of the Paper:  Partial Discharge Pattern Recognition of Cast-Resin Current Transformers Using Fuzzy C-Means Clustering Approach

DOWNLOAD FULL PDF

Authors: Wen-Yeau Chang, Hong-Tzer Yang

Abstract: Partial discharge (PD) measurement and recognition is a significant tool for potential failure diagnosis of the high-voltage equipment. This paper proposes the application of fuzzy c-means (FCM) clustering approach to recognize partial discharge patterns of cast-resin current transformer (CRCT). The PD patterns are measured by using a commercial PD detector. A set of features, used as operators, for each PD pattern is extracted through statistical schemes. The significant features of PD patterns are extracted by using the nonlinear principal component analysis (NLPCA) method. The proposed FCM classifier has the advantages of high robustness and effectiveness to ambiguous patterns and is useful in recognizing the PD patterns of the high-voltage equipment. To verify the effectiveness of the proposed method, the classifier was verified on 250 sets of field-test PD patterns of CRCTs. The test results show that the proposed approach may achieve quite satisfactory recognition of PD patterns.

Keywords: Cast-Resin Current Transformer, Partial Discharge, Pattern Recognition, Fuzzy C-Means Clustering, Nonlinear Principal Component Analysis


Title of the Paper:  The use of NARX Neural Networks to predict Chaotic Time Series

DOWNLOAD FULL PDF

Authors: Eugen Diaconescu

Abstract: The prediction of chaotic time series with neural networks is a traditional practical problem of dynamic systems. This paper is not intended for proposing a new model or a new methodology, but to study carefully and thoroughly several aspects of a model on which there are no enough communicated experimental data, as well as to derive conclusions that would be of interest. The recurrent neural networks (RNN) models are not only important for the forecasting of time series but also generally for the control of the dynamical system. A RNN with a sufficiently large number of neurons is a nonlinear autoregressive and moving average (NARMA) model, with “moving average” referring to the inputs. The prediction can be assimilated to identification of dynamic process. An architectural approach of RNN with embedded memory, “Nonlinear Autoregressive model process with eXogenous input” (NARX), showing promising qualities for dynamic system applications, is analyzed in this paper. The performances of the NARX model are verified for several types of chaotic or fractal time series applied as input for neural network, in relation with the number of neurons, the training algorithms and the dimensions of his embedded memory. In addition, this work has attempted to identify a way to use the classic statistical methodologies (R/S Rescaled Range analysis and Hurst exponent) to obtain new methods of improving the process efficiency of the prediction chaotic time series with NARX.

Keywords: Chaotic Time Series, Hurst Exponent, Prediction, Recurrent Neural Networks, NARX Model


Issue 4, Volume 3, April 2008


Title of the Paper:  Principal Component Analysis Based on Wavelet Characteristics Applied to Automated Surface Defect Inspection

DOWNLOAD FULL PDF

Authors: Hong-Dar Lin, Chung Yu Chung, Wan-Ting Lin

Abstract: Automated visual inspection, a crucial manufacturing step, has been replacing the more time-consuming and less accurate human inspection. This research explores automated visual inspection of surface defects in a light-emitting diode (LED) chip. Commonly found on chip surface are water-spot blemishes which impair the appearance and functionality of LEDs. Automated inspection of water-spot defects is difficult because they have a semi-opaque appearance and a low intensity contrast with the rough exterior of the LED chip. Moreover, the defect may fall across two different background textures, which further increases detection difficulties. The one-level Haar wavelet transform is first used to decompose a chip image and extract four wavelet characteristics. Then, wavelet-based principal component analysis (WPCA) and Hotelling statistic (WHS) approaches are respectively applied to integrate the multiple wavelet characteristics. Finally, the principal component analysis of WPCA and the Hotelling control limit of WHS individually judge the existence of defects. Experimental results show that the proposed WPCA method achieves detection rates of above 93.8% and false alarm rates of below 3.6%, and outperforms other methods. A valid computer-aided visual defect inspection system is contributed to help meet the quality control needs of LED chip manufacturers.

Keywords: Surface defect inspection, Wavelet characteristics, Principal component analysis, Hotelling statistic, Machine vision system.


Title of the Paper:  A Web-Based Metadata Schema Repository

DOWNLOAD FULL PDF

Authors: Yen-Chun Lin, Hsiang-An Wang, Chien-Chung Huang, Wei Chen

Abstract: The metadata schema of a digital archive describes the structure and attributes of metadata. Analysis and definition of metadata schema for a new digital archive must be carefully carried out and determined at the first stage of development. To ease the task, we used an Extensible Markup Language (XML) structure to represent the metadata schema, and then designed and implemented a metadata schema repository to store metadata schemas as XML documents in a native XML database. The metadata schema repository supports storage, creation, search, and access management of metadata schemas. A user can access the repository through a Web browser. With this repository, projects and organizations can share their metadata schemas over the Internet. Since the metadata schema must be displayed on a Web browser, we also present the method of translating the XML representation of metadata schema into the HyperText Markup Language document.

Keywords: Digital archive, Extensible Markup Language, HyperText Markup Language, Metadata schema repository, Native XML database, Web-based


Title of the Paper:  Parallel Prefix Algorithms on the Multicomputer

DOWNLOAD FULL PDF

Authors: Li-Ling Hung, Yen-Chun Lin

Abstract: A family of computation-efficient parallel prefix algorithms for message-passing multicomputers are presented. The family generalizes a previous algorithm that uses only half-duplex communications, and thus can improve the running time. Several properties of the family are derived, including the number of computation steps, the number of communication steps, and the condition for effective use of the family. The family can adopt collective communication operations to reduce the communication time, and thus becomes a second family of algorithms. These algorithms provide the flexibility of choosing either less computation time or less communication time, depending on the characteristics of the target machine, to achieve the minimal running time.

Keywords: Computation-efficient, Cost optimality, Half-duplex, Message-passing multicomputers, Parallel algorithms, Prefix computation


Title of the Paper:  ALRP: Scalability Study of Ant based Local repair Routing Protocol for Mobile Adhoc Networks

DOWNLOAD FULL PDF

Authors: Siva Kumar D., Bhuvaneswaran R. S.

Abstract: A mobile ad hoc network is a dynamic mobile wireless network that can be formed without the need for any pre-existing wired or wireless infrastructure. One of the main challenges in an ad hoc network is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. So there is a great need for a new routing protocol that have low routing message overhead to enhance the performance of MANET. The reduction of routing message overhead will decrease the wasted portions of bandwidth that used for exchange routing messages between nodes, and increase the bandwidth available for transferring data, which in turn increases the network throughput and decreases the latency. This paper proposes a new ant agent based Local repair routing protocol (ALRP) that decreases both of the routing message overhead and the average end to end delay by on average 28%, 14% respectively less than the well known AODV routing protocol. This led to increase the throughput by 24% more than AODV routing protocol.

Keywords: Ad-hoc, AODV, Local Repair, MANET, On demand ant based Multi agent routing and ALRP


Title of the Paper:  A Hybrid Model of Mathematical Programming and Analytic Hierarchy Process for the GISMR: The Industrial Localization

DOWNLOAD FULL PDF

Authors: T. Agouti, Md. Eladnani, A. Tikniouine, A. Aitouahman

Abstract: One of the major questions which arise for the decision makers is the localization choice of places of their establishment related to the constraint of the space, social, economic and policy difference between the places of production and those of consumption. This question is related to the diversity of the criteria integrated in the decision-making, and to the very great number of possible space alternatives. We propose in this article an approach of aid to the industrial localization decision by profiting from the advantages offered by the geographical information systems to multiple representation compounds to the AHP method and from the advantages of the mathematical programming models. The use of a GISMR combined with AHP will help us to reduce the number of the space alternatives and to evaluate them according to real criteria of decision which are quantitative or qualitative. The evaluations obtained will be integrated in a mathematical model to make the final choice of the best alternatives. In fact this model is used to identify the best solution taking into account the criteria fixed by the decision-maker and the data provisions generated by the GISMR.

Keywords: Geographical Information Systems to Multiple Representation (GISMR), Multi-Criteria Decision Analysis (MCDA), Analytic Hierarchy Process (AHP), Mathematical Programming (MP), Industrial localization.


Title of the Paper:  Copyright Protection Protocols for Copyright Protection Issues

DOWNLOAD FULL PDF

Authors: Yamuna Govindharajan, Sivakumar Dakshinamurthi

Abstract: With the pervasiveness of internet, businesses online have become ubiquitous. The proposed concept is a solution with a specific focus on preventing disputes that comes out of ownership claims through buying and selling digital documents. The concept proposed offers a dependable watermarking method that can help authenticate sellers and buyers of digital documents. The important issues of copyright protection such as buyer-owner identification, copyright infringement, and ownership verification are addressed. Embedding the owners’ and buyers’ identities through watermarks and provisions for revealing the same as proof to substantiate the ownership rights of buyer over the digital document, will serve as a solution for issues arising out of buyer owner identification. To solve copyright infringement issues, the concept offers necessities that can help the owner to identify the buyer, from whom the illegal copies of the documents originated. The provisions to identify the legal owner of the digital document, can settle controversies regarding multiple ownership claims in the court of law. The usage of DCT-SVD based watermarking and public key encryption with hash values fortifies the scheme and makes it a fail-safe method.

Keywords: Digital Watermarking, Copyright Protection, Copyright Infringement, Multiple ownership Disputes.


Title of the Paper:  Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

DOWNLOAD FULL PDF

Authors: Hamed Al-Sharari

Abstract: Direct-sequence code-division multiple access (DS-CDMA) is currently the subject of much research as it is a promising multiple access capability for third and fourth generations mobile communication systems. The synchronous DS-CDMA system is well known for eliminating the effects of multiple access interference (MAI) which limits the capacity and degrades the BER performance of the system. In this paper, we investigate the bit error rate (BER) performance of a synchronous DS-CDMA system over a wideband mobile radio channel. The BER performance is affected by the difference in path length ΔL and the number of arriving signals N. Furthermore, the effect of these parameters is examined on the synchronous DS-CDMA system for different users’ number as well as different processing gain Gp. In this environment and under the above conditions the performances of the BPSK(Binary Phase Shift Keying) and the QPSK (Quadrature Phase Shift Keying) modulations are compared. The promising simulation results showed the possibility of applying this system to the wideband mobile radio channel.

Keywords: BPSK, QPSK, Complex, Gain, Wideband , Synchronism, Direct, Sequence, CDMA, BER.


Title of the Paper:  A Proposal for New Marking Scheme with its Performance Evaluation for IP Traceback

DOWNLOAD FULL PDF

Authors: S. Malliga, A. Tamilarasi

Abstract: Detecting and defeating Denial of Service (DoS) attacks is one of the hardest security problems on IP networks. Furthermore, spoofing of IP packets makes it difficult to combat against and fix such attacks. Packet marking is one of the methods to mitigate the DoS attack that helps traceback to the true origin of the packets. A hybrid packet marking algorithm, along with traceback mechanism to find the true origin of the attack traffic is presented in this study. The router marks the packets with inbound interface identifier of the router, but the novelty lies on the way it marks the packets. The stamping based on modulo technique and reverse modulo for the purpose reconstruction of attack path to traceback to the real source of the packets are proposed. The experimental measurements on the presented algorithm ensure that it requires less amount of time to mark and reconstruct the attack graph. It is also able to trace back to single packet, nevertheless it requires logging at very few routers and thus incurring insignificant storage overhead on the routers. The simulation study and the qualitative comparison with different traceback schemes are also presented to show the performance of the proposed system.

Keywords: DoS attacks, Logging, Modulo, Packet marking, Reverse modulo, Spoofing


Title of the Paper:  Towards Building a Semantic Grid for E-Government Applications

DOWNLOAD FULL PDF

Authors: Wenyu Zhang, Yan Wang

Abstract: Nowadays, there is a growing number of e-government portals and solutions that provide integrated governmental e-services to the customers (citizens, enterprises or other public sectors). However, the administration and interoperability of distributed e-government nodes are faced with increasing challenges caused by the service-oriented modeling difficulties and ontological issues in distributed computing, resource integration and knowledge sharing over heterogeneous computing platforms. To overcome this, a Semantic Grid infrastructure is presented in this paper for distributed management of e-government resources across ubiquitous virtual governmental agencies. An ontology-based service-oriented approach to problem-solving in e-government is proposed in the Semantic Grid, enabling to provide, in an open, dynamic, loosely coupled and scalable manner, the service publication, discovery and reuse for connecting the customers and agencies of e-government services based on their semantic similarities in terms of problem-solving capabilities. The operation of the system is demonstrated using Protégé-2000, a widely accepted ontology modeling tool to validate the implementation of the proposed approach towards effective ontological maintenance.

Keywords: CSCW; E-government; Ontology; Semantic Grid; Semantic Web; Service-oriented.


Title of the Paper:  Research on Reconstruction and Simulation of Rail Traffic in an Ancient Township through 3D Animation

DOWNLOAD FULL PDF

Authors: Tingsheng Weng

Abstract: - The Japanese were dedicated to building Huwei into a new industrial city after the Japan Suger Refining Corp. was established in Huwei Township, Yunlin County during the Japanese Occupation. Since then, Huwei has been called the "Sugar Capital". The development of Huwei Sugar Refinery directly influencedspatial development in Huwei. Currently, the township structure is facing many changes due to the construction of the Central Taiwan Science Park (CTSP), Huwei Park, and the future opening of the Taiwan High Speed Railway and Yunlin Station in 2010. Insufficient traffic functions and road capacity will impede local development. This study used aerial photos of the Huwei area as base maps, designed 3D train animation running along Huwei Sugar Refinery rail lines, and produced 3D designs of abandoned areas near the refinery and riverbank bicycle paths with ASP.NET. Rail transport in Huwei can increase traffic capacity and promote the developments in industry.

Keywords: Reconstruction of an ancient township, rail service, aerial photos, 3D animation simulation, Flash, ASP.NET.


Issue 5, Volume 3, May 2008


Title of the Paper: Self-Calibration using a Particular Motion of Camera

DOWNLOAD FULL PDF

Authors: A. Saaidi, A. Halli, H. Tairi, K. Satori

Abstract: In this article, we are interested in the camera self-calibration from three views of a 3-D scene. The originality of our method resides in the new technique used to estimate the homography of the plane at infinity by the minimization of a non-linear cost function that is based on a particular motion of the camera "translation and small rotation". Our approach also permits to calculate the camera parameters and the depths of interest points detected in the images. Experimental results demonstrate the performance of our algorithms, in term of precision and convergence.

Keywords: Self-calibration, interest points, matching, homography of the plane at infinity


Title of the Paper: Assessing the Needs of CSCL Tool and its Impacts in Malaysian Context

DOWNLOAD FULL PDF

Authors: Z. M. Kasirun, S. S. Salim

Abstract: Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and are not available for use. Through a survey on the needs for CSCL in Malaysia, it is confirmed that CSCL application is needed but the available one could not support CL activities. This paper discusses CSCL study in Malaysia, especially the relationship between user involvement and type of CSCL application needed. In particular, the CSCL application that could associate existing knowledge among students to build new knowledge for their better understanding and problem solving skills. We examine this need and assess its impact by developing Collaborative Environment for Teaching and Learning System (CETLs).

Keywords: Computer-supported collaborative learning, CSCL, collaborative learning strategy, collaborative learning environment


Title of the Paper: Reliability and Performance Analysis of New Fault Tolerant Irregular Network

DOWNLOAD FULL PDF

Authors: Rita Mahajan, Renu Vig

Abstract: A lot of work and analysis has been done on regular fault-tolerant MINs but irregular MINS have the inherent concept of favorite memory module offering lower latency. The multipath nature of these networks provides a non-blocking operation. This work introduces a new network, named as MFT-2 network, which contributes fault-tolerance by providing dynamic full-access capability in the presence of faults. MFT-2 network is improvement on irregular Four Tree network (FT). In case of any fault the system is reconfigured which operates in a degraded mode owing to the increased latency. But this approach minimizes the overheads of providing fault-tolerance, both in terms of cost and performance, during normal operation of the system. Irregular nature of these networks has reduced latency, improved dynamic fault-tolerant routing, high reliability and performance. The probabilistic approach is used to analyze the MINs based on independent request assumptions.

Keywords: Multistage Interconnection Networks (MIN), Irregular Network, Parallel Processing, DOT Network, FT (Four-tree network), Reliability


   
[Journals], [Books], [Conferences], [Research], [Contact us], [Indexing], [Reports], [E-Library], [FAQ],
[Upcoming Conferences with Expired Deadline], [History of the WSEAS Conferences]

Copyright © WSEAS          
www.wseas.org