BookPDF Available

Innovations and Advances in Computer, Information, Systems Sciences, and Engineering; Part I



Innovations and Advances in Computer, Information, Systems Sciences, and Engineering includes the proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2011). The contents of this book are a set of rigorously reviewed, world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology and Automation, Telecommunications and Networking, Systems, Computing Sciences and Software Engineering, Engineering Education, Instructional Technology, Assessment, and E-learning.
Lecture Notes in Electrical Engineering
Volume 152
For further volumes:
Khaled Elleithy
Tarek Sobh
Innovations and Advances
in Computer, Information,
Systems Sciences,
and Engineering
Khaled Elleithy
School of Engineering
University of Bridgeport
Bridgeport, CT
Tarek Sobh
School of Engineering
University of Bridgeport
Bridgeport, CT
ISSN 1876-1100 ISSN 1876-1119 (electronic)
ISBN 978-1-4614-3534-1 ISBN 978-1-4614-3535-8 (eBook)
DOI 10.1007/978-1-4614-3535-8
Springer New York Heidelberg Dordrecht London
Library of Congress Control Number: 2012940241
Springer Science+Business Media New York 2013
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or
information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed. Exempted from this legal reservation are brief
excerpts in connection with reviews or scholarly analysis or material supplied specifically for the
purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the
work. Duplication of this publication or parts thereof is permitted only under the provisions of
the Copyright Law of the Publisher’s location, in its current version, and permission for use must always
be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright
Clearance Center. Violations are liable to prosecution under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt
from the relevant protective laws and regulations and therefore free for general use.
While the advice and information in this book are believed to be true and accurate at the date of
publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for
any errors or omissions that may be made. The publisher makes no warranty, express or implied, with
respect to the material contained herein.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (
This book includes the proceedings of the International Joint Conferences on
Computer, Information, and Systems Sciences, and Engineering (CISSE 2011). The
proceedings are a set of rigorously reviewed world-class manuscripts presenting
the state of international practice in Innovative Algorithms and Techniques in
Automation, Industrial Electronics, and Telecommunications.
CISSE 2011 is a high-caliber research for research conferences that were
conducted online. CISSE 2011 received 260 paper submissions and the final
program included 107 accepted papers from more than 80 countries, representing
the six continents. Each paper received at least two reviews, and authors were
required to address review comments prior to presentation and publication.
Conducting CISSE 2011 online presented a number of unique advantages, as
All communications among the authors, reviewers, and conference organizing
committee were done online, which permitted a short 6-week period from the
paper submission deadline to the beginning of the conference.
PowerPoint presentations, final paper manuscripts were available to registrants
for 3 weeks prior to the start of the conference.
The conference platform allowed live presentations by several presenters from
different locations, with the audio, and PowerPoint transmitted to attendees
throughout the Internet, even on dial-up connections. Attendees were able to ask
both audio and written questions in a chat room format, and presenters could
mark up their slides as they deemed fit.
The live audio presentations were also recorded and distributed to participants
along with the powerpoint presentations and paper manuscripts within the
conference DVD.
The conference organizers and we are confident that you will find the papers
included in this volume interesting and useful. We believe that technology will
continue to infuse education thus enriching the educational experience of both
students and teachers.
Bridgeport, CT, December 2011 Khaled Elleithy
Tarek Sobh
vi Preface
The 2011 International Joint Conferences on Computer, Information, and Systems
Sciences, and Engineering (CISSE 2011) and the resulting proceedings could not
have been organized without the assistance of a large number of individuals.
CISSE was founded by Professors Tarek Sobh and Khaled Elleithy in 2005, and
they set up mechanisms that put it into action. Andrew Rosca wrote the software
that allowed conference management, and interaction between the authors and
reviewers online. Mr. Tudor Rosca managed the online conference presentation
system and was instrumental in ensuring that the event met the highest profes-
sional standards. We also want to acknowledge the roles played by Sarosh Patel
and Ms. Susan Kristie, our technical, and administrative support team.
The technicalco-sponsorship provided by the Institute of Electrical and Electronics
Engineers (IEEE) and the University of Bridgeport is gratefully appreciated.
We would like to express our thanks to Prof. Toshio Fukuda, Chair of the International
Advisory Committee and the members of Technical Program Committees.
The excellent contributions of the authors made this world-class document
possible. Each paper received two to four reviews. The reviewers worked tirelessly
under a tight schedule and their important work is gratefully appreciated.
In particular, we want to acknowledge the contributions of the following indivi-
duals: Ashraf Abdelwahed, Khald Aboalayon, Munther Abualkibash, Tamer
Abu-Khalil. Sumaya Abusaleh, Ahmad Abushakra, Mohannad Abuzneid, Naser
Alajmi, Ibrahim Alkore Alshalabi, Muder Almi’ani, Anas Al-okaily, Aziz Alotaibi,
Amer Al-Rahayfeh, Mohammad Rauji, Tariq Alshugran, Fahad Alswaina, Aladdin
Alzubi, Mohamed Ben Haj Frej, Ying-ju Chen, Richard Colon, Khaled Elleithy, Ali
El-Rashidi, Ahmed ElSayed, Mohammed Ali Eltaher, Eugene Gerety, Manan
Joshi, Zakareya Lasefr, Youming Li, Ramadhan Mstafa, Ammar Odeh, Abdul
Razaque, Andriy Shpylchyn, and Ajay Shrestha.
Bridgeport, CT, January 2012 Khaled Elleithy
Tarek Sobh
1 Change Rate Concepts and their Realization in the MM&S:
A Computer Program for Modeling and Simulation
of Dynamic Systems ................................. 1
Nguyen Van Sinh
2 A Software Architecture for Inventory Management System ... 15
Taner Arsan, Emrah Bas¸ kan, Emrah Ar and Zeki Bozkus¸
3 Libraries Opt for More Online Sources................... 29
Zeenath Reza Khan and Sreejith Balasubramanian
4 Emerging Threats, Risk and Attacks in Distributed Systems:
Cloud Computing ................................... 37
Isabel Del C. Leguías Ayala, Manuel Vega and
Miguel Vargas-Lombardo
5 Cognitive Antenna System for Sustainable Adaptive
Radio Interfaces .................................... 53
Ligia Cremene and Nicolae Cris¸ an
6 Introducing the Concept of Information Pixels and the
Storing Information Pixels Addresses Method
as an Efficient Model for Document Storage ............... 63
Mohammad A. ALGhalayini
7 Introducing the Concept of Back-Inking as an Efficient Model
for Document Retrieval (Image Reconstruction)............. 89
Mohammad A. ALGhalayini
8 Automating the Transformation From a Prototype
to a Method of Assembly ............................. 99
Yuval Cohen, Gonen Singer, Maya Golan and Dina Goren-Bar
9 Collaborative and Non-Collaborative Dynamic Path Prediction
Algorithm for Mobile Agents Collision Detection
with Dynamic Obstacles in 3D Space..................... 107
Elmir Babovic
10 Website Analysis of Top 100 Most Valuable Companies
in Romania........................................ 121
Lavinia D. Rusu and Liciniu A. Kovács
11 Comparison of PI and Fractional PI Controllers
on a Hydraulic Canal Using Pareto Fronts ................ 135
Y. Chang
12 Remote Sensing Investigation of Red Mud Catastrophe
and Results of Image Processing Assessment ............... 149
J. Berke, V. Kozma-Bognár, P. Burai, L. D. Kováts,
T. Tomor and T. Németh
13 802.11e QoS Performance Evaluation .................... 157
Yunus Simsek and Hetal Jasani
14 Evaluation of Different Designs to Represent Missing
Information in SQL Databases ......................... 173
Erki Eessaar and Elari Saal
15 Mobile English Learning System: A Conceptual Framework
for Malaysian Primary School.......................... 189
Saipunidzam Mahamad, Fatimah Annor Ahmad Rashid,
Mohammad Noor Ibrahim and Rozana Kasbon
16 Dynamic Cache Miss-Rate Reduction .................... 199
Mazen AbuZaher, Bayan Alayoubi, Basma Alefeshat
and Abdelwadood Mesleh
17 Agent Simulation Group on the Robocup 3D Realization
of Basic Motions.................................... 205
Min Zhou, Jia Wu, Hao Zheng, Xiaoming Liu and Renhao Zhou
18 Key Generations Model for Mobile Cryptosystems........... 215
Rushdi Hamamreh
x Contents
19 Development of Stakeholder Oriented Corporate Information
Security Objectives .................................. 227
Margareth Stoll
20 Stakeholder Oriented Information Security Reporting ........ 241
Margareth Stoll
21 Experimenting with Watchdog Implementation on a Real-Life
Ad hoc Network: Monitoring Selfish Behavior .............. 255
Tirthankar Ghosh and Tian Hou
22 Power Consumption Evaluation for Cooperative Localization
Services .......................................... 267
Patrick Seeling
23 A Modified Banker’s Algorithm ........................ 277
Youming Li
24 Courses Enrollment Pattern Analysis .................... 283
Nur Fatihah Abdul Rahim, Shakirah Mohd Taib
and Saipunidzam Mahamad
25 Integration of Safety and Smartness Using Cloud Services:
An Insight to Future................................. 293
Neha Tekriwal, Madhumita and P. Venkata Krishna
26 A Versioning Subsystem of Metamodeling System ........... 305
Rünno Sgirka
27 Difficulties in Understanding Object Oriented
Programming Concepts............................... 319
Soly Mathew Biju
28 Real-Time System for Monitoring and Analyzing
Electrocardiogram on Cell Phone ....................... 327
O. Muñoz-Ramos, O. Starostenko, V. Alarcon-Aquino
and C. Cruz-Perez
29 Research of Camera Track Based on Image Matching ........ 339
Yuan Wang
Contents xi
30 Curriculum Design Change of the Industrial Engineering
BA Program....................................... 349
Eszter Bogdány, Ágnes Balogh, Gabriella Cerháti,
Tibor Csizmadia and Réka Polák-Weldon
31 Comparing Two Methods of Sound Spatialization:
Vector-Based Amplitude Panning (VBAP)
Versus Linear Panning (LP) ........................... 359
Jonathan Cofino, Armando Barreto and Malek Adjouadi
32 Contrast Enhancement in Image Pre-Compensation
for Computer Users with Visual Aberrations ............... 371
Jian Huang, Armando Barreto, Malek Adjouadi and Miguel Alonso
33 Interaction with 3D Environments Using
Multi-Touch Screens................................. 381
Francisco Ortego, Naphtali Rishe, Armando Barreto
and Melek Adjouadi
34 TCP with Extended Window Scaling ..................... 393
Michal Olšovsky
and Margaréta Kotoc
35 Offering SaaS as SOA Services ......................... 405
Ali Bou Nassif and Miriam A. M. Capretz
36 Using Conceptual Mini Games for Learning: The Case
of ‘The Numbers’ Race’ (TNR) Application ............... 415
C. T. Panagiotakopoulos and M. E. Sarris
37 Visual Cryptography Based on Optical Image Projection ...... 431
Rita Palivonaite, Algiment Aleksa and Minvydas Ragulskis
38 A New Service Offered by Digital Radio for Vehicle Drivers . . . 443
Cabani Adnane and Mouzna Joseph
39 Separation of Concerns in Extensible Control Systems........ 451
Martin Rytter and Bo Nørregaard Jørgensen
40 Illicit Image Detection: An MRF Model Based
Stochastic Approach ................................. 467
Mofakharul Islam, Paul Watters, John Yearwood,
Mazher Hussain and Lubaba A. Swarna
xii Contents
41 Illicit Image Detection Using Erotic Pose Estimation
Based on Kinematic Constraints ........................ 481
Mofakharul Islam, Paul Watters, John Yearwood,
Mazher Hussain and Lubaba A. Swarna
42 Energy Efficient Public Key Cryptography in Wireless
Sensor Networks.................................... 497
Vladimir Cervenka, Dan Komosny, Lukas Malina
and Lubomir Mraz
43 Implementation of VLSB Stegnography Using Modular
Distance Technique.................................. 511
Sahib Khan and Muhammad Haroon Yousaf
44 A Graphic User Interface for H-Infinity Static Output
Feedback Controller Design ........................... 527
J. Gadewadikar, K. Horvat and O. Kuljaca
45 Active Contour Texture Segmentation in Modulus
Wavelet Feature Spaces .............................. 537
Ashoka Jayawardena and Paul Kwan
46 A Framework for Verification of Fuzzy Rule Bases
Representing Clinical Guidelines ........................ 545
M. Esposito and D. Maisto
47 Communication Impact on Project Oriented Teaching
in Technology Supported Education ..................... 559
Martin Misut and Katarina Pribilova
48 A Failure Modes and Effects Analysis of Mobile
Health Monitoring Systems ............................ 569
Marcello Cinque, Antonio Coronato and Alessandro Testa
49 SemFus: Semantic Fusion Framework Based on JDL......... 583
Havva Alizadeh Noughabi, Mohsen Kahani and Behshid Behkamal
50 Development of GUI Based Test and Measurement Facilities
for Studying Properties of MOS Devices in Clean
Room Environment.................................. 595
Shaibal Saha and Supratic Chakraborty
Contents xiii
51 Prediction of Failure Risk Through Logical Decision Trees
in Web Service Compositions .......................... 609
Byron Portilla-Rosero, Jaime A. Guzmán and Giner Alor-Hernández
52 SEC-TEEN: A Secure Routing Protocol for Enhanced
Efficiency in Wireless Sensor Networks ................... 621
Alkore Alshalabi Ibrahim, Abu Khalil Tamer
and Abuzneid Abdelshakour
53 An Integration of UML-B and Object-Z in Software
Development Process ................................ 633
Mehrnaz Najafi and Hassan Haghighi
54 Algorithm for Dynamic Traffic Rerouting and Congestion
Prevention in IP Networks ............................ 649
Martin Hruby
, Margaréta Kotoc
ová and Michal Olšovsky
55 Fovea Window for Wavelet-Based Compression............. 661
J. C. Galan-Hernandez, V. Alarcon-Aquino, O. Starostenko
and J. M. Ramirez-Cortes
56 Energy Aware Data Compression in WSN................. 673
Roshanak Izadian and Mohammad Taghi Manzuri
57 Energy Consumption Text and Image Data
Compression in WSNs ............................... 683
Roshanak Izadian and Mohammad Taghi Manzuri
58 New QoS Framework for Mobile Ad hoc Networks Based
on the Extension of Existing QoS Models.................. 697
Peter Magula and Margaréta Kotoc
59 Method for Data Collection and Integration into
3D Architectural Model .............................. 707
L. Kurik, V. Sinivee, M. Lints and U. Kallavus
60 Statistical Analysis to Export an Equation in Order to Determine
Heat of Combustion in Blends of Diesel Fuel with Biodiesel .... 719
C. G. Tsanaktsidis, V. M. Basileiadis, K. G. Spinthoropoulos,
S. G. Christidis and A. E. Garefalakis
61 The Retail Banking Adverse Selection:
RCBS Calculator Solution............................. 729
M. Hedvicakova, I. Soukal and J. Nemecek
xiv Contents
62 Project Management in Public Administration Sector ........ 741
M. Hedvicakova
63 Access Point Checking to Improve Security in Wireless
Infrastructure Networks .............................. 751
Ammar Odeh and Miad Faezipour
64 Comparison of Fractional PI Controller with Classical
PI using Pareto Optimal Fronts ........................ 763
O. J. Moraka
65 A Pattern-Based Approach for Representing Condition-Action
Clinical Rules into DSSs .............................. 777
A. Minutolo, M. Esposito and G. De Pietro
66 Authorization of Proxy Digital Signature
in Workflow Systems ................................ 791
Samir Fazlagic and Narcis Behlilovic
67 Semi-Agile Approach to Software Development Process ....... 801
Deniss Kumlander
68 The Influence of Student Body-Talk Reaction in Formulating
Effective Teaching Strategy............................ 811
Ahmad Sofian Shminan and Runhe Huang
69 Interactive Mind Map Desktop Widget: A Proposed Concept. . . 829
Tan Wei Xuan, Shakirah Mohd Taib and Saipunidzam Mahamad
70 An Algorithm for Replication in Distributed Databases ....... 839
Adrian Runceanu and Marian Popescu
71 General Dispatching of Lignite Mining Pit................. 849
Constantin Cercel and Florin Grofu
72 Towards Improving the Statscan
X-Ray Image Quality
through Sliding-Mode Control of the C-Arm ............... 857
M. Esmail, M. Tsoeu and L. John
73 Mechanical Energy Conversion to Electromagnetic Energy
for Magnetic Fluids: Theoretical Fundaments
and Applications.................................... 871
Aurel-George Popescu and Adrian Runceanu
Contents xv
74 Initial Steps Towards Distributed Implementation
of M-Urgency ...................................... 883
Shivsubramani Krishnamoorthy, Arun Balasubramanian
and Ashok K. Agrawala
75 Optimal Selection of Components in Fault Detection Based
on Principal Component Analysis ....................... 901
Patricia Helen Khwambala
76 E-Learning Environment Identification System:
Error Injection and Patterns Dynamics ................... 917
Deniss Kumlander
77 Energy Consumption by Deploying a Reactive Multi-Agent
System Inside Wireless Sensor Networks .................. 925
Alcides Montoya and Demetrio Ovalle
78 Network Intrusion Detection System Based on SOA
(NIDS-SOA): Enhancing Interoperability Between IDS ....... 935
Wagner Elvio de Loiola Costa, Denivaldo Lopes,
Zair Abdelouahab and Bruno Froz
79 Lyrebird: A Learning Object Repository Based
on a Domain Taxonomy Model ......................... 949
Ingrid Durley Torres, Jaime Alberto Guzman Luna
and Jovani Alberto Jimenez Builes
80 Design Process and Building Simulation .................. 961
Heitor da Costa Silva, Clarissa SartoriZiebell,
Lennart Bertram Pöhls and Mariana Moura Bagnati
81 Behavioral Models with Alternative Alphabets.............. 975
Mohammed Lafi and Jackson Carvalho
82 Watermark Singular-Values Encryption and Embedding
in the Frequency Domain ............................. 989
Chady El Moucary and Bachar El Hassan
83 Business Intelligence Made Simple . . . . . . . . . . . . . . . . . . . . . 1001
Vasso Stylianou, Andreas Savva and Spyros Spyrou
xvi Contents
84 A Process Model for Supporting the Management of Distance
Learning Courses Through an Agile Approach . . . . . . . . . . . . 1013
Amélia Acácia M. Batista, Zair Abdelouahab,
Denivaldo Lopes and Pedro Santos Neto
85 Numerical Modeling of Electromagnetic Induction Heating
Process Using an Inductor with Constant Step
Between Turns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027
Mihaela Novac, Ovidiu Novac, Mircea Gordan
and Cornelia Gordan
86 Satisficing-Based Approach to Resolve Feature
Interactions in Control Systems. . . . . . . . . . . . . . . . . . . . . . . . 1039
Jan Corfixen Sørensen and Bo Nørregaard Jørgensen
87 Properties Evaluation of an Approach Based
on Probability-Possibility Transformation . . . . . . . . . . . . . . . . 1053
M. Pota, M. Esposito and G. De Pietro
88 Functional Verification of Class Invariants in CleanJava . . . . . 1067
Carmen Avila and Yoonsik Cheon
89 Normalization Rules of the Object-Oriented Data Model . . . . . 1077
ch Merunka and Jakub Tu
90 Location Based Overlapping Mobility
Aware Network Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091
Abdul Razaque, Aziz Alotaibi and Khaled Elliethy
91 Expert System for Evaluating Learning Management Systems
Based on Traceability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103
E. Valdez-Silva, P. Y. Reyes, M. A. Alvarez, J. Rojas
and V. Menendez-Dominguez
92 How Variability Helps to Make Components More
Flexible and Reusable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115
Yusuf Altunel and Abdül Halim Zaim
93 Computing and Automation in the AEC Industry: Early Steps
Towards a Mass Customized Architecture . . . . . . . . . . . . . . . . 1129
Neander Silva, Diogo Santos and Ecilamar Lima
Contents xvii
94 Three Dimensional SPMD Matrix–Matrix Multiplication
Algorithm and a Stacked Many-Core
Processor Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1139
Ahmed S. Zekri
95 Face: Fractal Analysis in Cell Engineering . . . . . . . . . . . . . . . 1151
K. P. Lam, D. J. Collins and J. B. Richardson
96 A First Implementation of the Delay Based
Routing Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1165
Eric Gamess, Daniel Gámez and Paul Marrero
97 Different Aspects of Data Stream Clustering . . . . . . . . . . . . . . 1181
Madjid Khalilian, Norwati Mustapha, Md Nasir Sulaiman
and Ali Mamat
98 Teaching Computer Ethics Via Current News Articles. . . . . . . 1193
Reva Freedman
99 Designing and Integrating a New Model of Semi-Online
Vehicle’s Fines Control System . . . . . . . . . . . . . . . . . . . . . . . . 1205
Anas Al-okaily, Qassim Bani Hani, Laiali Almazaydeh,
Omar Abuzaghleh and Zenon Chaczko
100 State Diagnosis of a Lignite Deposit by Monitoring
its Surface Temperature with a Thermovision Camera . . . . . . 1219
Alina Dinca
101 A Framework Intelligent Mobile for Diagnosis Contact
Lenses by Applying Case Based Reasoning . . . . . . . . . . . . . . . 1233
Eljilani Mohammed
xviii Contents

Chapters (51)

The concept of “four element groups” means that all elements of a dynamic system can be divided into four groups: (1) constant elements, (2) state elements, (3) intermediate elements, (4) listed elements. This concept is realized in my MM&S-computer program with two facts. The first one is that four above mentioned element groups are correspondingly assigned four symbols: circle, square, rhombus, circle with three signs (these signs signal how we should handle this listed element at time point where its value has not been declared). These symbols are used to draw simulation scheme of interaction of the system elements. The concept of “change rate” means that every state element has a change rate as its attribute. Other elements of the system affect current state element by affecting its change rate. The current state element affects other elements of the system with its value. This concept is realized in my MM&S-computer program with the fact, that the links connect the state elements directly. In case if a state element has a incoming link, we understand that the change rate of this state element is being affected. Once change rate is an attribute of the state element, the value of the state element can be automatically used for the calculation of change rate. Realization of these above concepts make the simulation scheme of a dynamic system more clear and simple. This paper gives the reasoning for these concepts and also describes the model formats, model calculation in MM&S-computer program.
Inventory Management is one of the basic problems in almost every company. Before computer age and integration, paper tables and paperwork solutions were being used as inventory management tools. These we very far from being a solution, took so much time, even needed employees just for this section of organization. There was no an efficient solution available in the many companies during these days. Every process was based on paperwork, human fault rate was high, the process and the tracing the inventory losses were not possible, and there was no efficient logging systems. After the computer age, every process is started to be integrated into electronic environment. And now we have qualified technology to implement new solutions to these problems. Software based systems bring the advantages of having the most efficient control with less effort and employees. These developments provide new solutions for also inventory management systems in this context. In this paper, a new solution for Inventory Management System (IMS) is designed and implemented. Most importantly, this system is designed for Kadir Has University and used as Inventory Management System.
A decade into the twenty-first century and the frenzy to stay in the fore-front of discovering and adopting new technologies globally, in offices, malls and houses has no signs of declining. Education field is no different. With the rapid convergence of the information age and the boom in technology usage, information technology has taken a firm place in classrooms across borders. With this demand, the demand for academic text, publications, and other sources at students' finger tips is at a record high (American Library Association, 2011). As the demand for online sources increase, so do the sources themselves, or do they? This study looks closely at nearly 20 different tertiary education institutions and determines if, at all, the online sources have increased as perceived.
Communication systems are usually implemented on a heterogeneous infrastructure and must operate in environments with accelerated dynamics. Adaptation is thus a key feature of such a system. Long-term, sustainable, adaptive solutions did not receive much attention in the design phase of wireless communication systems. With the advent of LTE, which was designed as a highly flexible radio interface - created to evolve - there is room for disruptive solutions to be put in place. A new approach for the receiver is proposed, where the antenna takes an active role in characterising and eventually learning the operation environment. The proposed solution - a Cognitive Antenna System (CAS), is based on two main mechanisms that we called antenna vision (AV) and signal fishing (SF). In the core cognitive cycle 'observe-decide-act' we aim to improve the 'observe' part, which critically influences the whole decision process. The SF and AV mechanisms bring a set of advantages: higher received SNR, no additional noise, higher AoA estimation accuracy.
There exists today a wide range of sites on the Web, from personal to content oriented, and from academic to purely commercial websites, and certainly others will appear in the near future. Unfortunately, so many websites cannot capture the attention and interest of visitors/customers, many of the existing websites being poorly designed. The main purpose of this study is to identify the best designed website in the top 100 most valuable companies in Romania. Due to their nature, the criteria and the number of awarded points were valued according to a subjective basis, as described in papers of Gálfi et al. [1] and Kovács et al. [2]. On the one hand, as we will see, there is little or no connection between the company’s position in the top and the quality of their website. On the other hand, the analyzed websites are far from perfection, and we would recommend that the administrators and/or webmasters pay more attention to pages design and upgrading frequency.
In evolutionary computation, a lot of research has been done on multi-objective optimization (MOO). MOO is based on the concept of Pareto-optimal sets, also known as, Pareto-optimal fronts. However, there has been very little research done in comparing controllers using Pareto-optimal fronts. The problem of designing controllers can be viewed as a MOO problem where we try to optimize the performance, robustness and other characteristics of the controller. This paper uses a plant model from a hydraulics application which compares a proportional-integrator (PI) controller and fractional PI controller (FPI). A Pareto-optimal front is generated for each of these controllers. Since each objective is an extra dimension, if we optimize for n objectives then the Pareto-optimal front will have n dimensions. Therefore it is difficult to compare the controllers visually. Firstly, the number of dimensions is reduced using a feature selection technique called population-based incremental learning (PBIL). The Pareto-optimal front points are then classified using a nearest centroid classification. If the classification accuracy is high then the centroid is a good representation of the cluster of points (within the Pareto-optimal front under consideration). The centroids of two fronts were then used to compare the PI and FPI controller.
Data collection with the help of remote sensing is significant in the field of gathering information about the environment quickly and effectively. In case of the red mud disaster in Ajka, Hungary Oct. 4, 2010 our group of researchers carried out an extensive remote sensing data collection with the co-ordination of Science Council of the Committee of the Government Coordination Commission, applying the most up-to-date technologies of remote sensing and data processing. In this publication besides the main points in planning and executing air shots we also summarize the results of data processing with image analysis during the evaluation of the catastrophe and the compensation period.
Wireless networks have become a tremendous network solution for home and enterprise users, without worrying about wire, and mobility. With IEEE 802.11e Wireless Local Area Networks (WLAN), we have implemented Quality of Service (QoS) to our wireless network that provides significant improvements for high-priority QoS traffic. However, these improvements have a negative performance impact to lower-priority traffic, such as HTTP, FTP etc. In this paper, we examine two IEEE 802.11e QoS functions which are Point Coordination Function (PCF), and Hybrid Coordination Function (HCF). We also examine their negative effects on performance of lower-priority traffic in two different WLAN infrastructures which are Basic Service Set (BSS) and Extended Service Set (ESS), using OPNET Modeler software. We evaluate the impact of high-priority traffic (with QoS enabled) on low-priority-traffic when they use the same access point. All of the simulation results proved that it has a significant detrimental impact to low-priority-traffic. Performance of HTTP, FTP, and database traffic drops when VoIP and video applications are using same access point.
It is possible to use different designs to deal with the missing information problem in SQL databases. In this paper, we use a multi-criteria decision support method, which is based on the Analytic Hierarchy Process, to evaluate a set of possible designs for dealing with missing information. One of the designs uses SQL NULL-marks, another design uses tables that are in the sixth normal form, and one of the designs uses special values to represent missing information. We evaluate the designs, which are implemented in a PostgreSQL ™ database, in terms of two hypothetical contexts. We create a test database, perform measurements, and use the results to compare the designs. The results of the evaluation provide new insights into the advantages and disadvantages of the different designs.
Mobile learning has become apprentice for today’s education. With the emerging of mobile technologies, variety of features of current mobile applications could benefit the learners with enhanced learning environment while playing anywhere, anytime. This paper presents a framework of mobile English learning system for Malaysian Primary School for children aged from 9 to 12 years old. It aims to provide both fun and educational features to the learners by offering game-based activities to stimulate their imagination and challenge their curriculum skills such as antonyms, synonyms and sentence structures. The proposed architecture supports cross platform user interface and the framework offers reliability to provide the learner with some erudition input.
In this paper, we describe the implementation mechanism of the basic movements in Robocup 3D Simulation game, study the ZMP and the rotation matrix’s application in the agent’s action, which compared with simulation tracking data. In addition, we designed and developed a dynamic simulation software used to simulate agent body movements to help us with the in-depth analysis of the agent motion. And we also use evolutionary algorithm to optimize the motion parameters of Agent. Experiments proved that method of rotation matrix and the ZMP in agent movement calculation meet the accuracy requirements such as real-time. The software of dynamic simulation and Evolutionary Algorithm perform well in agent motion analysis and parameter optimization.
Current mobile applications oftentimes require power-consuming localization services. In this paper, we outline the co-localization approach, where nodes share their location with peers, enabling a reduction in the costs of localization when a precise location fix is desired. While several works in this domain compare the accuracy of localization techniques in cooperative scenarios, we focus our evaluation on the power consumption and accuracy that can be achieved. We present a first model and evaluation using statistics and traces derived from two human mobility models. We find that for 15 minute intervals of location requests, a cooperative localization approach can reduce the costs associated with localization if half of the nodal peer encounters are with location-sharing nodes and GPS is usable about half the time.
Continuous research and works on the implementation of Apriori algorithm into educational environment proved that Association rule has evolved. This paper analyze enrollment pattern of final semester students from a university and discover interesting knowledge that may help the timetable committee in reducing clash conflict and for future decision making along the gradual process. The factor of clash conflict has been identified based on increasing number group of students whose did not follow the course structure guideline that has been designed for them. By producing prototype that adopts Apriori algorithm, it reveals the strong rules based on the extracted data. It is potential to apply into existing timetable preparation process to added new value in order to increase system performance while reduce number of class clashes. The rules or patterns produced by the prototype will then be compared with the existing course structure to evaluate the similarity and connection between courses.
Higher education institutions are complex adaptive systems that need to respond to environmental pressures in a flexible way in today’s dynamically changing environment. Resource dependency theory provides a framework to understand the process of adaption required to meet challenges. Based on the theory this paper introduces a case study presenting curriculum design change of Industrial Engineering BA program at the University of Pannonia, Hungary. The case study followed four steps of curriculum design change: reasons, design and development, teacher preparation and course design, and course evaluation. As a result of external and internal constraints the foreign language education and learning modules of the Industrial Engineering BA program had to be improved in 2009. After almost 3 years of offering a new foreign language introductory course the evaluation of the efficiency became necessary. Results show that learning module change has a positive effect on student activities of foreign language course enrolments and efficiency.
The increase in availability of multi-touch devices has motivated us to consider interaction approaches outside the limitations associated with the use of a mouse. The problem that we try to solve is how to interact in a 3D world using a 2D surface multi-touch display. Before showing our proposed solution, we briefly review previous work in related fields that provided a framework for the development of our approach. Finally, we propose a set of multi-touch gestures and outline an experiment design for the evaluation of these forms of interaction.
Software as a Service (SaaS) is an approach in which software applications are delivered on demand to users as services. Service Oriented Architecture (SOA) is a promising paradigm that allows companies that run their software on different plat-forms to interoperate among each other. The popularity of SaaS has been soaring since customers do not have to carry the burden of paying money upfront to purchase software licensing. The interest in using SOA to run different applications has been proliferating, especially since web services have started to implement SOA. Research is being conducted to observe how SOA can benefit SaaS. This paper presents an overview of SaaS, SOA and web services. Moreover, a new model is proposed to show how SaaS can be offered as SOA services. Furthermore, a real-life example is given to demonstrate the benefits of using the proposed model.
This study reports the basic characteristics of an experimental conceptual mini-game called “The Numbers’ Race” (TNR), developed with Microsoft Visual Studio. The TNR mini-game concerns a standalone training application that aims at raising achievement levels in the simple mathematical task of addition and giving insights into the strategies used by children when performing simple computational tasks. In this paper the design and the development issues for TNR application are also discussed. Finally, the results of summative evaluation are presented concerning TNR effects on a student sample. The results are very encouraging regarding the improvement of the sample’s computational skills.
In this article, we present the advantages of digital radio and specially the T-DMB standard services for road users like TPEG and BIFS. We propose a new T-DMB service using BIFS for the rescue operation during the French red plan.
The extensibility of non-trivial control systems is often constrained by unsatisfactory separation of concerns. Unfortunately, concerns frequently encountered in the control system domain are difficult to separate using domain independent approaches—e.g. aspects and other advise-based techniques. Thus, improved extensibility can only be achieved by inventing domain-specific soft-ware architectures for control systems that improve separation of concerns. In this paper, we analyze concerns emerging in a control system for industrial plant cultivation in greenhouses, and we present a software architecture that improves the separation of those concerns. The experience shared in the paper is the result of cooperation between software engineers, plant physiologists, and a control system vendor. 39.1 Introduction An extensible system is a system that promotes the introduction of new func-tionality. Ideally, we would like independent extensibility—i.e. a situation where extensions can be combined without requiring a global integrity check [1]. Inde-pendent extensibility is particularly useful when a system is built from components that are independently developed.
The steady growth of the Internet, sophisticated digital image processing technology, the cheap availability of storage devices and surfer's ever-increasing interest on images have been contributing to make the Internet an unprecedented large image library. As a result, The Internet quickly became the principal medium for the distribution of pornographic content favouring pornography to become a drug of the millennium. With the arrival of GPRS mobile telephone technology, and with the large scale arrival of the 3G networks, along with the cheap availability of latest mobile sets and a variety of forms of wireless connections, the internet has already gone to mobile, driving us toward a new degree of complexity. In this paper, we propose a stochastic model based novel approach to investigate and implement a pornography detection technique towards a framework for automated detection of pornography based on contextual constraints that are representatives of actual pornographic activity. Compared to the results published in recent works, our proposed approach yields the highest accuracy in detection.
This work proposes a spanking new technique, Modular Distance Technique, to implement Variable Least Significant Bits Stegnography, in spatial domain, providing twofold security. It is an overriding and secure data embedding technique having low data hiding capacity of with least distortion. This is much immune to Steganalysis providing a large Key Size. This technique can be implemented with Euclidean, Chess Board and City Block distances with same data hiding capacity for each and contributing significantly to the key size. The key size of modular distance technique is almost 27 times of the size of the square of cover image. Low distortion made it difficult for intruder to detected hidden information and large key size make it difficult to extract the hidden information. This technique is contributing a data hiding capacity of 12.5-56.25 % with SNR ranging from 29.7 to 8 db. The hiding capacity and SNR varies with changing reference pixel, base of Mod and type of distance.
In this paper we discuss a model that is able to segment textures using active contours. Our technique is based on active contour techniques using curve evolution. We build our model on properties of human vision, in that we segment the textures in a certain feature space. We will show the advantages of using modulus feature spaces. Wavelet coefficients are shown to exhibit local features both in space and frequency domains. We will implement our model in modulus wavelet subbands.
The increase of expert knowledge is characterizing medical domain and determining a constantly growing and interacting number of relevant standardized specifications for care known as clinical guidelines. However, most clinical guidelines, especially when expressed in the form of condition-action recommendations, embody different kinds of structural errors that compromise their effectiveness. With this respect, this paper presents a framework to represent condition-action clinical recommendations as "IF-THEN" fuzzy rules and to verify the presence of some structural anomalies. In particular, we propose a method to detect redundancy, inconsistency and contradictoriness - a structural anomaly introduced in this paper for the first time - in a very simple and understandable way by using the concept of similarity between antecedents and consequents. Formalization in fuzzy degrees for these anomalies can be straightly interpretable as measurements suggesting how to suitably modify the clinical rules to eliminate or mitigate undesired effects. The framework has been assessed on a relevant sample set identified from the clinical literature with profitable results.
Text describes results of research conducted at Faculty of Education of Trnava University in Trnava. One of the stated goals was to find out what is the impact of communication among students and teachers, as well, on the effectiveness of project oriented education. Experiments were made with students during the computer science courses.
Many solutions are emerging for the remote and continuous monitoring of unpredictable health problems, such as cardiac diseases. These are designed to be minimally invasive for health monitoring and based on smart and mobile technologies conformable to the human body, helping to improve considerably the autonomy and the quality of life of patients. Clearly, the correct functioning of these systems is very critical for the safety of patients, hence their practical application calls for stringent dependability requirements which need to be assessed against potential failure modes since the inception of the system, in its design phase. Despite the criticality of the problem, there is still little knowledge about the typical failures that may affect the correct functioning of these systems. Without such knowledge, it becomes difficult to devise effective countermeasures to failure events. To fill this gap, this paper proposes a Failure Mode and Effect Analysis (FMEA) for a typical mobile health monitoring system. Based on past results and extensive studies, the analysis allowed to identify the main failures, their consequences, and possible causes, affecting the functional components of modern health monitoring systems.
When Wireless sensor Networks are composed of a huge number of sensor nodes with limited energy resources, designing an energy efficient protocol will become a critical key issue that needs to be dealt with in order to expand the life span of the entire network. This paper proposes adding security features to the TEEN (Threshold sensitive Energy Efficient sensor Network) protocol by adopting the authentication part of the so-called SEC-LEACH (Secure Low Energy Adaptive Clustering Hierarchy) protocol. The paper then continues by showing how well this improvement goes by running experimental testing with multiple rounds. The new proposed SEC-TEEN improves the network security in and makes it more robust to external threats.
Wavelet foveated compression can be used in real-time video processing frameworks for reducing the communication overhead while keeping high visual quality. Such algorithm leads into high rate compression results due to the fact that the information loss is isolated outside a region of interest (ROI). The fovea compression can also be applied to other classic transforms such as the commonly used the discrete cosine transform (DCT). In this paper, a fovea window for wavelet-based compression is proposed. The proposed window allows isolate a fovea region over an image. A comparative analysis has been performed showing different error and compression rates between the proposed fovea window for wavelet-based and the DCT-based compression algorithms. Simulation results show that with foveated compression high ratio of compression can be achieved while keeping high quality over the designed ROI.
Rapid development in the field of smartphones over past years has enabled using their multimedia capabilities in virtually reconstructing and visualizing architectural objects by creating 3D-models of such objects. Several authors have tested cell phone cameras accuracy. For example Nokia N93, Sony Ericsson K750i, iPhone placed under test could be successfully used in applications not requiring ultimate precision [Gruen A, Akca D (2009) Evaluation of metric performance of mobile phone cameras. Institute of Geodesy and photogrammetry, ETH, Zurich. doi:10.3929/ethz-a-005749738; Takahashi Y, Chikatsu H (2009) 3D Modelling and visualization of cultural heritage using mobile phone cameras. In: Proceedings of the 3rd ISPRS international workshop 3D-ARCH, Trento]. Rapid technical development in the field of unmanned aerial vehicles (UAV) and lowering of their cost has made them available practically for everyone interested and eased tremendously use of such machines in aerial photography and photogrammetry [Eisenbeiss H (2009) UAV photogrammetry. Ph.D thesis, Dissertation ETH no. 18515, ETH Zurich; Remondino F, Barazzetti L, Nex F, Scaioni M, Sarazzi D (2011) UAV photogrammetry for mapping and 3D . In: Proceedings of the international conference on unmanned aerial vehicle in geomatics (UAV-g), Zurich]. We used Nokia N8 smartphone in our study since it had best optical, computing and communications capabilities at the time of this writing. In present paper we illustrate two ways of using smartphone’s camera in mapping object’s properties. One is a well known method of photogrammetric 3D-modelling. Another is a less used method of photogrammetric positioning [Dillon MJ, Bono RW, Brown D. L (2004) Use of photogrammetry for sensor location and orientation. IMAC-XXII: conference and exposition on structural dynamics, Jacksonville; Mautz R, Tilch S (2011) Survey of optical indoor positioning systems. In: Proceedings of the international conference on indoor positioning and indoor navigation, Guimarães]. Firstly we demonstrate mapping of moisture content using photogrammetric positioning of sensor. Mechanically rigidly connected moisture probe and phone (together with built-in camera and special software) are linked via a bluetooth adapter enabling thus synchronisation of moisture measurement results to exact location. Individual results are stored directly to accompanying image file used for positioning each measurement. Such approach should eliminate possible human errors common in long and tedious measurements. Secondly a 3D model of a Tallinn Observatory tower is created by traditional means using phones built-in 12 megapixel camera. Low weight of the phone (about 120 g) enabled transporting it to suitable photographing positions onboard an airborne UAV. Described in present paper method is suitable for 3D-mapping of a large variety of physical properties of objects in interest.
Herein we try to export equations which describe the variation of heat of combustion in blends of Diesel fuel with Biodiesel. Using specific volume of these blends, we determine heat of combustion, in order to study the contribution of each kind of Biodiesel and we convert the statistical data into mathematic relations as a specific formula, attempting to achieve an empirical evaluation.
The paper is focused on the field of retail core banking services market (RCBS) in the Czech Republic. The surveys of the European Union repeatedly identified fundamental market imperfection—the asymmetry of information. The specific manifestations of this problem are clients’ high costs on search or the market overview, tariff opacity, product-tying and lack of comparison tools. At the end of the 2010 there was launched the web-accessible system of RCBS calculator that help the client to get the market overview individually adjusted to his or hers RCBS usage profile. The paper uses the BPM to introduce the system’s data acquisition module that is a key part of process. The rest of the paper shows the possibility how to employ the data acquired during the process to even more help to reduce the costs on search for the optimal product according the price and range of the demanded services.
Abstract Security issues are taken into consideration for many applications and are also an integral part of computer networks. On one hand, security especially comes into picture when transferring data from one device to another. On the other hand, rapid migration of networks from wired to wireless increase security complications among these networks. This research paper, initially describes the security issues over wireless infrastructure networks, and identifies different types of attackers. The 802.11 standard security mechanisms as well as some encryption techniques such as RSA are discussed. A new methodology called Access Point Checking is then proposed which relies on a checksum-bit check at the access point before completing the data transfer. This technique outperforms traditional security mechanisms in terms of timing characteristics.
A comparison between the fractional order PI (FOPI) controller and integer-order PI (IOPI) controller, and also between FOPI and IOPI with lead circuit, is conducted in this paper. The performance comparisons are conducted for a servo system. The FOPI controller is a controller with fractional-order integral, where the order parameter can be used to adjust the closed loop response of the servo system. The controllers are compared using the Pareto Optimal Front (POF) of each controller. The FOPI is approximated using Oustaloup’s approximation method. The approximated FOPI cannot achieve the positive values of the ideal FOPI in the phase-magnitude Bode plot. The POFs show that the FOPI is not always better than IOPI. The IOPI with lead circuit achieves performance which is similar to FOPI. Thus that the IOPI controller with lead circuit can be used to obtain a performance that closely matches the performance of the FOPI controller. The implemented FOPI controller did not track the setpoint. The IOPI controller, and also with a lead circuit, tracked the setpoint.
The integration of clinical recommendations into clinical Decision Support Systems (DSSs), aims at increasing the consistent, effective, and efficient of the daily medical practice. The actual application of those systems to medical settings depends on the severity of the upgradability and maintainability they require. With this respect, this paper proposes a pattern-based approach to guide and assist physicians in the process of editing and formalizing clinical recommendations, formalized as if-then rules.
This research attempts to explore and elucidate the potential applications of educational technologies such as ICT and ubiquitous computing technologies in solving core domain problems that exist in lectures of higher education. This article emphasizes the importance of student-centric awareness in an effective teaching system. Apart from the continuously integrated and updated personal profile, non-verbal communication such as students’ body-talk reaction is one of the important elements of reading and understanding students in the classroom. In the proposed effective teaching system, student facial expression and sitting posture are continuously monitored and analyzed, based on the applicable set of effective teaching support agents are employed to support a teacher to make a conclusion, take an action, or automatically involve in the teaching process.
Electronic mail (Email) system has become a popular method of communication in sharing and growing the knowledge. Selected documents that are shared through email attachments will be downloaded to the personal storage of the receivers. In order to ease the searching of the retrieved files, a basic taxonomy (classification in hierarchical structure) has been used as a common method to organize the storage directories. However, the directory classification need to be improved because by referring to a directory’s name only, it is not enough to briefly understand the content of the files. This paper proposes a mind map of tags concept to be an additional element to enhance the documents classification and retrieval. The mind map is applied as a classification widget on a desktop that represents links of documents in the respective cloud of tags. The method and the proposed framework are discussed.
Distributed databases are an optimal solution to manage important amounts of data. We present an algorithm for replication in distributed databases, in which we improve queries. This algorithm can move information between databases, replicating pieces of data through databases.
High automation level of mining pit machinery, they dispersion, high number of information required to control the whole technological process, are just few elements that highlight the complexity of activities from a lignite mining pit equipped with excavation machinery, continuous transport and dumping machinery. A good working of all implied machineries in technological process from a mining pit is provided by remote control from distance after some rules required by the technological, technical and working security restrictions control realized by a mining pit dispatcher [Popescu L, Cristinel R, Florin G (2006) Numeric system for energetic control feasible in NSLO pits. Revista Minelor No.5, ISSN 1220-2053]. This paper proposes a dispatching system on National Society of Lignite Oltenia level, which may integrate the whole technological process from each mining pit in Oltenia.
This article treats the static conversion of mechanical energy to electromagnetic energy, known as electromagnetic-acoustic, in magnetic fluids (E.M.A.) showing correlation to the "Theory of Sonics", part of the domain named "Electro sonicity". It retains the quality and is named magnetic fluid, a colloidal system formed by dispersing to monodomenic sizes, followed by the stabilization of a solid material with magnetic properties, in a liquid, usually with dielectrically properties. The electromagnetic-acoustic transformation [1] in a medium shows all the phenomenons linked to the kindling and recording of elastic oscillations by using the electromagnetic field or to the electromagnetic waves by using the mechanical oscillations. The original issues contained in this article are: (1) The highlighting of the physical and mathematical connection between the specific electrical formalism and the Theory of Sonics by introducing the sonic power in B8 (B18) formula. (2) The materialization of theoretical results on the conversion of mechanical energy into electromagnetic energy, as a vibration transducer whose originality is certified by the patent no 110872C1/1996 by title "Vibration transducer" [4].
Intelligent software agents can be a valuable tool to model and implement wireless sensor networks (WSN). Such networks have a set of inherent limitations, such as energy, limited resources, limited computing, and unreliable wireless links. These limitations make the design and development of intelligent software agents and multi-agent systems in such networks hard and complex. In near future, WSNs will be more robust and highly supported by intelligent agents that will allow WSNs to behave like intelligent systems. This paper presents the results of an experimental WSN system executing reactive agents in nodes. We measure the energy consumption and propose a possible integration model of multi-agent architectures, with WSNs using plug computers as a strong base station.
Taking advantage to a maximum of the records that contain data regarding learning objects has been a widely studied task in various fields of research. Web semantics is one of the most promissory; this paradigm is used with the purpose of dealing with the significant heterogeneity expressed by different users of objects themselves (authors, teachers and students). Lyrebird was born under this perspective; it is a repository of learning objects which provides sufficient semantic information to facilitate the reuse of learning objects ranging from processes such as classification, search and retrieval of information implementing three ontologies which are: one to specify a Domain of knowledge, another to define a learning object and lastly a to model metadata.
Protecting digital assets has become not only a taken-for-granted practice in most electronic applications for content and ownership authentication, but robustness and efficiency are becoming decisive attributes when exercising watermarking. A highly efficient approach is suggested and which integrates encryption to a hybrid watermarking algorithm based on the mathematical tools of the well-known singular vector decomposition (SVD) and the discrete wavelet transform (DWT). The innovative attribute of this approach stems from the fact that the suggested method achieves the encryption of the data prior to watermarking in the frequency domain. The encryption algorithm is based on a random key source which entitles the user to have a selected key-length and guarantee a significantly advanced level of intruders’ unawareness. The encryption program is applied to the singular values of the watermark. The watermarking algorithm is based on the combination of the SVD and DWT. This watermarking method has high robustness against geometric transformations but not efficient for malign attacks. The combination of encryption and SVD-DWT algorithms overcomes this last weakness while keeping all advantages. As shown by the simulation results, a high level of robustness and security is attained in the sense that the concealed watermark is indestructible and almost undetectable in many cases. Moreover, the capacity of insertion is sustained at a satisfactory level while securing a high signal-to-noise ratio.
Business Intelligence (BI) refers to a very broad category of applications which assist executive business users to improve their decision making and strategic planning by collecting, storing and analysing a usually large volume of historically collected data and providing access to powerful and dynamic query results. Business Intelligence Systems (BIS) are also sometimes referred to as Decision Support Systems due to the fact that they provide support to users and organisations concerning their decision making. Without a doubt, BI is extremely vital for all organisations in today’s competitive business environment where even the smallest detail could affect the future of an organization. The study of BI is of interest to Computer Science (CS) and possibly the related Computer Engineering majors as well as Management Information Systems (MIS) and in broad to Business Studies majors. A course on BI is not usually a major requirement in any one of these curriculums, and it may not even appear as a major elective but rather be included in some other related course. For example, in the CS undergraduate university curriculum the topic of Business Intelligence may be touched upon briefly in a course on Database Management and in the graduate CS curriculum it usually becomes part of a Knowledge Management course. In the undergraduate (MIS) curriculum some additional mentioning is usually made in an Information Systems course. The brief coverage of the topic and the absence of simple and inexpensive educational tools that could easily explore the role of BI to students do not allow the educator to stress the magnitude of BI. This paper addresses the need for an educational case which will demonstrate to the students the process used to create a BI application and the subsequent use of the BI tool in a simple but realistic way.
Agile principles can be used appropriately in management of general projects, outside the object of study of computer science and allow a quick adaptation to new realities. In this work we propose a management process model of distance learning courses within the context of the Open University of Brazil (Universidade Aberta do Brasil—UAB) in order to manage the flow of activities in the construction of a distance learning course. This research work is based on principles of agile management, model driven engineering and management models for supporting distance learning courses. We provide a domain-specific language based on agile method adapted to UAB context. We propose a prototype of our approach based on models.
To handle the complexity of modern control systems there is an urgent need to develop features as independently developed units of extension. However, when independently developed features are later composed they become coupled through the shared environment resources. As a consequence, the system requirements may no longer be entailed when independent features try to control the same shared environment. Malfunctioning behavior as a consequence of feature interference is know in the literature as the feature interaction problem. This paper present an approach that uses designtime specification of independent requirements, in combination with a runtime arbitrator that search for feature interaction free programs which entail the system requirements. In case of conflicting requirements that can't be satisfied simultaneously, the mechanism supports explanation of the interactions as a context sharing problem. We demonstrate our approach in a real-life control system for industrial pot plant cultivation in greenhouses and show that solutions are found for compatible requirements and that conflicts are identified and explained for incompatible requirements.
The mobile devices provide dynamic behavior in different geographical locations. The location based information plays integral part for enhancing the performance of mobile devices. The right selection of location improves the smooth transition process of context aware services to mobile devices. For example location based information services cover the shopping, travel information, entertainment, different navigation, event information and tracking services. All of these services depend on the actual position of the users. The efficiency and smooth transfer of data contexts also relate to the type of services available to mobile devices. Therefore, the proper selection of technology and positioning methods need to be chosen carefully to obtain the desired accuracy. Several models have been proposed to improve the performance of mobile devices. This paper proposes new approach of location based overlapping that augments the performance of mobile devices and also provides better quality of service (QoS). The proposal is supported by an algorithm that helps to choose the best location for mobile device where signals are stronger. The mobile devices select strong signal- providing base station and each mobile device is free to select any overlapped area. To prove the claim, the proposed model is simulated in ns2 and findings are compared with existing models.
Cross-project and cross-market reusability is the basis for the existence of a component-based development paradigm for the establishment of a software industry based on reusability and conservation of expertise. In this paradigm producer is in need to enhance components’ functional capabilities and increase the audiences for successful marketing, so they tend to add extra features to widen the reuse spectrum. However, this in return is recompensed by the component consumers in means of higher prices for unneeded features, overflowing functionality and superfluous code. The component producers need more flexibility to generate specific patterns of components to deal with the changing requests of consumers. In this paper we provide a basis for more flexible components.
Current applications in image and media processing, scientific and engineering computing require a tremendous processing and higher memory bandwidth to gain high performance. Three dimensional multi/manycore processors stacked with memory layer(s) may provide good processing facilities to enhance the performance of these applications. In this paper, we introduce a proposal of a 3-D stacked many-core processor architecture composing of a number of processing elements (PEs) layers stacked with one or more memory layer shared among all PEs. Unlike many 3-D machine architectures, the proposed model uses local communications between PEs in both horizontal and vertical links avoiding the cost of building specialized interconnection networks. We present a novel memory efficient SPMD blocked algorithm for performing the kernel matrix-matrix multiply operation (MMM), on the 3D processor architecture. Our analytical evaluation of the 3-D stacked architecture showed a near linear speedup as the number of PE layers increases while data communication and redistribution is overlapped with computing.
In this paper, we introduce the first implementation of the Delay Based Routing Protocol (DBRP), a flexible distance vector routing protocol with a delay based metric, that supports authentication and encryption. Besides carrying routing information, DBRP also transports information for common services such as the IP addresses of the DNS servers. It operates over the data link layer and is centered on Type-Length-Value (TLV) tuples, which make it easy to extend to other existing or future network protocols. Our implementation is developed in C++, and offers a GUI developed in Qt for easy configuration. We validate this first implementation under several test scenarios and have obtained very encouraging results. Additionally, the exploratory study of our application that we conduce with a group of students indicates that the protocol can be easily understood and configured through the GUI.
Nowadays the growth of the datasets size causes some difficulties to extract useful information and knowledge especially in specific domains. However, new methods in data mining need to be developed in both sides of supervised and unsupervised approaches. Nevertheless, data stream clustering can be taken into account as an effective strategy to apply for huge data as an unsupervised fashion. In this research we not only propose a framework for data stream clustering but also evaluate different aspects of existing obstacles in this arena. The main problem in data stream clustering is visiting data once therefore new methods should be applied. On the other hand, concept drift must be recognized in real-time. In this paper, we try to clarify: first, the different aspects of problem with regard to data stream clustering generally and how several prominent solutions tackle different problems; second, the varying assumptions, heuristics, and intuitions forming the basis of approaches and finally a new framework for data stream clustering is proposed with regard to the specific difficulties encountered in this field of research.
Many engineering and Computer Science students need to take a course in computer ethics, and many others could benefit from such a course as an aspect of good citizenship. However, many students cannot appreciate a course organized along the lines of traditional categories of ethics. Additionally, undergraduates generally prefer articles that are relevant to their own lives. This paper provides a discussion of new and current articles in areas of computer ethics that we believe are relevant to students. We have classified the articles by features rather than by a preexisting classification. We expect that the use of current news articles will increase students’ understanding of this material and enhance their interest in ethical dilemmas inherent in modern computer systems.
This paper is lead to the development of the system that allows detection of which suitable type of lenses thus will minimize the margin of destruction. The proposed system serves as advisory system to assist in predicting type of lenses in the early stage, through analysis of similar historical events of several aspects of paddy diseases cases and features which are stored in time-series form (temporal information), restructured and re-designed into case based format. The AI technique, case based reasoning (CBR) supports the process of finding the similarity.
... A problem arises in the case when one or more of these selected (relevant) attributes are invalid due to malfunctioning sensors. During malfunctioning, the sensors measurements are stuck at a constant value, e.g., zero, such cases are denoted as stuck-at-zero condition of the sensor [9]. If such a malfunctioning sensor represents a relevant attribute for the target prediction, it leads to unreliable predictions. ...
... However, in real world applications, we do not know the type of noise that can interfere with the sensor measurements. As mentioned in Section 1, valid sensor measurements can be stuck-at-zero [9] in case of malfunction. Applying imputation techniques to extrapolate these values as in the case of a missing value problem is not desirable. ...
Full-text available
Predicting the health of components in complex dynamic systems such as an automobile poses numerous challenges. The primary aim of such predictive systems is to use the high-dimensional data acquired from different sensors and predict the state-of-health of a particular component, e.g., brake pad. The classical approach involves selecting a smaller set of relevant sensor signals using feature selection and using them to train a machine learning algorithm. However, this fails to address two prominent problems: (1) sensors are susceptible to failure when exposed to extreme conditions over a long periods of time; (2) sensors are electrical devices that can be affected by noise or electrical interference. Using the failed and noisy sensor signals as inputs largely reduce the prediction accuracy. To tackle this problem, it is advantageous to use the information from all sensor signals, so that the failure of one sensor can be compensated by another. In this work, we propose an Artificial Neural Network (ANN) based framework to exploit the information from a large number of signals. Secondly, our framework introduces a data augmentation approach to perform accurate predictions in spite of noisy signals. The plausibility of our framework is validated on real life industrial application from Robert Bosch GmbH.
In vitro cell culture model systems often employ monocultures, despite the fact that cells generally exist in a diverse, heterogeneous microenvironment in vivo. In response, heterogeneous cultures are increasingly being used to study how cell phenotypes interact. However, the ability to accurately identify and characterize distinct phenotypic subpopulations within heterogeneous systems remains a major challenge. Here, we present the use of a computational, image analysis–based approach—comprising automated contour-based cell tracking for feature identification, principal component analysis for feature reduction, and partitioning around medoids for subpopulation characterization—to non-destructively and non-invasively identify functionally distinct cell phenotypic subpopulations from live-cell microscopy image data. Using a heterogeneous model system of endothelial and smooth muscle cells, we demonstrate that this approach can be applied to both mono and co-culture nuclear morphometric and motility data to discern cell phenotypic subpopulations. Morphometric clustering identified minimal difference in mono- versus co-culture, while motility clustering revealed that a portion of endothelial cells and smooth muscle cells adopt increased motility rates in co-culture that are not observed in monoculture. We anticipate that this approach using non-destructive and non-invasive imaging can be applied broadly to heterogeneous cell culture model systems to advance understanding of how heterogeneity alters cell phenotype. This work presents a computational, image-analysis-based approach—comprising automated contour-based cell tracking for feature identification, principle component analysis for feature reduction, and partitioning around medoids for subpopulation characterization—to non-destructively and non-invasively identify functionally distinct cell phenotypic subpopulations from live-cell microscopy image data.
Communication is the way people can achieve creating awareness in others who need particular information so that they can respond to situations. Sometimes, the need for information can demand that communication should happen within a very short time and in efficient media so that the involved can be able to respond to it. The analysis of the functioning of the Wireless Sensor Networks (WSN) indicates the various issues that affect the communication and how it can be mitigated.
Full-text available
Since 2002, the Government has reported that the Quality of Life (QoL) for the Malaysians on average has been rapidly improving. The Malaysian Government through its poverty alleviation program has put emphasis on narrowing the economic gap between the urban and rural areas. The objective of this study is to explore the QoL not only in terms of its objectives but also from the point of the subjective measurements among the rural population in the selected granary areas of Malaysian. Structured questions were developed to gather information on the paddy farmer's socio-demographic factors and their perceived level of satisfaction. Factor analysis was used to uncover the latent factors as the subjective measures of QoL. The results show that the services and governmental support in paddy farming, cooperation among farmers, satisfaction for jobs, living conditions within the community, hobby and leisure, satisfaction with income were highly rated as factors that increase the level of farmer's satisfaction. Regression analysis was estimated and the results indicate that farmer's education, characteristics of farm household, residential location and the satisfaction factors were important variables in determining the level of satisfaction experienced with life.
Conference Paper
This paper presents a comprenhensive analysis of contention-based and contention-free MAC protocols of wireless sensor networks. The protocols are compared in terms of energy efficiency, latency in packet delivery, and control overhead. Simulation results of S-MAC (Sensor-MAC) and T-MAC (Timeout-MAC) protocols show average latency in packet delivery, as well as average consumption per node in certain wireless sensor network.
Wireless sensor networks (WSNs) consume energy for their sensing, computation, and communication. To extend the lifetime of the network, sensor nodes are equipped with energy storage devices. Recharging of their batteries is impossible in most applications. Therefore, energy consumption needs to be monitored and limited to extend the high performance operation of the network. In this network, the communication module consumes the highest amount of energy. This paper demonstrates that among several methods offered to reduce the energy consumption, data compression has the highest effect on the energy usage by reducing the number of bits to be broadcasted. To determine the energy efficiency of the communication module, the energy consumption of broadcasting data as text and image in original and compressed forms were measured. Black and white JPEG images and Adaptive Huffman text for both Mesh and random nodes consumed less energy.
Nowadays Cloud Computing provides anew paradigm to organizations, offering advantages, not only for its speed but also for the opportunity of save costs when implementing new applications, by just paying for the resources you use. This article identifies the threats, risks and attacks, also identifies their causes, in addition, proposed solutions from the National Institute of Standards Organization and Technology (NIST) and Cloud Security Alliance (CSA) are also mentioned here
Daniel Gámez and Paul Marrero 97 Different Aspects of Data Stream Clustering
  • Eric Gamess
Eric Gamess, Daniel Gámez and Paul Marrero 97 Different Aspects of Data Stream Clustering.............. 1181
Agrawala 75 Optimal Selection of Components in Fault Detection Based on Principal Component Analysis
  • Shivsubramani Krishnamoorthy
  • Arun Balasubramanian
  • K..................... Ashok
Shivsubramani Krishnamoorthy, Arun Balasubramanian and Ashok K. Agrawala 75 Optimal Selection of Components in Fault Detection Based on Principal Component Analysis....................... 901
Tůma 90 Location Based Overlapping Mobility Aware Network Model
  • Vojtěch Merunka
Vojtěch Merunka and Jakub Tůma 90 Location Based Overlapping Mobility Aware Network Model.............................. 1091
Guzmán and Giner Alor-Hernández 52 SEC-TEEN: A Secure Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks
  • Byron Portilla-Rosero
Byron Portilla-Rosero, Jaime A. Guzmán and Giner Alor-Hernández 52 SEC-TEEN: A Secure Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks................... 621
Runceanu Initial Steps Towards Distributed Implementation of
  • Aurel-George Popescu
  • M-Urgency.................................... Adrian
Aurel-George Popescu and Adrian Runceanu Initial Steps Towards Distributed Implementation of M-Urgency...................................... 883
Jørgensen 87 Properties Evaluation of an Approach Based on Probability-Possibility Transformation
  • Jan Corfixen Sørensen
  • Bo Nørregaard
Jan Corfixen Sørensen and Bo Nørregaard Jørgensen 87 Properties Evaluation of an Approach Based on Probability-Possibility Transformation................ 1053 M. Pota, M. Esposito and G. De Pietro 88 Functional Verification of Class Invariants in CleanJava..... 1067
Richardson 96 A First Implementation of the Delay Based Routing Protocol
  • K P Lam
  • D J Collins
Face: Fractal Analysis in Cell Engineering............... 1151 K. P. Lam, D. J. Collins and J. B. Richardson 96 A First Implementation of the Delay Based Routing Protocol................................... 1165
Multiplication Algorithm and a Stacked Many-Core Processor Architecture
  • Neander Silva
  • Diogo Santos
Neander Silva, Diogo Santos and Ecilamar Lima Three Dimensional SPMD Matrix–Matrix Multiplication Algorithm and a Stacked Many-Core Processor Architecture.............................. 1139