Content uploaded by Tarek Sobh
Author content
All content in this area was uploaded by Tarek Sobh
Content may be subject to copyright.
Khaled Elleithy
•
Tarek Sobh
Editors
Innovations and Advances
in Computer, Information,
Systems Sciences,
and Engineering
123
Editors
Khaled Elleithy
School of Engineering
University of Bridgeport
Bridgeport, CT
USA
Tarek Sobh
School of Engineering
University of Bridgeport
Bridgeport, CT
USA
ISSN 1876-1100 ISSN 1876-1119 (electronic)
ISBN 978-1-4614-3534-1 ISBN 978-1-4614-3535-8 (eBook)
DOI 10.1007/978-1-4614-3535-8
Springer New York Heidelberg Dordrecht London
Library of Congress Control Number: 2012940241
Springer Science+Business Media New York 2013
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or
information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed. Exempted from this legal reservation are brief
excerpts in connection with reviews or scholarly analysis or material supplied specifically for the
purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the
work. Duplication of this publication or parts thereof is permitted only under the provisions of
the Copyright Law of the Publisher’s location, in its current version, and permission for use must always
be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright
Clearance Center. Violations are liable to prosecution under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt
from the relevant protective laws and regulations and therefore free for general use.
While the advice and information in this book are believed to be true and accurate at the date of
publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for
any errors or omissions that may be made. The publisher makes no warranty, express or implied, with
respect to the material contained herein.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
This book includes the proceedings of the International Joint Conferences on
Computer, Information, and Systems Sciences, and Engineering (CISSE 2011). The
proceedings are a set of rigorously reviewed world-class manuscripts presenting
the state of international practice in Innovative Algorithms and Techniques in
Automation, Industrial Electronics, and Telecommunications.
CISSE 2011 is a high-caliber research for research conferences that were
conducted online. CISSE 2011 received 260 paper submissions and the final
program included 107 accepted papers from more than 80 countries, representing
the six continents. Each paper received at least two reviews, and authors were
required to address review comments prior to presentation and publication.
Conducting CISSE 2011 online presented a number of unique advantages, as
follows:
• All communications among the authors, reviewers, and conference organizing
committee were done online, which permitted a short 6-week period from the
paper submission deadline to the beginning of the conference.
• PowerPoint presentations, final paper manuscripts were available to registrants
for 3 weeks prior to the start of the conference.
• The conference platform allowed live presentations by several presenters from
different locations, with the audio, and PowerPoint transmitted to attendees
throughout the Internet, even on dial-up connections. Attendees were able to ask
both audio and written questions in a chat room format, and presenters could
mark up their slides as they deemed fit.
• The live audio presentations were also recorded and distributed to participants
along with the powerpoint presentations and paper manuscripts within the
conference DVD.
v
The conference organizers and we are confident that you will find the papers
included in this volume interesting and useful. We believe that technology will
continue to infuse education thus enriching the educational experience of both
students and teachers.
Bridgeport, CT, December 2011 Khaled Elleithy
Tarek Sobh
vi Preface
Acknowledgments
The 2011 International Joint Conferences on Computer, Information, and Systems
Sciences, and Engineering (CISSE 2011) and the resulting proceedings could not
have been organized without the assistance of a large number of individuals.
CISSE was founded by Professors Tarek Sobh and Khaled Elleithy in 2005, and
they set up mechanisms that put it into action. Andrew Rosca wrote the software
that allowed conference management, and interaction between the authors and
reviewers online. Mr. Tudor Rosca managed the online conference presentation
system and was instrumental in ensuring that the event met the highest profes-
sional standards. We also want to acknowledge the roles played by Sarosh Patel
and Ms. Susan Kristie, our technical, and administrative support team.
The technicalco-sponsorship provided by the Institute of Electrical and Electronics
Engineers (IEEE) and the University of Bridgeport is gratefully appreciated.
We would like to express our thanks to Prof. Toshio Fukuda, Chair of the International
Advisory Committee and the members of Technical Program Committees.
The excellent contributions of the authors made this world-class document
possible. Each paper received two to four reviews. The reviewers worked tirelessly
under a tight schedule and their important work is gratefully appreciated.
In particular, we want to acknowledge the contributions of the following indivi-
duals: Ashraf Abdelwahed, Khald Aboalayon, Munther Abualkibash, Tamer
Abu-Khalil. Sumaya Abusaleh, Ahmad Abushakra, Mohannad Abuzneid, Naser
Alajmi, Ibrahim Alkore Alshalabi, Muder Almi’ani, Anas Al-okaily, Aziz Alotaibi,
Amer Al-Rahayfeh, Mohammad Rauji, Tariq Alshugran, Fahad Alswaina, Aladdin
Alzubi, Mohamed Ben Haj Frej, Ying-ju Chen, Richard Colon, Khaled Elleithy, Ali
El-Rashidi, Ahmed ElSayed, Mohammed Ali Eltaher, Eugene Gerety, Manan
Joshi, Zakareya Lasefr, Youming Li, Ramadhan Mstafa, Ammar Odeh, Abdul
Razaque, Andriy Shpylchyn, and Ajay Shrestha.
Bridgeport, CT, January 2012 Khaled Elleithy
Tarek Sobh
vii
Contents
1 Change Rate Concepts and their Realization in the MM&S:
A Computer Program for Modeling and Simulation
of Dynamic Systems ................................. 1
Nguyen Van Sinh
2 A Software Architecture for Inventory Management System ... 15
Taner Arsan, Emrah Bas¸ kan, Emrah Ar and Zeki Bozkus¸
3 Libraries Opt for More Online Sources................... 29
Zeenath Reza Khan and Sreejith Balasubramanian
4 Emerging Threats, Risk and Attacks in Distributed Systems:
Cloud Computing ................................... 37
Isabel Del C. Leguías Ayala, Manuel Vega and
Miguel Vargas-Lombardo
5 Cognitive Antenna System for Sustainable Adaptive
Radio Interfaces .................................... 53
Ligia Cremene and Nicolae Cris¸ an
6 Introducing the Concept of Information Pixels and the
Storing Information Pixels Addresses Method
as an Efficient Model for Document Storage ............... 63
Mohammad A. ALGhalayini
7 Introducing the Concept of Back-Inking as an Efficient Model
for Document Retrieval (Image Reconstruction)............. 89
Mohammad A. ALGhalayini
ix
8 Automating the Transformation From a Prototype
to a Method of Assembly ............................. 99
Yuval Cohen, Gonen Singer, Maya Golan and Dina Goren-Bar
9 Collaborative and Non-Collaborative Dynamic Path Prediction
Algorithm for Mobile Agents Collision Detection
with Dynamic Obstacles in 3D Space..................... 107
Elmir Babovic
10 Website Analysis of Top 100 Most Valuable Companies
in Romania........................................ 121
Lavinia D. Rusu and Liciniu A. Kovács
11 Comparison of PI and Fractional PI Controllers
on a Hydraulic Canal Using Pareto Fronts ................ 135
Y. Chang
12 Remote Sensing Investigation of Red Mud Catastrophe
and Results of Image Processing Assessment ............... 149
J. Berke, V. Kozma-Bognár, P. Burai, L. D. Kováts,
T. Tomor and T. Németh
13 802.11e QoS Performance Evaluation .................... 157
Yunus Simsek and Hetal Jasani
14 Evaluation of Different Designs to Represent Missing
Information in SQL Databases ......................... 173
Erki Eessaar and Elari Saal
15 Mobile English Learning System: A Conceptual Framework
for Malaysian Primary School.......................... 189
Saipunidzam Mahamad, Fatimah Annor Ahmad Rashid,
Mohammad Noor Ibrahim and Rozana Kasbon
16 Dynamic Cache Miss-Rate Reduction .................... 199
Mazen AbuZaher, Bayan Alayoubi, Basma Alefeshat
and Abdelwadood Mesleh
17 Agent Simulation Group on the Robocup 3D Realization
of Basic Motions.................................... 205
Min Zhou, Jia Wu, Hao Zheng, Xiaoming Liu and Renhao Zhou
18 Key Generations Model for Mobile Cryptosystems........... 215
Rushdi Hamamreh
x Contents
19 Development of Stakeholder Oriented Corporate Information
Security Objectives .................................. 227
Margareth Stoll
20 Stakeholder Oriented Information Security Reporting ........ 241
Margareth Stoll
21 Experimenting with Watchdog Implementation on a Real-Life
Ad hoc Network: Monitoring Selfish Behavior .............. 255
Tirthankar Ghosh and Tian Hou
22 Power Consumption Evaluation for Cooperative Localization
Services .......................................... 267
Patrick Seeling
23 A Modified Banker’s Algorithm ........................ 277
Youming Li
24 Courses Enrollment Pattern Analysis .................... 283
Nur Fatihah Abdul Rahim, Shakirah Mohd Taib
and Saipunidzam Mahamad
25 Integration of Safety and Smartness Using Cloud Services:
An Insight to Future................................. 293
Neha Tekriwal, Madhumita and P. Venkata Krishna
26 A Versioning Subsystem of Metamodeling System ........... 305
Rünno Sgirka
27 Difficulties in Understanding Object Oriented
Programming Concepts............................... 319
Soly Mathew Biju
28 Real-Time System for Monitoring and Analyzing
Electrocardiogram on Cell Phone ....................... 327
O. Muñoz-Ramos, O. Starostenko, V. Alarcon-Aquino
and C. Cruz-Perez
29 Research of Camera Track Based on Image Matching ........ 339
Yuan Wang
Contents xi
30 Curriculum Design Change of the Industrial Engineering
BA Program....................................... 349
Eszter Bogdány, Ágnes Balogh, Gabriella Cerháti,
Tibor Csizmadia and Réka Polák-Weldon
31 Comparing Two Methods of Sound Spatialization:
Vector-Based Amplitude Panning (VBAP)
Versus Linear Panning (LP) ........................... 359
Jonathan Cofino, Armando Barreto and Malek Adjouadi
32 Contrast Enhancement in Image Pre-Compensation
for Computer Users with Visual Aberrations ............... 371
Jian Huang, Armando Barreto, Malek Adjouadi and Miguel Alonso
33 Interaction with 3D Environments Using
Multi-Touch Screens................................. 381
Francisco Ortego, Naphtali Rishe, Armando Barreto
and Melek Adjouadi
34 TCP with Extended Window Scaling ..................... 393
Michal Olšovsky
´
and Margaréta Kotoc
ˇ
ová
35 Offering SaaS as SOA Services ......................... 405
Ali Bou Nassif and Miriam A. M. Capretz
36 Using Conceptual Mini Games for Learning: The Case
of ‘‘The Numbers’ Race’’ (TNR) Application ............... 415
C. T. Panagiotakopoulos and M. E. Sarris
37 Visual Cryptography Based on Optical Image Projection ...... 431
Rita Palivonaite, Algiment Aleksa and Minvydas Ragulskis
38 A New Service Offered by Digital Radio for Vehicle Drivers . . . 443
Cabani Adnane and Mouzna Joseph
39 Separation of Concerns in Extensible Control Systems........ 451
Martin Rytter and Bo Nørregaard Jørgensen
40 Illicit Image Detection: An MRF Model Based
Stochastic Approach ................................. 467
Mofakharul Islam, Paul Watters, John Yearwood,
Mazher Hussain and Lubaba A. Swarna
xii Contents
41 Illicit Image Detection Using Erotic Pose Estimation
Based on Kinematic Constraints ........................ 481
Mofakharul Islam, Paul Watters, John Yearwood,
Mazher Hussain and Lubaba A. Swarna
42 Energy Efficient Public Key Cryptography in Wireless
Sensor Networks.................................... 497
Vladimir Cervenka, Dan Komosny, Lukas Malina
and Lubomir Mraz
43 Implementation of VLSB Stegnography Using Modular
Distance Technique.................................. 511
Sahib Khan and Muhammad Haroon Yousaf
44 A Graphic User Interface for H-Infinity Static Output
Feedback Controller Design ........................... 527
J. Gadewadikar, K. Horvat and O. Kuljaca
45 Active Contour Texture Segmentation in Modulus
Wavelet Feature Spaces .............................. 537
Ashoka Jayawardena and Paul Kwan
46 A Framework for Verification of Fuzzy Rule Bases
Representing Clinical Guidelines ........................ 545
M. Esposito and D. Maisto
47 Communication Impact on Project Oriented Teaching
in Technology Supported Education ..................... 559
Martin Misut and Katarina Pribilova
48 A Failure Modes and Effects Analysis of Mobile
Health Monitoring Systems ............................ 569
Marcello Cinque, Antonio Coronato and Alessandro Testa
49 SemFus: Semantic Fusion Framework Based on JDL......... 583
Havva Alizadeh Noughabi, Mohsen Kahani and Behshid Behkamal
50 Development of GUI Based Test and Measurement Facilities
for Studying Properties of MOS Devices in Clean
Room Environment.................................. 595
Shaibal Saha and Supratic Chakraborty
Contents xiii
51 Prediction of Failure Risk Through Logical Decision Trees
in Web Service Compositions .......................... 609
Byron Portilla-Rosero, Jaime A. Guzmán and Giner Alor-Hernández
52 SEC-TEEN: A Secure Routing Protocol for Enhanced
Efficiency in Wireless Sensor Networks ................... 621
Alkore Alshalabi Ibrahim, Abu Khalil Tamer
and Abuzneid Abdelshakour
53 An Integration of UML-B and Object-Z in Software
Development Process ................................ 633
Mehrnaz Najafi and Hassan Haghighi
54 Algorithm for Dynamic Traffic Rerouting and Congestion
Prevention in IP Networks ............................ 649
Martin Hruby
´
, Margaréta Kotoc
ˇ
ová and Michal Olšovsky
´
55 Fovea Window for Wavelet-Based Compression............. 661
J. C. Galan-Hernandez, V. Alarcon-Aquino, O. Starostenko
and J. M. Ramirez-Cortes
56 Energy Aware Data Compression in WSN................. 673
Roshanak Izadian and Mohammad Taghi Manzuri
57 Energy Consumption Text and Image Data
Compression in WSNs ............................... 683
Roshanak Izadian and Mohammad Taghi Manzuri
58 New QoS Framework for Mobile Ad hoc Networks Based
on the Extension of Existing QoS Models.................. 697
Peter Magula and Margaréta Kotoc
ˇ
ová
59 Method for Data Collection and Integration into
3D Architectural Model .............................. 707
L. Kurik, V. Sinivee, M. Lints and U. Kallavus
60 Statistical Analysis to Export an Equation in Order to Determine
Heat of Combustion in Blends of Diesel Fuel with Biodiesel .... 719
C. G. Tsanaktsidis, V. M. Basileiadis, K. G. Spinthoropoulos,
S. G. Christidis and A. E. Garefalakis
61 The Retail Banking Adverse Selection:
RCBS Calculator Solution............................. 729
M. Hedvicakova, I. Soukal and J. Nemecek
xiv Contents
62 Project Management in Public Administration Sector ........ 741
M. Hedvicakova
63 Access Point Checking to Improve Security in Wireless
Infrastructure Networks .............................. 751
Ammar Odeh and Miad Faezipour
64 Comparison of Fractional PI Controller with Classical
PI using Pareto Optimal Fronts ........................ 763
O. J. Moraka
65 A Pattern-Based Approach for Representing Condition-Action
Clinical Rules into DSSs .............................. 777
A. Minutolo, M. Esposito and G. De Pietro
66 Authorization of Proxy Digital Signature
in Workflow Systems ................................ 791
Samir Fazlagic and Narcis Behlilovic
67 Semi-Agile Approach to Software Development Process ....... 801
Deniss Kumlander
68 The Influence of Student Body-Talk Reaction in Formulating
Effective Teaching Strategy............................ 811
Ahmad Sofian Shminan and Runhe Huang
69 Interactive Mind Map Desktop Widget: A Proposed Concept. . . 829
Tan Wei Xuan, Shakirah Mohd Taib and Saipunidzam Mahamad
70 An Algorithm for Replication in Distributed Databases ....... 839
Adrian Runceanu and Marian Popescu
71 General Dispatching of Lignite Mining Pit................. 849
Constantin Cercel and Florin Grofu
72 Towards Improving the Statscan
TM
X-Ray Image Quality
through Sliding-Mode Control of the C-Arm ............... 857
M. Esmail, M. Tsoeu and L. John
73 Mechanical Energy Conversion to Electromagnetic Energy
for Magnetic Fluids: Theoretical Fundaments
and Applications.................................... 871
Aurel-George Popescu and Adrian Runceanu
Contents xv
74 Initial Steps Towards Distributed Implementation
of M-Urgency ...................................... 883
Shivsubramani Krishnamoorthy, Arun Balasubramanian
and Ashok K. Agrawala
75 Optimal Selection of Components in Fault Detection Based
on Principal Component Analysis ....................... 901
Patricia Helen Khwambala
76 E-Learning Environment Identification System:
Error Injection and Patterns Dynamics ................... 917
Deniss Kumlander
77 Energy Consumption by Deploying a Reactive Multi-Agent
System Inside Wireless Sensor Networks .................. 925
Alcides Montoya and Demetrio Ovalle
78 Network Intrusion Detection System Based on SOA
(NIDS-SOA): Enhancing Interoperability Between IDS ....... 935
Wagner Elvio de Loiola Costa, Denivaldo Lopes,
Zair Abdelouahab and Bruno Froz
79 Lyrebird: A Learning Object Repository Based
on a Domain Taxonomy Model ......................... 949
Ingrid Durley Torres, Jaime Alberto Guzman Luna
and Jovani Alberto Jimenez Builes
80 Design Process and Building Simulation .................. 961
Heitor da Costa Silva, Clarissa SartoriZiebell,
Lennart Bertram Pöhls and Mariana Moura Bagnati
81 Behavioral Models with Alternative Alphabets.............. 975
Mohammed Lafi and Jackson Carvalho
82 Watermark Singular-Values Encryption and Embedding
in the Frequency Domain ............................. 989
Chady El Moucary and Bachar El Hassan
83 Business Intelligence Made Simple . . . . . . . . . . . . . . . . . . . . . 1001
Vasso Stylianou, Andreas Savva and Spyros Spyrou
xvi Contents
84 A Process Model for Supporting the Management of Distance
Learning Courses Through an Agile Approach . . . . . . . . . . . . 1013
Amélia Acácia M. Batista, Zair Abdelouahab,
Denivaldo Lopes and Pedro Santos Neto
85 Numerical Modeling of Electromagnetic Induction Heating
Process Using an Inductor with Constant Step
Between Turns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027
Mihaela Novac, Ovidiu Novac, Mircea Gordan
and Cornelia Gordan
86 Satisficing-Based Approach to Resolve Feature
Interactions in Control Systems. . . . . . . . . . . . . . . . . . . . . . . . 1039
Jan Corfixen Sørensen and Bo Nørregaard Jørgensen
87 Properties Evaluation of an Approach Based
on Probability-Possibility Transformation . . . . . . . . . . . . . . . . 1053
M. Pota, M. Esposito and G. De Pietro
88 Functional Verification of Class Invariants in CleanJava . . . . . 1067
Carmen Avila and Yoonsik Cheon
89 Normalization Rules of the Object-Oriented Data Model . . . . . 1077
Vojte
ˇ
ch Merunka and Jakub Tu
˚
ma
90 Location Based Overlapping Mobility
Aware Network Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091
Abdul Razaque, Aziz Alotaibi and Khaled Elliethy
91 Expert System for Evaluating Learning Management Systems
Based on Traceability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103
E. Valdez-Silva, P. Y. Reyes, M. A. Alvarez, J. Rojas
and V. Menendez-Dominguez
92 How Variability Helps to Make Components More
Flexible and Reusable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115
Yusuf Altunel and Abdül Halim Zaim
93 Computing and Automation in the AEC Industry: Early Steps
Towards a Mass Customized Architecture . . . . . . . . . . . . . . . . 1129
Neander Silva, Diogo Santos and Ecilamar Lima
Contents xvii
94 Three Dimensional SPMD Matrix–Matrix Multiplication
Algorithm and a Stacked Many-Core
Processor Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1139
Ahmed S. Zekri
95 Face: Fractal Analysis in Cell Engineering . . . . . . . . . . . . . . . 1151
K. P. Lam, D. J. Collins and J. B. Richardson
96 A First Implementation of the Delay Based
Routing Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1165
Eric Gamess, Daniel Gámez and Paul Marrero
97 Different Aspects of Data Stream Clustering . . . . . . . . . . . . . . 1181
Madjid Khalilian, Norwati Mustapha, Md Nasir Sulaiman
and Ali Mamat
98 Teaching Computer Ethics Via Current News Articles. . . . . . . 1193
Reva Freedman
99 Designing and Integrating a New Model of Semi-Online
Vehicle’s Fines Control System . . . . . . . . . . . . . . . . . . . . . . . . 1205
Anas Al-okaily, Qassim Bani Hani, Laiali Almazaydeh,
Omar Abuzaghleh and Zenon Chaczko
100 State Diagnosis of a Lignite Deposit by Monitoring
its Surface Temperature with a Thermovision Camera . . . . . . 1219
Alina Dinca
101 A Framework Intelligent Mobile for Diagnosis Contact
Lenses by Applying Case Based Reasoning . . . . . . . . . . . . . . . 1233
Eljilani Mohammed
xviii Contents