BookPDF Available

Advanced Techniques in Computing Sciences and Software Engineering

Authors:

Abstract

Advanced Techniques in Computing Sciences and Software Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Software Engineering, Computer Engineering, and Systems Engineering and Sciences. Advanced Techniques in Computing Sciences and Software Engineering includes selected papers form the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2008) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).
Advanced Techniques in Computing
Sciences and Software Engineering
Khaled Elleithy
Advanced
Techniques in
Computing Sciences
and Software
Engineering
123
Editor
Prof. Khaled Elleithy
University of Bridgeport
School of Engineering
221 University Avenue
Bridgeport CT 06604
USA
elleithy@bridgeport.edu
ISBN 978-90-481-3659-9 e-ISBN 978-90-481-3660-5
DOI 10.1007/978-90-481-3660-5
Springer Dordrecht Heidelberg London New York
Library of Congress Control Number: 2009942426
c
Springer Science+Business Media B.V. 2010
No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written
permission from the Publisher, with the exception of any material supplied specifically for the purpose of
being entered and executed on a computer system, for exclusive use by the purchaser of the work.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Dedication
To my Family
Preface
This book includes Volume II of the proceedings of the 2008 International Conference on Systems,
Computing Sciences and Software Engineering (SCSS). SCSS is part of the International Joint Conferences
on Computer, Information, and Systems Sciences, and Engineering (CISSE 08). The proceedings are a set
of rigorously reviewed world-class manuscripts presenting the state of international practice in Advances
and Innovations in Systems, Computing Sciences and Software Engineering.
SCSS 08 was a high-caliber research conference that was conducted online. CISSE 08 received 948 paper
submissions and the final program included 390 accepted papers from more than 80 countries, representing
the six continents. Each paper received at least two reviews, and authors were required to address review
comments prior to presentation and publication.
Conducting SCSS 08 online presented a number of unique advantages, as follows:
All communications between the authors, reviewers, and conference organizing committee were done
on line, which permitted a short six week period from the paper submission deadline to the beginning
of the conference.
PowerPoint presentations, final paper manuscripts were available to registrants for three weeks prior to
the start of the conference
The conference platform allowed live presentations by several presenters from different locations, with
the audio and PowerPoint transmitted to attendees throughout the internet, even on dial up connections.
Attendees were able to ask both audio and written questions in a chat room format, and presenters
could mark up their slides as they deem fit
The live audio presentations were also recorded and distributed to participants along with the power
points presentations and paper manuscripts within the conference DVD.
The conference organizers and I are confident that you will find the papers included in this volume
interesting and useful. We believe that technology will continue to infuse education thus enriching the
educational experience of both students and teachers.
Khaled Elleithy, Ph.D.
Bridgeport, Connecticut
December 2009
Table of Contents
Acknowledgements .................................................................................................................................. XVII
Reviewers List ............................................................................................................................................ XIX
1. Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations ...................... 1
Alexander Vaninsky
2. Application of Indirect Field Oriented Control with Optimum Flux for Induction
Machines Drives ...................................................................................................................................... 7
S. Grouni et al.
3. Urban Cluster Layout Based on Voronoi Diagram ................................................................................ 13
ZHENG Xinqi et al.
4. A Reconfigurable Design and Architecture of the Ethernet and HomePNA3.0 MAC .......................... 19
M. Khalily Dermany and M. Hossein Ghadiry
5. Automatic Translation of a Process Level Petri-Net to a Ladder Diagram ............................................ 25
Yuval Cohen et al.
6. Software Quality Perception .................................................................................................................. 31
Radosław Hofman
7. An Offline Fuzzy Based Approach for Iris Recognition with Enhanced Feature Detection ................. 39
S. R. Kodituwakku and M. I. M. Fazeen
8. A Logic for Qualified Syllogisms .......................................................................................................... 45
Daniel G. Schwartz
9. Improved Induction Tree Training for Automatic Lexical Categorization ............................................ 51
M. D. López De Luise et al.
10. Comparisons and Analysis of DCT-based Image Watermarking Algorithms ....................................... 55
Ihab Amer et al.
11. A Tool for Robustness Evaluation of Image Watermarking Algorithms ............................................... 59
Ihab Amer et al.
12. Implementation of Efficient Seamless non-broadcast Routing algorithm for Wireless
Mesh Network ....................................................................................................................................... 65
Ghassan Kbar
13. Investigations into Implementation of an Iterative Feedback Tuning Algorithm
into Microcontroller ............................................................................................................................... 73
Grayson Himunzowa
14. Comparative Study of Distance Functions for Nearest Neighbors ........................................................ 79
Janett Walters-Williams and Yan Li
X TABLE OF CONTENTS
15. Determination of the Geometrical Dimensions of the Helical Gears with Addendum
Modifications Based on the Specific Sliding Equalization Model ........................................................ 85
Antal Tiberiu Alexandru and Antal Adalbert
16. Is Manual Data Collection Hampered by the Presence of Inner Classes or Class Size? ........................ 91
Steve Counsell et al.
17. An Empirical Study of “Removed” Classes in Java Open-Source Systems .......................................... 99
Asma Mubarak et al.
18. Aspect Modification of an EAR Application ................................................................................. ...... 105
Ilona Bluemke and Konrad Billewicz
19. A Model of Organizational Politics Impact on Information Systems Success .................................... 111
Ismail M. Romi et al.
20. An Efficient Randomized Algorithm for Real-Time Process Scheduling in PicOS
Operating System................................................................................................................................. 117
Tarek Helmy et al.
21. Managing in the Virtual World: How Second Life is Rewriting the Rules
of “Real Life” Business ....................................................................................................................... 123
David C. Wyld
22. Unified Multimodal Search Framework for Multimedia Information Retrieval .................................. 129
Umer Rashid et al.
23. Informational Analysis Involving Application of Complex Information System. ............................... 137
Clébia Ciupak et al.
24. Creation of a 3D Robot Model and its Integration to a Microsoft Robotics Studio Simulation .......... 143
M. Alejandra Menéndez O. et al.
25. A Proposed Framework for Collaborative Design in a Virtual Environment ...................................... 147
Jason S. Breland & Mohd Fairuz Shiratuddin
26. System Development by Process Integrated Knowledge Management ............................................... 153
Margareth Stoll and Dietmar Laner
27. An Application of Lunar GIS with Visualized and Auditory Japan’s
Lunar Explorer “KAGUYA” Data....................................................................................................... 159
Shin-ichi Sobue et al.
28. From Constraints to Resolution Rules Part I: Conceptual Framework ................................................ 165
Denis Berthier
29. From Constraints to Resolution Rules Part II: Chains, Braids, Confluence and T&E ......................... 171
Denis Berthier
30. Platform Independent Unit Tests Generator ........................................................................................ 177
Šarūnas Packevičius et al.
31. Fuzzy Document Clustering Approach Using WordNet Lexical Categories ....................................... 181
Tarek F. Gharib et al.
XI
TABLE
OF CONTENTS
32. The Study on the Penalty Function of the Insurance Company When the Stock Price
Follows Exponential Lévy Process ...................................................................................................... 187
ZHAO Wu et al.
33. Studies on SEE Characteristic and Hardening Techniques of CMOS SRAM with
Sub-micro Feature Sizes ...................................................................................................................... 191
HE Xing-hua et al.
34. Automating the Work at The Skin and Allergy Private Clinic: A Case Study
on Using an Imaging Database to Manage Patients Records ............................................................... 197
Mohammad AbdulRahman ALGhalayini
35. Automating the Work at KSU Scientific Council: A Case Study on Using
an Imaging Database to Manage the Weekly Scientific Council Meetings ......................................... 209
Mohammad AbdulRahman ALGhalayini
36. Automating the Work at KSU Rector’s Office: A Case Study on Using an Imaging
Database System to Manage and Follow-up Incoming / Outgoing Documents .................................. 217
Mohammad A. ALGhalayini
37. Using Clinical Decision Support Software in Health Insurance Company .......................................... 223
R. Konovalov and Deniss Kumlander
38. A new Artificial Vision Method for Bad Atmospheric Conditions ..................................................... 227
M. Curilǎ
39. Aspect-Oriented Approach to Operating System Development Empirical Study ............................... 233
Jaakko Kuusela and Harri Tuominen
40. Study and Analysis of the Internet Protocol Security and its Impact
on Interactive Communications ........................................................................................................... 239
Arshi Khan and Seema Ansari
41. Investigating Software Requirements Through Developed Questionnaires to Satisfy
the Desired Quality Systems (Security Attribute Example) ................................................................ 245
Sherif M. Tawfik and Marwa M. Abd-Elghany
42. Learning Java with Sun SPOTs ........................................................................................................... 251
Craig Caulfield et al.
43. Semi- and Fully Self-Organised Teams ............................................................................................... 25
Deniss Kumlander et al.
44. Stochastic Network Planning Method ................................................................................................. 263
Z
S. T. KOSZTYÁN and J. KISS
45. Web-based Service Portal in Healthcare .............................................................................................. 26
Petr Silhavy et al.
46. Decomposition of Head-Related Transfer Functions into Multiple Damped
and Delayed Sinusoidals ...................................................................................................................... 273
Kenneth John Faller II et al.
47. Voiced/Unvoiced Decision for Speech Signals Based on Zero-Crossing Rate and Energy ................ 279
Bachu R.G. et al.
7
9
XII
TABLE
OF CONTENTS
48. A Survey of Using Model-Based Testing to Improve Quality Attributes in Distributed Systems ...... 283
Ahmad Saifan and Juergen Dingel
49. Contributions in Mineral Floatation Modeling and Simulation ........................................................... 289
B. L. Samoila and M. D. Marcu
50. Selecting the Optimal Recovery Path in Backup Systems ................................................................... 295
V.G. Kazakov and S.A. Fedosin
51. Telemedicine Platform Enhanced Visiophony Solution to Operate a Robot-Companion ................... 301
Th. Simonnet et al.
52. Some Practical Payments Clearance Algorithms ................................................................................. 307
Deniss Kumlander et al.
53. Using LSI and its Variants in Text Classification ................................................................................ 313
Shalini Batra et al.
54. On Optimization of Coefficient-Sensitivity and State-Structure for Two Dimensional (2-D)
Digital Systems .................................................................................................................................... 317
Guoliang Zeng
55. Encapsulating Connections on SoC Designs Using ASM++ charts .................................................... 323
Santiago de Pablo et al.
56. Performance Effects of Concurrent Virtual Machine Execution in VMware Workstation 6 .............. 329
Richard J Barnett et al.
57. Towards Enterprise Integration Performance Assessment Based on Category Theory ....................... 335
Victoria Mikhnovsky and Olga Ormandjieva
58. Some Aspects of Bucket Wheel Excavators Driving Using PWM Converter – Asynchronous Motor ....... 341
Marcu Marius Daniel and Orban Maria Daniela
59. Health Information Systems Implementation: Review of Change Management Issues ...................... 347
Paulo Teixeira
60. Cache Memory Energy Exploitation in VLIW Architectures . ............................................................. 351
N. Mohamed et al.
61. A Comparison of LBG and ADPCM Speech Compression Techniques ............................................. 357
Rajesh G. Bachu et al.
62. LCM: A New Approach to Parse XML Documents Through Loose Coupling Between XML
Document Design and the Corresponding Application Code .............................................................. 361
Vaddadi P. Chandu
63. A Framework to Analyze Software Analysis Techniques ................................................................... 367
Joseph T. Catanio
64. Economic Path Scheduling for Mobile Agent System on Computer Network .................................... 373
E. A. Olajubu
XIII
TABLE
OF CONTENTS
65. A Database-Based and Web-Based Meta-CASE System .................................................................... 379
Erki Eessaar and Rünno Sgirka
66. On Dijkstra’s Algorithm for Deadlock Detection ................................................................................ 385
Youming Li et al.
67. Analysis of Ten Reverse Engineering Tools ........................................................................................ 389
Jussi Koskinen and Tero Lehmonen
68. The GeneSEZ Approach to Model-driven Software Development ..................................................... 395
Tobias Haubold et al.
69. JADE: A Graphical Tool for Fast Development of Imaging Applications .......................................... 401
J. A. Chávez-Aragón et al.
70. A View on Power Efficiency of Multimedia Mobile Applications ..................................................... 407
Marius Marcu et al.
71. Trinary Encoder, Decoder, Multiplexer and Demultiplexer Using Savart Plate and Spatial
Light Modulator ................................................................................................................................... 413
Amal K Ghosh et al.
72. Regional Competitiveness Information System as a Result of Information Generation
and Knowledge Engineering ................................................................................................................ 419
Aleksandras Vytautas Rutkauskas and Viktorija Stasytyte
73. A Case Study on Using A Knowledge Management Portal For Academic
Departments Chairmen ........................................................................................................................ 425
Mohammad A. ALHarthi and Mohammad A. ALGhalayini
74. Configurable Signal Generator Implemented on Tricore Microcontrollers ......................................... 431
M. Popa et al.
75. Mathematic Model of Digital Control System with PID Regulator and Regular Step of
Quantization with Information Transfer via the Channel of Plural Access ......................................... 437
Abramov G.V et al.
76. Autonomic Printing Infrastructure for the Enterpris ............................................................................ 443
Riddhiman Ghosh et al.
77. Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT
Algorithm ............................................................................................................................................. 449
Abdelrahman Elleithy et al.
78. Implementation of Tree and Butterfly Barriers with Optimistic Time Management Algorithms for
Discrete Event Simulation ................................................................................................................... 455
Syed S. Rizvi et al.
79. Improving Performance in Constructing specific Web Directory Using Focused Crawler: An
Experiment on Botany Domain ........................................................................................................... 461
Madjid Khalilian et al.
80. “Security Theater” in the Pediatric Wing: The Case for RFID Protection for Infants
in Hospitals .......................................................................................................................................... 467
David C. Wyld
XIV
TABLE
OF CONTENTS
81. Creating a Bootable CD with Custom Boot Options that Contains Multiple Distributions ................. 471
James D. Feher et al.
82. Architecture of COOPTO Remote Voting Solution ............................................................................ 477
Radek Silhavy et al.
83. A Framework for Developing Applications Based on SOA in Mobile Environment with
Security Services.................................................................................................................................. 481
Johnneth de Sene Fonseca and Zair Abdelouahab
84. Towards a New Paradigm of Software Development: an Ambassador Driven Process
in Distributed Software Companies ..................................................................................................... 487
Deniss Kumlander et al.
85. An Equivalence Theorem for the Specification of Asynchronous Communication
Systems (SACS) and Asynchronous Message Passing System (AMPS)............................................. 491
A.V.S. Rajan et al.
86. A Framework for Decision Support Systems Based on Zachman Framework .................................... 497
S. Shervin Ostadzadeh et al.
87. In – line determination of Heat Transfer Coefficients in a Plate Heat Exchanger ............................... 503
S. Silva Sotelo and R. J. Romero Domínguez
88. Model Based Control Design Using SLPS “Simulink PSpice Interface” ............................................ 509
Saeid Moslehpour et al.
89. Design of RISC Processor Using VHDL and Cadence ....................................................................... 517
Saeid Moslehpour et al.
90. The Impact of Building Information Modeling on the Architectural Design Process ......................... 527
Thomaz P. F. Moreira et al.
91. An OpenGL-based Interface to 3D PowerPoint-like Presentations of OpenGL Projects .................... 533
Serguei A. Mokhov and Miao Song
92. Aspects Regarding the Implementation of Hsiao Code to the Cache Level of a Memory
Hierarchy With FPGA Xilinx Circuits ................................................................................................. 539
O. Novac et al.
93. Distributed Environment Integrating Tools for Software Testing ....................................................... 545
Anna Derezińska and Krzysztof Sarba
94. Epistemic Analysis of Interrogative Domains Using Cuboids............................................................. 551
Cameron Hughes and Tracey Hughes
95. Dynamical Adaptation in Terrorist Cells/Networks ............................................................................ 557
D. M. Akbar Hussain and Zaki Ahmed
96. Three-dimensional Computer Modeling and Architectural Design Process – A Comparison
Study .................................................................................................................................................... 563
Miguel C. Ramirez et al.
XV
TABLE
OF CONTENTS
97. Using Decision Structures for Policy Analysis in Software Product-line Evolution – A Case
Study .................................................................................................................................................... 56
Nita Sarang and Mukund A Sanglikar
98. Fusion of Multimedia Document Intra-Modality Relevancies using Linear Combination Model ...... 575
Umer Rashid et al.
99. An Interval-based Method for Text Clustering .................................................................................... 581
Hanh Pham
100. A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems ........................... 589
Syed S. Rizvi et al.
Index ............................................................................................................................................................ 59
9
5
Acknowledgements
The 2008 International Conference on Systems, Computing Sciences and Software Engineering (SCSS) and
the resulting proceedings could not have been organized without the assistance of a large number of
individuals. SCSS is part of the International Joint Conferences on Computer, Information, and Systems
Sciences, and Engineering (CISSE). CISSE was founded by Professor Tarek Sobh and I in 2005, and we set
up mechanisms that put it into action. Andrew Rosca wrote the software that allowed conference
management, and interaction between the authors and reviewers online. Mr. Tudor Rosca managed the
online conference presentation system and was instrumental in ensuring that the event met the highest
professional standards. I also want to acknowledge the roles played by Sarosh Patel and Ms. Susan Kristie,
our technical and administrative support team.
The technical co-sponsorship provided by the Institute of Electrical and Electronics Engineers (IEEE) and
the University of Bridgeport is gratefully appreciated. I would like to express my thanks to Prof. Toshio
Fukuda, Chair of the International Advisory Committee and the members of the SCSS Technical Program
Committee including: Abdelaziz AlMulhem, Alex A. Aravind, Anna M. Madueira, Hamid Mcheick, Hani
Hagras, Julius Dichter, Low K.S., Marian P. Kazmierkowski, Michael Lemmon, Mohamed Dekhil, Mostafa
Aref, Natalia Romalis, Raya Al-Qutaish, Rodney G. Roberts, Sanjiv Rai, Shivakumar Sastry ,Tommaso
Mazza, Samir Shah, and Mohammed Younis.
The excellent contributions of the authors made this world-class document possible. Each paper received
two to four reviews. The reviewers worked tirelessly under a tight schedule and their important work is
gratefully appreciated. In particular, I want to acknowledge the contributions of all the reviewers. A
complete list of reviewers is given in page XIX.
Khaled Elleithy, Ph.D.
Bridgeport, Connecticut
December 2009
Reviewers List
Aamir, Wali
Aaron Don, Africa
Abd El-Nasser, Ghareeb
Abdelsalam, Maatuk
Adam, Piorkowski
Adrian, Runceanu
Adriano, Albuquerque
Ahmad Sofian, Shminan
Ahmad, Saifan, 281
Ahmed, Zobaa
Alcides de Jesús, Cañola
Aleksandras Vytautas, Rutkauskas, 417
Alexander, Vaninsky, 1
Alexei, Barbosa de Aguiar
Alice, Arnoldi
Alionte, Cristian Gabriel
Amala V. S., Rajan, 489
Ana María, Moreno
Antal, Tiberiu Alexandru, 85
Anton, Moiseenko
Anu, Gupta
Asma, Paracha
Atif, Mohammad, 197
Aubrey, Jaffer
Baba Ahmed, Eddine
Biju, Issac
Brana Liliana, Samoila, 287
Buket, Barkana, 355
Cameron, Cooper, 549
Cameron, Hughes, 549
Cecilia, Chan
chetankumar, Patel, 355
Chwen Jen, Chen
Cornelis, Pieters
Craig, Caulfield, 245
Curila, Sorin, 537
Daniel G., Schwartz, 45
Daniela, López De Luise, 51, 339
David, Wyld, 123
Denis, Berthier, 165
Dierk, Langbein
Dil, Hussain, 555
Dmitry, Kuvshinov
D'Nita, Andrews-Graham
Ecilamar, Lima, 561
Edith, Lecourt, 249
Emmanuel Ajayi, Olajubu, 371
Erki, Eessaar, 377
Ernesto, Ocampo
Fernando, Torres, 321
Gennady, Abramov, 435
Ghulam, Rasool
Gururajan, Erode
Hadi, Zahedi
He, xing-hua, 191
Hector, Barbosa Leon
Houming, FAN
Igor, Aguilar Alonso
Ilias, Karasavvidis
Jaakko, Kuusela, 231
James, Feher, 469
Jan, GENCI
Janett, Williams
Jian-Bo, Chen
Jonathan, White
José L., Fuertes
Jozef, Simuth
József, Berke
Juan, Garcia
junqi, liu
Jussi, Koskinen
Jyri, Naarmala
Kenneth, Faller II
Khaled, Elleithy
Krystyna Maria, Noga
Kuderna-Iulian, Benta
Laura, Vallone
Lei, Jiasu
Leszek, Rudak
Leticia, Flores, 399
Liang, Xia, 191
madjid, khalilian, 459
Mandhapati, Raju
Margareth, Stoll, 153
Maria, Pollo Cattaneo, 339
Marina, Müller
Marius, Marcu
Marius Daniel, Marcu, 339
Martina, Hedvicakova
Md. Abdul, Based
Miao, Song, 531
Mircea, Popa, 429
Mohammad Abu, Naser
Morteza, Sargolzaei Javan
Muthu, Ramachandran
Nagm, Mohamed, 441
Nazir, Zafar
Neander, Silva, 525
Nilay, Yajnik
Nita, Sarang, 567
Nova, Ovidiu
Olga, Ormandjieva, 333
Owen, Foley
Paola, Ferrari
Paul, David and Chompu,
Nuangjamnong, 249
Peter, Nabende
Petr, Silhavy, 267
PIIA, TINT
Radek, Silhavy, 267
Richard, Barnett, 327
S. R., Kodituwakku, 39
S. Shervin, Ostadzadeh, 495
Sajad, Shirali-Shahreza
Salvador, Bueno
Samir Chandra, Das
Santiago, de Pablo, 321
Šar
{nas, Packevifius, 177
Seibu, Mary Jacob
Sergiy, Popov
Serguei, Mokhov, 531
shalini, batra, 311
Sherif, Tawfik, 243
Shini-chi, Sobue, 159
shukor sanim, m. fauzi
Siew Yung, Lau
Soly Mathew, Biju
Somesh, Dewangan
Sridhar, Chandran
Sunil Kumar, Kopparapu
sushil, chandra
Svetlana, Baigozina
Syed Sajjad, Rizvi, 447
Tariq, Abdullah
Thierry, Simonnet, 299
Thomas, Nitsche
Thuan, Nguyen Dinh
Tibor, Csizmadia
Timothy, Ryan
Tobias, Haubold, 393
Tomas, Sochor, 267, 475
Umer, Rashid, 573
Ushasri, anilkumar
Vaddadi, Chandu, 359
Valeriy, Cherkashyn
Veselina, Jecheva
Vikram, Kapila
Xinqi, Zheng, 13
Yaohui, Bai
Yet Chin, Phung
Youming, Li, 383
Young, Lee
Yuval, Cohen, 25
Zeeshan-ul-hassan, Usmani
Zsolt Tibor, Kosztyán, 261
Anna, Derezi ska, 543
"

Chapters (97)

Statistical interpretation of Cauchy functional equation f(x+y)=f(x)+f(y) and related functional equations is suggested as a tool for generating hypotheses regarding the rate of growth: linear, polynomial, or exponential, respectively. Suggested approach is based on analysis of internal dynamics of the phenomenon, rather than on finding best-fitting regression curve. As a teaching tool, it presents an example of investigation of abstract objects based on their properties and demonstrates opportunities for exploration of the real world based on combining mathematical theory with statistical techniques. Testing Malthusian theory of population growth is considered as an example.
The rotor flux optimization is crucial parameter in the implementation of the field oriented control. In this paper, we considered the problem of finding optimum flux reference that minimizes the total energy control for induction machine drive under practical constraints: voltage and current. The practical usefulness of this method is evaluated and confirmed through experiments using (1.5 kW/380 V) induction machine. Simulations and experimental investigation tests are provided to evaluate the consistency and performance of the proposed control model scheme.
The optimum layout of urban system is one of important contents in urban planning. To make regional urban system planning more suitable to the requirements of urbanization development, this paper tests a quantitative method based on GIS & Voronoi diagram. Its workflows include calculating city competitiveness data, spreading the city competitiveness analysis by aid of spatial analysis and data mining functions in GIS, getting the structural characteristics of urban system, and proposing the corresponding optimum scheme of the allocation. This method is tested using the data collected from Shandong Province, China.
In this paper a reconfigurable architecture for Ethernet and HomePNA MAC is presented. By using this new architecture, Ethernet and HomePNA reconfigurable network card can be produced. This architecture has been implemented using VHDL language and after that synthesized on a chip. The differences between HomePNA (synchronized and unsynchronized mode) and Ethernet in collision detection mechanism and priority access to media have caused the need to separate architectures for Ethernet and HomePNA, but by using similarities of them, both the Ethernet and the HomePNA can be implemented in a single chip with a little extra hardware. The number of logical elements of the proposed architecture is increased by 19% in compare to when only an Ethernet MAC is implemented
Major part of discrete industrial automation hardware is controlled by Programmable Logic Controllers (PLCs). While Petri-nets (PNs) have been proposed by many researchers for modelling shop floor discrete control, the majority of the world PLCs are programmed using ladder diagrams (LD) and significant portion of them cannot be programmed using another language. This paper proposes hierarchical approach to translating PN to LD: for describing the high level process, it introduces automatic translation technique of process level PN, while utilizing a recently developed method (for translating PN to Boolean logic) for translating the embedded tasks to a LD. Interestingly, the generated LD code enables the reconstruction of the original Petri-net.
This article analysis non-technical aspects of software quality perception and proposes further research activities for this subject naming this branch Software Quality Psychology. Cognitive science, psychology, micro economics and other human-oriented sciences do analyze human behavior, cognition and decision processes. On the other hand engineering disciplines, including software engineering, propose many formal and technical approaches for product quality description. Linkage between technical and subjective quality has been subject of research in areas related to food and agricultural applications and in this article we propose analysis of professional product perception which beyond doubt is a software product.
Among many biometric identification methods iris recognition is more attractive due to the unique features of the human eye [1]. There are many proposed algorithms for iris recognition. Although all these methods are based on the properties of the iris, they are subject to some limitations. In this research we attempt to develop an algorithm for iris recognition based on Fuzzy logic incorporated with not only the visible properties of the human iris but also considering the iris function. Visible features of the human iris such as pigment related features, features controlling the size of the pupil, visible rare anomalies, pigment frill and Collarette are considered [2]. This paper presents the algorithm we developed to recognize iris. A prototype system developed is also discussed.
In various works, L.A. Zadeh has introduced fuzzy quantifiers, fuzzy usuality modifiers, and fuzzy likelihood modifiers. This paper provides these notions with a unified semantics and uses this to define a formal logic capable of expressing and validating arguments such as 'Most birds can fly; Tweety is a bird; therefore, it is likely that Tweety can fly'. In effect, these are classical Aristotelean syllogisms that have been "qualified" through the use of fuzzy quantifiers. It is briefly outlined how these, together with some likelihood combination rules, can be used to address some well-known problems in the theory of nonmonotonic reasoning. The work is aimed at future applications in expert systems and robotics, including both hardware and software agents.
This paper studies a tuned version of an induction tree which is used for automatic detection of lexical word category. The database used to train the tree has several fields to describe Spanish words morpho-syntactically. All the processing is performed using only the information of the word and its actual sentence. It will be shown here that this kind of induction is good enough to perform the linguistic categorization.
This paper provides analysis and comparisons between three main Discrete Cosine Transform-based watermarking algorithms. The comparisons are made based on the degree of degradation the algorithms introduce after embedding the watermark, as well as the Percentage Error Bits (PEB) of the reconstructed watermark with respect to the original watermark. The algorithms’ computational requirements (measured in the total elapsed time on a unified platform) are also considered. Although the three techniques use the same concept, the results show that they behave differently. This variation in the behavior makes each of them suitable for different spectrum of applications.
Multimedia watermarking started to take place as a hot topic in the hi-tech arena during the last two decades. Proper evaluation of the robustness of different watermarking techniques is highly demanded as it represents a trusted feedback to the algorithm designers, which helps them in enhancing their algorithms. This paper proposes a new tool that can effectively test the robustness of the developed algorithms against a list of well known attacks. A set of case studies has been used to demonstrate the capabilities of the tool to categorize various algorithms in terms of their robustness to different attacks.
Wireless Mesh Networks become popular and are used everywhere as an alternative to broadband connections. The ease of configuration of wireless mesh LAN, the mobility of clients, and the large coverage make it attractive choice for supporting wireless technology in LAN and MAN. However, there are some concerns in assigning the multiple channels for different node and having efficient routing algorithm to route packet seamlessly without affecting the network performance. Multiple channel usage has been addressed in previous research paper, but efficient routing algorithm still to be researched. In this paper an efficient seamless non-broadcast routing algorithm has been developed and implemented in C++ to support the wireless mesh network. This algorithm is based on mapping the mesh wireless routing nodes geographically according to 2 coordinates. Each node will apply this algorithm to find the closet neighboring node that leads to destination based on the mapped network without the need for broadcast such as the one used in traditional routing protocol in RIP, and OSPF.
In this paper, implementation of an Iterative Feedback Tuning (IFT) and Myopic Unfalsified Control (MUC) algorithms into a microcontroller is investigated. First step taken was to search for a suitable hardware to accommodate these complex algorithms. The Motorola DSP56F807C and ARM7024 microcontrollers were selected for use in the research. The algorithms were coded in the C language of the respective microcontrollers and were tested by simulation of the DC Motor models obtained from step response of the motor.
Many learning algorithms rely on distance metrics to receive their input data. Research has shown that these metrics can improve the performance of these algorithms. Over the years an often popular function is the Euclidean function. In this paper, we investigate a number of different metrics proposed by different communities, including Mahalanobis, Euclidean, Kullback-Leibler and Hamming distance. Overall, the best-performing method is the Mahalanobis distance metric.
The paper gives a new computational method for the determination of the geometrical dimensions of the helical gears with addendum modification based on the model of the sliding equalization at the beginning and at the ending of the meshing. In this model the sliding between the teeth's flanks during the meshing is used to increase the lifetime of the gears by uniformization at the points where the differences are highest. The variations of the addendum modification values, at different axis angles and axis distances, are determined using the MATLAB computing environment.
In this paper, we present an empirical study in which we hypothesize that the existence of Java ‘inner classes’ and class size are strong impediments to the data collector during manual data collection. We collected inner class and class size data from the classes of four Java open-source systems - first manually and then automatically (after the manual collection had finished) using a bespoke software tool. The data collected by the tool provided the benchmark against which errors and oversights in the manual data collection of these two features could be recorded. Results showed our initial hypotheses to be refuted – manual errors in data collection from the four Java systems arose not from the presence of inner classes or from class size but from variations in coding style, lack of standards, class layout and disparateness of class feature declarations.
We propose aspect modification of compiled Java programs for which source code and documentation are not available. Aspect oriented programming is used to trace the program execution and identify points, in which aspects implementing new functionalities should be applied. A special tool for aspect oriented program tracing was designed and implemented. A modification in an real Enterprise Application Archive (EAR), compiled, without source code and documentation is presented in this paper. Advantages and disadvantages of described concepts are pointed out.
The extent of the information systems success is based on various determinants including the organizational politics. This area wasn't discussed deeply by researchers. Thus a comprehensive understanding of information systems remains fuzzy and elusive in this area. In an attempt to address this situation a comprehensive model was developed. Although this model is not empirically tested, it tries to explain the impact of organizational politics forms (avoiding, competing, accommodating, compromising, and collaborative) on the information systems success dimensions (system quality, information quality, service quality, use, user satisfaction, and net benefits).
PicOS is an event-driven operating environment designed for use with embedded networked sensors. More specifically, it is designed to support the concurrency in intensive operations required by networked sensors with minimal hardware requirements. Existing process scheduling algorithms of PicOS; a commercial tiny, low-footprint, real-time operating system; have their associated drawbacks. An efficient, alternative algorithm, based on a randomized selection policy, has been proposed, demonstrated, confirmed for efficiency and fairness, on the average, and has been recommended for implementation in PicOS. Simulations were carried out and performance measures such as Average Waiting Time (AWT) and Average Turn-around Time (ATT) were used to assess the efficiency of the proposed randomized version over the existing ones. The results prove that Randomized algorithm is the best and most attractive for implementation in PicOS, since it is most fair and has the least AWT and ATT on average over the other non-preemptive scheduling algorithms implemented in this paper.
In this paper, we will explore the growth of virtual worlds – one of the most exciting and fast-growing concepts in the Web 2.0 era. We will see that while there has been significant growth across all demographic groups, online gaming in MMOGs (Massively Multiplayer Online Games) are finding particular appeal in today’s youth – the so-called “digital native” generation. We then overview the today’s virtual world marketplace, both in the youth and adult-oriented markets. Second Life is emerging as the most important virtual world today, due to the intense interest amongst both large organizations and individual entrepreneurs to conduct real business in the virtual environment. Due to its prominence today and its forecasted growth over the next decade, we take a look at the unscripted world of Second Life, examining the corporate presence in-world, as well as the economic, technical, legal, ethical and security issues involved for companies doing business in the virtual world. In conclusion, we present an analysis of where we stand in terms of virtual world development today and a projection of where we will be heading in the near future. Finally, we present advice to management practitioners and academicians on how to learn about virtual worlds and explore the world of opportunities in them.
There is a trend towards construction of multimedia digital information resources which may hold diverse data types in the form of image, graphics, audio, video, and text based retrieval artifacts or objects. WWW is a huge multimedia information resource. Existing search mechanisms available on WWW are mostly mono-modal. Multimedia information needs are partially satisfied by using mono-modal search mechanisms. Multiple modalities of information are associated with multimedia retrieval object so multimodal search mechanisms are required for searching multimedia information resources. Existing search mechanisms available on WWW whether they are general purpose, domain specific or media specific partially fulfil multimedia information needs because they are mostly mono-modal and able to perform search with in one media type at a time. We explore with the help of multimedia object analysis that search with in all the subsets of multimedia object types is possible by using only four index types, two models of interactions and fifteen possible modes at most. A framework based on an architectural approach is proposed for multimedia information retrieval. Proposed retrieval framework is implemented. Present implementation gives query formulation and information presentation for all modes and search functionality with in few modes of multimedia search framework.
The aim of the present research is performing an informal analysis for internal audit involving the application of complex information system based on fuzzy logic. The same has been applied in internal audit involving the integration of the accounting field into the information systems field. The technological advancements can provide improvements to the work performed by the internal audit. Thus we aim to find, in the complex information systems, priorities for the work of internal audit of a high importance Private Institution of Higher Education. The applied method is quali-quantitative, as from the definition of strategic linguistic variables it was possible to transform them into quantitative with the matrix intersection. By means of a case study, where data were collected via interview with the Administrative Pro-Rector, who takes part at the elaboration of the strategic planning of the institution, it was possible to infer analysis concerning points which must be prioritized at the internal audit work. We emphasize that the priorities were identified when processed in a system (of academic use). From the study we can conclude that, starting from these information systems, audit can identify priorities on its work program. Along with plans and strategic objectives of the enterprise, the internal auditor can define operational procedures to work in favor of the attainment of the objectives of the organization.
The objective of this paper is to publish the results obtained in a research project developed at INAOE. This project entails the construction of a manipulator-robot three-dimensional model and its incorporation into a simulation environment. The purpose is to analyze the behavior of the virtual prototype in order to adjust details of its operation before using an actual robot.
This paper describes a proposed framework for a collaborative design in a virtual environment. The framework consists of components that support a true collaborative design in a real-time 3D virtual environment. In support of the proposed framework, a prototype application is being developed. The authors envision the framework will have, but not limited to the following features: (1) real-time manipulation of 3D objects across the network, (2) support for multi-designer activities and information access, (3) co-existence within same virtual space, etc. This paper also discusses a proposed testing to determine the possible benefits of a collaborative design in a virtual environment over other forms of collaboration, and results from a pilot test.
Due to globalization and ever shorter change cycle’s organizations improve increasingly faster their products, services, technologies, IT and organization according to customer requirements, optimize their efficiency, effectiveness and reduce costs. Thus the largest potential is the continually improvement and the management of information, data and knowledge. Long time organizations had developed lot separate and frequently independent IT applications. In the last years they were integrated by interfaces and always more by common databases. In large sized enterprises or in the public administration IT must operate various different applications, which requires a lot of personal and cost. Many organizations improve their IT starting from the lived processes using new technologies, but ask not, how they can use technology to support new processes. Many organizations of different sizes are implementing already for several years process oriented standard based management systems, such as quality ISO9001, environmental ISO14001, information security ISO/IEC27001, IT service ISO/IEC 20000-1, hygiene management systems ISO 22000 or others, which are based on common principles: objectives and strategies, business processes, resource management and continuously optimization. Due to this situation we used in different case studies as basis for system development a the organization adapted, holistic, interdisciplinary, integrated, standard based management system to analyze customer requirements and integrate, optimize and harmonize processes and services, documents and concepts. This promotes efficiency, effectiveness and organizational development to guarantee sustainable organization success.
This paper describes an application of a geographical information system with visualized and sonification lunar remote sensing data provided by Japan's lunar explorer (SELENE "KAGUYA"). Web based GIS is a very powerful tool which lunar scientists can use to visualize and access remote sensing data with other geospatial information. We discuss enhancement of the pseudo-colored visual map presentation of lunar topographical altimetry data derived from LALT and the map of the data to several sound parameters (Interval, harmony, and tempo). This paper describes an overview of this GIS with a sonification system, called "Moonbell".
Unit tests are viewed as a coding result of software developers. These unit tests are usually created by developers and implemented directly using specific language and unit testing framework. The existing unit test generation tools usually do the same thing – generate tests for specific language using a specific unit testing framework. Thus such a generator is suitable for only one programming language and unit testing framework. Another drawback of these generators – they use the software code as a source for generation mainly. In this paper we present a tests generator model which could be able to generate unit tests for any language using any unit testing framework. It will be able to use not only software under test code, but the other artifacts, too: models, specifications.
Text mining refers generally to the process of extracting interesting information and knowledge from unstructured text. This area is growing rapidly mainly because of the strong need for analysing the huge and large amount of textual data that reside on internal file systems and the Web. Text document clustering provides an effective navigation mechanism to organize this large amount of data by grouping their documents into a small number of meaningful classes. In this paper we proposed a fuzzy text document clustering approach using WordNet lexical categories and Fuzzy c-Means algorithm. Some experiments are performed to compare efficiency of the proposed approach with the recently reported approaches. Experimental results show that Fuzzy clustering leads to great performance results. Fuzzy c-means algorithm overcomes other classical clustering algorithms like k-means and bisecting k-means in both clustering quality and running time efficiency.
This paper investigates the penalty function under the condition that the insurance company is allowed to invest certain amount of money in some stock market and the remaining reserve in the bond with constant interest force. Through the properties of exponential Lévy process and discrete embedded method, the integral equations for penalty function is derived under the assumption that the stock price follows exponential Lévy process. The method for explicitly computing the ruin quantities is obtained.
The single event effects (SEE) characteristic and hardening techniques of CMOS SRAM with sub-micron feature size are studied in the paper. After introducing the relationship SEE with the structure of memory cell, the rate of read-write, the feature sizes and the power supply, the SEE hardening techniques for the COMS SRAM are given from tow aspect: device-level hardening techniques and system-level hardening techniques. Finally, an error detection and correction (EDAC) design based on high reliability anti-fused FPGA is presented, this design has special real-time performance and high reliability, and has been adopted in a space-bone integrated processor platform, which works well in all kinds of environmental experiments.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization; therefore, there is a world wide growing demand to address this problem. This demand and challenge can be met by converting the tremendous amount of paper documents to images using a process to enable specialized document imaging people to select the most suitable image type and scanning resolution to use when there is a need for storing documents images. This documents management process, if applied, attempts to solve the problem of the image storage type and size to some extent. In this paper, we present a case study resembling an applied process to manage the registration of new patients in a private clinic and to optimize following up the registered patients after having their information records stored in an imaging database system; therefore, through this automation approach, we optimize the work process and maximize the efficiency of the Skin and Allergy Clinic tasks.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization. Therefore, there is a growing and continuous demand to address this problem. This demand and challenge can be met by converting the tremendous amount of paper documents to images using a process to enable specialized document imaging people to select the most suitable image type and scanning resolution to use when there is a need for storing documents images. This documents management process, if applied, attempts to solve the problem of the image storage type and size to some extent. In this paper, we present a case study resembling an applied process to manage the documents in the scientific council in King Saud University and store them in an imaging database to make the retrieval of information and various scanned images easier and faster; therefore, we optimize the work process and maximize the efficiency of the scientific council tasks.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of flowing documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization; therefore, there is a growing demand to address this problem. This demand and challenge can be met by converting the tremendous amount of paper documents to images using a defined mechanism to enable specialized document imaging people to select the most suitable image type and scanning resolution to use when there is a need for storing documents images. This documents management mechanism, if applied, attempts to solve the problem of the image storage type and size to some extent. In this paper, we present a case study resembling an applied process to manage the documents in King Saud University rector's office and store them in an imaging database system to make the retrieval of information and various scanned images easier and faster; therefore, we optimize the work process and maximize the efficiency of the KSU rector's office tasks.
This paper proposes the idea to use Clinical Decision Support software in Health Insurance Company as a tool to reduce the expenses related to Medication Errors. As a prove that this class of software will help insurance companies reducing the expenses, the research was conducted in eight hospitals in United Arab Emirates to analyze the amount of preventable common Medication Errors in drug prescription.
We propose in this paper a method for enhancing vision through fog, based on Blind Source Separation (BSS). BSS method recovers independent source signals from a set of their linear mixtures, where the mixing matrix is unknown. The mixtures are represented in our work by the natural logarithm of the degraded image at different wavelength. These provide an additive mixture of transmittivity coefficient (related to fog) and reflectivity coefficient (related to each point of the scene).
This paper presents a case-study where a new programming technique is applied to an established branch of software development. The purpose of the study was to test whether or not aspect-oriented programming (AOP) could be used in operating systems development. Instead of any real world operating system an educational OS with the name Nachos was used. This was because Nachos is written in Java which makes it easy to introduce aspect-oriented techniques. In this paper a new file system for the Nachos OS is developed and then it is analyzed by profiling and metrics. The results show that it is possible to use AOP in OS development and that it is also beneficial to do so.
Internet Protocol Security (IPSec) is the defacto standard, which offers secured Internet communications, providing traffic integrity, confidentiality and authentication. Besides this, it is assumed that IPSec is not suitable for the protection of realtime audio transmissions as the IPSec related enlargement of packets and the usage of the Cipher Block Chaining (CBC) mode contradict stringent requirements. IPSec overhead of at least 44 bytes for each Internet Protocol (IP)-packet cannot guarantee Quality of Service (QOS) due to a bad wireless link by which the Ethernet flow control intercepts and makes a real time transmission impossible.
It is well recognized in software industry that requirements engineering is critical to the success of any major development project. Quality attributes could not be achieved without certain requirements specified by project managers that should be exhibited within the system. Thus, further research is needed to calculate the weighting factors of software quality attributes in an attempt to quantify, or in other words, to measure a software quality attribute from software project specified document. The aim of this paper is to propose a questionnaire that is designed to model one of the software quality attribute which is the security attribute and to illustrate the method used in determining the weighting factor for each question in the questionnaire. The proposed questionnaire is to elicit security requirements and its relative importance in the project under consideration for example: security could not be fulfilled without the presence of appropriate security mechanisms such as authentication, access control, and encryption, and to give a measurement for development efforts on security related feature.
Small Programmable Object Technology devices from Sun Microsystems (Sun SPOTs) are small wireless devices that can run Java programs. In the on-going research project described in this paper, Sun SPOTs have been used in conjunction with model-driven software development techniques to develop a tool that can be used to introduce new software developers to object-oriented programming in general and Java in particular in a new and interesting way. The tool, a graphical user interface application, allows users to quickly design, build, and deploy Java applications to the Sun SPOTs without using a conventional integrated development environment or low level commands. In this way new developers aren’t so overwhelmed by the wealth of technologies, commands, and possibilities offered by the current sophisticated Java development tools. However, the generated Java source code will be available as either an Eclipse or NetBeans project for those who would like to study it.
Most modern companies realise that the best way to improve stability and earning in the global, rapidly changing world is to be innovating and produce software that will be fully used and appreciated by customers. The key aspect on this road is personnel and processes. In the paper we review self-organised teams proposing several new approaches and constraints ensuring such teams’ stability and efficiency. The paper also introduce a semi-self organised teams, which are in the shortterm time perspective as the same reliable as fully self-organised teams and much simpler to organise and support.
The success of the realisation of a project depends greatly on the efficiency of the planning phase. This study presents a new technology supporting the planning phase. While projects can differ greatly from one to the other and thus require separate models and considerations, there are some questions that are always applicable. Is this the most efficient realizing sequence of tasks? Have all the possible solutions been taken into consideration before the final schedule was identified? In the course of our work, we searched for answers to these questions. The method under review (SNPM: Stochastic Network Planning Method) is a general technique which is adaptable to solve scheduling tasks. The advantages of the SNPM over already known methods (e.g. PERT, GERT, etc.) are that it identifies possible solutions with the help of stochastic variables and that it takes into consideration all of the possible successor relations. With this method, the parameters can be changed if the impacts on the project change (e.g. due to tendencies of the market, changes of technological conditions). Thus the SNPM could be useful as a module of an expert system. The steps of the SNPM are introduced through a few examples to show how it works.
Information delivery is one the most important task in healthcare. The growing sector of electronic healthcare has an important impact on the information delivery. There are two basic approaches towards information delivering. The first is web portal and second is touch-screen terminal. The aim of this paper is to investigate the web-based service portal. The most important advantage of web-based portal in the field of healthcare is an independent access for patients. This paper deals with the conditions and frameworks for healthcare portals
There are currently two options to achieve binaural sound spatialization using Head-Related Impulse Responses (HRIRs): measure every intended listener’s HRIR or use generic HRIRs. However, measuring HRIRs requires expensive and specialized equipment, which removes its availability to the general public. In contrast, use of generic HRIRs results in higher localization errors. Another possibility that researchers, including our group, are pursuing is the customization of HRIRs. Our group is pursuing this by developing a structural model in which the physical measurements of a new intended listener could be used to synthesize his/her custom-fitted HRIRs, to achieve spatialization equivalent to measured HRIRs. However, this approach requires that HRIRs from multiple subjects be initially broken down in order to reveal the parameters of the corresponding structural models. This paper presents a new method for decomposing HRIRs and tests its performance on simulated examples and actual HRIRs.
In speech analysis, the voiced-unvoiced decision is usually performed in extracting the information from the speech signals. In this paper, two methods are performed to separate the voiced and unvoiced parts of the speech signals. These are zero crossing rate (ZCR) and energy. In here, we evaluated the results by dividing the speech sample into some segments and used the zero crossing rate and energy calculations to separate the voiced and unvoiced parts of speech. The results suggest that zero crossing rates are low for voiced part and high for unvoiced part where as the energy is high for voiced part and low for unvoiced part. Therefore, these methods are proved effective in separation of voiced and unvoiced speech.
This paper provides a detailed survey of how Model- Based Testing (MBT) has been used for testing different quality attributes of distributed systems such as security, performance, reliability, and correctness. For this purpose, three additional criteria are added to the classification. These criteria are: the purpose of testing, the test case paradigm, and the type of conformance checking. A comparison between different MBT tools based on the classification is also given.
The paper deals with the mineral floatation study by modeling and simulation. Some of the main functions characterising the floatation process were simulated using Matlab Simulink programs. By analysing the results of these simulations and comparing them, we reached a conclusion concerning the optimising factors of the floatation duration. We also elaborated a Visual Basic Application which allows the calculation of quantities and contents in every point of a simple floatation circuit, for any number of operations. It’s an easy to use, conversational application that allows studying more configurations in order to find the optimum one, sparing the researchers’ and designers’ time and effort.
This work examines the problem of creating a universal recovery path search algorithm in backup systems. The possibility of applying the graph theory is investigated. Various algorithms are examined and their selections are substantiated. Recommendations are presented for realizing the proposed method.
Nowadays, one of the ways to reduce medical care costs is to reduce the length of patients hospitalization and reinforce home sanitary support by formal (professionals) and non formal (family) caregivers. The aim is to design and operate a scalable and secured collaborative platform to handle specific tools for patients, their families and doctors. Visiophony tools are one way to help elderly people to have relationships with their family or caregivers. But it is possible to use the same tool to remote control a Robot- Companion.
The globalisation of corporations’ operations has produced a huge volume of inter-company invoices. Optimisation of those known as payment clearance can produce a significant saving in costs associated with those transfers and handling. The paper revises some common and so practical approaches to the payment clearance problem and proposes some novel algorithms based on graphs theory and heuristic totals’ distribution.
Latent Semantic Indexing (LSI), a well known technique in Information Retrieval has been partially successful in text retrieval and no major breakthrough has been achieved in text classification as yet. A significant step forward in this regard was made by Hofmann[3], who presented the probabilistic LSI (PLSI) model, as an alternative to LSI. If we wish to consider exchangeable representations for documents and words, PLSI is not successful which further led to the Latent Dirichlet Allocation (LDA) model [4]. A new local Latent Semantic Indexing method has been proposed by some authors called “Local Relevancy Ladder-Weighted LSI” (LRLW-LSI) to improve text classification [5]. In this paper we study LSI and its variants in detail , analyze the role played by them in text classification and conclude with future directions in this area.
A new, tighter bound of coefficient-sensitivity is derived for 2-D digital systems. A new algorithm is also proposed which optimizes both the coefficient-sensitivity and the state-structure of 2-D digital systems.
This article presents a methodology to encapsulate, not only the functionality of several SoC modules, but also the connections between those modules. To achieve these results, the possibilities of Algorithmic State Machines (ASM charts) have been extended to develop a compiler. Using this approach, a SoC design becomes a set of chart boxes and links: several boxes describe parameterized modules in a hierarchical fashion, other boxes encapsulate their connections, and all boxes are linked together using simple lines. At last, a compiler processes all required files and generates the corresponding VHDL or Verilog code, valid for simulation and synthesis. A small SoC design with two DSP processors is shown as an example.
The recent trend toward virtualized computing both as a means of server consolidation and as a powerful desktop computing tool has lead into a wide variety of studies into the performance of hypervisor products. This study has investigated the scalability of VMware Workstation 6 on the desktop platform. We present comparative performance results for the concurrent execution of a number of virtual machines. A through statistical analysis of the performance results highlights the performance trends of different numbers of concurrent virtual machines and concludes that VMware workstation can scale in certain contexts. We find that there are different performance benefits dependant on the application and that memory intensive applications perform less effectively than those applications which are IO intensive. We also find that running concurrent virtual machines offers a significant performance decrease, but that the drop thereafter is less significant.
A major difference between what we refer to as a “well-developed” science, such as civil engineering, and sciences which are less so, like enterprise engineering, is the degree to which nonfunctional requirements, such as performance, are integrated into the design and development process, and satisfaction of those requirements is controlled by theoretically valid measurement procedures. This paper introduces the preliminary results, which are aimed at developing a concise formal framework for enterprise performance modeling, measurement, and control during enterprise integration activities. The novelty of this research consists in employing the mathematical category theory for modeling purposes, an approach that is broad enough to formally capture heterogeneous (structural, functional and nonfunctional) requirements, by, for example, using the constructs from the graphical categorical formal language. KeywordsPerformance modeling-performance measurement-enterprise integration-category theory
Static converters are very important element in controlled drive systems. The development of the power semiconductor elements has revolutionized the field of electric power control and has permitted the improvement and the diversification of the electric energy converter. Loads with highly distorted current waveforms also have a very poor power factor; because of this, they use excessive power system capacity and could be a cause of overloading. The power supply from the Oltenia open pit coal mine machinery consists of electrical cables from 20/6 kV transformer station rigged with 4 or 6 MVA transformers counting 188 pieces, providing 1263,3 MVA rated capacity.
It is common for information system projects’ implementation to fail. One of the most mentioned reasons is implementation management, particularly the change management during the implementation cycle. This study provides a literature review that aims at supporting this assertion, and identifies some of the most evident issues on the subject. The study highlights the need for new approaches on the Change Management process in the implementation of health information systems.
This is a comparative study of cache energy dissipations in Very Long Instruction Word (VLIW) and the classical superscalar microprocessors. While being architecturally different, the two types are analyzed in this work on the basis of similar underlying silicon fabrication platforms. The outcomes of the study reveal how energy is exploited in the cache system of the former which makes it more appealing to low-power applications with respect to the latter.
Speech compression is the technology of converting human speech into an efficiently encoded representation that can later be decoded to produce a close approximation of the original signal. In all speech there is a degree of predictability and speech coding techniques exploit this to reduce bit rates yet still maintain a suitable level of quality. This paper is a study and implementation of Linde-Buzo-Gray Algorithm (LBG) and Adaptive Differential Pulse Code Modulation (ADPCM) algorithms to compress speech signals. In here we implemented the methods using MATLAB 7.0. The methods we used in this study gave good results and performance in compressing the speech and listening tests showed that efficient and high quality coding is achieved.
XML (eXtensible Markup Language) is a widely used language for communication between heterogeneous, homogeneous, and internet software applications. Currently available binding and parsing techniques for XML documents involve tight coupling of the document with the application code and require a redesign of the application code for any change in the document design. This paper proposes a ‘Loosely Coupled Model (LCM)’ for XML document parsing, which eliminates the need to redesign the application code for moderately large changes in the XML document design. LCM takes a token based approach, which is very different from the existing methodologies for XML parsing. LCM is implemented in Java using Sun’s JDK 1.5. The dataset includes 24 XML documents categorized into two sets- (a) deeply nested and (b) non-deeply nested XMLs. Each set contains 12 documents ranging from 2 KB up to 4 MB. A performance comparison for LCM is obtained and is noticed to be comparable or better against this dataset with (a) Sun’s Java XML Binding (JAXB), (b) Apache’s XMLBeans, and (c) JDOM parser.
The software community uses a multitude of varying analysis techniques to define the "what" of software artifacts. How do different analysis techniques compare and contrast with each other? This paper presents a new analysis framework to describe and characterize software analysis techniques employed during the specification process.
Mobile agent technology has a lot of gains to offer network-centric applications. The technology promises to be very suitable for narrow-bandwidth networks by reducing network latency and allowing transparent per-to-per computing. Multi-agent technology had been proposed for many network-centric applications with little or no path scheduling algorithms. This paper describes the need for path scheduling algorithms for agents in multi-agent systems. Traveling salesman problem (TSP) scheme is used to model ordered agents and the unordered agents schedule their path based on random distribution. The two types of agents were modeled and simulated based on bandwidth usage and response time as performance metrics. Our simulation results shows that ordered agents have superior performance against unordered agents. The ordered agents exhibit lower bandwidth usage and higher response time. KeywordsTSP-Ordered Agent-Bandwidth Usage-Response time-Routing model
Each Computer Aided Software Engineering (CASE) system provides support to a software process or specific tasks or activities that are part of a software process. Each meta-CASE system allows us to create new CASE systems. The creators of a new CASE system have to specify abstract syntax of the language that is used in the system and functionality as well as non-functional properties of the new system. Many meta-CASE systems record their data directly in files. In this paper, we introduce a meta-CASE system, the enabling technology of which is an object-relational database system (ORDBMS). The system allows users to manage specifications of languages and create models by using these languages. The system has web-based and form-based user interface. We have created a proof-of-concept prototype of the system by using PostgreSQL ORDBMS and PHP scripting language.
We study a classical problem in operating systems concerning deadlock detection for systems with reusable resources. The elegant Dijkstra’s algorithm utilizes simple data structures, but it has the cost of quadratic dependence on the number of the processes. Our goal is to reduce the cost in an optimal way without losing the simplicity of the data structures. More specifically, we present a graph-free and almost optimal algorithm with the cost of linear dependence on the number of the processes, when the number of resources is fixed and when the units of requests for resources are bounded by constants.
Reverse engineering tools can be used in satisfying the information needs of software maintainers. Especially in case of maintaining large-scale legacy systems tool support is essential. Reverse engineering tools provide various kinds of capabilities to provide the needed information to the tool user. In this paper we analyze the provided capabilities in terms of four aspects: provided data structures, visualization mechanisms, information request specification mechanisms, and navigation features. We provide a compact analysis of ten representative reverse engineering tools for supporting C, C++ or Java: Eclipse Java Development Tools, Wind River Workbench (for C and C++), Understand (for C++), Imagix 4D, Creole, Javadoc, Javasrc, Source Navigator, Doxygen, and HyperSoft. The results of the study supplement the earlier findings in this important area.
This paper presents an approach to model driven software development. It first covers some basics about model driven approaches and then the main concepts of the GeneSEZ1 approach are presented and discussed to regard the needs of software architects and developers. A meta model is introduced to provide reusable transformation chains across different projects and its model driven development process is covered. The GeneSEZ approach is applied and discussed on an example application.
This paper presents a novel graphic tool to develop imaging applications. Users interact with this tool by means of constructing a DIP graph, which is a series of nodes and edges indicating the processing flow of the images to be analyzed. Solutions created using our tool can run inside the developing environment and also we can get the equivalent Java source code; so that, we can reused the code in other platforms. Another advantage of our software tool is the fact that users can easily propose and construct new algorithms following the Java beans rules. Our proposal can be seen as a DIP compiler because our tool produces fullfunctional Java programs that can solve an specific problem. The program specification is not a text based one, but a graphic specification and that is one of the main contributions of this work. Index TermsGraphical user interfaces-Image analysis-Image processing-JADE
Multimedia applications running on mobile devices and using wireless networks become more and more demanding with respect to processing speed and power consumption. Power saving is one of the most important feature that network interface and mobile CPU must provide in order to prolong battery lifetime. The multitude and complexity of devices that implement a large spectrum of multimedia and wireless protocols requires closer evaluation and understanding in respect to power efficiency. As there is very little analysis on the relationship between multimedia applications and their power profile in the context of mobile wireless devices, we investigate the landscape of multimedia communication efficiency methods. The proposed evaluation scenarios address CPU power consumption, wireless communication power consumption and video and sound interface power consumption.
Optoelectronic processors have already been developed with the strong potentiality of optics in information and data processing. Encoder, Decoder, Multiplexers and Demultiplexers are the most important components in modern system designs and in communications. We have implemented the same using trinary logic gates with signed magnitude defined as Modified Trinary Number (MTN). The Spatial Light Modulator (SLM) based optoelectronic circuit is suitable for high speed data processing and communications using photon as carrier. We also presented here a possible method of implementing the same using light with photon as carrier of information. The importance of the method is that all the basic gates needed may be fabricated based on basic building block.
The main idea of the paper is the formation of regional competitiveness information system conception, structurization of this system, determining the sources of its information supply and its application to decisions management. Proper knowledge on competitiveness contents and various attributes of competitiveness ensure the effective functioning of the system. Fully developed regional competitiveness information system can be applied for formation and application of regional development strategies.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents. This problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization. Therefore, there is a growing demand to address this problem. This demand and challenge can be met by developing a web-based database to enable specialized document imaging people to upload the frequently used forms and related information to use when there is a need. This automation process, if applied, attempts to solve the problem of allocating the information and accessing the needed forms to some extent. In this paper, we present an automation experience which is applied in King Saud University1 to assist Academic Departments Chairmen finding all needed information and periodically used forms on an intranet site which proved to be very practical and efficient as far as optimizing the effort and time consumed for information and documents retrieval.
Most of the electronic measurements laboratories need signal generators capable to generate several types of signals with different shapes, frequencies and amplitudes. Unfortunately the more versatile such a signal generator will be the higher its cost will be. The alternative is the PC based instrumentation. There are classical tools, as Lab VIEW, but sometimes a better approach is to develop a PC based instrumentation system targeted to one or few of the electronic measurement operations. This paper describes a configurable signal generator implemented with the PWM method on the advanced 32 bit Tricore microcontroller family. Several types of signals can be generated: sinus, pulse, saw tooth and custom. The proposed configurable signal generator is targeted to low frequency applications (1 Hz – 600 Hz) useful in motor control, laboratory experiments etc. The system offers the flexibility and versatility of the PC based electronic instrumentation, the performance of a 32 bit microcontroller and low cost.
Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.
In this paper we describe a solution to introduce autonomic behavior to the enterprise printing infrastructure. The techniques proposed do not need an overhaul to replace existing print devices—our solution introduces fail-over print capability to the millions of printers that comprise the installed base. We describe techniques for “printer neighborhood-awareness” and for enabling an easy path to the fail-over solution deployment without requiring custom PC software or new driver installs. We also discuss our experiences deploying this solution in a live enterprise IT environment.
There is two approaches for handling timing constraints in a heterogeneous network; conservatives and optimistic algorithms. In optimistic algorithms, time constraints are allowed to be violated with the help of a time wrap algorithm. Global Virtue Time (GVT) is a necessary mechanism for implementing time wrap algorithm. Mattern [2] has introduced an algorithm for GVT based computation using a ring structure. which showed high latency. The performance of this optimistic algorithm is optimal since it gives accurate GVT approximation. However, this accurate GVT approximation comes at the expense of high GVT latency. Since this resultant GVT latency is not only high but may vary, the multiple processors involve in communication remain idle during that period of time. Consequently, the overall throughput of a parallel and distributed simulation system degrades significantly In this paper, we discuss the potential use of trees and (or) butterflies structures instead of the ring structure. We present our analysis to show the effect of these new mechanisms on the latency of the system.
The Time Wrap algorithm [3] offers a run time recovery mechanism that deals with the causality errors. These run time recovery mechanisms consists of rollback, anti-message, and Global Virtual Time (GVT) techniques. For rollback, there is a need to compute GVT which is used in discrete-event simulation to reclaim the memory, commit the output, detect the termination, and handle the errors. However, the computation of GVT requires dealing with transient message problem and the simultaneous reporting problem. These problems can be dealt in an efficient manner by the Samadi’s algorithm [8] which works fine in the presence of causality errors. However, the performance of both Time Wrap and Samadi’s algorithms depends on the latency involve in GVT computation. Both algorithms give poor latency for large simulation systems especially in the presence of causality errors. To improve the latency and reduce the processor ideal time, we implement tree and butterflies barriers with the optimistic algorithm. Our analysis shows that the use of synchronous barriers such as tree and butterfly with the optimistic algorithm not only minimizes the GVT latency but also minimizes the processor idle time.
Nowadays the growth of the web causes some difficulties to search and browse useful information especially in specific domains. However, some portion of the web remains largely underdeveloped, as shown in lack of high quality contents. An example is the botany specific web directory, in which lack of well-structured web directories have limited user’s ability to browse required information. In this research we propose an improved framework for constructing a specific web directory. In this framework we use an anchor directory as a foundation for primary web directory. This web directory is completed by information which is gathered with automatic component and filtered by experts. We conduct an experiment for evaluating effectiveness, efficiency and satisfaction.
In a typical year, five infants are abducted by strangers from hospitals. These are devastating events for the families involved and for the health care facilities’ staff and executives. This article looks at the nature of newborn and infant abductions, analyzing data on these kidnappings from the FBI and from the National Center for Missing & Exploited Children. Then, the article examines the potential for RFID (radio frequency identification) based systems to improve security in the pediatric area of hospitals, providing an overview of the technology on the market today for infant protection. The article concludes with an analysis of the ROI (return on investment) equation for health care administrators to consider in weighing their options on how to prevent a statistically unlikely, but potentially cataclysmic occurrence, at their facility. In the end, RFID-based infant protection systems can be seen as a form of “security theater,” serving as a “palliative countermeasure” that will indeed work – both substantively and psychologically – to promote a more secure hospital environment for moms and their newborns.
It is often common for people to have more than one operating system (OS) that they use on a regular basis. This can necessitate carrying multiple live or installation CD or DVDs. When multiple OSs are installed on a given machine, boot loaders on the system hard drive allow the users to access the various platforms. However, when the system is located in a public environment such as a computer lab, it is often desirable to hide the existence of any platform other than the default standard platform to avoid confusing the general user. This paper details how to create a CD that contains not only a boot menu to reach all of the OSs installed on your system, but also installation, live and network distributions that can be accessed directly from the single CD media.
This contribution focuses on investigation of remote electronic voting system, named COOPTO. Researching of suitability of electronic voting solution is forced by necessity of the improvement election process. The COOPTO is based on topical investigation of voting process and their implementation of using modern information and communication technology. The COOPTO allows voters, who are not in their election district, to participate in the democracy process. The aim of this contribution is to describe results of the development of the COOPTO solutions.
Constant evolution of technologies used in mobile devices allows an increase of capabilities related to storage, processing and transmission of data, including more than one type of technology of transmission in a same device. These factors enable a greater number of applications but also it gives rise to a necessity to find a model of service development. One of the best options which currently exist is SOA (Service Oriented Architecture). This article aims to present a framework that allows the development of SOA in mobile environment. The objective of the framework is to give developers with all necessary tools for provision of services in this environment.