BookPDF Available

Advanced Techniques in Computing Sciences and Software Engineering

Authors:

Abstract

Advanced Techniques in Computing Sciences and Software Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Software Engineering, Computer Engineering, and Systems Engineering and Sciences. Advanced Techniques in Computing Sciences and Software Engineering includes selected papers form the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2008) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).
Advanced Techniques in Computing
Sciences and Software Engineering
Khaled Elleithy
Advanced
Techniques in
Computing Sciences
and Software
Engineering
123
Editor
Prof. Khaled Elleithy
University of Bridgeport
School of Engineering
221 University Avenue
Bridgeport CT 06604
USA
elleithy@bridgeport.edu
ISBN 978-90-481-3659-9 e-ISBN 978-90-481-3660-5
DOI 10.1007/978-90-481-3660-5
Springer Dordrecht Heidelberg London New York
Library of Congress Control Number: 2009942426
c
Springer Science+Business Media B.V. 2010
No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written
permission from the Publisher, with the exception of any material supplied specifically for the purpose of
being entered and executed on a computer system, for exclusive use by the purchaser of the work.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Dedication
To my Family
Preface
This book includes Volume II of the proceedings of the 2008 International Conference on Systems,
Computing Sciences and Software Engineering (SCSS). SCSS is part of the International Joint Conferences
on Computer, Information, and Systems Sciences, and Engineering (CISSE 08). The proceedings are a set
of rigorously reviewed world-class manuscripts presenting the state of international practice in Advances
and Innovations in Systems, Computing Sciences and Software Engineering.
SCSS 08 was a high-caliber research conference that was conducted online. CISSE 08 received 948 paper
submissions and the final program included 390 accepted papers from more than 80 countries, representing
the six continents. Each paper received at least two reviews, and authors were required to address review
comments prior to presentation and publication.
Conducting SCSS 08 online presented a number of unique advantages, as follows:
All communications between the authors, reviewers, and conference organizing committee were done
on line, which permitted a short six week period from the paper submission deadline to the beginning
of the conference.
PowerPoint presentations, final paper manuscripts were available to registrants for three weeks prior to
the start of the conference
The conference platform allowed live presentations by several presenters from different locations, with
the audio and PowerPoint transmitted to attendees throughout the internet, even on dial up connections.
Attendees were able to ask both audio and written questions in a chat room format, and presenters
could mark up their slides as they deem fit
The live audio presentations were also recorded and distributed to participants along with the power
points presentations and paper manuscripts within the conference DVD.
The conference organizers and I are confident that you will find the papers included in this volume
interesting and useful. We believe that technology will continue to infuse education thus enriching the
educational experience of both students and teachers.
Khaled Elleithy, Ph.D.
Bridgeport, Connecticut
December 2009
Table of Contents
Acknowledgements .................................................................................................................................. XVII
Reviewers List ............................................................................................................................................ XIX
1. Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations ...................... 1
Alexander Vaninsky
2. Application of Indirect Field Oriented Control with Optimum Flux for Induction
Machines Drives ...................................................................................................................................... 7
S. Grouni et al.
3. Urban Cluster Layout Based on Voronoi Diagram ................................................................................ 13
ZHENG Xinqi et al.
4. A Reconfigurable Design and Architecture of the Ethernet and HomePNA3.0 MAC .......................... 19
M. Khalily Dermany and M. Hossein Ghadiry
5. Automatic Translation of a Process Level Petri-Net to a Ladder Diagram ............................................ 25
Yuval Cohen et al.
6. Software Quality Perception .................................................................................................................. 31
Radosław Hofman
7. An Offline Fuzzy Based Approach for Iris Recognition with Enhanced Feature Detection ................. 39
S. R. Kodituwakku and M. I. M. Fazeen
8. A Logic for Qualified Syllogisms .......................................................................................................... 45
Daniel G. Schwartz
9. Improved Induction Tree Training for Automatic Lexical Categorization ............................................ 51
M. D. López De Luise et al.
10. Comparisons and Analysis of DCT-based Image Watermarking Algorithms ....................................... 55
Ihab Amer et al.
11. A Tool for Robustness Evaluation of Image Watermarking Algorithms ............................................... 59
Ihab Amer et al.
12. Implementation of Efficient Seamless non-broadcast Routing algorithm for Wireless
Mesh Network ....................................................................................................................................... 65
Ghassan Kbar
13. Investigations into Implementation of an Iterative Feedback Tuning Algorithm
into Microcontroller ............................................................................................................................... 73
Grayson Himunzowa
14. Comparative Study of Distance Functions for Nearest Neighbors ........................................................ 79
Janett Walters-Williams and Yan Li
X TABLE OF CONTENTS
15. Determination of the Geometrical Dimensions of the Helical Gears with Addendum
Modifications Based on the Specific Sliding Equalization Model ........................................................ 85
Antal Tiberiu Alexandru and Antal Adalbert
16. Is Manual Data Collection Hampered by the Presence of Inner Classes or Class Size? ........................ 91
Steve Counsell et al.
17. An Empirical Study of “Removed” Classes in Java Open-Source Systems .......................................... 99
Asma Mubarak et al.
18. Aspect Modification of an EAR Application ................................................................................. ...... 105
Ilona Bluemke and Konrad Billewicz
19. A Model of Organizational Politics Impact on Information Systems Success .................................... 111
Ismail M. Romi et al.
20. An Efficient Randomized Algorithm for Real-Time Process Scheduling in PicOS
Operating System................................................................................................................................. 117
Tarek Helmy et al.
21. Managing in the Virtual World: How Second Life is Rewriting the Rules
of “Real Life” Business ....................................................................................................................... 123
David C. Wyld
22. Unified Multimodal Search Framework for Multimedia Information Retrieval .................................. 129
Umer Rashid et al.
23. Informational Analysis Involving Application of Complex Information System. ............................... 137
Clébia Ciupak et al.
24. Creation of a 3D Robot Model and its Integration to a Microsoft Robotics Studio Simulation .......... 143
M. Alejandra Menéndez O. et al.
25. A Proposed Framework for Collaborative Design in a Virtual Environment ...................................... 147
Jason S. Breland & Mohd Fairuz Shiratuddin
26. System Development by Process Integrated Knowledge Management ............................................... 153
Margareth Stoll and Dietmar Laner
27. An Application of Lunar GIS with Visualized and Auditory Japan’s
Lunar Explorer “KAGUYA” Data....................................................................................................... 159
Shin-ichi Sobue et al.
28. From Constraints to Resolution Rules Part I: Conceptual Framework ................................................ 165
Denis Berthier
29. From Constraints to Resolution Rules Part II: Chains, Braids, Confluence and T&E ......................... 171
Denis Berthier
30. Platform Independent Unit Tests Generator ........................................................................................ 177
Šarūnas Packevičius et al.
31. Fuzzy Document Clustering Approach Using WordNet Lexical Categories ....................................... 181
Tarek F. Gharib et al.
XI
TABLE
OF CONTENTS
32. The Study on the Penalty Function of the Insurance Company When the Stock Price
Follows Exponential Lévy Process ...................................................................................................... 187
ZHAO Wu et al.
33. Studies on SEE Characteristic and Hardening Techniques of CMOS SRAM with
Sub-micro Feature Sizes ...................................................................................................................... 191
HE Xing-hua et al.
34. Automating the Work at The Skin and Allergy Private Clinic: A Case Study
on Using an Imaging Database to Manage Patients Records ............................................................... 197
Mohammad AbdulRahman ALGhalayini
35. Automating the Work at KSU Scientific Council: A Case Study on Using
an Imaging Database to Manage the Weekly Scientific Council Meetings ......................................... 209
Mohammad AbdulRahman ALGhalayini
36. Automating the Work at KSU Rector’s Office: A Case Study on Using an Imaging
Database System to Manage and Follow-up Incoming / Outgoing Documents .................................. 217
Mohammad A. ALGhalayini
37. Using Clinical Decision Support Software in Health Insurance Company .......................................... 223
R. Konovalov and Deniss Kumlander
38. A new Artificial Vision Method for Bad Atmospheric Conditions ..................................................... 227
M. Curilǎ
39. Aspect-Oriented Approach to Operating System Development Empirical Study ............................... 233
Jaakko Kuusela and Harri Tuominen
40. Study and Analysis of the Internet Protocol Security and its Impact
on Interactive Communications ........................................................................................................... 239
Arshi Khan and Seema Ansari
41. Investigating Software Requirements Through Developed Questionnaires to Satisfy
the Desired Quality Systems (Security Attribute Example) ................................................................ 245
Sherif M. Tawfik and Marwa M. Abd-Elghany
42. Learning Java with Sun SPOTs ........................................................................................................... 251
Craig Caulfield et al.
43. Semi- and Fully Self-Organised Teams ............................................................................................... 25
Deniss Kumlander et al.
44. Stochastic Network Planning Method ................................................................................................. 263
Z
S. T. KOSZTYÁN and J. KISS
45. Web-based Service Portal in Healthcare .............................................................................................. 26
Petr Silhavy et al.
46. Decomposition of Head-Related Transfer Functions into Multiple Damped
and Delayed Sinusoidals ...................................................................................................................... 273
Kenneth John Faller II et al.
47. Voiced/Unvoiced Decision for Speech Signals Based on Zero-Crossing Rate and Energy ................ 279
Bachu R.G. et al.
7
9
XII
TABLE
OF CONTENTS
48. A Survey of Using Model-Based Testing to Improve Quality Attributes in Distributed Systems ...... 283
Ahmad Saifan and Juergen Dingel
49. Contributions in Mineral Floatation Modeling and Simulation ........................................................... 289
B. L. Samoila and M. D. Marcu
50. Selecting the Optimal Recovery Path in Backup Systems ................................................................... 295
V.G. Kazakov and S.A. Fedosin
51. Telemedicine Platform Enhanced Visiophony Solution to Operate a Robot-Companion ................... 301
Th. Simonnet et al.
52. Some Practical Payments Clearance Algorithms ................................................................................. 307
Deniss Kumlander et al.
53. Using LSI and its Variants in Text Classification ................................................................................ 313
Shalini Batra et al.
54. On Optimization of Coefficient-Sensitivity and State-Structure for Two Dimensional (2-D)
Digital Systems .................................................................................................................................... 317
Guoliang Zeng
55. Encapsulating Connections on SoC Designs Using ASM++ charts .................................................... 323
Santiago de Pablo et al.
56. Performance Effects of Concurrent Virtual Machine Execution in VMware Workstation 6 .............. 329
Richard J Barnett et al.
57. Towards Enterprise Integration Performance Assessment Based on Category Theory ....................... 335
Victoria Mikhnovsky and Olga Ormandjieva
58. Some Aspects of Bucket Wheel Excavators Driving Using PWM Converter – Asynchronous Motor ....... 341
Marcu Marius Daniel and Orban Maria Daniela
59. Health Information Systems Implementation: Review of Change Management Issues ...................... 347
Paulo Teixeira
60. Cache Memory Energy Exploitation in VLIW Architectures . ............................................................. 351
N. Mohamed et al.
61. A Comparison of LBG and ADPCM Speech Compression Techniques ............................................. 357
Rajesh G. Bachu et al.
62. LCM: A New Approach to Parse XML Documents Through Loose Coupling Between XML
Document Design and the Corresponding Application Code .............................................................. 361
Vaddadi P. Chandu
63. A Framework to Analyze Software Analysis Techniques ................................................................... 367
Joseph T. Catanio
64. Economic Path Scheduling for Mobile Agent System on Computer Network .................................... 373
E. A. Olajubu
XIII
TABLE
OF CONTENTS
65. A Database-Based and Web-Based Meta-CASE System .................................................................... 379
Erki Eessaar and Rünno Sgirka
66. On Dijkstra’s Algorithm for Deadlock Detection ................................................................................ 385
Youming Li et al.
67. Analysis of Ten Reverse Engineering Tools ........................................................................................ 389
Jussi Koskinen and Tero Lehmonen
68. The GeneSEZ Approach to Model-driven Software Development ..................................................... 395
Tobias Haubold et al.
69. JADE: A Graphical Tool for Fast Development of Imaging Applications .......................................... 401
J. A. Chávez-Aragón et al.
70. A View on Power Efficiency of Multimedia Mobile Applications ..................................................... 407
Marius Marcu et al.
71. Trinary Encoder, Decoder, Multiplexer and Demultiplexer Using Savart Plate and Spatial
Light Modulator ................................................................................................................................... 413
Amal K Ghosh et al.
72. Regional Competitiveness Information System as a Result of Information Generation
and Knowledge Engineering ................................................................................................................ 419
Aleksandras Vytautas Rutkauskas and Viktorija Stasytyte
73. A Case Study on Using A Knowledge Management Portal For Academic
Departments Chairmen ........................................................................................................................ 425
Mohammad A. ALHarthi and Mohammad A. ALGhalayini
74. Configurable Signal Generator Implemented on Tricore Microcontrollers ......................................... 431
M. Popa et al.
75. Mathematic Model of Digital Control System with PID Regulator and Regular Step of
Quantization with Information Transfer via the Channel of Plural Access ......................................... 437
Abramov G.V et al.
76. Autonomic Printing Infrastructure for the Enterpris ............................................................................ 443
Riddhiman Ghosh et al.
77. Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT
Algorithm ............................................................................................................................................. 449
Abdelrahman Elleithy et al.
78. Implementation of Tree and Butterfly Barriers with Optimistic Time Management Algorithms for
Discrete Event Simulation ................................................................................................................... 455
Syed S. Rizvi et al.
79. Improving Performance in Constructing specific Web Directory Using Focused Crawler: An
Experiment on Botany Domain ........................................................................................................... 461
Madjid Khalilian et al.
80. “Security Theater” in the Pediatric Wing: The Case for RFID Protection for Infants
in Hospitals .......................................................................................................................................... 467
David C. Wyld
XIV
TABLE
OF CONTENTS
81. Creating a Bootable CD with Custom Boot Options that Contains Multiple Distributions ................. 471
James D. Feher et al.
82. Architecture of COOPTO Remote Voting Solution ............................................................................ 477
Radek Silhavy et al.
83. A Framework for Developing Applications Based on SOA in Mobile Environment with
Security Services.................................................................................................................................. 481
Johnneth de Sene Fonseca and Zair Abdelouahab
84. Towards a New Paradigm of Software Development: an Ambassador Driven Process
in Distributed Software Companies ..................................................................................................... 487
Deniss Kumlander et al.
85. An Equivalence Theorem for the Specification of Asynchronous Communication
Systems (SACS) and Asynchronous Message Passing System (AMPS)............................................. 491
A.V.S. Rajan et al.
86. A Framework for Decision Support Systems Based on Zachman Framework .................................... 497
S. Shervin Ostadzadeh et al.
87. In – line determination of Heat Transfer Coefficients in a Plate Heat Exchanger ............................... 503
S. Silva Sotelo and R. J. Romero Domínguez
88. Model Based Control Design Using SLPS “Simulink PSpice Interface” ............................................ 509
Saeid Moslehpour et al.
89. Design of RISC Processor Using VHDL and Cadence ....................................................................... 517
Saeid Moslehpour et al.
90. The Impact of Building Information Modeling on the Architectural Design Process ......................... 527
Thomaz P. F. Moreira et al.
91. An OpenGL-based Interface to 3D PowerPoint-like Presentations of OpenGL Projects .................... 533
Serguei A. Mokhov and Miao Song
92. Aspects Regarding the Implementation of Hsiao Code to the Cache Level of a Memory
Hierarchy With FPGA Xilinx Circuits ................................................................................................. 539
O. Novac et al.
93. Distributed Environment Integrating Tools for Software Testing ....................................................... 545
Anna Derezińska and Krzysztof Sarba
94. Epistemic Analysis of Interrogative Domains Using Cuboids............................................................. 551
Cameron Hughes and Tracey Hughes
95. Dynamical Adaptation in Terrorist Cells/Networks ............................................................................ 557
D. M. Akbar Hussain and Zaki Ahmed
96. Three-dimensional Computer Modeling and Architectural Design Process – A Comparison
Study .................................................................................................................................................... 563
Miguel C. Ramirez et al.
XV
TABLE
OF CONTENTS
97. Using Decision Structures for Policy Analysis in Software Product-line Evolution – A Case
Study .................................................................................................................................................... 56
Nita Sarang and Mukund A Sanglikar
98. Fusion of Multimedia Document Intra-Modality Relevancies using Linear Combination Model ...... 575
Umer Rashid et al.
99. An Interval-based Method for Text Clustering .................................................................................... 581
Hanh Pham
100. A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems ........................... 589
Syed S. Rizvi et al.
Index ............................................................................................................................................................ 59
9
5
Acknowledgements
The 2008 International Conference on Systems, Computing Sciences and Software Engineering (SCSS) and
the resulting proceedings could not have been organized without the assistance of a large number of
individuals. SCSS is part of the International Joint Conferences on Computer, Information, and Systems
Sciences, and Engineering (CISSE). CISSE was founded by Professor Tarek Sobh and I in 2005, and we set
up mechanisms that put it into action. Andrew Rosca wrote the software that allowed conference
management, and interaction between the authors and reviewers online. Mr. Tudor Rosca managed the
online conference presentation system and was instrumental in ensuring that the event met the highest
professional standards. I also want to acknowledge the roles played by Sarosh Patel and Ms. Susan Kristie,
our technical and administrative support team.
The technical co-sponsorship provided by the Institute of Electrical and Electronics Engineers (IEEE) and
the University of Bridgeport is gratefully appreciated. I would like to express my thanks to Prof. Toshio
Fukuda, Chair of the International Advisory Committee and the members of the SCSS Technical Program
Committee including: Abdelaziz AlMulhem, Alex A. Aravind, Anna M. Madueira, Hamid Mcheick, Hani
Hagras, Julius Dichter, Low K.S., Marian P. Kazmierkowski, Michael Lemmon, Mohamed Dekhil, Mostafa
Aref, Natalia Romalis, Raya Al-Qutaish, Rodney G. Roberts, Sanjiv Rai, Shivakumar Sastry ,Tommaso
Mazza, Samir Shah, and Mohammed Younis.
The excellent contributions of the authors made this world-class document possible. Each paper received
two to four reviews. The reviewers worked tirelessly under a tight schedule and their important work is
gratefully appreciated. In particular, I want to acknowledge the contributions of all the reviewers. A
complete list of reviewers is given in page XIX.
Khaled Elleithy, Ph.D.
Bridgeport, Connecticut
December 2009
Reviewers List
Aamir, Wali
Aaron Don, Africa
Abd El-Nasser, Ghareeb
Abdelsalam, Maatuk
Adam, Piorkowski
Adrian, Runceanu
Adriano, Albuquerque
Ahmad Sofian, Shminan
Ahmad, Saifan, 281
Ahmed, Zobaa
Alcides de Jesús, Cañola
Aleksandras Vytautas, Rutkauskas, 417
Alexander, Vaninsky, 1
Alexei, Barbosa de Aguiar
Alice, Arnoldi
Alionte, Cristian Gabriel
Amala V. S., Rajan, 489
Ana María, Moreno
Antal, Tiberiu Alexandru, 85
Anton, Moiseenko
Anu, Gupta
Asma, Paracha
Atif, Mohammad, 197
Aubrey, Jaffer
Baba Ahmed, Eddine
Biju, Issac
Brana Liliana, Samoila, 287
Buket, Barkana, 355
Cameron, Cooper, 549
Cameron, Hughes, 549
Cecilia, Chan
chetankumar, Patel, 355
Chwen Jen, Chen
Cornelis, Pieters
Craig, Caulfield, 245
Curila, Sorin, 537
Daniel G., Schwartz, 45
Daniela, López De Luise, 51, 339
David, Wyld, 123
Denis, Berthier, 165
Dierk, Langbein
Dil, Hussain, 555
Dmitry, Kuvshinov
D'Nita, Andrews-Graham
Ecilamar, Lima, 561
Edith, Lecourt, 249
Emmanuel Ajayi, Olajubu, 371
Erki, Eessaar, 377
Ernesto, Ocampo
Fernando, Torres, 321
Gennady, Abramov, 435
Ghulam, Rasool
Gururajan, Erode
Hadi, Zahedi
He, xing-hua, 191
Hector, Barbosa Leon
Houming, FAN
Igor, Aguilar Alonso
Ilias, Karasavvidis
Jaakko, Kuusela, 231
James, Feher, 469
Jan, GENCI
Janett, Williams
Jian-Bo, Chen
Jonathan, White
José L., Fuertes
Jozef, Simuth
József, Berke
Juan, Garcia
junqi, liu
Jussi, Koskinen
Jyri, Naarmala
Kenneth, Faller II
Khaled, Elleithy
Krystyna Maria, Noga
Kuderna-Iulian, Benta
Laura, Vallone
Lei, Jiasu
Leszek, Rudak
Leticia, Flores, 399
Liang, Xia, 191
madjid, khalilian, 459
Mandhapati, Raju
Margareth, Stoll, 153
Maria, Pollo Cattaneo, 339
Marina, Müller
Marius, Marcu
Marius Daniel, Marcu, 339
Martina, Hedvicakova
Md. Abdul, Based
Miao, Song, 531
Mircea, Popa, 429
Mohammad Abu, Naser
Morteza, Sargolzaei Javan
Muthu, Ramachandran
Nagm, Mohamed, 441
Nazir, Zafar
Neander, Silva, 525
Nilay, Yajnik
Nita, Sarang, 567
Nova, Ovidiu
Olga, Ormandjieva, 333
Owen, Foley
Paola, Ferrari
Paul, David and Chompu,
Nuangjamnong, 249
Peter, Nabende
Petr, Silhavy, 267
PIIA, TINT
Radek, Silhavy, 267
Richard, Barnett, 327
S. R., Kodituwakku, 39
S. Shervin, Ostadzadeh, 495
Sajad, Shirali-Shahreza
Salvador, Bueno
Samir Chandra, Das
Santiago, de Pablo, 321
Šar
{nas, Packevifius, 177
Seibu, Mary Jacob
Sergiy, Popov
Serguei, Mokhov, 531
shalini, batra, 311
Sherif, Tawfik, 243
Shini-chi, Sobue, 159
shukor sanim, m. fauzi
Siew Yung, Lau
Soly Mathew, Biju
Somesh, Dewangan
Sridhar, Chandran
Sunil Kumar, Kopparapu
sushil, chandra
Svetlana, Baigozina
Syed Sajjad, Rizvi, 447
Tariq, Abdullah
Thierry, Simonnet, 299
Thomas, Nitsche
Thuan, Nguyen Dinh
Tibor, Csizmadia
Timothy, Ryan
Tobias, Haubold, 393
Tomas, Sochor, 267, 475
Umer, Rashid, 573
Ushasri, anilkumar
Vaddadi, Chandu, 359
Valeriy, Cherkashyn
Veselina, Jecheva
Vikram, Kapila
Xinqi, Zheng, 13
Yaohui, Bai
Yet Chin, Phung
Youming, Li, 383
Young, Lee
Yuval, Cohen, 25
Zeeshan-ul-hassan, Usmani
Zsolt Tibor, Kosztyán, 261
Anna, Derezi ska, 543
"

Chapters (97)

Statistical interpretation of Cauchy functional equation f(x+y)=f(x)+f(y) and related functional equations is suggested as a tool for generating hypotheses regarding the rate of growth: linear, polynomial, or exponential, respectively. Suggested approach is based on analysis of internal dynamics of the phenomenon, rather than on finding best-fitting regression curve. As a teaching tool, it presents an example of investigation of abstract objects based on their properties and demonstrates opportunities for exploration of the real world based on combining mathematical theory with statistical techniques. Testing Malthusian theory of population growth is considered as an example.
The rotor flux optimization is crucial parameter in the implementation of the field oriented control. In this paper, we considered the problem of finding optimum flux reference that minimizes the total energy control for induction machine drive under practical constraints: voltage and current. The practical usefulness of this method is evaluated and confirmed through experiments using (1.5 kW/380 V) induction machine. Simulations and experimental investigation tests are provided to evaluate the consistency and performance of the proposed control model scheme.
The optimum layout of urban system is one of important contents in urban planning. To make regional urban system planning more suitable to the requirements of urbanization development, this paper tests a quantitative method based on GIS & Voronoi diagram. Its workflows include calculating city competitiveness data, spreading the city competitiveness analysis by aid of spatial analysis and data mining functions in GIS, getting the structural characteristics of urban system, and proposing the corresponding optimum scheme of the allocation. This method is tested using the data collected from Shandong Province, China.
In this paper a reconfigurable architecture for Ethernet and HomePNA MAC is presented. By using this new architecture, Ethernet and HomePNA reconfigurable network card can be produced. This architecture has been implemented using VHDL language and after that synthesized on a chip. The differences between HomePNA (synchronized and unsynchronized mode) and Ethernet in collision detection mechanism and priority access to media have caused the need to separate architectures for Ethernet and HomePNA, but by using similarities of them, both the Ethernet and the HomePNA can be implemented in a single chip with a little extra hardware. The number of logical elements of the proposed architecture is increased by 19% in compare to when only an Ethernet MAC is implemented
Major part of discrete industrial automation hardware is controlled by Programmable Logic Controllers (PLCs). While Petri-nets (PNs) have been proposed by many researchers for modelling shop floor discrete control, the majority of the world PLCs are programmed using ladder diagrams (LD) and significant portion of them cannot be programmed using another language. This paper proposes hierarchical approach to translating PN to LD: for describing the high level process, it introduces automatic translation technique of process level PN, while utilizing a recently developed method (for translating PN to Boolean logic) for translating the embedded tasks to a LD. Interestingly, the generated LD code enables the reconstruction of the original Petri-net.
This article analysis non-technical aspects of software quality perception and proposes further research activities for this subject naming this branch Software Quality Psychology. Cognitive science, psychology, micro economics and other human-oriented sciences do analyze human behavior, cognition and decision processes. On the other hand engineering disciplines, including software engineering, propose many formal and technical approaches for product quality description. Linkage between technical and subjective quality has been subject of research in areas related to food and agricultural applications and in this article we propose analysis of professional product perception which beyond doubt is a software product.
Among many biometric identification methods iris recognition is more attractive due to the unique features of the human eye [1]. There are many proposed algorithms for iris recognition. Although all these methods are based on the properties of the iris, they are subject to some limitations. In this research we attempt to develop an algorithm for iris recognition based on Fuzzy logic incorporated with not only the visible properties of the human iris but also considering the iris function. Visible features of the human iris such as pigment related features, features controlling the size of the pupil, visible rare anomalies, pigment frill and Collarette are considered [2]. This paper presents the algorithm we developed to recognize iris. A prototype system developed is also discussed.
In various works, L.A. Zadeh has introduced fuzzy quantifiers, fuzzy usuality modifiers, and fuzzy likelihood modifiers. This paper provides these notions with a unified semantics and uses this to define a formal logic capable of expressing and validating arguments such as 'Most birds can fly; Tweety is a bird; therefore, it is likely that Tweety can fly'. In effect, these are classical Aristotelean syllogisms that have been "qualified" through the use of fuzzy quantifiers. It is briefly outlined how these, together with some likelihood combination rules, can be used to address some well-known problems in the theory of nonmonotonic reasoning. The work is aimed at future applications in expert systems and robotics, including both hardware and software agents.
This paper studies a tuned version of an induction tree which is used for automatic detection of lexical word category. The database used to train the tree has several fields to describe Spanish words morpho-syntactically. All the processing is performed using only the information of the word and its actual sentence. It will be shown here that this kind of induction is good enough to perform the linguistic categorization.
This paper provides analysis and comparisons between three main Discrete Cosine Transform-based watermarking algorithms. The comparisons are made based on the degree of degradation the algorithms introduce after embedding the watermark, as well as the Percentage Error Bits (PEB) of the reconstructed watermark with respect to the original watermark. The algorithms’ computational requirements (measured in the total elapsed time on a unified platform) are also considered. Although the three techniques use the same concept, the results show that they behave differently. This variation in the behavior makes each of them suitable for different spectrum of applications.
Multimedia watermarking started to take place as a hot topic in the hi-tech arena during the last two decades. Proper evaluation of the robustness of different watermarking techniques is highly demanded as it represents a trusted feedback to the algorithm designers, which helps them in enhancing their algorithms. This paper proposes a new tool that can effectively test the robustness of the developed algorithms against a list of well known attacks. A set of case studies has been used to demonstrate the capabilities of the tool to categorize various algorithms in terms of their robustness to different attacks.
Wireless Mesh Networks become popular and are used everywhere as an alternative to broadband connections. The ease of configuration of wireless mesh LAN, the mobility of clients, and the large coverage make it attractive choice for supporting wireless technology in LAN and MAN. However, there are some concerns in assigning the multiple channels for different node and having efficient routing algorithm to route packet seamlessly without affecting the network performance. Multiple channel usage has been addressed in previous research paper, but efficient routing algorithm still to be researched. In this paper an efficient seamless non-broadcast routing algorithm has been developed and implemented in C++ to support the wireless mesh network. This algorithm is based on mapping the mesh wireless routing nodes geographically according to 2 coordinates. Each node will apply this algorithm to find the closet neighboring node that leads to destination based on the mapped network without the need for broadcast such as the one used in traditional routing protocol in RIP, and OSPF.
In this paper, implementation of an Iterative Feedback Tuning (IFT) and Myopic Unfalsified Control (MUC) algorithms into a microcontroller is investigated. First step taken was to search for a suitable hardware to accommodate these complex algorithms. The Motorola DSP56F807C and ARM7024 microcontrollers were selected for use in the research. The algorithms were coded in the C language of the respective microcontrollers and were tested by simulation of the DC Motor models obtained from step response of the motor.
Many learning algorithms rely on distance metrics to receive their input data. Research has shown that these metrics can improve the performance of these algorithms. Over the years an often popular function is the Euclidean function. In this paper, we investigate a number of different metrics proposed by different communities, including Mahalanobis, Euclidean, Kullback-Leibler and Hamming distance. Overall, the best-performing method is the Mahalanobis distance metric.
The paper gives a new computational method for the determination of the geometrical dimensions of the helical gears with addendum modification based on the model of the sliding equalization at the beginning and at the ending of the meshing. In this model the sliding between the teeth's flanks during the meshing is used to increase the lifetime of the gears by uniformization at the points where the differences are highest. The variations of the addendum modification values, at different axis angles and axis distances, are determined using the MATLAB computing environment.
In this paper, we present an empirical study in which we hypothesize that the existence of Java ‘inner classes’ and class size are strong impediments to the data collector during manual data collection. We collected inner class and class size data from the classes of four Java open-source systems - first manually and then automatically (after the manual collection had finished) using a bespoke software tool. The data collected by the tool provided the benchmark against which errors and oversights in the manual data collection of these two features could be recorded. Results showed our initial hypotheses to be refuted – manual errors in data collection from the four Java systems arose not from the presence of inner classes or from class size but from variations in coding style, lack of standards, class layout and disparateness of class feature declarations.
We propose aspect modification of compiled Java programs for which source code and documentation are not available. Aspect oriented programming is used to trace the program execution and identify points, in which aspects implementing new functionalities should be applied. A special tool for aspect oriented program tracing was designed and implemented. A modification in an real Enterprise Application Archive (EAR), compiled, without source code and documentation is presented in this paper. Advantages and disadvantages of described concepts are pointed out.
The extent of the information systems success is based on various determinants including the organizational politics. This area wasn't discussed deeply by researchers. Thus a comprehensive understanding of information systems remains fuzzy and elusive in this area. In an attempt to address this situation a comprehensive model was developed. Although this model is not empirically tested, it tries to explain the impact of organizational politics forms (avoiding, competing, accommodating, compromising, and collaborative) on the information systems success dimensions (system quality, information quality, service quality, use, user satisfaction, and net benefits).
PicOS is an event-driven operating environment designed for use with embedded networked sensors. More specifically, it is designed to support the concurrency in intensive operations required by networked sensors with minimal hardware requirements. Existing process scheduling algorithms of PicOS; a commercial tiny, low-footprint, real-time operating system; have their associated drawbacks. An efficient, alternative algorithm, based on a randomized selection policy, has been proposed, demonstrated, confirmed for efficiency and fairness, on the average, and has been recommended for implementation in PicOS. Simulations were carried out and performance measures such as Average Waiting Time (AWT) and Average Turn-around Time (ATT) were used to assess the efficiency of the proposed randomized version over the existing ones. The results prove that Randomized algorithm is the best and most attractive for implementation in PicOS, since it is most fair and has the least AWT and ATT on average over the other non-preemptive scheduling algorithms implemented in this paper.
In this paper, we will explore the growth of virtual worlds – one of the most exciting and fast-growing concepts in the Web 2.0 era. We will see that while there has been significant growth across all demographic groups, online gaming in MMOGs (Massively Multiplayer Online Games) are finding particular appeal in today’s youth – the so-called “digital native” generation. We then overview the today’s virtual world marketplace, both in the youth and adult-oriented markets. Second Life is emerging as the most important virtual world today, due to the intense interest amongst both large organizations and individual entrepreneurs to conduct real business in the virtual environment. Due to its prominence today and its forecasted growth over the next decade, we take a look at the unscripted world of Second Life, examining the corporate presence in-world, as well as the economic, technical, legal, ethical and security issues involved for companies doing business in the virtual world. In conclusion, we present an analysis of where we stand in terms of virtual world development today and a projection of where we will be heading in the near future. Finally, we present advice to management practitioners and academicians on how to learn about virtual worlds and explore the world of opportunities in them.
There is a trend towards construction of multimedia digital information resources which may hold diverse data types in the form of image, graphics, audio, video, and text based retrieval artifacts or objects. WWW is a huge multimedia information resource. Existing search mechanisms available on WWW are mostly mono-modal. Multimedia information needs are partially satisfied by using mono-modal search mechanisms. Multiple modalities of information are associated with multimedia retrieval object so multimodal search mechanisms are required for searching multimedia information resources. Existing search mechanisms available on WWW whether they are general purpose, domain specific or media specific partially fulfil multimedia information needs because they are mostly mono-modal and able to perform search with in one media type at a time. We explore with the help of multimedia object analysis that search with in all the subsets of multimedia object types is possible by using only four index types, two models of interactions and fifteen possible modes at most. A framework based on an architectural approach is proposed for multimedia information retrieval. Proposed retrieval framework is implemented. Present implementation gives query formulation and information presentation for all modes and search functionality with in few modes of multimedia search framework.
The aim of the present research is performing an informal analysis for internal audit involving the application of complex information system based on fuzzy logic. The same has been applied in internal audit involving the integration of the accounting field into the information systems field. The technological advancements can provide improvements to the work performed by the internal audit. Thus we aim to find, in the complex information systems, priorities for the work of internal audit of a high importance Private Institution of Higher Education. The applied method is quali-quantitative, as from the definition of strategic linguistic variables it was possible to transform them into quantitative with the matrix intersection. By means of a case study, where data were collected via interview with the Administrative Pro-Rector, who takes part at the elaboration of the strategic planning of the institution, it was possible to infer analysis concerning points which must be prioritized at the internal audit work. We emphasize that the priorities were identified when processed in a system (of academic use). From the study we can conclude that, starting from these information systems, audit can identify priorities on its work program. Along with plans and strategic objectives of the enterprise, the internal auditor can define operational procedures to work in favor of the attainment of the objectives of the organization.
The objective of this paper is to publish the results obtained in a research project developed at INAOE. This project entails the construction of a manipulator-robot three-dimensional model and its incorporation into a simulation environment. The purpose is to analyze the behavior of the virtual prototype in order to adjust details of its operation before using an actual robot.
This paper describes a proposed framework for a collaborative design in a virtual environment. The framework consists of components that support a true collaborative design in a real-time 3D virtual environment. In support of the proposed framework, a prototype application is being developed. The authors envision the framework will have, but not limited to the following features: (1) real-time manipulation of 3D objects across the network, (2) support for multi-designer activities and information access, (3) co-existence within same virtual space, etc. This paper also discusses a proposed testing to determine the possible benefits of a collaborative design in a virtual environment over other forms of collaboration, and results from a pilot test.
Due to globalization and ever shorter change cycle’s organizations improve increasingly faster their products, services, technologies, IT and organization according to customer requirements, optimize their efficiency, effectiveness and reduce costs. Thus the largest potential is the continually improvement and the management of information, data and knowledge. Long time organizations had developed lot separate and frequently independent IT applications. In the last years they were integrated by interfaces and always more by common databases. In large sized enterprises or in the public administration IT must operate various different applications, which requires a lot of personal and cost. Many organizations improve their IT starting from the lived processes using new technologies, but ask not, how they can use technology to support new processes. Many organizations of different sizes are implementing already for several years process oriented standard based management systems, such as quality ISO9001, environmental ISO14001, information security ISO/IEC27001, IT service ISO/IEC 20000-1, hygiene management systems ISO 22000 or others, which are based on common principles: objectives and strategies, business processes, resource management and continuously optimization. Due to this situation we used in different case studies as basis for system development a the organization adapted, holistic, interdisciplinary, integrated, standard based management system to analyze customer requirements and integrate, optimize and harmonize processes and services, documents and concepts. This promotes efficiency, effectiveness and organizational development to guarantee sustainable organization success.
This paper describes an application of a geographical information system with visualized and sonification lunar remote sensing data provided by Japan's lunar explorer (SELENE "KAGUYA"). Web based GIS is a very powerful tool which lunar scientists can use to visualize and access remote sensing data with other geospatial information. We discuss enhancement of the pseudo-colored visual map presentation of lunar topographical altimetry data derived from LALT and the map of the data to several sound parameters (Interval, harmony, and tempo). This paper describes an overview of this GIS with a sonification system, called "Moonbell".
Unit tests are viewed as a coding result of software developers. These unit tests are usually created by developers and implemented directly using specific language and unit testing framework. The existing unit test generation tools usually do the same thing – generate tests for specific language using a specific unit testing framework. Thus such a generator is suitable for only one programming language and unit testing framework. Another drawback of these generators – they use the software code as a source for generation mainly. In this paper we present a tests generator model which could be able to generate unit tests for any language using any unit testing framework. It will be able to use not only software under test code, but the other artifacts, too: models, specifications.
Text mining refers generally to the process of extracting interesting information and knowledge from unstructured text. This area is growing rapidly mainly because of the strong need for analysing the huge and large amount of textual data that reside on internal file systems and the Web. Text document clustering provides an effective navigation mechanism to organize this large amount of data by grouping their documents into a small number of meaningful classes. In this paper we proposed a fuzzy text document clustering approach using WordNet lexical categories and Fuzzy c-Means algorithm. Some experiments are performed to compare efficiency of the proposed approach with the recently reported approaches. Experimental results show that Fuzzy clustering leads to great performance results. Fuzzy c-means algorithm overcomes other classical clustering algorithms like k-means and bisecting k-means in both clustering quality and running time efficiency.
This paper investigates the penalty function under the condition that the insurance company is allowed to invest certain amount of money in some stock market and the remaining reserve in the bond with constant interest force. Through the properties of exponential Lévy process and discrete embedded method, the integral equations for penalty function is derived under the assumption that the stock price follows exponential Lévy process. The method for explicitly computing the ruin quantities is obtained.
The single event effects (SEE) characteristic and hardening techniques of CMOS SRAM with sub-micron feature size are studied in the paper. After introducing the relationship SEE with the structure of memory cell, the rate of read-write, the feature sizes and the power supply, the SEE hardening techniques for the COMS SRAM are given from tow aspect: device-level hardening techniques and system-level hardening techniques. Finally, an error detection and correction (EDAC) design based on high reliability anti-fused FPGA is presented, this design has special real-time performance and high reliability, and has been adopted in a space-bone integrated processor platform, which works well in all kinds of environmental experiments.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization; therefore, there is a world wide growing demand to address this problem. This demand and challenge can be met by converting the tremendous amount of paper documents to images using a process to enable specialized document imaging people to select the most suitable image type and scanning resolution to use when there is a need for storing documents images. This documents management process, if applied, attempts to solve the problem of the image storage type and size to some extent. In this paper, we present a case study resembling an applied process to manage the registration of new patients in a private clinic and to optimize following up the registered patients after having their information records stored in an imaging database system; therefore, through this automation approach, we optimize the work process and maximize the efficiency of the Skin and Allergy Clinic tasks.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization. Therefore, there is a growing and continuous demand to address this problem. This demand and challenge can be met by converting the tremendous amount of paper documents to images using a process to enable specialized document imaging people to select the most suitable image type and scanning resolution to use when there is a need for storing documents images. This documents management process, if applied, attempts to solve the problem of the image storage type and size to some extent. In this paper, we present a case study resembling an applied process to manage the documents in the scientific council in King Saud University and store them in an imaging database to make the retrieval of information and various scanned images easier and faster; therefore, we optimize the work process and maximize the efficiency of the scientific council tasks.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of flowing documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization; therefore, there is a growing demand to address this problem. This demand and challenge can be met by converting the tremendous amount of paper documents to images using a defined mechanism to enable specialized document imaging people to select the most suitable image type and scanning resolution to use when there is a need for storing documents images. This documents management mechanism, if applied, attempts to solve the problem of the image storage type and size to some extent. In this paper, we present a case study resembling an applied process to manage the documents in King Saud University rector's office and store them in an imaging database system to make the retrieval of information and various scanned images easier and faster; therefore, we optimize the work process and maximize the efficiency of the KSU rector's office tasks.
This paper proposes the idea to use Clinical Decision Support software in Health Insurance Company as a tool to reduce the expenses related to Medication Errors. As a prove that this class of software will help insurance companies reducing the expenses, the research was conducted in eight hospitals in United Arab Emirates to analyze the amount of preventable common Medication Errors in drug prescription.
We propose in this paper a method for enhancing vision through fog, based on Blind Source Separation (BSS). BSS method recovers independent source signals from a set of their linear mixtures, where the mixing matrix is unknown. The mixtures are represented in our work by the natural logarithm of the degraded image at different wavelength. These provide an additive mixture of transmittivity coefficient (related to fog) and reflectivity coefficient (related to each point of the scene).
This paper presents a case-study where a new programming technique is applied to an established branch of software development. The purpose of the study was to test whether or not aspect-oriented programming (AOP) could be used in operating systems development. Instead of any real world operating system an educational OS with the name Nachos was used. This was because Nachos is written in Java which makes it easy to introduce aspect-oriented techniques. In this paper a new file system for the Nachos OS is developed and then it is analyzed by profiling and metrics. The results show that it is possible to use AOP in OS development and that it is also beneficial to do so.
Internet Protocol Security (IPSec) is the defacto standard, which offers secured Internet communications, providing traffic integrity, confidentiality and authentication. Besides this, it is assumed that IPSec is not suitable for the protection of realtime audio transmissions as the IPSec related enlargement of packets and the usage of the Cipher Block Chaining (CBC) mode contradict stringent requirements. IPSec overhead of at least 44 bytes for each Internet Protocol (IP)-packet cannot guarantee Quality of Service (QOS) due to a bad wireless link by which the Ethernet flow control intercepts and makes a real time transmission impossible.
It is well recognized in software industry that requirements engineering is critical to the success of any major development project. Quality attributes could not be achieved without certain requirements specified by project managers that should be exhibited within the system. Thus, further research is needed to calculate the weighting factors of software quality attributes in an attempt to quantify, or in other words, to measure a software quality attribute from software project specified document. The aim of this paper is to propose a questionnaire that is designed to model one of the software quality attribute which is the security attribute and to illustrate the method used in determining the weighting factor for each question in the questionnaire. The proposed questionnaire is to elicit security requirements and its relative importance in the project under consideration for example: security could not be fulfilled without the presence of appropriate security mechanisms such as authentication, access control, and encryption, and to give a measurement for development efforts on security related feature.
Small Programmable Object Technology devices from Sun Microsystems (Sun SPOTs) are small wireless devices that can run Java programs. In the on-going research project described in this paper, Sun SPOTs have been used in conjunction with model-driven software development techniques to develop a tool that can be used to introduce new software developers to object-oriented programming in general and Java in particular in a new and interesting way. The tool, a graphical user interface application, allows users to quickly design, build, and deploy Java applications to the Sun SPOTs without using a conventional integrated development environment or low level commands. In this way new developers aren’t so overwhelmed by the wealth of technologies, commands, and possibilities offered by the current sophisticated Java development tools. However, the generated Java source code will be available as either an Eclipse or NetBeans project for those who would like to study it.
Most modern companies realise that the best way to improve stability and earning in the global, rapidly changing world is to be innovating and produce software that will be fully used and appreciated by customers. The key aspect on this road is personnel and processes. In the paper we review self-organised teams proposing several new approaches and constraints ensuring such teams’ stability and efficiency. The paper also introduce a semi-self organised teams, which are in the shortterm time perspective as the same reliable as fully self-organised teams and much simpler to organise and support.
The success of the realisation of a project depends greatly on the efficiency of the planning phase. This study presents a new technology supporting the planning phase. While projects can differ greatly from one to the other and thus require separate models and considerations, there are some questions that are always applicable. Is this the most efficient realizing sequence of tasks? Have all the possible solutions been taken into consideration before the final schedule was identified? In the course of our work, we searched for answers to these questions. The method under review (SNPM: Stochastic Network Planning Method) is a general technique which is adaptable to solve scheduling tasks. The advantages of the SNPM over already known methods (e.g. PERT, GERT, etc.) are that it identifies possible solutions with the help of stochastic variables and that it takes into consideration all of the possible successor relations. With this method, the parameters can be changed if the impacts on the project change (e.g. due to tendencies of the market, changes of technological conditions). Thus the SNPM could be useful as a module of an expert system. The steps of the SNPM are introduced through a few examples to show how it works.
Information delivery is one the most important task in healthcare. The growing sector of electronic healthcare has an important impact on the information delivery. There are two basic approaches towards information delivering. The first is web portal and second is touch-screen terminal. The aim of this paper is to investigate the web-based service portal. The most important advantage of web-based portal in the field of healthcare is an independent access for patients. This paper deals with the conditions and frameworks for healthcare portals
There are currently two options to achieve binaural sound spatialization using Head-Related Impulse Responses (HRIRs): measure every intended listener’s HRIR or use generic HRIRs. However, measuring HRIRs requires expensive and specialized equipment, which removes its availability to the general public. In contrast, use of generic HRIRs results in higher localization errors. Another possibility that researchers, including our group, are pursuing is the customization of HRIRs. Our group is pursuing this by developing a structural model in which the physical measurements of a new intended listener could be used to synthesize his/her custom-fitted HRIRs, to achieve spatialization equivalent to measured HRIRs. However, this approach requires that HRIRs from multiple subjects be initially broken down in order to reveal the parameters of the corresponding structural models. This paper presents a new method for decomposing HRIRs and tests its performance on simulated examples and actual HRIRs.
In speech analysis, the voiced-unvoiced decision is usually performed in extracting the information from the speech signals. In this paper, two methods are performed to separate the voiced and unvoiced parts of the speech signals. These are zero crossing rate (ZCR) and energy. In here, we evaluated the results by dividing the speech sample into some segments and used the zero crossing rate and energy calculations to separate the voiced and unvoiced parts of speech. The results suggest that zero crossing rates are low for voiced part and high for unvoiced part where as the energy is high for voiced part and low for unvoiced part. Therefore, these methods are proved effective in separation of voiced and unvoiced speech.
This paper provides a detailed survey of how Model- Based Testing (MBT) has been used for testing different quality attributes of distributed systems such as security, performance, reliability, and correctness. For this purpose, three additional criteria are added to the classification. These criteria are: the purpose of testing, the test case paradigm, and the type of conformance checking. A comparison between different MBT tools based on the classification is also given.
The paper deals with the mineral floatation study by modeling and simulation. Some of the main functions characterising the floatation process were simulated using Matlab Simulink programs. By analysing the results of these simulations and comparing them, we reached a conclusion concerning the optimising factors of the floatation duration. We also elaborated a Visual Basic Application which allows the calculation of quantities and contents in every point of a simple floatation circuit, for any number of operations. It’s an easy to use, conversational application that allows studying more configurations in order to find the optimum one, sparing the researchers’ and designers’ time and effort.
This work examines the problem of creating a universal recovery path search algorithm in backup systems. The possibility of applying the graph theory is investigated. Various algorithms are examined and their selections are substantiated. Recommendations are presented for realizing the proposed method.
Nowadays, one of the ways to reduce medical care costs is to reduce the length of patients hospitalization and reinforce home sanitary support by formal (professionals) and non formal (family) caregivers. The aim is to design and operate a scalable and secured collaborative platform to handle specific tools for patients, their families and doctors. Visiophony tools are one way to help elderly people to have relationships with their family or caregivers. But it is possible to use the same tool to remote control a Robot- Companion.
The globalisation of corporations’ operations has produced a huge volume of inter-company invoices. Optimisation of those known as payment clearance can produce a significant saving in costs associated with those transfers and handling. The paper revises some common and so practical approaches to the payment clearance problem and proposes some novel algorithms based on graphs theory and heuristic totals’ distribution.
Latent Semantic Indexing (LSI), a well known technique in Information Retrieval has been partially successful in text retrieval and no major breakthrough has been achieved in text classification as yet. A significant step forward in this regard was made by Hofmann[3], who presented the probabilistic LSI (PLSI) model, as an alternative to LSI. If we wish to consider exchangeable representations for documents and words, PLSI is not successful which further led to the Latent Dirichlet Allocation (LDA) model [4]. A new local Latent Semantic Indexing method has been proposed by some authors called “Local Relevancy Ladder-Weighted LSI” (LRLW-LSI) to improve text classification [5]. In this paper we study LSI and its variants in detail , analyze the role played by them in text classification and conclude with future directions in this area.
A new, tighter bound of coefficient-sensitivity is derived for 2-D digital systems. A new algorithm is also proposed which optimizes both the coefficient-sensitivity and the state-structure of 2-D digital systems.
This article presents a methodology to encapsulate, not only the functionality of several SoC modules, but also the connections between those modules. To achieve these results, the possibilities of Algorithmic State Machines (ASM charts) have been extended to develop a compiler. Using this approach, a SoC design becomes a set of chart boxes and links: several boxes describe parameterized modules in a hierarchical fashion, other boxes encapsulate their connections, and all boxes are linked together using simple lines. At last, a compiler processes all required files and generates the corresponding VHDL or Verilog code, valid for simulation and synthesis. A small SoC design with two DSP processors is shown as an example.
The recent trend toward virtualized computing both as a means of server consolidation and as a powerful desktop computing tool has lead into a wide variety of studies into the performance of hypervisor products. This study has investigated the scalability of VMware Workstation 6 on the desktop platform. We present comparative performance results for the concurrent execution of a number of virtual machines. A through statistical analysis of the performance results highlights the performance trends of different numbers of concurrent virtual machines and concludes that VMware workstation can scale in certain contexts. We find that there are different performance benefits dependant on the application and that memory intensive applications perform less effectively than those applications which are IO intensive. We also find that running concurrent virtual machines offers a significant performance decrease, but that the drop thereafter is less significant.
A major difference between what we refer to as a “well-developed” science, such as civil engineering, and sciences which are less so, like enterprise engineering, is the degree to which nonfunctional requirements, such as performance, are integrated into the design and development process, and satisfaction of those requirements is controlled by theoretically valid measurement procedures. This paper introduces the preliminary results, which are aimed at developing a concise formal framework for enterprise performance modeling, measurement, and control during enterprise integration activities. The novelty of this research consists in employing the mathematical category theory for modeling purposes, an approach that is broad enough to formally capture heterogeneous (structural, functional and nonfunctional) requirements, by, for example, using the constructs from the graphical categorical formal language. KeywordsPerformance modeling-performance measurement-enterprise integration-category theory
Static converters are very important element in controlled drive systems. The development of the power semiconductor elements has revolutionized the field of electric power control and has permitted the improvement and the diversification of the electric energy converter. Loads with highly distorted current waveforms also have a very poor power factor; because of this, they use excessive power system capacity and could be a cause of overloading. The power supply from the Oltenia open pit coal mine machinery consists of electrical cables from 20/6 kV transformer station rigged with 4 or 6 MVA transformers counting 188 pieces, providing 1263,3 MVA rated capacity.
It is common for information system projects’ implementation to fail. One of the most mentioned reasons is implementation management, particularly the change management during the implementation cycle. This study provides a literature review that aims at supporting this assertion, and identifies some of the most evident issues on the subject. The study highlights the need for new approaches on the Change Management process in the implementation of health information systems.
This is a comparative study of cache energy dissipations in Very Long Instruction Word (VLIW) and the classical superscalar microprocessors. While being architecturally different, the two types are analyzed in this work on the basis of similar underlying silicon fabrication platforms. The outcomes of the study reveal how energy is exploited in the cache system of the former which makes it more appealing to low-power applications with respect to the latter.
Speech compression is the technology of converting human speech into an efficiently encoded representation that can later be decoded to produce a close approximation of the original signal. In all speech there is a degree of predictability and speech coding techniques exploit this to reduce bit rates yet still maintain a suitable level of quality. This paper is a study and implementation of Linde-Buzo-Gray Algorithm (LBG) and Adaptive Differential Pulse Code Modulation (ADPCM) algorithms to compress speech signals. In here we implemented the methods using MATLAB 7.0. The methods we used in this study gave good results and performance in compressing the speech and listening tests showed that efficient and high quality coding is achieved.
XML (eXtensible Markup Language) is a widely used language for communication between heterogeneous, homogeneous, and internet software applications. Currently available binding and parsing techniques for XML documents involve tight coupling of the document with the application code and require a redesign of the application code for any change in the document design. This paper proposes a ‘Loosely Coupled Model (LCM)’ for XML document parsing, which eliminates the need to redesign the application code for moderately large changes in the XML document design. LCM takes a token based approach, which is very different from the existing methodologies for XML parsing. LCM is implemented in Java using Sun’s JDK 1.5. The dataset includes 24 XML documents categorized into two sets- (a) deeply nested and (b) non-deeply nested XMLs. Each set contains 12 documents ranging from 2 KB up to 4 MB. A performance comparison for LCM is obtained and is noticed to be comparable or better against this dataset with (a) Sun’s Java XML Binding (JAXB), (b) Apache’s XMLBeans, and (c) JDOM parser.
The software community uses a multitude of varying analysis techniques to define the "what" of software artifacts. How do different analysis techniques compare and contrast with each other? This paper presents a new analysis framework to describe and characterize software analysis techniques employed during the specification process.
Mobile agent technology has a lot of gains to offer network-centric applications. The technology promises to be very suitable for narrow-bandwidth networks by reducing network latency and allowing transparent per-to-per computing. Multi-agent technology had been proposed for many network-centric applications with little or no path scheduling algorithms. This paper describes the need for path scheduling algorithms for agents in multi-agent systems. Traveling salesman problem (TSP) scheme is used to model ordered agents and the unordered agents schedule their path based on random distribution. The two types of agents were modeled and simulated based on bandwidth usage and response time as performance metrics. Our simulation results shows that ordered agents have superior performance against unordered agents. The ordered agents exhibit lower bandwidth usage and higher response time. KeywordsTSP-Ordered Agent-Bandwidth Usage-Response time-Routing model
Each Computer Aided Software Engineering (CASE) system provides support to a software process or specific tasks or activities that are part of a software process. Each meta-CASE system allows us to create new CASE systems. The creators of a new CASE system have to specify abstract syntax of the language that is used in the system and functionality as well as non-functional properties of the new system. Many meta-CASE systems record their data directly in files. In this paper, we introduce a meta-CASE system, the enabling technology of which is an object-relational database system (ORDBMS). The system allows users to manage specifications of languages and create models by using these languages. The system has web-based and form-based user interface. We have created a proof-of-concept prototype of the system by using PostgreSQL ORDBMS and PHP scripting language.
We study a classical problem in operating systems concerning deadlock detection for systems with reusable resources. The elegant Dijkstra’s algorithm utilizes simple data structures, but it has the cost of quadratic dependence on the number of the processes. Our goal is to reduce the cost in an optimal way without losing the simplicity of the data structures. More specifically, we present a graph-free and almost optimal algorithm with the cost of linear dependence on the number of the processes, when the number of resources is fixed and when the units of requests for resources are bounded by constants.
Reverse engineering tools can be used in satisfying the information needs of software maintainers. Especially in case of maintaining large-scale legacy systems tool support is essential. Reverse engineering tools provide various kinds of capabilities to provide the needed information to the tool user. In this paper we analyze the provided capabilities in terms of four aspects: provided data structures, visualization mechanisms, information request specification mechanisms, and navigation features. We provide a compact analysis of ten representative reverse engineering tools for supporting C, C++ or Java: Eclipse Java Development Tools, Wind River Workbench (for C and C++), Understand (for C++), Imagix 4D, Creole, Javadoc, Javasrc, Source Navigator, Doxygen, and HyperSoft. The results of the study supplement the earlier findings in this important area.
This paper presents an approach to model driven software development. It first covers some basics about model driven approaches and then the main concepts of the GeneSEZ1 approach are presented and discussed to regard the needs of software architects and developers. A meta model is introduced to provide reusable transformation chains across different projects and its model driven development process is covered. The GeneSEZ approach is applied and discussed on an example application.
This paper presents a novel graphic tool to develop imaging applications. Users interact with this tool by means of constructing a DIP graph, which is a series of nodes and edges indicating the processing flow of the images to be analyzed. Solutions created using our tool can run inside the developing environment and also we can get the equivalent Java source code; so that, we can reused the code in other platforms. Another advantage of our software tool is the fact that users can easily propose and construct new algorithms following the Java beans rules. Our proposal can be seen as a DIP compiler because our tool produces fullfunctional Java programs that can solve an specific problem. The program specification is not a text based one, but a graphic specification and that is one of the main contributions of this work. Index TermsGraphical user interfaces-Image analysis-Image processing-JADE
Multimedia applications running on mobile devices and using wireless networks become more and more demanding with respect to processing speed and power consumption. Power saving is one of the most important feature that network interface and mobile CPU must provide in order to prolong battery lifetime. The multitude and complexity of devices that implement a large spectrum of multimedia and wireless protocols requires closer evaluation and understanding in respect to power efficiency. As there is very little analysis on the relationship between multimedia applications and their power profile in the context of mobile wireless devices, we investigate the landscape of multimedia communication efficiency methods. The proposed evaluation scenarios address CPU power consumption, wireless communication power consumption and video and sound interface power consumption.
Optoelectronic processors have already been developed with the strong potentiality of optics in information and data processing. Encoder, Decoder, Multiplexers and Demultiplexers are the most important components in modern system designs and in communications. We have implemented the same using trinary logic gates with signed magnitude defined as Modified Trinary Number (MTN). The Spatial Light Modulator (SLM) based optoelectronic circuit is suitable for high speed data processing and communications using photon as carrier. We also presented here a possible method of implementing the same using light with photon as carrier of information. The importance of the method is that all the basic gates needed may be fabricated based on basic building block.
The main idea of the paper is the formation of regional competitiveness information system conception, structurization of this system, determining the sources of its information supply and its application to decisions management. Proper knowledge on competitiveness contents and various attributes of competitiveness ensure the effective functioning of the system. Fully developed regional competitiveness information system can be applied for formation and application of regional development strategies.
Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents. This problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This problem is becoming more complex with time and the increase in the size and number of documents in an organization. Therefore, there is a growing demand to address this problem. This demand and challenge can be met by developing a web-based database to enable specialized document imaging people to upload the frequently used forms and related information to use when there is a need. This automation process, if applied, attempts to solve the problem of allocating the information and accessing the needed forms to some extent. In this paper, we present an automation experience which is applied in King Saud University1 to assist Academic Departments Chairmen finding all needed information and periodically used forms on an intranet site which proved to be very practical and efficient as far as optimizing the effort and time consumed for information and documents retrieval.
Most of the electronic measurements laboratories need signal generators capable to generate several types of signals with different shapes, frequencies and amplitudes. Unfortunately the more versatile such a signal generator will be the higher its cost will be. The alternative is the PC based instrumentation. There are classical tools, as Lab VIEW, but sometimes a better approach is to develop a PC based instrumentation system targeted to one or few of the electronic measurement operations. This paper describes a configurable signal generator implemented with the PWM method on the advanced 32 bit Tricore microcontroller family. Several types of signals can be generated: sinus, pulse, saw tooth and custom. The proposed configurable signal generator is targeted to low frequency applications (1 Hz – 600 Hz) useful in motor control, laboratory experiments etc. The system offers the flexibility and versatility of the PC based electronic instrumentation, the performance of a 32 bit microcontroller and low cost.
Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.
In this paper we describe a solution to introduce autonomic behavior to the enterprise printing infrastructure. The techniques proposed do not need an overhaul to replace existing print devices—our solution introduces fail-over print capability to the millions of printers that comprise the installed base. We describe techniques for “printer neighborhood-awareness” and for enabling an easy path to the fail-over solution deployment without requiring custom PC software or new driver installs. We also discuss our experiences deploying this solution in a live enterprise IT environment.
There is two approaches for handling timing constraints in a heterogeneous network; conservatives and optimistic algorithms. In optimistic algorithms, time constraints are allowed to be violated with the help of a time wrap algorithm. Global Virtue Time (GVT) is a necessary mechanism for implementing time wrap algorithm. Mattern [2] has introduced an algorithm for GVT based computation using a ring structure. which showed high latency. The performance of this optimistic algorithm is optimal since it gives accurate GVT approximation. However, this accurate GVT approximation comes at the expense of high GVT latency. Since this resultant GVT latency is not only high but may vary, the multiple processors involve in communication remain idle during that period of time. Consequently, the overall throughput of a parallel and distributed simulation system degrades significantly In this paper, we discuss the potential use of trees and (or) butterflies structures instead of the ring structure. We present our analysis to show the effect of these new mechanisms on the latency of the system.
The Time Wrap algorithm [3] offers a run time recovery mechanism that deals with the causality errors. These run time recovery mechanisms consists of rollback, anti-message, and Global Virtual Time (GVT) techniques. For rollback, there is a need to compute GVT which is used in discrete-event simulation to reclaim the memory, commit the output, detect the termination, and handle the errors. However, the computation of GVT requires dealing with transient message problem and the simultaneous reporting problem. These problems can be dealt in an efficient manner by the Samadi’s algorithm [8] which works fine in the presence of causality errors. However, the performance of both Time Wrap and Samadi’s algorithms depends on the latency involve in GVT computation. Both algorithms give poor latency for large simulation systems especially in the presence of causality errors. To improve the latency and reduce the processor ideal time, we implement tree and butterflies barriers with the optimistic algorithm. Our analysis shows that the use of synchronous barriers such as tree and butterfly with the optimistic algorithm not only minimizes the GVT latency but also minimizes the processor idle time.
Nowadays the growth of the web causes some difficulties to search and browse useful information especially in specific domains. However, some portion of the web remains largely underdeveloped, as shown in lack of high quality contents. An example is the botany specific web directory, in which lack of well-structured web directories have limited user’s ability to browse required information. In this research we propose an improved framework for constructing a specific web directory. In this framework we use an anchor directory as a foundation for primary web directory. This web directory is completed by information which is gathered with automatic component and filtered by experts. We conduct an experiment for evaluating effectiveness, efficiency and satisfaction.
In a typical year, five infants are abducted by strangers from hospitals. These are devastating events for the families involved and for the health care facilities’ staff and executives. This article looks at the nature of newborn and infant abductions, analyzing data on these kidnappings from the FBI and from the National Center for Missing & Exploited Children. Then, the article examines the potential for RFID (radio frequency identification) based systems to improve security in the pediatric area of hospitals, providing an overview of the technology on the market today for infant protection. The article concludes with an analysis of the ROI (return on investment) equation for health care administrators to consider in weighing their options on how to prevent a statistically unlikely, but potentially cataclysmic occurrence, at their facility. In the end, RFID-based infant protection systems can be seen as a form of “security theater,” serving as a “palliative countermeasure” that will indeed work – both substantively and psychologically – to promote a more secure hospital environment for moms and their newborns.
It is often common for people to have more than one operating system (OS) that they use on a regular basis. This can necessitate carrying multiple live or installation CD or DVDs. When multiple OSs are installed on a given machine, boot loaders on the system hard drive allow the users to access the various platforms. However, when the system is located in a public environment such as a computer lab, it is often desirable to hide the existence of any platform other than the default standard platform to avoid confusing the general user. This paper details how to create a CD that contains not only a boot menu to reach all of the OSs installed on your system, but also installation, live and network distributions that can be accessed directly from the single CD media.
This contribution focuses on investigation of remote electronic voting system, named COOPTO. Researching of suitability of electronic voting solution is forced by necessity of the improvement election process. The COOPTO is based on topical investigation of voting process and their implementation of using modern information and communication technology. The COOPTO allows voters, who are not in their election district, to participate in the democracy process. The aim of this contribution is to describe results of the development of the COOPTO solutions.
Constant evolution of technologies used in mobile devices allows an increase of capabilities related to storage, processing and transmission of data, including more than one type of technology of transmission in a same device. These factors enable a greater number of applications but also it gives rise to a necessity to find a model of service development. One of the best options which currently exist is SOA (Service Oriented Architecture). This article aims to present a framework that allows the development of SOA in mobile environment. The objective of the framework is to give developers with all necessary tools for provision of services in this environment.
The globalization of companies operations and competitor between software vendors demand improving quality of delivered software and decreasing the overall cost. The same in fact introduce a lot of problem into software development process as produce distributed organization breaking the co-location rule of modern software development methodologies. Here we propose a reformulation of the ambassador position increasing its productivity in order to bridge communication and workflow gap by managing the entire communication process rather than concentrating purely on the communication result.
Formal semantics have been employed in the specification and verification of programming languages. Language for Implementing Parallel/distributed Systems (LIPS) is an asynchronous message passing parallel programming language which handles communication and computation parts independently. The communication part of LIPS can be specified using a process algebraic tool, Specification of Asynchronous Communication Systems (SACS), and is implemented using Asynchronous Message Passing System (AMPS). An implementation is said to be complete only when we prove that it meets its specifications. To achieve that we need to prove an equivalence relation between a program’s specification and its implementation. This means that it is necessary to study the proof of equivalence of SACS and AMPS to prove the completeness of AMPS. The semantics of both SACS and AMPS have been defined using Structural Operational Semantics (SOS) in terms of Labelled Transition Systems (LTS). So we have two labelled transition system semantics : one for SACS and one for AMPS. In this paper we are proving the bisimilarity of these two labelled transition systems to prove that SACS and AMPS are equivalent.
Recent challenges have brought about an inevitable tendency for enterprises to lunge towards organizing their information activities in a comprehensive way. In this respect, Enterprise Architecture (EA) has proven to be the leading option for development and maintenance of information systems. EA clearly provides a thorough outline of the whole information system comprising an enterprise. To establish such an outline, a logical framework needs to be laid upon the entire information system. Zachman framework (ZF) has been widely accepted as a standard scheme for identifying and organizing descriptive representations that have critical roles in enterprise management and system development. In this paper, we propose a framework based on ZF for Decision Support Systems (DSS). Furthermore, a modeling approach based on Model-Driven Architecture (MDA) is utilized to obtain compatible models for all cells in the framework. The efficiency of the proposed framework is examined through a case study.
This paper shows an in – line determination of heat transfer coefficients in a plate heat exchanger. Water and aqueous working solution of lithium bromide + ethylene glycol are considered. Heat transfer coefficients are calculated for both fluids. “Type T” thermocouples were used for monitoring the wall temperature in a plate heat exchanger, which is one of the main components in an absorption system. Commercial software Agilent HP Vee Pro 7.5 was used for monitoring the temperatures and for the determination of the heat transfer coefficients. There are not previous works for heat transfer coefficients for the working solution used in this work.
This paper elaborates on the new integration offered with the PSpice SLPS interface and the MATLAB simulink products. SLPS links the two widely used design products, PSpice and Mathwork’s Simulink simulator. The SLPS simulation environment supports the substitution of an actual electronic block with an “ideal model”, better known as the mathematical simulink model. Thus enabling the designer to identify and correct integration issues of electronics within a system. Moreover, stress audit can be performed by using the PSpice smoke analysis which helps to verify whether the components are working within the manufacturer’s safe operating limits. It is invaluable since many companies design and test the electronics separately from the system level. Therefore, integrations usually are not discovered until the prototype level, causing critical time delays in getting a product to the market. The system chosen in this case is a model based design of ambulatory rehabilitation suspension system. Ambulatory suspension system [1] is an apparatus that is utilized for the purpose of helping patients during gait rehabilitation and provides safety support during exercise. The device can lift a patient from a sitting position in a wheel chair to a standing position, has the provisions to remove a percentage of the patients’ body weight and recognize subtle changes in the elevation. This model was used for mathematical and electrical comparison using the SLPS interface.
The project deals about development of a basic RISC processor. The processor is designed with basic architecture consisting of internal modules like clock generator, memory, program counter, instruction register, accumulator, arithmetic and logic unit and decoder. This processor is mainly used for simple general purpose like arithmetic operations and which can be further developed for general purpose processor by increasing the size of the instruction register. The processor is designed in VHDL by using Xilinx 8.1i version. The present project also serves as an application of the knowledge gained from past studies of the PSPICE program. The study will show how PSPICE can be used to simplify massive complex circuits designed in VHDL Synthesis. The purpose of the project is to explore the designed RISC model piece by piece, examine and understand the Input/ Output pins, and to show how the VHDL synthesis code can be converted to a simplified PSPICE model. The project will also serve as a collection of various research materials about the pieces of the circuit.
Many benefits of Building Information Modeling, BIM, have been suggested by several authors and by software vendors. In this paper we describe an experiment in which two groups of designers were observed developing an assigned design task. One of the groups used a BIM system, while the other used a standard computer-aided drafting system. The results show that some of the promises of BIM hold true, such as consistency maintenance and error avoidance in the design documentation process. Other promises such as changing the design process itself seemed also promising but they need more research to determine to greater extent the depth of such changes.
We present a multimedia D interface to powerpoint-like presentations in OpenGL. The presentations of such kind are useful to demonstrate projects or conference talks with the demonstration results of a 3D animation, effects, and others alongside the presentation ‘in situ’ instead of switching between a regular presentation software to the demo and back – the demo and the presentation can be one and the same, embedded together.
In this paper we will apply a SEC-DED code to the cache level of a memory hierarchy. From the category of SEC-DED (Single Error Correction Double Error Detection) codes we select the Hsiao code. The Hsiao code is a odd-weight-column SEC-DED code. For correction of single-bit error we use a syndrome decoder, a syndrome generator and the check bits generator circuit.
This work is devoted to problems of testing many programs using various testing tools of different origin. We present a distributed system, called Tester, which manages and automates testing process. The system is based on client-server architecture and integrates testing tools, including commercial tools, open-source and own applications. It uses repository for storing projects to be tested and database with test results. Different performance issues concerning test automation are discussed and experimentally evaluated. The system was used in mutation testing of C# programs using object-oriented mutation operators, in experiments investigating the relation between line and assembly instruction coverage on the set of C++ programs, and statistic analysis of different program characteristics.
We are interested in analyzing the propositional knowledge extracted by an epistemic agent from interrogative domains. The interrogative domains that have our current focus are taken from transcripts of legal trials, congressional hearings, or law enforcement interrogations. These transcripts have be encoded in XML or HTML formats. The agent uses these transcripts as a primary knowledge source. The complexity, size, scope and potentially conflicting nature of transcripts from interrogative domains bring into question the quality of propositional knowledge that can be garnered by the agent. Epistemic Cuboids or Cubes are used as a knowledge analysis technique that helps determine the quality and quantity of the propositional knowledge extracted by an epistemic agent from an interrogative domain. In this paper we explore how 'Epistemic Cubes' can be used to evaluate the nature of the agent's propositional knowledge.
Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long history of their successful use in revealing the importance of various members of the network. However, modeling of covert, terrorist or criminal networks through social graph dose not really provide the hierarchical structure which exist in these networks as these networks are composed of leaders and followers etc. In this research we analyze and predict the most likely role a particular node can adapt once a member of the network is either killed or caught. The adaptation is based on computing Bayes posteriori probability of each node and the level of the said node in the network structure. KeywordsSocial Networks Analysis-Bayes Theorem-Hierarchical Structure-Dynamical
In this paper we describe the assessment of three categories of CAD systems with focus on three dimensional computer modeling and its suitability for the architectural design process. The results show that there are significant differences in their performance and that some are more adequate to be incorporated into the design process than others.
Project management decisions are the primary basis for project success (or failure). Mostly, such decisions are based on an intuitive understanding of the underlying software engineering and management process and have a likelihood of being misjudged. Our problem domain is product-line evolution. We model the dynamics of the process by incorporating feedback loops appropriate to two decision structures: staffing policy, and the forces of growth associated with long-term software evolution. The model is executable and supports project managers to assess the long-term effects of possible actions. Our work also corroborates results from earlier studies of E-type systems, in particular the FEAST project and the rules for software evolution, planning and management.
Information retrieval systems that search within multimedia artifacts face inter-modality fusion problem. Fuzzy logic, sequential and linear combinational techniques are used for inter-modality fusion. We explore asymptotically that Fuzzy logic and sequential techniques have limitations. One major limitation is that they only address fusion of documents coming from different modalities, not document relevancies distributed in different modality relevancy spaces. Linear combinational techniques fuse document relevancies distributed within different relevancy spaces using inter-modality weights and calculate composite relevancies. Inter-modality weights can be calculated using several offline and online techniques. Offline techniques mostly use machine learning techniques and adjust weights before search process. Online techniques calculate inter-modality weights within search process and are satisfactory for general purpose information retrieval systems. We investigate asymptotically that linear combination technique for inter-modality fusion outperforms fuzzy logic techniques and workflows. We explore a variation of linear combination technique based on ratio of average arithmetic means of document relevancies. Our proposed technique smoothes the effect of inter-modality weights and provides a moderate mechanism of inter-modality fusion.
This paper describes a clustering approach for classifying texts where dynamic text are evaluated with intervals (interval-valued numbers or IVN) rather than numbers. This new interval measurement allows us to capture the text relevance by multiple keywords at the same time and thus can provide multi-dimension text ranking. We build several comparison mechanisms to rank the intervals based on interval multiple values, their distributions and relationships. Then, the dynamic texts in information systems can be pro-actively clustered into collections usingthis ranking results.
Mattern’s GVT algorithm is a time management algorithm that helps achieve the synchronization in parallel and distributed systems. This algorithm uses ring structure to establish cuts C1 and C2 to calculate the GVT. The latency of calculating the GVT is vital in parallel/distributed systems which is extremely high if calculated using this algorithm. However, using synchronous barriers with the Matterns algorithm can help improving the GVT computation process by minimizing the GVT latency. In this paper, we incorporate the butterfly barrier to employ two cuts C1 and C2 and obtain the resultant GVT at an affordable latency. Our analysis shows that the proposed GVT computation algorithm significantly improves the overall performance in terms of memory saving and latency.
... 1. Multimedia Items: In the literature [1], a multimedia item (aka multimedia object or document) refers to an item which can be a text, image, audio, or video. Formally, a multimedia item I in its most general form is represented by the triple: I = (I V , I A , I T ) in which I V , I A , I T refer to the visual, aural, and textual components (aka modalities), respectively. ...
Conference Paper
Full-text available
The goal of this work is to formally provide a general definition of a multimedia recommendation system (MMRS), in particular a content-based MMRS (CB-MMRS), and to shed light on different applications of multimedia content for solving a variety of tasks related to recommendation. We would like to disambiguate the fact that multimedia recommendation is not only about recommending a particular media type (e.g., music, video), rather there exists a variety of other applications in which the analysis of multimedia input can be usefully exploited to provide recommendations of various kinds of information.
... As a repository of information (Christophe 2008;Vanlande, Nicolle and Cruz 2008), the use of BIM in construction projects has gained a measure of acceptance from architects, engineers, construction professionals and project owners (Loh, Dawood and Dean2007; Bernstein 2010). A construction project, on the other hand may be regarded as a temporary endeavour (PMBOK 2008) directed towards the successful attainment of specific objectives (Foster 2008) through the collaborative efforts of different professionals (Elleithy 2010). ...
... The Sobol first-order index gives a measure of the direct effect of a model parameter on the variation in O I, whereas the total-order index describes the share of the output variation that is related to each input factor. It includes the direct effect as well as interactions among the other parameters [24]. As suggested by Marino et al. 2008 [10], because the two methods measure different aspects of the model, the most optimal strategy to achieving a complete and informative sensitivity analysis is to estimate both indices. ...
Article
In this study, a mathematical model previously proposed for the transmission dynamics of brucellosis among bison was mathematically analyzed. Our qualitative and quantitative findings support the general hypothesis that the infection will vanish from the herd when the basic reproduction number R0<1 and will persist otherwise. A global sensitivity analysis was conducted, and the results of the Sobol indices indicated that the rate of loss of resistance (δ) and the recovery rate (v) were responsible for most of the variability in the expected number of infectious bison. On the other hand, according to the partial ranked correlation coefficients, the density-dependent reduction in birth (φ), the mortality rate (m), the transmission coefficient (β), and the recovery rate (v) exerted very high (and negative) correlations with the number of infectious bison, whereas the rate of loss of resistance (δ) and the calving rate (a) exerted very high (and positive) correlations with the number of infectious bison. Control measures should therefore aim at increasing the magnitude of φ, m, and v and reducing those of δ and a. In addition, experimental studies are needed to precisely estimate the rate of loss of resistance and the recovery rate in order to increase the accuracy of the expected number of infectious bison. Copyright © 2014 John Wiley & Sons, Ltd.
Article
Full-text available
This paper presents an ultra-low-power voice activity detection (VAD) system to discriminate speech from non-speech parts of audio signals. The proposed VAD system uses level-crossing sampling for voice activity detection. The useless samples in the non-speech parts of the signal are eliminated due to the activity-dependent nature of this sampling scheme. A 40 ms moving window with a 30 ms overlap is exploited as a feature extraction block, within which the output samples of the level-crossing analog-to-digital converter (LC-ADC) are counted as the feature. The only variable used to distinguish speech and non-speech segments in the audio input signal is the number of LC-ADC output samples within a time window. The proposed system achieves an average of 91.02% speech hit rate and 82.64% non-speech hit rate over 12 noise types at −5, 0, 5, and 10 dB signal-to-noise ratios (SNR) over the TIMIT database. The proposed system including LC-ADC, feature extraction, and classification circuits was designed in 0.18 µm CMOS technology. Post-layout simulation results show a power consumption of 394.6 nW with a silicon area of 0.044 mm2, which makes it suitable as an always-on device in an automatic speech recognition system.
Article
Full-text available
The concept of clearing or netting, as defined in the glossaries of European Central Bank, has a great impact on the economy of a country influencing the exchanges and the interactions between companies. On short, netting refers to an alternative to the usual way in which the companies make the payments to each other: it is an agreement in which each party sets off amounts it owes against amounts owed to it. Based on the amounts two or more parties owe between them, the payment is substituted by a direct settlement. In this paper we introduce a set of graph algorithms which provide optimal netting solutions for the scale of a country economy. The set of algorithms computes results in an efficient time and is tested on invoice data provided by the Romanian Ministry of Economy. Our results show that classical graph algorithms are still capable of solving very important modern problems.
Article
Many nations have adopted comprehensive data privacy laws to protect customers' data. However, privacy policies of mobile wallet digital payment systems (DPS), and particularly the mobile wallet and remittance services that are part of DPS, are often not compliant with privacy laws. There is a lack of measures to assess how adequate the policies are in addressing data privacy issues. To address this problem, this article develops a compliance index to help DPS organizations assess the compliance of their privacy policies with the general data protection regulation (GDPR). The compliance index is created through a natural language process that includes term frequency-inverse document frequency matrix and topic modeling using latent Dirichlet allocation, to compute 1) an emphasis density score that indicates the level of emphasis a privacy policy places on GDPR dimensions, and 2) a privacy score that identifies the level of compliance of a privacy policy with GDPR. The compliance index is validated by assessing its effectiveness at the country level in comparison with an international publicly available data privacy benchmark.
Article
Full-text available
Recently, the relationship between emotional arousal and depression has been studied. Focusing on this relationship, we first developed an arousal level voice index (ALVI) to measure arousal levels using the Interactive Emotional Dyadic Motion Capture database. Then, we calculated ALVI from the voices of depressed patients from two hospitals (Ginza Taimei Clinic (H1) and National Defense Medical College hospital (H2)) and compared them with the severity of depression as measured by the Hamilton Rating Scale for Depression (HAM-D). Depending on the HAM-D score, the datasets were classified into a no depression (HAM-D < 8) and a depression group (HAM-D ≥ 8) for each hospital. A comparison of the mean ALVI between the groups was performed using the Wilcoxon rank-sum test and a significant difference at the level of 10% (p = 0.094) at H1 and 1% (p = 0.0038) at H2 was determined. The area under the curve (AUC) of the receiver operating characteristic was 0.66 when categorizing between the two groups for H1, and the AUC for H2 was 0.70. The relationship between arousal level and depression severity was indirectly suggested via the ALVI.
Article
Full-text available
The detection of cry sounds is generally an important pre-processing step for various applications involving cry analysis such as diagnostic systems, electronic monitoring systems, emotion detection, and robotics for baby caregivers. Given its complexity, an automatic cry segmentation system is a rather challenging topic. In this paper, a framework for automatic cry sound segmentation for application in a cry-based diagnostic system has been proposed. The contribution of various additional time- and frequency-domain features to increase the robustness of a Gaussian mixture model/hidden Markov model (GMM/HMM)-based cry segmentation system in noisy environments is studied. A fully automated segmentation algorithm to extract cry sound components, namely, audible expiration and inspiration, is introduced and is grounded on two approaches: statistical analysis based on GMMs or HMMs classifiers and a post-processing method based on intensity, zero crossing rate, and fundamental frequency feature extraction. The main focus of this paper is to extend the systems developed in previous works to include a post-processing stage with a set of corrective and enhancing tools to improve the classification performance. This full approach allows to precisely determine the start and end points of the expiratory and inspiratory components of a cry signal, EXP and INSV, respectively, in any given sound signal. Experimental results have indicated the effectiveness of the proposed solution. EXP and INSV detection rates of approximately 94.29% and 92.16%, respectively, were achieved by applying a tenfold cross-validation technique to avoid over-fitting.
Article
Full-text available
This study was carried out on a sample of 224 farms in the southern region of Sétif-Algeria, aimed to identify the different typologies and the agricultural changes caused by the climatic constrains experienced in recent decades. Indeed, the combined effect of climatic and anthropogenic factors on agricultural practices transitions is too tangled. A series of multivariate and classification statistical tests have been implemented to demonstrate the main trends and adaptation tactics of farmers in such conditions. The farming characterization analysis showed that the medium scale farming was more economically efficient than small and large scale farming. Moreover, the study showed the effect of climate change on some farming transitions, where farming practices transited to bovine and poultry farming as well as for market gardening cultivation. Indeed, these changes were occurred at the expense of rainfed agriculture (cereals) and ovine breeding. These transitions have impacted the economic performance of farms in some municipalities. However, greenhouse crops and tobacco cultivation were observed as being a Local Production Systems (LPS) that could be a good alternative to mitigate the natural and socioeconomic constraints. The emergence of Local Production Systems in agricultural system may facilitate farmer adaptation that will provide a tool for agricultural development policies, through financial and technical assistance. Key words: Climate change, Farming, Local Production Systems, Sétif
Article
Full-text available
Resumo — O uso de ferramentas computacionais pela comunidade médica pode ser um importante aliado em processos de aprendizado e treinamento. Sistemas baseados em Realidade Virtual (RV) permitem recriar situações que facilitam o processo de entendimento de estruturas anatômicas e sua fisiologia. Porém, os frameworks que geram essas aplicações podem apresentar uma série de fatores que distanciam o usuário deste tipo de ferramenta. Neste trabalho serão analisadas algumas necessidades quanto ao uso de ferramentas baseadas em RV pela comunidade médica bem como ferramentas desenvolvidas para o desenvolvimento de aplicações com RV. A partir de uma proposta de Sistema de Programação Visual (SPV) para frameworks de RV é apresentado o processo de migração de um framework para posterior uso em testes de um SPV. Abstract — The use of computational tools in the medical community can be important to processes of learning and training. Systems based on VR allow to design scenarios that can facilitate the comprehension of anatomical structures and human physiology. However, frameworks that generate these applications can present a number of factors that separate the user of these kind of tool. This paper will present an analysis of computer tools needs from medical professionals as well as tools developed to the development of VR systems. Thus, is presented the migration of a framework to support a propose of a visual programming system (VPS).
Chapter
Full-text available
In speech analysis, the voiced-unvoiced decision is usually performed in extracting the information from the speech signals. In this paper, two methods are performed to separate the voiced and unvoiced parts of the speech signals. These are zero crossing rate (ZCR) and energy. In here, we evaluated the results by dividing the speech sample into some segments and used the zero crossing rate and energy calculations to separate the voiced and unvoiced parts of speech. The results suggest that zero crossing rates are low for voiced part and high for unvoiced part where as the energy is high for voiced part and low for unvoiced part. Therefore, these methods are proved effective in separation of voiced and unvoiced speech.
Conference Paper
Full-text available
The extent of the information systems success is based on various determinants including the organizational politics. This area wasn't discussed deeply by researchers. Thus a comprehensive understanding of information systems remains fuzzy and elusive in this area. In an attempt to address this situation a comprehensive model was developed. Although this model is not empirically tested, it tries to explain the impact of organizational politics forms (avoiding, competing, accommodating, compromising, and collaborative) on the information systems success dimensions (system quality, information quality, service quality, use, user satisfaction, and net benefits).
Article
This paper describes a low-cost single-chip PI-type fuzzy logic controller design and an application on a permanent magnet dc motor drive. The presented controller application calculates the duty cycle of the PWM chopper drive and can be used to dc–dc converters as well. The self-tuning capability makes the controller robust and all the tasks are carried out by a single chip reducing the cost of the system and so program code optimization is achieved. A simple, but effective algorithm is developed to calculate numerical values instead of linguistic rules. In this way, external memory usage is eliminated. The contribution of this paper is to present the feasibility of a high-performance non-linear fuzzy logic controller which can be implemented by using a general purpose microcontroller without modified fuzzy methods. The developed fuzzy logic controller was simulated in MATLAB/SIMULINK. The theoretical and experimental results indicate that the implemented fuzzy logic controller has a high performance for real-time control over a wide range of operating conditions.
Conference Paper
This paper describes an application of a geographical information system with visualized and sonification lunar remote sensing data provided by Japan's lunar explorer (SELENE "KAGUYA"). Web based GIS is a very powerful tool which lunar scientists can use to visualize and access remote sensing data with other geospatial information. We discuss enhancement of the pseudo-colored visual map presentation of lunar topographical altimetry data derived from LALT and the map of the data to several sound parameters (Interval, harmony, and tempo). This paper describes an overview of this GIS with a sonification system, called "Moonbell".
Conference Paper
The recent trend toward virtualized computing both as a means of server consolidation and as a powerful desktop computing tool has lead into a wide variety of studies into the performance of hypervisor products. This study has investigated the scalability of VMware Workstation 6 on the desktop platform. We present comparative performance results for the concurrent execution of a number of virtual machines. A through statistical analysis of the performance results highlights the performance trends of different numbers of concurrent virtual machines and concludes that VMware workstation can scale in certain contexts. We find that there are different performance benefits dependant on the application and that memory intensive applications perform less effectively than those applications which are IO intensive. We also find that running concurrent virtual machines offers a significant performance decrease, but that the drop thereafter is less significant.
Conference Paper
This paper investigates the penalty function under the condition that the insurance company is allowed to invest certain amount of money in some stock market and the remaining reserve in the bond with constant interest force. Through the properties of exponential Lévy process and discrete embedded method, the integral equations for penalty function is derived under the assumption that the stock price follows exponential Lévy process. The method for explicitly computing the ruin quantities is obtained.
Conference Paper
Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.
Conference Paper
Many benefits of Building Information Modeling, BIM, have been suggested by several authors and by software vendors. In this paper we describe an experiment in which two groups of designers were observed developing an assigned design task. One of the groups used a BIM system, while the other used a standard computer-aided drafting system. The results show that some of the promises of BIM hold true, such as consistency maintenance and error avoidance in the design documentation process. Other promises such as changing the design process itself seemed also promising but they need more research to determine to greater extent the depth of such changes.
On Dijkstra's Algorithm for Deadlock Detection
  • Erki Eessaar
  • Rünno Sgirka
Erki Eessaar and Rünno Sgirka 66. On Dijkstra's Algorithm for Deadlock Detection................................................................................ 385 Youming Li et al.
Using Decision Structures for Policy Analysis in Software Product-line Evolution – A Case Study
  • Miguel C Ramirez
Miguel C. Ramirez et al. XV TABLE OF CONTENTS 97. Using Decision Structures for Policy Analysis in Software Product-line Evolution – A Case Study.................................................................................................................................................... 56