INTERNATIONAL JOURNAL of COMPUTERS
 




















 

ISSN: 1998-4308

 
 


Year 2007

All papers of the journal were peer reviewed by two independent reviewers. Acceptance was granted when both reviewers' recommendations were positive.

Main Page

    Paper Title, Authors, Abstract (Issue 1, Volume 1, 2007)

Pages

An Effective Solution for Matrix Parenthesization Problem through Parallelisation
Muhammad Hafeez, Muhammad Younus

Abstract: Dynamic programming can be used to solve the optimization problem of optimal matrix parenthesization problem, which is discussed in detail in the paper. The results and their analysis reveal that there is considerable amount of time reduction compared with simple left to right multiplication, on applying the matrix parenthesization algorithm. Time reduction varies from 0% to 96%, proportional to the number of matrices and the sequence of dimensions. It is also learnt that on applying parallel matrix parenthesization algorithm, time is reduced proportional to the number of processors at the start, however, after some increase, adding more processors does not yield any more throughput but only increases the overhead and cost. Foremost improvement of the parallel algorithm used is its independency on the number of matrices. Moreover, work has been uniformly distributed between processors, besides its confirmation to single processor algorithm results.
 

1-9

A Logic for Automatic Verification of Cryptographic Protocols
Jihong Han, Zhiyong Zhou, Yadi Wang

Abstract: In this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be presented through back-tracing. The method has been implemented in an automatic verifier, many examples of protocols have been analyzed in less then 1s.
 

10-14

        Paper Title, Authors, Abstract (Issue 2, Volume 1, 2007)

Pages

A study on the Knowledge Sharing of Health Technology for Technological College Students? Mobile Learning
Chin-Mou Cheng, Li-Jung Chen

Abstract: The knowledge sharing of technology innovation on mobile learning is the main developmental force in the 21st century knowledge-based economy. In the new era of mobile society and information explosion, for college students who are receiving different kinds of information how to quickly learn and absorb different kinds of information to become their own knowledge and share it with friends are an important challenge. This study is aimed at the factors of students? knowledge sharing of health technology in technological and professional colleges, validating a scale to measure the current situation for students?knowledge sharing of health technology and to test some models for constructing students? knowledge sharing of health technology. To achieve this goal, the following methods were adopted: literature review, Delphi survey, professional interview and sampling questionnaire survey (3,012 students from 16 technological and professional colleges in Taiwan) to examine the students? knowledge sharing of health technology. The results showed that the students? knowledge sharing of health technology consisted of behavior norm, sharing attitude, sharing intention, sharing behavior and sharing control in terms of the theory of planning behavior (TPB). The models of students? knowledge sharing of health technology were tested with good fit through structural equation modeling (SEM). Since the path correlation of model was based on TPB, the following hypotheses concerning the students? knowledge sharing behavior were supported: sharing attitude toward sharing intention, behavioral norm toward sharing intention, behavioral control toward sharing intention, sharing intention toward sharing behavior, and behavioral control toward sharing behavior, which all had positive effects. Finally, conclusions and suggestions were proposed for all forms of teaching, such as embedded teaching in health technological literacy, the methods of research and statistics, the policy of promoting students to the holistic health, and further research including a bridge building between the technological and professional colleges and industries for teachers and practitioners, then constructing a significant wireless connectivity of knowledge sharing with hardware and software of mobile learning in health technology should be considered.
 

15-20

Land-Cover Classification on Computational Grids
Dana Petcu, Silviu Panica, Andrei Eckstein

Abstract: Satellite image processing is a very demanding procedure in terms of data manipulation and computing power. Grid computing is a possible solution when the required computing performance or data sharing is not available at the user?s site. The paper discusses a possible scenario of using Computational Grids. According to this scenario a prototype code for satellite image classification was designed, implemented and tested in two different virtual organizations. The approach can be applied also to other image processing procedures.
 

21-26

        Paper Title, Authors, Abstract (Issue 3, Volume 1, 2007)

Pages

Knowledge-Based Repair for Knowledge-Lean Techniques in Non-Routine Design
Michael A. Rosenman and Nicholas Preema

Abstract: This paper presents a methodology for producing good design solutions more efficiently. The methodology is based on augmenting a conventional evolutionary design approach with a method for improving suboptimal design solutions with a domainspecific knowledge-rich approach. This approach is based conceptually on the practice of plastic surgery, i.e. making minor adjustments to an entity, based on some desired qualities, i.e. specfied fitness function. Additionally, the modifications made to the phenotype may require the re-engineering of the genotype to accord with the modified phenotype if the entity is to be used further in evolutionary operations. A method for genotype re-engineering is proposed in the domain of cellular growth generation.
 

27-33

The Algorithm and a Case Study for CTL Model Update
Laura Florentina Cacovean, Cristina Ioana Brumar, Emil Marin Popa

Abstract: In this paper is presented an update of the CTL model checker. The minimal modifications which appear represent the fundamental concept for model the dynamic system. In the paper used five primitive operations discompose from the operation of a CTL update used already by [1] which presented their approach of knowledge update the structures of single agent S5 Kripke. Then is willed defined the criteria of minimum change for the update of CTL model based on these primitive operations. The final in this section paper is willed present the algorithm of implement the CTL model updated and is will describe some details of algorithm implementation by applying the model update to the microwave oven scenario. The paper [10] is the base of results obtained.
 

34-40

Software Measurement Standard Etalons: A Design Process
Adel Khelifi and Alain Abran

Abstract: Material measurement standard etalons are widely recognized as critical for accurate measurements in sciences and engineering. However, there is no measurement standard etalons yet in software engineering. The absence of such concept in software measurement can have a negative impact on software engineers and managers when they using measurement results in decision-making. Software measurement standards etalons would help verify measurement results and they should be included within the design of every software measure proposed. Since the process for establishing standard etalons for software measures has not yet been investigated, this paper tackles this issue and proposes a seven steps design process. A case study of this design process of a software measurement standard etalon is presented using ISO 19761: COSMIC-FFP.
 

41-48

A Web 2.0 Tag Recommendation Algorithm Using Hybrid ANN Semantic Structures
Sigma On Kee Lee and Andy Hon Wai Chun

Abstract: This paper presents a novel approach to automatic tag recommendation for weblogs/blogs. It makes use of collective intelligence extracted from Web 2.0 collaborative tagging as well as word semantics to learn how to predict the best set of tags to use, using a hybrid artificial neural network (ANN). Web 2.0 represents the “second generation” of Web applications with new technologies that allow people to work, collaborate and share knowledge in innovative manners. An important characteristic of Web 2.0 is that it embraces the power of the web to harness collective intelligence of its users. In particular, the rise of blogging is one of the most highly touted phenomena of the Web 2.0 era. Weblog or blog is an important innovation that makes it easy to publish information, engage discussion and form communities on the Internet. The use of “tags” has recently become very popular as a mean of annotating and organizing everything on the web, from photos, videos and music to blogs. The use of tags has originally produced a “folksonomy”, a system in which the meaning of a tag is determined by its use among the community as a whole. Unfortunately, tagging is a manual process and limited to the users’ own knowledge and experience. A blog author might not be aware that there may be more accurate or popular tags to describe his/her content. Collaborative tagging use collective intelligence by observing how different users tag similar content. Our ANN-based algorithm learns this collective intelligence and then reuses it to automatically generate tag suggestions for blog authors based on the semantic content of blog entries.
 

49-58

Processing Authentication Based on Grid Environment
Tsang-Yean Lee, Huey-Ming Lee, Jin-Shieh Su, and Heng-Sheng Chen

Abstract: In this study, we propose the encryption algorithm to produce authenticator. The grid nodes are divided to supervisor and execute grid nodes. We use this authenticator to create execute user information data base in execute grid node and remote user information data base in supervisor grid node. We use the authenticator to run authentication application. When these authentication applications install in all grid nodes, we can run the system more secure.
 

59-63

A Fuzzy Assessment Model for Evaluating the Rate of Aggregative Risk in Software Development
Lily Lin and Huey-Ming Lee

Abstract: In this study, we present a fuzzy assessment model to tackle the rate of aggregative risk in fuzzy circumstances by fuzzy sets theory during any phase of the software development life cycle. Because the proposed assessment method directly uses the fuzzy numbers rather than the linguistic values to evaluate, it can be executed faster than before. The proposed fuzzy assessment method is easier, closer to evaluator real thinking and more useful than the ones they have presented before.
 

64-68

Mathematical Morphology Methodology for Extraction of Vehicle Number Plates
Humayun K. Sulehria, Ye Zhang, Danish Irfan

Abstract: This paper presents a methodology for extraction of the vehicle number plates from the vehicle images using hybrid mathematical morphology techniques. The main idea is to use different morphological operations in such a way so that the number plate of the vehicle can be identified precisely. The methodology makes the task of extraction of the number plate independent of color, size and location of number plate. The proposed approach involves five different processes, these are, image enhancement, morphing transformation, morphological gradient, combination of resultant images and extracting the number plate from the objects that are left in the image. This algorithm can quickly and correctly detect the number plate area from the vehicle image. Some vehicle number plate norms are also presented in this paper.
 

69-73

The Promise and Limitations of Service Oriented Architecture
Zaigham Mahmood

Abstract: In today’s markets, business enterprises are required to deliver improved functionality and provide on-demand services, while leveraging existing IT infrastructure and investment. They are expected to be agile and dynamic. It is the globalization, tighter economies, business process outsourcing and ever increasing regulatory environments that are forcing businesses to transform the way they provide their business and services. In this context, Service Oriented Architecture (SOA) is proving to be an attractive approach that promises better alignment of IT with business vision, more effective reuse, better interoperability, reduced costs of development and more efficient operation of business applications. However, like any other approach, it has its limitations and inherent issues. This paper introduces the SOA paradigm, presents the benefits it offers and discusses the inherent limitations and challenges. The objective is to provide enough background information so that enterprises, wishing to embark on the road to SOA, have a better understanding of this approach.
 

74-78

Concurrent Auditory Stream Discrimination in Auditory Graphing
Hong Jun Song and Kirsty Beilharz

Abstract: This paper is concerned with enhancing human computer interaction and communication in concurrent streams of auditory display. Auditory display or auditory graphing is the sonic representation of numerical data (the auditory equivalent of visualization). It provides an additional channel for information representation, in which a participant’s response may be more intuitive and immediate than (visual) graphical display, but auditory graph design requires understanding and multi-disciplinary investigation of listening due to instantaneous characteristics of sound. Our aims are to explore (1) the impact of spatial separation for a divided attention task and (2) the efficiency of timbre (tone color) to assist pitch contour identification. Our findings about timbral and spatial discrimination are scalable and useful for auditory display in a wide variety of contexts. The results provide empirical evidence for a further investigation of spatialization and timbre and contribute to applications within an auditory display context for real-world scenarios (e.g. social, statistical and other datasets likely to be encountered in the workplace).
 

79-87

Digital Management of Trust for Component Software
Zheng Yan and Valtteri Niemi

Abstract: Trust plays an important role in a software system, especially when the system is component based and varies due to component joining and leaving. How to manage trust in such a system is crucial for an embedded device, such as a mobile phone. This article introduces a trustworthy middleware architecture that can digitally manage trust in an autonomic way through adopting a number of algorithms for trust prediction, assessment and maintenance with regard to software component download and execution.
 

88-94

An Efficient Model Checking Using Check-Points Extraction Method
Chikatoshi Yamada, Yasunori Nakaga and Mototsune Nakahodo

Abstract: Recently, model checking has played an important role in design of embedded systems, complex systems, and other critical systems. However, it is inefficiency to verify the entire systems. This article considers the case where designers of systems can extract check-points easily in model checking of formal verification. Moreover, we propose a method by which temporal formulas can be obtained inductively for specifications in model checking. Finally, we demonstrate verification results for some arbitration modules by NuSMV model checking tool.
 

95-101

A General Ontology for Intelligent Database
Muñoz Ana and Aguilar Jose

Abstract: The intelligent Databases (IDB) are originated from the integration of databases technologies with artificial intelligence technologies. The IDB are characterized by the presence of stored rules in a rules base and facts stored in a facts base, all together conforms the knowledge base, in which different forms of reasoning are applied. In general, an ontology is a knowledge base that describes the concepts of a domain, their properties and their relations, providing a common vocabulary in a defined area. This article proposes an ontology for IDB that describes the concepts, operations and restrictions of these databases. Also, at the end of this paper we present an utilization example and its implementation using Protégé.
 

102-108

The Design, Implementation and Application of the Software Framework for Distributed Computing
Kin-Yeung Wong, Yin-Man Choi, and Seng-Wa Lam

Abstract: A distributed computing application uses multiple networked computers to work together to accomplish a big task. It can be used to solve calculation-intensive problems such as weather forecasting and astronomical analyzing. There are many common tasks among different kinds of applications. To reduce the development cycle, the goal of this paper is to design and implement an API for constructing distributed applications. In this paper, the core functions of the API are discussed, and real applications written by the API are demonstrated.
 

109-116

Fuzzy Ontology Based System for Product Management and Recommendation
James N.K. Liu

Abstract: Systems that are integrated with recommendation features to support decision processes can provide a more personalized and proactive retrieval experience for users to choose among retrieval alternatives and subsequent refinement of choices. Many real-world systems call for autonomous intelligent agents acting in the face of uncertain knowledge and limited computational resources. This paper explores the development of an intelligent system for book recommendation and retrieval. We focus on content management and the use of a broader range of search and retrieval tools including artificial intelligence, mobile intelligent agents, and fuzzy ontology, personal profile. The use of mobile agent technology provides a specific solution for overcoming the problem of being overloaded with too much information. The use of fuzzy ontology helps determine the association of concepts and relationships that can exist within an agent or a community of agents. The use of personal profile created by fuzzy ontology map helps reduce the search time. It facilitates search facilities suitable for comparing, evaluating and classifying the webagents behavior. The fuzzy decision-making is based on the interest level generated from user preferences, product feature selection and possible system recommendation. The simulation testing shows promising results.
 

117-124

A Secure Password Authentication Protocol for Wireless Networks
Y.-C. Lee, Y.-C. Hsieh and P.-S. You

Abstract: Wireless communication is widely used today. It transmits information through open networks such that it always suffers by a variety of attacks. In 2006, Yoon et al. proposed a secure password authentication protocol for wireless networks to fix drawbacks of Ma et al.’s protocol. In this article, we will show that the Yoon et al.’s protocol is vulnerable to both off-line password guessing attack and replay attack. We will present a new improved protocol to fix the flaws. As shown, the improved protocol is secure while the computation cost is quite low.
 

125-128

A Novel Lossy and Lossless Image Compression System with Multilevel Scalability
F. A. Perez, P. M. Iriondo, D. Orive, I. Calvo

Abstract: This article presents an image compression system with multilevel scalability capacity based on the Reversible Wavelet Transform (RWT). Two types of scaling methods are discussed: Spatial scaling and Fine Grain Scalability (FGS). The presented approach uses the same algorithm (based on a finite arithmetic reversible transform) for both lossy and lossless compression. The codification method, based on a methodology presented in previous works (CETRO), generates an embedded binary stream highly scalable which may be adapted to a specific size by using truncation. Also a component rearrangement mechanism which introduces a substantial improvement over the truncation mechanism is used. This mechanism allows consistent scaling from both analytical and perceptual points of view. Finally, the scaling mechanism allows a FGS compression without using a decoder in the encoding stage.
 

129-134

Enterprise Application Integration based on Service Oriented Architecture
Zaigham Mahmood

Abstract: Enterprises have invested heavily in large-scale applications software to run their services and business functions. The infrastructure used is often heterogeneous across a number of platforms, operating systems and languages and, thus, there is a huge duplication of functionality and services resulting in a waste of valuable resources and poor response times. Increasingly, the business and IT managers are being asked to deliver improved functionality while leveraging existing IT investment as well as provide flexibility and on-demand services. In this context, Service Oriented Architecture (SOA) is emerging as an attractive architectural style for developing and integrating enterprise applications. SOA promises a better alignment of IT with business, seamless integration of business applications and reduced costs of development and maintenance. Evidence suggests that large enterprises are moving towards this new paradigm. In this paper, we introduce the SOA approach, present the benefits and challenges it offers and provide guidance with respect to enterprise application integration and implementation. The objective is to provide some useful background information for enterprises that wish to embark on the road to application integration via the SOA.
 

135-139

Application Study in Decision Support with Fuzzy Cognitive Map
He Yue, Guo Yue, Guo Yi

Abstract: Fuzzy cognitive map is an approach to knowledge representation and inference; it emphasizes the connections of concepts as basic units for storing knowledge, and the structure that represents the significance of system. One of the most useful aspects of the FCM is its prediction capability as a prediction tool. Little research has been done on the goal-oriented analysis with FCM. In this paper, we propose a methodology for decision support, the method uses immune algorithm to find the initial state of system in given goal state. The proposed algorithm takes the error objective function and constraints as antigen, through genetic evolution, an antibody that most fits the antigen becomes the solution. Finally, an illustrative example is provided, and its results suggest that the method is capable of goal-oriented decision support.
 

140-144

Voice Recognition Browser for the Visually Impaired Learners (Mg Sys VISI)
Halmah Badioze Zaman, David Kennedy, Choo W.O., Azlina Ahmad and Aidanismah Yahya

Abstract: Learning through the use of web technology or web based learning has become an important media in the education revolution of the 21st century. The Internet particularly, has become an important tool for learners to acquire information and knowledge that encompasses various elements such as text, graphic, numeric, and animation for their learning process. Learners soon learn that the links in the Internet can lead them to various web pages that can lead them to more information that have a link with one another or to other information that has no link at all with the previous information. However, the visually impaired learners who actually represent a substantial proportion of the world’s population living in certain parts of the world have no access at all to this tool nor can it be easily taught to them as they are not able to see the links in the web pages. There is a need to democratize education as this is the basic human right and a way to achieve world peace. This paper hopes to highlight the Mg Sys VISI system to enable the visually impaired learners experience the world of the Internet, which comprises of five modules: Automatic Speech Recognition (ASR), Text-to-Speech (TTS), Search engine, Print (Text-Braille) and Translation (Braille-to -Text) module. Initial testing of the system indicates very positive results.
 

145-150

Error Order of Magnitude for Modeling Autocorrelation Function of Interarrival Times of Network Traffic Using Fractional Gaussian Noise
Ming Li

Abstract: Fractional Gaussian noise (FGN) is a commonly used model of computer network traffic time series with long-range dependence (LRD). It has been realized that FGN may not be enough to accurately model real traffic. However, quantitative evidence about this is seldom reported. To this end, this paper gives quantitative descriptions, based on processing real traffic, on the error order of magnitude for modeling autocorrelation functions of interarrival times of four types of traffic, namely, TCP, UDP, IP, OTHER, using FGN. The present results exhibit that modeling accuracy, which is expressed by mean square error, by using FGN is usually in the order of magnitude of 10−3. The main reason to cause error by using FGN model is that FGN might not satisfactorily fit the short-term lags of real traffic.
 

151-156

UCSMdess: Ubiquitous Computing Service Model based on D-S Evidence Theory and Extended SPKI/SDSI
Daoqing Sun, Yishu Luo, and Qiying Cao

Abstract: Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service sorts and levels, the security delegation of services, the simple privacy protection of principal and the trust computing etc are all these unsolved problems. In this paper, UCSMdess, a new novel ubiquitous computing service model based on D-S Evidence Theory and extended SPKI/SDSI is presented. D-S Evidence Theory is used in UCSMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCSMdess to solve above problems in the ubiquitous computing environments. The service model with the algorithm of certificate reduction is then given in the paper.
 

157-162

Sufficient Condition for Min-Plus Deconvolution to Be Closed in the Service-Curve Set in Computer Networks
Ming Li and Wei Zhao

Abstract: This paper studies the inverse of min-plus convolution, i.e., min-plus deconvolution, in the set of non-negative, wide-sense increasing and causal functions. A sufficient condition for min-plus deconvolution to be closed in this set of functions is presented. Possible application of min-plus deconvolution to the service curve design is discussed.
 

163-166

An Algorithm for Mining Strong Negative Fuzzy Sequential Patterns
Nancy P. Lin, Wei-Hua Hao, Hung-Jen Chen, Chung-I Chang, Hao-En Chueh

Abstract: Many methods have been proposed for mining fuzzy sequential patterns. However, most of conventional methods only consider the occurrences of fuzzy itemsets in sequences. The fuzzy sequential patterns discovered by these methods are called as positive fuzzy sequential patterns. In practice, the absences of frequent fuzzy itemsets in sequences may imply significant information. We call a fuzzy sequential pattern as a negative fuzzy sequential pattern, if it also expresses the absences of fuzzy itemsets in a sequence. In this paper, we proposed a method for mining negative fuzzy sequential patterns, called NFSPM. In our method, the absences of fuzzy itemsets are also considered. Besides, only sequences with high degree of interestingness can be selected as negative fuzzy sequential patterns. An example was taken to illustrate the process of the algorithm NFSPM. The result showed that our algorithm could prune a lot of redundant candidates, and could extract meaningful fuzzy sequential patterns from a large number of frequent sequences.
 

167-172

    Paper Title, Authors, Abstract (Issue 4, Volume 1, 2007)

Pages

A Principle of a Data Synthesizer for Performance Test of Anti-DDOS Flood Attacks
Ming Li and Wei Zhao

Abstract: Distributed denial-of-service (DDOS) flood attacks remain a big issue in network security. Real events of DDOS flood attacks show that an attacked site (e.g., server) usually may not be overwhelmed immediately at the moment attack packets arrive at that site but sometime late. Therefore, a site has a performance to resist DDOS flood attacks. To test such a performance, data synthesizer is desired. This paper introduces a principle to synthesize packet series according to a given value of the Hurst parameter for performance test of anti-DDOS flood attacks.
 

173-176

Approximation Scheme for RNA Structure Prediction Based on Stacking
A. Hengwu Li

Abstract: Pseudoknotted RNA secondary structure prediction is an important problem in computational biology. Existing polynomial time algorithms have no performance guarantee or can handle only limited types of pseudoknots. In this paper for the general problem of pseudoknotted RNA secondary structure prediction, a polynomial time approximation scheme is presented to predict pseudoknotted RNA secondary structure by dynamic programming and branch-bound based on base pair stacking. Compared with existing polynomial time algorithm, it has exact approximation performance and can predict arbitrary pseudoknots.
 

177-179

Fair NURBS Curve Generation and Determination based on a Hand-drawn Sketch
Akira Yamaguchi and Tetsuzo Kuragano

Abstract: Image processing techniques are used to detect the edges of a hand-drawn sketch. Generally, various types of gradation are expressed in the background of a hand-drawn sketch. Therefore, the original image is transformed into a logarithmic image. The entire image has to be binarized for edge detection. To smooth the edge of the binary image, feature based erosion and dilation is applied. A Laplacian operation is applied to the binary image to detect the edge in the binary image. This edge position corresponds to the position of the line in the hand-drawn sketch image. Line segments which represent the detected edges are generated. Using the positions and gradients on the line segments, a NURBS curve is generated. The shape of the NURBS curve extracted from the sketch image is examined by the designer visually. The shape of this NURBS curve generally coincides with the intention of the designer, but does not coincide precisely. Therefore, a curve shape modification method based on the specified radius of curvature is applied. The sum of the squared differences between the radius of curvature of a curve and the specified radius of curvature of an entire curve is linearlized by Taylor’s theorem, then minimized. The specification of radius of curvature is performed by selecting a predefined fair NURBS curve using the similarity of radius of curvature distribution. Examples of NURBS curve generation based on a hand-drawn sketch are given according to the generation process.
 

180-188

Design and Implementation of a DVB-H IP Decapsulator
Wen-Tzeng Huang, Sun-Yen Tan, Chin-Hsing Chen, and Ren-Guey Lee

Abstract: The digital video broadcasting-handheld (DVB-H) standard determined by the European Telecommunications Standard Institute is based on the terrestrial broadcast system DVB-Terrestrial (DVB-T), which has allowed digital video to be incorporated into handheld device applications. DVB-H also makes coded orthogonal frequency division multiplexing, time slicing, and multi-protocol encapsulation-forward error correction (MPE-FEC) compatible with the existing broadcasting standard. We describe a DVB-H Internet Protocol (IP) decapsulator that can achieve time slicing and MPE, as well as cross platform compatibility, and is highly adaptable. Power consumption is always an issue in handheld devices, and time slicing effectively reduces the most serious DVB-H demodulator power consumption problems. The DVB-H protocol uses MPE to deliver information, and unlike other DVB protocols, the video and sound data of DVB-H are not packed directly into the MPEG-2 transport stream. Instead, they are packed into the IP datagram, MPE is performed, and then the data are delivered via the MPEG-2 transport stream. In this way, DVB-H is backward-compatible with DVB-T. We implemented the DVB-H IP decapsulator using pure Java language, which enables it to function across platforms. We specified a platform-adaptive layer to reduce the drive complexity between the Java virtual machine and the demodulator. Because DVB-H has a built-in IP decapsulator transport stream dispatcher module, it independently creates program-specific information and service information subdecoders. Therefore, the packet that recognizes the decoders can be obtained from the transport stream dispatcher while the registration of that specific packet is completed.
 

189-195

Discover Sequential Patterns in Incremental Database
Nancy P. Lin, Wei-Hua Hao, Hung-Jen Chen, Hao-En, and Chueh, Chung-I Chang

Abstract: The task of sequential pattern mining is to discover the complete set of sequential patterns in a given sequence database with minimum support threshold. But in practice, minimum support some time is defined afterward, or need to be adjusted to discover information that interest to knowledge workers. In the same time, the problem of discover sequential patterns in a incremental database is an essential issue in real world practice of datamining. This paper discusses the issue of maintaining discovered sequential patterns when some information is appended to a sequence database. Many previous works based on Apriori-like approaches are not capable to do so without re-running previously presented algorithms on the whole updated database. We propose a novel algorithm, called DSPID, which takes full advantage of the information obtained from previous mining results to cut down the cost of finding new sequential patterns in an incremental database.
 

196-201

A Study on Protection Profile -- Illustration of ISAAPP
Kwo-Jean Farn, Shu-Kuo Lin, Jiann-Ming Hwang

Abstract: In order to reach the vision “information and communication network resources can be fully used in an obstacle free and secure environment by year 2008,” TTC (Telecommunication Technology Center), a Taiwan governmentfunded organization, has been granted the accreditation certificate by Taiwan Accreditation Foundation (TAF) on November 15, 2005. TTC will construct a Common Criteria Testing Laboratory (CCTL) and anticipate participating in the Common Criteria Recognition Arrangement (CCRA) in a few years. In this paper we briefly introduce the recent development of CCTL in Taiwan. Furthermore, based on the standard of the Security Audit and Alarms Framework (ISO/IEC 10181-7:1996), in this paper we intend to investigate the security functional and security assurance requirements; we also propose a draft Protection Profile (PP) of ISAAPP. The draft has been registered in the Chinese National Laboratory Accreditation (CNLA) as the security specification of relevant products and/ or systems.
 

202-209

Emergent Intelligence in Large Scale Multi-Agent Systems
George Rzevski, Petr Skobelev

Abstract: The paper describes a multi-agent system which is capable of achieving its goals under conditions of uncertainty and which exhibits emergent intelligent behaviour such as adaptation, learning and co-evolution with their environment. The intelligence of the scheduler emerges from the horizontal and vertical interaction of its constituent agents balancing their individual and group interests.
 

210-217

Alternative Middleware for Efficient XML Data Communications on Networks
Xu Huang, Dharmendra Sharma

Abstract: It is increasingly being used to transmit data on networks but is a verbose format and needs an efficient encoding to send relatively large amounts of data efficiently since XML became an official recommendation of the World Wide Web Consortium (W3C) in 1998. This requirement is particularly important, which is most for attractive to wireless data communications. It is a common technical challenge for researchers in XML-driven networks to have good performance. One may employ a middleware to enhance performance by minimizing the impact of transmission time [1, 3]. In this paper we extended our previous research results [2, 11-14] to an alternative middleware for efficient XML data communications on Networks. We also show the experimental results obtained from our technique and that from the Network Adaptable Middleware (NAM) established by Ghandeharizadeh et al [1]. Those experimental results show that our method is superior to the NAM method [1], which supported by the fact that the time taken is less than 231.67, which is ranging symmetrically out of the 0.6 standard deviation about the peck of the probability of the network traffic load distributions otherwise the NAM will be suggested between the region of 0.6 standard deviation.
 

218-222

A Study on the Development of Rules for Effective Code Inspection : Case Study of Company “A” Information System
Taewon Kyung and Sangkuk Kim

Abstract: Inspection is one of the most popular methods to develop high quality software. However, structured implementing method is not well defined, and so actual implementation of inspection is done in arbitral manner. In this research, eight categories and 30 indexes are defined to implement the Inspection in more structural way. Categories and indexes are developed based on the knowledge and guidelines of experienced developers and consulting companies. Suggested rules will clearly lead the programmers to avoid defects in advance or detect errors more easily by following the suggested rules in stricter manner. Proposed rules are also applied to real information case to test the effectiveness of the rules.
 

223-227

A Fuzzy Model for Quality Evaluation Processes
Edson Pacheco Paladini

Abstract: This paper describes an application of fuzzy set theory to real problems. These problems refer to concepts, policies, strategies and techniques of quality systems of industrial and services organizations. The paper focuses on the quality evaluation process used to verify if the quality level of productive processes, products, services and general resources (mainly human resources) are reaching better values. The parameters and criteria from the National Brazilian Quality Award are used as a reference. Basic concepts of fuzzy set theory were applied to these concepts and criteria. So it was possible to define a more adequate way to evaluate almost 40,000 organizations, which are submitted, annually, to the evaluation process to conquer the Award. The obtained results show the theoretical and practical adjustment of fuzzy sets to quality systems and quality evaluation processes.
 

228-233

Approximation Scheme for Pseudoknotted RNA Structure Prediction
A. Hengwu Li

Abstract: Pseudoknotted RNA structure prediction is an important problem in computational biology. Existing polynomial time algorithms have no performance guarantee or can handle only limited types of pseudoknots. In this paper for the general problem of pseudoknotted RNA structure prediction, a polynomial time approximation scheme is presented to predict pseudoknotted RNA secondary structure by dynamic programming and branch-bound based on base pair stacking. Compared with existing polynomial time algorithm, it has exact approximation performance and can predict arbitrary pseudoknots.
 

234-236

Resolution of the Clustering Problem using Genetic Algorithms
Jose Aguilar

Abstract: Clustering is the process of grouping objects together in such a way that the objects belonging to the same group are similar and those belonging to different groups are dissimilar. In this paper we propose a method to carry out data clustering using Genetic Algorithms. We use evolutionary characteristics to define a general data clustering procedure. In addition, we present examples of application of our approach: the definition of healthcare centers or new public universities for a given Country.
 

237-244

An Investigation and Survey on the Future Direction of OLE for Process Control (OPC)
M. H. Schwarz and J. Börcsök

Abstract: This paper summarizes the current situation in the development and research of OLE for Process Control (OPC). It details the different current standards and discusses the latest draft version which is the OPC unified architecture. This new standard tries to combine all different previous standards and does not distinguish between process values and events and other process data types. Therefore, one server is necessary and not one for each type as it is currently. Additionally, this papers describes current problems when using OPC, such as security issues when clients and servers are operating on different computers and it details the different strategies to implement redundancy structures into the OPC client- server architecture, which necessary in process control.
 

245-250

Real-time Simulation of Stone Skipping
Jooyoung Do, Namkyung Lee, Kwan Woo Ryu

Abstract: The stone skipping has been a popular pastime for thousands of years. In this paper, we propose a method for simulating motion of stone skipping with physically based modeling. From a physical point of view, stone skipping is a collision response of objects with water. In order to handle the collision reaction, we compute the force acting on the stone due to the water and calculate deformation of the water. We also show that our method performs well in applications where interactive performance is preferred to realism. The techniques presented can easily be extended to simulate other interactive dynamics systems.
 

251-254

System Dynamics Simulation: an Application to Regional Logistics Policy Making
Alberto De Marco, and Carlo Rafele

Abstract: The fast-pace development of trades with the Far East is giving the Mediterranean Sea the chance of becoming a major logistics hub. In the Mediterranean-front E.U. regions, public and private investments are aimed at this opportunity by integrating transportation networks, sea ports, and inland logistics platforms. With specific regard to the North-West of Italy, a model based on System Dynamics has been simulated to help decision and policy makers in the task of planning and directing the investment effort. The model provides impact analysis of freight traffic flow trends in the region on the medium and long-term, as a result of the interaction between exogenous variables and different case-scenarios for road and railroad infrastructure investments.
 

255-262

Evaluating the Readiness of E-Commerce Websites
Paul A. Walcott

Abstract: Many developing countries are formulating strategies intended to exploit the opportunities offered by e-commerce. One fundamental strategy which often seems to be ignored, or is unachievable by many small and medium-sized enterprises (SMEs) in developing countries is to ensure that they have a sophisticated ecommerce website. In this paper, the readiness of e-commerce websites in Barbados is determined by evaluating ninety-eight websites across eight service sectors using the CEC Website Evaluation Framework. The findings show that although these websites were easy to use and provided some product/service information they generally lack company information, innovation in services, transaction processing, and customer services. In addition, the banking sector had the highest ranking websites, followed by online shops, real estate, car rentals, tour operators, accommodation, restaurants and insurance. Based on these results, a set of recommendations have been proposed which are intended to promote the growth of e-commerce. A similar study should be conducted by any government, SME or stakeholder interested in evaluating the implementation phase of e-commerce in their country.
 

263-268

A New Approach for Multiple Element Binary Search in Database Applications
Ahmed Tarek

Abstract: Binary Search is fundamental to the study and analysis of Discrete Computational Structures. This is an efficient search strategy due to it’s logarithmic time complexity. It is used to identify the position of a key in a sorted list. Often, database applications require searching for two to more different key elements at the same execution. This is particularly true if the database includes structural layering, which is based on a particular index or a field. In this paper, a hybrid algorithm to perform binary search with 2 to m different keys (m is an integer greater than or equal to 2) in a sorted list structure is proposed. An m-key version of the proposed algorithm requires considering (2m+1) individual cases. Correctness proof of the algorithm is established using induction on the size of the list, n. Time complexity of the proposed algorithm is a function of 2 independent variables, m and n, which is, O(mlog(n)) in the worst, and also in the average cases. The best case complexity is linear on the number of the keys, which is O(m). Performance of the 2 and the 3-key versions is compared with the classical single key version. Possible key index combinations with the multi-key search strategies are explored for database applications. An extension of the algorithm known as the Multi-key Binary Insertion Search is also proposed. Applications of the proposed algorithms are considered together with a model employee database management program with improved efficiency.
 

269-279

Virtual Campus
Baki Koyuncu and Pınar Kocabaşoğlu

Abstract: A menu driven general purpose software package was developed to present a virtual university campus by using web based software techniques. 360 degree panoramic views are generated by image stitching and inclusion of hot spots. Virtual campus tour was formed with QuickTime movies and also in the web by using Adobe Dreamweaver. Visitors had the flexibility to start from anywhere in the campus and go to any destination by using keys on the keyboard.
 

280-284

Intensity Based Image Mosaicing
Vinod D.S., Akshatha R. Bhat, ShivaPrakash M., Vidyullatha Prakash and Shanmugam Kannan

Abstract: Image Mosaicing is useful in a variety of vision and computer graphics applications like 3 dimensional vision, photogrammetry, satellite imagery, video images etc. The basic reason for Image Mosaicing is that camera vision is limited to 50 by 35 degrees, and Human Vision is limited to 200 degrees. By using Image Mosaicing we can ideally have 360 by 180 degrees vision. The modified version algorithm for Image Mosaicing using EuclideanWarp and Bilinear Interpolation has been discussed. In order to overcome certain disadvantes of the this algorithm, the modified version of Intensity Based Image Mosaicing algorithm has been proposed. Through this algorithm seams that appear while stitching images are not eliminated. This algorithm works both for single viewpoint as well as multiple viewpoints. The implementation aspect of the algorithms are discussed along with test results. The merits and demerits of both the algorithms have been compared and analysed. We have used our own image data sets for experimenting.
 

285-290

A Simple Location-Based Service on Urban Area
Kin-Yeung Wong and Yiu-Man Choi

Abstract: A simple system providing location-based service is proposed in this paper. The major advantage of the system is that, unlike the similar services provided by mobile operators which typically use trilateration calculation to derive location from multiple based stations, our proposal relies on a location server to store the location information of subscribed users. Therefore, it can be easily implemented and maintained without the involvement of mobile network operators. Though this simple design is only able to provide an approximate user location, it can be used to learn places people visit in their everyday lives, making it suitable for tracking whereabouts of the users’ children, elderly, or the people they concern with.
 

291-295

Comparison of the Results of 2D and 3D Numerical Modeling of Flow over Spillway Chutes with Vertical Curvatures
Saeed-reza Sabbagh-yazdi, Fatemeh Rostami, Habib Rezaei-manizani, and Nikos E. Mastorakis

Abstract: For flow conduits with mild slope and considerably large vertical curvatures the hydrostatic distribution of the pressure may be used for design proposes. However, for the spillway chutes actual pressure load over the steep slope beds with small vertical curvatures may differ from the hydrostatic pressure values. The differences in pressure load on curved bed chutes are mainly because of the centrifugal forces. In present work, the results of a version of the NASIR 2D Finite Volume flow solver which solves depth average flow equations on variable steep slope bed, are compared with the results of the Flow3D Finite Volume solver, which utilizes the VOF technique for solution of water free surface location as well as a set of laboratory measurements for test cases reported in the literature. The main goal of present work is to investigate the division of the numerically computed flow parameters (such as water surface elevation and bottom pressure) by 2D and 3D computational models from the hydrostatic assumptions.
 

296-302

Research on Coordinate Degree Evaluation among Organizations of B2B EC based on the Model of Bayes Attribute Synthetic Evaluation
ShiBin Su, ZhenYu Liu

Abstract: In the era of network, Electronic Commerce (EC) has become the development mainstream of future business, and become one of major reasons for economic gaps between developed country and developing country. Therefore, to shorten economic gaps between developed country and developing country as quickly as possible, developing country must develop EC energetically by the situation of a country, especially EC of small-medium enterprises. But there still exist lots of problems in the coordination among organizations of B2B EC, which hinders the running of B2B EC smoothly. Therefore, the paper analyzes the impacting factors in the coordinate among organizations of B2B EC in details, and realizes the evaluation to the coordinate degree among organizations of B2B EC by introducing the model of attribute synthetic evaluation, then revises the model of attribute synthetic evaluation by Bayes theory, which makes the appraise results accord with facts much more, and provides quantitative gist for the coordinate among organizations of B2B EC. At last, the paper provides the lacks of research and future research orientations.
 

303-306

A General Simplification Algorithm
Boštjan Pivec, Vid Domiter

Abstract: In this article a new general algorithm for triangular mesh simplification is proposed. The algorithm extends Krivograd's work from 2D to 3D. For faster execution times a hash table is used. The main idea of the algorithm is based on vertex removal approach. With this approach we remove visually less important vertices. To determine their visual importance, all vertices have to be evaluated. This way models still preserve their essential characteristics. With simplification we can also easily present and transfer models over the network.
 

307-311

Building Dependable Software in Distributed Organizations: Bridging Workflow Gaps
D. Kumlander

Abstract: Dependable: reliable, secure, having high availability and safety, supporting continuous development concept of software development has become to be very important as an opposite to inconsistent faulty software customers are complaining about. Moving towards dependable software requires understanding of common problems occurring in nowadays software engineering business despite all modern approaches. Distributed organisations became quite a standard in software business and workflow gaps specific to distributed organisations are revised in this paper. Unwillingness to travel, communication gaps, lack of information and process monitoring – what are some of those problems. The paper proposes also some novel approaches to bridge those gaps.
 

312-315

How Not to Fail Running Personnel Motivating Projects
D. Kumlander

Abstract: The number of projects’ failures is permanently increasing despite all modern attempts to keep software projects functionality and progress under control. Agile software engineering, dependable software development and many others are targeted to solve those problems in different sectors. At the same time it is not possible without highly skilled and motivated personnel as people drive methodologies and define success of any project. Therefore it is important to develop employees into a team of highly professional, loyal and attached to the organisation people. Unfortunately the software industry is a highly technological sector with a shortness of personnel resources in many countries. Employees are often leaving companies despite all common motivating techniques. The paper discusses establishing special, so called motivating projects to address employees’ needs to develop themselves by learning something new that can be challenging for them. The motivating projects have special risks and the article outlines them and proposes some approaches to deal with those proactively.
 

316-320

Mandarin speech emotion recognition based on a hybrid of HMM/ANN
Xia Mao, Lijiang Chen, Bing Zhang

Abstract: Speech emotion recognition, as a vital part of affective human computer interaction, has become a new challenge to speech processing. In this paper, a hybrid of hidden Markov models (HMMs) and artificial neural network (ANN) has been proposed to classify emotions, combining advantage on capability to dynamic time warping of HMM and pattern recognition of ANN. Optimal state sequences, exported from HMMs, are normalized to be one of the inputs of ANN; hence different methods of state normalization are compared. Adopting Beihang University Database of Emotional Speech (BHUDES), comparison between isolated HMMs and hybrid of HMMs/ANN proves that the classifier introduced in this paper is more effective, and the average recognition rate of five emotion states has reached 83.9%.
 

321-324

An executable model for an Intelligent Vehicle Control System
Florin Stoica

Abstract: An abstract state machine (ASM) is a mathematical model of the system’s evolving, runtime state. ASMs can be used to faithfully capture the abstract structure and step-wise behaviour of any discrete systems. We present a machine-executable model for an Intelligent Vehicle Control System, implemented in the specification language AsmL. Executable specifications are descriptions of how software components work. The mathematical background for the intelligent control of vehicles is represented by the stochastic automata. A stochastic automaton can perform a finite number of actions in a random environment. When a specific action is performed, the environment responds by producing an environment output that is stochastically related to the action. This response may be favourable or unfavourable. The aim is to design an automata system that can learn the best possible action based on the data received from on-board sensors or from the localization system of highway infrastructure. The reinforcement scheme presented is shown to satisfy all necessary and sufficient conditions for absolute expediency in a stationary environment. Some simulation results are presented, which prove that our algorithm converges to a solution faster than the one given in [7].The proposed model is verified through simulation in SpecExplorer tool from Microsoft Research.
 

325-332


Copyrighted Material, www.naun.org  NAUN