Home > Archives > Latest issue

 

International Review on Computers and Software - July 2007 - Papers

 

   

 

 

International Review on Computers and Software - Papers

 

go to top    A Cohabitation Framework for AOSD Models
        by A. H. Hannousse, O. Kazar, D. Meslati, Z. Liu

 

Abstract - In fact, effective assessment of Aspect Oriented Software Development (AOSD) models has been a challenge since the arising of the first aspect-oriented programming languages in the past decade. This paper addresses the assessment problem of AOSD models by introducing a framework where more than one AOSD model can be used for the design and the implementation of the same software system. That proposal makes a possible cohabitation between the AOSD models. In the proposed framework, both Design Patterns and AOSD technologies are connected for achieving the design of software systems. Our idea consists of specifying the patterns satisfying system requirements then applying a software quality assessment process based on adapted object oriented metrics to identify the effective AOSD model for each required pattern. As a result of our model, a software system can be designed using more than one AOSD model which makes the resulting software system more re-usable.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Aspect Oriented Software Development, Assessment, Design Patterns, Software Process.

 


 

go to top    A Cooperative Framework for Intelligent Decision Support Systems

        by A. Adla, M. T. Laskri, J. L. Soubie

 

Abstract - Traditional Decision Support Systems (DSS) have been closed systems and are limited to the data and models contained within the system. In general, the type of support provided is relatively passive because decision makers are expected to scan internal and external data, and find discrepancies and deviations from expectations invoking ad hoc queries and reports that run on operational databases. By endowing the machine of additional capacities to intelligently guide the decision maker in its problem solving process, the system plays a collaborator’s role with the decision-maker.
We propose, in this paper, a Cooperative Framework for Intelligent Decision Support System. The framework embeds expert knowledge within the DSS to provide intelligent decision support, and implements the intelligent DSS using collaboration technologies. This implies a human decision-maker and an automated system sharing dynamically the tasks and jointly working towards a decision. We illustrate the applicability and relevance of this framework through a case study related to crisis management.
Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Decision Process, Decision Support Systems, Intelligent DSS, Cooperative DSS.

 


 

go to top    A Study of Token Based Algorithms for Distributed Mutual Exclusion
        by A. Swaroop, A. K. Singh

 

Abstract - The selection of a ‘good’ mutual exclusion algorithm, for the design of distributed systems, is of great importance. A number of mutual exclusion algorithms, with different techniques and varying performance characteristics, are available in the literature. These algorithms can be broadly classified into token based algorithms and non-token based algorithms. A number of survey papers for non-token based mutual exclusion algorithms exist. Although, some of them include discussion on token based mutual exclusion algorithms too, however, none of them include any discussion on the newer variants of classic mutual exclusion, like k-mutual exclusion and group mutual exclusion. The paper presents an exhaustive survey of the token based mutual exclusion algorithms. The variants of mutual exclusion problem, namely k-mutual exclusion and group mutual exclusion, have also been covered.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Algorithms, Group mutual exclusion, k-mutual exclusion, Mutual exclusion, Token.

 


 

go to top    A Robust Method for Fingerprint Matching Using Genetic Algorithm
        by M. R. Girgis, A. A. Sewisy, R. F. Mansour

 

Abstract - Fingerprint matching is one of the most important stages in automatic fingerprint identification systems (AFIS). Traditional methods treat this problem as point pattern matching, which is essentially an intractable problem due to the various nonlinear deformations commonly observed in fingerprint images. In this paper, we propose an effective and fast fingerprint matching algorithm based on graph matching principles. And applied genetic algorithms (GA), for matching processing which tries to find the optimal transformation between two different fingerprints. Experimental results demonstrate the robustness of our algorithm to non-linear.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Genetic Algorithm; Fingerprint matching; Fitness value; Graph minutiae; Optimization.

 


 

go to top    Design of a Fuzzy Controller for pH Using Genetic Algorithm

        by D. Mokeddem, A. Khellaf

 

Abstract - The control of pH is important in the chemical industry, poses a difficult problem because of inherent nonlinearities and frequently changing process dynamics. The work described in this paper aims at exploring a technique for producing adaptive fuzzy logic controller (FLC), in which a genetic (GA) is employed to alter membership functions. GA is an adaptive search technique based on natural selection and genetics rules. An adaptive GA-FLC scheme is presented for control of the pH process, the objective is to drive the pH of the solution to the desired set point in the shortest time by adjusting the valves on the two control input streams.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Genetic Algorithms, Fuzzy logic, Process control, Nonlinear control, pH.

 


 

go to top    New Traveling Salesman Problem Approximation Algorithm

        by H. F. Kendela, M. A. Al-Ahmar, E.-S. M. El Horbaty

 

Abstract - The travelling salesman problem (TSP) has been studied by many researchers and a great variety of heuristics and implementations with varying solution quality/running time tradeoffs have been proposed. In this paper, we introduce a heuristic algorithm that uses nearest neighbour heuristic first to find an initial tour and then uses a local search component to improve the quality of the solution. The implementation of our algorithm is given. The local search consists of utilizing a combination of brute force and 2-Optimal techniques on small parts of the tour. The results of our implementation are compared with corresponding results using nearest insertion heuristic on the same instances. The effectiveness of our algorithm derives from the improved tour quality achieved with reasonable running times.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: 2-Optimal Algorithm, Heuristic Algorithm, Insertion Algorithm, Nearest Neighbour, Travelling Salesman Problem (TSP).

 


 

go to top    Algorithmic Improvements in Pattern Matching

        by L. Dudás

 

Abstract - This paper shows two algorithmic improvements for pattern matching introducing two new heuristics. For test purposes the author implemented three well-known heuristics to ensure the O(n) worst case time, the O(n log (m) /m) average case time and the O(n/m) best case time of searching for an m length pattern in an n length text that use a letter alphabet. The first new heuristic predicts the better search direction in the pattern preprocessing phase taking into consideration the unsymmetrical property of the pattern and using it in the search process. This method assumes that the full text resides in the RAM and exploits the fact that the memory reading is not direction dependent. The paper gives the prediction function for uniform character distribution and for natural language text alike and in addition presents a generalized form. The second new heuristic is effective on natural language texts and achieves a longer average jump than the pattern length, making compromise on completeness of search. The method exploits the fact that minimal distances can be determined between occurrences of different substrings for a language by a statistical preprocessing. Tests proved that both heuristics result in fewer jumps and character comparisons in the search phase of the pattern matching.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Pattern Matching, Search Direction Prediction, DNA Search, Natural Language Text, Long Jumps.

 


 

go to top    Detection of Lines in Images by Curve Fitting Using Hough Transform

        by A. A. Sewisy

 

Abstract - This paper a new proposes Algorithm to overcome the drawbacks of the generalized Hough transform, namely its computational complexity and storage requirement. For decreasing the Computation time, the algorithm performs the Hough transform by (1) decomposing an image into small blocks, (2) estimating line parameters through least-squares line fitting for each block, and (3) removing detected lines while performing the Hough transform for the remaining blocks. For reducing the memory storage, the proposed algorithm utilizes a data structure, list to represent accumulators. The method significantly reduces the computational complexity and storage required to evaluate all possible parameters without using a accumulator array. Experimental results are given to show the correctness and effectiveness of the proposed method.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: hough transforms; line detection; line fitting; segmenting image; accumulator space.

 


 

go to top    Backward Reachability Analysis Based on BPNs to Model-based Diagnosis with Relationships Among Symptoms
        by H. Bennoui, A. Chaoui

 

Abstract - Diagnosing multiple faults that may occur in distributed systems has received a lot of attention over the last decade. In particular, a backward reachability analysis based on Behavioral Petri Net (BPN) models has been proposed to model-based diagnosis of such systems. Nevertheless, it has been defined without tacking into account the concept of precedence relationships that may exist among fault indications or symptoms. The aim of this paper is two fold: first, to extend such analysis to handle precedence orders among symptoms at their signalization time; and second, to deal with the problem of contradictory observations which conduct to an inconsistency in the given problem. The relationships among symptoms are expressed in the net model as transitions among places denoting the corresponding symptoms. For the diagnosis process, they are captured through a novel set of backward firing rules used to construct the corresponding marking graph. In order to treat the inconsistency problems, we propose to restore the required consistency to the given problem. This is accomplished by identifying some symptoms that are known to be absent in the case under examination and when they are supposed present will explain the observed misbehavior. The paper is written in an informal style emphasizing on considerations of practical order than theoretical ones.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Behavioral Petri Nets, Model-based diagnosis, Reachability analysis, Inconsistent marking.

 


 

go to top    LUT Cascade-Based Architectures for High Productivity Embedded Systems
        by V. Dvorak

 

Abstract - Fast, flexible, cheap in hardware or low-power implementations of multiple-output Boolean functions are often required in embedded systems. The paper describes digital system architectures which embody some of these attributes. They are based on already known, and recently reinvented, representation of combinational logic by Look-Up Table (LUT) cascades. Theoretical background of cascade decomposition is revised and a relation to decision diagrams is pinpointed. The design of LUT cascades is discussed and a heuristic method of cascade synthesis is given. Three possible applications of LUT cascades are presented: combinational logic pipelines, efficient micro-programs with multi-way branching and fast logic simulation in software. It is shown that LUT cascades are quite flexible in making trade-offs between performance and cost by adjusting cascade length, complexity of its cells and multiplicity of cascades. The method of LUT cascades may be quite useful not only for high performance pipelined stream processing or embedded microprocessor or microcontroller firmware, but also in digital system simulation.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: LUT cascades, binary decision diagrams BDD, MTBDD, iterative disjunctive decomposition, multi-way branching.

 


 

go to top    An Efficient Designated Receiver Signature Scheme
        by M. S. Rababaa, S. J. Aboud, M. A. Al-Fayoumi

 

Abstract - This article introduces a designated receiver signature scheme which is carrying a characteristic that let the signature to be verified by the cooperation of the signature recipient only. This proposed digital signature scheme is aimed to secure the confidentiality of the signature recipient in many uses since the signed document hold too important data regarding recipient personally. We claim that the proposed scheme is scalable, secure, completely dynamic and more efficient than the already existed schemes.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Public key cryptography, digital signature scheme, designated receiver signature scheme.

 


 

go to top    Application Controlled Mobile IP Handoff for 802.11 Wireless Networks
        by G. Singh, A. Pal Singh Atwal, B. S. Sohi

 

Abstract - IP based IEEE 802.11 wireless networks are ideally suited for providing high data rate connectivity to pedestrian mobile users moving over small geographical areas like airports, university campuses and hotels. Range of 802.11 access points is limited due to technology constraints and replication is required to provide coverage over even small areas. This situation leads to frequent handoffs. In this paper we have proposed and implemented a cross layer approach for providing fast and proactive handoff using Dynamics HUT Mobile IP. This handoff mechanism works on reducing both the layer 2 and layer 3 discovery phases which are major contributors towards the overall handoff latency. Mobile node is made fully equipped with the information about the neighboring access points and mobility agents before the handoff process is executed. Handoff process is totally controlled by a user space application and is proactive in nature. The proposed handoff mechanism reduces the overall handoff delay to less than 250ms. The proposed approach has been tested and evaluated on experimental testbed setup for the purpose. Performance of the handoff approach has been evaluated for VoIP, audio/video streaming and TCP bulk traffic.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Dynamics Mobile IP, Handoff, Background scanning, IP networks, VoIP, Skype, Streaming.

 


 

go to top    Transferring Data Between Any Two UDDI v3 - Compliant Repositories - K.A.L.I.N.A. Data Migration Tool
        by A. Mintchev

 

Abstract - With the discontinuing of the operation of the UDDI Business Registry in January 2006, the focus of UDDI is being moved towards individual enterprise solutions. Whereas each commercial UDDI implementation claim to support the UDDI standard, the interoperability between any two UDDI products of different vendors is zero, in the sense that once having bought a UDDI product of a particular vendor and having published their data into it, the customers could not migrate their existing UDDI solution to that of a new vendor, as neither there exist a tool to transfer the UDDI user data, nor is there a commercial realization of the UDDI v3 replication protocol available, with the help of which the data could be transferred.
This paper introduces a design of a software tool that transfers part or all of the user data from any source UDDI V3 compliant repository into any destination UDDI V3 compliant repository. UDDI entity keys and ownership of UDDI data from the source repository are preserved into the destination repository, whenever this is possible. tModels of checked value sets are transferred as unchecked value sets and values of checked value sets (if any) are not transferred.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: UDDI, Repositories, Data transfer, import, export, SOAP.

 


 

go to top    Easy and Secure Login by CAPTCHA
        by S. Shirali-Shahreza, M. Shirali-Shahreza, M. T. Manzuri-Shalmani

 

Abstract - Nowadays, Internet is the center of attention as the integral part of mankind’s contemporary lifestyle. In order to provide the requested services and to conduct the user’s activities in many websites, there is a need to log into the system by user ID and password. Meanwhile, by finding the users’ passwords, hackers log into systems with other users passwords and conduct their illegal activities including withdrawing cash from the user’s account or stealing the user’s data.
This paper provides a new method in order to prevent the entry of hackers into the system with the use of CAPTCHA procedure. In this method, if the password is wrongly entered on a number of occasions, the user’s account gets locked. Thereafter, the computer displays a random word for the user, calling on him to enter it. If the user is able to recognize the word properly, the user’s locked account will be opened. But if the user can not realize the word after several times, the user’s account gets locked for five minutes. With due regard of the weak point of OCR software, only a human user can enter the system and the brute force attacks of the hackers fail. This project has been prepared with the use of PHP language.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Brute Force Attack, CAPTCHA (Completely Automated Public Turing test to tell Computer and Humans Apart), Human Computer Interaction, Login System, OCR (Optical Character Recognition).

 


 

go to top    Performance/Complexity Analysis of a H264 Video Encoder
        by H. Krichene, A. C. Ammari, A. Jemai, M. Abid

 

Abstract - H264/AVC (Advanced Video Codec) is a new video coding standard developed by a joint effort of the ITU-TVCEG and ISO/IEC MPEG. This standard provides higher coding efficiency relative to former standards at the expense of higher computational requirements. For efficient implementation of a H264 video encoder, we propose in this paper a high-level parametric analysis of its computational requirements on a GPP (General Purpose Processor) platform. This analysis is performed on various QCIF and CIF test sequences to evaluate key new features of the standard and to find an optimal balance between the coding efficiency and the implementation cost. The complexity of the obtained optimal configuration outlines the potential of using a multiple processors platform for executing a parallel code version of the H264 reference encoder. For this, profiling the reference code execution is performed to identify the major application bottlenecks and the main subcomponents candidate for efficient parallelization.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: H264 video encoder, parametric influence analysis, coding performance, implementation complexity, and profiling for task-level parallelization.

 


 

go to top    Interactive Multimedia E-learning Course for Teachers Education and its Possible Application in Vocational Training
        by K. Yordanova

 

Abstract - In this paper the main characteristics of interactive multimedia systems are described with emphasis on their advantages as tools for knowledge distribution and for effective and high quality professional training. Features of interactivity are discussed and the advantages of interactive multimedia presentations are presented. Two cognitive theories are presented and their application to the development of digital learning materials is demonstrated. General problems related to the development of interactive multimedia digital learning content are discussed and possible solutions are proposed. Tests implemented to evaluate the level of interactivity and quality of developed learning content are described.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: multimedia, interactivity cognitive theories, outcomes, taxonomies, effectiveness, vocation training, e-learning.

 


 

go to top    Business Process and Web Services for a B2B Exchange Platform
        by Y. Aklouf, H. Drias

 

Abstract - Web services (WS) and Services Oriented Architecture (SOA) are actually in exponential evolution. They allow systems to communicate with each other using standard Internet technologies. Systems that have to communicate with other systems use communication protocols and the data formats that both systems understand. Such Web Services interest has coincided with the proliferation of XML, Java technology and Business-to-Business (B2B) commerce.
The key attraction of Web Services comes from the business drivers of cost reduction and B2B integration. The B2B standards try to formalise the Business Collaboration (BC) based on documents exchange between partners. This collaboration is defined in some standards in a machine-readable format and in some others it is not. ebXML and RosettaNet specify such a collaboration. This paper compares business processes based on ebXML and RosettaNet with Web service technology. Then, it shows how these standards can be integrated in the same B2B developed architecture.
Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: E-commerce, B2B, ebXML, RosettaNet, Business Process, Web Services.


Please send any questions about this web site to info@praiseworthyprize.it
Copyright © 2005-2014 Praise Worthy Prize