Home > Archives > Latest issue

 

International Review on Computers and Software - May 2008 - Papers

 

 

   

 

International Review on Computers and Software - Papers

 

go to top   A Framework for Implementing Virtual Collaborative Networks Case Study on Automobile Components Production Industry
         by R. Khayami, E. Parvinnia, K. Ziarati

 

Abstract - In the recent century, economic experts predict that virtual enterprises as a new method in production will revolutionize the world economy. These enterprises are composed of small companies which are sometimes competitors. They take most advantage from the market opportunity and are able to compete with large companies. So some frameworks have been introduced for implementing this type of collaboration; although none of them has been standardized completely. In this paper at first, we review the life cycle of virtual collaborative networks and specify some instances that need to be standardized of implementation. Then by using B2B's communication technologies, a framework is suggested for implementing virtual collaborative networks. Finally, based on that suggestion, as a case study, we design a virtual collaborative network in automobile components production industry and implement a primary sample of it.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Collaborative networks, virtual enterprise, Distributed Business Process.

 


 

go to top   A Visual Clustering Platform for Cluster’s Interpretation and Quality Evaluation

         by M. Sassi, A. Grissa Touzi, R. Chammem

 

Abstract - Today, the generalization of data processing in all the industry branches leads to the construction of large databases. The exploitation of these data in various fields calls upon analysis and knowledge extraction techniques. Clustering is one of the most used techniques. Several clustering platforms were proposed in order to allow an effective and fast data grouping. These platforms integrate various approaches. However, they present several limits. In this paper, we propose a new platform, called EvalCluster, which a) integrates several clustering approaches b) allows the data processing which coming from various data sources c) interprets graphically the clustering results and d) evaluates the clustering quality and e) calculates the performances of implemented approaches.
Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Clustering, Fuzzy approaches, Hard approaches, Quality evaluation.

 


 

go to top   Measurable Quality Characteristics of a Software System on Software Architecture Level
         by  S. R. Khayami, A. Towhidi, K. Ziarati

 

Abstract - The main purpose of most software produces, into present a software system with high quality. Most of the experts believe that to achieve this subject, performing all of the stages of producing the software must be based on qualitative programming and performing prepuces. These points specially in producing the software architecture as one of the most important stages of this process must be considered more carefully. Regarding to different and various definitions for quality and architecture of software, this essay must at first investigate these two matters and there based on achieved results, determine the Evaluable qualitative characteristics at the architecture level.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Software architecture, evaluating the software architecture, qualitative characteristics of software, qualitative architecture factors.

 


 

go to top   A Hybrid Approach for Hw/Sw Partitioning Problem
         by D. Farfar, R. Boudour

 

Abstract - Splitting a large system into smaller and more manageable units has become an important problem and a challenging task for some fields of research. The question of generating a good partitioning into smaller modules becomes a minimization problem for the number of parts being called by other parts. Two different and complementary approaches turned out to be promising to tackle the problem. First, the new approach, known as extreme partitioning, is used and where hw/sw partitioning is based on profiling. Nevertheless, this one didn’t guarantee hard timing constraints. To overcome this weakness, it’s coupled with a MILP partitioning approach and used to reach this solution strategy, by efficient reformulations and a clever implementation. The advantage of the first one is to reduce particularly the time to market and the second one is to verify timing constraints by scheduling and keeping the cost down by clustering the nodes. We illustrate this method on two examples. The results are encouraging.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Hardware/Software partitioning, embedded systems, Mixed Integer Linear Programming, branch and bound method, timing constraints, extreme partitioning.

 


 

go to top   Formal Specification and Verification of Processor Micro-Architectures Functional Approach

         by S. Merniz, M. Benmohammed

 

Abstract - This paper presents a methodological approach for the formal specification and verification of RISC processor micro-architectures within a functional framework. The approach exploits only the next state function to formally specify both the Instruction-Set-Architecture (ISA) and the Micro-Architecture (MA) levels and proves their equivalence in a systematic way. The central idea consists of decomposing the next state function into coordinates such that to model the micro-architecture at the component level. Such decomposition allows the proof to be systematically decomposed into a set of verification conditions more simple to reason about and to verify. The potential features of the proof methodology are demonstrated over the MIPS processor within Haskell framework.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Formal specification, Formal verification, Functional programming, RISC processors.

 


 

go to top   Challenges in the Implementation, the Configuration and the Evaluation of a QoS-enabled Middleware for Real-Time Embedded Systems

         by R. Rekik, T. Guesmi, S. Hasnaoui

 

Abstract - Distributed computing in complex embedded systems gain complexity, when these systems are equipped with many microcontrollers which oversee diverse Electronic Control Units (ECU) connecting hundreds or thousands of analogue and digital sensors and actuators. The Publish/Subscribe paradigm matches well with these systems. Data Distribution Service (DDS) is a publish/subscribe data-centric middleware. It specifies an API designed for enabling real-time data distribution and is well suited for such complex distributed systems and QoS-enabled applications. Unfortunately, the need to transmit a large number of sensor measurements over a network negatively affects the timing parameters of the control loops. The CAN-bus enables the information from a large number of sensor measurements to be conveyed within a few messages. Its priority-based medium access control is used to select the sensor messages with high timing constraints. This approach greatly reduces the time for obtaining a snapshot of the environment state and therefore supports the real-time requirements of feedback control loops. The main objective of this paper is to demonstrate how DDS API is implemented on a CAN-Bus and gives performance evaluation related to delivery and transport QoS parameters.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: DDS, Publish-Subscribe, data distribution, Real-Time Middleware, Controller Area Network (CAN), EDF, Distributed Control Systems.

 


 

go to top   A Comparative Analysis of Reliable Multicast Protocols in Active Networking Environments

         by L. Derdouri, C. Pham, M. Benmohammed

 

Abstract - Active networking approach in reliable multicast have the potential to provide significant performance gains in terms of reduced delay and bandwidth consumption, and higher throughput. In this paper we examine and compare the performance of two active reliable multicast protocols: one based on the receiver-initiated class and the other combines both receiver-initiated and sender-initiated classes. In the receiver-initiated class approaches the responsibility of loss detection is attributed to receivers, regardless links in which the losses occur. In contrast, the responsibility of loss detection when combining classes is distributed between the source and the receivers. In this hybrid approach, the source handles the losses occurring in the source link and the receivers take care from those occurring in the tail links. Using analytical models, we show that combining classes yields significant higher protocol throughput and lower bandwidth usage than receiver-initiated class in unreliable environments. This result proves the interest of the combination of classes with an efficient distribution of loss recovery burden thank to contribution of active routers.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Active networks, Reliable multicast, IP multicast, Receiver-initiated, Sender-initiated.

 


 

go to top   Interoperable Mobile Agent for Software Observation

         by R. Mekki, F. Mourlin

 

Abstract - Peer-to-peer is the technology that could release the power of millions of interconnected machines at the edge of the Internet to serve a new generation of powerful enterprise applications. By using peer to peer, applications could provide access to a variety of resources with high availability at a lower cost. In this paper, the application aims use peer to peer technology to deploy mobile agent community. Their objective is to gather data about local state of machine and to build more abstract observation of the whole network. The peer to peer configuration is defined by the use of JXTA framework and the mobile agent can travel from one machine to another by the use of XML serialization. Because this kind of serialization allows keeping state of agent, data collecting is realized with a community of mobile agents, each of them are responsible of a type of data.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Mobile agent, peer to peer, observation, data collection.

 


 

go to top   Integrating Natural Language Requirements and OPEN Process Activity Theory Model for Platform Independent Web Modeling
         by M. Darbari, B. Karn, V. Kr. Singh, S. S. Ahmad

 

Abstract - This paper explores the use of natural Language in requirements generation and than converting the classifications of Natural Language Lexicon into Activity theory Notation. The focus of this paper is web modeling of urban Traffic system using NLS and then finally to Activity Oriented and Navigation Class models (NC). These model gives the clear picture of the objects and their relationship in a website. The second phase of the paper represents a methodology for making the web application platform and device independent. Extending the mapping Activity Theory Notations into OPEN framework a generalized Activity Oriented Model for Web Modeling is created. The generalized OPEN framework for Web Modeling gives the skelton structure of the Web pages generated from Natural Language (NL) conversion. Finally it is transformed to Navigation Class diagram giving functional details of each object.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: SOAP (Simple Object Access Protocol), NLP (Natural language Processing) AOM (Activity oriented Modeling ) XML. A.T (Activity Theory).

 


 

go to top   Characteristics of the Iranian Web
         by M. Azadnia

 

Abstract - Having enough sights with respect to the specification of our national web is one of the major needs for national policy-making as well as the strategic planning in the area of information technology. Regarding the fact that there has been no comprehensive research conducted in the field of current situation of the Persian Web. Responding to this need, in this article, a semi-automatic and efficient evaluating system is designed and implemented. It is aimed for extracting different parameters such as site content distribution (scientific, news, state, commercial and web logs), Persian content volume, the type of content, the life expectancy of the content, the kinds of provided services, the percentage of different Persian codings, etc. The statistics can be used for targeting the future plan for systematizing Persian web and also presenting approaches for solving the current problems. The analyses by the mentioned system are done on about eleven thousand sites in the domain of “.IR” including the majority of state organizations, ministries, companies and universities over two million pages.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: “.IR” domain, Persian web, e-government web features extraction, content, graph.

 


 

go to top   Hybrid Algorithm for Unsupervised Automatique Classification
         by H. Boudouda, H. Seridi

 

Abstract - For several years, has appeared under the pressure of technological developments, a set of classification algorithms which falls within the framework of research on artificial intelligence for pattern recognition. These algorithms try to find a partition within a set of objects, which one does not have, knowledge a priori on their membership, very often the effective number of classes is unknown. The various approaches suggested in literature, differ the ones from the others by the membership concept of an object to a class; however the initialization method remains ambiguous. In this same context, a new approach of unsupervised automatic classification under the C-Means family is presented. This new approach based on the fusion of fuzzy and the possibility theory, allows on the one hand to solve, simultaneously the problem of coincidence and the noise and on the other hand to accelerate classification. The initialization methodology used in this paper is based on membership matrix. The model validation is carried out by the FCM, the PCM and the FPCM for two cases of initialization by using Iris, Textured image and Tight human data basis.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Approximate reasoning, Fuzzy logic, Pattern recognition, Possibility Theory, Unsupervised Classification.

 


 

go to top   Designing a Criterion-Referenced Assessment Model using Goal Questions Metrics Approach to Support Object-oriented Programming Course Assessment
         by N. Khamis, S. Idris

 

Abstract - Assessment is one of the debatable issues in programming education. This paper discussed the approach taken to develop a criterion referenced assessment model using Goal Questions Metrics approach. The purpose of the model is to support the assessment of object oriented programming courses. Goal Questions Metrics is chosen as the approach to develop the model as it is a paradigm which helps to formulate the metrics of interest. The main aim of this model is to improve the assessment system for object oriented programming course. It is hope that this model will be able to assist educators to provide a reliable assessment.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Assessment, Criterion-referenced assessment model, Goal Questions Metrics Approach, Object-oriented Programming.

 


 

go to top   Power Electronic Simulations
         by P. Bauer, P. J. van Duijsen

 

Abstract - This paper shows the latest development and directions in Power Electronic simulations. One of them is visualization of the simulation results and ”freeze and go back” feature is here introduced. As typical power electronics system analyses consist of many aspects and it is multidisciplinary an open interface and integrated approach is often applied. Requirements on the interface for an integrated simulator are given and communication between various tools and its structure is described in the paper and illustrated by many examples.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Simulation, power electronics.

 


 

go to top   Region Growing and Segmentation Based on by 2D Wavelet Transform to the Color Images
         by Y. A. Alsultanny

 

Abstract - Image segmentation is to divide the image into disjoint homogenous regions or classes. In this paper, a new approach is proposed to the RG B (Red Green Blue) images by determining edges and seed regions by using two-dimension wavelet transform. The region growing algorithm applied to extract regions and then coloring the segmented regions with a specific color. Gaussian filter used in enhancement as a preprocessing step to merge similar pixels with their neighbors. The two-dimensional Symlet family used wavelet transform to extract edges of the red, green and blue bands. The morphological algorithms applied to remove noisy pixels from image edges. The edges are connected together to extract the seed regions and these seed regions are the region growing algorithm to grow the segmented regions. The proposed algorithm applied on the three bands of the RGB images, and each band gave different segments, which depends on the information carried in the processed band. The algorithm tested on images from different sources and gave good results.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Image processing, region growing, wavelet transform, image segmentation, edge detection.

 


go to top   Performance of Adapting Non-Native Speech in Isolated Speech Recognizer
         by N. Seman, J. Kamaruzaman

 

Abstract - This paper presents the pronunciation performance between native and non-native speakers of Malay sounds in isolated speech recognizer (ISR). Speaker adaptation methods are combined to solve the performance decrease that recognizers are faced with native and non-native speech of speaker-independent (SI) models. Often, speech recognition performance degrades drastically if the recognizer which has been trained with native speech is exposed to non-native speech even though speech recognition systems have reached a certain level of maturity. Two experiments was performed to show the recognition accuracy of the baseline models trained with native dataset was drastically low for the non-native speakers from non-Malay group than for the native ones. Acoustic deviation has been discovered as one of important factors affecting the performance of the ISR. In this experiment, an acoustic technique has been implemented to compare the performance on native and non-native speech. We explore how acoustic models can be adapted to better recognize the non-native speech. The experiments show that there are many problems arise such as adaptation methods and the non-native pronunciation pattern that remains to be investigated. In future, it will be necessary to improve speaker adaptation methods by incorporating more extensive knowledge of speaker variation at both the acoustic and the pronunciation level.

Copyright © 2008 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Isolated speech, Native speaker, Non-native speaker, Maximum Likelihood Linear Regression (MLLR), Maximum a Posteriori (MAP).


Please send any questions about this web site to info@praiseworthyprize.it
Copyright © 2005-2014 Praise Worthy Prize