Home > Archives > Latest issue

 

International Review on Computers and Software - January 2009 - Papers

 

 

   

 

 

International Review on Computers and Software - Papers

 

go to top   Study of Security Mechanisms for Secure Mobile Commerce Architecture Through the Development of a Mobile Banking Application
         by Paras Mehta, Mario Muñoz Organero
 

Abstract - The expansion of mobile commerce is set to empower mobile users in the coming times. With this comes the need for security. As users become increasingly mobile, the demand for innovative applications that guarantee data security is soaring. This paper aims to advance a step in this direction by comparing and evaluating the existing mobile commerce solutions in terms of security, finding where they fall short and devising improvements. Focus has been laid on mobile banking which is an important security-critical application of mobile commerce. The authors present a secure architecture for m-commerce based on Java ME SATSA and Web Services APIs and, its implementation through the design of an application for mobile banking.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Mobile Commerce, Mobile Banking, Java ME, Mobile Web Services, Mobile Security, SATSA, XML Signature, Encryption.

 


 

go to top   Best Practices in e-Business Process Management. The C2C and C2B Models
         by Khalid Khanfar, Asim El Sheikh, Ibrahim El Badawi

 

Abstract - In their paper titled “Best Practices in e-Business Process Management: Extending a Re-engineering Framework”, Henry and Rajani analyzed the cornerstone of the 1990s thinking on process. Hammer and Champy’s nine best practices to apply for e-business process management (e-process management). As a result, they suggested nine counter practices that formulate an e-business strategy. In this paper, these suggested nine practices are analyzed and tested against the Consumer to Consumer (C2C) and Consumer to Business (C2B) categories of e-business. A special definition and model are developed to control this test. Not all of these practices were essential for those two models, some of them formed exceptions. The result is C2C and C2B best practices that can be used as a framework or strategy.
Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: BPM, C2C, C2B, e-Business.

 


 

go to top   Towards an Advanced Computing Solution for Hospital Management using Discrete Event Simulation
         by  Gitesh K. Raikundalia, Christopher A. Bain, Snehal Mehta

 

Abstract - An important area in healthcare is hospital management, particularly regarding access, demand and resource management in hospitals. Access (the capability of providing care to patients in a timeous manner), demand (the community’s need for care exacted upon health services), and effective and efficient management of hospital resources are continual difficulties affecting patients. The ramifications of this include long emergency waits, extended periods on procedural waiting lists and cancelled surgical procedures. Hospital managers face the onerous task of building and supporting knowledge bases in several dimensions, including clinical and managerial dimensions. Although knowledge bases exist in the clinical domain, there is no such knowledge base in the domain of hospital management, and no work exists that incorporates both these perspectives.
This paper describes a framework and mechanism where knowledge bases for hospital managers can be developed and applied to hospital management. To increase short-term operational utility of the framework, the system in this paper needs extension because large amounts of generated data need to be processed to provide managers with relevant visualisations assisting them in management. In order to process these large quantities of data in an extremely short amount of time, to support quick decision-making, advanced computing is absolutely necessary.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Computer simulation, Hospital management, Advanced computing.

 


 

go to top   Geospatial Web Services Semantic Discovery Approach Using Metadata and Multi-Agents System
         by Rezeg Khaled, Laskri Mohamed Tayeb, Kazar Okba, Sylvie Servigne

 

Abstract - Geographical information has became very expensive and important in our daily life. Its importance lies on its existence in the majority of the human activities through their localizations in geographical space; it is also very useful to refine certain queries. It is not astonishing that most of the documents on the Web contain space references through the use of address or place names. With an aim of benefitting fully from this information in the various fields, it must be exploited through interoperable systems. The interoperability generates many problems particularly on the level of semantics. One of solutions to these problems can be obtained using the geographical data through the semantic Web services. In this paper we propose an architecture of a semantic discovery of the geospatial Web services based on the metadata and agent paradigm for modeling of the system.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Catalogue, Geospatial Web service, Metadata, Multi-agents system, Semantic discovery, Ontology.

 


 

go to top   Aesthetic Evaluation of Web Pages Using Texture/Color Features and Artificial Neural Networks

         by Maryam Mirdehghani, S. Amirhassan Monadjemi

 

Abstract - Web sites are rapidly becoming the preferred media choice for our daily works such as information search, company presentation, shopping, and so on. At the same time, we live in a period where visual appearances play an increasingly important role in our daily life. In spite of designers’ effort to develop a web site which be both user-friendly and attractive, it would be difficult to ensure the outcome’s aesthetic quality, since the visual appearance is a matter of an individual self perception and opinion. In this study, it is attempted to develop an automatic system for web pages aesthetic evaluation which are the building blocks of web sites. Based on the image processing techniques and artificial neural networks, the proposed method would be able to categorize the input web page according to its visual appearance and aesthetic quality. The employed features are multiscale/multidirectional textural and perceptual color properties of the web pages, fed to perceptron ANN which has been trained as the evaluator. The method is tested using university web sites and the results suggested that it would perform well in the web page aesthetic evaluation tasks with around 90% correct categorization.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Web Page Design, Web Page Aesthetic, Color Spaces, Texture, Neural Networks.

 


go to top   Recent Advances Concerning the Usage of the Naïve Bayes Model in Unsupervised Word Sense Disambiguation

         by Florentina T. Hristea

 

Abstract - The present paper concentrates on distributional approaches to unsupervised word sense disambiguation (WSD) that rely on monolingual corpora, with focus on the usage of the Naïve Bayes model in unsupervised WSD, and places under survey a new word sense disambiguation method that has been recently introduced in [1]. The novelty of the discussed disambiguation method, which performs unsupervised WSD based on an underlying Naïve Bayes model, consists in using the semantic network WordNet as knowledge source for feature selection. The method therefore lies at the border between unsupervised and knowledge-based techniques. In order to study the proposed method, the theoretical model is presented and its implementation is discussed. Special attention is paid to feature selection, the main issue of the model’s implementation. The presented method is tested with respect to nouns and verbs. Its performance is compared to that of previous approaches that rely on completely different feature sets. Test results show that feature selection using a knowledge source of type WordNet is more effective in disambiguation than local type features (like part-of-speech tags) are.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Word sense disambiguation, Unsupervised disambiguation, Knowledge-based disambiguation, Bayesian classification, The EM algorithm, WordNet.

 


 

go to top   Arabic Statistical N-gram Models
         by K. Meftouh, K. Smaili, M. T. Laskri

 

Abstract - In this work we propose to investigate statistical language models for Arabic. Several experiments using different smoothing techniques have been carried out on a small corpus extracted from a daily newspaper. The sparseness data conducts us to investigate other solutions without increasing the size of the corpus. A word segmentation has been operated in order to increase the statistical viability of the corpus. This leads to a better performance in terms of normalized perplexity.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Statistical language model, Arabic, N-gram models, Word-based n-gram models, Morpheme-based n-gram models, Perplexity.

 


 

go to top   Control/Data Driven Embedded Systems high level Modeling, Formal verification and Simulation
         by Fateh Boutekkouk, Mohammed Benmohammed

 

Abstract - The Unified Modeling Language (UML) is attracting more and more attention of Embedded Systems designers. On the other hand, rewriting logic is becoming interesting for distributed and concurrent systems formal specification and verification. On the other side, SystemC is becoming the standard system level language for Hw/Sw co-design. In this paper, we present our approach for Embedded Systems high level modeling, power consumption estimation, and formal verification following the Y-chart approach principles. The proposed approach starts by establishing the application and the architecture models using a subset of UML diagrams. In our case application is presented as a network of hierarchic data driven and control driven tasks that communicate via abstract channels. Two types of channels are identified: data channels and control channels. Data flow driven tasks behaviors are modeled through UML activity diagrams with coarse grained actions (CGAs) following Kahn Process Networks (KPN) model of computation semantics. Control driven tasks behaviors are modeled as finite state machines using UML statecharts. Hardware platform is modeled as UML structure diagram. Mapping is modeled through UML constraints. From UML models, a Maude specification is generated. We use this formal specification to formally validate system functionality against some undesirable properties and to estimate system power consumption at a high level of abstraction. The last step in our flow consists in SystemC code generation from UML models.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

KeywordsUML, Y-Chart approach, KPN, Rewriting logic, Maude, SystemC, Power consumption estimation, Simulation, Formal verification.

 


 

go to top   A New Approach for UML Scenario Engineering
         by Abdeslam Jakimi, Mohammed Elkoutbi

 

Abstract - The use of scenarios has become a popular technique for requirements elicitation and specification building. Since scenarios capture only partial descriptions of system behavior, an approach for scenario composition and integration is needed to produce more complete specifications. The Unified Modeling Language (UML), which has become a standard notation for object-oriented modeling, provides a suitable framework for scenario acquisition using Use Case diagrams and Sequence or Collaboration diagrams. In this paper, we suggest a requirement engineering process that merges use scenarios and yields a formal specification of the system. We develop an algorithmic and tool support for composing and merging scenarios that are represented in form of sequence diagrams. In this work, we propose four operators ( ;: sequential operator, ||: concurrent operator, ?: conditional operator and * :iteration operator) to compose a set of scenarios that describe a use case of a given system.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Scenario engineering, Scenario composition, UML, Requirement engineering, Sequence diagrams.

 


 

go to top   Analysis of Nominal Groups in Natural Language Queries for an Object Oriented Database
         by Bentamar Hemerelain, Hafida Belbachir

 

Abstract - This paper discusses the semantic analysis of nominal groups (NGs) in natural language (French) queries for an object-oriented database. It is concerned with NGs consisting of one or two substantives where a substantive is either an application-dependent noun or proper noun. To check the semantic validity of a substantive, various semantic filters are defined and applied. Based on these filters, two sets of rules, called concatenation and coherence rules that serve to check the validity of the co-occurrence of substantives in complex NG are introduced.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Natural language query, Nominal groups, Object-oriented databases, Semantic analysis, Semantic filters.

 


 

go to top   A Selective Mutation Operator for Tree-based Genetic Programming
         by Malek Aichour, Mohamed Batouche

 

Abstract - In genetic algorithms and genetic programming, the cross-over and mutation points selection are done at random; hence the problem with genetic operators in tree based genetic programming is that fit sub-trees can be subject to destruction by an irrelevant choice of cross-over or mutation points. A new kind of mutation operator which identifies the adequate point before mutation is introduced through this paper, helping the reduction of the destructive effects of the random selection of the sub-tree from the parent tree. Our selective mutation operator for tree-based genetic programming, attempts to remove the part of the parent tree which is the cause of the diminution of parent fitness, after selecting a sub-tree with the least effect on the parent tree. A new algorithm for genetic programming with the above mentioned mutation operator has been compared and contrasted with standard genetic program, on symbolic regression problem. Satisfactory results have been found and experimental evidence shows that selective sub-tree mutation is better positively compared with standard sub-tree mutation.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Genetic programming, Genetic Operators, Selective mutation, Symbolic regression.

 


 

go to top   New Partial Evaluation Function in Constructive Hyper-heuristic Framework for Examination Timetabling Problem
         by Sh. Mohammad Pour, A. B. Md. Sultan, M. N. Sulaiman, B. Zarrin

 

Abstract - In this paper we introduce a new partial evaluation function formula to evaluate partial solutions in a constructive hyperheuristic framework for solving Examination Timetabling Problem (ETTP). Since scheduling of each exam may restrict resources for remained unscheduled examinations, the function in order to evaluate partial solutions in each step, not only pays attention to situation of scheduled exams in current partial solution but also considers state of unscheduled exams after each scheduling. The function focuses on effect of previous scheduling of exams on time feasibility resource of remained unscheduled ones through a Bubble sort mechanism. The main formula is integrated by proportional coefficient. The framework applied on a graph based constructive hyperheuristic framework which its base is introduce in [1]. The efficiency of formula is analyzed and the prediction embedded in the new partial evaluation function is discussed.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Partial Evaluation Function, Constructive hyperheuristic, Examination Timetabling.

 


 

go to top   Generation of Sequential Diagnostic Procedures Including Symmetrical, Asymmetrical and Multi-Valued Tests
         by P. Mrak, F. Novak, A. Biasizzo

 

Abstract - The paper deals with the problem of minimizing the cost of the sequence of tests required to localize a fault. The interactive sequential diagnosis tool supporting symmetrical, asymmetrical and multi-valued tests is presented. The main part of the paper is devoted to practical guidelines in the form of illustrative examples that may help the user to acquire and formalize the input data and to use the tool for the generation of optimal decision trees.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Diagnostic tools, Fault location, System level diagnostics.

 


 

go to top   Using Arithmetic Decision procedures to Verify the Consistency of Architectural Rules
         by Najla Allani Bouhoula

 

Abstract - Architectural rules are very useful for architects and planners, in particular for 3D reconstructions of buildings (i.e. archaeological sites) and for the determination of building periods more accurately. Such rules are user-defined from historical documents and therefore they can constitute a source of potential ambiguity or inconsistency or lack of clarity. This motivates us to develop an efficient tool in order to specify and validate architectural rules. We propose to use first order language to specify architectural rules. Then we apply arithmetic decision procedures for checking consistency of such rules. A set of architectural rules is inconsistent if and only if it expresses contradictions or generates dilemmas. To check the consistency of a set of architectural rules we have to generate some particular consequences of some first order formulas. We have experimented this method and the first results are very promising.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Architectural rules, 3D Reconstructions of Buildings, Archaeological Sites, First Order Logic, Arithmetic Decision Procedures, Consistency.

 


 

go to top   Wireless Sensor Networks Optimization: Cross-Layer (DSR-Z-MAC) and Synchronization Technique (SMAC)

         by Hafedh Zayani, Rahma Ben Ayed

 

Abstract - Performance optimization in Wireless Sensor network represents an active research area. This optimization has been interested in several fields such as radio model, communication protocols, communication stack layers architecture, etc. This paper presents two types of optimization under two different discrete events simulators NS-2 (Network Simulator) and OMNeT++ (Object Modular Network Test-bed in C++). One presents a new optimization cross-layer model using ZMAC (Zebra MAC) and DSR (Dynamic Source Routing) protocols in order to minimize the energy loss. In this model, we have changed the DSR routing metric, we have added a power control module to ZMAC protocol and we have adapted some physical layer modules. This optimization has been performed under NS-2 simulator. The other optimization, based on the synchronization method used by SMAC (Sensor MAC) protocol, has been performed under the OMNeT++ simulator. For this aim, we have proposed a new distributed-centralized method that reduces the network energy consumption.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Wireless sensor Network, Cross-layer, ZMAC, SMAC, DSR, synchronization, Energy efficiency.

 


 

go to top   Lattice-Reduction-Based Detector for Combined OFDM  Space Division Multiple Access Wireless System

         by Amjad N. Jabir, Sabira Khatun, N. K. Noordin, Borhanuddin M. Ali

 

Abstract - Lattice-Reduction-Based detectors have been suggested for multiple input multiple output (MIMO) systems that offer full diversity, yet at the complexity of linear detectors. In this paper, the uplink of a combined OFDM/SDMA system is considered where the base station has multiple antennas while the users have single antenna terminals. The effect of the channel is considered in the frequency domain per OFDM subcarrier and it is shown that for this specific application that gets the benefits of both OFDM and SDMA, a Lattice-Reduction-Based detector is capable also to offer a superior performance, in terms of Bit Error Rate (BER), compared with some of the known detectors.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: OFDM, SDMA, Lattice Reduction.

 


 

go to top   A Novel Wireless Service Discovery Protocol for Ad-Hoc Networks

         by Javad Zarrin, Bahram Zarrin, Fatemeh Mamdouhi

 

Abstract - For ubiquitous computing environment is a key concept to address a general request easy access and interaction with pervasive services. Presently there is no efficient service discovery protocol for wireless Ad-Hoc environment, in this paper a novel service discovery protocol is proposed to fulfill some aspects of current critical challenges. The advantages of the proposed protocol includes: faster Service delivery, less power consumption, less traffic load, more discovery wide range.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Ubiquitous Environment, Wireless Network, Ad-Hoc Network, SDP, Service Advertisement, Remote Service, Service Discovery Protocol, Directory Facilitator.

 


 

go to top   Applying a Fuzzy Association Rule Mining Approach in the Robocup Soccer Simulation Domain
         by Seyyed Mohammad Saeed Tabatabaee, Ehsan Rafiee, Mohammad Jafar Abdi, Mohammad Reza Kangavari
 

Abstract - Nowadays multi-agent modeling is one of the important problems in problem-domains in which several agents are involved. One of the main reasons for modeling agents is to become capable of predicting their behaviors in special situations. In this paper a modeling algorithm for multi-agent systems is presented which is applicable in domains like RoboCup coach competitions. (a very chaotic and uncertain domain with large number of agents).This algorithm is a combination of a classic data mining algorithm named association rule mining and fuzzy set theory which leads to a soft computing approach. Also some evaluation methods for recognition of models are presented and finally, some experiments for measuring accuracy of models and evaluation methods are outlined.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: MAS; Fuzzy Logic; Association Rule Mining; Opponent Modeling, RoboCup.

 


 

go to top   Improving the Goal-Shooting skill using a Genetic-Fuzzy System in the RoboCup Soccer Simulation League
         by Mohammadreza Kangavari,Mohammad Jafar Abdi, Seyyed Mohammad Saeed Tabatabaee
 

Abstract - Most of the problems in the RoboCup soccer domain suffer from the noisy perceptions, noisy actions, and continuous state space. To cope with these problems, using Fuzzy logic can be a proper choice, due to its capabilities of inferring and approximate reasoning under uncertainty. However, designing the entire rule base of a Fuzzy rule base system (FRBS) by an expert is a boring and time consuming task and sometimes the performance of the designed Fuzzy system is far from the optimum, especially in cases that the available knowledge of the system is not enough. In this paper, a rule learning method based on the iterative rule learning (IRL) approach is proposed to generate the entire rule base of an FRBS with the help of genetic algorithms (GAs). The advantage of our proposed method compared to similar approaches in the literature is that our algorithm does not need any training set, which is difficult to collect in many cases; cases like most of the problems existing in the RoboCup soccer domain. As a test case, the goal-shooting problem in the RoboCup 3D soccer simulation league is chosen to be solved using this approach. Simulation tests reveal that with applying the rule learning method proposed in this paper on the goal-shooting problem, not only a rule base with good performance in goal-shooting skill can be obtained, but also the number of rules in the rule base can be decreased by using the general rules in constructing the rule base.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Fuzzy rule-based systems; Genetic algorithms; Genetic Fuzzy systems.

 


 

go to top   Modeling and Evaluating a CAN Controller Components Using Stochastic and Colored Petri Nets
         by Oussama Kallel, Sofiene Dridi, Salem Hasnaoui
 

Abstract - Nowadays distributed computing in complex embedded systems gain complexity when they are equipped with many microcontrollers which oversee diverse Electronic Control Units (ECU), connecting hundreds or thousands of analogue, digital sensors and actuators. High performance and predictability are the prerequisites of these systems Data representing actual events or system status must be evaluated while it is still relevant to its lifespan. It is well known that these requirements are greatly satisfied by the adequate chosen access schemes. As one of the seven field-buses attested by the IEC and qualified by its bit-by-bit arbitration access scheme, CAN-bus has the widest applicability. However it has actually some concurrent techniques like those used in RT-Ethernet and FlexRray leading for its probable replacement in a near future. However, a deep modeling of all modules of a CAN controller with its arbitration scheme does not exist in the literature and represents a lack for any decision even though the CAN bus is used for a long period. Our major contribution in this paper is the deep study of its performances by modeling it Stochastic and Colored Petri Nets (SCPN) to demonstrate that CAN-Bus has yet a well period before its replacement and CAN controller components manufacturers do not afraid for its production.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: CAN, RT-Ethernet, Flexray, Stochastic and Colored Petri Nets, data-Centric, Throughput, Latency time.

 


 

go to top   A Model-Checking Approach for the Verification of CARE Usability Properties for Multimodal User Interfaces
         by Nadjet Kamel, Sid Ahmed Selouani, Habib Hamam
 

Abstract - A model-checking-based approach is proposed to verify the CARE (Complementarity, Assignement, Redundancy and Equivalence) usability properties for Multimodal User Interfaces (MUIs). This approach reduces the states explosion problem which is the main inconvenience of the model-checking technique. For this, we propose to decompose the transition system describing the behaviours of the MUI into a set of transition systems, and we decompose the temporal logic formula, that specifies the CARE property, into a set of reachability property formulas. The decomposition is based on disabling a set of modalities in the system. The model-checking process of the CARE property is done through a set of stages. At each stage a reachability formula is checked on a MUI component transition system. The process is aborted if a reachability formula is not satisfied. This approach reduces the complexity of the CARE model-checking process. We illustrate this approach, using the SMV (Symbolic Model Verifier) model-checker, on a MUI of a mobile cell phone case study.

Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved

 

Keywords: Model-Checking, Formal Methods, Temporal Logic, Multimodal User Interfaces, Usability properties.


Please send any questions about this web site to info@praiseworthyprize.it
Copyright © 2005-2014 Praise Worthy Prize