Abstract

Real-Time Tracking for Augmented reality
Paper Number:    3
Abstract:
In real time applications of augmented reality, it is always matter of tracking; one of the most promising techniques in this sense is tracking based pattern. In this paper we describe a method based on the discrete Kalman filter for a real-time tracking of a 2D pattern for augmented reality. Objective being to make Real-time tracking of a 2D pattern through a video stream on the simple personal computer; the process can be resumed as follow: in each frame we do an estimation by Kalman filter of predict corner location, after we proceed to correct this estimation by a measure around predict location, with Harris corner detection. the results obtains are very satisfactory, because all the process precede on real time and succeed to accurately track the pattern through video stream.
back to Accepted Papers Page


An Efficient Implementation Of Iris Recognition Algorithms For Portable Equipment
Paper Number:   5
Abstract:
An implementation of the Iris recognition algorithms using MATLAB Software package is introduced in this paper, it called JUST IRIS. The main target of this implementation based on reducing the number of instructions and increasing the speed operation of the tool comparing with other tools implemented the same Iris recognition algorithms. The new package could be used successfully in Portable devices and handheld equipment. Simulation results using CASIA set of eye images is used to verify the main objective of the paper. Optimization of code is verified in three stages of the project: Segmentation, Normalization and finally in Encoding.
back to Accepted Papers Page


A Total Security Model For E-Education System; Roadmap, Tools, And Strategies For Protection
Paper Number:    7
Abstract:
Nowadays, new information and communication technologies have become major resources and basis for learning in higher education. Technologies have several potentials to support different instructional strategies and provide an efficient way of delivering electronic course material and improving comprehension. The contemporary universities need to increase lifelong learning opportunities to its students any time, any place and at any rate to be successful in the global learning marketplace [1]. The use of e-leaning in the learning process has grown significantly in the last few years, however, it is a relatively insecure, hence, most learning organization haven�t yet taken into considerations any new strategy for securing e-learning process [2]. Additionally, implementing e-learning is complex. Implementing e-learning is about project management, change management and risk and security management [3]. The main aim of this research is to provide a new mechanism to protect the e-learning material from unauthorized distribution, to protect the e-course material from being altered or modified from any intruders and to provide new tools, strategies and mechanism to make the e-learning process more secure and trustee.
back to Accepted Papers Page


A Simple PC based Hardware for Process Control through the Internet
Paper Number:    12
Abstract:
Internet based process had widespread in the industry field in the recent years. Little documentation can be found on this due to company polices to protect their projects. In our region the case is different and it is rare to find internet based process control. Simplicity in any system is an asset to have. Especially, in our region in which we lack hardware and software company dealers. It is best to depend on free software as far as is possible in addition to on simple easy repairable systems. In this research a hardware interface circuit and a software system has been designed to control the temperature and level of a liquid tank (water has been considered in our case study). The main advantage of the designed interface circuit is its simplicity and low cost. The same can be true for the software system in which we used Java servlet to accomplish the communication task. Java servlets have many advantages over the CGI based methods used previously that has common problems of speed and data persistence. In security aspects a password has been added to all control action commands to secure our process control tasks. The designed hardware and software systems could be used for remote or local control with no amendment and for both manual and automatic control.
back to Accepted Papers Page


Multi-Agents System to improve electronic Market Place: conception and implementation
Paper Number:   
19
Abstract:
The uncertain future of the electronic market places (e-MP) brings to wonder about the development of these inter-organizational information systems that joins three types of actor mainly: the operator, the customers and the suppliers. Our work aims to propose an architecture based agent to improve management of e-MP: to add or to withdraw an agent of a system without altering the other components and without to restart again the market place. It will allow us to modify the traditional approach of the commerce by integrating more intelligence, autonomy and automation; which are the most important features of the software agent. We present the necessity of the inescapable consumer/supplier's interfaces easily implemented with the advent of the generalization the object approach and the principle of encapsulation that are associated to them. This can be conceived henceforth like an interaction of software entities, by communication interfaces/programming that they propose. In conception stage we present the existing use cases diagrams in e-MP illustrated by UML. To implement our system we choose Jade platform (Java Agent Develops Frame-work) and Java language. Since our work is based on a Multi-Agents system where agents must communicate between them, we model the exchanged information with KQML language (Knowledge Query Modeling Language) that permits to define a uniform communication between different agents of the e-MP system. We translate the model of information in XML vocabulary and message's transfer messages by RMI/IIOP/Java event according to the type of communication.
back to Accepted Papers Page


Grid & Distributed Public Computing Schemes for Structural Proteomics: A short Overview
Paper Number:    23
Abstract:
Grid and distributed computing (such as public computing schemes) has become an essential tool for many scientific fields including bioinformatics, computational biology and systems biology. The adoption of these technologies has given rise to a wide range of projects and contributions that provide various ways of setting up these environments and exploiting their potential resources and services for different domains of applications. This paper aims to provide a distilled overview of some of the major projects, technologies and resources employed in the area of structural proteomics. The major emphasis would be to briefly comment on various approaches related to the gridification and parallelization of some flagship legacy applications, tools and data resources related to key structural proteomics problems such as protein structure prediction, folding and comparison. The comparison is based on the analysis of some key parameters such as user level interaction environments, job/data parallelization and management, deployment technologies and infrastructures, and the effect of gridification on overall performance of the system.
back to Accepted Papers Page


Hardware And Software Modifications On The Neocognitron And Its Binary Implementations On Fpga
Paper Number:    25
Abstract:
Convolutional neural network (CNN) is a well-known robust image recognition model. It is a multi-layer architecture where the successive layers are designed to learn progressively higher-level features, until the last layer which produces categories. In order to apply this model to robot vision or various intelligent systems, its VLSI implementation with high performance is required. In this paper, a hardware implementation of one of the most complex and powerful image recognition convolutional neural networks(the neocognitron) has been considered. The original neocognitron has been modified to reduce its complexity whether it is hardwarely or softwarely implemented while its principle working ideas has been kept. The computation strategies of all the modified version model's (the MNEO) neurons have been modified. These modifications lead to avoid the at most hardware bottleneck problem (the multiplication). The only multiplication operation is used in the pipelined approximated sigmoid unit of the neurons of the last feedforward layer of the MNEO. As a result to these modifications and simplifications, a relatively small FPGA hardware model of 200,000 gates has been used to implement a relatively complex design. The system is tested by using the Optical Recognition Library(ORL) face database for face recognition problem and its performance is compared with the results obtained using advanced software system designed specifically for face recognition. The system is trained to recognize 12 different classes. The recognition rate achieved from both software and hardware versions were equal to 93% when 60(12x5) training image and 60(12x5) testing images were used. A speed up of (88) is achieved for the parallel architecture implemented in an FPGA ( XC3S200 operates in 50 MHz) as compared with the computer software (Pentium 4, 2.4 GHz). Also a performance of 1GCPS is achieved and seems reasonable when it is compared to the today available neuro-hardwares[1].
back to Accepted Papers Page


Multi Local Feature Selection Using Genetic Algorithm For Face Identification
Paper Number:    30
Abstract:
Face recognition is a biometric authentication method that has become more significant and relevant in recent years. It is becoming a more mature technology that has been employed in many large scale systems such as Visa Information System, surveillance access control and multimedia search engine. Generally, there are three categories of approaches for recognition, namely global facial feature, local facial feature and hybrid feature. Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This thesis presents an improved offline face recognition algorithm based on a multi-local feature selection approach for greyscale images. The approach taken in this work consists of five stages, namely face detection, facial feature (eyes, nose and mouth) extraction, moment generation, facial feature classification and face identification. Subsequently, these stages were applied to 3065 images from three distinct facial databases, namely ORL, Yale and AR. The experimental results obtained have shown that recognition rates of more than 89% have been achieved as compared to other global-based features and local facial-based feature approaches. The results also revealed that the technique is robust and invariant to translation, orientation, and scaling.
back to Accepted Papers Page


Enhance Traditional Search Engines For Efficient Images Searching
Paper Number:    37
Abstract:
The work of traditional search engines depends on a given keywords by the user and uses these key words for the search process. If we like to retrieve an image from the net, the search engine will look for the similar keywords to find the desired image. By finding the similar keywords and tags that define the image according to the given keywords without any respect to information inside the image itself, this will not give the search engine the ability for efficient retrieving and correct recognition for images. In this research we will propose a scheme to extend the search engine ability for efficient image searching and retrieving by using the image contents themselves in the searching process, this will include the image pixels, image objects and their features. This technique will limit the search for the desired images only.
back to Accepted Papers Page


�Natural Object Recognition for Digital Images
Paper Number:    41
Abstract:
In this search we depend on special algorithm for natural object recognition in the digital image through analysis between image texture by the use of fractal geometry then we calculate the fractal dimension for the texture for the purpose of image segmentation. And then we process every texture through finding features of the texture and determine the straight lines in it depending on hough transform and then we separate the texture that contains the less percent of the straight lines which the natural object and separate texture which has the high percent of the straight lines that is artificial part. Attended the algorithm applied on color images taken by digital camera we obtained have distinguish between the natural parts using a threshold 70% and with images size between [300-400] b/p, where a complete function build to apply the algorithm.
back to Accepted Papers Page


Implementation Of An Audio Watermarking System Using Cdma Modulation
Paper Number:    44
Abstract:
in this paper, we will present an audio watermarking system based on CDMA modulations. After having presented the watermarking structure and the configuration, we will develop the numerical implementation of our interface programmed under Matlab. Validation tests are conducted and effected in real time acquisition for the verification of the watermarking system performances and its robustness.
back to Accepted Papers Page


Urdu Character Recognition Using A Hidden Markov Model
Paper Number:   45
Abstract:
This paper presents a Urdu character recognition method based on hidden Markov model (HMM). The proposed method generates a Markov Model for each ligature where a transition from one state to another is governed by the probabilities. HMM�s are trained using Discrete Cosine Transformation (DCT) values that are calculated from the ligatures extracted from the scanned Urdu text. The major benefit of using HMM is that it has a great capability of catering for noise and variations in patterns, which is a core issue in pattern recognition. The paper presents experimental results to show the power and robustness of the proposed HMM based technique for Urdu character recognition, its fault tolerance, and high recognition accuracy.
back to Accepted Papers Page


Computer-Based Training: Case Study Of Bahrain Civil Aviation Affairs
Paper Number:    46
Abstract:
The diversity and availability of new training media are growing and providing valuable tools for organizations to train and develop their employees. Of particular growing interest is the medium of computer-based training (CBT). The main purpose of this research study is to demonstrate the problems and possibilities of implementing an on budget, on time, quality, easy to use and easy to run CBT courses. Bahrain-Civil Aviation Affaires (CAA) organization has been selected as a case study for this research. The research investigates CAA employees� attitudes towards CBT in terms of their interest in getting involved in it and the extent of preparation they have to use it. In other words, the research identifies and empirically tests factors that may influence CAA employees� use and acceptance of CBT as a tool for delivering training in future. The results revealed that successful implementations of CBT will depend on several factors and it concluded that there is strong opportunity to implement CBT in CAA.
back to Accepted Papers Page


Inaccessibility In Profibus Due To Transient Faults
Paper Number:   48
Abstract:
Fieldbus applications suffer from severe environmental conditions. These conditions may affect the communication process among different nodes. Because of the real-time nature of such applications, timing behaviour must be well designed and studied. PROFIBUS as one of the widely applied fieldbus protocols is considered here. This paper evaluates inaccessibility overheads in PROFIBUS protocol in the presence of transient faults. It introduces a novel analytical model for the inaccessibility of PROFIBUS message/token transmission in the presence of transient faults. Different error scenarios are suggested to produce best-case (BC) and worst-case (WC) error overhead evaluation that are based on the integration of single bit errors together with burst errors into a bounded fault arrival model. The introduced error components are included in the worst-case response time (WCRT) of PROFIBUS message cycles. This work is essential to assess the real-time behaviour of the protocol under the incidence of errors.
back to Accepted Papers Page


Spotted Words To Command A Set Of Mobile Robots
Paper Number:    50
Abstract:
An approach based on spotted word recognition system is applied to control a set of autonomous robots. The methodology adopted is based on hybrid techniques used in speech recognition which are zero crossing and extremes with dynamic time warping followed by a decision system based on independent methods test results. To test the approach on a real application, a PC interface was designed to control the movement of five mobile robots using a radio frequency transmission. Also, it was checked whether the basic commands used would be enough to control the robots. Some experiments are tested by actually running a set of powered-toy vehicle and each robot is secured from frontal collision by some sensors.
back to Accepted Papers Page


A Pipelined Fault Tolerant Architecture For Real Time DSP Applications
Paper Number:    54
Abstract:
This paper presents a new, expandable, pipelined linear array architecture designed for transparently tolerating processor failures for real-time DSP applications. The proposed system use twelve TMS320C40 DSP processors ( Processor Modules PMs ) to construct ten stages pipelined system with two spare processors (SPs). However, the system can be expanded by adding more DSP processors to increase the pipeline stages and the performance, and more spare processors to increase the dependability and reliability of the system. In Proposed scheme, the system can automatically reconfigure itself in the event of failure in one or two of its DSP processors and the computations continue unhindered without noticeable performance degradation. Each DSP processor communicates with neighboring processors through a high speed communication ports ( commport ). Some of these commports in every processor are used as a bypass links between the DSP processor and its adjacent PMs in case of failure of one or two processors. The system uses the forward-task-shift (FTS) mechanism to tolerate the fault by assigning the function of the failed processor to the next faultfree processor. Performance of the system is discussed in normal and fault conditions. The architecture, design, and operation of the system in event of fault have been described
back to Accepted Papers Page


Programming Design For Multi-Layer Mapping
Paper Number:    57
Abstract:
One of the basic parts which constitute the study of spatial information is the map projection. All projections have mathematical formulas which define the relationship between the latitude/longitude graticule on the earth and its representation on the map sheet, or the relationship between the geographic coordinates (latitude and longitude) of points and their projected coordinates (grid or rectangular coordinates) on the map. Adopting this concept, the mathematical derivations of the map projection are used in this paper as the basis for the design of software application which will be called MLM (Multi-Layer Mapping). The map projection model used here is a product of two conformal projection, these are : 1- Projection of ellipsoid onto a sphere. 2- Projection of the sphere onto a plane. The actual geographical coordinates of the earth ellipsoid are used in these projections within the MLM in order to display the interesting layers which constitutes the geographical map of the study area on the computer screen, the MLM dose also an inverse calculation of projection, i.e. when a user selects a point on the screen, it displays the corresponding values of the geographical coordinates for the selected point. The MLM provides the following main functions: display the grid of angles (latitude and longitude) for the study area, display multilayer features choosing by the user, producing geographical spatial information for any point on the map, computing of the distance between any two selected points on the stereographic plane, finally the printing of the study map
back to Accepted Papers Page


Derivation Of Information From The DEM To Support The Hydrological Sampling
Paper Number:    58
Abstract:

��� ������� ������ ������ DEM ������ �� �������� ��������� ���� ������� ������� ������ ��������� �� ����� ��������� ��������� ������� ������� ���� ���� ���� ���� �������� ������������� � ������������ ,��� ���� ������� ���� ����� ����� �������� ��������� �������� ������� ������������� � ������� ������������ ������� �������� ��� ����� ������ ������� ��� ���(XYZ) ���� �� ������ ������������� ������� ���� ����� ������� ���� ������� ���� �� ������� ������ ������ ��� ����� ������ �� ������� ����� ������ ������ ������� ����� ��� ������� ����� ��������� ��������� GIS �������� ������ �������� �������� ������������� � ������������ ����� (����) �� ������ ����� �������� ������ WMS 7.1 ���� ��� �� ���� ������� ��������� ���� ������ ������������ ������� �� ���� ������� �� ������� ������� ����� ������� ��� ������� ������������ ������ ���� ����� ,�������� ������� �������� �� ������ ������������� �������� ���� �� ������� ������ ������ ���� ��� ������ ������ ������� ������� . ���� ����� ��� ����� ����� ������ ������ DEM ������ �� �������� ��������� ���� ����(����) �������� ��������� �������� �������� ������������ �������� ����� ��������� ���������GIS .��� ����� ���� ������ ����� ,��� �� ������ ������ ��������N36EO41 HGT ����� ����� ������ �������� �� ������ ������� �������� NASA ����� ����� �������� ���� ���� ���� ����� ������ ������ �������� ����� Global mapper 8. �������9 . ARCGIS ������� WMS7.1 ���� �������� ������� �������� ���� ���� �� ������ ����� ����� �� ������� ��� ��������� ��������� ���� ����� ������� ������������ ����� (����) ���� ����� ������� ������ ������� ������ ������ �������� ������ ���� ������. ��� ����� ������� ��������� ��: 1- ����� ������� �������� ��������� ������ ������ ������ ���������� ��������� �� ����� ������� ������������ �������,����� ����� ����� ������ ������ ������ ������ �������� ��� ����� ������ ������� �� ������ �������������� ������������� . 2- ������� ������� �� ������� ��� �������� ��� ��� ������� ������� �� �������� ������� �� ���� ����� ��������� ������� ������ ������ ��������� ��������� ����� �������� ����� ������ �� �������� ��������� �� ������ ��������.


back to Accepted Papers Page


A New Arabic (Ahd/Amsh) Handwritten Database
Paper Number:   59
Abstract:
This paper introduces a new database for Arabic handwritten words. The Arabic handwritten database (AHD/AMSH) represents a utility to facilitate the experiments of the character recognition algorithms. It contains three types of images: word, isolated character, and digit images. The AHD/AMSH can be used for baseline detection, characters segmentation, normalization, thinning, training and testing purposes. The stages of construction of the AHD/AMSH database were planned carefully to ensure its excellence. 150 words, 35 courtesy amount and 20 digits were used by 82 writers in 5 different age groups to fill the form. The results were 12300 words, 29028 sub-words, 56170 characters, 2870 courtesy amounts, 820 Indian digits, and 820 Arabic digits. After dividing the database into two categories, training and testing, it has been tested manually and systematically.
back to Accepted Papers Page


Enhancement Of Vedio Transmission In Wcdma System Using Wavelet Transform
Paper Number:    63
Abstract:
Video transmission in Wideband Code Division Multiple Access (WCDMA) system has to use compression technique to overcome the channel bandwidth limitation problem. The video compression uses the Variable Length Coded (VLC,s) to obtain high compression. VLC,s is very sensitive to errors in the transmission channel . Many methods are proposed to protect the video stream. This paper proposes a new method using hybrid Discrete Wavelet Transforms (DWT) & Discrete Cosine Transform (DCT) technique to protect the more visually important VLC,s coefficients in video signal and improve the performance of the video transmission at lower values of Signal to Interference Noise Ratio (SINR).
back to Accepted Papers Page


Epoch Time Estimation of the Frequency Hopping Signal
Paper Number:    64
Abstract:
The paper investigates the epoch time parameters estimation of the frequency hopping FH signals, which are of major interest in most of the recent commercial applications. Two types of estimation models have been simulated and examined in this work. The first is the single-hop autocorrelation (SHAC) processor. It is considered as a means of estimating the epoch time of the FH signal in the presence of AWGN. The second is the expanded multiple stages-frequency hopping-hop rate detector (EMS-FH-HRD). The latter has been modified in this work from the hopping rate detector, which detects only the presence of the FH signal, and operated in noisy environment. These two were independent of the hopping frequency pattern and the carrier phase (the sequence of the hopping frequencies is totally unknown. These models have been simulated using Matlab version 6.5 and examined in AWGN environment. The results show that both SHAC and EMS-FH-HRD give acceptable results. The percentage of error increases as the SNR decreases. Furthermore, the EMS-FHHRD gives better results than that of the SHAC and have no ambiguity as that SHAC at certain conditions. The advantage of EMSFH- HRD epoch time estimator over SHAC is that it could estimate the normalized epoch time with very low percentage error and at even more condition where the SHAC fails.
back to Accepted Papers Page


An Experimental Result On Segmentation Of Malay Spontaneous Connected Digit Speech Using Divergence Algorithm
Paper Number:    65
Abstract:
This paper presents a segmentation analysis on Malay digits in spontaneous mode. Segmentation is done in time domain using statistical approach namely divergence algorithm. The experiment conducted using speech uttered in classroom environment by 39 speakers consists of 13 males and 26 females. The result shows that given a lengthy time tolerance, lower threshold and higher order of auto regression model give better match and less omission. However, these factors lead to increase number of insertion.
back to Accepted Papers Page


Transformation of Descriptors to Compare Noisy Silhouettes
Paper Number:   66
Abstract:
In this paper we propose a new method for silhouettes comparison based on textual description according to LWDOS langage [1]. Sometimes, even silhouettes appear identical, their LWDOS detailed descriptors may be very different therefore we wrongly conclude that the two silhouettes are different. we develop, in this approach, a set of approximation rules in order to deduce the same detailed descriptor from the two slightly different descriptors of two silhouettes
back to Accepted Papers Page


Vehicle Warning System: Driver 's Reaction Factor
Paper Number:    68
Abstract:
Several Automobile accidents are happening due to many reasons, some are the style/reaction of the driver and lack of warning systems in the vehicle. To design a warning system, a history of the vehicle movement within a certain event and a knowledge about the style of the driver are very important factors which have to be considered. For sure, the history of the events can be useful to decide whether the driver is going to make a crash or not, but also the style of the driver is very important. In many similar cases, drivers may behave differently. To clarify the point, in certain cases, some drivers stop directly, decrease the speed, increase the speed, proceed a vehicle or might do nothing. This variation in the reaction of the driver must help the warning system to take the proper action. The ordinary warning systems are based on set of sensors that help in taking the decision of the warning system. In our case, the driver 's style as input is added to other inputs and a recommended reaction for the driver is among other system 's outputs. In this paper, we present a theoretical view to include the driver 's style input among other inputs with also consideration of the situation at the back of the vehicle. In addition to the expected output of the warning system, whether the vehicle is going to make a crash or not, and the expected crash time, the proper recommended reaction is also considered. The proposed scheme is based on both the neuroevolution approach and backpropagation algorithm. The view we present here is a theoretical view that can be improved towards a solution to a learning-based warning system.
back to Accepted Papers Page


Neuro-Wavelet Techniques for GSI Denoising
Paper Number:    69
Abstract:
This paper describes a new method of removing additive white noise of known variance from photographic images. This method is based on a characterization of statistical properties of natural images represented in complex wavelet decomposition. Specifically, we decompose the noisy image into wavelet subbands, denoising the subbands using wavelet. The proposed method is more efficient compared to use the wavelet techniques only. In this paper six methods are used to estimate the threshold value.
back to Accepted Papers Page


Evaluation Of The Relevance Of The Industrial Maintenance Diagnosis Methods
Paper Number:    71
Abstract:
To offer to the companies the means to choose the diagnosis tool to implement or to buy represent an important financial profit in a competing context. Thus, to ensure the company that the proposed tool is most adequate according to there production nature forces to set up the means of identifying the needs for each company. The presented work, falls under the optics which aims at removing or to attenuate the impact of the unfruitful tests of installation of diagnosis tools for the good functioning of a company. Development of the Multicriterion Diagnosis System MDS is a response to the problem. The MDS is an integrated tool for the choice of the most relevant diagnosis system. This tool was developed by using the multicriterion approach Electra III. While basing itself on a set of criteria as well as a set of diagnosis tools thoroughly selected and implemented for the circumstance, namely: expert system diagnosis which models knowledge in the form of rules, Markov chain whose models knowledge in the form of probabilistic graphs realized using an iterative algorithm Baum Welch as well as the Viterbi algorithm for the generation of the failures effects sequence and Bayesians networks which formalizes the knowledge of experts in the form of a graphic model representing conditional independences between a set of variables, the inference JLO algorithm which we have applied to the diagnosis problem allowed us to determine the cause of the physical failure system. Lastly, the model of failure was carried out using the current tool for diagnosis FMEA (failures Mode and effects Analysis). The developed tool allows on the one hand, to guide the maintenance expert to choose the diagnosis system to be adopted, and on the other hand, to carry out a fast and effective diagnosis. In order to validate our work, we applied the tool to an industrial process of an Algerian company of the iron and steel sector. This enabled us to show the effectiveness of this type of tool in term of availability and reduction of the downtime of the machines.
back to Accepted Papers Page


An Ecc-Based Authentication And Key Agreement Protocols For Virtual Classes Security
Paper Number:   72
Abstract:
A new end-to-end authentication and key agreement protocol based on Elliptic Curve Cryptosystem (ECC) is proposed. It is designed to satisfy the security features required in virtual class and provides enhanced performance in terms of bandwidth, storage and computation constraints. Moreover, it provides mutual authentication, non-repudiation, student identity, confidentiality, and a unique session key for each data, voice or video. The protocol targets not only laptop computers and cellular phones but also the up-to-date wireless products such as smart phone using XML based wireless services, personal data assistants (PDAs) as well as secure web connections over the wired networks. The protocol permits user to negotiate on the secret key algorithm for interoperability and support PKI certificates to provide authentication for the students to perform legal operations.
back to Accepted Papers Page


A New Approach To Component's Port Modeling In Software Architecture
Paper Number:    73
Abstract:
Nowadays, Modeling of component's port is typically based on interfaces, which heavily constrain the definition of an application's architecture. This is mainly due, to the fact that, software architecture imported only the general concepts of its fundamental elements from related fields such as computer and network architecture, and did not show interests on how these concepts are organized and used in these fields in the process of defining miscellaneous architecture. To limit the interface constrains we have defined a port model, inspired from these related fields where the activity of defining architecture has reached a high degree of maturity. The port model is completely independent from interface concept. It allows the free manipulation of its internal structure and the specification of various controls over port and component. With these capabilities, the port model opens a new way, not supported by nowadays software architecture tools, to specify any topology an architect can imagine. In addition, the port represents one of the fundamentals elements supporting the aspect orientation of our approach to software architecture. The aspect orientation is supported through aspect ports, representing aspect's join point, which must be connected to specific aspect components
back to Accepted Papers Page


Word Stemming For Arabic:The Case For Simple Light Stemming
Paper Number:    75
Abstract:
Although a number of attempts have been made to develop a stemming formalism for the Arabic language, most of these attempts have focused merely on the lexical structure of words as modeled by the Arabic grammatical and morphological lexical rules. This paper discusses the merits of light stemming for Arabic data and presents a simple light stemming strategy that has been developed on the basis of an analysis of actual occurrence of suffixes and prefixes in real texts. The performance of this stemming strategy has been compared with that of a heavier stemming strategy that takes into consideration most grammatical prefixes and suffixes. The results indicate that only a few of the prefixes and suffixes have an impact on the correctness of stems generated. Light stemming has exhibited superior performance than heavy stemming in terms of over-stemming and under-stemming measures. It has been shown that the two stemming strategies are significantly different in retrieval performance.
back to Accepted Papers Page


Constellation Discovery From Oltp Parallel-Relations
Paper Number:    77
Abstract:
correlated data, i.e., data coming from multiple facts. Constellation schemes provide for this kind of need. In order to help the decisional designer construct efficient data marts, we propose a method that discovers and constructs constellation schemes directly from the relational database of the enterprise information system. For this, we define the concept of parallel-relations on which we base this construction and, a set of construction rules. Parallel-relations materialize interrelated business activities and therefore are good candidate for constellation construction. The construction rules extract multidimensional concepts; they build facts and measures on parallel-relations and, dimensions and their attributes on relations connected to parallel-relations. Our rules have the merit to produce dimensional attributes organized in hierarchies and, they keep track of the origin of each multidimensional component in the generated data mart schema. This trace is fundamental for the ETL processes
back to Accepted Papers Page


Dynamic Systems Analysis: The Technology Acceptance Model
Paper Number:    80
Abstract:
Research in the area of technology acceptance concentrated on the static view of models, where life is not static in most cases and approximating relationships towards a static view is not that accurate. Dynamic analysis is an old concept but rarely been applied to behavioral models. This paper describes an extensively researched model in the area of technology acceptance: the Technology Acceptance Model (TAM) by Fred Davis. The work analyzes the model from three dynamic perspectives and does this analysis based on Melcher's guidelines in theory building standards. The analysis concentrates on the definition of variables, and the causality and interdependence concept. Then, the paper analyzes the model based on prevailing theories in the dynamic analysis domain and contrasts that to the static view. Conclusions and future research are portrayed at the end of the paper
back to Accepted Papers Page


Tree Based Load Balancing Strategy In Computational Grid
Paper Number:    87
Abstract:
Workload and resource management are two essential functions provided at the service level of the Grid software. To improve the global throughput of these environments, effective and efficient load balancing algorithms are fundamentally important. Although load balancing problem in classical distributed systems has been intensively studied, new challenges in Grid computing still make it an interesting topic, and many research projects are under way. This is due to the Grid characteristics and to the complex nature of the problem itself. This paper presents a task load balancing model in Grid environment. First we propose a tree-based model to represent Grid architecture in order to manage workload. This model is characterized by three main features: (i) it is hierarchical; (ii) it supports heterogeneity and scalability; and, (iii) it is totally independent from any Grid physical architecture. Second, we develop a hierarchical load balancing strategy to balance tasks among Grid resources. The main characteristics of proposed strategy are:(i) It uses a task-level load balancing; (ii) It privileges local tasks transfer to reduce communication costs; (iii) It is a distributed strategy with local decision making.
back to Accepted Papers Page


An E-Mail Server-Based Spam Filtering Approach
Paper Number:    88
Abstract:
The spam has now become a significant security issue and a massive drain on financial resources. In this paper, a spam filter is introduced, which works at the server side. The proposed filter is a combination of antispam techniques. The integrated solution create a spam filtering system which is more robust and effective than each of the comprising techniques.The task of proposed filter is to minimize the ability of the spammers to distract the network by the spam. That is done by blocking the spam messages at the server level. A server-based solution is normally more advantageous than protecting e-mail users individually. Such a solution gives more control to administrators.
back to Accepted Papers Page


Supervision As An Aid To Reinforcement Learning For Autonomous Agents
Paper Number:    90
Abstract:
Reinforcement Learning (RL) is a class of model-free learning control methods that can solve Markov Decision Process (MDP) problems. However, one difficulty for the application of RL control is its slow convergence, especially in MDPs with continuous state space. In this paper, a modified structure of RL is proposed to accelerate reinforcement learning control. This approach combines supervision technique with the standard Q-learning algorithm of reinforcement learning. The a priori information is provided to the RL learning agent by a direct integration of a human operator commands (a.k.a. human advices) or by an optimal LQ-controller, indicating preferred actions in some particular situations. It is shown that the convergence speed of the supervised RL agent is greatly improved compared to the conventional Q-Learning algorithm. Simulation work and results on the cart-pole balancing problem and learning navigation tasks in unknown grid world with obstacles are given to illustrate the efficiency of the proposed method.
back to Accepted Papers Page


Optimization Using New Real-Coded Ga Hybridized with Simulated Annealing
Paper Number:    91
Abstract:
Both simulated annealing SA and the genetic algorithms GA are stochastic and derivative-free optimization technique. SA operates on only solution at a time, while the GA maintains a large population of solutions, which are optimized simultaneously. Thus, the genetic algorithm takes advantage of the experience gained in past exploration of the solution space. Since SA operates on only one solution at a time, it has very little history to use in learning from past trials. SA has the ability to escape from any local point; even it was the global one. On the other side, there is no guarantee that the GA algorithm will succeeded in escaping from any local minima, thus it makes sense to hybridize the genetic algorithm and the simulated annealing technique. In the present study, a new genetically annealed algorithm is proposed and is tested against multidimensional and highly nonlinear cases; Fed-batch fermentor for Penicillin production, and isothermal continuous stirred tank reactor CSTR. It is evident from the results that the proposed algorithm gives good performance.
back to Accepted Papers Page


Computer-Aided-Design of a Magnetic Lens Using a Combined Dynamic Programming and Artificial Intelligence Techniques
Paper Number:    93
Abstract:
A computer aided design (CAD) by using optimization methods for designing magnetic lens, by mixing the dynamic programming procedure and artificial intelligence technique. CADION package has been designed and written in Java expert system shell (JESS 6.1) and Visual Basic 6 (VB6) for optimizing and analyzing full calculation processes. The optimized axial magnetic flux density according to the constraints has been used in the design of pole pieces.
back to Accepted Papers Page


An Approach based EGP for the Interoperability of E-government Services
Paper Number:    94
Abstract:
The e-government implies an interoperability between the various existing administrative services so that the work of institutions can be more transparent for the citizen, more reliable and economic. This interoperability is the key problem in the developpemnt of the e-government services. In this context, we define an approach to implement the mechanism of interoperability of the information system of the e-government. We propose an applicatif protocol based on TCP/IP which allows the technical interoperability by ensuring the data exchange between the PA. A case study was developed to validate the approach suggested and some interfaces developped were presented.
back to Accepted Papers Page


A Framework for E-learning and Web Teaching System
Paper Number:    96
Abstract:
The aim of this paper is to design and implement a framework for e-learning and web teaching system in delivering (courses, lessons, examples, exercises, exercise solutions, self evaluation test, send and receive report) via web technology and database system. We proposed an e-learning system which is divided into three interfaces (1-Administrator 2-Instructor 3-Student). This system has been developed to provide e-learning solutions over Internet or intranet and represents the new technology of education, significantly improving the learning process especially for universities. In the proposed system we used the following technologies:- 1- HTML (Hypertext Markup Language). 2- SQL Server 2000 (Structured Query Language). 3- ASP (Active Server Page).4- ADO (ActiveX Data Object). Proposed system design consists of:- 1- System structure for e-learning system. 2- Flow diagrams for (1-Administrator interface 2-Instructor interface 3-Student interface 4-E-learning system) 3- Flowcharts for implementation (1- Administrator interface 2- Instructor interface 3- Student interface). 4- Database diagram for proposed e-learning system.
back to Accepted Papers Page


A Driver-Based Reliable Distributed Firewall System
Paper Number:    98
Abstract:
This paper proposes a Reliable Distributed Firewall System (RDFS), which is a client-server network paradigm. The system consists of two elements: a Distributed Firewall-Client, which captures every transmitted or received packet, originated from or received by the client machine, and then applies the filtering rules on these packets. The second element is the Firewall-Controller designed as a user friendly GUI, which manages the Firewall-Clients on all the machines. It can read, write or modify the rules for each client individually through authenticated and secured communication channels. Each Firewall-Client uses the Firewall-Hook Driver on Windows platform as the firewall application. The proposed distributed system addresses the shortcomings of the conventional firewall as being the networks� bottleneck. This is done by decentralizing the packets filtering processes and making them work independently. This would increase the system availability and at the same time protect against internal attacks, which is unfeasible using the conventional firewall setup. In addition, the system can be configured for fail-over mode, by imposing a dual controller. This would enhance the overall system availability remarkably. Policy optimization techniques for rules and security policies are developed to reduce the processing requirement per packet, thus faster filtering speed can be achieved.
back to Accepted Papers Page


HRO Encryption System
Paper Number:    100
Abstract:
Encryption is the process of translating data into a secret code. This paper intends to introduce a new encryption system (HRO system). This system is a combination of three known algorithms: hash based encryption algorithm, RSA algorithm, and one-time pad algorithm. The purpose of HRO system is to expedite the encryption and decryption processes and to reduce the vulnerability of the system to external attacks. HRO system uses hash function and random number generator to increase security. Some conclusions that are arrived at concern the performance of the algorithm, hash function, random number generator and the time of encryption and decryption.
back to Accepted Papers Page


Fast Technique for Handwriting Arabic Character Recognition using Haar Wavelet Compression
Paper Number:    105
Abstract:
The typical Optical Character Recognition (OCR) systems, regardless the character�s nature, are based mainly on three stages, preprocessing, features extraction and discrimination (recognizer). Each stage has its own problems and effects on the system efficiency such as time consuming and recognition errors. In order to avoid all of these difficulties, this research paper aims to integrate all stages in one stage used for handwriting Arabic characters, based on the wavelet compression. The algorithm is introduced, the experimental work is illustrated and the results are discussed as well as the future recommended work. 
back to Accepted Papers Page


Comprehensive Study for Five Digital Watermark Systems
Paper Number:    106
Abstract:
Due to the popularity of the Internet and advanced multimedia packages, the copying and transferring of digital products such as images are increasingly used illegally. Therefore, it is important to protect the copyright ownership over digital networks by digital watermarking technique. Many digital watermarking algorithms have been developed which claimed to be robust, imperceptible and secure. While most of the available research papers have focused on developing new algorithms for embedding watermark, no researches have looked at the behaviour of the watermark attacks and build the complete history of the behaviour for each of these attacks, which will lead us to build more robust and advanced methods that can survive various manipulation and attacks. Therefore, this paper examines the different existing digital watermarking techniques with different attacks.
back to Accepted Papers Page


Procurement Process Simplification through E-Commerce in B2B Market of Iran
Paper Number:    108
Abstract:
Today, e-Commerce has become part of the daily routine and improvement in the related applications will make business easier than ever. The purpose of this paper is to build a model of factors that can be used in business process reengineering of procurement process by simplifying important variables in procurement through e-Commerce. Quantitative approach was employed for analyzing data through a survey which was drawn among 250 managers of large enterprises involved in procurement, logistics and informatics in all industries active in Iran. According to the results of the research, a model of factors named "business data processing simplicity" has been developed. It has been conducted through Principal Component Analysis and the results present that those big industries intend to succeed in electronic procurement process implementation, should start reengineering following sub-processes as the most important factors: Receiving of delivery data Announcement, possible supplier�s requisition request, transport ordering, reclamation solving and bidding where respondents see high possibilities to simplify them by e-Commerce. Finally, we compared the results with the data from a previous study of Slovenia situation. In this sample, the majority of the Iranian managers valued that e-Commerce would significantly simplify Procurement Process the same as the Slovenians. The model of factors extracted from the Iranian data as a developing country in Middle East in comparison with Slovenia as an European country, was a little bit different, however, both covers the process re-engineering in two category of �Business Preparation Simplicity� and � Business Operation Simplicity� including different sub-process.
back to Accepted Papers Page


Multi-Speaker Text-Independent Speaker Verification using Wavelet and Neural Network
Paper Number:    110
Abstract:
Abstract:
Automatic speaker recognition systems use machines to recognize a person from a spoken phrase. These systems can operate in two modes: to identify a particular person or to verify a person�s claimed identity. Personal identity verification is an essential requirement for controlling access to protected resources or in forensic applications. One of the still challenging fields in speaker recognition is to verify a person in a multi-speaker environment. The multi-speaker recognition task has been in the NIST (National Institute of Standards and Technology) evaluation plan since 1999. However, the researches done in this field are not sufficient and there are very few as compared the single speaker recognition systems. In this paper, a new speaker recognition system was proposed and tested for one and multi-speaker task. The system was constructed of a wavelet decomposition front end followed by a linear predictive coding cepstral feature extractor. The matching process was accomplished by a probabilistic neural network (PNN) with a background model as an imposter reference. The proposed system was able to reach an equal error rate (EER) of 2.35% for a one speaker male gender dependent system and an EER of 3.35% for a one speaker female gender dependent system. For the two speakers and at a target to imposter ratio (TIR) of 3db the male gender dependent system had an EER of 8.7%, while for female system the EER value was 17%. The TIMIT corpus was used as the system evaluation database.
back to Accepted Papers Page


Identification and Control of Robot Manipulator Using Fuzzy Wavelet Network
Paper Number:    111
Abstract:
Wavelet transform is a useful tool for function estimation and signal processing; nevertheless wavelets are limited to small dimensions. The combinations of wavelet transform (WT) and neural networks (NN) will lead to overcome these limitations of large dimension efficiently. Wavelet networks (WN)s have been developed for their abilities of self-learning and self organizing. WNs have been successfully demonstrated to have potential in many applications. Although, controller design can be considered as signal approximation, and wavelet transform is a powerful tool in this field, yet its applications in the process control and identification areas have not been investigated deeply . In this paper a new structure of Fuzzy Wavelet Network (FWN) is proposed to identify Multi-input Multi-output complex nonlinear systems. It was found that the FWN performance depends on the selection of mother wavelet basis function and the associated number of wavelons. The FWN is used to replace the linearization feedback of a robot arm that has four inputs and four outputs. Thus the FWN was employed as an identifier and it gave good results and fast convergence for the non parametric function under consideration in comparison with conventional Neural Network as well as, it was shown that one set of data is sufficient during off-line learning. In Two Flexible Joints Robot Manipulation under consideration, the static learning of FWN structure can achieve robustness behavior in dynamic control. The stiffness of the FWN to avoid change of robot parameters was up to �50% of its nominal values.
back to Accepted Papers Page


Design of Multi Wavelet Network Identifier for Multi Input Multi Output Nonlinear Functions
Paper Number:    113
Abstract:
A proposed multi wavelet network are used in identification problems of nonlinear systems. A multi wavelet network is constructed as an alternative to a neural network to approximate a nonlinear system. Based on this multi wavelet network approximation, suitable for multi input multi output nonlinear uncertain (or unknown) functions such as robot manipulator.
back to Accepted Papers Page


The Impact of Partitioning on Performance of Database and Data Warehouse Systems
Paper Number:    116
Abstract:
The increase in power and capacity of hardware systems coupled with the decrease of hardware costs made it possible for institutions and corporations to store larger quantities of data in their database and warehouse systems than ever before. Multi-terabyte databases are becoming more widely spread than in the past. This creates a need to improve the performance of data retrieval and data manipulation operations in such large databases. Techniques such as bitmap indexes, materialized views, and partitioning have been incorporated in many state-of-the-art database management systems. In this paper, we provide an overview of the different partitioning techniques that have been introduced in the literature, then we present the results of an analysis that quantitatively demonstrates the positive impact that partitioning can have on query performance in database and data warehouse systems.
back to Accepted Papers Page


Automatic Processing of CV : A Linguistic Approach
Paper Number:    119
Abstract:
This article describes an information extraction system to solve problems with which the companies and the private individuals are confronted and more particularly the professionals of recruitment and persons in charge for HR concerning the data capture and the selection of the applications. It uses a set of linguistic diagrams to extract relevant information and to organize them in templates. It makes it possible to absorb entering flows of applications resulting from various sources, to extract, standardize and qualify partly information useful for recruitment. The performances of the system depend closely on the quality of this linguistic knowledge. The acquisition of this knowledge needs a systematic search of the texts of the application field in order to accumulate the diagrams. This search is completed by a linguistic reflection, in order to release the textual regularities.
back to Accepted Papers Page


A Randomization Method to Correctly Estimate Overall Significance in Best Subsets Regression
Paper Number:    120
Abstract:
Best subsets regression is often used to identify a good regression model. The standard approach to assess statistical significance for a best subsets regression model is flawed. The extent of the bias is non-trivial. A computationally intensive randomization algorithm is implemented. Simulation studies demonstrate that the algorithm overcomes the bias in a null model and power is retained in a non-null situation.
back to Accepted Papers Page


Performance Evaluation of WCDMA Uplink System Over Dispersive Channel
Paper Number:    122
Abstract:
In this paper we have simulated and evaluated the performance of WCDMA uplink system for mobile communications over dispersive channel. We have built a simple simulator for WCDMA for UMTS systems. Achievement of simulation has been done by the use of MATLAB. It is found that the dispersive channel affects the system performance drastically, especially by the increase of number of users.
back to Accepted Papers Page


Fractal Dimension as a Feature Extraction for Arabic Character
Paper Number:    123
Abstract:
In this research, an algorithm based on the fractional dimension value that was applied as a distinctive feature of the printed Arabic character. The aforementioned algorithm include some of the necessary processing�s in order to prepare images of the printed Arabic characters, such as: cut all the excessive spaces from the image of the printed Arabic character, applying a constant standard size for processing, a constant thinning for the image of the printed Arabic letter until attaining the structure of the character, appeared that the fractional dimension values for the images of the printed Arabic characters, which are relatively separated are constant for the character when its size is different. There had been a necessity to apply another extra features along with the value of the fractional dimension for the character's image, such as: the size of the letter, the type of handwriting and the type of the character and size of the character's images before and after processing, the number of the light pixels before and after processing and number of boxes applied for processing. Practical application of the algorithm used in the research provide high stability for the values of the fractional dimension and a precise recognition for all the separated printed Arabic letters.
back to Accepted Papers Page


Investigation of The Effect of The Feed Point Distance From The Center of The Patch Antenna, on The Performance of The Antenna in ( S ) Band Frequency
Paper Number:    124
Abstract:
Antennas are very important elements in the communication systems because they connect between space and electronic devices. Thee basic function for any antenna transfers large possible amount of information signal from transmission lines to the space for transmitter port and vice versa for received port. When antenna is failed all communication system are became use less. The patch antenna is a rectangular piece of a conductor mounted on ground plane. The antenna dimensions are almost square area with dimension of half wavelength. The dielectric between the conductor and the ground plane could be air, silicon, or any other dielectric (insulator). Microstrip patch antenna array could be used indoor or outdoor applications, because it is integrated with environment of the surface mounted on it. Microstrip patch antenna is used in wireless LAN with VSWR less than 2:1 in the frequency range 2.4 � 2.484 GHz. It is also used in GPS system in frequency of 1575 MHz. It is also used in mobile communication in the range of 1850 � 1990 MHz. In this investigation the position of feeding point is varied because it effects the shape of the loop, the return loss and the beam width. So the properties of the radiation were investigated for different position of the feed point and the results were discussed.
back to Accepted Papers Page


A Combination Method of Acoustic Features in A Hybrid Hmm/Ann System for Arabic Speech Recognition
Paper Number:    125
Abstract:
State-of-the-art speech recognition systems generally relies on hidden Markov models (HMMs). HMMs suffer from intrinsic limitations mainly due to their arbitrary emission density estimation. Artificial neural networks (ANNs) appear to be a promising alternative to this respect. This fact led to the idea of using HMMs and ANNs within a unifying novel method known as hybrid HMM/ANN. The most successful hybrid system for speech recognition is the Bourlard and Morgan�s paradigm. In this paper, we propose a combination scheme of several individual HMM/ANN hybrid systems trained each on different acoustic representation of the same speech frame. Our proposed approach tested on two tasks of speech recognition, isolated and connected Arabic digits (0-9) recognition, yields to a relative slight reductions in word error rate for the two tasks compared with a system using only HMMs and with Bourlard and Morgan�s hybrid system.
back to Accepted Papers Page


A Spectrum Method for Natural Language Text Watermarking Technique
Paper Number:    126
Abstract:
Natural language text watermarking, means embedding the watermark into a text document, using the natural language components as a carrier, in such a way that, modifications are imperceptible to the readers and the embedded information is robust against possible attacks. The watermark embedding scheme can either embed the watermark directly into host data or to a transformed version of the host data. In this paper a transform watermark embedding scheme is used for watermarking natural language text is proposal by using the spectrum method. Also explore various ways of natural language text watermarking. The results show that, the proposal technique is a successful one in implementing methods like, natural language text watermarking using spectrum transformation
back to Accepted Papers Page


A Natural Language Steganography Technique for Text Hiding Using LSB's
Paper Number:    127
Abstract:
Steganography is the art of hiding, and transmitting information using apparently innocent carrier without expose any suspicion. This paper present a natural language steganography technique, which is different from all the natural language steganography technique, that uses structure of the sentence constituents in natural language text in order to insert a secret hidden information, or all others techniques, which hide information by modifying the appearance of text elements, such as lines, words, or characters. The proposal technique use the secret hidden text information to generated the stego-cover carrier text by using algorithms depend on natural language processing, particularly text generation field. A survey for natural language terminology, techniques, and tools for text processing Also natural language steganography technique and its difficulties to implement methods like LSB's is presented. The results shows that, the proposal technique is, a successful one in implementing methods like, LSB's for natural language bit steganography .
back to Accepted Papers Page


A Content-Based Authentication Using Digital Speech Data
Paper Number:    128
Abstract:
A watermarking technique for speech content and speaker authentication scheme, which is based on using abstracts of speech features relevant to semantic meaning and combined with an ID for the speaker, is proposed in this paper. The ID which, represents the watermark for the speaker, is embedded using spread spectrum technique. While the extracted abstracts of speech features are used to represents the watermark for the speech, is embedded in the original speech file using secret key. The abstracts speech feature is implemented using B-spline carve interpolation. The paper provides a background knowledge for the concept of speaker watermarking and content-fragile watermarking based on digital speech data. Then, the suggested feature based authentication scheme is develop and the results from the evaluation are presented. It shows that the suggested scheme is a successful for combining speech and speaker watermark authentication.
back to Accepted Papers Page


An Efficient Distributed Pattern Matching Approach Based on Multithreading
Paper Number:    129
Abstract:
Despite of the dramatic evolution of processors technology we still need to devise new efficient search algorithms to speed up the search task. This paper presents an efficient �especially in large data-distributed and multithreaded string matching approach in a homogeneous distributed environment. The main idea of this approach is to have multiple agents that concurrently search the text, each one from different position. By searching the text from different positions the required pattern can be found more quickly than by searching the text from one position (from the first position to the last one). Concurrent search can be achieved by two techniques; the first one is by using multithreading on a single processor, in this technique each thread is responsible for searching one part of the text. The concurrency of the multithreading technique is based on the time sharing principle, so it provides us of an illusion of concurrency not pure concurrency. The second technique is by having multiprocessor machine or distributed processors to search the text; in this technique all of the processors search the text in a pure concurrent way. Our approach combines the two concurrent search techniques to form a hybrid one that takes advantage from the two techniques. The proposed approach manipulates both exact string matching and approximate string matching with k-mismatches. Experimental results demonstrate that this approach is an efficient solution to the problem in a homogeneous clustered system.
back to Accepted Papers Page


A Framework to Automate The Parsing of Arabic Language Sentences
Paper Number:    130
Abstract:
This paper proposes a framework to automate the parsing (�����) of Arabic language sentences in general, although it focuses on the simple verbal sentences but it can be extended to any Arabic language sentence. The proposed system is divided into two separated phases which are lexical analysis and syntax analysis. Lexical phase analyses the words, finds its originals and roots, separates it from prefixes and suffixes, and assigns the filtered words to a special tokens. Syntax analysis receives all the tokens and finds the best grammar for the given sequence of the tokens by using context free grammar CFG. Our system assumes that the entered sentences are correct lexically and grammatically.
back to Accepted Papers Page


Quantum Dijkstra�s Algorithm for Computer Network Routing
Paper Number:    131
Abstract:
The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in the quantum environment and to deal with the demands of continuous growing of the internet. This algorithm is compared according to the number of iterations and time complexity with Dijkstra�s algorithm and the result shows that the quantum approach is better in finding the optimal path with better time complexity when it is implemented in quantum computer.
back to Accepted Papers Page


Spotted Words Recognition System Based On  
Paper Number:    133
Abstract:
A voice command system for a robot arm is designed as a part of a research project. The methodology adopted is based on a spotted words recognition system based on a robust HMM ( Hidden Markove Model) technique with cepstral coefficients as parameters used in automatic speech recognition system. To implement the approach on a real-time application, a Personal Computer parallel port interface was designed to control the movement of a set of stepper motors. The user can control the movements of 8 degree of freedom (DOF) for a robot arm using a vocal phrase containing spotted words. Other applications are proposed.
back to Accepted Papers Page


SOM-Based Clustering of Textual Documents Using Wordnet  
Paper Number:    134
Abstract:
The classification of textual documents has been the subject of many studies. Technologies like the web and numerical libraries facilitated the exponential growth of available documentation. The classification of textual documents is very important since it allows the users to effectively and quickly fly over and understand better the contents of large corpora. Most classification approaches use the supervised method of training, more suitable with small corpora and when human experts are available to generate the best classes of data for the training phase, which is not always feasible. The non supervised classification methods make emerge latent (hidden) classes automatically with minimum human intervention, There are many, and the SOM (self Organized Maps) by kohonen is one the algorithms for non-supervised classification that gather a certain number of similar objects in groups without a priori knowledge. In this paper, we propose non supervised classification of textual document using the SOM of kohonen and based on a conceptual representation of the texts.
back to Accepted Papers Page


Application of Remote Sensing and GIS Techniques for
Paper Number:    136
Abstract:
Soil is an essential part of any terrestrial ecosystem. Physical and chemical properties have studied for many years for agriculture and soil conservation. These studies usually require field sampling and laboratory analysis that are time-consuming. Remotely sensed data are an alternative that provide reliable information at low cost save in efforts and time. The objective of this study was to evaluate the usefulness of Landsat ETM+ data and GIS techniques to classify soil in wet land area (Marsh region) south of IRAQ. In this study, satellite remote sensing data have been processed and manipulated in computerized GIS manner to build-up digital information database in order to detect the soil classification and some of its chemical properties that affect on the spectral response of soil in the overall study region. The main results of this study show that the selected visible bands in the digital visual interpretation process are considered as the best for identifying soil-mapping units. The digital map of unsupervised classification gives good presentation of some of the main land cover classes and merges the others, whereas the supervised classification gives good presentation of the main land cover classes with overall accuracy of (99.7%).
back to Accepted Papers Page


FPGA Implementation of The Aes Encryption and Decryption Algorithms
Paper Number:    139
Abstract:
In this paper, the feasibility of creating a very compact FPGA implementation of the AES was examined. The proposed folded architecture achieves good performance and occupies less area. This compact design was developed by the examination of each of the components of the AES algorithm using ECB mode and matching them into the architecture of the FPGA. The demonstrated implementation fits in Xilinx XC2V2000-4FF896 FPGA. Only 34% of the logic resources available in this device were utilized. This implementation can encrypt and decrypt data streams up to 235 Mbps. The Architecture has been tested and validated on the NIST vectors tests Benchmarks. However, in future work, we aim to test and validate our architecture on medical and satellite images. And adapt our design, in order to fit it in Xilinx Virtex II XC2V1000-4FG456C of the Memec Virtex II System Board .
back to Accepted Papers Page


Using MdA for Integrating Web Services in The Workflow Systems
Paper Number:    140
Abstract:
Workflow Management Systems (WfMS) support the definition, management and execution of business processes inside organizations. However, they suffer from lack of flexibility. They are inappropriate to support easily some mechanisms such as cooperative interactions and exchanging data. Indeed, one of the most important requirements emerging from new workflow applications that must be permanent for the process definition is the ability of communicating with outside organizations (partners, clients, and supplier) and incorporating them in a process. In the last years, Web Services are emerged as a major evolution in technology to provide relationships among inter-enterprises and enterprises-costumers. Hence, we try to exploit this to integrate a web service in WfMS. However, those enterprises rely on the wide variety of languages and technologies which are heterogeneous and in permanent evolution. Consequently our proposed approach is based on principles of MDA (Model Driven Architecture).
back to Accepted Papers Page


Of Π-Calculus Towards PVS: an Approach for The Software Architectures Check
Paper Number:    142
Abstract:
The users are more and more demanding towards their software. They wait for a big reliability, for a number ceaselessly increasing of services, the respect for constraints of conviviality, for cost � Therefore, the size and the complexity of the software increases. The current techniques do not allow to protect us from problems of conception, Now they are more expensive to us to detect them during the phase of the implementation or the test that at the time of the conception. That is why we need a high-level modelling of the system, which would allow us to analyze the organization between the various elements of calculation and the interactions between these elements. This level of abstraction is called the architecture of the software, which serves for modelling, analyze and test the most important aspects of the development to obtain software more safe and in a faster way. The idea leads us to think of a work on the conception and the development of a new language of description of architecture ( ADL), based on a formal model in the mathematical sense, and focuses on the formal description of the software architectures (the structure and the behavior- Dynamics, time of execution).
back to Accepted Papers Page


Negotiation Strategy for a Distributed Resolution of Real Time Production Management Problems
Paper Number:    150
Abstract:
Real world manufacturing environments are highly dynamic because of frequently changing situations. Deterministic mechanisms using a centralized control mechanism cannot handle the system dynamics. Agent-based approaches are particularly suitable for dynamic manufacturing scheduling. This paper proposes a negotiation approach based on multi-agent system for complex manufacturing systems. The local scheduling and control function in dynamic distributed environment is addressed by a new negotiation protocol based on a hybrid model. The agent negotiation protocol that we have developed facilitates the establishment of the program in real time of solution on the basis of hybridization between the Contract Net Protocol and a particular approach which is based on artificial intelligence. The purpose of this protocol is to assign operations dynamically to the resources of the production system in order to accomplish the proposed task. The article describes the common resource sharing through a number of scenarios of negotiation between the initiator agents and participants; this description treats the cases of conflicts, renegotiation and waiting.
back to Accepted Papers Page


Mobility in Mobile Communication System: a Preliminary Study
Paper Number:    151
Abstract:
This paper review previous models developed for mobile communication system. It outlines the mobility behaviors, communication algorithm, nodes movement model, routing protocols, and node localization technique used by such models. In this paper we present our study on the effect of the different communication parameters on the mobility behavior. Such parameters are capacity, delay, node power consumption, node localization accuracy, and fault tolerance. Based on the models investigated we propose a variant model that can increase flexibility and scalability, decrease node power consumption; achieve high transmission rate with lower delays, and achieve fault tolerance nodes. We report preliminary results of the simulation experiment we have conducted based on the model presented in this paper.
back to Accepted Papers Page


Adaptive Hybrid-Wavelet Method for GPS/INS System Integration
Paper Number:    153
Abstract:
This paper review previous models developed for mobile communication system. It outlines the mobility behaviors, communication algorithm, nodes movement model, routing protocols, and node localization technique used by such models. In this paper we present our study on the effect of the different communication parameters on the mobility behavior. Such parameters are capacity, delay, node power consumption, node localization accuracy, and fault tolerance. Based on the models investigated we propose a variant model that can increase flexibility and scalability, decrease node power consumption; achieve high transmission rate with lower delays, and achieve fault tolerance nodes. We report preliminary results of the simulation experiment we have conducted based on the model presented in this paper.
back to Accepted Papers Page


�Intrusion Detection System Base on Neural Network
Paper Number:    154
Abstract:
An anomaly based intrusion detection systems needs to be able to learn user's or system's behavior because users and systems behavior changes over time in today's dynamic environment. In this research experimenting with user's behavior will used as parameters in anomaly intrusion detection. The proposed intrusion detection system is uses a back propagation neural network to learn user's behavior. The neural network will check if it able to classify normal behavior correctly, and detect known and unknown attacks without using a huge amount of training data. The experiments were separated into three parts. The first preliminary experiment was conducted to see when the neural network was properly trained to classify sessions correctly. In this experiment, both known and unknown attacks were used. The next experiment was conducted to test the neural network with a small traffic, known and unknown attacks. Unknown attacks are the most threatening attacks, because these attacks are not known or not expected. In the final experiment, the classification rate was 82% on known attacks.
back to Accepted Papers Page


An Ontology-Based Semantics for Interbusiness Portals
Paper Number:    159
Abstract:
In this work, we propose a solution to solve the problem of ambiguity in interbusiness portals. We define by ambiguity, any type of terminological variation defining the same object or aspect, that can be due to an ambiguity related on the language (synonymy and polysemy), or to the difference in terminological choice of the various companies. To minimize the appearance of this problem with an aim of improving collaboration of the companies, we propose a solution basing itself on a semantic homogenisation of the terminology used on the portal. This semantic homogenisation would be concretized by the development of ontology.
back to Accepted Papers Page


An Efficient Algorithm for Clustering of Documents
Paper Number:    160
Abstract:
Fast and high-quality document clustering algorithms play an important role in effectively navigating, summarizing, and organizing information. A major challenge in document clustering is the determination of the number of clusters as an input parameter. Many existing algorithms require the user to specify the desired number of clusters as an input parameter. In this paper we propose to use the rough set theory for clustering. Rough set theory can achieve clustering when the number of clusters is unknown. A comparative study of its performance is made with related popular document clustering algorithms. Our study is applied on different three datasets, DS1, DS2, and DS3. We show that our method outperforms best existing clustering methods; our method in average is best performance for DS1 about 1% from others and for DS2 about 15% from others and for DS3 about 60%.
back to Accepted Papers Page


Towards a Full Automatic Approach to Use INA Petri Nets Environment for Business Process Modeling
Paper Number:    161
Abstract:
Business process models describe how a business works, or more specifically, how they accomplish missions, activities, or tasks. The automated control and coordination of business processes is made possible by task control constructs that model behaviors like concurrency, asynchronism, and choice. However, there is a real danger of introducing control flow anomalies and behavioral inconsistencies like deadlock, livelock, imperfect termination, and multiple task repetitions [Siv02]. Petri Nets provide a powerful formal modeling method based on solid mathematical fundament while having graphical representation of system models as net diagrams and provide various analysis techniques such as reachability tree, incidence matrix and invariant analysis method, through which properties of the Petri Net model such as liveness, reachability and deadlock can be analyzed. This paper proposes an approach to illustrate the use of the Petri Net INA (Integrated Net Analyzer) [STA03] environment for formalizing business process specifications and using analytical techniques to support verification studies. The first step is automated.
back to Accepted Papers Page


Hybrid IBTC-DCT Coding of Digital Images
Paper Number:    162
Abstract:
Abstract:-In this paper, an improved Interpolative Block Truncation Coding (IBTC) algorithm for coding the block truncated image bit plane is proposed. This algorithm is applied to the coding of grey scale images in hybrid with the DCT transform. Several test images are used to evaluate the coding efficiency and performance of this hybrid technique. It is generally shown that this IBTC/DCT algorithm gives good quality reconstructed images at reduced bit rate compared to BTC/DCT algorithm.
back to Accepted Papers Page


Negotiation Strategy for a Distributed Resolution of Real Time Production Management Problems
Paper Number:    164
Abstract:
Real world manufacturing environments are highly dynamic because of frequently changing situations. Deterministic mechanisms using a centralized control mechanism cannot handle the system dynamics. Agent-based approaches are particularly suitable for dynamic manufacturing scheduling. This paper proposes a negotiation approach based on multi-agent system for complex manufacturing systems. The local scheduling and control function in dynamic distributed environment is addressed by a new negotiation protocol based on a hybrid model. The protocol of the agent negotiation that we have developed facilitates the establishment of the program in real time of solution on the basis of hybridization between the Contract Net Protocol and a particular approach which is based on artificial intelligence. The purpose of this protocol is to dynamically assign operations to the resources of the production system in order to accomplish the proposed task. The article describes the common resource sharing through a number of scenarios of negotiation between the agents initiator and participants; this description treats the cases of conflicts, renegotiation and waiting.
back to Accepted Papers Page


A Formal Semantic Framework for SADL Language
Paper Number:    169
Abstract:
The primary purpose of an ADL (Architecture Description Language) is to specify the structural composition of a software system in terms of system's components and connectors through the means of a formal representational language. Many ADLs have emerged recently, none of them addresses formal analysis and verification of distributed architecture with a tractable model and an efficient mechanisable technique. In this paper, we explore the possibility of using Rewriting Logic model (via its Maude language) for specifying SADL architectural systems, showing how to conceive a behavior specification of systems using Maude concepts and rules. With them we do not only obtain a high level specification of SADL architecture system behavior, but we are also in a position to formally reason about and prototype the specification design produced and prototype it.
back to Accepted Papers Page


Analysis and Enhancement of Biomedical Cells Using Graphic Editor
Paper Number:    171
Abstract:
A tool is designed and tested to provide histopathologists with a powerful mean for studying and analyzing cells and tissue sections. Image analysis techniques are described for automatic detection, segmentation, feature description, and classification of the biomedical cell within the specified organ. The results obtained represent a quantitative description of the tested cells, based on statistics of the component. Combining newly advanced algorithms with other techniques has developed a software package for analysis of these images. Cells were sampled and each was digitized into 512x512 pixels. The pixel gray values have an 8-bit resolution, allowing 256 discrete values. Two features were extracted from each cell: form features and gray level features. Finally, a comparative study is made between the produced images and the Electron Microscope image results found in literature. The results are quite comparative.
back to Accepted Papers Page


Developing Art-1 Neural Network Interface Model for processing and Recognition Color Images
Paper Number:    174
Abstract:
The theoretical outcomes and experimental results of new input interface for ART1 neural network applying in algorithms and software of image analysis are presented in the paper. It is well known, that standard ART-1 network may process only binary images. The given fact limits application of ART-1 network for full color images processing and recognition because conversion from full color to binary form causes loss of the information, as example during conversion to binary form a source image lost a color and intensity components and as result two different color images look like same images in binary form, that produce a mistake during recognition. In this paper a new color interface for ART1 neural network has been developed, implemented in software and tested in real examples. As it will be shown, new interface allow to produce a full color image processing with using standard ART1 neural network.
back to Accepted Papers Page


Ultrawideband Elliptical Microstrip Antenna Using Different Taper Lines for Feeding
Paper Number:    175
Abstract:
In this paper, a printed elliptical slot antenna fed by different tapered microstrip line with U-shaped and Circular ring-shaped tuning stub is proposed for ultrawideband (UWB) applications. The tapering aids in minimizing the reflection at the interface between the microstrip feed line and the tuning stub. Introduced is a new tapering profile that minimizes the reflection and hence enhances the bandwidth. The tapering profile is based on the Willis�Sinha profile. The design parameters for achieving optimal performance are investigated. The operation and the performance of the proposed antenna are also analyzed. Good agreement between simulated and experimental results is obtained.
back to Accepted Papers Page


Hybrid Fuzzy PD2 Controller for Robotic System
Paper Number:    177
Abstract:
This paper proposed a new hybrid structure called a FPD2 controller for a simple robotic system. The controller consists of a fuzzy PD (FPD) controller part, that has a simple rules base nine rules only, and conventional D controller (CD) part. The CD is added to the FPD to improve the transited performance with out add more rules and to avoid the derivative kick. The performance of the proposed controller is compared with the response of the conventional PD controller, showing that the FPD2 has smaller overshot and less settling time over its CPD.
back to Accepted Papers Page


Design and Implementation of a Secured Remotly Administrated Network
Paper Number:    179
Abstract:
As applications become more distributed, the design and management of security services in networked systems play an increasingly significant role. This paper deals with the plan and design of a typical security system for a large cooperative network. The main aim of the design is to protect the network against internal and external threats as well as various types of attacks. The design includes the ability of the administrator to control and manage the network from different locations inside the network and remotely from outside the network. First of all, the current security state of the network is examined, then, complete network security architecture is proposed. This architecture is based on supplying the network with 11 security methods against internal threats and 6 security methods against external threats. These methods have both software and hardware nature and work in all network layers. The affectivity of the suggested security solutions is tested against different attacks and proves its ability to resist these situations.
back to Accepted Papers Page


Information Technology Usage Barriers and Its Impact on The Level of Service Quality �An Empirical Study at The Jordanian Banking Sector�
Paper Number:    180
Abstract:
Information technology usage barriers and its impact on the level of service quality �An empirical study at the Jordanian banking sector� The purpose of this study is to investigate the extent to which employees at the Jordanian banks are aware of the usage barriers of information technology (communication infrastructure, technical barriers, cultural barriers, security barriers) in addition the study seeks to test whether these barriers have an impact on the level of service quality. To achieve the objectives of this study, a questionnaire was developed and distributed to a sample of (7) banks selected according to size criteria, for the purpose of statistical analysis some statistical tools were used, such as descriptive and simple regression tools, the study findings shows that the employees at the Jordanian banks display a high level of awareness toward the usage barriers of information technology, beside that the study revealed that the information technology barriers have an impact on the level of service quality, the study recommended to initiate more workshops and training for employees at all levels and to continually invest in updating and developing the existing information technology tools and instruments so that they can overcome these barriers.
back to Accepted Papers Page


Arae Cipher System
Paper Number:    181
Abstract:
Data encryption is the translation of data into a form that unintelligible without a deciphering mechanism. This paper is intended to introduce a new approach for encryption, ARAE cipher system. It uses Arabic letters and their diacritics for encrypting English messages and vice versa. A pseudo random generator is used to generate integer numbers to represent each character in Arabic language. The same numbers are used again after sorting them to represent the English characters. The conclusions that are extracted indicate the efficiency of ARAE system according to security and time performance.
back to Accepted Papers Page


Mp-Builder: a Tool for Multidimensional Pattern Construction
Paper Number:    184
Abstract:
A multidimensional pattern (MP) is a generic solution of typical analytical requirements in a given domain. It can be instantiated to specify particular OLAP requirements, to build the corresponding data mart (DM) schema and eventually to load the schema from a data source. This paper presents a toolset, called MP-builder, that implements our MP construction method. It illustrates the functionalities of MP-builder through an MP analyzing the �sales� fact in the commercial domain.
back to Accepted Papers Page


�Operationalisation of Industrial Gas Turbine Ontology
Paper Number:    185
Abstract:
The activity of industrial supervision and control of the gas turbines is a very complex spot and requires a great experiment. This experiment is acquired with the passing of years what makes departure of an expert in retirement a great loss of the know-how. In the same way, these experts are not available constantly and in each site. The problem thus consists in capturing this know-how and allows experiment to be cumulate with an aim of the construction of a system of assistance to the diagnosis. The work presented in this article relates to ontological engineering and more particularly the use of ontologies in the Knowledge-based systems. After the stages of conceptualization and ontologisation [6], which allowed the capture of knowledge of the domain; we proceed in this article to the Operationalisation of conceived ontology. The modeling of the inference is based on the specification of the operational objective by scenario of use. The JessTab tool is used for the integration of the contexts of use in JESS. Thus we have obtained our system of assistance to the diagnosis �OntoTurb-Expert� of which the goal is not to solve the problem of diagnosis automatically, but to help the user by providing him suitable information and by leaving him the responsibility for a contextual evaluation of this information
back to Accepted Papers Page


Labeled Reconfigurable Nets for Modeling Code Mobility
Paper Number:    186
Abstract:
Code mobility technologies attract more and more developers and consumers. Numerous domains are concerned, many platforms are developed and interest applications are realized. However, developing good software products requires modeling, analyzing and proving steps. The choice of models and modeling languages is so critical on these steps. Formal tools are powerful in analyzing and proving steps. However, poorness of classical modeling language to model mobility requires proposition of new models. The objective of this paper is to provide a specific formalism �labeled reconfigurable nets� and to show how this one seems to be adequate to model different kinds of code mobility.
back to Accepted Papers Page


Key Internet Characteristics and E-commerce Factors in Jordan
Paper Number:    187
Abstract:
This study describes the state of the Internet and E-commerce in Jordan by discussing E-commerce key drivers: information and communication technology (ICT) factors, cultural factors, economic factors and legal factors. It reports certain Internet characteristics and E-commerce factors in comparison with the developed world, China and India. It brings some of the critical challenges for the diffusion of the Internet and its applications in Jordan to the attention of policy makers. Overall, the review reveals that Jordan still has a long way to go before it can fully realize the importance of the Internet and E-commerce.
back to Accepted Papers Page


Solar Cells Orientation System Using Microcontroller
Paper Number:    188
Abstract:
This work describes a design of control system to orientation the solar cells using Atmel Flash micro-controller (AT89C51). The solar elevation angles over the course of a year are calculated for any position depending on longitude and latitude using C++ program. The software is convert the angles into its equivalent value of steps according to the resolution of the step motors and save the result in Hex file. The data file is loaded on EEPROM by EPROM programmer. The solar cells holder step motors will receive the data of sun position and will move to it.
back to Accepted Papers Page


A Framework for Translating Rad Business Process Models Into Π-Adl
Paper Number:    190
Abstract:
One of the key objectives of Business Process Modelling is to better understand and visualise business processes in order to improve and/or enact them in some IT infrastructure. This modelling perspective becomes more complicated and challenging with the expansion of businesses across geographical boundaries. Further, this necessitates finding technological solutions to execute agile business processes. And, in an effort to enact business process models using distributed technologies, we present a novel framework for translating business processes modelled using Role Activity Diagramming constructs into π-Architecture Description Language (π-ADL) specifications with the objective to enact the original business processes in highly distributed environments such as the Grid with the added advantage of allowing formal verification of the resultant π-ADL script using readily available tools.
back to Accepted Papers Page


Synthesis and adaptation of Multi-Agent System
Paper Number:    191
Abstract:
The need for intelligent systems has grown in the past decade because of the increasing demand on humans and machines for better performance. The researchers of AI have responded to these needs with the development of intelligent hybrid systems. This paper describes the modeling language for interacting hybrid systems in which it was built a new hybrid model of cellular automata and multi-agent technology. Simulations with complex behavior will be model social dynamics. Therefore, in our approach, cellular automata form a useful framework for the multi-agent simulation model and the model was used for traffic and computer network systems. In this paper, we will analyze, describe, and design environments in which agents can operate effectively and interact with each other productively. The environment or cellular automata grid will provide a computational infrastructure for such interactions to take place. The infrastructure will include protocols for agents to communicate and interact with each other. The rules that control the agents� growth, death, and behavior have been designed locally for each agent.
back to Accepted Papers Page


A Novel Feature Selection Algorithm
Paper Number:    192
Abstract:
The estimation of the quality of attributes is an important issue in machine learning and data mining. There are several important tasks in the process of machine learning like feature subset selection, constructive induction, and decision tree building, which contain the attribute estimation procedure as their principal component. Relief algorithms are successful attribute estimators. They are able to detect conditional dependencies between attributes and provide a unified view on the attribute estimation. They have commonly been viewed as feature subset selection methods that are applied in pre-processing step before a model is learned. In this paper, we propose a variant of ReliefF algorithm: ReliefMSS. We analyse the ReliefMSS parameters and compare ReliefF and ReliefMSS performances as regards the number of iterations, the number of random attributes, the noise effect, the number of nearest neighbours and the number of examples presented. We find that for the most of these parameters, ReliefMSS is better than ReliefF.
back to Accepted Papers Page


Proposal for a Spatial Decision Support System in Territory Planning: A Hybrid Approach: Linear Programming, Fuzzy Measurement, Multicriterion Methods and GIS
Paper Number:    193
Abstract:
Our study falls under the perspective which aims at optimizing the quality of decision brought to the space-time decision-making process. Our aim is to claim with an extensible, generic, deterministic and multicriterion model based on the axiomatic of models representing decision strategies and authorizing interaction between criteria. The suggested approach is constructive, interactive and based on uncertainty theories (fuzzy logic, possibility theory, fuzzy integrals) and linear programming. We define a new approach as well for the description of available information as for their use and suggest replacing the additivity property in the performance aggregation phase by a more reliable property: the growth using non- additive aggregation operators resulting from the capacity theory and largely known as fuzzy measurements. The latter allow evaluating space compatibility between the available data by defining a weight on each subset of criteria and fuzzy integral, more specifically; the Choquet's integral is an aggregation operator able to consider the interaction among these criteria. We elaborate, in this paper, after schematizing the complex decisional concerned situation, a spatial decision support system . The latter is based on a combined use of Geographical Information Systems (GIS) and Multicriterion Analysis Methods namely the (ordinal and nominal) sorting approaches to claim the territorial (spatial) context analysis. This study allows the professionals to carry out a diagnostic and proposes adapted actions in the resolution of two Territory Planning problems: The first relates to the search of a surface better satisfying certain criteria and the second consists in realizing the land use plan.
back to Accepted Papers Page


Estimating Object-Oriented Software Projects
Paper Number:    196
Abstract:
Use case models describe the functional requirements of a future software system in object-oriented analysis. Size of the system can be determined by measuring the size or complexity of the use cases in the use case model. The size can be used as input to a cost estimation method or model, in order to compute an early estimate of cost and effort. Estimating software with use cases is still in the early stages. This paper describes a software sizing and cost estimation method based on use cases, called the Use Case Points Method. The method was created several years ago, but is not well known. One of the reasons may be that the method is best used with well-written use cases at a suitable level of functional detail. Un-fortunately, use case writing is not standardized, so there are many different writing styles. General usefulness of this method is studied by applying this method to two software industry projects. The results have been compared to results obtained earlier using the method in a different company. The investigations show that the use case points method works well for different types of software. Data from the various projects have also been used as input to two commercial cost estimation tools that attempt to estimate object-oriented projects with use cases. The goal was to select a cost estimation method or tool for a specific software company. The findings indicate that there is no obvious gain in investing in expensive commercial tools for estimating object-oriented software.
back to Accepted Papers Page


Toward Pure Componentware
Paper Number:    197
Abstract:
Componentware seems to be a promising methodology for software development in order to cope with software complexity. With componentware, the software development is shifted from building every thing from scratch into just assembling existing components. Therefore, Components must be integrated through well-defined infrastructure. This paper presents a component model and a framework for composing component-based systems based on message-pattern interaction among the components.
back to Accepted Papers Page


A Mathematical Model for Arabic E-government Web-Sites
Paper Number:    200
Abstract:
 

����� ����� ��� ������ ������� ������ �� ������ �������� ����������� ������ ������. ����� ������ �� �������� ������ ��� ������� ����: ����� �����ڡ ���� ���������� �������ɡ ����� ����� �������ʡ ����� ������ ��ˡ ������ ����� ������� ������� �������� �������. ��� ���� ������ ����� ����� ����� ������� �� ��� ��������ʡ ���� ����� ������ ����� ������ ����� ������� ��� ��� �������. ����� ������� ���� ����� ������� �������� �������� ������� ��� ���� ��������� ����� ����� ��� ��������� ���� ���� ������ �������� ����������� �� ��� �����....


back to Accepted Papers Page


�A Systematic Approach for Constructing Static Class Diagrams from Software Requirements
Paper Number:    201
Abstract:
The trend towards the use of object-oriented methods for software systems development has made it necessary for the use of object-oriented approaches in object-oriented software systems development. Static class diagrams represent an essential component in an object-oriented system design. The development of such class diagrams in a systematic way is very crucial in an object-oriented development methodology. The paper describes a new approach for obtaining these static class diagrams in a systematic way, which is very essential in object-oriented development practice.
back to Accepted Papers Page


�Arabic Natural Language Processing for Recognition Holy Quran Tajweed Rules Using Fuzzy Logic
Paper Number:    202
Abstract:
Arabic language is one of the natural languages which represents good domain for automatic processing, QURAN TAJWEED rules recognition is also one the interesting subjects in the past few years there were many attempts for processing Arabic language and just few which focused on TAJWEED rules as result of the (ANLP) [1]. this paper discus new system that uses new techniques for computerize TAJWEED rules , the system uses QURAN text as an array of characters and vowels , which each have unique ASCII code representing it , then the array elements is analyzed to classify and recognize all TAJWEED rules that are in the selected text , all TAJWEED rules are stored in table , then the rules will be stored in one set with specific number of elements , after that represent each rule by a vector that contain ordered elements (characters ,vowels and spaces) then for each new text will be scanned for TAJWEED rules , and these rules will be converted into vectors in specific format , after find the distance between the new rule vector and all TAJWEED rules vectors , the rule with the lowest distance will be the correct rule.
back to Accepted Papers Page


Requirements Management Measures Validation
Paper Number:    204
Abstract:
Requirements management measures help organizations to understand, control and assess requirements management process. The goal of this paper is to validate a set of requirements management measures. The measures were defined for the five specific practices of Requirements Management Key Process Area (KPA) in Capability Maturity Model Integration (CMMI) by applying the Goal Question Metrics (GQM) paradigm to the five specific practices. We have made a questionnaire to prove the validity and reliability of the defined measures and confirm that they really measure the five specific practices. The questionnaire was filled by practitioners in six institutions specialized in software development. The collected data were analyzed by cronbach alpha in SPSS.
back to Accepted Papers Page


Personalized EFL Course Using Fuzzy Adaptive Resonance Theory Neural Network
Paper Number:    206
Abstract:
This paper demonstrates how Fuzzy Adaptive Resonance Theory neural network (Fuzzy-ART2) can be used advantageously for building an Adaptive and Intelligent Web- Based Educational System (AIWBES). This new system is used to teach English as foreign language (EFL) for Arabic students and it consists of four components: Knowledge Model, student model, pedagogical model and users interface. The knowledge domain is based on XML and DTD to model and describe the content of the course with its main learning objectives, concepts, sub-concepts and educational units. Fuzzy-ART2 is used to model student knowledge depending on five parameters: Number of correct answers, number of incorrect answers, time spent to solve a question, time spent to reading or interacting with a specific concept and number of attempts to answer a question. The student model is overlay and it is divided into two parts: Static Part; where student's profile and preferences are stored, while the Dynamic Part maintains student's foot steps and the time spent by him/her to finish studying a learning objective, a concept or to solve an exercise. The raw input data are presented to Fuzzy-ART2 to be trained and categorized in six levels: Excellent, Very good, Good, Faire, Weak and Very weak. In the recall mode of Fuzzy-ART2, new and old inputs data are introduced to verify its effectiveness and performance. Results illustrate that Fuzzy-ART2 can imitate the teacher's reasoning better than traditional methods in evaluating students; additionally they show that the didactic plan is generated with minimal error.
back to Accepted Papers Page


Dataset Vertical Partitioning for Rough Set Based Classification
Paper Number:    208
Abstract:
Dataset partitioning problem involves the vertical partitioning of the classification datasets into suitable subsets that preserve or enhance the classification quality of the original datasets. Typical classification model needs to be constructed for each subset and all generated models are then combined to form the classification model. This paper presents a dataset partitioning approach for rough set based classification. In this approach, the dataset is partitioned into two mutually exclusive subsets. Local reduct set is generated for each attribute subset which is then combined and used to generate the set of classification rules. A preliminary experimental result using the partitioning approach over some standard medical datasets showed that the approach preserves the classification accuracy.
back to Accepted Papers Page


Key Information and Communication Technology (ICT) Characteristics in Arab Countries
Paper Number:    209
Abstract:
This study describes the state of information and communication technology (ICT) in Arab countries. It reports certain ICT characteristics in the Arab world and brings out some of the critical challenges facing the diffusion of ICT and its applications in Arab countries to the attention of policy-makers in these nations. Overall, the review reveals that most Arab countries still have a long way to go before being able to realize fully the benefits of ICT.
back to Accepted Papers Page


Multi-Agent Group Decision Support System
Paper Number:    211
Abstract:
In this paper, we propose to integrate agents in a group decision support system. The resulting system, MADS (Multi-Agent group Decision-support System) is a decision support system designed to support operators during contingencies. During the contingency, the operators using MADS should be able to: gather information about the incident location; access databases related to the incident; activate predictive modelling programs; support analyses of the operator, and monitor the progress of the situation and action execution. The decision making process, applied to the boilers defects in an oil plant, relies in MADS on a cycle that includes recognition of the causes of a defect (diagnosis), plan actions to solve the incidences and, execution of the selected actions.
back to Accepted Papers Page


Next Generation Vehicle Network: Web Enabled Car
Paper Number:    213
Abstract:
A new architecture of the next generation vehicle networks is proposed and discussed in this paper. Modern in-vehicle networks, on-board computers and Internet, mobile telecommunications and Telematics applications in the ground vehicles, as well as future desired features are discussed. New applications such as remote diagnostic, condition monitoring, error detection, and remote firmware upgrade and reprogramming are proposed. Several hardware and software methodologies in the ground vehicles are proposed to achieve the proposed applications.
back to Accepted Papers Page


Moving Toward M-Learning by Using WAP Technology
Paper Number:    214
Abstract:
This paper explores the opportunities of using WAP technology in e-learning to enhance the existing learning management systems (LMS) by moving toward m-learning (e-learning using mobile devices and wireless transmission) that can potentially provide important opportunities for learning and collaborative interaction. Moodle is one of the attractive LMS around the world due to its outstanding features and reliability. Although WAP technology offered anywhere-anytime discussions, the technical problems encountered when using the WAP-enabled phones hindered participation in the e-discussions. In addition to presenting technical aspects of the WAP, the paper also introduce the advantages and disadvantages of using WAP technology in the learning process. An existing experience of using WAP technology via moodle in the Arab Open University�s learning management system with the outcomes of the tutors and students is introduced. Furthermore, this paper discusses the suitability and feasibility of using WAP technology devices for distance learning in real-time.
back to Accepted Papers Page


Spatial Hashing Scheme for Image Authentication
Paper Number:    218
Abstract:
Hashing techniques have been used extensively in applications such as content authentication, database search and watermarking. I this paper, we propose a spatial hashing scheme to provide a compact representation of an image that can be used for Image authentication. The proposed hashing scheme extracts the image feature based on pixel proximities in the spatial domain. Moreover, the proposed scheme uses a secret keys to modulate and permutate the pixels and final hash values. The robustness of the proposed technique has been tested with standard benchmark attacks.
back to Accepted Papers Page


Dynamic Adaptability Based Approach to Secure Mobile Agent
Paper Number:    221
Abstract:
The mobile agent applications are various. They include electronic commerce, personal assistance or parallel processing. The use of mobile agent paradigm provides several advantages. However, it has introduced some serious problems and has emphasized existing security issues. Current researches efforts in the mobile agent security area follow two aspects: (i) protection of the hosts from malicious mobile agents, (ii) protection of the mobile agent from malevolent hosts. This paper focuses on the second point. It deals with the protection of mobile agent from eavesdropping attacks. The proposed approach is based on a dynamic adaptability policy supported by a reflexive architecture. The idea relies on the fact that mobile agent behave differently and in unforeseeable manner during its life cycle. This ability complicates analysis attempts and protects it. In order to show the feasibility of the proposed security strategy, we propose to illustrate it throw an e-business application, implemented in Java language using Jade platform.
back to Accepted Papers Page


Perfect Hash Functions for Large Dictionaries
Paper Number:    225
Abstract:
We describe a new practical algorithm for finding perfect hash functions with no specification space at all, suitable for key sets ranging in size from small to very large. The method is able to find perfect hash functions for various sizes of key sets in linear time. The perfect hash functions produced are optimal in terms of time (perfect) and require at most computation of h1(k) and h2(k); two simple auxiliary pseudorandom functions.
back to Accepted Papers Page


Effective Ranked Conceptual Retrieval
Paper Number:    226
Abstract:
We describe the design and implementation of the SMARTER prototype system for collecting, structuring and searching information derived from full text ebooks available on the World Wide Web [4]. Standard methods of parsing and extended Boolean schemes for weighting are used to build an index of individual pages. Ranked pages are retrieved from the system by means of a correlated and combined p-norm and vector query mechanisms. Furthermore, we present a complete evaluation of the relative effectiveness of the SMARTER system versus the Google Desktop [7].
back to Accepted Papers Page


Morphological Analysis and Diacritical Arabic Text Compression
Paper Number:    227
Abstract:
Morphological analysis of Arabic words allows decreasing the storage requirements of the Arabic dictionaries, more efficient encoding of diacritical Arabic text, faster spelling and efficient Optical character recognition. All these factors allow efficient storage and archival of multilingual digital libraries that include Arabic texts. This paper presents a lossless compression algorithm based on the affix analysis that takes advantage of the statistical studies of the diacritical Arabic morphological features. The algorithm decomposes a given Arabic word into its root and its affixes. The affixes (prefix, infix, and suffix) are the redundant elements of the word. The roots are stored in the root dictionary. Also, we maintain categorized affix dictionaries and their valid combinations to validate and generate the morphological forms during encoding and decoding using a list of patterns. Since our goal is lossless reproducible Arabic text, stemming is not an option and noise words (high frequency words) cannot be filtered out. The size of the obtained root dictionary is about 8000 three-character roots and 700 four character roots. We also code the most frequently occurring diacritical bigrams (biliterals) and trigrams (triliterals) with unused codewords in ASCII, ASMO-449, and Unicode standard codes. Using combined methods of root dictionaries and the proposed coding scheme, compression ratios of proper Arabic text compare favorably with other unigram non-diacritical methods.
back to Accepted Papers Page


Scalability in a Dynamic Discovery Service-Based JINI for the Next Generation Vehicle Network
Paper Number:    228
Abstract:
Rapid advances in the areas of computing, sensing, and communications have enabled vehicle manufactures to provide new features for vehicles to enhance safety, pleasure, convenience, and reliability. Moreover future vehicles are expected to become a part of the Internet, either as a network node, or as a hub constructing a vehicular ad hoc network. This vehicular ad hoc network represents large dynamic distributed processing systems. These vehicles communicate with each other and with the Internet, to access services such as traffic conditions, finding nearest hospital, remote monitoring, etc. To accomplish this type of services, new methodology will be needed such as Dynamic Discovery Service. Dynamic Discovery Service is a system in which clients search through registries to first discover and then invoke services supporting the capabilities they require. This research proposes Dynamic Discovery Service-based Jini architecture. A Dynamic Discovery Service (DDS)-based Jini system is a distributed environment where services and devices can participate to offer resources to other members of the community. To be efficient DDS-based Jini, system should be evaluated in terms of scalability, latency, bandwidth usage. This paper will examine the scalability of the lookup service mechanisms in terms of lookup latency as well as generated network traffic. Specifically, the experiments examined the lookup response time as a function of increasing number of services registered, and increasing lookup nodes, all in a static environment as well as the lookup response time in a dynamic environment.
back to Accepted Papers Page


Articial Immune System for Speech Recognition
Paper Number:    229
Abstract:
The speech recognition is one of the most important domains to facilitate interaction between men and machine. The classification is one tool used to recognize the speech; several methods are developed to increase recognition rate optimizing times. The neural networks, HMM, Evolutionary algorithm� are developed in this context. The artificial immune system is one of the newest approaches used in several domains as pattern recognition, robotic, intrusion detection�a lot of methods are exposed as negative selection, clone selection and artificial immune network (AINet). In this paper we�ll develop four versions of Artificial Immune Recognition System (AIRS) for speech recognition and we�ll present results with some critics and remarks of these methods.
back to Accepted Papers Page


Artificial Neural Network for Texture Classification Using Several Features: A Comparative Study
Paper Number:    230
Abstract:
Texture analysis plays an essential and a major rule in image classification and segmentation in a wide range of applications such as medical imaging, remote sensing and industrial inspection. In this paper, we review the well known approaches of texture feature extraction and perform a comparative study between them. These approaches are namely gray level histogram, edge detection, and co-occurrence matrices, besides Gabor and Biorthogonal wavelet transformations. The feed forward artificial neural network (ANN) with back- propagation algorithm (BPA) is used as a supervised classifier. Experiments are conducted on two different datasets taken from multi-class engineering surfaces produced by six machining processes and from Brodadtz (1966) textures album respectively. The classification accuracy is tested for both datasets, while the quality of estimation is tested for surface roughness parameters of the machined surfaces dataset only based on the roughness parameters evaluated from a contact measurement test.
back to Accepted Papers Page


Towards an Acoustical - Anatomical System for speaker identification
Paper Number:    234
Abstract:
A person's identification on the basis of his/her voice presents a real challenge for researchers, due its intrinsic and extrinsic variability. Several methods have been proposed essentially on the basis the speaker's modelling. In this paper, we present in a first step a state of the art on the approaches of modelling and a comparative survey. In a second step we propose an acoustical - anatomical system of speaker�s identification via a relative modelling. Also, we present the speaker under his/her two acoustical and anatomical facets. To improve the rate of identification and to give a stamp merely biometric to the AIS system, we combine the acoustic features and the anatomical features of the speaker. More precisely the anatomical features of the speaker's ENT sphere. For this, we combine in a same vector the speaker's acoustical and anatomical features. We also present a model based on the relative approach that consists of presenting a speaker, not in an absolute way, but relatively to a set of recognized speakers. Therefore we define the architecture of the system of identification through introducing our propositions.
back to Accepted Papers Page


An Efficient Method for Factoring Rabin Scheme
Paper Number:    238
Abstract:
The security on many public key encryption algorithms depend on the intractability of solving the integer factoring problem. However, there is a great deal of research related to the RSA factoring problem compared with other similar schemes such as Rabin factoring algorithm. This paper will present a new technique for factoring the Rabin scheme. The suggested algorithm aims to factoring the Rubin modulus using a new idea that based on the functional problem of contravention Rabin scheme. The new algorithm claimed to be more efficient than the already existed schemes since it is faster and takes less running time.
back to Accepted Papers Page


RSA Cryptography Implementation for Medical Imaging
Paper Number:    240
Abstract:
In this paper we will present a software designed for remote visualization of medical images with data security transfering. This interface in implemented under MATLAB environment. The implementation of the image cryptography system uses the RSA algorithm.The transfer of images in a secure way for medical diagnosis is insured by generating a watermarked key to encrypt the original image. In order to optimise the crypto-system parameters we studied the effect of the the key length and the blocklength on the cipherring computing time and the image quality.
back to Accepted Papers Page