Print E-mail

A Model for Multi-Plant Production Planning Coordination

Conrad Oboulhas, Xu Xiaofei, and Zhan Dechen

Department of Computer Science and Engineering, Harbin Institute of Technology, China


Abstract: This paper deals with the problem of coordinating production planning process that becomes more complex in today’s highly competitive manufacturing environment. Our main concern is to develop a model for coordinating the multi-plant production planning when the demand at any plant can be satisfied by producing at any other plant. The proposed model uses the multi-agent system and linear programming technique to achieve minimized production cost, increased flexibility and faster response.

Keywords: Multi-plant production planning, coordination, linear programming, multi-agent system.

Received January 26, 2004; accepted August 22, 2004

Print E-mail

Genetic Algorithm-Based Synthesis of

Three-Dimensional Microstrip Arrays

Sidi Ahmed Djennas, Fethi Bendimerad, Lotfi Merad, and Sidi Mohamed Meriah
Laboratory of Telecommunications, Abou-Bekr Belkaid University-Tlemcen, Algeria 

Abstract: The radiation pattern synthesis of rectangular microstrip patches arranged on three-dimensional arrays using numerical deterministic optimization methods was vulnerable to the local optima problem. Then, the use of probabilistic optimization methods constitutes an attractive alternative. Hence, these methods give the opportunity to deviate from the local optima to global optima. The local aspect of the findings is a frequent problem for the calculus-based methods, where the obtained solution depends on the starting point. It is towards this perspective that we develop in this paper a synthesis based on genetic algorithm which remains a probabilistic optimization method, easy to integrate in computations and very efficient even though it use probabilistic and deterministic rules, particularity which makes the efficiency and robustness of this heuristic algorithm.   

Keywords: Three-dimensional array, synthesis, optimization, genetic algorithm.  

Received March 2, 2004; accepted August 18, 2004
Print E-mail

Modeling and Formal Verification of IMPP

Sohel Khan and Abdul Waheed Abdul Sattar
King Fahd University of Petroleum and Minerals, Saudi Arabia


Abstract: This paper describes the modeling and formal verification of the application layer protocol, Instant Messaging and Presence Protocol (IMPP). Spin is a model checker for the verification of asynchronous, distributed and concurrent finite state systems. It accepts the system specification in a high level language called PROcess MEta LAnguage (PROMELA( and verification claims in temporal logic. We have selected Instant Messaging and Presence Protocol (IMPP) for modeling, simulation and verification as it is characterized by concurrency and distributed computing, which makes it a good candidate to explore the potential of model checking and verification. Further, the important properties of the protocol are verified using Linear Temporal Logic (LTL). One of our aims was also to get an insight into the scope and utility of formal methods based on state space exploration in testing larger and complex software systems which has been achieved to some extent.

Keywords: Formal methods, verification of communication protocols, instant messaging systems, verification tools, spin, LTL, PROMELA.

Received March 14, 2004; accepted July 7, 2004

Print E-mail

Using Maximality-Based Labeled Transition System Model for Concurrency Logic Verification

Djamel Eddine Saidouni and Nabil Belala

Computer Vision Group, LIRE Laboratory, University of Mentouri, Algeria


Abstract: In this paper, we show the interest of the maximality-based semantics for the check of concurrent system properties. For this purpose, we use the Maximality-based Labeled Transition System (MLTS) as a behavior model. From this point of view, we can omit action temporal and structural atomicity hypotheses; consequently, we can inherit result of combinatorial state space explosion problem solution based on the use of true concurrency semantics. Properties to be verified are expressed using the Computation Tree Logic (CTL). The main contribution of the paper is to show that model checking algorithms proposed in the literature, which are based on interleaving semantics, may be adapted easily to true concurrency semantics for the verification of new properties classes related to simultaneous progress of actions at different states.

Keywords: Concurrent system, maximality-based semantics, process algebra, model checking, CTL.

Received March 18, 2004; accepted July 8, 2004

Print E-mail

Performance Evaluation of Location Update Schemes in Mobile Ad Hoc Networks

Khaled Omer and Daya Lobiyal

School of Computer and Systems Sciences, Jawaharlal Nehru University, India


Abstract: Over the past few years, several position-based routing algorithms for mobile ad hoc networks have been proposed. The success of all these algorithms depends on the availability of up-to-date location information of the nodes in the network. To achieve the requirement of up-to-date location information, many location update schemes have been proposed. Authors of each scheme argue that their scheme is better and scalable for a given network scenario. However, these schemes need to be experimented together for common network scenarios – network size, network density, and network connectivity. In this paper, we present an overview of home agent, quorum based, grid location service, and doubling circles location update schemes. Further, we have proposed a scheme independent metric for performance evaluation of the location update schemes. Based on this performance metric, we have compared the location update schemes referred here and suggest which scheme may perform best for a large network. In the simulation, we use random waypoint mobility model. The results show that home agent scheme performs better than other schemes.

Keywords: Performance evaluation, location update, home agent, quorum, grid location service, doubling circles.

Received March 29, 2004; accepted August 19, 2004

Print E-mail

Function Inlining with Code Size Limitation in Embedded Systems

Xinrong Zhou, Johan Lilius, and Lu Yan

Turku Centre for Computer Science, Abo Akademi University, Finland


Abstract: Function inlining is a widely known technique that has been adopted in compiler optimization research domain. Inlining functions can eliminate the overhead which is resulted from function calls, but with inlining, the code size also grows unpredictably; this is not suitable for embedded processors whose memory size is relatively small. In this paper, we introduce a novel function inlining approach using a heuristic rebate_ratio; functions to be inlined are selected according to their rebate_ratios in a descending way. This kind of code optimization operation works at the source code level. Compared with other algorithms, ours are easier to implement. Our target is to get an optimal result of function inlining which attempts to achieve the maximum performance improvement while keeping the code size within a defined limit.

Keywords: Function inlining, embedded processors, graph, complexity.

Received April 2, 2004; accepted July 1, 2004

Print E-mail

E-Commerce and Ethical Web Design: Applying the BBBOnline Guidelines on Malaysian Websites

Husnayati Hussin, Mohd Adam Suhaimi, and Maram Mustafa

Department of Information Systems, International Islamic University, Malaysia


Abstract: The aim of this study is to find out to what extent Malaysian companies incorporate trustworthy elements on their websites. The study provides a detail website evaluation based on the principles for ethical online business provided by the BBBOnline guidelines. The five principles used as an evaluation instrument are: (1) Truthful and accurate communication, (2) Disclosure, (3) Information practices and security, (4) Customer satisfaction, and (5) Protecting children. The study selected ten Malaysian-based companies which adopt e-commerce as part of their business. The findings of the study indicate that some principles are well-adhered to, while others need more attention.

Keywords: E-commerce, ethics and e-commerce, web analysis, seal program, trust.

Received January 26, 2004; accepted October 18, 2004

Print E-mail

What New Challenges are Facing the Local Banks in Lebanon?

Rima Charbaji

Charbaji Consultants, Lebanon


Abstract: This paper reports on university students’ perceptions of online bank training in Lebanon by answering the main question: What barriers do we need to start paying attention to in implementing e-learning in the banking industry in Lebanon? Infrastructure, benefits, self motivation, speaking foreign language, age and the ability of employees to access e-training are the barries that get in the way of putting e-training into practice in Lebanon.

Keywords: ATM, telephone multi-channel strategy, competitive advantage, cost-efficiency, e-learning, training strategy.

Received April 11, 2004; accepted August 3, 2004

Print E-mail

Web-Based Traffic System

Mohammed Hassan and Malik Al-Amayreh

Department of Information Systems and Computer Science, Amman Al-Ahliya University, Jordan

Abstract: This paper provides a novel approach for car traffic control by applying a Web-based Traffic System (WTS). This approach was applied for navigation and traffic information services that are able to inform drivers about the most efficient routes to use in order to avoid traffic delays and roundabout directions. This paper provides a solution for the dynamic changes of the road density and high/low traffic by mean of web and mobile technology. It was applied to the problem of traffic control in the city of Amman-Jordan, and a system is built in cooperation with the Traffic Engineering Department of the Amman City Municipality. In particular, this system is suitable to be uploaded to the Internet and to work online to help drivers and traffic management personnel to be more informed, based on intelligent transport control decisions. This simplifies the control of city transport and makes it more efficient and economical. In this paper, we illustrate the overall architecture of the system and the algorithm used to solve the optimal path problem. WTS represents an online guide traffic status navigation, which may be an important part of any traffic control system and will be a very useful tool for the next generation cars.

Keywords: Traffic control, dynamic data, routing algorithm, GIS, optimal path.

Received April 11, 2004; accepted October 10, 2004

Print E-mail

Intelligent Multi-Agent Based Multivariate Statistical Framework for Database Intrusion Prevention System

P. Ramasubramanian and A. Kannan

School of Computer Science and Engineering, Anna University, India


Abstract: This paper describes a framework for highly distributed real-time monitoring approach to database security using intelligent multi-agents. The intrusion prevention system described in this paper uses a combination of both statistical anomaly prevention and rule based misuse prevention in order to detect a misuser. This paper describes a framework for a statistical anomaly prediction system using a multivariate statistical forecasting model, which predicts unauthorized invasions of user based on previous observations and takes further action before intrusion occurs. This paper focuses on detecting significant changes of transaction intensity for intrusion prevention. The experimental study is performed using real data provided by a major Corporate Bank. Furthermore, a comparative evaluation of the proposed model over the traditional statistical forecasting models was carried out using mean absolute percentage error on a prediction data set and a better prediction accuracy has been observed. The misuse prevention system uses a set of rules that define typical illegal user behavior. A separate rule subsystem is designed for this misuse detection system and it is known as Temporal Authorization Rule Markup Language (TARML). In order to reduce single point of failures in centralized security system, a dynamic distributed system has been designed in which the security management task is distributed across the network using intelligent multi-agents.

Keywords: Multi-agents, database security, statistical database anomaly prediction, database misuse detection.

Received April 15, 2004; accepted August 16, 2004

Print E-mail

3D Web-Based Anatomy Computer-Aided Learning Tools

Nuha El-Khalili

Department of Computer Science, University of Petra, Jordan

Abstract: The advancements in computer graphics and the establishment of the world wide web as an ubiquitous repository of information have facilitated the creation of computer-aided learning tools that have wide accessibility. When such applications offer information about human anatomy, three-dimensional representations of such information are highly valuable to the learner in exploring the human organs in 3D and understanding the spatial relationships between them. This paper presents two computer-aided learning tools that utilize 3D web technologies to assist students in understanding human anatomy and physiology.

Keywords: Computer-aided learning, anatomy and physiology information, VRML, Java 3D, world wide web.

Received April 17, 2004; accepted July 17, 2004

Print E-mail

Fuzzy Reinforcement Learning Rectilinear Follow-up of Trajectory per Robot

Youcef Dahmani1 and Abdelkader Benyettou 2

1 Laboratoire SIMPA, Ibn Khaldoun University Tiaret, Algeria

2 Department of Computer Sciences, University of Sciences and Technology of Oran, Algeria


Abstract: Knowing the action space of an order, the objective consists in distributing this space in a certain set of actions equitably in order to choose the famous action among the candidate ones. This process is ensured by reinforcement learning aided by fuzzy logic. We have established an algorithm applying the fuzzy Q-learning with a fuzzy limited lexicon. We have applied it to a robot for the training of the follow-up of a rectilinear trajectory from a starting point “D” at an unspecified arrival point "A", while avoiding with the robot butting against a possible obstacle. The goal of this work tries to answer the question, in what the reinforcement learning applied to fuzzy logic can be of interest in the field of the reactive navigation of a mobile robot.

Keywords: Mobile robot, navigation, reinforcement learning, fuzzy logic, fuzzy Q-learning, fuzzy inference system.

Received April 21, 2004; accepted August 21, 2004

Copyright 2006-2009 Zarqa Private University. All rights reserved.
Print ISSN: 1683-3198.
Warning: fsockopen(): php_network_getaddresses: getaddrinfo failed: Name or service not known in /hsphere/local/home/ccis2k/ on line 251 Warning: fsockopen(): unable to connect to (php_network_getaddresses: getaddrinfo failed: Name or service not known) in /hsphere/local/home/ccis2k/ on line 251 skterr