ACIT'2014 Proceedings

FUZZY ARABIC DOCUMENT CLASSIFICATION

ALI EL-AMEEN1
ADNAN SHAOUT2
1Sudan University of Science and Technology
2The University of Michigan Dearborn

 Abstract: The amount of available data on the web is enormously increasing, which require accurate and efficient techniques to facilitate classification. Arabic language is very inflectional and complex due to the use of diacritic which often ignored by the writers and the multi meaning of a single word. This pose a situation of uncertainty of the meaning of an Arabic word which affect the classification seriously .in this work we are trying to solve this uncertainty through fuzzy representation of a single word.

Keywords: Data Mining, Fuzzy Logic, Document classification.

 

 

HEALTH SMART HOME (HSH): HOME SOUNDS CLASSIFICATION BASED ON DTW

MOHAMED FEZARI1, LEILA ABDOUNE1, ALI AL-DAHOUD2
1.Faculty of Engineering , Badji Mokhtar Annaba University, Algeria
2.Faculty of IT Al-Zaytoonah University Amman, Jordan

Abstract: This work is part of CNEPRU ( University research project in Algeria) project , it describes the construction phase of a corpus of everyday life sounds for a system of separation and classification of audio sources in a habitat; an application of telemonitoring of the elderly or disabled. First the key concepts of the research area are presented, we studied the different sounds used in an application of telemonitoring from which we are inspired to create our database and then we presented works and projects that address detection of distress situations and recognition of activities. Finally we implemented a Graphic used Interface based on simple features for classification of seven type of home sounds. The obtained results are very encouraging.

Keywords: health smart home; Features and classification, DTW; everyday life sounds

 Full Text


3D MULTIMEDIA MODEL FOR EDUCATIONAL DESIGN ENGINEERING

*1,2MOHANAAD T. ALNASEERI 3 AMIR H. ALFALAHI, 4 MOHAMMED A. ALZIDI
1 Alma’ref university, college, Department of engineering of computer technolog, Ramady, Iraq.
2University Tenaga National, COGS, Malaysia
3Metro College of Technology, Department of Mechanical Engineering, Faculty of Mechanical Engineering, Toronto
4Alma’ref university college of computer tecknology, Department of Engineering ,Iraq

Abstract: This paper tries to propose educational design by using multimedia technology for Mechanical Engineering Design (shockwave, shock tunnel) students in COE, at UNITEN (University Tenaga National), Malaysia. And evaluate the acceptable, Cognition, and interactive of student to the propose model by using statistical relationship to determine the stage of Appropriate model for student. Objectives of propose education design, to develop a user friendly software for education purposes using multimedia technology, to develop animation for 3D model to simulate assembling and disassembling process of High speed flow shock tunnel.

 

Keywords: CAL, Multimedia, Shock Tunnel, Interactivity, engineering education.

Full Text


Real Time Alzheimer's Patients Location Detection Hybrid Proposed Model

AZMI SHAWKAT ABDULBAKI

Computer College , University of Anbar, Iraq

 Abstract: Alzheimer disease, is the most common form of dementia, affects the brain and develops a man loses his memory and ability to concentrate and learn which worsens as it progresses, and eventually leads to death. In the recent years, The interest grew up for Radio Frequency Identification (RFID). This technology is electronic tagging technology, which can provide a digital identity for an objects especially determining the locations of people. RFID is one of the most exciting technologies that revolutionize the working practices by increasing efficiencies, and improving profitability. Many attempts to use this technique in medical fields to save patient's information , cures and their locations . It have big characteristics and various applications. It is very cheap technology , wide broadcast , enables wireless data transmission, and widely used for tracking and detection. In this papers, a Hybrid proposed mechanism to locate the missing Alzheimer's patient in the public locations that consists of RFID system and Zigbee wireless sensor network was present. The technology based on RFID consist of small hidden chip in the patient's pocket or small E-bracelet placed on the patient's wrist to detect exactly the patient's location in real time by their families because of large number of Alzheimer's patients get lost in the public locations or in the extremely crowded places due to infection their memory losing.

Keywords: Radio Frequency Identification, Alzheimer's Patients, E-Bracelet, Small Hidden Chip

Full Text 


Hand Gestures Detection And Recognition Building System For Stroke Patients Using Supervised Neural Networks

AZMI SHAWKAT ABDULBAKI
Computer College , University of Anbar/Iraq

Abstract: According the World Health Organization (WHO) reports in 2010, there are more than 17,000,000 people infected with stroke yearly in all countries of the world as a result of the brain injury and prevent damage to the blood supply to the brain which leads to the injury that the patient is suffering of total paralysis or paraplegia.The researchers in the field of technology asserted to find solutions for Stroke patients who cannot move parts of their bodies due to injury , help to create an easy of stroke patients to perform daily functions easily using Hand Gesture . The Hand Gesture (HG) has become an alternative to traditional input devices such as a mouse and keyboard and etc.The proposed model is built by using supervised neural networks (SNN). The idea of this algorithm is reading hand signals (HS) by high resolution camera and processed by the computer after supervised neural networks applied .

Keywords: Hand Gestures , Stroke Patients , Supervised Neural Networks , Hand Signa

 Full Text 


 Achieving The Excellence Performance By Using Knowledge Management And Innovation Framework

HOSSAM ELDIN YOUNES¹, OSAMA BAWADY², NEVIEN KHOURSHED³

¹’²’³ Arab Academy for Science and Technology & Maritime Transport

¹’² College of Computing and Information Technology

³Productivity and Quality Institute

Abstract: This paper focuses on how the College of Engineering at ABC (a pseudonym is given to mask the University's name) can achieve the quest of excellence by using the proposed Knowledge Management and Innovation Framework (KMIF). A previous work study by the researchers focusing on measuring Knowledge Management (KM) Enablers, KM Practices and Innovation revealed a moderate level of KM that is encouraging to propose a KMIF. That study focused on measuring personal perception and expectations for faculty staff about using the proposed KMIF. This paper contributes towards filling the gap between the previous work study results and using the proposed KMIF to achieve excellence and World Class University (WCU). The framework of this study is based on the idea of change and continuous improvement of all processes inside the College of Engineering to be more effective than its competitors. It was also based on getting feedback from stakeholders, self-assessment, benchmarking the final results achieved by the college of engineering with the higher ranks college, and hence, making the required changes to be on the road of the WCU. The study proved that the College of Engineering has significant opportunities for using the KMIF to achieve the quest of excellence. 

Keywords: Knowledge Management System, Business Excellence, Innovation, World Class University

 Full Text 


 Intelligent Method for Cloud Task Scheduling Based On Particle Swarm Optimization Algorithm

ASHRAF B. EL-SISI, MEDHAT A. TAWFEEK, ARABI E. KESHK, FAWZY A. TORKEY
Department of Computer Science, Faculty of Computers and Information, Menoufia University, Egypt

Abstract: The core idea of cloud computing is managing and scheduling uniformly computing resources that are connected by a network to provide user services according to the needs. One of the important issues in this environment is related to task scheduling. The scheduler should do the scheduling process efficiently in order to utilize the available resources. In this paper, a particle swarm optimization algorithm for cloud task scheduling has been proposed. Particle swarm optimization algorithm is a computational method that optimizes a solution to problem by iteratively trying to improve a candidate solution with regard to a given measure of quality. The main goal of the proposed algorithm is minimizing the makespan of a given tasks set. The proposed algorithm has been compared with ant colony optimization and random algorithms using CloudSim toolkit package. Experimental results showed that the proposed algorithm outperformed ant colony optimization and random algorithms.

 Keywords: Cloud computing, task scheduling Makespan, Particle swarm optimization, CloudSim 

  Full Text 


Weighted Round Robin Policy for Service Brokers
In a Cloud Environment

MOHAMMED RADI
Computer Science Department,Faculty of Applied Science
Alaqsa University, Gaza

Abstract Cloud computing is a distributed computing paradigm wherein computation is performed by a third-party computer. It can be utilized in storage. In the Cloud Analyst simulation tool, a service broker applies a service broker policy to select the target data center (DC) when a user creates a new request. The routing policy based on service proximity is one such policy; it routes user requests by selecting the closest regional DC. When the closest region contains more than one DC, this routing policy randomly selects one of these centers without considering its characteristics. However, this random selection of DCs limits response time and DC processing time when the processing capacities of DCs differ. In this study, we therefore propose a weighted round robin (WRR) service broker policy that maintains a weighted list of all DCs in the same region and forwards new requests according to the weight (or preference) of each DC. We integrated this policy into the Cloud Analyst simulator and then compared it with other policies. Simulation results proved that the proposed WRR policy improves overall response time and DC processing time.

Key Words: Service Broker Policy, Cloud Computing, Data Center Selection, Cloud analyst.

  Full Text 


 

A Secure Cloud Based Architecture for a
Muslim Spouse Search Website 

 

FOUAD ATOUI and ADNAN SHAOUT
The University of Michigan-Dearborn
The Electrical and Computer Engineering Department Dearborn, MI 48128

 Abstract: The idea of online spouse search within Islam communities outside the Muslim world continues to be a debatable topic within some Muslim families that adheres to the standards, and principles of the Islamic laws and jurisprudence. The families that support online spouse searching argue that this route is safer than the face to face route. The reason they argue, is that it will minimize the face to face encounter of their daughter with total strangers. On the other hand, the families refuting online spouse searching argue that strangers can have fake profiles posted online and thus their daughter will be dealing with a total stranger that is not real. This kind of exposure will go a long way and possibly scar their daughter emotionally for a long time by filling her heart with sadness and disappointment. In this paper, we are proposing a secure layered architecture model for an online Muslim spouse search website. This secure layered architecture model will allow the Muslim families to trust the online spouse search that has been looked down on by many, due to the lack of security tools that would eliminate fake profiles and impostors.

Keywords: Muslim spouse searching, instant block, online dating, secure dating, fake profile, catfishing.

  Full Text 


  Security Solution for Cloud Computing Using a Hardware Implementation Of AES

ADNAN SHAOUT*, NEVRUSKAJA+ and MIKHAIL BOROVIKOV++
The University of Michigan - Dearborn
The Electrical and Computer Engineering Department
Dearborn, Michigan 48128,USA

Abstract: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction [9]. As every technology in general, its benefits are associated with a variety of risks. Some of its major risks are security of data, authenticity, and protection. The objective of this paper is to come up with a robust and secure solution regarding the security of data in the cloud. Currently, there are many methods and provisions for cloud security but due to the "big data" nature of the cloud, most of them are software implementations [8]. In this paper we have implemented the Advanced Encryption Standard (AES) which is one of the most secure encryption algorithms using hardware. This solution provides one of the fastest and most secure methods to receive, transmit and store data. According to our results we are able to implement this solution 16.15 times faster than other software implementations and 51.5 times faster than other hardware implementations.

Keywords: cloud computing, data security, advanced encryption standard, FPGA, hardware design

  Full Text  


 

فكاللبسالمعجميعندالمعالجةالآليةللغةالعربية

رضا زبدي

قسم علوم اللسان، جامعة الجزائر 1

جمال بن نوار

قسم الإعلام الآلي، جامعة البويرة

ملخص

اقترحت العديد من المقاربات في مجال فك اللبس المعجمي، و هي تقسم إلى فئتين: المقاربات بالإشراف والمقاربات دون إشراف. تعتمد المقاربات بالإشراف على كم هائل من المدونات المشروحة يدويا، أما المقاربات دون إشراف، فتعتمد على الموارد المعجمية وقياس التشابه الدلالي بين المعاني.تمثل المشكل الرئيسي في خوارزميات فك اللبس دون إشراف في العدد الهائل لتركيبات المعاني المحتملة ، مما يجعل تنفيذها غير قابل للتحقق. لحل هذه المشكلة نلجأ إلى استعمال خوارزميات استمثال مثل الخوارزميات الوراثية والتخمير المحاكي وخوارزميات النمل و غيرها. هذه الطرق تسمح بالتقليل من عدد التركيبات المعالجة وبالتالي تنفيذ الخوارزمية في وقت معقول.

الكلماتالمفتاحية

المعالجة الآلية للغة ، اللبس المعجمي ، فك اللبس ، التشابه الدلالي ، خوارزميات الاستمثال.

النص بالكامل


Mining Changes of Opinions Expressed By Students To Improve Course Evaluation

Alaa El-Halees
Faculty of Information Technology, Islamic University Of Gaza, Gaza, Palestine

 

Abstract: Opinion mining can be used in many applications. In universities, students' opinions about courses can be considered as a significant informative resource to improve the effectiveness of education. Past works in this area focused on direct mining of students' opinions in regard to the courses. The aim of this paper is to develop a system which detects changes of students' opinions. Understanding such changes can help the management improve course evaluation in academic institutions. For course evaluation, knowing what is changing and how it has changed is crucial as they allow the management to provide the right course features such as teachers, contents, teaching materials and exams which need to satisfy the students' needs. In our work, we present a strategy for mining opinion changes based on the associative classification approach. Firstly, we collect opinions from students in two different semesters in regard to a specific course. Then, we extract rules using association rules. For this purpose, we detect and measure students' change of opinion from one semester to another. We describe types of opinions which can be detected by the students. Finally, we shed light on some of the examples which we have spotted from each type of opinion change.

Keywords: Educational Opinion Mining, Change Opinion Mining, Higher Education Evaluation

   Full Text  


Hyper Method for Improving Precision of Text Similarity

BOUMEDYEN SHANNAQ
Information Systems Experts,
Ministry of Regional Municipalities and Water Resources, OM

Abstract: Improvement and development of production factors through new technologies requires a systematic increase as technical and professional level of employees and skills within specific job functions. This increasing interest both enterprises and workers themselves, since the requirements for quality employees is constantly increasing. The proposed algorithm for implementing the supervisor information system application oriented to support Ministry of Regional Municipalities and Water Resource (MRMWR) ,Sultanate of Oman in managing and controlling text operations related to the transformation to the electronic government. The smart application , is intended to improve the accuracy of text similarity problem found in frequent customers questions, checking the originality of the published information by MRMWR ,and selected proper training programs based on job description files ..The main objective of this work , is to develop an optimal solution for matching text similarity for critical functional requirement performed by MRMWR .As well as to minimize critical evaluation mistakes that could be done by the supervisors . Different text files have been selected from specific data base that contains different text files . The outcome of this work is an truthful and real application that could be used and implemented in real organization systems.-work.

Keywords: Text Similarity ,Information Systems ,E_Goverment.

   Full Text  


Noise Removal Techniques for Arabic Handwriting

ROQYIAH M.ABDEEN AHMED Z.AFIFI ASHRAF B.ELSISI

Computer Science dept., Faculty of Computers and Information, Menofia University, Egypt

Abstract: Noise reduction is a very important task for character recognition system. Image quality and execution time are also important factors to choose the suitable noise reduction approach. Therefore, in this paper a comparative study of six different noise reduction approaches for Arabic handwriting is presented. These Approaches are mean filter, median filter, majority morphological filter, majority logic filter, coordinate morphological filter and coordinate logic filter. These filters are tested on 30 gray scale image of Arabic words with two different noise types (salt & pepper and Gaussian noise) and three levels of noise density. Mean Square Errors (MSE) and Peak-Signal to Noise Ratio (PSNR) are used to evaluate the image quality of different approaches. The experimental results show that the morphological filter preserves the details of the image and gives high PSNR value and low error rate; however, it requires more execution time. The logical filter on the other hand requires less execution time; however, it gives low PSNR value. The coordinate morphological filter is half way between other filters, it does not require a high execution time like morphological filter and the PSNR is not low as the logical filter. The previous filters are tested also on three standard natural gray scale images and the results appear similar with the previous results for images that contain Arabic handwritings.

 Keywords: Noise reduction, Morphological filters, Logic filters,Mean Square Errors, Peak-Signal to Noise Ratio 

Full Text   

 


Implementation of Complex Wavelet Packet Modulation System Using FPGA Platform

Hikmat N. Abdullah1, Fadhil S. Hassan1 And Alejandro Valenzuela2
1Electrical engineering department Al-Mustansiryah University, Baghdad, Iraq
2EMT department H-BRS University of applied sciences, Bonn, Germany

Abstract: Complex wavelet Packet modulation CWPM system has gained special interest as compared with traditional WPM due to its positive features like shift insensitivity, good directionality, and presence of phase information. The objective of this paper is to design a baseband π/4-DQPSK CWPM transceiver and implementing it on FPGA hardware. The design uses 8-point Discrete Wavelet Packet Transform DWPT/ Inverse Discrete Wavelet Packet Transform IDWPT as the core processing module. All modules are designed using VHDL programming language. Software tools used in this work are Altera Quartus II 9.1 and Altera ModelSim 6.5b. Cyclone III board EP3C120F780C7 is used as the target device.

 

Keywords: Field Programmable Gate Array, Complex Wavelet Packet Modulation, DQPSK

 Full Text    


BÉZIER CURVES TO RECOGNIZE MULTI-FONT ARABIC ISOLATED CHARACTERS

AZZEDINE MAZROUI and AISSA KERKOUR ELMIAD
Faculty of Sciences, Oujda, Morocco

 

Abstract: The recognition of Arabic characters is still a major challenge to overcome. In this paper, we propose a new approach in the field of recognition of multi-font Arabic characters. It draws on the semi-cursive Arabic characters and consists in assimilating them to a small number of checkpoints equipped with their derivatives. The choice of this approach is motivated by the interesting properties of Béziercurves that allow drawing parametric curves from a limited number of dots equipped with their tangents. The results achieved are very interesting and relate to character recognition derived from a large number of fonts (23 fonts).

Keywords: Automatic recognition of characters, Bézier Curves, Recognition, Preprocessing

 Full Text   


 Simulation of a Cost Model Response Requests for Replication In Data Grid Environment

BENATIALLAH ALI, KADDI MOHAMMED, BENATIALLAH DJELLOUL, HARROUZ ABDELKADER
Laboratoire LEESI, faculté des science et technologie
Université d’adrar 01000 Algérie

 

 

 

Abstract: Data grid is a technology that has full emergence of new challenges, such as the heterogeneity and availability of various resources and geographically distributed, fast data access, minimizing latency and fault tolerance. Researchers interested in this technology address the problems of the various systems related to the industry such as task scheduling, load balancing and replication. The latter is an effective solution to achieve good performance in terms of data access and grid resources and better availability of data cost. In a system with duplication, a coherence protocol is used to impose some degree of synchronization between the various copies and impose some order on updates. In this project, we present an approach for placing replicas to minimize the cost of response of requests to read or write, and we implement our model in a simulation environment. The placement techniques are based on a cost model which depends on several factors, such as bandwidth, data size and storage nodes.

Key Words: response time, query, consistency, bandwidth, storage capacity, CERN

 Full Text 


A New Method for Mobile Robot Navigation in Unstructured Environments

HAMANI MILOUD and HASSAM ABDELOUAHAB

Intelligent Systems Laboratory, University of Ferhat Abbes Sétif-1, 19000, ALGERIA

Abstract: In this paper, an Iterative Artificial Potential Field (IAPF) method is developed to improve the navigation of a mobile robot in unknown and complex environments. Its aim is to control the mobile robot in performing a navigation task from a start position to a target position while avoiding unknown obstacles on its way. In the developed approach the target creates a virtual force that attracts the robot while the obstacles create a virtual force that repels the robot. IAPF-based methods are very interesting because they are simple to implement; however, they have some inherent limitations, that the trajectory can have undesirable oscillations. The New iterative potential field is proposed in order to improve the quality of the robot navigation by minimizing the oscillations especially in narrow passages.

Some simulation results are presented to show the ability of the proposed algorithm in performing successfully in unstructured environments.

Keywords: Mobile robot, iterative potential field, obstacle avoidance, unstructured environments.

   Full Text 


  Ontology Based Semantic Retrieval of Learner Profile

T.SHEEBA, RESHMY KRISHNAN

Muscat College, Ruwi, Sultanate of Oman

Abstract: E-learning refers to the use of electronic technologies to deliver and facilitate training anytime, anyplace. The major challenge in e-learning is that the learner is unable to extract relevant information on the web. Ontology-based semantic retrieval is a hotspot of current research. Ontologies play an important role in the development of knowledge. This paper proposes ontology based semantic retrieval for learner profile using Resource Description Framework (RDF). First, a data model is constructed to represent learner profile information on the Semantic Web. Then, semantic retrieval is obtained by applying the query language SPARQL (Simple Protocol and RDF Query Language). In addition SWRL (Semantic Web Rule Language) rule language is also applied to increase the expressiveness of OWL language. Experiments were performed using the editor Protégé 4.2 beta. The result shows the successful semantic retrieval of learner profile information on the Semantic Web.

Keywords: Learner Profile, SPARQL, OWL2, SWRL, Protégé 4.2 beta, Semantic Web

 

   Full Text 


An MDA Based Derivation Process for Software Product Lines

NESRINE LAHIANI1 and DJAMAL BENNOUAR2

1Departement of Computer Science ,Saad Dahlab university, Blida, Algeria

2Department of Computer science, Akli Mohand OulHadj University, Bouira, Algeria

 

 Abstract: Product derivation represents a fundamental aspect in software product line (SPL). It is also the main challenge that SPL faces. Despite its importance, there is only a little research on product derivation compared to the large work on developing product lines. In addition, the few available research reports guidance about how to derive a product from a product line. In this paper we describe a combination of SPL and MDA which both fit perfectly together in order to build applications in cost effective way. We proposed an approach for product derivation that adopts MDA with its organized layers of models to achieve SPL goals.

 

Keywords: Product Line, Software, Product Derivation, Model Driven Architecture

   Full Text 


Algorithmic Synthesis of Switched Mode Power Supplies SMPS

Murad Ahmed Ali Taher
Department of Computer Engineering, Hodeidah University, Yemen

 

 

Abstract: This paper develops and proposes a fully algorithmic method for generating different subfamilies of SMPS with a galvanic isolation and fully utilization of magnetic core. This method uses the Main Topological Matrix MTM. The definition and attributes of the MTM are stated. The common properties for single-switch SMPS are described. This method is fully algorithmic instead of traditional one that based only on the skills of the designers. This method is considered the design by parts that facilitates the design of power electronic circuits. And by some examples will be shown how this method is effective to generate different sub-class (sub-family) of SMPS with required and predetermined characteristics.

Keywords: Algorithmic synthesis,, SMPS , magnetic core, isolation, MTM.


Gain Improvement of Ultra Wideband Patch Antenna for Wireless Communication Applications by Using Two Triple Transition Steps Hexagonal Patch as Array Antenna

MALIK JASIM FARHAN, ABDULKAREEM SWADI ABDULLAH

Department of Electrical Engineering,College of Engineering, University of Basrah

Basrah, IRAQ

 Abstract: A novel printed triple transition steps hexagonal patch antenna is proposed in this paper to be used in the ultra wideband (UWB) applications. The proposed antenna consists of a hexagonal patch with the appropriate dimensions, a triple transition steps on one side of a dielectric substrate, and a partial ground plane on the adverse side of the substrate. In order to cover the whole bandwidth allocated for UWB applications, many techniques are used in this paper to optimize the design of the proposed antenna such as; adjusting the dimensions of the three transition steps to control the stability of impedance, adjusting the gap between the lower edge of the lower transition step and the ground plane, the feed point position, and using a new technique named single slant end feeder. An array consists, of two elements of this antenna is used to improve the gain and preserve the bandwidth in the range of UWB. The radiation characteristics of the proposed array of antenna such as the radiation pattern, gain, and impedance bandwidth are investigated and found be acceptable over the entire operational bandwidth.

Keywords: Hexagonal antenna, patch antenna, printed antenna, transition steps, and Ultra WideBand

    Full Text 


 

Avoiding Dropped Messages duringService Discovery In Hybrid Networks

Intisar Al-Mejibli 1, Martin Colley 2

1 Head of the Department of Managing Information System

Managing information Systems College, University of Information Technology and Communications, Ministry of Higher Education & Scientific Research, Baghdad, Iraq

 

2 Department of Computer Science and Electronic Engineering

University of Essex, Colchester, Essex, UK

 

Abstract: Sending many messages in a short period of time might cause congestion in the network resulting in one or more message queues overflowing at the receiving or intermediate nodes causing the potential loss of many messages.

Minimizing the number of dropped User Datagram Protocol (UDP) messages in a network is considered as a challenge for researchers.

This paper proposes an algorithm to predict the minimum period of time required between two or more consecutive bursts of messages and suggests the minimum queue sizes for the routers, to manage the traffic and avoid the dropping of messages. The algorithm has been applied to the Universal Plug and Play (UPnP) protocol. It was tested in hybrid network with different backward traffic. The message length and bandwidth of the links among the routers were taken in the consideration. Simulation results show a reduction in dropped messages among the routers.

Keywords: hybrid networks; dropped messages; service discovery protocols; network Utilization.

     Full Text 


 

An Extractive Graph-Based Arabic Text Summarization Approach

AHMAD T. AL-TAANI and MAHA M. AL-OMOUR

Department of Computer Science, Yarmouk University, Jordan

Abstract: In this study, we proposed an Arabic text summarization approach based on extractive graph-based approaches. In order to measure the efficiency of the proposed approach, several basic units such as stem, word, and n-gram are applied in the summarization process. The Arabic docu-ment is represented as a graph and we used the shortest path algorithm to extract the summary. Similarity between any two sentences is determined by ranking the sentences according to some statistical features. The final score is determined for each sentence using PageRank scoring, and finally, the sentences with high scores are included in the summary considering the compression ratio. The proposed approach is evaluated using EASC corpus, and intrinsic evaluation method. The results showed that the proposed approach achieved good results. Also, the results showed that the use of n-grams as a basic unit in summarization process achieved better results than the stem and word.

Keywords: Text Summarization, Arabic documents, Graph-based approaches, Statistical-based ap-proaches, n-gram, Stem.

   Full Text 


  Fault-Proneness of Open Source Systems: An Empirical Analysis

Mamdouh Alenezi

College of Computer & Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia

Shadi Banitaan

College of Engineering & Science University of Detroit Mercy Detroit, MI 48221, USA

Qasem Obeidat

Department of Software Engineering, Al-Zaytoonah University of Jordan, Amman 11377, Jordan

Abstract: Developing quality software is a very complex job considering the complexity and size of software developed these days. Early prediction of software quality assists in optimizing testing resources. Many fault prediction models have been developed using several internal attributes and different machine learning techniques. However, the open-source community still lacks a concise knowledge about what types of internal attributes affect the software quality the most. In this work, an empirical investigation is conducted to explore the relationships between internal attributes of open-source systems and their fault-proneness. The results of the empirical analysis showed that by selecting only nine internal attributes, the fault prediction models accuracy did not decrease significantly. This indicates that only a subset of these internal attributes is worth collection and investigation. By focusing on a small set of internal attributes, the quality assurance team can save time and resources while achieving high accuracy fault-proneness predictions.

Keywords: fault-proneness, open-source systems, internal attributes quality.


   Full Text 


  Toward An Ontology Based Approach for Data Warehousing
State Of The Art and Proposal

Elhaj Elamin1 And Jamel Feki2

1sudan University Of Science And Technology, Khartoum, Sudan

2laboratory Mir@Cl, University Of Sfax, Sfax, Tunisia

Abstract: The design process of a data warehouse (DW) raises many problems and then is considered as a complex and tedious task. DW designers follow different levels concerning the design process; among these levels the conceptual level gains a significant care in the literature so far. Recently, using a hybrid approach conjugated to a semantic resource is considered as a successful way for designing a DW that meets the decision makers' requirements, the organization’s operational data source, and the design quality. Many works have been proposed, as well, different approaches or/and methods have been applied for designing a DW. However, still there is not yet a common approach that designers can follow to design a DW. This paper is twofold objectives: First, we conduct a comprehensive survey among proposed works in order to compare their methods based on a set of significant criteria. Secondly, considering the result of this study, we suggest an ontology-based hybrid approach for the DW design. The result is a framework consisting in three main steps: i) Building star schemas based on business-requirements; ii) Building star schemas from an operational data-source; and iii) Matching the two sets of schemas to produce a DW model compliant to user and data source simultaneously. In order to enhance these steps, each one uses an ontology as a knowledge representation to alleviate semantic issues.

Keywords: Decision Support System, Data Warehouse, Multidimensional model, Star schema, Semantic resource, Conceptual design.

   Full Text 


On The Security of “A Strong Key Mechanism Generated By LFSR Based Vigenère Cipher”

ESAM ELSHEH1, KHALILESSOWANI2

Information Technology Department

College of Engineering Technology – Janzour- Libya

Abstract: In the recent years, enormous encryption techniques have been proposed and published without considering the basic recent security principles of the modern cryptography. One of these encryption algorithms is proposed by A. Razzaq et al. (ACIT, 2012). In this paper, we cryptanalyze this algorithm and show that the scheme is not immune against the known-plaintext attack, and consequently is insecure to be used in the real applications. We also invalidate several of the security advantages claimed by the authors.

 Keywords: Vigenère cipher, LFSR key generator, Known plaintext attack, Linearcipher

 

Towards A Multi-Agent Mechanism for Software Component Selection

M. ELAMMARI and R. ALI

Faculty of Information Technology, University of Benghazi, Benghazi, Libya

Abstract: When searching for most suitable software components that have to meet specific requirements, ideally developers would be able to use an efficient and reliable mechanism.In this work, a multi-agent mechanism was developed that can find and select the appropriate components according to the behavior, characteristics, and internal structure of agents as well as their cooperation and coordination. The Aspect-Oriented Component Engineering (AOCE) methodology was also used to describe and categorize software component capabilities and to clarify the internal relationships among them.

Keywords: Software engineering, Software Component, Aspect-Oriented Component Engineering, Mulitagent Systems. 

   Full Text 


An Investigation of the Impact Of Light Stemming Strategies On Arabic Information Retrieval

SULEIMAN H. MUSTAFA and MANAL AKWANIN

Yarmouk University, Irbid, Jordan

Abstract: Due to the affix structure of words in Arabic, a given word may take different forms in different contexts. These variants may not be recognized as semantically equivalent in IR without some processing, Stemming is one of the most commonly used techniques for doing so. The research reported in this paper evaluates the retrieval effectiveness of four different stemming algorithms for Arabic information retrieval systems, including those reported by Khoja, Taghva, Mustafa, and Aljlayl and compare their performance with no stemming. The first two are considered heavy stemmers, while the others are classified as light stemmers. The evaluation was based on a set of 477 documents on medical herbs comprising more than 95856 Arabic words. The index terms were prepared by an expert in the field. Three performance metrics were used in this study, including average precision at recall 10, P@5, and R-precision. The results indicated that all stemmers significantly outperformed zero stemming. However, light stemming algorithms showed better performance than heavy stemming algorithms in all experiments using the three evaluation metrics.

Keywords: stemming algorithms, information retrieval for Arabic, term conflation, root extraction, Arabic morphology

   Full Text 


 Document Clustering Using Graph Based Document Representation with Constraints

FARNAZ AMIN

Masters Student of National University of Computer & Emerging Sciences, Karachi, Pakistan

MUHAMMAD RAFI

Faculty of Computer Science, National University of Computer & Emerging Sciences, Pakistan

MOHAMMAD SHAHID SHAIKH

Faculty of Electrical Engineering, Habib University, Karachi, Pakistan

Abstract: Document clustering is an unsupervised approach in which a large collection of documents (corpus) is subdivided into smaller, meaningful, identifiable, and verifiable sub-groups (clusters). Meaningful representation of documents and implicitly identifying the patterns, on which this separation is performed, is the challenging part of document clustering. We have proposed a document clustering technique using graph based document representation with constraints. A graph data structure can easily capture the non-linear relationships of nodes, document contains various feature terms that can be non-linearly connected hence a graph can easily represents this information. Constrains, are explicit conditions for document clustering where background knowledge is use to set the direction for Linking or Not-Linking a set of documents for a target clusters, thus guiding the clustering process. We deemed clustering is an ill-define problem, there can be many clustering results. Background knowledge can be used to drive the clustering algorithm in the right direction. We have proposed three different types of constraints, Instance level, corpus level and cluster level constraints. A new algorithm Constrained HAC is also proposed which will incorporate Instance level constraints as prior knowledge; it will guide the clustering process leading to better results. Extensive set of experiments have been performed on both synthetic and standard document clustering datasets, results are compared on standard clustering measures like: purity, entropy and F-measure. Results clearly establish that our proposed approach leads to improvement in cluster quality.

Keywords: Document Representation, Constrained clustering, Document Clustering, Instance level constraints, background knowledge

   Full Text 

  Acceleration the Web Pages Classifier Using The Hits Algorithm

Meadi Mohamed Nadjib

Computer Science Departement, Lesia Laboratory

University Of Biskra, Algeria

Babahenini Mohamed Chaouki

Computer Science Departement, Lesia Laboratory

University Of Biskra, Algeria, Chaouki.

Abstract: Nowadays, The increasing demand for information contained in web pages requires the use of automatic classifiers. These classifiers are facing the problem of large-scale size of the input data because they must handle millions of Web pages, tens of thousands of terms or features and hundreds of categories. These constraints have revealed an important challenge which is the reduction of the input data without influencing the classification results.

In this paper, we present an approach for accelerating the learning and the classifications phases of web pages classifiers. The acceleration is achieved by reducing the size of the training set in both axes; web pages and features using the HITS (Hypertext induced Topic Search) algorithm. Originally, the algorithm was designed for ranking web pages according to the quality of the pages that are linked to them. A comparative study between the classical classifier and the accelerated one was conducted in order to test the efficiency of the proposed approach.

Keywords: Web mining, link Analysis, Bipartite graph, HITS, SVM.

    Full Text 

Application-Based Statistical Approach to Identifying Queuing Model

NAIMEH HIRBAWI BADIE SARTAWI

This email address is being protected from spambots. You need JavaScript enabled to view it. This email address is being protected from spambots. You need JavaScript enabled to view it.

Al-Quds University, Computer Science Department, Jerusalem, Palestine

July 2014

Abstract: Queuing theory is used to model many systems in different fields in our life; it is used in simple systems and complex ones. The main idea in the application of a mathematical model is to measure the performance measures of the application in order to improve the performance of the system. This paper will present an analytical method and simulation model in estimation the appropriate model for applications and support to identify the variable parameters that affect the performance measures of the application. The analytical method depends on the mathematical parameters of the real application and according to their values we define the characteristics of the queuing model. Simulation is designed to support and help the decision-makers whether in computer science or mathematics to define the appropriate queuing model and then it will calculate the performance measures for the model.

Keywords: Queuing theory, queuing model, performance measures, mean, variance, Coefficient of Variance.

     Full Text


دورالتدريبالإلكترونيفيتنميةالمواردالبشريةالعربية

The Role of E-Training for Arabic Human Resources Development

جميلإطميزي،أستاذمشاركومديرمركزالتعليمالإلكتروني

جامعةفلسطينالأهليةبيتلحم/فلسطين.

ملخص:

يشهد العالم المعاصر تطورا  نوعياً وكمياً غير مسبوق في مجالات تقنية المعلومات، كما وتشهد المجتمعات البشرية ومنها المجتمعات العربية تغييرا ت سريعة في كل المجالات وعلى رأسها تقنيات وأساليب التعليم والتدريب، مما يفرض على القيمين على مراكز تنمية الموارد البشرية والتدريب مواكبة تلك التطورات، ورسم الخطط لدمج التقنيات الحديثة لا سيما التدريب الإلكتروني في منظومتها.

وفي عصر يتصف بالسرعة والتغيير المستمر، فان أهمية تدريب الموارد البشرية تصبح أمرا ملحاً، وبدونه لن يستطيع الموظفين مواصلة العطاء ولا الاستمرار بالقيام بالوظائف الإدارية بناء على المعلومات والمعارف التي حصلوا عليها قبل دخولهم مؤسساتهم. فالتدريب المستمر يعمل على تغيير الفرد بهدف تنمية ورفع كفاءته عن طريق تحويل المعارف والمعلومات الجديدة إلى مهارات تطبيقية.

ويمكن القول أن ملف التدريب الإلكتروني موجود على مكتب كل مديري مراكز تنمية الموارد البشرية، نظرا للفوائد الهائلة من دمج التدريب الإلكتروني في نظام هذه المراكز.  كماإن انتشار وسائل التدريب الإلكتروني في السنوات الأخيرة فرضت على تلك المراكز تبني نوع أحد أشكال التدريب الإلكتروني.  ولكن بعد مراجعة سريعة لوثائق ومواقع بعض هذه المراكز، يلاحظ الارتباك الواضح في كيفية هذا التبني وفي كيفيه تحويل التدريب التقليدي إلى تدريب إلكتروني.

في هذه الدراسة، قدمنا توطئة عن التدريب الإلكتروني، ومتطلباته، وفوائده، ومحدداته، وكذلك أساليبه وأنواعه، كما وضحنا أهمية تبني تقنيات التدريب الإلكتروني في مراكز تنمية الموارد البشرية والتدريب، وبينا أساليب وأنواع التدريب الإلكتروني المناسبة، ومن ثم شرحنا كيفية دمج التدريب.

         النص بالكامل 


Evaluating the Effectiveness Of Mindmapping In Generating Domain Ontologies Using Ontorem: The Mascot Case Study

 Kelly Antonini Dr. Mohammed Odeh

 

University Of The West Of England, Uk University Of The West Of England, UK

Dr. Mario Kossmann, Airbus, UK

Caroline Lange German Aerospace Center (Dlr), Germany

Abstract: OntoREM is an Ontology-driven Requirements Engineering Methodology supported by software tooling, developed jointly by UWE (University of the West of England) and Airbus. OntoREM has been evaluated using a number of pilot cases in various domains at Airbus and it has been applied to a space mission called MASCOT (Mobile Space Asteroid Scout) developed by DLR-Bremen (Deutsches Zentrum für Luft- und Raumfahrt) and CNES (Centre National d'Etudes Spatiales). As part of the OntoREM approach, high-level needs, goals and requirements are specified. Subsequently, requirements are analysed, modelled and validated using OntoREM. Mindmapping is a method that can significantly enhance human centred activities like requirements elicitation, analysis and validation by visualising information, and as such it is used by the OntoREM methodology. In this paper, the effectiveness of mindmapping has been evaluated using a reverse-engineering approach which demonstrated effectiveness towards generating more correct, consistent and complete requirements specifications yet shortening the requirements engineering process time.

Keywords:

 Mindmapping, OntoREM, Domain Ontology, MASCOT, Requirements Engineering, Requirements Analysis.

    Full Text 


  A Morphological Analysis and Smoothing Techniques To Improve A Statistical POSTagger for Arabic Language

AZZEDINE MAZROUI and NABIL ABABOU

Faculty of sciences, University Mohamed I Oujda, Morocco.

Abstract: In this paper, we have developed a new Part-of-Speech Tagger based on the morphological Analyzer Alkhalil Morpho Sys [12] for an analysis out of context and statistical approach using a hidden Markov model to identify the likely tag in context. We also use the Absolute discounting method to smooth the estimation of emission probabilities. Most existing statistical systems assign to each word the possible tags from the training corpus and this affects their performance. In this paper, we propose a method which assigns to the analyzed word the tags provided by the Alkhalil_Morpho_Sys Analyzer when the word is not included in the training data. We prove that these considerations will greatly reduce the error rate of the Part of Speech Tagger system.

Keywords: Natural Language Processing, Part–of-Speech tagger, Morphological Analysis, Smoothing, Training set, Testing set.

      Full Text


INTELLIGENT MAINTENANCE SYSTEM BASED ON ONTOLOGIES AND WEB SERVICES

Osama F. Zaki and Emilio M. Miguelanez*

Higher Institute Of Computing And Managerial Science, Thebes Academy, Maddi, Egypt.

Abstract: The technologies and architecture presented in this paper was proposed and implemented by the author(s) in a real life research project for the European Union. The project objective was to improve the performance of the European railway system, by means of better information exchange between all parts of the system. As maintenance processes have an important role in defining the railway performances, improving maintenance can give an essential contribution to the overall project objectives. Therefore the system proposed here deals with the definition, specification and development of an Intelligent Maintenance System for railways (IMAIN). The overall architecture approach is based on the idea of distributed nodes; distributed services approach. This means Intelligent Maintenance Services are able to request additional information or functionality from other nodes, like: legacy maintenance management systems, monitoring services or even integrated information directly from accessible reasoners.

Keywords: Software Architecture, Distributed AI, Maintenance, Railways 

      Full Text

  A Proposed Prototype of Cooperative Medical Treatment System for Hospitals in GCC Countries

Mohammad Hameed Ahmed Al-Taei

Ph.D. in Computer Science, College of Applied Sciences

Sohar – Sultanate of Oman

Abstract: Telemedicine, which is a way of providing medical services to patients no matter where the patient or relevant information is located, has become a useful tool for solving the problems of specialists’ shortage in hospitals. Such systems are not in wide use in GCC countries due to the shortage of expert people working in this field and the misunderstanding of the capabilities of this technology in improving treatment with a lower cost.

The objective of this paper is to propose a Cooperative Medical Treatment System to solve the shortage of specialists in the hospitals of GCC countries, and to improve the quality of health care and help the patients in these countries in decreasing cost, time, and efforts of their treatment abroad.

This paper presents the prototype of this system and describes its technology, network, security, and other requirements. The network of this system can be the nucleus for an Arabic Telemedicine system which can implement more applications and include other Arab countries in the future.

Keywords: Telemedicine, Telediagnosis, Teleradiology, Medical Treatment, health-care, cooperative system.

      Full Text

 Reconciling Component Based and Service Oriented Software Engineering: Application to E-Health System

Bentlemsan Khadidja

The National School of Computer Computer Science (ESI)

Oued smar, Algiers, Algeria

Bennouar Djamel

Computer Science Department  Akli Mouhand OulHadj University

Bouira, Algeria

Hidouci Walid

The National school of Sciences (ESI) Computer Sciences

Oued smar, Algiers, Algeria

Abstract: today, with the rise of the internet technology, software systems need to be dynamic, highly flexible and at the same time controllable and simple to maintain. To achieve this goal, recent studies have mixed the strength of Component Based Software Engineering (CBSE) and Service Oriented Software Engineering (SOSE). In the present paper, we show the importance of such collaboration through a critical e-Health case study: The Organ Transplant Management System (OTMS).

Keywords: Component Based Software Engineering, Service Oriented Software Engineering, Collaboration, e-Health.

      Full Text

Evolving and Versioning Software Architectures Using ATL Transformations

ABDELKRIM AMIRAT1, AFRAH DJEDDAR1 and MOURAD OUSSALAH2

1LiM Laboratory, University Mohamed Cherif Messaadia, Souk-Ahras Algeria

2LINA Laboratory, CNRS UMR 6241 University of Nantes, France

Abstract: Since software architecture has become integral part of software development, managing its evolution has become the concern of most of architecture researchers. In this paper, we define firstly a Generic-ADL (Architecture Description Language) which includes all important and common concepts in the existing ADLs to describe software architectures. Secondly, we propose a second model named EVA-Model (Evolution and Versioning Architecture) to manage the software architecture evolution and their versioning. Based-on the proposed EVA-Model, we implement the evolution and the versioning mechanisms using model transformation approach through ATL language. However, these ATL transformations present tow challenges: the absence of the genericity concept and the rule scheduling mechanism. We address these issues by proposing parameter model to generalize the transformations and by using java technology to allow users managing the parameters and to handle the execution order of evolution transformations where each evolution transformation is followed transparently by a versioning one.

Keywords: Architecture Evolution, Versioning, ATL Transformation, Parameterized Transformation, EMF/GMF
      Full Text

Safe Clustering Algorithm In Vehicular

Ad-Hoc Networks

MOHAMED AISSAa, YASSER ARAFAHb, MOURADHENCHIRIa

aUniversty of Nizwa, Nizwa, Sultanate of Oman

bSultan Qaboos University, Muscat, Sultanate of Oman

Abstract: Many applications introduced by Vehicular Ad-Hoc Networks (VANETs), such as intelligent transportation and roadside advertisement, make VANETs become an important component of metropolitan area networks. In VANETs, mobile nodes are vehicles which are equipped with wireless antennas; and they can communicate with each other by wireless communication on ad-hoc mode or infrastructure mode. Clustering vehicles into different groups can introduce many advantages for VANETs as it can facilitate resource reuse and increase system capacity. The main contribution of our work is a new strategy for clustering a VANETs and improvements in many classical clustering algorithms. One of the main ideas of our approach is to select cluster heads which provide safe clusters and avoid collisions with adjacent vehicle nodes.

The proposed algorithm intends to create stable clusters by reducing re-clustering overhead, prolonging cluster lifetime, and shortening the average distance between cluster heads and their cluster members.

Keywords: component; Vehicular ad hoc network; clusters; stability   
      Full Text

  New Trends for Improving the Academic Advising System

Rasha Shakir Abdulwahhab1, Humood Salem Al Makhmari2, Sultan Nasser Al Battashi2

1Faculty of Information Technology, Ministry of Higher Education, OMAN

2Student of Information Technology, Ministry of Higher Education, OMAN

Abstract: Recently, the academic advising systems have been studied by several researchers in both technical and educational fields. However, most of the existing academic advising systems available in the universities include CAS College provides a manual academic advising system which are face some drawbacks and problems in the educational fields. This paper proposes a system which is used to automate the process of academic advising with the goal of avoiding the problems of the manual version of the academic advising system titled Intelligent aCademic aDvising( ICD) system. ICD is consisting of two main units. Each of these units is responsible to provide services for each of the advisors and students. Nevertheless, to reach a degree of automatic advising by the ICD system, GA mechanism is adopted in the suggested units.. The GA helps the ICD system to provide the student with a reasonable recommendation to his\her marks in the current registered semester if he/she is under proration. In addition to the suggested main units, ICD able to displays the number of the completed credits, GPA, the study plan and the courses that they don’t completed. All these features of ICD make the advisor a useful system for those under proportion students. ICD is developed with one database which is built within web applications employing Apache Web Server, MySQL, Java Server Pages and NetBeans. The performance of ICD in the college of applied science has been evaluated during an experiment with experienced advisors and 50 students of this college.

Keywords: Academic Advising System, Genetic Algorithm, Decision Tree Algorithm
 
       Full Text

Towards A General Object-Relational Spatial-Temporal Data Model
(ORSTD Model)

WADEE AL-QUBATI1, ABDULQADER M. MOHSEN2, AMMAR ZAHARY3

1,2,3Department of Computer Science,

Faculty of Computing and Information Technology,

University of Science and Technology, Sana’a, Yemen

Abstract: Temporal-spatial applications need data modeling to show the complex behavior of objects with the change of time and place. This requires arguing the ability of object-relational model to provide a structure of storage, indexing, and organization to represent multiple dimensions for spatial-temporal systems and identify the behavior happening to them according to the conceptual framework (what/where/when) in order to make it a logical structure close to human cognition. This paper proposes a general Object-Relational Spatial-Temporal Data Model (ORSTD). The idea behind ORSTD model is to collect all spatial-temporal information in only one object using the concept of Nested Tables. ORSTD model can support and integrate that information efficiently within a dynamic environment. This model can also capture different attributes and behaviors of a location and time and reflect them in nested tables in a way that it can be expanded to different spatial-temporal applications. The proposed model, ORSTD, has been verified for different spatial temporal scenarios, and results show that the proposed model can represent spatial temporal efficiently and effectively.

 

Keywords: Object-Relational, Nested Table, Pyramid Framework, Third Structure, Space and Time Applications 
        Full Text
 
 
Read 6541 times Last modified on Thursday, 07 January 2016 12:51
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…