Towards Reengineering Web Applications
to Web Services
EEDIS Laboratory, University of Sidi Bel Abbes, Algeria
Received December 11, 2007; accepted April 9, 2008
Multi Purpose Code GenerationUsing Fingerprint Images
Software Engineering Department, Isra Private University, Jordan
Abstract: Extracting minutia and other features from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. This paper proposes a method for the generation of long and secure code that may be used for multi-purpose applications, such as ATM, coded door locks and other security measures. The method consists of two phases; the first phase is carried out using fingerprint image enhancement and thinning. The second phase consists of extracting minutia, ridge ending, bifurcation and all other features in order to produce initial pattern. Finally the multi-purposes secure code is generated by applying the one-way MD5 hash function on that pattern. The achieved results are discussed for security improvement. The proposed technique also shows considerable improvement in the minutia detection process in terms of both efficiency and speed.
Keywords:
Fingerprint matching, image enhancement, reference point, code generation, embedded system.Received December 31, 2007; accepted May 22, 2008
A Hybrid Protocol for Identification of a
Maximal Set of Node Disjoint Paths in
Mobile Ad hoc Networks
Department of Computer Engineering, Aligarh Muslim University, India
Received April 6, 2007; accepted April 3, 2008
Proposed Enhancement of IEEE802.11e WLAN Through Real Time Simulation Study
Faculty of Engineering, International Islamic University, Malaysia
Keywords: IEEE 802.11e, medium access control, quality of service, hybrid coordination function controlled channel access, enhanced distributed channel access, coordination function.
Received December 17, 2007; accepted April 22, 2008
Architectural Framework for Immersive
Web Based Virtual Environments
Faculty of Information Technology, University of Petra, Jordan
Abstract: The development of 3D web based applications has been possible with the establishment of a number of 3D web technologies. Such applications have been utilized in different disciplines such as surgery planning, architectural design and games. However, most of these applications are trapped to the desktop setting provided by default in 3D technologies. Very few attempts have been made to present 3D immersive web based applications and to evaluate the usability of the technologies used and the interaction techniques. In this paper, we will attempt to address these questions by examining different ways of providing an immersive virtual environment on the web.
Keywords: 3D Web applications, VRML, Java 3D, immersive virtual environments.
Received September 6, 2006; accepted April 20, 2008
Video Compression Using Multiwavelet and Multistage Vector Quantization
and Navaneethan Palaniswamy1
1Department of Electrical and Electronics Engineering, PSG College of Technology, India
2Department of Electronics and Communication Engineering, PSG College of Technology, India
3Department of Electrical and Electronics Engineering Nasik, Mahindra and Mahindra, India
Keywords: Multiwavelet, multistage vector quantization, kites cross diamond search.
Received November 30, 2007; accepted May 12, 2008
VI-SDB: A Convivial Approach for
Description and Manipulation of
Deductive and Stratified Databases
Abstract: Although deductive databases is based on a well established formalism, they didn't know the expected success. Their use was limited to the academic purpose. Indeed, the deductive database management systems are judged abstract, rare in commercial offers, and often expensive. In among the abstract concepts of the deductive databases, we mention the case of the negation and its treatment by the stratification. In this paper, we propose a convivial approach that aims to make transparent theses concepts relatively abstracted and to permit a friendly usse of deductive databases and stratified database. This approach permits to simplify concepts, which always remain delicate for this type of databases users or designers, like (1) the definition of a deductive and/or stratified database (2) the study of the stratifiability, (3) the determination of the maximal stratification, (4) the incremental definition of strata and (5) the checking of integrity constraints. These operations become more delicate if the database is voluminous. The proposed system supports rules update and is not limited to facts updating as in known deductive systems. This approach is implemented and validated with VI_SDB tool based on an extension of predicates nets.
Keywords: Deductive database, stratified database, EPN formalism, GUI.
Received March 18, 2007; accepted May 30, 2007
Pruning Based Interestingness of Mined Classification Patterns
Department of Computer Science, University of Sana'a, Yemen
Keywords: Knowledge discovery in databases, data mining, decision tree, domain knowledge, interestingness, novelty measure.
Received December 9, 2007; accepted March 30, 2008
Fuzzy and Neuro-Fuzzy Modeling of
a Fermentation Process
1Electronics Department, University of Annaba, Algeria
2Laboratory CRIP5-SIP, University René Descartes Paris, France
Abstract: Neuro-fuzzy modeling may be qualified as a grey-box technique, since it combines the transparency of rule-based fuzzy systems with the learning capability of neural networks. The main problem in the identification of non-linear processes is the lack of complete information. Certain variables are, either immeasurable or difficult to measure, the soft sensors are the necessary tools to solve the problem. Those latter can be used via online estimation, and then they will be implemented in fed-batch fermentation processes for optimal production and online monitoring. The process parameters are estimated through a fuzzy logic system. The fuzzy models of takagi-sugeno type suffer of the problem of poor initialization, which can be solved by the trial-and error method Trial-and-error method is used to solve the poor initialization problem of TS models, this deals with identifying the structure of the model, such structure consists on finding the optimum number of rules, which enters in the model cost reduction. The fuzzy model might not capture the process non-linearity, especially if the number of rules is over-optimized. Bioreactors exhibit a wide range of dynamic behaviours and offer many challenges to modeling, as a result of the presence of living micro-organisms whose growth rate is described by complex equations. We will illustrate the fuzzy and the neuro-fuzzy modeling on the identification of such a system. In order to compare the NF model outputs, we use another fuzzy model that does not incorporate the neural network learning capability, to identify the parameters of the same process. Even though, the two models were trained using levenberg-marquardt algorithm, the corresponding simulation results show that a better modeling is achieved using NF technique, especially that we did not employ any involved optimization procedure to identify the NF structure.
Keywords: Yeast fermentation, fed-batch, takagi-sugeno model, levenberg-marquardt algorithm.
Received November, 28 2007; accepted April 24, 2008
Mobility and QoS of 802.11 and 802.11e
Wireless LAN Standards
1Department of the University of Tlemcen, University Abou Bekr Belkaid of Tlemcen, Algeria
2Department INFRES in Computer Science, Enst of Paris, France
3University Pierre and Marie Curie, France
Keywords: IEEE 802.11, Medium access control, quality of service, distributed coordination function, point coordination function, hybrid coordination function.
Received January 18, 2008; accepted May 20, 2008
Clustering Items in Different Data
Sources Induced by Stability
1Department of Computer Science, Narayan Zantye College, India
2Department of Computer Scence and Tecnology, India
3Department of Computer Science, Chowgule College, India
Abstract: Many multi-branch companies transact from different branches. Each branch of such a company maintains a separate database over time. The variation of sales of an item over time is an important issue. Thus, we introduce the notion of stability of an item. Stable items are useful in making many strategic decisions for a company. Based on the degree of stability of an item, we design an algorithm for clustering items in different data sources. We have proposed the notion of best cluster by considering average degree of variation of a class. Also, we have designed an alternative algorithm to find best cluster among items in different data sources. Experimental results are provided on three transactional databases.
Keywords: Clustering, data mining, dispersion, multiple databases, stability.
Received March 12, 2007; accepted May 20, 2008
Survivable System by Critical Service Recovery Model: Single Service Analysis
Computer and Information Science Department, University Technology Patroness, Malaysia
Keywords: Critical service, recovery, resources reconfiguration, survivability.
Received August 16, 2007; accepted May 12, 2008
The Effect of Computer Assisted Language Learning in Teaching English Grammar on the Achievement of Secondary Students in Jordan
Abstract: This study aimed at investigating the effect of using an instructional software program of English language on the achievement of secondary students in Jordan. The sample of the study consisted of (212) students distributed randomly on four experimental groups and four control groups. The instruments of the study were an instructional software program for teaching the passive voice and an achievement test. An Analysis of covariance was used to find out the effect of the instructional program on the students’ achievement in the passive voice. The findings of the study revealed that: 1. there were statistically significant differences (a < 0.05) between the students' achievement mean scores in grammar attributed to the instructional method of teaching. This difference is in favor of the students in the experimental group 2. there were statistically significant differences (a < 0.05) between the students' achievement mean scores in grammar attributed to gender. This difference is in favor of male students. 3. there were statistically significant differences (a < 0.05) between the students' achievement mean scores in grammar attributed to stream of study. This difference is in favor of the scientific stream students. In light of the findings of the study, it was recommended that TEFL teachers use CAI lessons in their instruction.
Keywords: Computer assisted language learning, achievement, use of instructional program.
Received November 21, 2007; accepted May 25, 2008
TS-PVM: A Fault Tolerant PVM
Extension for Real Time Applications
Department of Mathematics, Faculty of Science, Egypt
Keywords: Fault tolerance, persistent data, PVM, real time applications, tuple space.
Received January 14, 2007; accepted May 12, 2008