Abstract

Global Measure on Image Content
Paper Number:    15-01
Abstract:
In this paper , we investigate  approaches to supporting effective and efficient retrieval of image  based on principle component analysis . First ,we extract the image content , texture and color . Gabor  wavelet transforms are used to extract  texture feature of the image and the average color are used to extract the color features. The principle component of the feature vector of image can be constructed . Content -based  image retrieval  is performed by  comparing the feature vector of the query image with the projection feature vector of the image database on the principle component space of the query image . By  this technique ,we can reduce the dimensionality of feature vector which ,in turn reduce the searching time.
back to Accepted Papers Page


Grammatical Inference Udid nsing Topology Generation of Petri Nets
Paper Number:    15-02
Abstract:
Grammatical Inference (GI) is an important field of research, and it has suffered from the lack of a focused research community. After giving an introduction of GI, theory and application, a new approach to GI is presented using a concepts of topology generation of Petri Net (PN). An effective and efficient method for the inference of regular grammars based on the syntactic structure of the positive as well as negative samples is proposed, and an algorithm for generating a PN is presented.
back to Accepted Papers Page


Dynamic Scheduling of Real-Time Tasks Using a Hybrid Genetic Algorithm
Paper Number:    06-01
Abstract:
Real-time systems are characterized by computational activities with timing constraints (deadlines). That is, the correctness of real-time tasks depends not only on the logical result of computations, but also on the time at which the results are produced. Optimal scheduling of real-time tasks on multiprocessor systems is known to be computationally intractable for large task sets. In this paper, we present a hybrid genetic algorithm for no preemptive scheduling of dynamically arriving a periodic real-time tasks in multiprocessor systems. The real-time tasks are characterized by their deadlines, resource requirements, and worst case computation times. The performance of the proposed algorithm is shown through a simulation study.
back to Accepted Papers Page


Making Objects from Classes: A Perspective on Some Recent Approaches
Paper Number:    15-03
Abstract:
Objects play a crucial role when software is designed using object oriented technology (OOT). Many objected-oriented analysis (OOA) methodologies provide means to identify the �right� kind of objects because this will eventually affect the complexity and �neatness� of the system designed. Recent research presents many diverse views of objects, reflecting on instant logical states, genetic perceptions and selective inheritance methods adding new dimensions to work in this area. This article presents an overview of this diversity in object viewing and in making objects from  classes, and also comments on its usefulness and complexity.
back to Accepted Papers Page


Pipelined Reprogrammable Microcontrollers Generation in HLS Environment
Paper Number:    05-01
Abstract:
With the even changing standards for specific applications such as telecommunications and multimedia, the hardwired solution has put limits on flexibility near the end of the design cycle. In many cases, designers are moving toward programmable solutions such as to balance the ability for late modification with the usual requirements  high speed, low cost, and low power.
This paper describes an initial set of modifications to an existing architectural synthesis system (AMICAL) targeting the generation of micro coded controllers. The synthesis process begins with a characteristic application for a chosen class and produces an instruction-set based programmable architecture. The designer can then generate both style of architecture, hardwired and programmable, using the same synthesis system and can quickly evaluate the trade-offs of hardware decisions.
back to Accepted Papers Page


RGBS: An Efficient Block Encryption Algorithm for Data Security
Paper Number:    04-01
Abstract:
Random Generator Binary Sequences �RGBS� is an efficient Block Encryption Algorithm for secure computer networks, this algorithm is hardware dependent. It can only encrypted using series of stored RGBS & equivalent reverse process of implemented hardware and 32-bit secret key.
back to Accepted Papers Page


Generalized Methods for Algorithm Development on OTIS-Networks
Paper Number:   06-02
Abstract:
A number of recent studies have revealed that Optical Transpose Interconnection Systems (OTIS) are promising candidates as future high-performance parallel computers. In this paper, we present and evaluate two general methods for algorithm development on the OTIS. The proposed methods are general in the sense that no specific factor network or problem domain is assumed. The proposed methods allow efficient mapping of a wide class of algorithms into the OTIS. Timing models for measuring the performance of the proposed methods are also provided. Through these models, the performance of various algorithms on the OTIS can be evaluated and compared with their counterparts on conventional electronic interconnection systems. This study provides new means for further testing the viability of the OTIS as alternative parallel computer architecture.
back to Accepted Papers Page


A Neural Algorithm for Solving the Interpolation Problem
Paper Number:   11-01
Abstract:
Artificial Neural Networks (ANNS) have been used for a number of problems that require finding and optimal or near optimal solution. In this paper, We will show the application of the neural networks in solving the interpolation problem. Some modification of  the interpolation algorithm as well as learning strategy based on the conjugate gradient will be proposed that lead to the improvement of the conditioning of the problem and significant speeding up of the solution.
back to Accepted Papers Page


Filter Bank Based Arabic Phonemes Analyzer
Paper Number:    15-05
Abstract:
The current work presents  a fast Arabic speech analyzer system . Its work depends on a number of practical postulates concerning the basic Arabic sounds (phonemes) and their formations. It is based on the source/filter model of the vocal tract. The vocal tract shape variations are computed and determined from  a number of speech frequencies abtained from a well designed band pass filter bank. The filter bank  outputs are identified by key words. Each key word, four characters   long string, is extracted by specially written algorithm, which uses the output power values of the eight band pass filters. These key words can be then used as marks for describing the trace of the distinctive sound which represents  that particular phoneme. The key word with  the output power values of the first four most powerful channels, are used all together as template (unknown sound spectrum), that can be inputted to another algorithm which acts as a template matching  recognizer for the Arabic phonemes. Due the  use  of short and fixed length template format with the implementation of the record random access technique, the recognizer response turns to be fast and can be characterized as speaker independent, highly accurate (not all but for some Arabic phonemes , recognition rate was high as 99%),easily trained system, less sensitive to the ambient conditions, and can be executed on any AT or higher type of IBM or compatible personal computer.
back to Accepted Papers Page


Active Vision with a Fovea
Paper Number:    04-03
Abstract:
This paper describes a methodology for use the stereo active vision as a foveated sensor by adding a retinal structure. It is designed by using a 2D neural networks, that have a three layers, the first is input layer Eye Field Processing (EFP)), the second is hidden layer (Position Neural Network (PNN)), and the third is output layer (Output Position Matrix (OPM)). The algorithm been simulated on computer and the results demonstrated that the algorithm be successfully to move the camera optical axis to be closed enough to target object.
back to Accepted Papers Page


Two Way Predictive Models
Paper Number:    01-01
Abstract:
This paper is concerned with learning tasks that require the prediction of a continuous value rather than a discrete class. We present two rule based predictive models: General-to-Specific, and Specific-to-General rule based predictive models. General-to-Specific learner uses model tree generated by M5 system to build general-to-specific predictive rules, while Specific-to-General rule based predictive model extends the RISE algorithm for discrete classes. Moreover, we develop and evaluate three methods for combining both models result in a two-way predictive model. Experiments on natural and artificial data sets show the combined learner to match or outperform individual components alone. Combining the developed models with instance-based learner led to more improvements. Closer observation of the system�s behavior leads to a better understanding of its ability to correct overlay-general rules with specific ones, and shows that there is still a room for improvement.
back to Accepted Papers Page


Expert Systems and the Web, MedChol: An Expert System for Diagnosis and Therapy of the Cholera
Paper Number:    07-01
Abstract:
The increasing popularity of the WWW and its rapid evolution have sparked interests in developing new types of web-based applications. These applications are not only distributed  but they are truly interactive in that :
- servers do no longer pay a passive role.
- Server/client interactions are more complex and last longer.
- Servers may have to maintain client and session state.
The web is no longer a tool for delivering static information. In this context, a new type of artificial-intelligence-based applications has emerged : www-based knowledge bases. This article will focus on presenting a method for building a www-based knowledge base server using Java.
backto Accepted Papers Page


A Pitch Determination Algorithm for Arabic Speech Processing
Paper Number:    15-07
Abstract:
In this paper we will present a new speech processing program which identify the pitch period and extract the formant frequencies of Arabic speech. Its purpose is to enhance the voice recognition and to simplify complex processing. The database is constituted of Arabic sentences phonetically balanced, pronounced by several speakers ( male, female, children ). After acquisition, conversion and segmentation, we identify the voiced/unvoiced (V/UV) speech by analyzing the zero-crossing number, then we compute the pitch and formants frequencies , magnitudes and bandwidths. The results are compared with those obtained with the others PDA (SIFT,AMDF, CEPSTRAL, LPC).
back to Accepted Papers Page


The Periodic Shifted Piecewise-Linear Transform
Paper Number:    15-08
Abstract:
This paper presents a new piecewise-linear series and transform based on periodic shifted  piece-linear functions. This transform is called the Periodic Shifted Piecewise-linear functions. The basis functions for this transform are the Periodic Shifted Piecewise-linear functions. Expansion of a periodic signal into PSP series is considered. The PSP transform matrix is represented by derivatives, in distributive sense, of the shifted square wave functions. The matrix of the inverse PSP transform is represented by means of the proper values of the periodic shifted piecewise linear functions at the same samples. The method of construction of the discrete PSP and the matrix equation of the transform are presented. The approximation of a continuous signal by means of a linear combination of the PSP functions is given. An example of PSP approximation to a selected signal is included comparison of PSP and Walsh-Hadamard approximation is also investigated. It is shown that the PSP transform achieves a better approximation performance, in the mean square error sense, than that of Walsh-Hadamard transform.
back to Accepted Papers Page


Using Electronic Communication in Higher Education
Paper Number:    13-01
Abstract:
The continuing development of computer technology, especially the Internet, allows students and faculty members to have easier access to a large source of information from around the whole world. This research paper investigates the possibility of using text-based electronic communication in higher education and is based on data retrieved from interviews from twenty-four staff members from the Lebanese American University. [these interviews concluded that they realize that the change would take time, resources would have to be provided for the faculty members, and administrative support would have to be  ensured in order to plan and implemented the addition of text-based electronic communication to the curriculum].
back to Accepted Papers Page


Identification and Classification of 3D Patters by Neural Networks Applicable to Mechanical Parts
Paper Number:    11-03
Abstract:
Pattern recognition using neural networks is a recent technology in full expansion. It is a  heuristic technique for pattern recognition that attempts to simulate man intelligent behavior by the machine. Its aim consists in optimizing the tedious tasks and helps man in taking vital decisions in industrial and medical situations.
Neural networks are mathematical and computer models. They consist in sets of computing units called formal neurons that simulate the human biological cells. The present work aims at elaborating a pattern recognition system that identifies 3D objects using a powerful tool: the neural networks based on the back- propagation algorithm.
A data base constructed of 3 types of images (a hammer, a screwdriver and a key) was created, each of witch is presented within a set of prototypes. A study was undertaken of the different image compression methods known. In our case, the binary RLE method seems to be a convenient image compression method giving both a good compression rate and a better ratio to noise signal.
back to Accepted Papers Page


The Challenge of Applying Cost Benefit Analysis to IT in Developing Countries
Paper Number:    15-09
Abstract:
Investing information Technology (IT) has been considered a risky venture by the administrations of many developing countries. The high cost of IT, the lack of financial   and technical resources, and the high rate of failure for many of public-sector information systems are only few of the reasons which make top-level administration shy away from information technology projects. However , applying an efficient and a systematic approach of cost-benefit analysis to government IT projects, can reduce the uncertainty and the risk involved in the decision making process. Unfortunately, experience shows that the application of such important tool can be a difficult task which requires overcoming many problems and challenges present in the public-sector.

This paper presents the application of CBA from a practical point of view, while focusing on identifying the sources of difficulties present in the public sector of developing countries.
back to Accepted Papers Page


Modeling Real-Time Systems in Timed-Rewriting Logic
Paper Number:    15-10
Abstract:
Real-time systems are dynamic and generic systems that are able to modify their own states during time, so processes, concurrent, reactive and distributed systems are typical examples. The goal of this paper is to provide a semantic for time aspects using Meseguer's rewriting logic in term of SRI's Maude as higher specifying language for the specification of Oriented Objects and Concurrent systems. We address the formal specification of a simple train crossing-gate system using Timed- Maude as extended language to Maude.
back to Accepted Papers Page


Computer Results for the Study of Tapered Optical Structure in Communication
Paper Number:    15-11
Abstract:
This paper elaborates a mathematical model based on a new concept of intrinsic mode. This model shall be applied to a physical structure which is the tapered wave guide used in integrated optics communication. We shall show how one can introduce an efficient computer program for the determination of the steepest descent path contour, in order to be able to evaluate numerically an Intrinsic Field Integral; applied to our structure.. Consequently, we shall show computer results agree, to a certain extent, with the theory of functions of complex variables. However, the restrictions of our algorithm can be justified, accounted for and of course overcome by suggesting another approach for the Intrinsic Field Integral to be more systematic and universal a concept.
back to Accepted Papers Page


A Metadata for Web-Based Cooperative Information Systems
Paper Number:    07-03
Abstract:
This paper presents a metadata for the Web-Based Cooperative Information Systems (WBCISs). That WBCISs aim to support interactions among heterogeneous knowledge sources that share business objects and processes and are willing to cooperate via Interactions Component. The metadata describes all the properties of components of the WBCIS architecture. The fundamental elements are Knowledge sources and Interaction Components. A knowledge source is modeled as a package that presents an interface definition (data schema of business objects, data and processes� activities). These Knowledge Sources may be internal to the organization: Enterprise Information System, Workgroup Information Systems and Personal Information Systems, or external to the organization. The Interactions Component is a kind of business objects and processes broker. It allows location, access, integration or global view of business object, and invocation or reuse of processes� activities. The interactions are specialized according to their situations namely interactions for coordination that deal with the consistency of the shared business objects, interactions for cooperation related to the coupled processes� activities or interactions for transmission that deal with informal and unstructured exchanges. The metadata is the core of the WBCIS as support for browsing services and user-oriented semantic services that allow the WBCIS to support individual and collaborative work either by accessing business objects, invoking processes� activities, or integrating information.
back to Accepted Papers Page


An Approach to Describe UML Process
Paper Number:    15-13
Abstract:
Face to the variety of methods, the unification has been undertaken especially with the appearance of the UML language (Unified Method language). This latter represents the result of the merge of object modeling methods namely OMT, OOSE and OOD. Nevertheless, UML allows to represent models, but it does not define model elaboration process. In fact, having an universal process of software development seems to be an utopia. That's why, we propose in this paper an approach which describes an unified method language process (UMLP) which is based on the definition of method   fragments by the use of NATURE process model. Those fragments are stocked in a method base and extracted according to the application engineer requirements.
back to Accepted Papers Page


Towards the Design of a Knowledge-Based Interface Controller in Multilevel Secure Database Systems
Paper Number:    02-01
Abstract:
Inference is a major threat to  database security.  An inference problem exists in a database when high data can be obtained from low data. Controlling  inference is a difficult task for two main reasons. First, users may obtain unauthorized information from responses they received to legitimate queries. Second, hostile users combine logical inferences, application semantics, and their knowledge of the application in their attacks. In addition,  traditional security mechanisms do not offer any protection against this type of threat. Despite numerous various research efforts, controlling inference is still a hurdle. In this article after an in-depth survey of the state of the art of inference control in MLS databases, we briefly present a new approach, based on artificial intelligence, which try to mimic the human inference process.
back to Accepted Papers Page


Establishment of Regional Center for Research and Development (RCRD)
Paper Number:    15-14
Abstract:
This paper tries to support the Arab research and software development by solving some problem and by offering other tools. The problem is that some Arab researchers need valuable software packages and computer labs, that they miss because of its high cost.  Suggested RCRD should have these software packages and the necessary hardware. Other tools are the suggested technical committees and databases, that RCRD shoud have. RCRD should be connected to universities and scientific centers, who can use these facilities with no need to buy it. RCRD is suggested to be a regional, ungovernmental, non-profit association, offers services for Arab academics and researchers. This paper does not concern with technical details of the RCRD, but focuses on the idea, the function and the structure of the RCRD. Technical details may be discussed later as there are many options.
back to Accepted Papers Page


Unsafelty Vectors: A New Fault-Tolerant Routing for the K-ary n-Cube
Paper Number:    06-03
Abstract:
This paper presents a new fault-tolerant routing algorithm for the k-ary n-cube. The algorithm is based on the concept of �unsafety vectors�. Each node A calculates its unsafety vector UA,D where the l th element of u1A,D , 1<=l<=� n* , of UA,D
 represents a measure of the routing unsafety at distance l from A toward destination D. We present an analytical study proving some properties of the proposed algorithm. We obtain performance measures from extensive simulation experiments for different sizes of the k-ary n-cube. The experimental study shows that for practical number of faulty nodes (below 20%), the achieved routing is nearly optimal.
back to Accepted Papers Page


Recognition of Dynamic Process Modes on the Base of Adaptive Resonance Theory Neural Network
Paper Number:    11-05
Abstract:
This paper is concerned with introducing the new modification of ART-1 neural nets, which leads to either decreasing the amount of neurons needed in ART neural networks and decreasing the reaction time. The successful result of modification was proved by the implementation in the cement industry, for burning process in a rotary kiln.
back to Accepted Papers Page


Lexicon Representation to Support the Machine Translation by  BAM
Paper Number:    01-02
Abstract:
The most important characteristics of computer and information systems revolution is he practice of human realization and its experience. This practice is done by information systems that use natural language as ways of practice. Consequently that help to spread and simplify widely and economically.
Natural language processing (NLP) with its study of behavior, its ways of constructs, its classification (statically and dynamically) is considered very important subject to develop systems able to deal with the human language.

The technology of artificial intelligence is used to represent the human knowledge and its usage's to design expert systems able to understand and deduce.

The machine translation is a subject that helps to support the developing, realizing and understanding the dealing with Neural languages.

It represents the link between two different languages by using the information systems able to transfer the speech based on grammatical, syntactical conjugation of the word.
The Lexicon is considered as an auxiliary way to help the machine translation by the huge availability of information needed for the process of translation. From the other hand Bi-directional associative memory (BAM)  is used in storing and feedback information-vectors in both directions.
It is used to calculate weight matrix, which becomes as encoding and monitoring function to recognize the associative patters.
Our study discusses the operation of Lexicon representation to support the machine translation by BAM connection of contextual, grammatical and syntactical vectors. Its usage helps to diminish the needed area of storage that represents the Lexicon vocabularies. It also helps to speed meaning feedback, support the translation in both directions (Arabic-English, English-Arabic). It supplies the facility of modernizing the Lexicon questionnaire with word processing whether available regulation or irrgulation.
back to Accepted Papers Page


WETCP: A Reliable Transport Protocol of Mobile Wireless Networks
Paper Number:    04-05
Abstract:
This paper introduces WETCP (Wireless-enhanced TCP), a transport layer protocol derived from TCP capable of efficiently addressing issues related to wireless networks and user mobility. WETCP considers most of the problems evolving from wireless environment: congestion control and recovery, variations in round trip delays, loss recovery and disconnections. WETCP enhances the performance of the classical TCP over wireless mobile networks. The protocol is implemented using the ns2 network simulator. Simulation results compare the performance of WETCP to that of TCP Reno. Results show that WETCP improves throughput and data transfer time significantly, while maintaining good put that is almost equal to the good put of TCP Reno.
back to Accepted Papers Page


A New Approach for Scanning and Attacking the New Generation of Viruses
Paper Number:    15-17
Abstract:
Computer virus now a days is a very serious aspect that the researches and attentions are directed to. This field is largely and fast growing and there is now more than virus's types than the hackers know.
Most of the antivirus programs concentrates on one essential methods for detecting viruses and that by comparing the system's files with a data base containing a bit pattern or viruses signature for the known viruses. This method is working very well if the virus definition file is currently updated.
In real life, every day there are a new types of viruses and it is very difficult to keep the database updated to the last minute. Also, there are new types and shapes of viruses such as stealth or worms which are always create a new version of viruses or may be fooling the operating system in many ways to deny their existence. Networks made it possible for viruses to spread and the problem is serious.
The research suggests a new approach for scanning and attacking new types of viruses by using a combination of Neural Network and Genetic Algorithm. This paper is devoted to study the ability to raise the computer immunity and recoverability towards virus attack despite of their kinds and fields.
back to Accepted Papers Page


The Role of Software Engineering Methodologies in Reducing the Failures in Software Projects
Paper Number:    12-02
Abstract:
Software projects development is certainly a process, which can fail. One of the important factors to success is the understanding where software projects can fail and to plan on backups and recovery. Software systems development methodologies can help a lot in reducing failures. Such helps are the results of using formal methods, prototyping, waterfall model, spiral model, etc. However, software projects development is certainly ripe for failures, no matter what software system development methodology you are using. But, applying a well-known methodology is required for determining the certainty of failures so that we can avoid such pitfalls or know how to recover from such failures. In this paper, certain questions have been developed to identify the occurrence of the failures in the software projects. Moreover, recommendations have been suggested to reduce the failures rate in the software projects.
back to Accepted Papers Page


Analysis and Specification Tools for Manufacturing Systems
Paper Number:    12-03
Abstract:
The objective of this article is to offer the industrial experts a "computing tool " allowing them to analyze and specify their manufacturing systems. The analysis is based on a decomposition of studied systems in three separated but interconnected subsystems (logical, physical and decisional). The specification uses some tools in order to formalize the knowledge the experts have of their system (Multi-Agents,�). A working up is applied on an industrial example. The example concerns the manufacturing system of the Oran dairy cooperative.
back to Accepted Papers Page


Supervised Classification by Modular Neural Network
Paper Number:    11-06
Abstract:
In this paper, multi-layer feed forward neural networks are designed to perform pattern recognition tasks. To approach the functionality of the human visual system, we propose a hierarchical system using highly-structured artificial neural nets comprising two stages of processing for machine vision: a low-level process and a high-level one. The neural network system contains mainly two modules: a neural (sub-) network performing edge detection, and a neural classifier. This classifier uses the edge image obtained at the output of the first stage of processing. The use of two sub-networks  instead of a single one allows the application of learning sets consisting of a limited number of training patterns, and consequently results in reduced learning time. In order to have good generalization, training is made by means of the back propagation algorithm. This system performs accurately and efficiently even with degraded test images.
back to Accepted Papers Page


Application of the "Projection of the Dependences" Method for the Design of a Systolic Network Dedicated to the Resolution of a Linear System by the "Gauss-Seidel" Method
Paper Number:    06-05
Abstract:
Parallelism has  generated new concepts and approaches making it possible to conceive competitor systems and parallel architectural configurations.  The bringing together between these two concepts is hardly easy and requires a precise definition of the structural elements of algorithm and their projection on a suitable parallel architecture.  The work described in this paper, tries to concretize this bringing together for a class of architectures called: " systolic " .  One starts with the description of the " Method of Projection of the Dependencies ", then one applies it to the design of a systolic network for the resolution of a linear system by an iterative method:  " Method of Gauss-Seidel ".
back to Accepted Papers Page


Derivation of Two Mathematical Models to Simulate Surface Acoustic Wave  Programmable Transversal Filter Devices (SAW/PTF)
Paper Number:    09-01
Abstract:
In the recent years many papers have been published in the field of SAW/PTF, all of them up to now have been partially programmed [1] (the weighting circuit is in the output stage). This paper explains and summarizes the derivation of two mathematical models depending on the delta function model, which gives only an information on the frequency response (frequency versus relative insertion loss) of the designed filter, these models can be used to simulate any partially Programmable Transversal SAW filter. The simulation program has been written using MATLAB (the language of technical computing). To verify the correctness of the two models, we used two design structures, one belongs to Carl M. Panasik [2, 3] and the other belongs to our research work (at Zhejiang University) [6]. These two designs have practical results, which are similar to our simulation ones.
back to Accepted Papers Page


A New Call Admission Control Function for an ATM Backbone
Paper Number:    04-06
Abstract:
An equally distributed load for call admission control (CAC) policy with routing is applied. This policy is based on subdividing the traffic into a number of service classes according to their statistical and performance characteristics. Each traffic class is assigned a capacity partition (bandwidth), which is periodically reassigned over all links in the network. At each node  (ATM switch) there is a controller for computing the necessary bandwidth for each traffic class, which is updated upon the calculation of the residual capacity. Upon the arriving of a new call, the admission controller, compares the required bandwidth for the new call with the total residual capacity. The new call can be accepted if and only if the required bandwidth is less than or equal to the total residual capacity; otherwise the call will be rejected. Simultaneously the control routing algorithm must decide which route the call should follow .On the basis of the distributed routing policy, which maximizes the utilization factor accounted for local instantaneous information, as well as for aggregate information. Some simulation results are presented.
back to Accepted Papers Page


Experimantal Analysis of Input Impedance of Normal Mode Helical Antenna
Paper Number:    10-01
Abstract:
Input impedance is an important characteristic of NMHA. Several experiments were conducted in order to understand the relationship between input impedance of NMHA and its physical parameters. The variation of input impedance of NMHA is observed upon its diameter of helix and perpendicular separation of turns. In is found that input impedance of NMHA does not change with these physical parameters.
back to Accepted Papers Page


An Adaptive Neural Network Controller for Non-Linear Systems and its Application to a Physiological System
Paper Number:    11-07
Abstract:
The theory of artificial neural networks has been successfully applied in control systems. In this paper, a neural-network-based controller structure is proposed and applied to an unknown non-linear system that is affected by an an unmeasured disturbance. The controller structure includes three neural-network modules: the disturbance estimator, the system model, and the optimizer. The controller provides control actions according to the estimated values of unmeasured disturbances, and predictions of the future behavior of the system. The overall performance of the controller is improved continuously during its work by using the latest measures of the system parameters to train its neural-network modules. This strategy allows the controller to  adapt to a specific system and to any changes in its behavior during the control process.
back to Accepted Papers Page


Image Compression and Vector Quantization by Self Organization Feature Map Neural Network
Paper Number:    11-08
Abstract:
The study of image compression methods has been an active area or research since the inception of digital imaging. In this paper an algorithm fro the design of a compression scheme for digital still images is presented. The proposed algorithm first perform the discreet cosine transform DTC of the original image then vector quantization by self organization feature map (SOFM) algorithm to compress the image in the transformed domain. The performance of the proposed algorithm has been tested by computer simulation. The results are examined for different compression ratios and for different size codebook.
back to Accepted Papers Page


Fast Solution of the System of Linear Algebraic Equations Based on the Digit-By-Digit Method
Paper Number:    15-18
Abstract:
This paper presents one of the applications of the Digit-by-Digit method, that is in solving the system of linear algebraic equation (SLAE). A simplified algorithm for solving SLAE is given, the necessary and sufficient conditions for convergence is specified.
A classification of the field of uses, and a criteria for effective solution SLAE with the requirements for the most efficient use of the computer recourses is stated.
back to Accepted Papers Page


Image Matching Based on Region by Hopfield Neural Network
Paper Number:    11-09
Abstract:
Artificial vision aims to replace the human vision in various areas, potentially in medical imagery, aerial, robotics, as well as nuclear plants Stereo matching represents an essential place chain of the vision process by computer. Processing in artificial vision decompose generally in image acquisition process, edge detection, segmentation, stereo matching, 3D reconstruction and pattern recognition.
Stereovision uses two images of the same scene from 2 different positions, and has for objective the computation of # D coordinates from a point from its projections in 2 images by taking into account each camera projection model and the spacial relationship between the two cameras. The stereovision depends on matching results (of segments, points, regions primitives) between two images. It applies also in the case of 3 images. Our matching approach uses Hopfield neural networks on a triplet of images with region primitives. It uses region characteristics (surface, gray, level, elongation, gravity center) as well as uniqueness and adjacency constrains.
back to Accepted Papers Page


Success Factors of Systems Integration Implementation
Paper Number:    12-04
Abstract:
This paper is written based on the findings of a survey conducted in the Malaysian public sector IT community. The paper starts with a definition of SI and then briefly describes how the study was conducted. This is followed with a discussion on the factors that will influence the success of system integration implementation. The findings of the survey are compared with a similar study conducted in the US. We conclude with a recommendation on how systems integration can best be implemented amongst inter-related organizations.
back to Accepted Papers Page


Characteristics of Candidate Systems for Integration
Paper Number:    12-05
Abstract:
This paper is written based on the findings of a survey conducted in the Malaysian public sector IT community. The paper starts with a definition of SI and then briefly describes how the study was conducted. This is followed with a description of the state of information systems in the Malaysian public sector IT community. The discussion is continued with an examination on the status of systems integration in Malaysia. The paper then focuses on the ideal systems characteristics for integration. Finally, a conclusion is drawn based on the findings of the survey, on the characteristics of candidate systems for integration.
back to Accepted Papers Page


CM-Builder:An Automated Object-Oriented Analyzer 
Paper Number:    12-06
Abstract:
The past two decades have seen a growing interest in graphical CASE (Computer Aided Software Engineering) tools. These tools provide considerable help in documenting and analyzing the output of the Analysis and Design stages of software development. However, these tools do not contribute to the process of identifying the basic elements of the analysis and design model (e.g. he objects, classes, attributes, and relationships, in the OOA model). This paper describe an automated CASE tool called CM-Builder which aims at supporting the Object-Oriented Analysis stage of software development. The CM-Builder uses robust Natural Languages Processing techniques to analyze software requirements texts written in English and build an integrated discourse model of the processed text, represented in a Semantic Network. This Semantic Network is then used to automatically build an initial UML Class Model representing the object classes mentioned in the text and the relationships among them. The initial model can be directly input to a graphical CASE tool for further refinement by human analysis. The results obtained by running the OM-Builder on a case-study are very encouraging and demonstrate that our approach have the potential to play an important role in the software development process.
back to Accepted Papers Page