Global Measure on Image Content
Paper Number: 15-01
Abstract:
In this paper , we investigate
approaches to supporting effective and efficient retrieval of image
based on principle component analysis . First ,we extract the image
content , texture and color . Gabor
wavelet transforms are used to extract
texture feature of the image and the average color are used to extract
the color features. The principle component of the feature vector of image can
be constructed . Content -based
image retrieval
is performed by
comparing the feature vector of the query image with the projection
feature vector of the image database on the principle component space of the
query image . By
this technique ,we can reduce the dimensionality of feature vector which
,in turn reduce the searching time.
back to Accepted Papers Page
Grammatical Inference Udid nsing Topology Generation of Petri Nets
Paper Number: 15-02
Abstract:
Grammatical Inference (GI) is an important field of research, and it has suffered from the
lack of a focused research community. After giving an introduction of GI, theory
and application, a new approach to GI is presented using a concepts of topology
generation of Petri Net (PN). An effective and efficient method for the
inference of regular grammars based on the syntactic structure of the positive as
well as negative samples is proposed, and an algorithm for generating a PN is
presented.
back to Accepted Papers Page
Dynamic Scheduling of Real-Time Tasks Using a Hybrid Genetic Algorithm
Paper Number: 06-01
Abstract:
Real-time systems are characterized by computational activities with timing constraints (deadlines).
That is, the correctness of real-time tasks depends not only on the logical
result of computations, but also on the time at which the results are produced.
Optimal scheduling of real-time tasks on multiprocessor systems is known to be
computationally intractable for large task sets. In this paper, we present a
hybrid genetic algorithm for no preemptive scheduling of dynamically arriving
a periodic real-time tasks in multiprocessor systems. The real-time tasks are characterized
by their deadlines, resource requirements, and worst case computation times. The
performance of the proposed algorithm is shown through a simulation study.
back to Accepted Papers Page
Making Objects from Classes: A Perspective on Some Recent Approaches
Paper Number: 15-03
Abstract:
Objects play a crucial role when software is designed using object oriented technology (OOT). Many objected-oriented
analysis (OOA) methodologies provide
means to identify the �right� kind of objects because this will eventually
affect the complexity and �neatness� of the system designed. Recent research
presents many diverse views of objects, reflecting on instant logical states,
genetic perceptions and selective inheritance methods adding new dimensions to
work in this area. This article presents an overview of this diversity in object
viewing and in making objects from classes,
and also comments on its usefulness and complexity.
back to Accepted Papers Page
Pipelined Reprogrammable Microcontrollers Generation in HLS Environment
Paper Number: 05-01
Abstract:
With the even changing standards for specific applications such as telecommunications
and multimedia, the hardwired solution has put limits on flexibility near the
end of the design cycle. In many cases, designers are moving toward programmable
solutions such as to balance the ability for late modification with the usual
requirements high speed, low cost, and low power.
This paper describes an initial set of modifications to an existing architectural
synthesis system (AMICAL) targeting the generation of micro coded controllers.
The synthesis process begins with a characteristic application for a chosen
class and produces an instruction-set based programmable architecture. The
designer can then generate both style of architecture, hardwired and
programmable, using the same synthesis system and can quickly evaluate the
trade-offs of hardware decisions.
back to Accepted Papers Page
RGBS: An Efficient Block Encryption Algorithm for Data Security
Paper Number: 04-01
Abstract:
Random Generator Binary Sequences �RGBS� is an efficient Block Encryption Algorithm
for secure computer networks, this algorithm is hardware dependent. It can only
encrypted using series of stored RGBS & equivalent reverse process of
implemented hardware and 32-bit secret key.
back to Accepted Papers Page
Generalized Methods for Algorithm Development on OTIS-Networks
Paper Number: 06-02
Abstract:
A number of recent studies have revealed that Optical Transpose Interconnection
Systems (OTIS) are promising candidates as future high-performance parallel
computers. In this paper, we present and evaluate two general methods for
algorithm development on the OTIS. The proposed methods are general in the sense
that no specific factor network or problem domain is assumed. The proposed
methods allow efficient mapping of a wide class of algorithms into the OTIS.
Timing models for measuring the performance of the proposed methods are also
provided. Through these models, the performance of various algorithms on the
OTIS can be evaluated and compared with their counterparts on conventional
electronic interconnection systems. This study provides new means for further
testing the viability of the OTIS as alternative parallel computer architecture.
back to Accepted Papers Page
A Neural Algorithm for Solving the Interpolation Problem
Paper Number: 11-01
Abstract:
Artificial Neural Networks (ANNS) have been used for a number of problems that require
finding and optimal or near optimal solution. In this paper, We will show the
application of the neural networks in solving the interpolation problem. Some
modification of the interpolation algorithm as well as learning strategy based
on the conjugate gradient will be proposed that lead to the improvement of the
conditioning of the problem and significant speeding up of the solution.
back to Accepted Papers Page
Filter Bank Based Arabic Phonemes Analyzer
Paper Number: 15-05
Abstract:
The current work presents
a fast Arabic speech analyzer system . Its work depends on a number of
practical postulates concerning the basic Arabic sounds (phonemes) and their
formations. It is based on the source/filter model of the vocal tract. The
vocal tract shape variations are computed and determined from
a number of speech frequencies abtained from a well designed band pass
filter bank. The filter bank
outputs are identified by key words. Each key word, four characters
long string, is extracted by specially written algorithm, which uses the
output power values of the eight band pass filters. These key words can be then
used as marks for describing the trace of the distinctive sound which
represents
that particular phoneme. The key word with
the output power values of the first four most powerful channels, are
used all together as template (unknown sound spectrum), that can be inputted to
another algorithm which acts as a template matching
recognizer for the Arabic phonemes. Due the
use
of short and fixed length template format with the implementation of the
record random access technique, the recognizer response turns to be fast and can
be characterized as speaker independent, highly accurate (not all but for some
Arabic phonemes , recognition rate was high as 99%),easily trained system, less
sensitive to the ambient conditions, and can be executed on any AT or higher type of
IBM or compatible personal computer.
back to Accepted Papers Page
Active Vision with a Fovea
Paper Number: 04-03
Abstract:
This paper describes a methodology for use the stereo active vision as a foveated
sensor by adding a retinal structure. It is designed by using a 2D neural
networks, that have a three layers, the first is input layer Eye Field
Processing (EFP)), the second is hidden layer (Position Neural Network (PNN)),
and the third is output layer (Output Position Matrix (OPM)). The algorithm been
simulated on computer and the results demonstrated that the algorithm be
successfully to move the camera optical axis to be closed enough to target
object.
back to Accepted Papers Page
Two Way Predictive Models
Paper Number: 01-01
Abstract:
This paper is concerned with learning tasks that require the prediction of a
continuous value rather than a discrete class. We present two rule based
predictive models: General-to-Specific, and Specific-to-General rule based
predictive models. General-to-Specific learner uses model tree generated by M5
system to build general-to-specific predictive rules, while Specific-to-General
rule based predictive model extends the RISE algorithm for discrete classes.
Moreover, we develop and evaluate three methods for combining both models result
in a two-way predictive model. Experiments on natural and artificial data sets
show the combined learner to match or outperform individual components alone.
Combining the developed models with instance-based learner led to more
improvements. Closer observation of the system�s behavior leads to a better
understanding of its ability to correct overlay-general rules with specific
ones, and shows that there is still a room for improvement.
back to Accepted Papers Page
Expert Systems and the Web, MedChol: An Expert System for Diagnosis and Therapy of the
Cholera
Paper Number: 07-01
Abstract:
The increasing popularity of the WWW and its rapid evolution have sparked interests
in developing new types of web-based applications. These applications are not
only distributed but they are truly interactive in that :
- servers do no longer pay a passive role.
- Server/client interactions are more complex and last longer.
- Servers may have to maintain client and session state.
The web is no longer a tool for delivering static information. In this context, a
new type of artificial-intelligence-based applications has emerged : www-based
knowledge bases. This article will focus on presenting a method for building a
www-based knowledge base server using Java.
backto Accepted Papers Page
A Pitch Determination Algorithm for Arabic Speech Processing
Paper Number: 15-07
Abstract:
In this paper we
will present a new speech processing program which identify the pitch period and
extract the formant frequencies of Arabic speech. Its purpose is to enhance the
voice recognition and to simplify complex processing. The database is
constituted of Arabic sentences phonetically balanced, pronounced by several
speakers ( male, female, children ). After acquisition, conversion and
segmentation, we identify the voiced/unvoiced (V/UV) speech by analyzing the
zero-crossing number, then we compute the pitch and formants frequencies ,
magnitudes and bandwidths. The results are compared with those obtained with the
others PDA (SIFT,AMDF, CEPSTRAL, LPC).
back to Accepted Papers Page
The Periodic Shifted Piecewise-Linear Transform
Paper Number: 15-08
Abstract:
This paper presents a new piecewise-linear series and transform based on periodic
shifted piece-linear functions. This transform
is called the Periodic Shifted Piecewise-linear functions. The basis functions
for this transform are the Periodic Shifted Piecewise-linear functions.
Expansion of a periodic signal into PSP series is considered. The PSP transform
matrix is represented by derivatives, in distributive sense, of the shifted
square wave functions. The matrix of the inverse PSP transform is represented by
means of the proper values of the periodic shifted piecewise linear functions at
the same samples. The method of construction of the discrete PSP and the matrix
equation of the transform are presented. The approximation of a continuous
signal by means of a linear combination of the PSP functions is given. An
example of PSP approximation to a selected signal is included comparison of PSP
and Walsh-Hadamard approximation is also investigated. It is shown that the PSP
transform achieves a better approximation performance, in the mean square error
sense, than that of Walsh-Hadamard transform.
back to Accepted Papers Page
Using Electronic Communication in Higher Education
Paper Number: 13-01
Abstract:
The continuing development of computer technology, especially the Internet, allows
students and faculty members to have easier access to a large source of
information from around the whole world. This research paper investigates the
possibility of using text-based electronic communication in higher education and
is based on data retrieved from interviews from twenty-four staff members from
the Lebanese American University. [these interviews concluded that they realize
that the change would take time, resources would have to be provided for the
faculty members, and administrative support would have to be
ensured in order to plan and implemented the addition of text-based
electronic communication to the curriculum].
back to Accepted Papers Page
Identification and Classification of 3D Patters by Neural Networks Applicable to Mechanical
Parts
Paper Number: 11-03
Abstract:
Pattern recognition using neural networks is a recent technology in full expansion. It
is a heuristic technique for
pattern recognition that attempts to simulate man intelligent behavior by the
machine. Its aim consists in optimizing the tedious tasks and helps man in
taking vital decisions in industrial and medical situations.
Neural networks are mathematical and computer models. They consist in sets of computing
units called formal neurons that simulate the human biological cells.
The present work aims at elaborating a pattern recognition system that identifies 3D
objects using a powerful tool: the neural networks based on the back-
propagation algorithm.
A data base constructed of 3 types of images (a hammer, a screwdriver and a key) was
created, each of witch is presented within a set of prototypes.
A study was undertaken of the different image compression methods known. In our
case, the binary RLE method seems to be a convenient image compression method
giving both a good compression rate and a better ratio to noise signal.
back to Accepted Papers Page
The Challenge of Applying Cost Benefit Analysis to IT in Developing Countries
Paper Number: 15-09
Abstract:
Investing information Technology (IT) has been considered a risky venture by the
administrations of many developing countries. The high cost of IT, the lack of
financial and technical
resources, and the high rate of failure for many of public-sector information
systems are only few of the reasons which make top-level administration shy away
from information technology projects. However , applying an efficient and a systematic approach of cost-benefit analysis to government IT
projects, can reduce
the uncertainty and the risk involved in the decision making process.
Unfortunately, experience shows that the application of such important tool can
be a difficult task which requires overcoming many problems and challenges
present in the public-sector.
This paper presents the application of CBA from a practical point of view, while
focusing on identifying the sources of difficulties present in the public sector
of developing countries.
back to Accepted Papers Page
Modeling Real-Time Systems in Timed-Rewriting Logic
Paper Number: 15-10
Abstract:
Real-time systems are dynamic and generic systems that are able to modify their own states
during time, so processes, concurrent, reactive and distributed systems are
typical examples. The goal of this paper is to provide a semantic for time
aspects using Meseguer's rewriting logic in term of SRI's Maude as higher
specifying language for the specification of Oriented Objects and Concurrent
systems. We address the formal specification of a simple train crossing-gate
system using Timed- Maude as extended language to Maude.
back to Accepted Papers Page
Computer Results for the Study of Tapered Optical Structure in Communication
Paper Number: 15-11
Abstract:
This paper elaborates a mathematical model based on a new concept of intrinsic mode.
This model shall be applied to a physical structure which is the tapered wave guide
used in integrated optics communication. We shall show how one can
introduce an efficient computer program for the determination of the steepest
descent path contour, in order to be able to evaluate numerically an Intrinsic
Field Integral; applied to our structure.. Consequently, we shall show computer
results agree, to a certain extent, with the theory of functions of complex
variables. However, the restrictions of our algorithm can be justified,
accounted for and of course overcome by suggesting another approach for the
Intrinsic Field Integral to be more systematic and universal a concept.
back to Accepted Papers Page
A Metadata for Web-Based Cooperative Information Systems
Paper Number: 07-03
Abstract:
This paper presents a metadata for the Web-Based Cooperative Information Systems (WBCISs).
That WBCISs aim to support interactions among heterogeneous knowledge sources
that share business objects and processes and are willing to cooperate via
Interactions Component. The metadata describes all the properties of components
of the WBCIS architecture. The fundamental elements are Knowledge sources and
Interaction Components. A knowledge source is modeled as a package that presents
an interface definition (data schema of business objects, data and processes�
activities). These Knowledge Sources may be internal to the organization:
Enterprise Information System, Workgroup Information Systems and Personal
Information Systems, or external to the organization. The Interactions Component
is a kind of business objects and processes broker. It allows location, access,
integration or global view of business object, and invocation or reuse of
processes� activities. The interactions are specialized according to their
situations namely interactions for coordination that deal with the consistency
of the shared business objects, interactions for cooperation related to the
coupled processes� activities or interactions for transmission that deal with
informal and unstructured exchanges. The metadata is the core of the WBCIS as
support for browsing services and user-oriented semantic services that allow the
WBCIS to support individual and collaborative work either by accessing business
objects, invoking processes� activities, or integrating information.
back to Accepted Papers Page
An Approach to Describe UML Process
Paper Number: 15-13
Abstract:
Face to the variety of methods, the unification has been undertaken especially with
the appearance of the UML language (Unified Method language). This latter
represents the result of the merge of object modeling methods namely OMT, OOSE
and OOD. Nevertheless, UML allows to represent models, but it does not define
model elaboration process. In fact, having an universal process of software
development seems to be an utopia. That's why, we propose in this paper an
approach which describes an unified method language process (UMLP) which is
based on the definition of method
fragments by the use of NATURE process model. Those fragments are stocked
in a method base and extracted according to the application engineer
requirements.
back to Accepted Papers Page
Towards the Design of a Knowledge-Based Interface Controller in Multilevel Secure Database Systems
Paper Number: 02-01
Abstract:
Inference is a major threat to database security.
An inference problem exists in a database when high data can be obtained from low data. Controlling
inference is a difficult task for two main reasons. First, users may
obtain unauthorized information from responses they received to legitimate
queries. Second, hostile users combine logical inferences, application
semantics, and their knowledge of the application in their attacks. In addition,
traditional security mechanisms do not offer any protection against this
type of threat. Despite numerous various research efforts, controlling inference
is still a hurdle. In this article after an in-depth survey of the state of the
art of inference control in MLS databases, we briefly present a new approach,
based on artificial intelligence, which try to mimic the human inference process.
back to Accepted Papers Page
Establishment of Regional Center for Research and Development (RCRD)
Paper Number: 15-14
Abstract:
This paper tries to support the Arab research and software development by solving
some problem and by offering other tools. The problem is that some Arab
researchers need valuable software packages and computer labs, that they miss
because of its high cost. Suggested
RCRD should have these software packages and the necessary hardware. Other tools
are the suggested technical committees and databases, that RCRD shoud have. RCRD
should be connected to universities and scientific centers, who can use these
facilities with no need to buy it. RCRD
is suggested to be a regional, ungovernmental, non-profit association, offers
services for Arab academics and researchers. This
paper does not concern with technical details of the RCRD, but focuses on the
idea, the function and the structure of the RCRD. Technical details may be discussed
later as there are many options.
back to Accepted Papers Page
Unsafelty Vectors: A New Fault-Tolerant Routing for the K-ary n-Cube
Paper Number: 06-03
Abstract:
This paper presents a new fault-tolerant routing algorithm for the k-ary n-cube. The
algorithm is based on the concept of �unsafety vectors�. Each node A
calculates its unsafety vector UA,D where the l th element
of u1A,D
,
1<=l<=�
n*
,
of UA,D
represents a measure of the routing unsafety at distance l from A toward destination D. We
present an analytical study proving some properties of the proposed algorithm.
We obtain performance measures from extensive simulation experiments for
different sizes of the k-ary n-cube. The experimental study shows that for
practical number of faulty nodes (below 20%), the achieved routing is nearly
optimal.
back to Accepted Papers Page
Recognition of Dynamic Process Modes on the Base of Adaptive Resonance Theory Neural Network
Paper Number: 11-05
Abstract:
This paper is concerned with introducing the new modification of ART-1 neural nets,
which leads to either decreasing the amount of neurons needed in ART neural
networks and decreasing the reaction time. The successful result of modification was
proved by the implementation in the cement industry, for burning process in a
rotary kiln.
back to Accepted Papers Page
Lexicon Representation to Support the Machine Translation by BAM
Paper Number: 01-02
Abstract:
The most important characteristics of computer and information systems revolution is
he practice of human realization and its experience. This practice is done by information
systems that use natural language as ways of practice. Consequently that help to
spread and simplify widely and economically.
Natural language processing (NLP) with its study of behavior, its ways of constructs, its
classification (statically and dynamically) is considered very important subject
to develop systems able to deal with the human language.
The technology of artificial intelligence is used to represent the human knowledge
and its usage's to design expert systems able to understand and deduce.
The machine translation is a subject that helps to support the developing, realizing
and understanding the dealing with Neural languages.
It represents the link between two different languages by using the information
systems able to transfer the speech based on grammatical, syntactical
conjugation of the word.
The Lexicon is considered as an auxiliary way to help the machine translation by the
huge availability of information needed for the process of translation. From the
other hand Bi-directional associative memory (BAM) is used in storing and feedback
information-vectors in both directions.
It is used to calculate weight matrix, which becomes as encoding and monitoring
function to recognize the associative patters.
Our study discusses the operation of Lexicon representation to support the machine
translation by BAM connection of contextual, grammatical and syntactical
vectors. Its usage helps to diminish the needed area of storage that represents the
Lexicon vocabularies. It also helps to speed meaning feedback, support the
translation in both directions (Arabic-English, English-Arabic). It supplies the
facility of modernizing the Lexicon questionnaire with word processing whether
available regulation or irrgulation.
back to Accepted Papers Page
WETCP: A Reliable Transport Protocol of Mobile Wireless Networks
Paper Number: 04-05
Abstract:
This paper introduces WETCP
(Wireless-enhanced TCP), a transport layer protocol
derived from TCP capable of efficiently addressing issues related to wireless
networks and user mobility. WETCP considers most of the problems evolving from
wireless environment: congestion control and recovery, variations in round trip
delays, loss recovery and disconnections. WETCP enhances the performance of the
classical TCP over wireless mobile networks. The protocol is implemented using
the ns2 network simulator. Simulation results compare the performance of WETCP
to that of TCP Reno. Results show that WETCP improves throughput and data
transfer time significantly, while maintaining good put that is almost equal to
the good put of TCP Reno.
back to Accepted Papers Page
A New Approach for Scanning and Attacking the New Generation of Viruses
Paper Number: 15-17
Abstract:
Computer virus now a days is a very serious aspect that the researches and attentions are directed
to. This field is largely and fast growing and there is now more than virus's
types than the hackers know.
Most of the antivirus programs concentrates on one essential methods for detecting
viruses and that by comparing the system's files with a data base containing a
bit pattern or viruses signature for the known viruses. This method is working
very well if the virus definition file is currently updated.
In real life, every day there are a new types of viruses and it is very difficult to
keep the database updated to the last minute. Also, there are new types and
shapes of viruses such as stealth or worms which are always create a new version
of viruses or may be fooling the operating system in many ways to deny their
existence. Networks made it possible for viruses to spread and the problem is
serious.
The research suggests a new approach for scanning and attacking new types of viruses
by using a combination of Neural Network and Genetic Algorithm. This paper is
devoted to study the ability to raise the computer immunity and recoverability
towards virus attack despite of their kinds and fields.
back to Accepted Papers Page
The Role of Software Engineering Methodologies in Reducing the Failures in Software
Projects
Paper Number: 12-02
Abstract:
Software projects development is certainly a process, which can fail. One of the
important factors to success is the understanding where software projects can
fail and to plan on backups and recovery. Software systems development
methodologies can help a lot in reducing failures. Such helps are the results of
using formal methods, prototyping, waterfall model, spiral model, etc. However,
software projects development is certainly ripe for failures, no matter what
software system development methodology you are using. But, applying a
well-known methodology is required for determining the certainty of failures so
that we can avoid such pitfalls or know how to recover from such failures. In
this paper, certain questions have been developed to identify the occurrence of
the failures in the software projects. Moreover, recommendations have been
suggested to reduce the failures rate in the software projects.
back to Accepted Papers Page
Analysis and Specification Tools for Manufacturing Systems
Paper Number: 12-03
Abstract:
The objective of this article is to offer the industrial experts a "computing
tool " allowing them to analyze and specify their manufacturing systems.
The analysis is based on a decomposition of studied systems in three separated
but interconnected subsystems (logical, physical and decisional). The
specification uses some tools in order to formalize the knowledge the experts
have of their system (Multi-Agents,�). A working up is applied on an
industrial example. The example concerns the manufacturing system of the Oran
dairy cooperative.
back to Accepted Papers Page
Supervised Classification by Modular Neural Network
Paper Number: 11-06
Abstract:
In this paper, multi-layer feed forward neural networks are designed to perform
pattern recognition tasks. To approach the functionality of the human visual
system, we propose a hierarchical system using highly-structured artificial
neural nets comprising two stages of processing for machine vision: a low-level
process and a high-level one. The neural network system contains mainly two
modules: a neural (sub-) network performing edge detection, and a neural
classifier. This classifier uses the edge image obtained at the output of the
first stage of processing. The use of two sub-networks
instead of a single one allows the application of learning sets
consisting of a limited number of training patterns, and consequently results in
reduced learning time. In order to have good generalization, training is made by
means of the back propagation algorithm. This system performs accurately and
efficiently even with degraded test images.
back to Accepted Papers Page
Application of the "Projection of the Dependences" Method for the Design of a
Systolic Network Dedicated to the Resolution of a Linear System by the
"Gauss-Seidel" Method
Paper Number: 06-05
Abstract:
Parallelism has
generated new concepts and approaches making it possible to conceive
competitor systems and parallel architectural configurations.
The bringing together between these two concepts is hardly easy and
requires a precise definition of the structural elements of algorithm and their
projection on a suitable parallel architecture.
The work described in this paper, tries to concretize this bringing
together for a class of architectures called: " systolic " .
One starts with the description of the " Method of Projection of the
Dependencies ", then one applies it to the design of a systolic network for
the resolution of a linear system by an iterative method:
" Method of Gauss-Seidel ".
back to Accepted Papers Page
Derivation of Two Mathematical Models to Simulate Surface Acoustic Wave Programmable
Transversal Filter Devices (SAW/PTF)
Paper Number: 09-01
Abstract:
In the recent years many papers have been published in the field of SAW/PTF, all of
them up to now have been partially programmed [1] (the weighting circuit is in
the output stage). This paper explains and summarizes the derivation of two
mathematical models depending on the delta function model, which gives only an
information on the frequency response (frequency versus relative insertion loss)
of the designed filter, these models can be used to simulate any partially
Programmable Transversal SAW filter. The simulation program has been written
using MATLAB (the language of technical computing). To verify the correctness of
the two models, we used two design structures, one belongs to Carl M. Panasik
[2, 3] and the other belongs to our research work (at Zhejiang University) [6].
These two designs have practical results, which are similar to our simulation
ones.
back to Accepted Papers Page
A New Call Admission Control Function for an ATM Backbone
Paper Number: 04-06
Abstract:
An equally distributed load for call admission control (CAC) policy with routing is
applied. This policy is based on subdividing the traffic into a number of
service classes according to their statistical and performance characteristics.
Each traffic class is assigned a capacity partition (bandwidth), which is
periodically reassigned over all links in the network. At each node
(ATM switch) there is a controller for computing the necessary bandwidth
for each traffic class, which is updated upon the calculation of the residual
capacity. Upon the arriving of a new call, the admission controller, compares
the required bandwidth for the new call with the total residual capacity. The
new call can be accepted if and only if the required bandwidth is less than or
equal to the total residual capacity; otherwise the call will be rejected.
Simultaneously the control routing algorithm must decide which route the call
should follow .On the basis of the distributed routing policy, which maximizes
the utilization factor accounted for local instantaneous information, as well as
for aggregate information. Some simulation results are presented.
back to Accepted Papers Page
Experimantal Analysis of Input Impedance of Normal Mode Helical Antenna
Paper Number: 10-01
Abstract:
Input impedance is an important characteristic of NMHA. Several experiments were
conducted in order to understand the relationship between input impedance of
NMHA and its physical parameters. The variation of input impedance of NMHA is
observed upon its diameter of helix and perpendicular separation of turns. In is
found that input impedance of NMHA does not change with these physical
parameters.
back to Accepted Papers Page
An Adaptive Neural Network Controller for Non-Linear Systems and its Application to
a Physiological System
Paper Number: 11-07
Abstract:
The theory of artificial neural networks has been successfully applied in control systems.
In this paper, a neural-network-based controller structure is proposed and
applied to an unknown non-linear system that is affected by an an unmeasured
disturbance. The controller structure includes three neural-network modules: the disturbance
estimator, the system model, and the optimizer. The controller provides control
actions according to the estimated values of unmeasured disturbances, and predictions of the future behavior
of the system. The overall performance of the controller is improved continuously
during its work by using the latest measures of the system parameters to train
its neural-network modules. This strategy allows the controller to adapt to
a specific system and to any changes in its behavior during the control process.
back to Accepted Papers Page
Image Compression and Vector Quantization by Self Organization Feature Map Neural
Network
Paper Number: 11-08
Abstract:
The study of image compression methods has been an active area or research since the
inception of digital imaging. In this paper an algorithm fro the design of a
compression scheme for digital still images is presented. The proposed algorithm
first perform the discreet cosine transform DTC of the original image then
vector quantization by self organization feature map (SOFM) algorithm to
compress the image in the transformed domain. The performance of the proposed
algorithm has been tested by computer simulation. The results are examined for
different compression ratios and for different size codebook.
back to Accepted Papers Page
Fast Solution of the System of Linear Algebraic Equations Based on the Digit-By-Digit
Method
Paper Number: 15-18
Abstract:
This paper presents one of the applications of the Digit-by-Digit method, that is in
solving the system of linear algebraic equation (SLAE). A simplified algorithm
for solving SLAE is given, the necessary and sufficient conditions for
convergence is specified.
A classification of the field of uses, and a criteria for effective solution SLAE
with the requirements for the most efficient use of the computer recourses is
stated.
back to Accepted Papers Page
Image Matching Based on Region by Hopfield Neural Network
Paper Number: 11-09
Abstract:
Artificial vision aims to replace the human vision in various areas, potentially in medical
imagery, aerial, robotics, as well as nuclear plants Stereo matching represents
an essential place chain of the vision process by computer. Processing in artificial
vision decompose generally in image acquisition process, edge detection,
segmentation, stereo matching, 3D reconstruction and pattern recognition.
Stereovision uses two images of the same scene from 2 different positions, and has for
objective the computation of # D coordinates from a point from its projections
in 2 images by taking into account each camera projection model and the spacial
relationship between the two cameras. The stereovision depends on matching
results (of segments, points, regions primitives) between two images. It applies
also in the case of 3 images. Our matching approach uses Hopfield neural
networks on a triplet of images with region primitives. It uses region characteristics
(surface, gray, level, elongation, gravity center) as well as uniqueness and
adjacency constrains.
back to Accepted Papers Page
Success Factors of Systems Integration Implementation
Paper Number: 12-04
Abstract:
This paper is written based
on the findings of a survey conducted in the Malaysian public sector IT
community. The paper starts with a definition of SI and then briefly describes
how the study was conducted. This is followed with a discussion on the factors
that will influence the success of system integration implementation. The
findings of the survey are compared with a similar study conducted in the US. We
conclude with a recommendation on how systems integration can best be
implemented amongst inter-related organizations.
back to Accepted Papers Page
Characteristics of Candidate Systems for Integration
Paper Number: 12-05
Abstract:
This paper is written based on the findings of a survey conducted in the Malaysian
public sector IT community. The paper starts with a definition of SI and then
briefly describes how the study was conducted. This is followed with a
description of the state of information systems in the Malaysian public sector
IT community. The discussion is continued with an examination on the status of
systems integration in Malaysia. The paper then focuses on the ideal systems
characteristics for integration. Finally, a conclusion is drawn based on the
findings of the survey, on the characteristics of candidate systems for
integration.
back to Accepted Papers Page
CM-Builder:An Automated Object-Oriented Analyzer
Paper Number: 12-06
Abstract:
The past two decades have seen a growing interest in graphical CASE (Computer Aided
Software Engineering) tools. These tools provide considerable help in
documenting and analyzing the output of the Analysis and Design stages of
software development. However, these tools do not contribute to the process of
identifying the basic elements of the analysis and design model (e.g. he
objects, classes, attributes, and relationships, in the OOA model). This paper
describe an automated CASE tool called CM-Builder which aims at supporting the
Object-Oriented Analysis stage of software development. The CM-Builder uses
robust Natural Languages Processing techniques to analyze software requirements
texts written in English and build an integrated discourse model of the
processed text, represented in a Semantic Network. This Semantic Network is then
used to automatically build an initial UML Class Model representing the object
classes mentioned in the text and the relationships among them. The initial
model can be directly input to a graphical CASE tool for further refinement by
human analysis. The results obtained by running the OM-Builder on a case-study
are very encouraging and demonstrate that our approach have the potential to
play an important role in the software development process.
back to Accepted Papers Page