Volume II,  Issue I,  October 2011

Accepted Articles Information

  1. Web-Based Ontology Languages and its Based Description Logics


    Authors: Mohammad Taye


    Abstract: The main object of semantic web languages is to add semantics to the existing information on the Web. These web languages have been developed to represent or express ontologies. Therefore, these description languages provide richer constructors for forming complex class expressions and axioms. An ontology is expressed in a knowledge representation language, which provides a formal frame of semantics. Since description logic is the basis of most ontology language, it is appropriate to explain briefly the base of the description to understand the ontology language clearly. The aim of this paper is to provide a brief survey of state-of-the-art ontology languages which are used to express ontology over the Web is provided. Also the goal of this paper is to provide a basic understanding of ontologies and description logics, which are the basis of ontology languages.




  2. An Quadrant-XYZ routing algorithm for 3-D Asymmetric Torus Network-on-Chip

    Authors: Mohammad Ayoub Khan, Abdul Quaiyum Ansari Ansari

    Abstract: Three Dimensional (3-D) ICs are able to obtain significant performance benefits over 2-D ICs based on the electrical and mechanical properties resulting from the new geometrical arrangement (topology). The arrangement of 3-D also offers opportunities for new circuit architecture based on the geometric capacity that provide greater numbers of interconnections among multi-layer active circuits. The emerging 3-D VLSI Integration and process technologies allow the new design opportunities in 3-D NoC. The 3-D NoC can reduce significant amount of wire length for local and global interconnects. In this paper, we have proposed an efficient 3-D Asymmetric Torus routing algorithm for NoC router. The 3-D torus has constant node degree, recursive structure, simple communication algorithms, and good scalability. A Quadrant-XYZ dimension order routing algorithm is proposed to build up the 3-D Asymmetric Torus NoC router. The algorithm partitions the geometrical space into quadrants and selects the nearest wrap-around edge to connect the destination node. Thus, the presented algorithm guarantees minimal paths to each destination based on routing regulations. The complexity of the algorithm is O (n). The proposed routing algorithm has been compared with the traditional XYZ algorithm and the comparison results show that the quadrant-XYZ router has shorter path length. This paper presents a Register Transfer Logic (RTL) simulation model of Quadrant-XYZ dimension order routing algorithm for 3-D asymmetric torus NoC written in Verilog. The model represents the functional behavior of the routing chip down to the flit (byte) level. The 3-D asymmetric torus NoC has achieved a maximum operating frequency 750 MHz on Xilinx Vertex-6 programmable device..



  3. Improving Studentís Performance Using Data Clustering and Neural Networks in Foreign-Language Based Higher Education

    Authors: Chady El Moucary, Marie Khair, Walid Zakhem

    Abstract: The academic performance of engineering and science students during their first year at university is a turning point in their educational path and usually encroaches on their General Point Average (GPA) in a decisive manner. A case of particular interest is when students have to learn their coursesí materials in a foreign language. Indeed, it usually cumulates an additional handicap as will be shown. In this paper, we present a hybrid procedure based on Neural Networks (NN) and Data Clustering that enables academicians to predict studentsí GPA according to their foreign language performance at a first stage, then classify the student in a well-defined cluster for further advising and follow up by forming a new system entry. This procedure has mainly a twofold objective. It allows meticulous advising during registration and thus, helps maintain high retention rate, acceptable GPA and grant management. Additionally, it endows instructors an anticipated estimation of their studentsí capabilities during team forming and in-class participation. The results demonstrated a high level of accuracy and efficiency in identifying slow, moderate and fast learners and in endowing advisors as well as instructors an efficient tool in tackling this specific aspect of the learnersí academic standards and path.



  4. Development and Beta Testing of Applications for Direct Trainee Observation in Medical Education Using an iPad Platform

    Authors: Dina Shakir

    Abstract: Direct observation of clinical skills, either in clinical settings or during medical exams, plays a key role in education and assessment of residents in General Internal Medicine. The Mini-Clinical Evaluation Exercise (CEX) is an educational tool, for clinical skills assessment, that facilitates learning and allows residentsí to gain insight into the strengths and weaknesses of their clinical performance.
    Traditionally, direct observation has relied on paper-based documentation and the overall process of data collection, archiving, entry and analysis of Mini-CEX results has proven to be very costly and time-consuming. The rapid development of information systems and the advancement of technologies, provide the vast potential for improvement in teaching practices including medical education. Thus, the development of an electronic application of the Mini-CEX will facilitate the process of data collection and improve the quality of medical training. Several interviews were conducted to properly extract user needs and system requirements, after which the application was developed. The tool was implemented on an iPad platform and tested on a sample of five representative subjects. Interview and usability results revealed positive attitudes towards the application and its potential improvement in patient care.



  5. Efficient Technique for Color Image Noise Reduction

    Authors: Mrs. C. Mythili, Dr.V.Kavitha

    Abstract: Images are often degraded by noises. Noise can occur during image capture, transmission, etc. Noise removal is an important task in image processing. In general the results of the noise removal have a strong influence on the quality of the image processing technique. Several techniques for noise removal are well established in color image processing. The nature of the noise removal problem depends on the type of the noise corrupting the image. In the field of image noise reduction several linear and non linear filtering methods have been proposed. Linear filters are not able to effectively eliminate impulse noise as they have a tendency to blur the edges of an image. On the other hand non linear filters are suited for dealing with impulse noise. Several non linear filters based on Classical and fuzzy techniques have emerged in the past few years. For example
    most classical filters that remove simultaneously blur the edges, while fuzzy filters have the ability to combine edge preservation and smoothing. Compared to other non linear techniques, fuzzy filters are able to represent knowledge in a comprehensible way. In this paper we present results for different filtering techniques and we compare the results for these techniques



  6. A Hierarchical Framework for Evaluating Success Factors of M-Learning

    Authors: Hussein Al-Bahadili, Ghassan Issa, Maher Abuhamdeh

    Abstract: There has been an enormous increase in the use of mobile learning (M-Learning) systems in many fields due to the tremendous
    advancement in information and communication technologies (ICTs). Although, there are many frameworks that have
    been developed for identifying and categorizing the different components of M-Learning systems, most of them have some
    limitations, drawbacks, and no support for evaluating the success factors (global weights) of the system criteria. In this paper, a
    comprehensive hierarchical framework is developed for identifying and categorizing all components that may affect the development
    and deployments of cost-effective M-Learning. Furthermore, due to the hierarchical structure of the framework, analytic hierarchy
    process (AHP) techniques can be used to quantitatively estimate the success factors of the system criteria. In order to demonstrate
    the benefits and flexibility of the framework, the success factors of the different system criteria are evaluated for different sets of
    preferences using an interactive software tool, namely, SFacts, which is developed for calculating the success factors of the
    criteria of any hierarchical framework.



  7. Low Power Address Generator for Memory Built-In Self Test

    Authors: Ahmed N. Awad & Abdallatif S.Abu-Issa

    Abstract: Memory is one of the basic computer components that is intensively accessed. Therefore, it is more likely to be affected by manufacturing faults rather than other components
    in the System on Chip (SoC). Memory Built-in Self Test (MBIST) is the most commonly used to test embedded memories. Although many algorithms were developed for MBIST, only few of these techniques focus on reducing the test power which plays an important role in evaluating the effectiveness of the test. This paper deals with reducing the switching activity in the address bus when testing SRAM of personal devices. The MBIST architecture was programmed using VHDL and then five address generators were simulated using Xilinx ISE tools and compared with each others in terms of their switching activity which is proportional to
    the test power.



  8. Adapting Decision Tree-Based Method to Index Large DNA-Protein Sequence Datasets

    Authors: Khalid Mohammad Jaber, Rosni Abdullah, Nur'Aini Abdul Rashid

    Abstract: Currently, the size of biological databases has increased significantly with the growing number of users and the rate of queries where some databases are of terabyte size. Hence, there is an increasing need to access databases at the fastest possible rate. Where biologists are concerned, the need is more of a means to fast, scalable and accuracy searching in biological databases. This may seem to be a simple task, given the speed of current available gigabytes processors. However, this is far from the truth as the growing number of data which are deposited into the database are ever increasing. Hence, searching the database becomes a difficult and time-consuming task. Here, the computer scientist can help to organize data in a way that allows biologists to quickly search existing information. In this paper, a decision tree indexing model for DNA and protein sequence datasets is proposed. This method of indexing can effectively and rapidly retrieve all the similar proteins from a large database for a given protein query. A theoretical and conceptual proposed framework is derived, based on published works using indexing techniques for different applications. After this, the methodology was proved by extensive experiments using 10 data sets with variant sizes for DNA and protein. The experimental results show that the proposed method reduced the searching space to an average of 97.9\% for DNA and 98\% for protein, compared to the Top Down Disk-based suffix tree methods currently in use. Furthermore, the proposed method was about 2.35 times faster for DNA and 29 times for protein compared to the BLAST+ algorithm, in respect of query processing time.



  9. Suggested Framework for Agile MDA and Agile Methodologies

    Authors: Dr. Asim El-Sheikh, Dr. Ahmed Omran

    Abstract: Modeling is an essential part in software development projects. This shifts the focus of software development from writing code to building models. Consequently Object Management Group (OMG) introduced Model Driven Architecture (MDA). MDA is the open approach to control both business and technology changes. MDA is created to help UML designers to cover all specification of the software system with all levels of modeling to move systematically from requirement phase towards design and coding phases. This paper focuses on the Business-Technology gap in software projects as a research problem. A new framework for Agile Methodologies will be introduced as a general guideline for the Agile Software Projects. This framework will integrate MDA capabilities and enhances the development process in Agile Methodologies and Agile Project Management. The empirical result is Agile Methodologies (with MDA capabilities) can decrease the negative effects of the research problem during the development of Information System (IS) projects, and consequently increases potential capabilities in Agile Methodologies.



  10. Solving Shortest Common Supersequence Problem Using Artificial Bee Colony Algorithm

    Authors: Mustafa M. Noaman, Ameera S. Jaradat

    Abstract: The idea behind this work is to solve the Shortest Common Supersequence by using Artificial Bee Colony (ABC) Algorithm. This algorithm is considered as one of the newest nature-inspired swarm-based optimization algorithms and has a promising performance [6]. Shortest Common Supersequence is a classical problem in the field of strings and it is classified as NP-Hard problem [12]. Many algorithms were used to solve this problem, Such as Genetic algorithms [14], Majority Merge algorithm and Ant Colony algorithm [17]. The project uses Artificial Bee Colony Algorithm to provide a scalable solution to the Shortest Common Supersequence problem. The algorithm evaluation showed promising results.



  11. Hand Gesture Interaction with a 3D Virtual Environment

    Authors: Nasser H. Dardas, Mohammad Alhaj

    Abstract: Virtual Environment (VE) system offers a natural and intelligent user interface. Hand gesture recognition is more efficient and easier interaction in VE than human-computer interface (HCI) devices like keyboards and mouses. We propose a hand gesture recognition interface that generates commands to control objects directly in a game. Our novel hand gesture recognition system utilizes both Bag-of-features and Support Vector Machine (SVM) to realize user-friendly interaction between human and computers. The HCI based on hand gesture recognition interacts with objects in a 3D virtual environment. With this interface, the user can control and direct a helicopter by a set of hand gesture commands controlling the movements of the helicopter. Our system shows the hand gesture recognition interface can attain an enhanced and more intuitive and flexible interaction for the user than other HCI devices.



  12. MATLAB Based Cost Modeling for VLSI Testing

    Authors: Balwinder Singh, Arun Khosla, Sukhleen Bindra Narang

    Abstract: The cost for testing integrated circuits and systems is growing rapidly as their complexity is increasing as per Mooreís law. Cost modeling plays a very vital role in reducing test cost and time to market. It also gives estimate of overall testing. The economics modeling for VLSI testing with Automatic Test Equipment (ATE) is presented in this paper. The mathematical relations are developed for cost model to test the VLSI circuits based on the parameters of ATE testing; further cost modeling equations are modeled into Graphical User Interface (GUI) in Matlab, which can be used as a cost estimation tool. A case study is done for Set-top-box, Microprocessor, Device A to verify the functionality of the developed estimation tool. It helps the Test engineers for estimating the testing cost for the test planning.



  13. Automating WS-Agreement Monitoring

    Authors: Ajaya Kumar Tripathy, Manas Ranjan Patra

    Abstract: An SLA (Service Level Agreement) is an agreement between the web service provider and web service consumer that specifies a mutually agreed level of service quality, functional properties of a web service and business assumptions. WS-Agreement is a standard form of SLA for specifying agreement between service provider and service consumer. In WS-Agreement specification, the level of service quality, functional properties of a web service and business assumptions are termed as guarantee terms. Service provider and consumer need to be assured of the guarantee terms specified in the SLA at the time of service provisioning which can be done by SLA monitoring. A non-intrusive and service composition platform independent SLA monitoring is a real challenge. This paper proposes a protocol for specifying SLA guarantee terms using XML schema. Further, a non-intrusive and SBS composition platform independent monitoring framework has been proposed using a first order temporal logic based language called MSL, in order to ensure the WS-Agreement guarantee terms and monitor both functional and non-functional properties at run-time.



  14. TMW - Time-Endorsement by Mobile Agent in Wireless Sensor Network

    Authors: Ambika.N, Dr.G.T.Raju

    Abstract: Wireless sensor network is an area where there has been a lot of significant developments. These sensors are hugely utilized in many applications like military applications, home automation, and environment surveillance. An application where confidential data is being transmitted requires to be protected from different types of attacks. Though the nodes are authenticated, they are liable to get compromised. The nodes may get compromised by the adversaries and may leak out confidential information. These sensors are subjected to different types of attacks like wormhole attack, Sybil attack, Denial-of-service attack and sinkhole attack. Depending on the type of application utilized level of security can be implemented. This paper utilizes the mobile agent to distribute secret key utilizing one-time pad algorithm. The encryption key hence varies from one cluster to another. To add additional security, comparison is done between the time of dispatch sent by cluster head and monitor nodes.



  15. A Novel Compressed Index-Query Web Search Engine Model

    Authors: Hussein Al-Bahadili, Saif Al-Saab

    Abstract: In this paper we present a description of a new Web search engine model, namely, the compressed index-query (CIQ) Web search engine model, which incorporates two bit-level compression layers implemented at the back-end processor (server) side, one layer resides after the indexer acting as a second compression layer to generate a double compressed index (index compressor), and the second layer resides after the query parser for query compression (query compressor) to enable bit-level compressed index-query search. The data compression algorithm used in this model is the Hamming codes-based data compression (HCDC) algorithm, which is an asymmetric, lossless, bit-level algorithm permits CIQ search. The different components of the new Web model are implemented in a prototype CIQ test tool (CIQTT), which is used as a test bench to validate the accuracy and integrity of the retrieved data, and to evaluate the performance of new Web search engine model. The test results demonstrate that the new CIQ model reduces disk space requirements and searching time by more than 24%, and attains a 100% agreement when compared with an uncompressed model.



  16. SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication

    Authors: Rushdi A. Hamamreh, Anas M. Melhem

    Abstract: Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a new model for WMN end-to-end security which divides authentication process into two phases: Mesh Access Point which is based on asymmetric cryptography and Mesh Client which is based on a server-side certificate such as EAP-TTLS.



  17. An Ecosystem in e-Learning Using Cloud Computing as platform and Web2.0

    Authors: Mona Nasr, Shimaa Ouf

    Abstract: Research community has believed that an e-learning ecosystem is the next generation e-learning but has faced challenges in optimizing resource allocations, dealing with dynamic demands on getting information and knowledge anywhere and anytime, handling rapid storage growth requirements, cost controlling and greater flexibility. Additionally, e-learning ecosystems need to improve its infrastructure, which can devote the required computation and storage resources for e-learning ecosystems. Cloud computing technologies although in their early stages, have managed to change the way applications are going to be developed and accessed. These technologies are aimed at running applications as services over the internet on a flexible infrastructure. Cloud computing provides a low cost solution to academic institutions for their researchers, faculty and students. This setup provides an additional benefit because all browsers based applications can also be accessed through mobile devices in addition to being available to a variety of laptop and desk top computers, provided internet access is available. In this paper we combined various technologies to achieve this goal. We present an interactive tool that can be used for science education; integration between cloud computing as a platform and web 2.0 are presented as a solution for building effective e-learning ecosystem.




    Authors: Fatimah Aljamal, Izzat alsmadi

    Abstract: Formal methods are used to provide formal and systematic models that can be used in software development to improve the correctness in those models. Formal methods are crucial, particularly, in critical systems where even minor mistakes can be pricey. In this paper, a formal method tool: ZEVES is used to describe requirements for two systems formally. Formal requirements are then used as an input for a tool used to automatically generate, execute and verify test cases. Path coverage algorithms are used to evaluate the effectiveness of the generated test cases and the ability of the formal model to describe all or most of the system functional requirements.



  19. Intelligent Web system: Using Intelligent Web Agents To Achieve a Self-Organized System

    Authors: Amjad Rattrout, Taroub Issa, Hassan BADIR

    Abstract: The Web is a major source of accurate information for users. It is a dynamic environment that is changing all the time .It consists of three dynamic components: Content, Link and Usage. These components are the goal of web search engine researchers. For search engines to do their job properly, they must pass through many steps: crawling, indexing, retrieving and ranking. Unfortunately, recent search engines suffer from a serious problem, that is: they can't keep up with this dynamic environment of the Web. Their indexes are not updated frequently. This paper presents a model that uses Ants to analysis the content of Web Space and Usage Space to achieve a well organized Web. The Content Space and the Usage Space is the field of our research. We will simulate this environment using Multi Agents System and Complex Adaptive System.



  20. Discretization of Continuous Attributes in Supervised Learning Algorithms

    Authors: Ali Al-Ibrahim

    Abstract: We propose a new algorithm, called CILA, for discretization of continuous attributes. The CILA algorithm can be used with any class labeled data. The tests performed using the CILA algorithm show that it generates discretization schemes with almost always the highest dependence between the class labels and the discrete intervals, and always with significantly lower number of intervals, when compared with other state-of-the-art discretization algorithms. The use of the CILA algorithm as a preprocessing step for a machine learning algorithm significantly improves the results in terms of the accuracy, which are better than using other discretization algorithms.