Volume II,  Issue II,  April 2012

Accepted Articles Information  
  1. Web-Based Ontology Languages and its Based Description Logics

    Author:  Mohammad Mustafa Taye

     

    Abstract:

     

    The main object of semantic web languages is to add semantics to the existing information on the Web. These web languages have been developed to represent or express ontologies. Therefore, these description languages provide richer constructors for forming complex class expressions and axioms. An ontology is expressed in a knowledge representation language, which provides a formal frame of semantics. Since description logic is the basis of most ontology language, it is appropriate to explain briefly the base of the description to understand the ontology language clearly. The aim of this paper is to provide a brief survey of state-of-the-art ontology languages which are used to express ontology over the Web is provided. Also the goal of this paper is to provide a basic understanding of ontologies and description logics, which are the basis of ontology languages.

    FullText

  2. A Quadrant-XYZ Routing Algorithm for 3-D Asymmetric Torus Network-on-Chip

    Authors:  Mohammad Ayoub Khan, and Abdul Quaiyum Ansari

     

    Abstract:

     

    Three-Dimensional (3-D) ICs are able to obtain significant performance benefits over two-dimensional (2-D) ICs based on the electrical and mechanical properties resulting from the new geometrical arrangement. The arrangement of 3-D ICs also offers opportunities for new circuit architecture based on the geometric capacity. The emerging 3-D VLSI integration and process technologies allow the new design opportunities in 3-D Network-on-Chip (NoC). The 3-D NoC can reduce significant amount of wire length for local and global interconnects. In this paper, we have proposed an efficient 3-D Asymmetric Torus routing algorithm for NoC. The 3-D torus has constant node degree, recursive structure, simple communication algorithms, and good scalability. A Quadrant-XYZ dimension order routing algorithm is proposed to build 3-D Asymmetric Torus NoC router. The algorithm partitions the geometrical space into quadrants and selects the nearest wrap-around edge to connect the destination node. Thus, the presented algorithm guarantees minimal paths to each destination based on routing regulations. The complexity of the algorithm is O (n). The proposed routing algorithm has been compared with the traditional XYZ algorithm and the comparison results show that the Quadrant-XYZ router has shorter path length. This paper presents a Register Transfer Logic (RTL) simulation model of Quadrant-XYZ dimension order routing algorithm for 3-D asymmetric torus NoC written in Verilog. The model represents the functional behavior of the routing chip down to the flit (byte) level. The 3-D asymmetric torus NoC has achieved a maximum operating frequency 750 MHz on Xilinx Vertex-6 programmable device.

    FullText

  3. MATLAB Based Cost Modeling for VLSI Testing

    Authors:  Balwinder Singh, Arun Khosla, and Sukhleen Bindra Narang

     

    Abstract:

     

    The cost for testing integrated circuits and systems is growing rapidly as their complexity is increasing as per Moore’s law. Cost modeling plays a very vital role in reducing test cost and time to market. It also gives estimate of overall testing. The economics modeling for VLSI testing with Automatic Test Equipment (ATE) is presented in this paper. The mathematical relations are developed for cost model to test the VLSI circuits based on the parameters of ATE testing, further cost modeling equations are modeled into Graphical User Interface(GUI) in Matlab, which can be used as a cost estimation tool . A case study is done for Set-top-box, Microprocessor, Device A to verify the functionality of the developed estimation tool. It helps the Test engineers for estimating the testing cost for the test planning.

    FullText

  4. Analyzing the Popular Words to Evaluate Spam in Arabic Web Pages

    Authors:  Heider A. Wahsheh, Izzat M. Alsmadi and Mohammed N. Al-Kabi

     

    Abstract:

     

    The extensive expansion and use of the Web and the Internet comes at the price of seducing a number of intruders to utilize the Web for destructive purposes. In the scope of Websites and Web pages, spammers try to inject their own content and pages in Web sites and search engine search results to be more visible to users and attract users to their Websites or products. This paper analyses the behaviors of the spammers in the content-based Arabic Web pages, through analyzing the weights of the most ten popular Arabic words used by Arab users in their queries. The results show that the behavior of the spammers in the Arabic Web pages can be unique and distinguished in comparison to other languages. Decision Tree was used to evaluate this behavior and it obtains the degree of accuracy which is equal to 90%.

    FullText

  5. THE IMPLICATION OF THE LEARNING THEORIES ON IMPLEMENTING E-LEARNING COURSES

    Authors: Ahmad Fawaz Alzaghoul

    Abstract:

     

    The aim of this paper is to describe the implication of the three commonly known learning theories on online courses. These theories are: the behaviorism, cognitivism, and constructivism. Moreover, the effect of these learning theories on implementing e-learning courses is reported. The description of the implication of these learning theories can help to develop the process of learning for the learner. Online learning materials should include activities for the different learning styles, so that learners can select appropriate activities based on their preferred style. Thus, a shift to pedagogy-based initiatives can be observed within the field of e-learning. In this paper, these three theories are described in short, and implications for realizing online courses are derived.

     

    FullText

  6. An Overview of Cybercrime in Iraq

    Authors: Sattar J. Aboud

    Abstract:

     

    This paper investigates the growing number of cybercrimes in Iraq and considers the demographic properties of individuals in charge for such activity. The paper relies on information taken
    from the Iraqi Department of Cybercrimes Records for the years 2006-2011. This paper describes cybercrime types and their properties. The results illustrate that among all types of cybercrimes committed during the past six years, the top four were distributed over the Internet such as Internet cheating, theft, cyber piracy and crime sex. The results illustrate that 81.1% were commited by males; 45.5% by high school students; 63.1% were commited alone; and 23.7% were committed by presently registered scholars. For those registered scholars committing cybercrimes, the results show that the proportion of high school students counted for 69.0% in 2009, 76.1% in 2010 and 62.7% in 2011. The high percentage illustrates that the numbers of presently enrolled scholars committing cybercrimes are a cause for worry. It is expected that the results of this paper can be used as recommendations to cybercrime professionals, government organizations, and schools.

    FullText

  7. Towards A Multimedia-Based Educational System for Children

    Authors: Masoud Udi Mwinyi, Sahar Ismail , Jihad M. AlJaam and Ali Jaoua

    Abstract:

     

    In this paper, we propose an educational system for children with special needs. The system is based on multimedia technology to teach the children in an interactive and innovative way. It uses formal concepts analysis and a simple ontology to extract the keywords from texts related to the animals and foods domains. We link these keywords with multimedia elements which are fetched from Google database using Google APIs. These keywords represent the main entities of the texts that include the named entities, the main characters, period and actions. We discuss also the FCA extraction algorithms and we propose some improvement. The system is divided into different modules with a simple interface allowing the instructors to input the text and get the corresponding multimedia elements. They can browse easily through these elements and select what is suitable for the children.

    FullText

  8.  

  9. Design of Optimal Linear Suspension for Quarter Car with Human Model using Genetic Algorithms

    Authors: Saeed Badran, Ashraf Salah, Wael Abbas and Ossama B. Abouelatta

    Abstract:

     

    This paper presents an optimization of a four-degrees-of-freedom vehicle’s human with seat suspension system using genetic algorithms (GA) to determine vehicle suspension parameters to achieve the best comfort of the human. Maximum allowed vertical acceleration of the human body and the suspension working space were used as constrained limits in this study. The genetic algorithm is applied to solve the optimization problem. The optimization results are compared through step and sinusoidal excitation of the seat suspension system for the optimal and currently used suspension systems. In case of sinusoidal profile excitation, results showed that RMS acceleration of the driver, seat suspension working space and sprung mass are reduced by about 21%, 21.5% and 20.3%, respectively. At step profile excitation, RMS acceleration of the driver, seat suspension working space and sprung mass are reduced by about 24%, 24.98% and 7.15%, respectively. The optimal design parameters of the suspension systems obtained are ks= 10039 N/m and cs= 900 N.s/m in case of sinusoidal input and ks= 10030 N/m and cs= 913 N.s/m in case of step input, respectively.

    FullText

  10. Forecasting Electrical Load using ANN Combined with Multiple Regression Method

    Authors: Saeed M. Badran and Ossama B. Abouelatta

    Abstract:

     

    This paper combined artificial neural network and regression modeling methods to predict electrical load. We propose an approach for specific day, week and/or month load forecasting for electrical companies taking into account the historical load. Therefore, a modified technique, based on artificial neural network (ANN) combined with linear regression, is applied on the KSA electrical network dependent on its historical data to predict the electrical load demand forecasting up to year 2020. This technique was compared with extrapolation of trend curves as a traditional method (Linear regression models). Application results show that the proposed method is feasible and effective. The application of neural networks prediction shows the capability and the efficiently of the proposed techniques to obtain the predicting load demand up to year 2020.

    FullText

     

  11. Shifting towards city-wide Wireless Jordanian Cities

    Authors: Nidhal Kamel Taha El-Omari and Mohamad H. Alzaghal

    Abstract:

     

    As future becomes more and more knowledge-driven, Information and Communication Technology (ICT), backed by modern wireless technologies, plays a critical important role in developing countries. Jordanian government is focusing on Internet access to connect cities and to make Jordan as a leading knowledge society. In remote areas with no infrastructure, connecting using wireless
    technology is almost the solution for ease of access and cost savings which will take any developing country to a new level of information economy and wealth creation. Well educated and skilled staff and as a result intellectual capital is becoming the keystone for organizations to get and stay competitive in dynamic markets.

    FullText

  12. State Space Reduction for the SYMMETRIC Traveling Salesman Problem through Halves Tours Complement

    Authors: Kamal R. Al-Rawi

    Abstract:

     

    The Traveling Salesman Problem (TSP) is an NP-hard. The state space increases exponentially with the number of nodes N. The number of paths is (N-1)!. There are two main points in the TSP we took advantage of: The number of states N in a path is known in advance, which is the number of nodes in the tour; and touring each node only once. The complete tour can be constructed by concatenating a half path with its complements. This limit a partial path no more than its half way to the complete tour. Limiting the partial path just to the half way of the complete tour reduces sharply the state space and the searched state space as well. This leads to reduction in both memory requirement and execution time which are the major challenges for computer scientist to tackle the TSP with exact algorithms.

    FullText

  13. A Framework for Embedded Malware considerations: Embedded systems vulnerabilities to injection of malware in a firmware
    under attack

    Authors: HAIDAR ALSALEH, SUFIAN YOUSEF and OMAR ARABEYYAT

    Abstract:

     

    With the emergence and proliferation of new methods for implanting malware, the next frontiers in system vulnerabilities are the embedded viruses or system attacks through vulnerabilities below the application layer. This paper researches contemporary and potential attacks that implant malware functions underneath the operating system (OS) within the firmware. At the lower OSI layers, the Malware take control and command before starting the operating system. The common wisdom is that if the underlying firmware cannot be trusted, then the OS and the applications depended on the firmware also cannot be trusted. This paper presents a comprehensive research on malwares in the BIOS and firmware and discusses and analyse them with specific interest towards the SMM. Furthermore this paper provides a novel and general solution approach to common firmware and for a secure processing framework. This paper showed in a novel approach that if the firmware
    cannot be trusted then the OS and the software that are dependent on the underlying firmware might not be trusted.

    FullText

  14. Requirements Determination: Themes and Communication Strategies

    Authors: Issam Jebreen

    Abstract:

    Communication is playing a central part of requirement determination (RD), particularly given that the many human interfaces associated with RD can lead to a variety of communication challenges, including miscommunication between users and analysts and misunderstandings between analysts and developers, all of which can add time and cost to software projects. This paper describes analysts-users communication during the RD. The focus of this work is a discussion of communication strategies used by analysts-users. Through the inductive approach we have investigated the perceptions of analysts regarding the communication strategies during RD. Analysis leads us to confirm that first, the analysts suggested that multiple channels of communication are needed to facilitate better information acquisition, sharing, and integration. This gives rise to shared understanding of the clients’ need and derivation of a consensual solution to the problem in a timely manner. Second, visual cues easily observable in face-to-face settings allow the analysts greater awareness of when others are attending to them and they subsequently use this feedback to determine appropriate behavior. Third, the use of phone calls, shared screen and videoconferencing may offset the cost of lower productivity through reductions in travel time and costs since the social presence communication media provided visual cues that are observable in face-to-face settings.

    FullText

  15. Graph Based Service Selection for Composition and Adaptation

    Authors: Ajaya Kumar Tripathy, Manas Ranjan Patra, Sateesh Kumar Pradhan, Raisa Rafique, Pujalin Mohanty, and Saumyaranjan Dash

    Abstract:

     

    One of the core idea of Service Oriented Architecture is the generation of new applications by composing existing services that are available on the web. Several approaches have been proposed to handle the problem of web service composition, but little effort has been devoted so far to the problem of consumer requirement oriented automatic service selection for composing and run-time adaptation of web service based systems (WSBS). In this paper we present a new framework which facilitates automatic service selection for composition of WSBS. This framework also facilitates
    automatic monitoring of WSBS at run-time and adaptation using an automatic re-composition strategy in case of any discrepancy found by the monitoring process at run-time.
     

    FullText

     

  16. MSL Based Service Based e-Governance Systems Monitoring

    Authors: Ajaya Kumar Tripathy, Manas Ranjan Patra, and Sateesh Kumar Pradhan

    Abstract:

     

    In many occasions citizens have to interact with multiple government organizations to complete a task which may involve lot of manual effort. In order to streamline the task different governments have adopted e-governance. But this has raised the issue of interoperability. In recent years web services seems to provide a solution towards interoperability both at the organizational and application level. It is possible to integrate inter-related tasks of different organizations through service composition techniques to form single service based applications. However, as government organizations function autonomously it is necessary to monitor these service based systems (SBS) at run-time. Monitoring SBS in a non-intrusive and composition platform independent manner is a real challenge. In this paper, we propose a framework for monitoring the compliance of SBS for which a set of requirements have been pre-specified. A Monitor Specification Language has been developed to specify the properties of the system to be monitored at run-time. The monitoring framework has been applied to a government document verification scenario as a proof of concepts.}
     

    FullText