Home>Products>Journals and Reviews>I.Re.Co.S.>Latest issue


International Review on Computers and Software - November  2010 (Vol. 5 N. 6) - Papers





International Review on Computers and Software - Papers


go to top   The Benefits of Using Internet Protocol Version 6 (IPV6)
         by Amer N.AbuAli, Ismail Ghazi Shayeb, Khaldoun Batiha, Haifa Yabu Aliudos

           Vol. 5. n. 6, pp. 583-587


Abstract - In this paper I discus the advantages of using internet protocol version 6, why it’s necessary to use this protocol ,the most features and also the number of IPv6 users in each continent and their percentage.
Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Internet Protocol, IPv4, Network Address Translator, Dynamic Host Configuration Protocol, Top-Level Aggregators.



go to top   Using the OMG’s DDS as Real-Time Publish/Subscribe Distribute System within Service and Network Layers of CALM
         by Fetiha Ben Cheikh , Mohamed Anis Mastouri , Salem Hasnaoui
           Vol. 5. n. 6, pp. 588-594


Abstract - Road safety and efficiency become a major issue of our society since adequate technology already exists to prevent road deaths and injuries. Indeed, we assist formidable progresses for the wireless technologies that allow imagining a future in which cars will be able to foresee and avoid collision. CALM (Communication Access for Land Mobiles) standards and his co-operative systems such as CVIS (Cooperative Vehicle-Infrastructure Systems) will provide a major means to achieve this. The CALM/CVIS challenge is to be able to provide multiple services over multiple different platforms and allows for continuous communications in two main modes of operation: Vehicle-to-Vehicle or Vehicle-to-Infrastructure systems. To enable road vehicles to communicate with any nearby roadside infrastructure and using real-time road and traffic information; these systems requires a model of communication that include vehicle specific applications, facilities, Middleware and communication access services. Many middleware such as OSGi and AUTOSAR are used to distribute data for CALM/CVIS nodes but both of them have lacked the support necessary for real-time, mission and safety critical systems. Thus we propose the OMG’s Data Distribution Service (DDS) which is a real-time Publish/Subscribe middleware solution. For performance evaluation, we analyze, in this paper, the influence of errors on DDS of CALM/CVIS nodes: we propose to estimate the average number of lost events by a subscriber and then to calculate the average time of the system's evolution loss of pursuit point of view.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: CVIS/CALM, Middleware, DDS, Publish/Subscribe, Performance Evaluation.



go to top   Heart Sound Musical Transcription Technique Using Multi-Level Preparation
         by  Farshad Arvin, Shyamala Doraisamy

           Vol. 5. n. 6, pp. 595-600


Abstract - Musical transcription of heart sound is a new idea to provide a textual biomedical database. Textual database allows applying several indexing and searching techniques in order to monitor patient behavior for a long duration. MIDI commands produce a semi-structural musical file format which enables to apply various applications. Main objective of this paper is the extraction of fundamental frequency of the given heart sound which is recorded with an electrical stethoscope. Based on extracted fundamental frequencies, the logarithmical relationship of pitch numbers will be estimated. Generally the captured heart sound includes several types of noises such as other organs sound and ambient voice. Hence, filtering of the heart sound is indispensable. Thus, three levels of preparation techniques which are wavelet transform, frequency limitation, and amplitude reconstruction will be applied on the heart sound sequentially. The results of the performed experiments show the accuracy of approximately 93% ±2. The statistical analyses illustrated that each level of the preparation, significantly improved the accuracy of the transcription (p < 0.005).

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Heart Sound, Transcription, Wavelet Transform, MIDI.



go to top   Medical Image Compression Using Quincunx Wavelets and VQ Coding
         by M. Beladgham, A. Bessaid, A. Moulay-Lakhdar, A. Taleb-Ahmed

           Vol. 5. n. 6, pp. 601-608


Abstract - In the field of medical diagnostics, interested parties have resorted increasingly to medical imaging. It is well established that the accuracy and completeness of diagnosis are initially connected with the image quality, but the quality of the image is itself dependent on a number of factors including primarily the processing that an image must undergo to enhance its quality. This paper introduces an algorithm for medical image compression based on the quincunx wavelets coupled with VQ coding algorithm, of which we applied the lattice structure to improve the wavelet transform shortcomings. In order to enhance the compression by our algorithm, we have compared the results obtained with those of other methods containing wavelet transforms. For this reason, we evaluated two parameters known for their calculation speed. The first parameter is the PSNR; the second is MSSIM (structural similarity) to measure the quality of compressed image. The results are very satisfactory regarding compression ratio, and the computation time and quality of the compressed image compared to those of traditional methods.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Medical Image, Compression, Quincunx Wavelets, Lattice, VQ.



go to top   Watershed Segmentation of Microscopic Histological Bone Biopsy Image Using Morphological Filter and HSI Color Space

         by Wafa Abid Fourati, Mohamed Salim Bouhlel

           Vol. 5. n. 6, pp. 609-614


Abstract - An accurate segmentation of microscopic trabecular bone images of the microstructure cancellous bone is a key to understanding important diseases in osteoporosis research. We present a new procedure for segmentation of color histological images of the microscopic bone biopsy, using the watershed transform and the various color pieces of information with mathematical morphology operators. Our proposed improvement is to substitute the input RGB image into HSI image which contains three components hue, saturation and intensity. To improve the detection of the interest region we threshold the saturation component and each pixel in the binary image is multiplied with hue component. The intensity image is complemented, threshold and merged with the product image and smoothened. The local minima are reduced using an opening-closing operation. It’s improving the classical watershed segmentation algorithm, overcoming over-segmentation. The experiment results show that the accuracy of trabecular extraction is greatly improved. This method for segmentation inherits the advantage of watershed algorithm, it overcame over-segmentation existed in traditional watershed segmentation.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Watershed, Opening, Closing, Filtering, Segmentation, Morphological Gradient.



go to top   ECG Signal Classification Using Hidden Markov Tree

         by S. Krimi, K. Ouni, N. Ellouze

           Vol. 5. n. 6, pp. 615-619


Abstract - This paper introduces a new method for ECG classification based on Hidden Markov Tree (HMT) model. The proposed method is capable of distinguishing 8 arrhythmia classes extracted from QT database while varying each time the states and the Gaussian numbers per state of the HMT model.To evaluate the performance of the classifier, a comparative study of recognition rates in terms of average sensitivity (SE) and average specificity (SP) and other statistical indices are used. These indices obtained with morphological descriptors for our recognition system having 6 states and 4 gaussians per state were a sensitivity (SE) of 94,95%, a specificity (SP) about 98,65%. By using higher order cumulants, we obtained a sensitivity (SE) of 97,22% and a specificity (SP) about 99,12% with the same model having 5 states and 3 gaussians per state. Synchronous wavelet transform energy allows a sensitivity (SE) of 95,20% and a specificity (SP) of 99,03% for a HMT model having 6 states and 3 gaussians per state.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Arrhythmia, ECG Classification, Hidden Markov Tree, Higher Order Cumulants, Morphological Descriptors, Synchronous Wavelet Transform Energy.



go to top   Methods to Reduce Losses at Power Transmission Lines and a Sample Application
         by Ümit K. Terzi, Şevket Sargın

           Vol. 5. n. 6, pp. 620-627


Abstract - Voltage drop and power and energy losses occur during the transmission of energy produced at power plants through transmission and distribution Networks and many transformer stations. While most of the losses happen due to the value of the current flowing through the network and parameters of the devices, there are losses that are independent of load current. If the reasons of these losses can be identified properly in the network, the ways to mitigate them can be easily identified. This study will explain reasons of losses in power transmission lines due to load current and derive equations concerning the losses. It will also identify precautions to take in order to reduce losses due to load current. It will mathematically be proved gains obtained from reduction of losses. It will also build a model for Tavşanlı switchyard using Matlab Power System Analysing Toolbox (PSAT) and analyse data obtained from implementation of methods used in our study and in literature on this new model.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Losses, Reduction of Losses at Power Transmission Lines, Power System Analysing.



go to top   Eigenspace-Based MLLR Adaptation Using MCE
         by Reza Sahraeian, Behzad Zamani, Ahmad Akbari, Ahmad Ayatollahi

           Vol. 5. n. 6, pp. 628-634


Abstract - This paper considers the problem of rapid and robust speaker adaptation in Automatic Speech Recognition (ASR) systems. We propose an approach using combination of eigenspace-based maximum likelihood linear regression (EMLLR) and Minimum Classification Error (MCE). MCE is used to estimate the coefficients of eigenvoices as an alternative to maximum likelihood. Experimental results on TIMIT database illustrate that using MCE leads to up to 1.9% improvement in phoneme error rate. Moreover, it is shown that increasing the amounts of adaptation data has less effect in proposed method than conventional EMLLR. Furthermore, the results achieved using genetic algorithm (GA) to estimate eigenvoices coefficients are compared to proposed method using MCE. The adaptation results using MCE show better performance than GA.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Speaker Adaptation, Eigenspace-based Maximum Likelihood Linear Regression, Minimum Classification Error, Genetic Algorithm.



go to top   A New Pipeline Implementation of JPEG-LS Compression Algorithm for Capsule Endoscope Applications
         by H. Daryanavard, G. Karimian, S. M. R. Shahshahani, H. Balazadeh Bahar

           Vol. 5. n. 6, pp. 635-642


Abstract - This paper presents some propositions to improve compression ratio and reduce consuming memory of JPEG-LS algorithm for capsule endoscope applications. In this new design, considering the changes in Golomb code block and Context parameters, compression ratio has been enhanced by 23% and consuming memory has been reduced by 53%. Also, considering the proposed non-stalling pipeline architecture by using forwarding technique to avoid hazards, circuit frequency has increased to 155.2MHz and an image can be compressed in less than 430us at this frequency. Compression architecture was described by VerilogHDL and implemented on ALTERA Stratix II FPGA.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Capsule Endoscope, JPEG-LS, Golomb Code, Pipeline, FPGA.



go to top   Performance Improvement of Group-Based Queries Using FCM and GK Fuzzy Clustering
         by Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee, Mohammad A. Nematbakhsh
           Vol. 5. n. 6, pp. 643-651


Abstract - Group nearest-neighbor (GNN) queries are a generalization of nearest-neighbor queries where the goal is to find one or more points from a set of destination points that have the smallest total distance from all query points. In fact, since people are situated at the query points as members of a group, and the perception of people about distance can be different, the classic GNN models cannot be used. On the other hand, more rich and multi-faceted distance models based on type-2 fuzzy logic require heavy computations which makes them difficult to use in real-world applications. In this paper, we propose a method based on fuzzy clustering of destination points that helps to compute the approximate response to GNN query in efficient time. For this purpose, two fuzzy clustering methods are compared using four evaluation criteria. The results show that one of the fuzzy clustering methods provides a high performance improvement while keeping a good quality of approximation in terms of similarity between ideal and approximated response sets.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Spatial Group Query, Nearest-Neighbor Query, Type-2 Fuzzy Distance.



go to top   Performance Modeling of Heterogeneous Software Architectural Styles
         by Golnaz Aghaee Ghazvini, Sayed Mehran Sharafi, Sima Emadi

           Vol. 5. n. 6, pp. 652-659


Abstract - Software architecture is an abstract model that gives syntactic and semantic information about the component of a software system and the relationship among them. The success of the software depends on whether the system can satisfy the quality attributes. One of the most critical aspects of the quality attributes of a software system is its performance. Performance analysis can be useful for assessing whether a proposed architecture can meet the desired performance specification and can help in making key architectural decisions. An architecture style is a set of principles which an architect uses in designing software architecture. Since software architectural styles have frequently been used by architects, these styles have a specific effect on quality attributes. If this effect is measurable for each existing style, it will enable the architect to evaluate and make architectural decisions more easily and precisely. In this paper there has been an effort to introduce a model for investigating performance attribute in heterogeneous software architectural styles. Therefore, in the first step, we will analyze performance quality attribute for homogeneous styles, and then in the second step, to improve the model for heterogeneous styles, we offered an algorithm. For this purpose, the system is initially modeled to a DTMC and then extracted the parameters to predict the Response time of the system.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Software Architecture; Homogeneous Architectural Styles; Heterogeneous Architectural Styles; Markov Model; Performance Evaluation.



go to top   Low Cost Slack Stealing Method for RM/DM
         by  José M. Urriza, Francisco E. Paez, Ricardo Cayssials, Javier D. Orozco, Lucas S. Schorb

           Vol. 5. n. 6, pp. 660-667


Abstract - Real Time Systems are currently found in millions of devices such as GPS, laptops, cell phones, computers, etc. These systems process real time tasks in conjunction with common tasks. Their coexistence requires methods and techniques that are necessary for the proper function of the heterogeneous system. Slack Stealing methods are an important tool to know how much the real time system tasks can be delayed without affecting its proper operation, and thus assigning non real-time tasks to the processor. Delaying the execution of real-time tasks in order to reduce the response time of non-real time task could be very useful in applications such as energy saving, fault tolerance, aperiodic tasks execution, among others. Because of the computational complexity, Slack Stealing methods proposed in the literature cannot be implemented at runtime. This paper presents a theoretical analysis to reduce the computational cost of the calculation of the available system slack and an algorithm that makes its implementation feasible during runtime.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: RTS, Slack Stealing, RM, DM.



go to top   TrFRA: a Trust Based Fuzzy Regression Analysis
         by  Devendera Agarwal, Dr. S.P. Tripathi, Dr. J.B. Singh

           Vol. 5. n. 6, pp. 668-670


Abstract - The paper focuses on relationship of Trust in Indian e-commerce sites with special reference to three factors: Web Object Content, Web Object Ownership and Web Object Certification Authority. It focuses on fuzzy relationship between Trust and website related factors.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: e-Commerce, Fuzzy Regression, Trust.



go to top   A Novel Design Technique to Speed-up the Charge Pump and Improve the Stability of PLLs
         by  Gh. R. Karimi, R. E. Atani, A. Taleb Beighi

           Vol. 5. n. 6, pp. 671-679


Abstract - In this paper, a novel technique for increasing the stability of integer-N CMOS Phase Locked Loops (PLLs) is presented. The method is based on the change of load capacitance which improves the stability of the second order PLL. Indeed, when PLL is in transient state and system is locked to proposed output frequency, there is a stable position in PLL that helps to decrease spurious frequency wave to affect on the jitter of the system. Consequently, we have an automatic switch that recognizes the transient state from steady state, which is based on phase difference and it does not need to know the transient time. This method uses excess output to cancel the accumulated phase error. The paper also presents a design method to speed-up the frequency step response of the system by alteration bandwidth in transient state. The key parameter considered in this technique is the loop filter resistance which improves raise time responding to step response in PLL. The simulation results show that the proposed PLL achieves the setting time of 130 ns with phase margin of 78 ° for output frequency of 2 GHz when N = 4.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Integer-N, Charge Pump Phase Locked Loops, Stability, Automatic Switch.



go to top   Designing a Probabilistic Data Stream Management System
         by  Mostafa S. Haghjoo, Mohammad G. Dezfuli, Abbas Azizjalali

           Vol. 5. n. 6, pp. 680-688


Abstract – The inherent imprecision of data in many applications motivates us not to ignore uncertainty of values and to support it as first-class concept. Data stream and probabilistic data have been recently considered noticeably in isolation. Nevertheless, there are many applications including sensor data management and object monitoring systems which need both of issues in tandem. Therefore, we intend to show how we can extend a traditional Data Stream Management System (DSMS) into a Probabilistic Data Stream Management System (PDSMS) which can understand and deal with uncertainty from input data admission to final query result generation. In this paper, after considering requirements of PDSMSs, we focus on essential aspects of Probabilistic Data Models. We also describe some major challenges such as overload handling toward designing a practical PDSMS. Finally, we consider designing a PDSMS consisting of a new data model and architecture.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: PDSMS; DSMS; PDB; Uncertain Data; Uncertain Stream.



go to top   The Measurement System of Sizes and Number of Particle on Surface of Hard Disk Drive Component Using Light Scattering
         by  Narongpun Rungcharoen, Mongkol Wannaprapa, Wanchai Pijitrojana

           Vol. 5. n. 6, pp. 689-695


Abstract – This work aims to design and create a measurement system for determining sizes and counting the number of the particle on surface of the hard disk drive with Al2O3 type [1] component. The system design consists of: firstly, studying and applying the principle of light scattering on particle: using Rayleigh and Mie scattering theory [2] and principle of light scattering on surface: using Bidirectional Reflection Distribution Function (BRDF) [3]. Secondly, simulating the model of system using Modeled Integrated Scattering Tool (MIST) program [4] and considering the scattering light intensity value of simulated model based on principle of BRDF[3]. Followed by comparing the results of David W. Hahn research work [5] and Yuzo MORI research work [6,7] to verify if the simulation model can be used in design and creation of the measurement system. Thirdly, experiment and testing are to find the efficiency of the system and considering of the relationship on sizes of the particle and the intensities for light scattering. Therefore, the actual experiment is carried out to measure the particles ranged from 250-750m of polyethylene (PE) type with spherical shapes using the 15 angles at 15 points measurement method [8] to confirm the pattern of scattering intensity between Mie scattering theory and BRDF simulated model. Moreover, the actual experiment with one angle at one point measurement method is also applied to determine sizes and counting the number of the particles. Finally, the system in this work is designed and is created in order to be able to measure other sizes and types of particle accurately and efficiently. In addition, this system can be also the prototype of the system implemented in the industrial of hard disk drive.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Rayleigh Scattering Theory, Mie Scattering Theory, BRDF Simulated Model, Polyethylene (PE), Al2O3 Type, Particle Sizes, MIST Program.



go to top   Capacity Requirement Planning Using Petri Dynamics
         by  Abhay Kumar Srivastava, Manuj Darbari, Hasan Ahmed,Rishi Asthana

           Vol. 5. n. 6, pp. 696-700


Abstract – In this paper we have proposed a new approach in defining the Claim handling process and calculating the Human Resource Capacity Requirement. We have proposed a process model for claim handling process using Workflow Management which uses Petri nets as a tool for modeling the entire workflow. It enables processes to be represented graphically providing a strong mathematical support. The proposed model helps in calculating the capacity requirement in terms of human resource of any branch of an insurance company.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Petri Nets, Workflow, Claim Handling Process (CHP), Capacity Requirement.



go to top   A Multi-Agent Systems Based on a Real-Time Distributed “2CRM" Robot Platform for the Measurement of Telecommunications Lines and Terminals
         by  M. ElBakkali, H. Medromi

           Vol. 5. n. 6, pp. 701-705


Abstract – The Remote control is to control and manipulate remote systems in general and in particular mobile robots. This method of control can perform complex tasks that are impossible for humans. Indeed, remote control also allows making interventions in hostile environments, as long as basic manipulation known and controlled by man. The application fields of remote control are varied and affect most areas (training, maintenance, industrial production, telecommunications, etc.). In several areas, engineers and technicians still have difficulties reaching places with complex access where there are passive or active terminals. The visit to the terminals must be permanent (real time) in order to extract important data measures (physical) and ensure performance and reliability especially when problems remain invisible from afar. This always converges to a loss of money, time and even quality. Thus, we propose architecture and an experiment both based on a new detection model consisting of MAS based agents which may perform different tasks collected in 2CRM (recognition, connection, control and measurement).

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: ADM, Telecommunication, Lines, Terminals, Robot, Physical Parameters, Real Time, 2CRM.



go to top   IP Multimedia Subsystem (IMS) Architecture And Management Function for MPLS-based QoS
         by  A. Saika, R. El Kouch, M. M. Himmi, B. Raouyane, M. Bellafkih

           Vol. 5. n. 6, pp. 706-711


Abstract – The appearance of new use underlines the need for a greater quality of service (QoS) not only for conveying accurately or increasing a certain traffic, but also conveying it as soon as possible while holding management account of the resources networks (bandwidth, availability and reliability), which implies a network management even more complex. These are the needs which gave birth to MPLS (Multi Protocol Switching Label) technology. The Mechanisms of engineering of traffic, QoS and security become necessary to support “triple play” (Internet, voice/videoconference, television IPTV, video on demand VoD), in terms of volume, nature of the transported traffics. Various methods of traffic engineering for IP networks have been specified for many years ago. MPLS technology is one among these methods. This technology is particularly well adapted to traffic engineering since it allows the creation of ways that are explicit and independent from IP itinerary. In this article we tried to reduce principal operations from MPLS protocol in IP Multimedia Subsystem (IMS) architecture. We propose to associate the QoS management mechanisms in the Next Generation Networks (NGN) architecture especially with transport IMS layer. We will strongly highlight the importance of the MPLS used for the transport of the IP datagram and the traffic. We underline the advantages of MPLS utility in the IMS platforms to provide E2E guarantees QoS. We conclude our article by a simulation from an MPLS network.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: IP, MPLS, IMS, QoS, NGN, VPN, Simulator, NS.



go to top   The Status of Information and Communication Technology in the Higher Education in Yemen
         by  Muneer Alsurori, Juhana Salim

            Vol. 5. n. 6, pp. 712-723


Abstract – The Ministry of Higher Education and Scientific Research (MoHESR) in Yemen is increasingly giving attention to the role of information and communication technologies (ICT) in the Yemeni education sector and intends to enhance Yemeni competitiveness in the region. ICT are increasingly becoming very important for supporting decision-making processes. In fact, the Ministry of Higher Education in Yemen recognizes such roles and therefore, initiated a process for development of ICT Policy for Higher Education in Yemen. The overall goal of this paper is to review the recent progress made at the policy and the operational levels regarding the utilization of ICT in supporting decision making in the Ministry of Higher Education in Yemen. This paper attempts to analyze whether policy and operational changes in the Higher Education sector in Yemen are adequately inspiring for positive impact to meet the challenges of ICT integration for decision-making. Furthermore, it seeks to figure out the possible policy implications that put forward adequate emphasis on the integration of ICT for supporting decision- making processes to ensure a maximum use of ICT potentials in the Higher Education Systems in Yemen.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: ICT, National Policy, Education, Decision-Making, Yemen.



go to top   Analysis of Current Requirements Engineering Techniques in End-User Computing
         by  Esmaeil Kheirkhah, Aziz Deraman

           Vol. 5. n. 6, pp. 724-730


Abstract – Selecting appropriate techniques is often a challenging task for Requirements Engineering. In this regard, several methods have been proposed for RE techniques' selection from different viewpoints. The most important step for any RE techniques' selection method is the evaluation and analysis of the RE techniques. Prior to evaluation of RE techniques, identification of RE techniques’ attributes is necessary. End-User Computing, on the other hand, as an area of software development domain is faced to the same problem. Moreover, due to special characteristics of the End-User Computing context, Requirements Engineering and RE techniques selection are more complicated issues. This paper aims to investigate the situation of RE techniques in End-User Computing through assessment of a representative set of RE techniques. In addition, the results of this study help the RE researchers in selecting an appropriate set of RE techniques as well as development of new techniques or adaptation of existing RE techniques in End-User Computing area. In this study first the most important attributes of RE techniques are identified and then evaluation of RE techniques based on these attributes is accomplished through a survey.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Requirements Engineering, Software Engineering, End-User Computing, End-User Development.



go to top   Social Software Tools in Vocational E-Learning: an Empirical Exploratory Study
         by  Andrej Jerman-Blažič, Borka Jerman-Blažič, Franc Novak

            Vol. 5. n. 6, pp. 731-739


Abstract – This paper provides a short introduction to the social software tools used in modern learning processes. The usage of these tools is then evaluated in the context of vocational educational systems. A short presentation of the results of a study carried out among vocational school educators regarding the usage of these tools in an e-learning environment is provided. The findings and the discussion that followed from the study have been formulated as recommendations that will enable the promotion and the wider use of their capabilities and their ease of use. Part of this work was carried out within the FP6 project iCAMP and the Leonardo da Vinci project e4VET.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: E-Learning, Web 2.0 Tools, Exploratory Study.



go to top   Screen-Based Prototyping Toolset: A Tool for Requirements Engineering in End-User Computing
         by  E. Kheirkhah, A. Deraman

           Vol. 5. n. 6, pp. 740-745


Abstract – Software Engineering has been recognized as one of the most challenging issues in computer science during the last three decades. Furthermore, requirements engineering as a significant process in a software development process plays a crucial role. Research shows that the cause of most of the projects' failure is the requirements engineering process. End-User Computing, on the other hand, which involves end-users directly and actively in the software development life cycle, suffers from the same problems. In addition, this area of software engineering is faced with some risks and problems arising from special characteristics of End-User Computing. In this regard, several method, techniques, and tools are developed to solve the problems. The prototyping method among other requirements engineering methods is more effective due to its tasks’ coverage and its ability to involve end-users in the software development process. Therefore, the Screen-Based prototyping method can be considered as a useful solution. A toolset to support various features of the Screen-Based Prototyping is developed and discussed in this paper. The evaluation of the toolset was accomplished using some case studies. Both qualitative and quantitative analyses of the results showed that the toolset positively affects the process of software development and stakeholders of the project are satisfied with the features provided by the toolset.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Prototyping, Requirements Engineering, Software Engineering, End-User Computing, CASE Tool.



go to top   Formal System for Searching for the Shortest Proof Games Using Coq
         by  M. Maliković, M. Čubrilo

           Vol. 5. n. 6, pp. 746-756


Abstract – In this paper we propose a formal system for solving shortest proof games as one important genre of retrograde chess analysis. Shortest proof games serve to establish the legality of a position in chess problems by searching for the shortest sequence of moves that lead from initial to given chess position. For the establishment of such a system we use Coq – a computer tool for verifying theorem proofs in higher-order logic. Our approach is based on the shortest trajectories (shortest planning paths which certain pieces might follow from initial square to achieve the target square), admissible trajectories (trajectories longer than the shortest trajectory), bundles of trajectories (sets of trajectories which all have the same starting and end square) and circular trajectories (trajectories whose starting and end square coincide). We show how these forms can be generated using Coq, how they can be used in order to solve an shortest proof game and how can it be concluded which of these forms should be generated in order to solve given problem.

Copyright © 2010 Praise Worthy Prize S.r.l. - All rights reserved


Keywords: Retrograde Chess Analysis, Shortest Proof Games, Trajectories, Coq.



Please send any questions about this web site to info@praiseworthyprize.com
Copyright © 2005-2013 Praise Worthy Prize

web stats