Hazim A. Farhan, Hussein H. Owaied, Suhaib I. Al-Ghazi
Abstract: this paper presents an enhancement of the medial axis algorithm to be used for finding the optimal shortest path for developed cognitive map. The cognitive map has been developed, based on the architectural blueprint maps. The idea for using the medial-axis is to find main path central pixels; each center pixel represents the center distance between two side boarder pixels. The need for these pixels in the algorithm comes from the need of building a network of nodes for the path, where each node represents a turning in the real world (left, right, critical left, critical right…). The algorithm also ignores from finding the center pixels paths that are too small for intelligent robot navigation. The Idea of this algorithm is to find the possible shortest path between start and end points. The goal of this research is to extract a simple, robust representation of the shape of the cognitive map together with the optimal shortest path between start and end points. The intelligent robot will use this algorithm in order to decrease the time that is needed for sweeping the targeted building.
Keywords : Artificial Intelligence; Cognitive Map; Image Processing; Robot, Medial Axis; Shortest Path.
Maher Abdel-qader, Ahmad AL-Jaber, Alaa AL-Hamami
Abstract: Validation is one of the software engineering disciplines that help build quality into software. The major objective of software validation process is to determine that the software performs its intended functions correctly and provide information about its quality and reliability. This paper identifies general measures for the specific goals and its specific practices of Validation Process Area (PA) in Capability Maturity Model Integration (CMMI). CMMI is developed by Software Engineering Institute (SEI). CMMI is a framework for improvement and assessment of a software development process. CMMI needs a measurement program that is practical. The method we used to define the measures is to apply the Goal Question Metrics (GQM) paradigm to the specific goals and its specific practices of Validation Process Area in CMMI.
Keywords : Validation; Measures; CMMI; GQM.
Maher Abdel-qader, Ahmad AL-Jaber,Alaa AL-Hamami
Abstract: Now a day’s many organizations are required to communicate online on a daily basis, 24-hour, seven-days-a-week, to gain the desired competitive advantages and profits; although there are a variety of disruptions that may occur within business application such as broken (off- line) database-links and unhanded database exceptions. Such cases will end the automated business work, and force business users to continue business procedures and functionalities via paper work, which causes additional resources with less business competitive advantages. In this paper, we will propose a new model in which we embed short message services (SMS) within business applications using the SMS Gateway such as “Ozeki Message Server”, and programmed application packages. By using our proposed model, we can maintain business continuity when a partial disruption occurs and then switch to our application model. As a result to the experimental work, we conclude that our model supports business continuity since it supports the account balance modification while the database link is disrupted. In addition, we carried out each step twice and the scenario was reliable since all of its steps were reliable.
Keywords : Business Continuity; Short Message Service; Ozeki Message Server; Tasks Automation; SMS Technology.
Kodge B. G., Hiremath P. S.
Abstract: This paper addresses the need for geospatial consumers (either humans or machines) to visualize multicolored elevation contour poly lines with respect their different contour intervals and control the visual portrayal of the data with which they work. The current OpenGIS Web Map Service (WMS) specification supports the ability for an information provider to specify very basic styling options by advertising a preset collection of visual portrayals for each available data set. However, while a WMS currently can provide the user with a choice of style options, the WMS can only tell the user the name of each style. It cannot tell the user what portrayal will look like on the map. More importantly, the user has no way of defining their own styling rules. The ability for a human or machine client to define these rules requires a styling language that the client and server can both understand. Defining this language, called the StyledLayerDescriptor (SLD), is the main focus of this paper, and it can be used to portray the output of Web Map Servers, Web Feature Servers and Web Coverage Servers.
Keywords : Styled Layer Descriptors; GIS; Contour Lines; Web Map Services; XML.
Alaa H. AL-Hamami, Soukaena H. Hashem
Abstract: The appearance of wireless communication is dramatically changing our life. Mobile telecommunications emerged as a technological marvel allowing for access to personal and other services, devices, computation and communication, in any place and at any time through effortless plug and play. Setting up wireless mobile networks often requires: Frequency Assignment, Communication Protocol selection, Routing schemes selection, and cells towers distributions. This research aims to optimize the cells towers distribution using spatial mining with Geographic Information System (GIS) as a tool. The proposed optimized towers distribution done by applying the Digital Elevation Model (DEM) on the image of the targeted area should be covered. DEM applied with two levels of hierarchy, first level for getting the cells and second for getting best location in each cell. The research will apply the spatial association rules technique on the second level to select the best square in the cell for placing the antenna. From that the proposal will try to minimize the number of installed towers, makes tower’s location feasible, and provides full area coverage.
Keywords : Tower; Tower locations; Spatial mining; Digital Elevation Model; Database; and spatial association Rules.
H. A. Esmaili, M. R. Khalili Shoja, Hossein gharaee
Abstract: Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious node advertises itself as having freshest or shortest path to specific node to absorb packets to itself. The effect of black hole attack on ad hoc network using AODV as a routing protocol will be examined in this research. Furthermore, we investigate solution for increasing security in these networks. Simulation results using OPNET simulator depict that packet delivery ratio in the presence of malicious nodes, reduces notably.
Keywords : AODV; black hole attack; packet delivery ratio; OPNET.