Upload
unisell
View
0
Download
0
Embed Size (px)
Citation preview
Executive Committee and Organization
General Chair: Sameer Bataineh
JUST, JORDAN
Program Chair: Eyas El-Qawasmeh
JUST, JORDAN
Reviewing Chair: Basheer Al-Duwairi
UST, JORDAN
Proceeding Chair: Ahmad Dalalah
JUST, JORDAN
Proceeding Message This is the first International Conference on Digital Communications and Computer Applications hosted by the Faculty of Computer and Information Technology at Jordan University of Science and Technology. DCCA 2007 is a forum for scientists and engineers to meet and present their latest research results, ideas, and papers in the diverse areas of Digital Communications, Computer Science, and Information Technology. This scientific conference will cover guest lectures, more than 300 papers for presentations, technical session, and oral poster sessions with debates. This meeting will be a great opportunity to exchange knowledge and experience for all the participants who joined us from all over the world to discuss new ideas in the area of computer science and information technology. We are grateful for the effort of Dr. Eyas El-Qawasmeh, the program chair for making this conference possible, and a special thanks to the technical committee and to all external reviewers. Finally we would like to thank all the participant, sponsoring companies, and Jordan University of Science and Technology. Also we would like to extend a warm welcome you to Jordan, and do hope that all participants have a wonderful time to Jordan in the season of beautiful blossoms. General Chair Prof. Sameer Bataineh Dean of the Faculty of Computer & Information Technology Jordan University of Science & Technology
Preface Dear DCCA2007 proceedings reader:
On behalf of the DCCA2007 conference, the program committee and Jordan University of Science and Technology has the pleasure to welcome the attendees to Jordan University of Science and Technology, Irbid, Jordan to participate in the 1st International Conference on Digital Communications and Computer Applications (DCCA2007).
The DCCA2007 conference explores new advances in information technology. It brought together researcher from various areas of computer science and addresses both theoretical and applied aspects of information technology. The fields of computer science and information technology are growing very fast and there are new technologies that are added every day. Jordan does contribute to these advancements and a proof of this contribution is the large number of presented papers in this international conference.
The DCCA2007 conference offers the opportunity for the researchers from all over the world to get together and discuss the new advances in the area of computer science and information technology. The discussion and exchange ideas will contribute to these fields and will help in more advances in the technology in the coming future.
The call for papers resulted in 45% accepted papers and 18 accepted posters from 47 countries covering all areas of information technology. The papers are of top quality papers. Each paper is evaluated by at least two reviewers. The results of reviewing were paper acceptance, poster acceptance, or paper rejection. In addition, four tutorials and two keynote speakers have been accepted in this conference.
Finally, we hope that the conference satisfy your expectations and hope you enjoy time with us and in Jordan University of Science and Technology. The committees worked hard for not just days but months to reach the quality level that do satisfy our guests, and many thanks and appreciation to all of you who are here today.
Dr. Eyas A. El-Qawasmeh Program chair DCCA2007 Computer Science Department Jordan University of Science and Technology
Table of content
AlGORITHMS
A Canonical Genetic Algorithm for Likelihood Estimator of First Order Moving Average Model Parameter Basa’d Ali Hussain , Rawa’a Dawoud Al-Dabbagh
1
A Water-Saving Technique Based on Distributing of Prime Numbers over Integers Ahmad Sharieh , Adel H. Abusitta , Aladdin H. Baarah
11
A New Approach to Data-Driven Modeling in Civil Engineering Akbar A. Javadi , Mohammad Rezania , Mohaddeseh Mousavi Nezhad
17
VDM Specification of an Algorthm for Graph Decomposition Abdul Huq, Naryanan of an Algoritm for Grapj Decomposition
25
Concept Lattice Reduction by Matrix Decompositions Vaclav Snasel, Petr Gajdos, Hussam M. Dahwa Abdulla, Martin Polovincak
35
Automated Generating Test Cases Using Genetic Algorithms Arabi Keshk, Ahmed M. Omira , Nabil A. Ismail
43
An Algorithm for Generating the Design Matrix for Multivariate Polynomial Least Squares Fitting Sami F. Al-Hamdan
50
COMPUTER ALGORITHMS
Text search algorithm based on stacks Abdurazzag Ali Aburas
55
Weighted maximum likelihood algorithm for time and frequency synchronization of DVB-T systems Charbel El Hajjar , Martin Speitel
60
Three Term Backpropagation Algorithm For Classification Problem Siti Mariyam Shamsuddin , Maslina Darus , Fadhlina Izzah Saman
70
A Genetic Algorithm for Distributed Query Processing over Mirror Servers Azzam Talal Sleit ,Wesam Al-Mbaideen , Nawal Alzabin, Hadeel Dawood , Khaled alqarute
81
ClassifyChi2: An Efficient Discretization Algorithm Ahmad M. Odat , Saleh M. Abu-Soud
88
Two-PASS HORIZON LINE ALGORITHM FOR FAST SHADOW GENERATION OF 3D FUNCTION Tian SHEN, You-xing GAO
99
Using theModulus Adaptive Arrays -Reduced Computational Complexity of the Constrained Multi Householder Transformation Said E. El-Khamy, Fellow IEEE , Darwish M. Abd-Elaziz , Roshdy K. Korayem, IEEE student member
106
Non-uniform Randomized Balanced Allocations Ebrahim Malalla¤
112
COMPUTER DESIGN, ARCHITECTURE , & GRIDS
A Combined hardware-Software Approach for CPU Energy Reduction Using Dynamic Voltage Scaling Technique Diary R. Sulaiman
113
A QoS Matching Approach for Grid Service Selection Yang Liu , HuaCan He
120
A Novel Grid Resource Discovery Model Based on Matchmaking Engine Overlay Yang Liu , HuaCan He
126
objective Mapping for NoC Architectures -MultiAbou El Hassan BENYAMINA , Pierre BOULET
132
Design of an ECC Decoder based on Orthogonal Parity-Checksums Dr. Pervez Akhtar , Engr. M. Altaf Mukati
140
A Method of Reduction of the Microinstructions of Synchronous Digital Systems Shehabat I. M. , Al-Dahleh M. Z.
147
UP-BY TASK SPLITGRID LOCK AVOIDANCE S . Suresh , Ankit Kamal Mehta , C . G . Gayathri
154
Promotion of Local to Global Operation in Train Control System Sher Afzal Khan , Nazir A. Zafar
162
COMPUTER SECURITY
Design and Implementation of 64-bits Advanced Encryption Standard Malik Qasaimeh , Saleem Masaedeh
168
A New Steganographic Technique for Hiding Grayscale Images in Colored-Raw Images Samer Atawneh
175
A New Steganography System Based on a Hybrid Transform Mussawi-Al. Q. Mahmoud , B. A. W. Dr
182
Protection of Cryptographic Implementations using Error Detection Techniques Rodica Tirtea , Mircea Vladutiu
191
Information Security King Saud University Hospitals experience Zahrani-d , Dr Saleh AlImam Mohammad Bin Sau
197
ime NumbersBox Construction Using Arithmetic Modulo Pr-A Real Time S Eltayeb Salih Abuelyman , Mohammed Ahmed El-Affend
207
The Development of Virtual Reality System for Advanced Training Muhammad Shafie Abd Latiff, Imran Ghani , Setyawan Widyarto
217
Network Security Using Chaos and Nonlinear Dynamics Zahid Ali
222
Improved Intrusion Detection/Prevention System Using Fuzzylogic And Data Mining Bharanidharan Shanmugam and Norbik Bashah Idris
228
A Modified Version of the Advanced Encryption Standard Algorithm with Extra Key Size and Block Size Abdurrahman Abdullah Mohammad , Lo’ai Tawalbeh
236
Enhanced Scheme for Group Key Agreement Birahadish, Saravanan. Suresh,P. Poornaselvan , S. J. K
242
Data Base Systems & Applications Data Warehouses & data mining
SIG for the Follow-up and the Management of the Geology Mining Data of the Constantine Region Dr. Mohamed-Khireddine KHOLLADI
254
On Controlling and Prediction of Next Best Sellings through Periodical Mining for {Semi/Non}-interesting Association Rules Asem Omari and Stefan Conrad
271
Data mining based on WaveCluster Yongmin_tang
276
DATA COMMUNICATIONS & NETWORKING
APPLICATION OF NUMERICAL CONTROLLED OSCILLATOR IN DIGITAL RECEIVER USING FPGA Ali Mohammed Hassan
284
Performance Analysis of a Load Distributing Active Anycast RTT-Based Method for Server Selection lail Abd Manan , Jamilin Jais, Mahamod bin Ismail-Habibah binti Hashim , Jamalul
290
quences for FH CDMA systems Hopping seRameshwar Rao. Sudha, FIETE, Dr.L.K
299
thm for mobile networksing algoriAn efficient rout Al Shqeerat, Hassan Mohammed. A. Khalil H
307
New Fast Method for Computing Wavelet Coefficients from 1D up to 3D Walid A. Mahmoud, Hadeel N. Al-Taai, Shereen M. Al-Qasem
313
A novel algorithm for evaluating TCP utilization and modeling TCP reno and tahoe using markovian model in wlan Mohammad mehdi hassani, Reza barangi, ali dorafshan
324
DATA COMMUNICATIONS AND NETWORKING2 zara
Performance Analysis of Multiuser DS-CDMA Linear Receivers under Various Realistic System Specifications Walid. A. Mahmoud, Mansour Abed, Hytham O. Haj Ali, Mahmoud M. Anshas
331
Standard Protocol Using SDR -MA Transmitter for a MultiDigital Design of CD Jamuar, Sabira Khatun. S.Ali, S. Khalid Eltahir Mohamed, Borhanuddin Mohd
340
Speech Synthesis System -To-sed TextConcatenated BaKhalifa. Zakiah Hanim Ahmad, Othman O
347
A Practical Study on Building a Wireless Sensor Network Karaki-Khalil Mustafa Yousef and Jamal Nazzal Al
355
Prosodic knowledge for emotional speech synthesis in Malayalam
Nair,. S, Nimmy Mathew, Achuthsankar S.Gopinath, Sheeba P.Deepa P
362
MT from English to Arabic Handling the Agreement problem in Tengku Mohammed Tenku Sembok, Mohammed Mahmoud Abu Shquier. Prof
370
let Transform The WalidRamahi-Al. Jawher, Nada N-Al. Walid A. Dr. Prof
382
ADAPTIVE TURBO CODED OFDM Sami Ahmed Haider, Khalida Noori
388
DATA COMMUNICATIONS AND NETWORKING nebo
Analytical Model of Grid Location Update Schemes for MANET Khaled Ahmed Abood Omer, D.K. Lobiyal
395
Dominating Set Theory based Semantic Overlay Networks for Efficient and Resilient Content Distribution J. Amutharaj, S. Radhakrishnan
403
New Fast Method for Computing Multiwavelet Coefficients from 1D up to 3D Sallal. Taai, Reema A-Al. Abdulwahab, Hadeel N. Mahmoud, Mutaz S. Walid A
412
A Comparison between Signal Clipping and µ-Law Companding Schemes for the Reduction of Peak-to-Average Power Ratio of OFDM Signals Sulaiman A. Aburakhia, Ehab F. Badran, Darwish A. E. Mohamed
423
Performance modelling of New Congestion Control Mechanism Abdulmonam G. Ali, M.E. Woodward, Mahmud Etbega
432
Middleware Integrated Sensor for Network Energy Utilization: MISNEU protocol Mahmoud Alwan, Ayad Salhieh
438
A LAYERED MIMO OFDM SYSTEM WITH CHANNEL EQUALIZATION Khalida Noori, Sami Ahmed Haider
450
ier, Dovecot, MySQL, Creation of Mail Server Based on Virtual Users and Domains with Postfix, Cour Mailscanner, Spamassassin, Clamav, Postfixadmin and Squirrelmail
Hedaya Alasooly. Dr
455
DATA COMPRESSION
A Modified Compressing Techniques Based On Improved Fast Discrete Fayez Idris, Sameer Bataineh, Ahmed Sawalmeh, Murad Alaqtash
471
A Novel Lossless Data Compression Scheme Based on the Error Correcting Hamming Codes
Bahadili-Hussein Al
478
Bit Level Files Compression Samer Nofal
486
WORD-BASED TEXT COMPRESSION Jan Platoš, Jiří Dvorský
489
E-LEARNING , EDUCATION & ORGANIZATIONS
Recommended Instructional Technology for K-12 Students in Arab Countries Eyas El-Qawasmeh ,Abdallah Tubaishat
496
An Investigation Study Towards Determine Problems, Solutions & Implementation : Learning-E Limitations
i ,Hannan Issa MohsenHawar-Ma'en Al.Dr
501
On Line Course Learning Enhancement Based on Interactive Interface Abdurazzag Ali Aburas and Othman O Khalifa
509
Face and Electronic -to-Face: Productive Qualitative Interviews Choueiri. Rizk ,Elias M. Nouhad J
515
E Learning Vs M Learning in Higher Education D.Balaji, B.Malathi, J.Akbar Ali
532
Modeling and Verification of Community of Practice Using an Actor-based Language Farzad Peyravi, Kaveh Pashaei, Fattaneh Taghiyareh
537
Measurement of E Learning Usability through User Interface Dr.Mudawi Elmusharaf, Abdelrahman Osman Abdelrahman Elfaki, Ahmed Mohammed Elsawi
545
Modern didactic approaches: the case of distant science education in Greece Kalogiannakis Michailsearch\E-LEARNING , EDUCATION & ORGANIZATIONS\p71.doc
550
An Overview on Electronic Institutions Farnaz Derakhshan
557
Knowledge Management and Intellectual Capital at the University Environment Dr. Issa Shehabat, Dr. Saad A._Mahdi, Dr. Kamel Khoualdi
569
E-TECHNOLOGIES & THE WEB
Legal Web Accessibility Natheer Gharaybih
576
E-commerce: Security Enhancement In Internet Banking Dr. Abeer H. Rasheed Al-Sadoon, Miss. Abeer T. Maolood Al-Obaidy
585
inesss Used Books Bus’Platform for a Faculty-E Muhaini Othman, Salimah Mokhtar
591
Mobile-Commerce vs. Internet-Commerce for New Business Opportunities Ahmad Hayajneh, Hamid Mehrvar
601
A Web Audio System Based on Object Deputy Database Fan Liu, Yuan Cheng, Zhiyong Peng
609
e Arab Countries in AfricaAn Analysis of th: Government Service Delivery Capabilities-E & the Middle East Akemi Takeoka Chatfield, Omar Alhujran
615
Quality in Web Interface Input XML Message Generation and Communication Tor Stålhane
625
Improving Web Search Results for Short Queries Using Preserved Query Knowledge Roberto Solis-Oba and Anwar Alhenshiri
634
E-TECHNOLOGIES & THE WEB2
LUP: Least and Unique Price Auction-A New Type of Online Auctions Dr. Mohammed A. Otair
650
ContentRank: a New Content-based Page Ranking Hui Li, Shu Zhang, Xia Wang, Nian Shao
607
An Used O-O-M to Support Web Site Design Hadeel S. Kareem, Abeer Salim Jamil
614
E-Commerce Contract Modeling and the Contract Law Radomir A. Mihajlovic, Michael J. Gregorek, Ayat Jafari, Darko V. Mihajlovic
621
Evolutionary Improving World Wide Web Queries Václav Snášel, Pavel Krömer, Suhail S. J. Owais, H. O. Nyongesa, S. Maleki-dizaji
630
Web Patterns and Web Page Semantics Milos Kudelka, Vaclav Snasel, Ondrej Lehecka, Eyas El-Qawasmeh
641
Guidelines for Constructing Web Engineering Process Models for Developing Based Applications-Scale Web- Large
Omaima Nazar Ahmad AL-Allaf, Asim El-Sheikh
651
pport ASP Using Two MethodsConfiguration of Apache Server to Su Hedaya Alasooly. Dr
667
IMAGE PROCESSING
elet Image Segmentation Applied on Medical Images using Wav Faraheed-ltanny, Mohammad AlAlsu. Yas A
688
Facial Features Extraction Image Segmentation Using HIS Color Applied on Hameed. Stephan, Sundos A. Jane J. Dr
695
entification and Labelingbrid Transformation Based Automatic Image IdHy Ramahi-Al. Ani, Nada N-Al.Laith A. Jawher, Dr-Al. Walid A. Dr. Prof
704
n and Neural NetworknsformatioImage Identification and Labeling using Hybrid Tra Ramahi-Al. Mikhled Alfaouri, Nada N. Jawherand, Dr-Al. Walid A. Dr. Prof
718
Kobasi,-Mahmoud, Sarwa Al. Walid A. Dr Using Walidlet TransformA Proposed Method of Image ReconstructionSakhrie. Mohammad H. Eng
738
ation of Cervical Smear ImageCytoplast and Nucleus Segment 1Chieh Chen-, and Chun1Hong Lin-, Chi2Kuan Chan-, Yung1Horng Lin-Chuen
742
Descriptor Color Clustering and Spatial Relationthe Fast Image Retrieval Based on Chuen-Horng Lin1, Yung-Kuan Chan2, and Kai-Hung Chen1
748
iDTV Player Compatible MPEG4 and MHP Content Momouh Khadraoui (1), Oliver Tjulin (1), Beat Hirsbrunne (1) and Djamel Khadraoui (2) (1): PAI Group
754
IMAGE PROCESSING 2
GE GENERATION AND COLORIZATIONLUMINANCE PYRAMID FOR IMA Bara'a Ali Attea, Mariam A. Ali
763
A Steganographic Approach Based on Spatial Frequency Layering Sarab Majeed Hameed. Dr
771
A NON Reference Fingerprint Image Validity via Statistical Weight Calculation M.S. ALTARAWNEH, L.C.KHOR, W.L.WOO and S.S DLAY
776
using Moments on shapeIMAGE RETRIEVAL Wesam Atef Hatamleh, Rosalina Abdul Salam
780
Color Difference VQ Compression and Data Hiding Ting Chan-Hsiu** Mao-Fan Yang-, and Shys**Yuan Tsai-Tsang, *Husiun Tsai-, Meng*Kuan Chan-Yung
787
Self Embedding Robust Watermarking in Discrete Wavelet Transform Domain for Digital Colored Images Abdallah Al-Tahan Al-Nu'aimi, Rami Qahwaji
800
Direction Relations in Spatial Queries Using MBC Maytham Safar
807
INFORMATION SYSTEMS
A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam ,Md. Nizam Uddin, Mumit Khan
SIG for the Survey of the Evolution of the Distribution of the Population of the Adrar Region Dr. Mohamed-Khireddine KHOLLADI
817
Arabic vowels recognition systemType written Majdi Salameh. Nazlia Omar, Mr. Khairuddin Omar, Dr. Dr
826
A study of Arabic SMS-based classified ads SUBlanguageS DAOUD DAOUD , CHRISTIAN BOITET
835
A User Centered Matchmaking and Ranking System . Ahmad Rawashdeh, Rehab Duwairi
845
Text To Speech for Bangla Language using Festiva Firoj Alam ,Promila Kanti Nath , Dr. Mumit Khan
853
Improving Cluster-Based Malay Text Retrieval System Using Thesaurus
Nurazzah Abd Rahman, Zainab Abu Bakar, Normaly Kamal Ismail , Tengku Mohd Tengku Sembok
860
A Knowledge-Base on Holy Qur’an for Tagging Arabic Verbs Mahmoud Shokrollahi-Far , Ayaz Isazadeh , Isa Barzegar, Rezgar Soltani
869
ota and Schedule Backup Configuration of a Simple Samba File Server, Qu Dr. Hedaya Alasooly
876
A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam , Md. Nizam Uddin , Mumit Khan
887
INFORMATION SYSTEMS2
Involving cognitive science views on collections to better design our Content management tools Francis Rousseaux , Alain Bonardi
888
Segmentation free Bangla OCR using HMM: Training and Recognition Md. Abul Hasnat , S. M. Murtoza Habib , Mumit Khan
894
Deploying and Aligning Organizational Strategy Using Intranet Based Knowledge Management System Norlida Buniyamin, Zainuddin Mohamad
902
An Agent Mediated Community of Practice Using MAS-CommonKADS Methodology
Farzad Peyravi , Fattaneh Taghiyareh
912
Developing business functions in today’s digital environment Dr Mohamad AlSakka
921
Optimization in in IR System Using GP and Fuzzy Grow Up Precision Recall Relationship Curve QueryOptimizing the User
Suhail Sami Owais , Pavel Kromer , Vaclav Snasel
939
Performance Analysis of Information Retrieval Systems Based on Genetic Algorithms Ibrahim Zedan , Mohamed Nour , Sanaa Abo-Elhamayed
949
A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam , Md. Nizam Uddin , Mumit Khan
962
INFORMATION SYSTEMS & APPLICATIONS – NEBO
Selecting an Architectural Style Satisfying A banking Organization Requirements Using Simulation Yousef Hasan Jbara , Hussam Al-shorman
963
Autonomic Computing : A Survey M. Al-Zawi , D. Al-Jumeily , A. Hussain , A. Symons , A. Taleb-Bendiab
973
TOWARDS AUTOMATIC TRANSFORMATION FROM COSA SOFTWARE ARCHITECTURE TO CORBA PLATFORM Adel Alti , Tahar Khammaci and Adel Smeda
980
Bus Information, Scheduling, and Control for Amman (Project BiSCA) Ehab Al-Hakawati , Fayez Al-Rafia , Khalid Al-Tahat , Nasim Al-Tamimi
990
Malay Spelling Exchange Rule: A Computational Technique in Information Retrieval for Identification Similar Words in Historical Malay Text Zainab Abu Bakar , Tengku Mohd. Tengku Sembok , Mohammed Yusoff
1003
Arabic Stemming Based on affixes Removal Mohammad Khaleel Qasem , Sari Awwad
1015
Comparison of Information Retrieval Models for Arabic Text Muath Alzghool and Diana Inkpen , Ghassan Kanaan
1023
A New Paradigm of Pervasive Information Systems Dana Amin Al-Kukhun, Florence Sedes
1033
NEURAL NETWORKS AND ARTIFICIAL INTELLIGENCE
Automatic Estimation of Maximum Frequency and Velocity of Liquid Simulating Blood M.D Kedir-Talha , Mohamed Mehenni
1043
uzzy linear regression analysis of job satisfaction of Taiwan college graduates A f Lu Chyu-Chiang Kao and Chin
1051
Damped Vibration Analysis of Extrinsic Fabry-Perot Interferometric Sensors using Artificial Neural Networks Rohit Dua , Ayat Jafari
1058
Review on the Development and Utilization of Artificial Neural Networks Applied to ECG Signals Diagnosis Salama Meghriche , Mohammed Boulemden
1066
An Improved Odor Recognition System Using Learning Vector Quantization with a New Discriminant Analysis Turgay Temel, Bekir Karlik
1075
PARALLEL COMPUTING & DISTRIBUTED COMPUTING
Data base Distribution in Telemedicine Alsultanny , Zeyad Nasro. Yas A
1081
OptorSim SimulatorA Management Protocol of Replications in the
Ghalem Belalem
1090
Architecture of Multi-Agent System for Distributed Systems Prof. Dr. Hilal M. Yousif , Ass. Prof. Dr. Jane J. Stephan , Dr. Ghossoon M.W. Al_Sadoon
1098
Intelligent Agent System for Accessing Remote Energy Meters Padmin.and T. Sankaranarayanan.E.Suriyakala ,P.D.Ci
1104
Multi Installment Scheduling and Allocation of Divisible Jobs on Single Level Tree Networks with Buffering Limitation Sameer M. Bataineh , Abdullah M. Audat
1111
Grid Environment for Password Recovery Jadallah , Amjad Abu Jbara. Dina S
1119
Parallel Implementation of the Finite Difference Time Domain Method Using the Message Passing Interface Omar Ramadan , Oyku Akaydin
1127
Bayesian Student Modeling in a Distributed Environment Yaser Nouh, Indumathy.R, Karthikeyani.P, Varunkumar Nagarajan, and R. Nadarajan
1132
A Model for the Estimation of Buffer Requirement in Distributed Networks Saleh A. Khawatreh , Khalid Khanfar
1141
SOFTWARE ENGINEERING
sionalism and ResponsibilitiesCode of Ethics, Profes
Khader Muspah Titi
1146
Case Study of: Evaluating the Role of Concerned Parties in Media Awareness against Software PiracyJordan
Sheikh , Abdullah Rashed , Rawan Nassri Abulail , Moh`d Abdallah Ali Shkoukani , Bashar Alqudah-Asim El
1156
Assessment of System Development Models with Regard to Software Reuse Practice
Adnan Rawashdeh
1164
Identifying Representatives for Interfering Automata Viliam Holub
1178
s Failure ’box Component-kDetermining the Blac
Ibrahim Hilal , Aman Jantan 1186
) UML(Perceptions of the Unified Modeling Language ’ Users Jafar Ali , Bassam Hasan
1190
How quality assured by Extreme How quality assured Exterme Programming (XP )? Sana'a j. Khalaf
1198
Managing Inconsistency in Software Requirements A Systematic Approach for
Randa Ali Numan Khaldi , Dr. Saleh Abu-Soud
1204
Requirement Modeling -Using Ontology to Support Software Development ProcessNisreen Innab , Ahmad Kayed
1216
WIRELESS COMPUTING
Designing and Modeling MEMS Filter for Front-End Wireless Transceivers
Mustafa S. Al_Khusheiny , Burhanuddin Y. Majlis
1223
WEB PERSONALIZATION FOR MOBILE DEVICES Akbar Ali , Ruwi. Malathi , J.Balaji , B.D
1231
Basic notions, energy consumption and MAC protocol layer: Wireless Sensor Networks Ahmed LOUAZANI , Bouabdellah KECHAR , Mohamed Faycal KHELFI
1236
WLAN Based on Location FingerprintingDecision Tree Approach to Estimate User Location in
Osama Mohamed Badawy , Moustafa Ahmed Bani Hasan
1247
An Analytical Model for Short-Lived TCP Flows in Heterogeneous Wireless Networks Sameer Bataineh , Jamal Al-Karaki , Haya Sammaneh
1256
Time Scheduling in Hybrid Wireless Links -Using Link Diversity for RealLiliana Grigoriu
1275
Position Location in Wireless Networks Zahid Ali
1284
Weighted Angular Distance Based Cache Replacement Strategy for Location-Dependent Data in Wireless Environment Mary Magdalene Jane. F, Parameswaran.R, Raghavendra Prasad.R, R.Nadarajan
1290
WIRELESS NETWORKS
Dependable and Secure Data Storage and Retrieval in Ad-Hoc Networks Ali Barati , Ali Movaghar
1299
Development and Performance Analysis of a Probabilistic Flooding in Noisy Mobile Ad Hoc Networks Bahadili , Yousef Jaradat-Hussein Al
1306
World Implementation -rotocol under theRealVector P-Distance-Demand-on-Hoc-Performance of the Ad Yusnani Mohd Yussoff , Habibah Hashim , Mohd Dani Baba
1317
ique for Mobile Adhoc NetworksAn Effective Terminode Routing Techn Balamurugan , Jameer Basha
1327
AND CORRECTION TECHNIQUES USEDAN INVESTIGATION OF ERROR DETECTION IN WIRELESS TRANSMISSION
VIJESH. JAGADEESH KUMAR , K. K.J.S
1336
An Addressing Scheme for Routing and Power Saving in MANET Arwa Zabian
1343
Network ) PRMA(Network and Wireless ) Token Ring(Throughput and Delay Analysis of Integrated Wired Amaal Al_Amawi
1352
٢١٧
The Development of Virtual Reality System for Advanced Training
Muhammad Shafie Abd Latiff, Imran Ghani
Universiti Teknologi Malaysia, Malaysia Email [email protected], [email protected]
Setyawan Widyarto
Politeknik Negeri Lampung, Bandar Lampung, Indonesia Email [email protected]
ABSTRACT A reliable Virtual Environment (VE) emerging from Virtual Reality (VR) Technology can serve as a significant tool for advanced training in a large scale and complex environment. Using VR technology a number of applications have been developed in different areas of life including navigation applications for training purposes. However existing navigation techniques do not scale well to large-scale virtual worlds to handle the complex geometry and many simultaneous participants. Our research presents the design and implementation of a multi-users VR for advanced training, which will provide effective solutions towards advanced training in a large-scale and complex environment specifically for Hajj, as this is the most promising and challenging use of VR platform. Key Words: Virtual Reality, Training, Crowd modelling, Optimal Path Planning, Collision Detection .1. Introduction Virtual reality (VR) entails the use of advanced technologies, including computers and various multimedia peripherals. It permits users to experience and interact with a life-like model or environment, in safety and at convenient times. VR provides a degree of control over the simulation, which is usually not possible in the real-life situation [1]. However, the inclusion of real time situation is not expelled. The case studies described in [2] presents the inclusion of
real time animated virtual humans that are re-enacting situations and activities that were typically performed in sites during ancient times. The need to use modern tools has been realized in every field of life and computer-based simulations are playing significant role to facilitate the human being. Many of the high performance applications have successfully been developed in different areas of human life. However there are still some important areas where very little research has been
carried out i.e. training of a huge crowd in VR. To fulfil this prominent task, we present the design and implementation of a multi-users VR for advanced training specifically for Hajj (i.e. the compulsory ritual activity for Muslim done in Mecca, Saudi Arabia). Some works that are related to the scopes of the project are highlighted as follow. A topological structuring of the geometric environment to allow fast path finding and an efficient reactive navigation algorithm for virtual humans evolving inside a crowd
is used by [3]. A solution based on extensions to the A* algorithm by combining travel-time functions and a lower-bound estimator for travel time to expand a path have been used in [4]. A framework for Festinger’s Social Comparison Theory (SCT) and its implementations’ in several crowd behaviour scenarios are evaluated by [5]. A performance analysis of a hybrid collision detection algorithm for highly interactive and crowded environments in terms of output quality and running time,
٢١٨
by applying usability criteria is presented in [6]. We present a unique technique of navigation with place representations, path finding with fastest efficiency, collision detection with quick response and sense of presence among objects with real-time interactivity that scales to visible-range worlds. We introduce a new approach that will address Crowd modelling, Optimal Path Finding, Collision detection and Co-presence in a multi-users large-scale environment for a huge crowd. Our aim is to manage guided as well as un-guided crowed by providing the path planning decisions in a multi-users large-scale environment. Results from our works indicate that virtual reality training system, being constructed and implemented properly, will provide an effective alternative to current traditional training methods for Hajj. 2. Design Considerations for the VR System This section discusses the key features, which have been considered while designing the system. Here are some characteristics, which may be enjoyed when the system is implemented. 2.1 Performance To run with a better performance in such a large scale and complex applications, it must have at least four aspects to consider: •Rendering Performance of the visible range- world must be provided by high degree of accuracy of maps, building structures, shading, roads, landmarks and crowd. This project is using VRML [7] and Dive [8] files format to give the scenes an acceptable natural representation. •Optimal Path Planning Performance for a big crowd will be achieved by efficient optimal path finding algorithm that would make the process of exploring minimum distance to reach the target destinations by taking quick decisions.
New SNA* algorithm is used to produce multiple paths to the same destination. •Interaction Performance between objects and avatars is much bigger challenge, as this needs objects/avatars awareness of presence with effective collision detection, objects interaction and their response display for multi-users. •Communication Performance is also an important factor, which will be achieved by sending limited network traffic (textual, motion, state, geometry, sound) between multi-users by event based distribution techniques. 2.2 Realism Besides a degree of visual realism that is necessary, the users of the system should have access towards sensory fidelity concerning visual, aural and may be tactile information presented to the users that replicates the real world to a maximum extent possible. One familiar example for missing realism in some training applications is the lack of collision handling. The system is aimed to provide reliable collision detection with tactile feedback to the users so that if a user collides with the other user/object, he/she may find another suitable path by using efficient path finding algorithm at the backend. In this way all the participants in the crowd will be able to be trained smoothly without wasting time. As the system mostly focus on Hajj, to access the aural realism and support to saying the “TALBIAH”, voice communication functionality will be provided in the system. 2.3 Persistency User manipulations within the world can have effects on the world after the user has left the world and disconnected from the system. This issue also involves the persistent roles and access right for users. 2.4 Scalability The number of possible interactions between many simultaneous users (ideally)
٢١٩
in a multi-user environment is one of the main goals of VR for training purposes. 2.5 User Interface User interface (UI) is the part of every computer system that determines how people control and operate the system. When the interface is well designed, the overall training system is consider comprehensible, predictable, and controllable. This will make users feel competent, satisfied, and responsible for their actions. In our approach, we divide most user interaction tasks into three categories: navigation, selection/ manipulation, and system control. This will hopefully reduce the primary barrier to effective 3D visualization and will provide support to develop a well-designed user interface. 3. Architecture Construction of the system The design choices made for the training infrastructure are highly influential in the overall architecture of the system. The implementation design of the system is a sequence-based architecture, which enhances its functionality even in large-scale, complex and advanced training application like Hajj. Figure1: Shows a less complex and easy to maintain system structure to provide advanced training to a huge crowd of Hajj in a very large-scale and complex virtual environment. Our designed approach was guided by the following requirements: • Openness: The system should not be
designed for any specific application area. It should be applied in any related VR system
• Complex behaviours: Object behaviour should not be limited to simple movements. The motion should cover most of human like navigation.
• Dynamics: User can enter and leave the virtual environment at any moment.
• Extensibility: System should allow new object behaviours and new functionality with easy extensibility.
Figure 1: System Architecture for Advance Training System 3.1 Mathematical Crowd Model, Data Acquisition and NPS Construction The NPC (non player characters) is a crowd of characters that are rather than controlled by the user but are set of outputs from mathematical model. The NPCs may be also retrieved from video camera, or video movies after being undergone several processes of data acquisition and transformation into mathematical terms. These uncontrolled NPCs move around the world and they are simulated. They contribute to a complex traffic control of virtual environment. They will be combined with main characters that the motion is generated by path planner algorithms. 3.2 Optimal Path Planning To complete the Hajj training, one person has to complete several of Hajj tasks. However, Hajj training may involves participating thousand of people or crowd. As we know crowd often leads to disastrous situations such as crush and stampede. On the other hand, in such situation the person may confront with some navigation problems like disorientation, loss of overview and difficulty to return to a location task before. Therefore, optimal path planning and searching algorithm are used to solve
٢٢٠
the shortest path problem as well as avoiding crowd concentration in order to produce the optimal task solution (Figure 3) 3.3 Recognition Process During the Hajj training, it is vital for Trainees/Avatars to be aware of the presence of their surroundings i.e. recognition of Kaaba, Hajr-e-Aswad, starting and ending point of Safa and Marwa etc. This will also need the sense of co-presence of the fellows participating in a particular task during Hajj. Through recognition process a user/avatar will be kept aware of the presence of these scenarios. 3.4 Collision Detection Mechanism between Objects/Avatars Immediate responses are needed to manage a large number of objects where interaction behaviours are so quick, so that run-time required event might be triggered to avoid the complexities and problems in the smooth flow of the crowd. To achieve this objective efficient collision detection techniques are implemented to increase the performance and navigation during training process. 4- Current Practical Developments Our efforts to develop a reliable Virtual Reality for Advanced Training purposes to incorporate the real world training requirements are moving in encouraging way. We are practically developing: • Model Environment (Figure 2) • Designing Map of Kaaba (Figure 2),
Surrounding Buildings, Places of Worship.
• Optimal Path finding and Searching Algorithm (Figure 3)
• Adapting Co-Presence and Collision Detection mechanism (Figure 4)
Figure 2: Virtual Building of Kaaba
Figure 3: Path Planning Approach
Figure 4: User and crowd interaction and collision
٢٢١
5. Conclusion The main purpose of this system is to serve as a significant tool for advanced training in large-scale complex environments like Hajj. However the system design (after some modifications according to the requirements) may also serve for other real-time real-world applications, because it uses efficient crowd modelling techniques, efficient optimal path finding algorithms and collision detection mechanisms. These are the key design criteria to develop an effective real-time application for advanced training in real world. Some of the areas where the system may play important role are Crowd Modelling in Public Places, Rush of Student in Schools & Colleges, Path planning for Fire Fighting and Crowd going into/coming from Sports Stadiums and Presence Awareness in Visiting Virtual Museums. References:
]١[ Branislav Ulicny, Daniel Thalmann, “Crowd simulation for interactive virtual environments and VR training systems” Computer Graphics Lab. Swiss Federal Institute of Technology, Lausanne, 2001.Switzerland, [2] Nadia Magnenat-Thalmann, Alessandro Enrico Foni, Nedjma Cadi-
Yazli: Real-time animation of ancient Roman sites. GRAPHITE 2006: 19-30 [3] Fabrice Lamarche, Stéphane Donikian, “Crowd of Virtual Humans: a New Approach for Real Time Navigation in Complex and Structured Environments”, Comput. Graph. Forum 23(3): (2004) 509-518 [4] Evangelos Kanoulas, Yang Du, Tian Xia, Donghui Zhang, "Finding Fastest Paths on A Road Network with Speed Patterns," icde, 22nd International Conference on Data Engineering (ICDE'06), 2006.p 10, [5] Natalie Fridman, Gal A. Kaminka, “Modelling Crowd Behaviour Based on Social Comparison Theory” Extended Abstract. ACRI 2006: 694-698 [6] Rafael de Sousa Rocha, Maria Andréia Formico Rodrigues, Leandro da Silva Taddeo, "Performance Evaluation of a Hybrid Algorithm for Collision Detection in Crowded Interactive Environments," sibgrapi, XIX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'06), 2006.pp. 86-93, [7] VRML’97, http://ece.uwaterloo.ca:80/~h-anim. [8] DIVE, http://www.sics.se/dive/