20

The Development of Virtual Reality System for Advanced Training

Embed Size (px)

Citation preview

Executive Committee and Organization

General Chair: Sameer Bataineh

JUST, JORDAN

Program Chair: Eyas El-Qawasmeh

JUST, JORDAN

Reviewing Chair: Basheer Al-Duwairi

UST, JORDAN

Proceeding Chair: Ahmad Dalalah

JUST, JORDAN

Proceeding Message This is the first International Conference on Digital Communications and Computer Applications hosted by the Faculty of Computer and Information Technology at Jordan University of Science and Technology. DCCA 2007 is a forum for scientists and engineers to meet and present their latest research results, ideas, and papers in the diverse areas of Digital Communications, Computer Science, and Information Technology. This scientific conference will cover guest lectures, more than 300 papers for presentations, technical session, and oral poster sessions with debates. This meeting will be a great opportunity to exchange knowledge and experience for all the participants who joined us from all over the world to discuss new ideas in the area of computer science and information technology. We are grateful for the effort of Dr. Eyas El-Qawasmeh, the program chair for making this conference possible, and a special thanks to the technical committee and to all external reviewers. Finally we would like to thank all the participant, sponsoring companies, and Jordan University of Science and Technology. Also we would like to extend a warm welcome you to Jordan, and do hope that all participants have a wonderful time to Jordan in the season of beautiful blossoms. General Chair Prof. Sameer Bataineh Dean of the Faculty of Computer & Information Technology Jordan University of Science & Technology

Preface Dear DCCA2007 proceedings reader:

On behalf of the DCCA2007 conference, the program committee and Jordan University of Science and Technology has the pleasure to welcome the attendees to Jordan University of Science and Technology, Irbid, Jordan to participate in the 1st International Conference on Digital Communications and Computer Applications (DCCA2007).

The DCCA2007 conference explores new advances in information technology. It brought together researcher from various areas of computer science and addresses both theoretical and applied aspects of information technology. The fields of computer science and information technology are growing very fast and there are new technologies that are added every day. Jordan does contribute to these advancements and a proof of this contribution is the large number of presented papers in this international conference.

The DCCA2007 conference offers the opportunity for the researchers from all over the world to get together and discuss the new advances in the area of computer science and information technology. The discussion and exchange ideas will contribute to these fields and will help in more advances in the technology in the coming future.

The call for papers resulted in 45% accepted papers and 18 accepted posters from 47 countries covering all areas of information technology. The papers are of top quality papers. Each paper is evaluated by at least two reviewers. The results of reviewing were paper acceptance, poster acceptance, or paper rejection. In addition, four tutorials and two keynote speakers have been accepted in this conference.

Finally, we hope that the conference satisfy your expectations and hope you enjoy time with us and in Jordan University of Science and Technology. The committees worked hard for not just days but months to reach the quality level that do satisfy our guests, and many thanks and appreciation to all of you who are here today.

Dr. Eyas A. El-Qawasmeh Program chair DCCA2007 Computer Science Department Jordan University of Science and Technology

Table of content

AlGORITHMS

A Canonical Genetic Algorithm for Likelihood Estimator of First Order Moving Average Model Parameter Basa’d Ali Hussain , Rawa’a Dawoud Al-Dabbagh

1

A Water-Saving Technique Based on Distributing of Prime Numbers over Integers Ahmad Sharieh , Adel H. Abusitta , Aladdin H. Baarah

11

A New Approach to Data-Driven Modeling in Civil Engineering Akbar A. Javadi , Mohammad Rezania , Mohaddeseh Mousavi Nezhad

17

VDM Specification of an Algorthm for Graph Decomposition Abdul Huq, Naryanan of an Algoritm for Grapj Decomposition

25

Concept Lattice Reduction by Matrix Decompositions Vaclav Snasel, Petr Gajdos, Hussam M. Dahwa Abdulla, Martin Polovincak

35

Automated Generating Test Cases Using Genetic Algorithms Arabi Keshk, Ahmed M. Omira , Nabil A. Ismail

43

An Algorithm for Generating the Design Matrix for Multivariate Polynomial Least Squares Fitting Sami F. Al-Hamdan

50

COMPUTER ALGORITHMS

Text search algorithm based on stacks Abdurazzag Ali Aburas

55

Weighted maximum likelihood algorithm for time and frequency synchronization of DVB-T systems Charbel El Hajjar , Martin Speitel

60

Three Term Backpropagation Algorithm For Classification Problem Siti Mariyam Shamsuddin , Maslina Darus , Fadhlina Izzah Saman

70

A Genetic Algorithm for Distributed Query Processing over Mirror Servers Azzam Talal Sleit ,Wesam Al-Mbaideen , Nawal Alzabin, Hadeel Dawood , Khaled alqarute

81

ClassifyChi2: An Efficient Discretization Algorithm Ahmad M. Odat , Saleh M. Abu-Soud

88

Two-PASS HORIZON LINE ALGORITHM FOR FAST SHADOW GENERATION OF 3D FUNCTION Tian SHEN, You-xing GAO

99

Using theModulus Adaptive Arrays -Reduced Computational Complexity of the Constrained Multi Householder Transformation Said E. El-Khamy, Fellow IEEE , Darwish M. Abd-Elaziz , Roshdy K. Korayem, IEEE student member

106

Non-uniform Randomized Balanced Allocations Ebrahim Malalla¤

112

COMPUTER DESIGN, ARCHITECTURE , & GRIDS

A Combined hardware-Software Approach for CPU Energy Reduction Using Dynamic Voltage Scaling Technique Diary R. Sulaiman

113

A QoS Matching Approach for Grid Service Selection Yang Liu , HuaCan He

120

A Novel Grid Resource Discovery Model Based on Matchmaking Engine Overlay Yang Liu , HuaCan He

126

objective Mapping for NoC Architectures -MultiAbou El Hassan BENYAMINA , Pierre BOULET

132

Design of an ECC Decoder based on Orthogonal Parity-Checksums Dr. Pervez Akhtar , Engr. M. Altaf Mukati

140

A Method of Reduction of the Microinstructions of Synchronous Digital Systems Shehabat I. M. , Al-Dahleh M. Z.

147

UP-BY TASK SPLITGRID LOCK AVOIDANCE S . Suresh , Ankit Kamal Mehta , C . G . Gayathri

154

Promotion of Local to Global Operation in Train Control System Sher Afzal Khan , Nazir A. Zafar

162

COMPUTER SECURITY

Design and Implementation of 64-bits Advanced Encryption Standard Malik Qasaimeh , Saleem Masaedeh

168

A New Steganographic Technique for Hiding Grayscale Images in Colored-Raw Images Samer Atawneh

175

A New Steganography System Based on a Hybrid Transform Mussawi-Al. Q. Mahmoud , B. A. W. Dr

182

Protection of Cryptographic Implementations using Error Detection Techniques Rodica Tirtea , Mircea Vladutiu

191

Information Security King Saud University Hospitals experience Zahrani-d , Dr Saleh AlImam Mohammad Bin Sau

197

ime NumbersBox Construction Using Arithmetic Modulo Pr-A Real Time S Eltayeb Salih Abuelyman , Mohammed Ahmed El-Affend

207

The Development of Virtual Reality System for Advanced Training Muhammad Shafie Abd Latiff, Imran Ghani , Setyawan Widyarto

217

Network Security Using Chaos and Nonlinear Dynamics Zahid Ali

222

Improved Intrusion Detection/Prevention System Using Fuzzylogic And Data Mining Bharanidharan Shanmugam and Norbik Bashah Idris

228

A Modified Version of the Advanced Encryption Standard Algorithm with Extra Key Size and Block Size Abdurrahman Abdullah Mohammad , Lo’ai Tawalbeh

236

Enhanced Scheme for Group Key Agreement Birahadish, Saravanan. Suresh,P. Poornaselvan , S. J. K

242

Data Base Systems & Applications Data Warehouses & data mining

SIG for the Follow-up and the Management of the Geology Mining Data of the Constantine Region Dr. Mohamed-Khireddine KHOLLADI

254

On Controlling and Prediction of Next Best Sellings through Periodical Mining for {Semi/Non}-interesting Association Rules Asem Omari and Stefan Conrad

271

Data mining based on WaveCluster Yongmin_tang

276

DATA COMMUNICATIONS & NETWORKING

APPLICATION OF NUMERICAL CONTROLLED OSCILLATOR IN DIGITAL RECEIVER USING FPGA Ali Mohammed Hassan

284

Performance Analysis of a Load Distributing Active Anycast RTT-Based Method for Server Selection lail Abd Manan , Jamilin Jais, Mahamod bin Ismail-Habibah binti Hashim , Jamalul

290

quences for FH CDMA systems Hopping seRameshwar Rao. Sudha, FIETE, Dr.L.K

299

thm for mobile networksing algoriAn efficient rout Al Shqeerat, Hassan Mohammed. A. Khalil H

307

New Fast Method for Computing Wavelet Coefficients from 1D up to 3D Walid A. Mahmoud, Hadeel N. Al-Taai, Shereen M. Al-Qasem

313

A novel algorithm for evaluating TCP utilization and modeling TCP reno and tahoe using markovian model in wlan Mohammad mehdi hassani, Reza barangi, ali dorafshan

324

DATA COMMUNICATIONS AND NETWORKING2 zara

Performance Analysis of Multiuser DS-CDMA Linear Receivers under Various Realistic System Specifications Walid. A. Mahmoud, Mansour Abed, Hytham O. Haj Ali, Mahmoud M. Anshas

331

Standard Protocol Using SDR -MA Transmitter for a MultiDigital Design of CD Jamuar, Sabira Khatun. S.Ali, S. Khalid Eltahir Mohamed, Borhanuddin Mohd

340

Speech Synthesis System -To-sed TextConcatenated BaKhalifa. Zakiah Hanim Ahmad, Othman O

347

A Practical Study on Building a Wireless Sensor Network Karaki-Khalil Mustafa Yousef and Jamal Nazzal Al

355

Prosodic knowledge for emotional speech synthesis in Malayalam

Nair,. S, Nimmy Mathew, Achuthsankar S.Gopinath, Sheeba P.Deepa P

362

MT from English to Arabic Handling the Agreement problem in Tengku Mohammed Tenku Sembok, Mohammed Mahmoud Abu Shquier. Prof

370

let Transform The WalidRamahi-Al. Jawher, Nada N-Al. Walid A. Dr. Prof

382

ADAPTIVE TURBO CODED OFDM Sami Ahmed Haider, Khalida Noori

388

DATA COMMUNICATIONS AND NETWORKING nebo

Analytical Model of Grid Location Update Schemes for MANET Khaled Ahmed Abood Omer, D.K. Lobiyal

395

Dominating Set Theory based Semantic Overlay Networks for Efficient and Resilient Content Distribution J. Amutharaj, S. Radhakrishnan

403

New Fast Method for Computing Multiwavelet Coefficients from 1D up to 3D Sallal. Taai, Reema A-Al. Abdulwahab, Hadeel N. Mahmoud, Mutaz S. Walid A

412

A Comparison between Signal Clipping and µ-Law Companding Schemes for the Reduction of Peak-to-Average Power Ratio of OFDM Signals Sulaiman A. Aburakhia, Ehab F. Badran, Darwish A. E. Mohamed

423

Performance modelling of New Congestion Control Mechanism Abdulmonam G. Ali, M.E. Woodward, Mahmud Etbega

432

Middleware Integrated Sensor for Network Energy Utilization: MISNEU protocol Mahmoud Alwan, Ayad Salhieh

438

A LAYERED MIMO OFDM SYSTEM WITH CHANNEL EQUALIZATION Khalida Noori, Sami Ahmed Haider

450

ier, Dovecot, MySQL, Creation of Mail Server Based on Virtual Users and Domains with Postfix, Cour Mailscanner, Spamassassin, Clamav, Postfixadmin and Squirrelmail

Hedaya Alasooly. Dr

455

DATA COMPRESSION

A Modified Compressing Techniques Based On Improved Fast Discrete Fayez Idris, Sameer Bataineh, Ahmed Sawalmeh, Murad Alaqtash

471

A Novel Lossless Data Compression Scheme Based on the Error Correcting Hamming Codes

Bahadili-Hussein Al

478

Bit Level Files Compression Samer Nofal

486

WORD-BASED TEXT COMPRESSION Jan Platoš, Jiří Dvorský

489

E-LEARNING , EDUCATION & ORGANIZATIONS

Recommended Instructional Technology for K-12 Students in Arab Countries Eyas El-Qawasmeh ,Abdallah Tubaishat

496

An Investigation Study Towards Determine Problems, Solutions & Implementation : Learning-E Limitations

i ,Hannan Issa MohsenHawar-Ma'en Al.Dr

501

On Line Course Learning Enhancement Based on Interactive Interface Abdurazzag Ali Aburas and Othman O Khalifa

509

Face and Electronic -to-Face: Productive Qualitative Interviews Choueiri. Rizk ,Elias M. Nouhad J

515

E Learning Vs M Learning in Higher Education D.Balaji, B.Malathi, J.Akbar Ali

532

Modeling and Verification of Community of Practice Using an Actor-based Language Farzad Peyravi, Kaveh Pashaei, Fattaneh Taghiyareh

537

Measurement of E Learning Usability through User Interface Dr.Mudawi Elmusharaf, Abdelrahman Osman Abdelrahman Elfaki, Ahmed Mohammed Elsawi

545

Modern didactic approaches: the case of distant science education in Greece Kalogiannakis Michailsearch\E-LEARNING , EDUCATION & ORGANIZATIONS\p71.doc

550

An Overview on Electronic Institutions Farnaz Derakhshan

557

Knowledge Management and Intellectual Capital at the University Environment Dr. Issa Shehabat, Dr. Saad A._Mahdi, Dr. Kamel Khoualdi

569

E-TECHNOLOGIES & THE WEB

Legal Web Accessibility Natheer Gharaybih

576

E-commerce: Security Enhancement In Internet Banking Dr. Abeer H. Rasheed Al-Sadoon, Miss. Abeer T. Maolood Al-Obaidy

585

inesss Used Books Bus’Platform for a Faculty-E Muhaini Othman, Salimah Mokhtar

591

Mobile-Commerce vs. Internet-Commerce for New Business Opportunities Ahmad Hayajneh, Hamid Mehrvar

601

A Web Audio System Based on Object Deputy Database Fan Liu, Yuan Cheng, Zhiyong Peng

609

e Arab Countries in AfricaAn Analysis of th: Government Service Delivery Capabilities-E & the Middle East Akemi Takeoka Chatfield, Omar Alhujran

615

Quality in Web Interface Input XML Message Generation and Communication Tor Stålhane

625

Improving Web Search Results for Short Queries Using Preserved Query Knowledge Roberto Solis-Oba and Anwar Alhenshiri

634

E-TECHNOLOGIES & THE WEB2

LUP: Least and Unique Price Auction-A New Type of Online Auctions Dr. Mohammed A. Otair

650

ContentRank: a New Content-based Page Ranking Hui Li, Shu Zhang, Xia Wang, Nian Shao

607

An Used O-O-M to Support Web Site Design Hadeel S. Kareem, Abeer Salim Jamil

614

E-Commerce Contract Modeling and the Contract Law Radomir A. Mihajlovic, Michael J. Gregorek, Ayat Jafari, Darko V. Mihajlovic

621

Evolutionary Improving World Wide Web Queries Václav Snášel, Pavel Krömer, Suhail S. J. Owais, H. O. Nyongesa, S. Maleki-dizaji

630

Web Patterns and Web Page Semantics Milos Kudelka, Vaclav Snasel, Ondrej Lehecka, Eyas El-Qawasmeh

641

Guidelines for Constructing Web Engineering Process Models for Developing Based Applications-Scale Web- Large

Omaima Nazar Ahmad AL-Allaf, Asim El-Sheikh

651

pport ASP Using Two MethodsConfiguration of Apache Server to Su Hedaya Alasooly. Dr

667

IMAGE PROCESSING

elet Image Segmentation Applied on Medical Images using Wav Faraheed-ltanny, Mohammad AlAlsu. Yas A

688

Facial Features Extraction Image Segmentation Using HIS Color Applied on Hameed. Stephan, Sundos A. Jane J. Dr

695

entification and Labelingbrid Transformation Based Automatic Image IdHy Ramahi-Al. Ani, Nada N-Al.Laith A. Jawher, Dr-Al. Walid A. Dr. Prof

704

n and Neural NetworknsformatioImage Identification and Labeling using Hybrid Tra Ramahi-Al. Mikhled Alfaouri, Nada N. Jawherand, Dr-Al. Walid A. Dr. Prof

718

Kobasi,-Mahmoud, Sarwa Al. Walid A. Dr Using Walidlet TransformA Proposed Method of Image ReconstructionSakhrie. Mohammad H. Eng

738

ation of Cervical Smear ImageCytoplast and Nucleus Segment 1Chieh Chen-, and Chun1Hong Lin-, Chi2Kuan Chan-, Yung1Horng Lin-Chuen

742

Descriptor Color Clustering and Spatial Relationthe Fast Image Retrieval Based on Chuen-Horng Lin1, Yung-Kuan Chan2, and Kai-Hung Chen1

748

iDTV Player Compatible MPEG4 and MHP Content Momouh Khadraoui (1), Oliver Tjulin (1), Beat Hirsbrunne (1) and Djamel Khadraoui (2) (1): PAI Group

754

IMAGE PROCESSING 2

GE GENERATION AND COLORIZATIONLUMINANCE PYRAMID FOR IMA Bara'a Ali Attea, Mariam A. Ali

763

A Steganographic Approach Based on Spatial Frequency Layering Sarab Majeed Hameed. Dr

771

A NON Reference Fingerprint Image Validity via Statistical Weight Calculation M.S. ALTARAWNEH, L.C.KHOR, W.L.WOO and S.S DLAY

776

using Moments on shapeIMAGE RETRIEVAL Wesam Atef Hatamleh, Rosalina Abdul Salam

780

Color Difference VQ Compression and Data Hiding Ting Chan-Hsiu** Mao-Fan Yang-, and Shys**Yuan Tsai-Tsang, *Husiun Tsai-, Meng*Kuan Chan-Yung

787

Self Embedding Robust Watermarking in Discrete Wavelet Transform Domain for Digital Colored Images Abdallah Al-Tahan Al-Nu'aimi, Rami Qahwaji

800

Direction Relations in Spatial Queries Using MBC Maytham Safar

807

INFORMATION SYSTEMS

A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam ,Md. Nizam Uddin, Mumit Khan

SIG for the Survey of the Evolution of the Distribution of the Population of the Adrar Region Dr. Mohamed-Khireddine KHOLLADI

817

Arabic vowels recognition systemType written Majdi Salameh. Nazlia Omar, Mr. Khairuddin Omar, Dr. Dr

826

A study of Arabic SMS-based classified ads SUBlanguageS DAOUD DAOUD , CHRISTIAN BOITET

835

A User Centered Matchmaking and Ranking System . Ahmad Rawashdeh, Rehab Duwairi

845

Text To Speech for Bangla Language using Festiva Firoj Alam ,Promila Kanti Nath , Dr. Mumit Khan

853

Improving Cluster-Based Malay Text Retrieval System Using Thesaurus

Nurazzah Abd Rahman, Zainab Abu Bakar, Normaly Kamal Ismail , Tengku Mohd Tengku Sembok

860

A Knowledge-Base on Holy Qur’an for Tagging Arabic Verbs Mahmoud Shokrollahi-Far , Ayaz Isazadeh , Isa Barzegar, Rezgar Soltani

869

ota and Schedule Backup Configuration of a Simple Samba File Server, Qu Dr. Hedaya Alasooly

876

A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam , Md. Nizam Uddin , Mumit Khan

887

INFORMATION SYSTEMS2

Involving cognitive science views on collections to better design our Content management tools Francis Rousseaux , Alain Bonardi

888

Segmentation free Bangla OCR using HMM: Training and Recognition Md. Abul Hasnat , S. M. Murtoza Habib , Mumit Khan

894

Deploying and Aligning Organizational Strategy Using Intranet Based Knowledge Management System Norlida Buniyamin, Zainuddin Mohamad

902

An Agent Mediated Community of Practice Using MAS-CommonKADS Methodology

Farzad Peyravi , Fattaneh Taghiyareh

912

Developing business functions in today’s digital environment Dr Mohamad AlSakka

921

Optimization in in IR System Using GP and Fuzzy Grow Up Precision Recall Relationship Curve QueryOptimizing the User

Suhail Sami Owais , Pavel Kromer , Vaclav Snasel

939

Performance Analysis of Information Retrieval Systems Based on Genetic Algorithms Ibrahim Zedan , Mohamed Nour , Sanaa Abo-Elhamayed

949

A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam , Md. Nizam Uddin , Mumit Khan

962

INFORMATION SYSTEMS & APPLICATIONS – NEBO

Selecting an Architectural Style Satisfying A banking Organization Requirements Using Simulation Yousef Hasan Jbara , Hussam Al-shorman

963

Autonomic Computing : A Survey M. Al-Zawi , D. Al-Jumeily , A. Hussain , A. Symons , A. Taleb-Bendiab

973

TOWARDS AUTOMATIC TRANSFORMATION FROM COSA SOFTWARE ARCHITECTURE TO CORBA PLATFORM Adel Alti , Tahar Khammaci and Adel Smeda

980

Bus Information, Scheduling, and Control for Amman (Project BiSCA) Ehab Al-Hakawati , Fayez Al-Rafia , Khalid Al-Tahat , Nasim Al-Tamimi

990

Malay Spelling Exchange Rule: A Computational Technique in Information Retrieval for Identification Similar Words in Historical Malay Text Zainab Abu Bakar , Tengku Mohd. Tengku Sembok , Mohammed Yusoff

1003

Arabic Stemming Based on affixes Removal Mohammad Khaleel Qasem , Sari Awwad

1015

Comparison of Information Retrieval Models for Arabic Text Muath Alzghool and Diana Inkpen , Ghassan Kanaan

1023

A New Paradigm of Pervasive Information Systems Dana Amin Al-Kukhun, Florence Sedes

1033

NEURAL NETWORKS AND ARTIFICIAL INTELLIGENCE

Automatic Estimation of Maximum Frequency and Velocity of Liquid Simulating Blood M.D Kedir-Talha , Mohamed Mehenni

1043

uzzy linear regression analysis of job satisfaction of Taiwan college graduates A f Lu Chyu-Chiang Kao and Chin

1051

Damped Vibration Analysis of Extrinsic Fabry-Perot Interferometric Sensors using Artificial Neural Networks Rohit Dua , Ayat Jafari

1058

Review on the Development and Utilization of Artificial Neural Networks Applied to ECG Signals Diagnosis Salama Meghriche , Mohammed Boulemden

1066

An Improved Odor Recognition System Using Learning Vector Quantization with a New Discriminant Analysis Turgay Temel, Bekir Karlik

1075

PARALLEL COMPUTING & DISTRIBUTED COMPUTING

Data base Distribution in Telemedicine Alsultanny , Zeyad Nasro. Yas A

1081

OptorSim SimulatorA Management Protocol of Replications in the

Ghalem Belalem

1090

Architecture of Multi-Agent System for Distributed Systems Prof. Dr. Hilal M. Yousif , Ass. Prof. Dr. Jane J. Stephan , Dr. Ghossoon M.W. Al_Sadoon

1098

Intelligent Agent System for Accessing Remote Energy Meters Padmin.and T. Sankaranarayanan.E.Suriyakala ,P.D.Ci

1104

Multi Installment Scheduling and Allocation of Divisible Jobs on Single Level Tree Networks with Buffering Limitation Sameer M. Bataineh , Abdullah M. Audat

1111

Grid Environment for Password Recovery Jadallah , Amjad Abu Jbara. Dina S

1119

Parallel Implementation of the Finite Difference Time Domain Method Using the Message Passing Interface Omar Ramadan , Oyku Akaydin

1127

Bayesian Student Modeling in a Distributed Environment Yaser Nouh, Indumathy.R, Karthikeyani.P, Varunkumar Nagarajan, and R. Nadarajan

1132

A Model for the Estimation of Buffer Requirement in Distributed Networks Saleh A. Khawatreh , Khalid Khanfar

1141

SOFTWARE ENGINEERING

sionalism and ResponsibilitiesCode of Ethics, Profes

Khader Muspah Titi

1146

Case Study of: Evaluating the Role of Concerned Parties in Media Awareness against Software PiracyJordan

Sheikh , Abdullah Rashed , Rawan Nassri Abulail , Moh`d Abdallah Ali Shkoukani , Bashar Alqudah-Asim El

1156

Assessment of System Development Models with Regard to Software Reuse Practice

Adnan Rawashdeh

1164

Identifying Representatives for Interfering Automata Viliam Holub

1178

s Failure ’box Component-kDetermining the Blac

Ibrahim Hilal , Aman Jantan 1186

) UML(Perceptions of the Unified Modeling Language ’ Users Jafar Ali , Bassam Hasan

1190

How quality assured by Extreme How quality assured Exterme Programming (XP )? Sana'a j. Khalaf

1198

Managing Inconsistency in Software Requirements A Systematic Approach for

Randa Ali Numan Khaldi , Dr. Saleh Abu-Soud

1204

Requirement Modeling -Using Ontology to Support Software Development ProcessNisreen Innab , Ahmad Kayed

1216

WIRELESS COMPUTING

Designing and Modeling MEMS Filter for Front-End Wireless Transceivers

Mustafa S. Al_Khusheiny , Burhanuddin Y. Majlis

1223

WEB PERSONALIZATION FOR MOBILE DEVICES Akbar Ali , Ruwi. Malathi , J.Balaji , B.D

1231

Basic notions, energy consumption and MAC protocol layer: Wireless Sensor Networks Ahmed LOUAZANI , Bouabdellah KECHAR , Mohamed Faycal KHELFI

1236

WLAN Based on Location FingerprintingDecision Tree Approach to Estimate User Location in

Osama Mohamed Badawy , Moustafa Ahmed Bani Hasan

1247

An Analytical Model for Short-Lived TCP Flows in Heterogeneous Wireless Networks Sameer Bataineh , Jamal Al-Karaki , Haya Sammaneh

1256

Time Scheduling in Hybrid Wireless Links -Using Link Diversity for RealLiliana Grigoriu

1275

Position Location in Wireless Networks Zahid Ali

1284

Weighted Angular Distance Based Cache Replacement Strategy for Location-Dependent Data in Wireless Environment Mary Magdalene Jane. F, Parameswaran.R, Raghavendra Prasad.R, R.Nadarajan

1290

WIRELESS NETWORKS

Dependable and Secure Data Storage and Retrieval in Ad-Hoc Networks Ali Barati , Ali Movaghar

1299

Development and Performance Analysis of a Probabilistic Flooding in Noisy Mobile Ad Hoc Networks Bahadili , Yousef Jaradat-Hussein Al

1306

World Implementation -rotocol under theRealVector P-Distance-Demand-on-Hoc-Performance of the Ad Yusnani Mohd Yussoff , Habibah Hashim , Mohd Dani Baba

1317

ique for Mobile Adhoc NetworksAn Effective Terminode Routing Techn Balamurugan , Jameer Basha

1327

AND CORRECTION TECHNIQUES USEDAN INVESTIGATION OF ERROR DETECTION IN WIRELESS TRANSMISSION

VIJESH. JAGADEESH KUMAR , K. K.J.S

1336

An Addressing Scheme for Routing and Power Saving in MANET Arwa Zabian

1343

Network ) PRMA(Network and Wireless ) Token Ring(Throughput and Delay Analysis of Integrated Wired Amaal Al_Amawi

1352

٢١٧

The Development of Virtual Reality System for Advanced Training

Muhammad Shafie Abd Latiff, Imran Ghani

Universiti Teknologi Malaysia, Malaysia Email [email protected], [email protected]

Setyawan Widyarto

Politeknik Negeri Lampung, Bandar Lampung, Indonesia Email [email protected]

ABSTRACT A reliable Virtual Environment (VE) emerging from Virtual Reality (VR) Technology can serve as a significant tool for advanced training in a large scale and complex environment. Using VR technology a number of applications have been developed in different areas of life including navigation applications for training purposes. However existing navigation techniques do not scale well to large-scale virtual worlds to handle the complex geometry and many simultaneous participants. Our research presents the design and implementation of a multi-users VR for advanced training, which will provide effective solutions towards advanced training in a large-scale and complex environment specifically for Hajj, as this is the most promising and challenging use of VR platform. Key Words: Virtual Reality, Training, Crowd modelling, Optimal Path Planning, Collision Detection .1. Introduction Virtual reality (VR) entails the use of advanced technologies, including computers and various multimedia peripherals. It permits users to experience and interact with a life-like model or environment, in safety and at convenient times. VR provides a degree of control over the simulation, which is usually not possible in the real-life situation [1]. However, the inclusion of real time situation is not expelled. The case studies described in [2] presents the inclusion of

real time animated virtual humans that are re-enacting situations and activities that were typically performed in sites during ancient times. The need to use modern tools has been realized in every field of life and computer-based simulations are playing significant role to facilitate the human being. Many of the high performance applications have successfully been developed in different areas of human life. However there are still some important areas where very little research has been

carried out i.e. training of a huge crowd in VR. To fulfil this prominent task, we present the design and implementation of a multi-users VR for advanced training specifically for Hajj (i.e. the compulsory ritual activity for Muslim done in Mecca, Saudi Arabia). Some works that are related to the scopes of the project are highlighted as follow. A topological structuring of the geometric environment to allow fast path finding and an efficient reactive navigation algorithm for virtual humans evolving inside a crowd

is used by [3]. A solution based on extensions to the A* algorithm by combining travel-time functions and a lower-bound estimator for travel time to expand a path have been used in [4]. A framework for Festinger’s Social Comparison Theory (SCT) and its implementations’ in several crowd behaviour scenarios are evaluated by [5]. A performance analysis of a hybrid collision detection algorithm for highly interactive and crowded environments in terms of output quality and running time,

٢١٨

by applying usability criteria is presented in [6]. We present a unique technique of navigation with place representations, path finding with fastest efficiency, collision detection with quick response and sense of presence among objects with real-time interactivity that scales to visible-range worlds. We introduce a new approach that will address Crowd modelling, Optimal Path Finding, Collision detection and Co-presence in a multi-users large-scale environment for a huge crowd. Our aim is to manage guided as well as un-guided crowed by providing the path planning decisions in a multi-users large-scale environment. Results from our works indicate that virtual reality training system, being constructed and implemented properly, will provide an effective alternative to current traditional training methods for Hajj. 2. Design Considerations for the VR System This section discusses the key features, which have been considered while designing the system. Here are some characteristics, which may be enjoyed when the system is implemented. 2.1 Performance To run with a better performance in such a large scale and complex applications, it must have at least four aspects to consider: •Rendering Performance of the visible range- world must be provided by high degree of accuracy of maps, building structures, shading, roads, landmarks and crowd. This project is using VRML [7] and Dive [8] files format to give the scenes an acceptable natural representation. •Optimal Path Planning Performance for a big crowd will be achieved by efficient optimal path finding algorithm that would make the process of exploring minimum distance to reach the target destinations by taking quick decisions.

New SNA* algorithm is used to produce multiple paths to the same destination. •Interaction Performance between objects and avatars is much bigger challenge, as this needs objects/avatars awareness of presence with effective collision detection, objects interaction and their response display for multi-users. •Communication Performance is also an important factor, which will be achieved by sending limited network traffic (textual, motion, state, geometry, sound) between multi-users by event based distribution techniques. 2.2 Realism Besides a degree of visual realism that is necessary, the users of the system should have access towards sensory fidelity concerning visual, aural and may be tactile information presented to the users that replicates the real world to a maximum extent possible. One familiar example for missing realism in some training applications is the lack of collision handling. The system is aimed to provide reliable collision detection with tactile feedback to the users so that if a user collides with the other user/object, he/she may find another suitable path by using efficient path finding algorithm at the backend. In this way all the participants in the crowd will be able to be trained smoothly without wasting time. As the system mostly focus on Hajj, to access the aural realism and support to saying the “TALBIAH”, voice communication functionality will be provided in the system. 2.3 Persistency User manipulations within the world can have effects on the world after the user has left the world and disconnected from the system. This issue also involves the persistent roles and access right for users. 2.4 Scalability The number of possible interactions between many simultaneous users (ideally)

٢١٩

in a multi-user environment is one of the main goals of VR for training purposes. 2.5 User Interface User interface (UI) is the part of every computer system that determines how people control and operate the system. When the interface is well designed, the overall training system is consider comprehensible, predictable, and controllable. This will make users feel competent, satisfied, and responsible for their actions. In our approach, we divide most user interaction tasks into three categories: navigation, selection/ manipulation, and system control. This will hopefully reduce the primary barrier to effective 3D visualization and will provide support to develop a well-designed user interface. 3. Architecture Construction of the system The design choices made for the training infrastructure are highly influential in the overall architecture of the system. The implementation design of the system is a sequence-based architecture, which enhances its functionality even in large-scale, complex and advanced training application like Hajj. Figure1: Shows a less complex and easy to maintain system structure to provide advanced training to a huge crowd of Hajj in a very large-scale and complex virtual environment. Our designed approach was guided by the following requirements: • Openness: The system should not be

designed for any specific application area. It should be applied in any related VR system

• Complex behaviours: Object behaviour should not be limited to simple movements. The motion should cover most of human like navigation.

• Dynamics: User can enter and leave the virtual environment at any moment.

• Extensibility: System should allow new object behaviours and new functionality with easy extensibility.

Figure 1: System Architecture for Advance Training System 3.1 Mathematical Crowd Model, Data Acquisition and NPS Construction The NPC (non player characters) is a crowd of characters that are rather than controlled by the user but are set of outputs from mathematical model. The NPCs may be also retrieved from video camera, or video movies after being undergone several processes of data acquisition and transformation into mathematical terms. These uncontrolled NPCs move around the world and they are simulated. They contribute to a complex traffic control of virtual environment. They will be combined with main characters that the motion is generated by path planner algorithms. 3.2 Optimal Path Planning To complete the Hajj training, one person has to complete several of Hajj tasks. However, Hajj training may involves participating thousand of people or crowd. As we know crowd often leads to disastrous situations such as crush and stampede. On the other hand, in such situation the person may confront with some navigation problems like disorientation, loss of overview and difficulty to return to a location task before. Therefore, optimal path planning and searching algorithm are used to solve

٢٢٠

the shortest path problem as well as avoiding crowd concentration in order to produce the optimal task solution (Figure 3) 3.3 Recognition Process During the Hajj training, it is vital for Trainees/Avatars to be aware of the presence of their surroundings i.e. recognition of Kaaba, Hajr-e-Aswad, starting and ending point of Safa and Marwa etc. This will also need the sense of co-presence of the fellows participating in a particular task during Hajj. Through recognition process a user/avatar will be kept aware of the presence of these scenarios. 3.4 Collision Detection Mechanism between Objects/Avatars Immediate responses are needed to manage a large number of objects where interaction behaviours are so quick, so that run-time required event might be triggered to avoid the complexities and problems in the smooth flow of the crowd. To achieve this objective efficient collision detection techniques are implemented to increase the performance and navigation during training process. 4- Current Practical Developments Our efforts to develop a reliable Virtual Reality for Advanced Training purposes to incorporate the real world training requirements are moving in encouraging way. We are practically developing: • Model Environment (Figure 2) • Designing Map of Kaaba (Figure 2),

Surrounding Buildings, Places of Worship.

• Optimal Path finding and Searching Algorithm (Figure 3)

• Adapting Co-Presence and Collision Detection mechanism (Figure 4)

Figure 2: Virtual Building of Kaaba

Figure 3: Path Planning Approach

Figure 4: User and crowd interaction and collision

٢٢١

5. Conclusion The main purpose of this system is to serve as a significant tool for advanced training in large-scale complex environments like Hajj. However the system design (after some modifications according to the requirements) may also serve for other real-time real-world applications, because it uses efficient crowd modelling techniques, efficient optimal path finding algorithms and collision detection mechanisms. These are the key design criteria to develop an effective real-time application for advanced training in real world. Some of the areas where the system may play important role are Crowd Modelling in Public Places, Rush of Student in Schools & Colleges, Path planning for Fire Fighting and Crowd going into/coming from Sports Stadiums and Presence Awareness in Visiting Virtual Museums. References:

]١[ Branislav Ulicny, Daniel Thalmann, “Crowd simulation for interactive virtual environments and VR training systems” Computer Graphics Lab. Swiss Federal Institute of Technology, Lausanne, 2001.Switzerland, [2] Nadia Magnenat-Thalmann, Alessandro Enrico Foni, Nedjma Cadi-

Yazli: Real-time animation of ancient Roman sites. GRAPHITE 2006: 19-30 [3] Fabrice Lamarche, Stéphane Donikian, “Crowd of Virtual Humans: a New Approach for Real Time Navigation in Complex and Structured Environments”, Comput. Graph. Forum 23(3): (2004) 509-518 [4] Evangelos Kanoulas, Yang Du, Tian Xia, Donghui Zhang, "Finding Fastest Paths on A Road Network with Speed Patterns," icde, 22nd International Conference on Data Engineering (ICDE'06), 2006.p 10, [5] Natalie Fridman, Gal A. Kaminka, “Modelling Crowd Behaviour Based on Social Comparison Theory” Extended Abstract. ACRI 2006: 694-698 [6] Rafael de Sousa Rocha, Maria Andréia Formico Rodrigues, Leandro da Silva Taddeo, "Performance Evaluation of a Hybrid Algorithm for Collision Detection in Crowded Interactive Environments," sibgrapi, XIX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'06), 2006.pp. 86-93, [7] VRML’97, http://ece.uwaterloo.ca:80/~h-anim. [8] DIVE, http://www.sics.se/dive/