Accepted Papers

  • Service Level Agreement based Fault Tolerant Workload Scheduling in Cloud Computing Environment
    Manpreet Singh Gill and R. K. Baawa, Punjabi University, INDIA

    Cloud computing is a concept of providing user and application oriented services in a virtual environment. Users can use the various cloud services as per their requirements dynamically. Different users have different requirements in terms of application reliability, performance and fault tolerance. Static and rigid fault tolerance policies provide a consistent degree of fault tolerance as well as overhead. In this research work we have proposed a method to implement dynamic fault tolerance considering customer requirements. The cloud users have been classified in to sub classes as per the fault tolerance requirements. Their jobs have also been classified into compute intensive and data intensive categories. The varying degree of fault tolerance has been applied consisting of replication and input buffer. From the simulation based experiments we have found that the proposed dynamic method performs better than the existing methods.

  • A Hybrid Approach to Extract Key phrases from Arabic Text
    Reda Ahmed Mohamed Abd El-sadiek Zayed, Cairo University, Egypt

    Illumination normalization is of utmost importance in several applications, there are researches showing several techniques proposed which have an advantages and disadvantages,but they are not clear when it comes to applying them. In this way, this work present and overview of the illumination normalization techniques, and three are chosen: the Logarithm Transform, the Histogram Equalization and the Discrete CosineTransform, these were compare with the Histogram Equalization function of Matlab, we obtained more correct restoration of image illumination than it, in addition, which are applied to vehicle and faces recognition, it can be seen in the results that the techniques improve recognition rates, which means they are of utmost importance in real applications.

  • An Adaptive BAT Algorithm for Vehicle Routing Problem with Time Windows
    Berghida Meryem, USTHB, Algeria

    The VRP is one of the most famous combinatorial optimization problems, is considered as an extension of TSP, so it is an NP-hard problem. The VRPTW (Vehicle Routing Problem with Time Windows) being a variant of VRP, consists of a fleet of vehicles which must serve a set of geographically dispersed customers, each with a known demand and a time window, during which it can be served. In this paper, we present a new adaptive approach (EDBA) to solve this problem. This approach named Discrete Bat Algorithm is an enhanced version of the classical Bat Algorithm. The proposed method is improved by using simulated annealing method at each iteration.The results obtained in experimentation, for small and large instances, show the effectiveness of the proposed approach.

  • Automated Usability Evaluation of e-learning Websites in Saudi Arabia
    Khalid Al-Omar, King Abdulaziz University, Kingdom of Saudi Arabia

    Web usability is a significant factor in increasing user satisfaction, performance, trust, and loyalty. Web usability is particularly important for people who mostly depend on the website and for one reason or other cannot visit an institution, such as online distance education students. Accordingly, universities and educational websites need to determine the types of usability problems they have on their websites. However, far too little attention has been paid to providing detailed information regarding the types of specific usability problems that could be found on e-learning websites in general, and specifically, in the Kingdom of Saudi Arabia (KSA). The aim of this paper is to study and analyse the usability of university websites that offer distance education courses in the KSA. A total of 12 universities in Saudi Arabia were considered, which include 11 affiliated and one private university. The analysis of the data represents the level of usability of distance education websites. Results reveal that in Saudi Arabia, distance education websites are reliable, but violate basic usability guidelines.

  • A Qualitative Approach to Measure the Software Reliability based on Syntactic Metrics
    Dalila Amara and Latifa Ben Arfa Rabai, University of Tunis, Tunisia

    Software measurement helps to quantify the quality in order to provide information needed to make appropriate decisions related to software development life cycle. Reliability is one of the most important quality attributes whose measurement becomes the main objective of organizations using software systems. In the recent studies, software metrics are widely used for reliability measurement. These metrics are classified into two categories, syntactic and semantic ones. A literature review shows that syntactic metrics are used to measure software internal attributes such as cohesion, complexity, coupling, inheritance, polymorphism, etc. However, we observed a lack of studies that focus on the use of these metrics to assess the software reliability. As reliability is an external attribute, it cannot be measured directly. In this paper, our intention is to present how we can measure reliability using the impact of some syntactic metrics on it. This leads us to propose a qualitative approach to measure reliability based on syntactic metrics. This approach is benefit; it offers another way for researchers to get a better view of software reliability estimation.

  • Network Operation Center Security Improvement by Focusing on Sensor Role
    Vida Doranipour, Islamic Azad University, Iran

    With using big and complicated network, network security has changed to a very important issue. In this article, we introduce a new architecture on network security based on integration technology of sensors. Correlation of warning is a process which analyzes the warnings produced by one or some recognize influence systems. This architecture can produce a better and more detailed view about the influences happened. Warning correlation in the suggested architecture is a process that consists of a component collection and a tool based on the model. This process is able to process the data in real-time. In order to understand how each component helps to the goal of correlation and change the function of real time correlation. They install these tools on data recognition collection. The mentioned correlation process is able to process the real network warnings; this process also has the power to protect the network against high level attacks. The results show that: if correlation tools operate on the real time, they can reduce warning.

  • GÖDEL Theorem is Invalid
    J. Ulisses Ferreira, Federal University of Bahia, Brazil

    This short and informal article shows that there exists some four-valued logical system that helps prove that arithmetic is both sound and complete.

  • Scalable and Efficient Path-Sensitive Analysis Technique Scanning Many Types of Vulnerability
    Dongok Kang and Minsik Jin, R&D Center, Republic of Korea

    The goal of this paper is to present an efficient and effective path-sensitive analysis technique for many types of security vulnerability. We propose two analysis techniques.The first is a scalable path-sensitive analysis technique for security vulnerability with high precision and recall.Our strategies are to allow flexible design of path state and to make an effective path navigation heuristic which achieves both scalability and high recall.Experimental results show that a vulnerability scanner implemented through this technique get precision 100% and recall 93% on OWASP Benchmark.The vulnerability scanner is able to analyze 1 million lines of code.The second is a pre-analysis technique to improve the efficiency of the above analysis technique.The pre-analysis technique improves the path navigation by using an additional cheap anlysis.Despite the additional cost, experimental results show that the total analysis time is reduced by 2.5 times.Simultaneously recall of the analysis is improved by the pre-analysis technique.

  • Design Approaches in Technology Enhanced Learning
    Sayed Hajji, Faculty of sciences of Kairouan, Tunisia

    Design is a critical to the successful development of any interactive learning environment (ILE). Moreover, in technology enhanced learning (TEL), the design process requires input from many diverse areas of expertise. As such, anyone undertaking tool develo pment is required to directly address the design challenge from multiple perspectives. We provide a motivation and rationale for design approaches for learning technologies that draws upon Simon's seminal proposition of Design Science (Simon, 1969). We then review the application of Design Experiments (Brown, 1992) and Design Patterns (Alexander et al., 1977) and argue that a patterns approach has the potential to address many of the critical challenges faced by learning technologists.

  • Three-Dimensional Reconstruction and 3D Printing of Kidney from Computer Tomography
    Jun-Wei Hsieh and Yu-Zong Huang, National Taiwan Ocean University, Taiwan

    Through observing computerized tomography image, doctors can judge the patient's kidney health. Because the image of Computed Tomography is a two-dimensional image, the doctors have to build the entire three-dimensional model in their imagination. This situation increases the difficulty of analyzing the disease, so the goal of this paper is how to use two-dimensional computer tomography images to reconstruct three-dimensional model, and print it by 3d printer. Smoothing and threshold processing the computer tomography images to catch contour and vessels of kidney; combining cross-section images and longitudinal section images of the computer tomography by their features; and using Spline method as in [1][2][3][4] to fill the gap between the layers of data points as in [5][6][7]. Finally, we build a 3D model and dig out vessels by our method in STL file format.