Abstract: This paper presents the findings of two experiments that were performed on the Redundancy in Wireless Connection Model (RiWC) using the 802.11b standard. The experiments were simulated using OPNET 11.5 Modeler software. The first was aimed at finding the maximum number of simultaneous Voice over Internet Protocol (VoIP) users the model would support under the G.711 and G.729 codec standards when the packetization interval was 10 milliseconds (ms). The second experiment examined the model?s VoIP user capacity using the G.729 codec standard along with background traffic using the same packetization interval as in the first experiment. To determine the capacity of the model under various experiments, we checked three metrics: jitter, delay and data loss. When background traffic was added, we checked the response time in addition to the previous three metrics. The findings of the first experiment indicated that the maximum number of simultaneous VoIP users the model was able to support was 5, which is consistent with recent research findings. When using the G.729 codec, the model was able to support up to 16 VoIP users; similar experiments in current literature have indicated a maximum of 7 users. The finding of the second experiment demonstrated that the maximum number of VoIP users the model was able to support was 12, with the existence of background traffic.
Abstract: Rural areas of Tanzania are still disadvantaged in terms of diffusion of IP-based services; this is due to lack of Information and Communication Technology (ICT) infrastructures, especially lack of connectivity. One of the limitations for connectivity problems in rural areas of Tanzania is the high cost to establish infrastructures for IP-based services [1-2]. However the cost of connectivity varies from one technology to the other and at the same time, the cost is also different from one operator (service provider) to another within the country. This paper presents development of software system to calculate cost of connectivity to rural areas of Tanzania. The system is developed to make an easy access of connectivity cost from different technologies and different operators. The development of the calculator follows the V-model software development lifecycle. The calculator is used to evaluate the economic viability of different technologies considered as being potential candidates to provide rural connectivity. In this paper, the evaluation is based on the techno-economic analysis approach.
Abstract: This interdisciplinary study is an investigation to evaluate user-interfaces in business administration. The study is going to be implemented on two computerized business administration systems with two distinctive user-interfaces, so that differences between the two systems can be determined. Both systems, a commercial and a prototype developed for the purpose of this study, deal with ordering of supplies, tendering procedures, issuing purchase orders, controlling the movement of the stocks against their actual balances on the shelves and editing them on their tabulations. In the second suggested system, modern computer graphics and multimedia issues were taken into consideration to cover the drawbacks of the first system. To highlight differences between the two investigated systems regarding some chosen standard quality criteria, the study employs various statistical techniques and methods to evaluate the users- interaction with both systems. The study variables are divided into two divisions: independent representing the interfaces of the two systems, and dependent embracing efficiency, effectiveness, satisfaction, error rate etc.
Abstract: Modernizing legacy applications is the key issue facing IT managers today because there's enormous pressure on organizations to change the way they run their business to meet the new requirements. The importance of software maintenance and reengineering is forever increasing. Understanding the architecture of existing legacy applications is the most critical issue for maintenance and reengineering. The artifacts recovery can be facilitated with different recovery approaches, methods and tools. The existing methods provide static and dynamic set of techniques for extracting architectural information, but are not suitable for all users in different domains. This paper presents a simple and lightweight pattern extraction technique to extract different artifacts from legacy systems using regular expression pattern specifications with multiple language support. We used our custom-built tool DRT to recover artifacts from existing system at different levels of abstractions. In order to evaluate our approach a case study is conducted.
Abstract: In this paper, we give an overview of an online elearning
tool which has been developed for kids aged from nine to
eleven years old in Mauritius for the self-study of Mathematics in
order to prepare them for the CPE examination. The software does
not intend to render obsolete the existing pedagogical approaches.
Nowadays, the teaching-learning process is mainly focused towards
the class-room model. Moreover, most of the e-learning platforms
that exist are simply static ways of delivering resources using the
internet. There is nearly no interaction between the learner and the
tool. Our application will enable students to practice exercises online
and also work out sample examination papers. Another interesting
feature is that the kid will not have to wait for someone to correct the
work as the correction will be done online and on the spot. Additional
feedback is also provided for some exercises.
Abstract: Software crisis refers to the situation in which the developers are not able to complete the projects within time and budget constraints and moreover these overscheduled and over budget projects are of low quality as well. Several methodologies have been adopted form time to time to overcome this situation and now in the focus is component based software engineering. In this approach, emphasis is on reuse of already existing software artifacts. But the results can not be achieved just by preaching the principles; they need to be practiced as well. This paper highlights some of the very basic elements of this approach, which has to be in place to get the desired goals of high quality, low cost with shorter time-to-market software products.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: The world is moving rapidly toward the deployment
of information and communication systems. Nowadays, computing
systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in
development process of computing systems, specially in developing
systems such as banking, military and e-business systems. For
developing every system, a process model which includes a process,
methods and tools is chosen. The Rational Unified Process (RUP) is
one of the most popular and complete process models which is used
by developers in recent years. This process model should be extended to be used in developing secure software systems. In this
paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles,
and Artifacts to RUP in order to capture, document and model threats
and security requirements of system. These extensions introduce a
group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are
captured and modeled. These models are used in design, implementation and test activitie
Abstract: 20 years of dentistry was a period of transition from
communist to market economy but Romanian doctors have
insufficient management knowledge. Recently, the need for modern
management has increased due to technologies and superior materials
appearance, as patient-s demands.
Research goal is to increase efficiency by evaluating dental
medical office cost categories in real pricing procedures.
Empirical research is based on guided study that includes
information about the association between categories of cost
perception and therapeutic procedures commonly used in dental
offices.
Due to the obtained results to identify all the labours that make up
a settled procedure costs were determined for each procedure.
Financial evaluation software was created with the main functions:
introducing and maintaining patient records, treatment and
appointments made, procedures cost and monitoring office
productivity.
We believe that the study results can significantly improve the
financial management of dental offices, increasing the effectiveness
and quality of services.
Abstract: Components of a software system may be related in a
wide variety of ways. These relationships need to be represented in
software architecture in order develop quality software. In practice, software architecture is immensely challenging, strikingly
multifaceted, extravagantly domain based, perpetually changing,
rarely cost-effective, and deceptively ambiguous. This paper analyses
relations among the major components of software systems and
argues for using several broad categories for software architecture for
assessment purposes: strongly adequate, weakly adequate and
functionally adequate software architectures among other categories.
These categories are intended for formative assessments of
architectural designs.
Abstract: We present an implementation of an Online Exhibition System (OES) web service(s) that reflects our experiences with using web service development packages and software process models. The system provides major functionality that exists in similar packages. While developing such a complex web service, we gained insightful experience (i) in the traditional software development processes: waterfall model and evolutionary development and their fitness to web services development, (ii) in the fitness and effectiveness of a major web services development kit.
Abstract: This paper presents the optimal controller design of
the generator control unit in the aircraft power system. The adaptive
tabu search technique is applied to tune the controller parameters
until the best terminal output voltage of generator is achieved. The
output response from the system with the controllers designed by the
proposed technique is compared with those from the conventional
method. The transient simulations using the commercial software
package show that the controllers designed from the adaptive tabu
search algorithm can provide the better output performance compared
with the result from the classical method. The proposed design
technique is very flexible and useful for electrical aircraft engineers.
Abstract: Analytical investigation of the sedimentation
processes in the river engineering and hydraulic structures is of vital
importance as this can affect water supply for the cultivating lands in
the command area. The reason being that gradual sediment formation
behind the reservoir can reduce the nominal capacity of these dams.
The aim of the present paper is to analytically investigate
sedimentation process along the river course and behind the storage
reservoirs in general and the Eastern Intake of the Dez Diversion weir
in particular using the SHARC software. Results of the model
indicated the water level at 115.97m whereas the real time
measurement from the river cross section was 115.98 m which
suggests a significantly close relation between them. The average
transported sediment load in the river was measured at 0.25mm ,
from which it can be concluded that nearly 100% of the suspended
loads in river are moving which suggests no sediment settling but
indicates that almost all sediment loads enters into the intake. It was
further showed the average sediment diameter entering the intake to
be 0.293 mm which in turn suggests that about 85% of suspended
sediments in the river entre the intake. Comparison of the results
from the SHARC model with those obtained form the SSIIM
software suggests quite similar outputs but distinguishing the
SHARC model as more appropriate for the analysis of simpler
problems than other model.
Abstract: In this paper, a new Genetic Algorithm (GA) based
methodology is proposed to optimize the Degree of Hybridization
(DOH) in a passenger parallel hybrid car. At first step, target
parameters for the vehicle are decided and then using ADvanced
VehIcle SimulatOR (ADVISOR) software, the variation pattern of
these target parameters, across the different DOHs, is extracted. At
the next step, a suitable cost function is defined and is optimized
using GA. In this paper, also a new technique has been proposed for
deciding the number of battery modules for each DOH, which leads
to a great improvement in the vehicle performance. The proposed
methodology is so simple, fast and at the same time, so efficient.
Abstract: Horizontal continuous casting is widely used to
produce semi-finished non-Ferrous products. Homogeneity in the
metallurgical characteristics and mechanical properties for this
product is vital for industrial application. In the present work, the
microstructure and mechanical properties of a horizontal continuous
cast two-phase brass billet have been studied. Impact strength and
hardness variations were examined and the phase composition and
porosity studied with image analysis software. Distinct differences in
mechanical properties were observed between the upper, middle and
lower parts of the billet, which are explained in terms of the
morphology and size of the phase in the microstructure. Hardness
variation in the length of billet is higher in upper area but impact
strength is higher in lower areas.
Abstract: This article deals to describe the simulation
investigation of the digital phase locked loop implemented in
software (SDPLL). SDPLL has been developed for speed drives of an
induction motor in scalar strategy. A drive was implemented and
simulation results are presented to verify the robustness against motor
parameter variation and regulation speed.
Abstract: This paper discusses a qualitative simulator QRiOM
that uses Qualitative Reasoning (QR) technique, and a process-based
ontology to model, simulate and explain the behaviour of selected
organic reactions. Learning organic reactions requires the application
of domain knowledge at intuitive level, which is difficult to be
programmed using traditional approach. The main objective of
QRiOM is to help learners gain a better understanding of the
fundamental organic reaction concepts, and to improve their
conceptual comprehension on the subject by analyzing the multiple
forms of explanation generated by the software. This paper focuses
on the generation of explanation based on causal theories to explicate
various phenomena in the chemistry subject. QRiOM has been tested
with three classes problems related to organic chemistry, with
encouraging results. This paper also presents the results of
preliminary evaluation of QRiOM that reveal its explanation
capability and usefulness.
Abstract: This paper gives a study about forging solution to
deploy the fixed wireless access (FWA) in the band 3300-3400MHz
instead of 3400-3600MHz to eschew the harmful interference
between from the FWA towards fixed satellite services receiver
presented in this band. The impact of FWA services toward the FSS
and the boundaries of spectrum emission mask had been considered
to calculate the possible Guard band required in this case. In
addition, supplementary separation distance added to improve the
coexistence between the two adjacent bands. Simulation had been
done using Matlab software base on ITU models reliance on the most
popular specification used for the tropical weather countries. Review
the current problem of interference between two systems and some
mitigation techniques which adopted in Malaysia as a case study is a
part of this research.
Abstract: Gas condensate Reservoirs show complicated thermodynamic behavior when their pressure reduces to under dew point pressure. Condensate blockage around the producing well cause significant reduction of production rate as well bottom-hole pressure drops below saturation pressure. The main objective of this work was to examine the well test analysis of naturally fractured lean gas condensate reservoir and investigate the effect of condensate formed around the well-bore on behavior of single phase pseudo pressure and its derivative curves. In this work a naturally fractured lean gas condensate reservoir is simulated with compositional simulator. Different sensitivity analysis done on Corry parameters and result of simulator is feed to analytical well testing software. For consideration of these phenomena eighteen compositional models with Capillary number effect are constructed. Matrix relative permeability obeys Corry relative permeability and relative permeability in fracture is linear. Well testing behavior of these models are studied and interpreted. Results show different sensitivity analysis on relative permeability of matrix does not have strong effect on well testing behavior even most part of the matrix around the well is occupied with condensate.
Abstract: The localization of software products is essential for reaching the users of the international market. An important task for this is the translation of the user interface into local national languages. As graphical interfaces are usually optimized for the size of the texts in the original language, after the translation certain user controls (e.g. text labels and buttons in dialogs) may grow in such a manner that they slip above each other. This not only causes an unpleasant appearance but also makes the use of the program more difficult (or even impossible) which implies that the arrangement of the controls must be corrected subsequently. The correction should preserve the original structure of the interface (e.g. the relation of logically coherent controls), furthermore, it is important to keep the nicely proportioned design: the formation of large empty areas should be avoided. This paper describes an algorithm that automatically rearranges the controls of a graphical user interface based on the principles above. The algorithm has been implemented and integrated into a translation support system and reached results pleasant for the human eye in most test cases.