"Annals. Computer Science Series" Journal
Romania, 300559 Timişoara, 6 Lascăr Catargiu str.
Phone: 004 0256 220 687 | Fax: 004 0256 220 690
E-mail: conference.fcia [@] tibiscus [.] ro | conference.fcia [@] gmail [.] com



Web design:
Ovidiu Crista
Updating:
Tiberiu Marius Karnyanszky
Editor-in-Chief
Annals. Computer Science Series
Tome 11, Fasc. 2


ISSN: 1583-7165 (printed journal)
ISSN: 2065-7471 (e-journal)
Owner: "Tibiscus" University of Timişoara, România
Editor: Mirton Publishing House of Timişoara, România
Distributor: "Tibiscus" University of Timişoara, România
Appearance: December 2013

» Service-Oriented Architecture: Keys to Successful Adoption and Implementation

» Qusay F. HASSAN

ABSTRACT:

Since the emergence of the SOA model, many organizations – both public and private – sought out to adopt it in order to acquire the desired agility level they seek to efficiently meet their needs. However, SOA adoption is not a trivial task given the number of challenges that should be overcome in order to reap the inherent benefits. This paper addresses the top chal-lenges that might prevent adopters from achieving a successful implementation of SOA in their organizations.

KEYWORDS:

SOA, SOA Adoption Challenges and Solutions.

9 - 16

imag/pdf.ico.gif PDF

» Developting Feature Representation and Respected Innovative Database Colecting Algorithm for Texture Analysis

» Shervan FEKRI-ERSHAD

ABSTRACT:

Texture analysis and classification are some of the problems which have been paid much attention by image processing scientists since late 80s. If texture classification is done accurately, it can be used in many cases such as object tracking, visual pattern recognition, and face recognition. Since now, so many methods are offered to solve this problem. Against their technical differences, all of them used same popular databases to evaluate their performance such as Brodatz or Outex which may be make their performance biased on popular databases. In this paper, some metrics are proposed to collect more actual database of texture images. The proposed approach is included two stages. The first one is developing feature representation based on structural and statistical features and the next one is consisted an algorithm which termed SFCO to collect images based on metrics. Finally, in order to prove the quality of developed metrics, some texture classification approaches are applied on proposed database. Decreasing the probability of biasing texture classification approaches on popular database is the main advantage of this paper.

KEYWORDS:

Database Collecting, Texture Classification, Statistical Features, Structural Features.

17 - 22

imag/pdf.ico.gif PDF

» Applicability of Rough Set Theory for Analysis of Phishing Threats

» Rohit Ramesh, Sanjiban Sekhar Roy and Anvesha Sinha

ABSTRACT:

Phishing has for long now been a social nuisance. It includes various engineering schemes which are used to obtain discrete and important information from its prey by using a trusted component in electronic communication systems. Given its importance, it is a necessity that we study or analyze this scheme in order to generate a solution. Rough set theory from the past three decades has helped us study various systems with incomplete information domains. It has helped us gain invaluable information by in depth analysis of incomplete information systems. Hence, in this paper we analyze and derive results from a Phishing data set, comprising of domains all over the world and also generic domains using rough set theory. We will then scrutinize some of our results and put forth our conclusion.

KEYWORDS:

Phishing; Rough Set Theory; Domain Name.

23 - 27

imag/pdf.ico.gif PDF

» Network Adaptive Behaviour and its Optimal Performance

» AKHIGBE-MUDU Thursday Ehis

ABSTRACT:

Adaptation is a fundamental characteristic of living organisms since they attempt to maintain physiological equilibrium in the midst of changing environmental conditions. An approach to the design of adaptive systems is to consider the adaptive aspects of human or animal behavior and to develop systems which behave somewhat analogously. Hence, good performance of networks requires the design of effective control strategies that are capable of rapid adaptation to new circumstances. We designed a frame work algorithms to carry out real – time network traffic, capture the traffic through a sample run of this algorithms. The level of performance is measured by the mean value of temperatures using an ANOVA statistics and the measurements were used to display a performance graph. It is observed that network performance suffers starvation at various levels of environmental changes, and this affects Quality of Service. Our approach is adjudged an efficient approach for network adaptive measures.

KEYWORDS:

adaptation, performance, optimal, behavior, environmental and temperature.

28 - 33

imag/pdf.ico.gif PDF

» Data on the Treatment and Survival of Patients with Parotid Cancer at the “Prof.dr. I. Chiricuţă” Institute of Oncology in Cluj-Napoca

» Octavian CHIŞ, Silviu ALBU, Georgia CIREBEA, Marilena CHEPTEA and Corina VERNIC

ABSTRACT:

The cancer of the parotid gland, a major pair salivary gland, is considered a rare entity, dealt with in surgery and oncology centers of head an neck.
Material and Methods. The authors analyze data recorded for 135 patients suffering from primary parotid cancer, selected according to the criteria chosen for the inclusion in the present study.
The treatment consisted of surgery or surgery followed by radiotherapy and was administered between 1995 and 2008 at the “Prof. Dr. I. Chiricuţă” Institute of Oncology in Cluj-Napoca. Both univariate and multivariate methods of statistic analysis have been employed.
Results. The authors conclude that the disease-free interval after 3 years was of 78.5% with a general survival rate of 88%, while after 5 years, these variables had the value of of 71.5% and 80.7% respectively.
Conclusion. The results indicate that the post-therapeutic interval at 3 years was significantly influenced by parameters pT and pN, at 5 years by age and pT, while the survival rate at 3 years was influenced, with statistic relevance, by age, pstage, pT, category pN, and the perineural invasion, while at 5 years by age and pT.

KEYWORDS:

primary parotid cancer, surgery, radiotherapy, post-therapeutic survival, significance factors.

34 - 40

imag/pdf.ico.gif PDF

» Interaction between Anemia and Blood Levels of Iron in Hospitalized Children

» Ionela Nicoleta SIMION, Constantin ILIE, Sorin URSONIU and Corina VERNIC

ABSTRACT:

The aim of this study was to investigate the relationship between anemia and serum iron levels. This research was performed on 363 children (mean age 5.43± 0.3) hospitalized in Louis Turcanu Children’s Hospital of Timisoara. We observed iron deficiency anemia (IDA) in 43 children, iron deficiency without anemia (ID) in 32 children and only anemia (ferritin level normal) (OA) in 32 children, and 158 children were regarded as controls (C). The levels of iron and ferritin in serum were significantly lower in children with IDA than those of controls (p< 0.001). The most affected groups with IDA were children between 1 and 3 years old and those from rural areas, possible due to bottle-feeding with cow’s milk and rapidly growth. The serum iron level in IDA group was found significantly lower than in the other groups as expected. There is positive correlation between iron levels and hemoglobin (Hb) levels (r=0.44, p<0.001).

KEYWORDS:

Children; Iron Deficiency Anemia; Iron; Ferritin.

41 - 44

imag/pdf.ico.gif PDF

» Effects of System Paging / Thrashing Overhead on System Performance Based on Degree of Multiprogramming

» Akhigbe–Mudu Thursday Ehis

ABSTRACT:

There is usually a strong concern about the functionality of computer systems and very little concern about its performance. In general, performance becomes an issue only when the performance becomes perceived as being poor by users. Major constraints on systems show themselves in form of external symptoms, stress conditions and paging being the chief forms. Thrashing occurs when a computer’s virtual memory subsystem is in a constant state of paging, rapidly exchanging data in memory for data on disk, to the exclusion of most application processing. This causes the performance of the system to degrade by multiple orders of magnitude. We developed analytical models with computational algorithms that provide the values of desired performance measures. Lyaponuv stability criteria provide sufficient conditions for the system validity, the result shows that the savings generated from the page- based, offsets the additional time needed to process the increase number of page-faults.

KEYWORDS:

Paging, Thrashing, Multiprogramming, Interfault, Frames and overhead.

45 - 53

imag/pdf.ico.gif PDF

» Detecting DDoS Attack in an Agent-Based Virtual Knowledge Communities

» G. O.Ogunleye, O.S. Adewale and B.K. Alese

ABSTRACT:

Virtual knowledge community (VKC) is a virtual place where agents can meet, communicate and interact among themselves. However, security is a basic challenge in a VKC networked environment. Distributed Denial of Service (DDoS) is currently a prevailing threat in the network communities. In this paper, we set up an experiment using the vmware workstation and Java Agent Development (JADE) as our test-beds to ascertain the detection of DDoS in VKC environment. Our contribution in this paper is to monitor the arrival rate of each of the source ip address. Consequently, ip address that has the highest occurrence within a particular time is suspected to be a DDoS attack. A graph is embedded in our work to illustrate our approach.

KEYWORDS:

DDoS, Mobile Agent, VKC.

54 - 60

imag/pdf.ico.gif PDF

» Etude Comparative des Méthodes Hessiennes pour l’Optimisation des Puissances Actives

» L. Abdelmalek and M. Rahli

ABSTRACT:

This paper presents some methods to solve an economic load dispatch problem. The problem is solved by quasinewtonnien methods algorithm. We compute active and reactive power transmission losses and maintain it constant in optimal power flow calculation procedure. In that case, we use penalty function which permit to find optimum power generation, the results of the minimum fuel cost and computing time are slightly the same. The proposed approach has been applied for the first time to 30 bus test system and the results are judged satisfactory

RESUME:

Dans le présent article, nous présentons une étude comparative des méthodes de résolution de la répartition optimale des puissances actives basées sur la programmation non linéaire [Him72]. Ces méthodes dérivent des méthodes quasi-newtoniènnes [Him72, Min83 et DH88] et comme leur principe se base sur les problèmes non contraints et que le notre est contraint, nous avons utilisé la fonction de pénalité mixte qui permet de trouver les puissances actives optimales à générer sous les contraintes de type égalité et inégalité. Nous devons souligner que ces méthodes sont utilisées pour l'optimisation des puissances actives et que nous avons appliquée au même réseau 30 nœuds [FS68].

MOTSCLES:

Réseaux électriques, optimisation, méthodes hessiennes, puissances actives.

61 - 66

imag/pdf.ico.gif PDF

» Detection of Renal Cysts by a Method of SVM Classification

» Mekhaldi Nadia and Benyettou Mohamed

ABSTRACT:

During the last years the medical imagery became a vital part for detection, diagnostic and treatment of cancer. In the majority of the cases the medical imagery is the first stage in the prevention of certain diseases of cancer. The medical imagery allows a fast treatment, an effective storage and a rapid transmission of the images for diagnostic on remote sites. In the current work, we present a system for processing CT images and MRI kidney, which is based on the Split and Merge method for segmentation step, and application of SVM (Support Vector Machine) for detecting abnormalities in these images.

KEYWORDS:

Images scanning’s, Split & Merge, segmentation, SVM, lesions.

67 - 71

imag/pdf.ico.gif PDF

» Influence de l’emplacement d’une ferme éolienne sur le Dispatching Economique Environnemental

» Lahouaria BENASLA, Abderrahim BELMADANI and Mostefa RAHLI

RESUME:

Aujourd'hui, l'énergie éolienne est devenue une réalité mondiale incontournable. L'évolution de la capacité de production d'électricité par éoliennes n'a pas cessé d'augmenter depuis 1980. L'industrie éolienne est en mesure de devenir une industrie énergétique mondiale si on se base sur l'accélération des installations dans la dernière décennie. L'énergie éolienne, dont la production ne s'accompagne pas d'émission de gaz à effet de serre, est une solution intéressante pour remplacer les combustibles fossiles tels que le pétrole. Dans cet article, nous étudions l’effet de l’emplacement et de l’incorporation d’une ferme éolienne dans un réseau d’énergie électrique sur le Dispatching Economique Environnemental (DEE) en appliquant « Fast Harmony Search Algorithm » (FHSA). Les simulations sont faites en considérant en premier lieu le réseau tel qu’il est (sans ferme éolienne) ensuite avec l’incorporation d’une ferme éolienne. Les résultats sont comparés en termes de coût de production et d’émissions de gaz à effet de serre.

MOTSCLES:

Dispatching Economique Environnemental, FHSA, ferme éolienne, emplacement optimal.

72 - 80

imag/pdf.ico.gif PDF

» A GeoGebra Approach of the Complex Erosion Modeling

» Tiberiu Marius KARNYANSZKY, Ovidu KISS and Adrian Ionuţ BOGĂŢAN

ABSTRACT:

More emphasized while the technology developed in the last years, some category of materials are difficult to process by regular techniques (requiring high energy, special conditions or high quality tools), but nowadays there can be processed at lower costs using nonconventional technologies. At once, using computer programs in correlation with the technological process increases the accuracy of results and reduces the processing time. These computer programs can be designed to assist the human operator at the processing using al kind of technologies, including the nonconventional methods (as the complex electric-electrochemical erosion – named also the complex erosion). After collecting data from a database, containing all experimental results, the program computes a modeling of the process and etsblish the optimum process parameters.

KEYWORDS:

complex erosion, complex electrical and electrochemical erosion, software modeling, GeoGebra.

81 - 85

imag/pdf.ico.gif PDF

» Model of Fault Detection and Recovery for Wireless Sensor’s Network

» Humayun BAKHT

ABSTRACT:

Wireless Sensor’s networks (WSN’s) are type of wireless ad hoc networks with reduced or no mobility. These networks combine wireless communication with minimal onboard computation facilities for sensing and monitoring of physical and environmental phenomena. Much work has been reported on different aspects of wireless sensor’s networks; however, less attention has been paid on addressing fault detection and recovery in these networks. Fault could be any thing which can lead communication break down as a whole or part of a wireless sensor’s network. Thus, detection of such fault attains a primary focus to support smooth communications within such networks.
Mobile Ad-hoc On Demand Data Delivery Protocol (MAODDP) belongs to on-demand data delivery type routing family of mobile ad-hoc networks. MAODDP has since then been extended to offer similar services in WSN’s. The contribution of this paper is to introduce an efficient fault detection and recovery mechanism for WSN’s network. We believe this two step model can offer a robust solution for the fault management in Wireless Sensor’s Network.

KEYWORDS:

MAODDP; Fault Detection; Fault Management; Wireless Sensors Network.

86 - 88

imag/pdf.ico.gif PDF

» Discover Sequential Transitional Patterns from Transactional Databases

» Sujatha Dandu, Deekshatulu B.L. and Priti Chandra

ABSTRACT:

Transaction databases have been extensively mined for patterns of different kinds ranging from frequent patterns to maximal patterns and emerging patterns. Recent studies have extended the research in pattern mining to include the time stamp of each transaction resulting in the discovery of transitional patterns whose frequencies change significantly over time.This paper focuses on generating interesting sequences of transitional patterns. Transaction databases are divided into lists of transactions belonging to specific sequences. A sequence could be a set of transactions belonging to a customer in a retail store or a set of page visits by a specific user. Transitional Patterns are generated on each sequence and assigned unique ids so they can be treated like items and itemsets. The sequence database thus created can be input to any standard algorithm like GSP and PrefixSpan to generate sequences of transitional patterns. We have designed a new algorithm called the sequential TP-Mine by combining the steps of transitional pattern generation and sequence generation and conducted experiments by running this algorithm on multiple standard datasets.

KEYWORDS:

Frequent Patterns, Sequential Patterns, Transitional Patterns, Association Rules.

89 - 96

imag/pdf.ico.gif PDF

» Automatic Segmentation of Tree Drawings for Psychological Tests

» Florentina Anica PINTEA, Laurenţiu Dan LACRĂMĂ and Corneliu Ioan TOMA

ABSTRACT:

In this paper we present a segmentation method of trees drawn on paper for psychological tests. The crown and trunk of the tree can be individually identified. After obtaining the two regions, the data found will be used in the future to achieve an algorithm that helps the psychologist to detect some profile significances of the person who drew the tree.

KEYWORDS:

binary segmentation, the tree test, image processing.

97 - 100

imag/pdf.ico.gif PDF

» Comparison between the empirical and mathematical methods in the administration of radioiodine in hyperthyroidism

» Alexandrina Sabo, David Leontin, Claudiu Peştean, Doina Piciu, Marilena Cheptea and Corina Vernic

ABSTRACT:

The aim of the study is to demonstrate the utility of a personalized formula in order to calculate the optimal activity to be administrated with the intention to treat hyperthyroidism, in comparison with the empirical method where fixed activities are administrated to the patients with hyperthyroidism. The result showed that the individual dose addicted to the mathematical method succeed in the hyperthyroidism in 29 cases comparative to 23 cases.

KEYWORDS:

hyperthyroidism, radioiodine, empirical method, personalized calculation method, recurrence.

101 - 104

imag/pdf.ico.gif PDF

» Using Pattern Recognition Techniques for Psychological Tests

» Florentina Anica PINTEA, Laurenţiu Dan LACRĂMĂ and Corneliu Ioan TOMA

ABSTRACT:

This paper presents the use and development of some techniques for the patterns recognition and their integration into a system of automatic evaluation of the psychological tests. The proposed theme is aimed at achieving a pattern processing program that will help diagnose psychological cases faster. Data gathered by the psychologist will be introduced in the processing program, the results being then compared, by following the effect of automatic interpretation.

KEYWORDS:

Pattern recognition, neural networks, automatic evaluation.

105 - 108

imag/pdf.ico.gif PDF

» An Adaptive Hierarchical Access Control Architecture for Enterprise Network using Compliance Variance

» Sodiya A.S. and Orunsolu A.A.

ABSTRACT:

Enterprise networks are integral components of most modern day businesses especially in today’s high technology environment. The smart environment created by enterprise networks allows seamless interactions and automation. As a result, many enterprise communication netwoks require security infrastructure that ensures access permissions only to legitimate personnel. In this paper, an adaptive access control model is proposed to provide a smart method for managing, regulating, checking and ensuring only valid permissions in a hierarchical enterprise environment. The proposed adaptive access control offers a security protection framework that governs all information flow (e.g. connectivity, services, resource utilization etc.) within an enterprise network. All valid permissions and access control decisions are defined based on the security hierarchy using a privilege graph. An algorithm is developed to check compliance variance in the default access computation before access is granted. Each hierarchy of the enterprise network in the proposed approach has a membership set which defines access criteria. The access criteria are modeled using composition algebra because of its efficient policy specification characteristics. The analysis of the proposed system shows a system that can guarantee efficient control and utilization of resources in an enterprise network.

KEYWORDS:

Adaptive systems, Roles, Access control, Hierarchical enterprise networks, Network Security.

109 - 115

imag/pdf.ico.gif PDF

» www.fcia.tibiscus.ro |  » www.ccsitia.tibiscus.ro |  » www.geogebra.tibiscus.ro |  » www.tibiscus.ro |  © 2003-2017, Last update: 18.08.2017 / 12:30