{"title":"Identifying the Effect of Model Modifications in State-Based Models and Systems","authors":"L. Tahat, Nada Almasri","doi":"10.14419/JACST.V2I1.538","DOIUrl":"https://doi.org/10.14419/JACST.V2I1.538","url":null,"abstract":"System modeling is a widely used technique to model state-based systems. System models are often used during the development of a software system, e.g., in partial code generation and in test generation. Several modeling languages have been developed to model state-based software systems, e.g., EFSM, SDL, and State Charts. Although state-based modeling is very useful, system models are usually large and complex, and they are frequently modified because of specification changes. Identifying the effect of these changes on the model and consequently on the underlying system is usually challenging and time-consuming. In this paper, we present an approach to automatically identify the effect of modifications made to the model. The goal is to identify those parts of the model that may exhibit different behaviors because of the modification. These are usually critical parts of the system that should be carefully tested. In this approach, the difference between the original model and the modified model is identified, and then the affected parts of the model are computed based on model dependence analysis. An empirical study on different EFSM models is performed in order to identify the affected parts of the model after a modification. The results of the study suggest that our approach could considerably reduce the amount of time and efforts spent to validate the model after a modification.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134058971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptation and research development in the spectrum of methods with advanced access in the area of communication and computer system","authors":"Nderim Zeqiri","doi":"10.14419/JACST.V2I1.580","DOIUrl":"https://doi.org/10.14419/JACST.V2I1.580","url":null,"abstract":"In some models that set new principles of work, there appears to require the implementation and adaptation of computer resources in terms of hardware and software adaptation. This method entails the extension of the current system versus research perspectives in the context of programs, models and restructuring in line with other development, hardware or software, or adjustment to learning in electronic form; the interaction of many processes, to create a sustainable system through increased research and adoption of safety and suitability. So in this paper we present models and alternative approaches to achieve a better perspective in the field of restructuring and adjustment of the model with the program and hardware resources. In many cases is needed a quick access method which is specified in the context of generating appropriate values ??for digital systems","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Minimization of Nonsmooth Functions in the Limit Analysis Problem for Dielectrics in Powerful Electric Fields","authors":"I. Brigadnov, Ekaterina M. Fedotova","doi":"10.14419/JACST.V1I4.519","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.519","url":null,"abstract":"The problem of minimization of ill-conditioned functions is considered. This problem arises as a result of finite-element approximation of the limit analysis problem for dielectrics in powerful electric fields. The objective function is nonsmooth therefore a smooth regularization of finite-dimensional problem is used. As a result distinct ravine of objective function is acquired. Convergence of the gradient and the heave-ball methods in relation to its internal and optimization parameters are studied inside the numerical computing environment and fourth-generation programming language Matlab.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Virus: Their Problems & Major attacks in Real Life","authors":"J. Joshi, B. V. Patil","doi":"10.14419/JACST.V1I4.318","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.318","url":null,"abstract":"Today's enterprise networks are distributed to different geographical locations and applications are more centrally located, information represents the most important asset. With the growing number of data communication services, channels and available software applications, data are processed in large quantities and in a more efficient manner. This technological enhancement offers new flexible opportunities also measure security threats poses in the networks. These threats can external or Internal, external threats divided as hacking, virus attack, Trojans, worms etc. There are thousand and thousand of different viruses these days which improve every day. Although the wild spread of new and strong viruses, it still infects and spread only with user's permission. This research paper highlights the phases of computer virus, computer virus, history of worst computer attack, type of computer virus with effect on computer & few examples of virus on their types, working of computer virus, and problem occur due to virus in computers.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115690987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Simulation of Sandwich Sheet Metal Forming","authors":"I. Brigadnov","doi":"10.14419/JACST.V1I4.536","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.536","url":null,"abstract":"Large elastic-plastic deformations of sandwich composite sheets are computer simulated. Within a framework of the shell theory, the elastic-plastic constitutive relation for transversely anisotropic sandwich sheet taking into account of the Bauschinger effect is discussed. Results of the computer simulation of a hemispherical punch stretching operation are demonstrated.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INAPSAC: A New Robust Inlier Identification Technique","authors":"Radha Myilsamy, R. Muthukrishnan","doi":"10.14419/JACST.V1I4.509","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.509","url":null,"abstract":"Robust statistical methods were first adopted in computer vision to improve the performance of feature extraction algorithms at the bottom level of the vision hierarchy. These methods tolerate the presence of data points that do not obey the assumed model such points are typically called “outlier”. Recently, various robust statistical methods have been developed and applied to computer vision tasks. Random Sample Consensus (RANSAC) estimators are one of the widely applied to tackle such problems due to its simple implementation and robustness. There have been a number of recent efforts aimed at increasing the efficiency of the basic RANSAC algorithm. N Adjacent Points Sample Consensus (NAPSAC) is one of the RANSAC method used in computer vision task. In this paper a new algorithm is proposed which is the modified version of NAPSAC with 2-sphere method. The accuracy of the proposed algorithm has been studied through a simulation study along with the existing algorithms in the context of RANSAC techniques.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Manikantan, Vaishnavi Govindarajan, S. SasiKiranVV, S. Ramachandran
{"title":"Face Recognition using Block-Based DCT Feature Extraction","authors":"K. Manikantan, Vaishnavi Govindarajan, S. SasiKiranVV, S. Ramachandran","doi":"10.14419/JACST.V1I4.484","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.484","url":null,"abstract":"Face recognition (FR) with reduced number of features is challenging and energy based feature extraction is an effective approach to solve this problem. However, existing methods are hard to extract only the required low frequency features, which is important for capturing the intrinsic features of a face image. This paper proposes a novel Block-Based Discrete Cosine Transform (BBDCT) for feature extraction wherein each 8x8 DCT block is of adequate size to collect the information within that block without any compromise. Individual stages of FR system are examined and an attempt is made to improve each stage. A Binary Particle Swarm Optimization (BPSO)-based feature selection algorithm is used to search the feature vector space for the optimal feature subset. Experimental results show the promising performance of BBDCT for face recognition on 4 benchmark face databases, namely, ORL, Cropped UMIST, Extended Yale B and Color FERET databases. A significant increase in the overall recognition rate and a substantial reduction in the number of features, are observed.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121672529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sofiane Hamrioui, M. Daoui, Linda Chamek, M. Lalam, P. Lorenz
{"title":"Incidences of the improvement of the interactions between MAC and routing protocols on MANET performance","authors":"Sofiane Hamrioui, M. Daoui, Linda Chamek, M. Lalam, P. Lorenz","doi":"10.14419/JACST.V1I4.410","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.410","url":null,"abstract":"In this paper, we present an improvement for the interactions between MAC and routing protocols to better energy consumption in MANET (Mobile Ad hoc Networks) and show its incidences on the performance of the network. We propose a new approach called IMREE (Improvement of the Interactions between MAC and Routing protocol for Energy Efficient) which exploits tow communication environment parameters. The first one is the number of nodes; our approach reduces the additional energy used to transmit the lost data by making the size of the backoff interval of MAC protocol adaptable to the nodes number in the network. The second parameter is the mobility of nodes; IMR-EE uses also the mobility of nodes to calculate a fairness threshold in order to guarantee the same level of the residual energy for each node in the network. We evaluate our IMR-EE solution with NS (Networks Simulator) and study its incidences on data lost and energy consumption in the network under varied network conditions such as load and mobility. The results showed that IMR-EE outperform MAC standard and allows significant energy saving and an increase in average lifetime of a mobiles nodes in the network.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Synchronization of Lorenz-Stenflo System with Delay","authors":"Mohammad Ali Khan","doi":"10.14419/JACST.V1I4.385","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.385","url":null,"abstract":"This paper presents the hybrid-synchronization between two hyperchaotic Lorenz-Stenflo system with delay. Here we design active controllers so that two pairs of states are synchronized and other two pair of states are anti-synchronized. Numerical results verify that both synchronization and anti-synchronization can co-exist in the hyperchaotic Lorenz stenflo system.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133954603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Periodic and Soliton Solutions of (2 + 1)-Dimensional Soliton Equation","authors":"S. Arbabi, Maliheh Najafi, M. Najafi","doi":"10.14419/JACST.V1I4.384","DOIUrl":"https://doi.org/10.14419/JACST.V1I4.384","url":null,"abstract":"By using the sine-cosine method proposed recently, we give the exact periodic and soliton solutions of the (2 + 1)-dimensional soliton equation in this paper. Many new families of exact traveling wave solutions of the (2 + 1)-dimensional soliton equation are successfully obtained. The computation for the method appears to be easier and faster by general mathematical software.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}