CSE-11 Program CSE -11 Conference, 19--21 December 2011, Kalyon Hotel, Istanbul, Turkey ICGST International conference on Computer Science and Engineering, CSE-11 emphasizes on efficient research and development techniques and provides a central forum for scientists, researchers, engineers and vendors from different disciplines to exchange ideas, identify problems, investigate relevant issues, share common interests, explore new approaches, and initiate possible collaborative research and system development. The CSE-11 significantly benefits a wide variety of academic and industrial sectors. 1 CSE -11 Conference Program From 8:30 9:30 10:40 Monday, 19 December 2011 (8:30 -- 17:30) To 9:30 10:40 11:00 Subject Registration Opening Ceremony, Agenda Overview and Best Paper Award of AIML-11 Conference First break Keynote Speech on “INTELLIGENT WORKPIECE DETECTION ON CNC 10:50 11:30 MILLING MACHINE", J. Balic “A study on the mechanism for growth process reproduction of 11:30 11:50 exhibition or performance tree shape robot”, Hong Seok Lim, “PROPOSED UWB REAL-TIME POSITION TRACKING SYSTEM FOR 11:50 12:20 CARDIOLOGICAL IVUS CATHETER”, DIMITRIOS FOTIADIS, 12:20 13:00 Lunch Break “Optimization of Urban Bus Gearbox Ratios for Minimization of Fuel 13:00 13:20 Consumption and Pollutant Emissions”, Roberto Melli, 13:20 13:40 13:40 14:00 14:00 14:20 14:20 14:40 “A Precise Shape Estimation in Occluded Region between Plural Human Bodies for Shape Reconstruction based on Fast Level Set Method”, Ikeshiro kazuo, Hiroki Imamura, “Mobile augmented reality architecture for indoor area with markerless tracking”, Jan Štafa, Jan Keller, “Improved Context-Aware Saliency Using Local Search Window”, Amr R. Abdel-Dayem “Multi-Sensor Image Fusion Using Temporal Object Detection”, Melih Altun, P1131133748 P1161133729 P1111133718 P1151133731 P1141133756 P1151139820 P1151133713 14:40 15:00 Second Break “INNOVATION OF MULTI FIBER COUPLING OF FUSED SILICA FIBER”, 15:00 15:20 Toto Saktioto, “Suppression of Multitone Narrowband Interference for Orthogonal 15:20 15:40 Multi-carrier DS-CDMA System”, Ahmed El-Mahdy 15:40 16:00 16:00 17:00 P1171129661 P1181134766 “Lightweight and Distributed Wormhole Attack Detection for Wireless Sensor Networks Based on Graph Neuron”, MONEER P1141133721 ALSHAIKH Notes on LaTex Setup 2 Tuesday, 20 December 2011 (9:00 -- 17:30) From To Subject 9:00 9:40 Keynote speech on “Emotions, Decisions, Cognition”, Ana Lilia LAUREANO-CRUCES 9:40 10:00 Model” , Ana Lilia Laureano-Cruces, 10:00 10:20 10:20 10:40 Manuscript “Visual Simplified Characters’ Emotion Emulator Implementing OCC “GRASP Compared with other Heuristics to Find Minimal Reducts”, Iris Iddaly Méndez-Gurrola “Using Tailored Chaotic Sequences In 3D Watermarking”, Amira E.Youssef P1121138815 P1121137808 P1151143900 10:40 11:00 First break “State Estimation for Linear Discrete-Time Systems with Uncertain 10:40 11:00 Parameters”, Mohamed F. Hassan “Synchronization of the Hyperchaotic Lu System Using Feedback 11:00 11:20 Linearization Controllers”, Mohamed Zribi, “Optimization of the Pulping Process: Polynomial vs. Neural Network 11:20 11:40 Models”, Wan Rosli Wan Daud “USING FUZZY LOGIC TO SOLVE END EFFECTS OF HHT”, 11:40 12:00 Nghien Nguyen Ba, “Pattern Matching Techniques: A Survey Study Conducted on Social 12:00 12:20 Security Numbers and Date of Births”, Cihan Varol, 12:20 13:00 Lunch Break “Screening of Retinal disorders by the Detection of Microaneurisms 13:00 13:20 and Hemorrhage”, Nahed H. Solouma, “A New Presentation Method of Nucleotide Sequences Minimizes 13:20 13:40 Storage Size and Processing Time”, Osama Fekry, “Sequence Alignment Framework Using Parallel Particle Swarm 13:40 14:00 Optimization” , Amgad Kamal, 14:00 14:20 “Wavelet Neural Networks with a New Translation Vector Initialization Approach for Multiclass Cancer Classification”, Zarita Zainuddin, P1111130668 P1111132678 P1111140861 P1121133705 P1121137802 P1151137803 P1161137804 P1161133742 P1121140859 14:20 14:40 Second Break “Enhancing Particle Swarm Optimization for Feature Combination 14:40 15:00 Optimization”, Fang-Fang Wang, Li-Fei Chen, Kun-Huang Chen, “Process Optimization Using Meta-heuristic Algorithms”, Hung-Chun 15:00 15:20 Lin, Prof. Chao-Ton Su, Fang-Fang Wang, Knowledge Discovery from Support Vector Machines with Application 15:20 15:40 to Credit Screening, Yan-Cheng Chen, Chao-Ton Su, 15:40 16:00 16:00 17:00 Improving Text Sentiment Classification Performance by Balancing Positive and Negative Features, Long-Sheng Chen, Chia-Wei Chang, Chun-Chin Hsu, LaTex Environment programming 3 P1121133730 P1121133726 P1121133727 P1121132687 Wednesday, 21 December 2011 (9:00 -- 17:30) From To Subject Manuscript Keynote speech on “Software Engineering Models, Metrics and Tools Research – Progress and Challenges”, Narayan C. Debnath 9:00 9:40 9:40 10:00 Ismail Biskri, Boucif AMAR BENSABER, Abdelghani Amazit, Adel Omar P1141133744 Impact of physical layer interference on HARQ in LTE technology, 10:00 10:20 Dahmane, “Combinatory logic and language engineering” , Ismail Biskri, Boucif P1121133746 AMAR BENSABER, 10:20 10:40 First break “Modes detection of color histogram for color image segmentation”, 10:40 11:00 Halima REMMACH, “Robust method to identify Adult Video based on Face and Skin 11:00 11:20 detection”, Hajar Bouirouga, P1151133745 P1151132682 “Shaping optimal parameters selection for most favorable robustness 11:20 11:40 and imperceptibility in watermarking in the DWT domain”, Seddik 11:40 12:00 12:00 12:20 Hassene, “Genetic Algorithm for Optimal PMU Placement in Contingency Condition”, Houssem BEN ARIBIA, « Management de projet logiciel selon le référentiel PMBOK Modélisation et application à l’étude d’un projet de réseaux informatiques », Safaa ERRIHANI, P1151132703 P1111133717 P1141133720 12:20 13:00 Lunch Break « Utilisation des HOS pour le Calcul du Filtre Optimal et de la 13:00 13:20 réduction du temps de Convergence en DMT », H. Bellahsene, « Contribution au diagnostic des événements défaillants dans un 13 :20 13 :40 système dynamique hybride », Bellahsene Noura-Razika, P1111133747 P1111134764 “Meteorological satellite images modeling using autoregressive P1111133718 13 :40 14 :00 process” P1111128655 14 :00 14 :20 “Multivariable PID Controller for Lateral Motion of Aircraft” 14:20 14:40 Second Break Posters (Classification of Vertically Distributed Data using Directed Acyclic Graph, 14:40 15:20 15:20 15:40 P1111141872 Prof. Dr. Ahmed Khedr,) “COMPARISON OF ALGORITHMS FOR DETECTING COMMUNITY STRUCTURES IN NETWORKS”, B. Ardıl (Turkish) “THE NETWORK SIMULATOR NS2”, Mehmet BİRLİK (Turkish) 15:40 16:00 16:00 17:00 Closing Session Best Paper Award and Closing Session 4 P1141150085 P1141150086 ABSTRACTS A development of the exhibition or performance tree shape robot having agrowth reproduction function Hong Seok Lim1*, Suk Yoon Jang1 and Young Jea Ahn1 1Intelligent Control Team, Incheon Intelligent Robotics Center 8F Incheon IT Tower, 592-5 Dowhadong, Namgu, Incheon, Korea limit75@paran.com, syjang@iit.or.kr, yjahn@iit.or.kr Abstract The tree shape robot is mainly applied at the exhibition or performance. In order to take the eyes of the spectator, the moving function, reproducing the fast growth process of tree, is important function of the tree shape robot. This paper proposed the mechanism to reproduce growth process of tree shape robot which is used at the exhibition or performance. Proposed mechanism for growth process of tree shape robot consists of a steel structure, spring, coil spring, pulley and wire actuated by power cylinder. Using this mechanism, we manufacture the exhibition or performance tree shape robot with a growth reproduction function and demonstrate capability of the manufactured prototype. Keywords: tree shape robot, growth reproduction Optimization of Urban Bus Gearbox Ratios for Minimization of Fuel Consumption and Pollutant Emissions Romano Impero Abenavoli and Roberto Melli Dipartimento di Ingegneria Meccanica e Aerospaziale, Universita’ di Roma "La Sapienza", Roma, Italy ( e-mail: romano.imperoabenavoli@uniroma1.it, roberto.melli@uniroma1.it). http://www.dima.uniroma1.it/dima/ Henryk Kormanski and Krystyna Rudzinska Faculty of Electronics, Telecommunication & Informatics, Gdansk University of Technology, Gdansk, Poland ( e-mail: korman@eti.pg.gda.pl, rudko@eti.pg.gda.pl ). http://www.eti.pg.gda.pl/ Abstract The paper discusses methodology of optimal gearbox ratios selection and its application to urban buses for better fuel consumption minimization and/or pollutant emission reduction. Specific urban traffic conditions allow designers of power trains to select gearbox ratios so that mass transportation buses will be more ecological and energy–efficient maintaining the same bus drivability. The paper presents a method for determining the gearbox ratios based on a numerical algorithms of nonlinear programming, which cooperate with simulation procedures. They consist of three software modules: “Model of bus motion”, “Power train model” and “Model of constraints”. The analysis of the results shows that the methodology presented in this paper is effective and reliable. Fuel consumption and the pollutant emissions may be decreased from 7% to 15%, without worsening the bus drivability, only by gearbox optimization. Keywords: Optimization, Modeling, Design of gearbox with a discrete set of ratios, Fuel consumption / pollutant emissions minimization, City bus motion simulation. 5 Lightweight and Distributed Wormhole Attack Detection for Wireless Sensor Networks Based on Graph Neuron M. Alshaikh, A. Khan Faculty of Information Technology, Monash University , Melbourne, Australia maals4@student.Monash.edu Asad.khan@Monash.edu, Abstract Wormhole attack is a very serious issue as it threatens damage routing protocol functionality. Wormhole attack is also difficult to detect. Many studies have attempted to deal with wormhole attack detection, yet existing wormhole detection techniques remain ineffective because they either do not consider the resource constraints of WSNs or require special hardware. Hence, we attempted to design a distributed wormhole detection technique, implanted using GN theory.This paper proposed a distributed wormhole detection technique.The proposed detection technique utilises a GN algorithm to detect the attack tunnel. The network legal connectivity is represented as patterns. Then the network will be monitored by the GN application to detect any change in its legal connectivity graphs, which would indicate an attack. The system assumptions and network architecture for this detection technique were carefully developed to achieve better detection accuracy for the network than did previous attempts to improve WSN security. The results of the simulation demonstrate that our proposed detection technique enjoys reasonable accuracy. Keywords: Wireless Sensor Networks (WSNs) , Graph Neuron(GN), Wormhole Attacks. Impact of physical layer interference on HARQ in LTE technology A. Amazit1, B. Amar Bensaber1, A. Dahmane2 , I. Biskri1 1Laboratoire de Mathématiques et Informatique Appliquées (LAMIA) Department of Mathematics and Computer Science 2Electrical and Computer Engineering Department University of Quebec at Trois-Rivières, Canada 3351 Bd des Forges C.P 500 Trois Rivières, G9A 5H7 - Qc – Canada [Amazita ,Bensaber, Dahmane, Biskri]@uqtr.ca http://www.uqtr.ca Abstract In this paper, we present a study of the impact of physical layer interference on the MAC layer operations in Long Term Evolution (LTE), in particular, on Hybrid Automatic Repeat Request (HARQ) acknowledgment mechanism. Our work consists of a campaign of tests that verify the impact and the utility of HARQ technology on the throughput, the transmission time and the number of packets versus the error rate. This work would pave the way for further research in this technology in order to improve the interaction between the most important layers, physical and Medium Access Control (MAC). Many results of the simulation using Opnet Modeler Wireless are presented1. The results obtained are very satisfactory and confirm that the mobility factor plays an important role in traffic exchanged between the nodes causing the packet loss due to collisions, obstacles and other factors caused by node mobility. To address this problem, HARQ protocol occurs in the retransmission of lost packets in an efficient manner that does not disrupt the response time or traffic between nodes. Keywords: LTE, HARQ, QOS, Interference, MAC layer. 6 Multi-Sensor Image Fusion Using Temporal Object Detection M. Altun, M. Celenk School of Electrical Engineering and Computer Science Stocker Center, Ohio University, Athens, OH, 45701 USA [ma231709, celenk]@ohio.edu http://www.ohio.edu/ Abstract This paper describes a new approach to surveillance video content enhancement using multi-spectral image data fusion. Multi-spectral video in this context consists of the visual and infrared (IR) bands. The method takes an unprecedented approach to visual and IR information integration by calculating the estimated background in both bands and detecting changes in the scene under surveillance. The foreground regions are then selected as candidate regions for image fusion at the decision level, which is performed by comparing the edges detected in the foreground with the ones detected in the estimated background. This allows the method to determine the regions which are occluded; hence, recovery is sought via information available in IR images. The idea behind this approach is to use IR information only where necessary and preserve visual information in all other regions. To highlight the objects of interest foreground regions in the IR frames are clustered and marked with bounding boxes in the resultant fused image. Keywords: Image Fusion, Video Content Enhancement, Edge Detection, Adaptive Background Extraction, Surveillance, Occlusion Detection A Precise Shape Estimation in Occluded Region among Group of Human Bodies for Shape Reconstruction relying on Fast Level Set Method KazuoIkeshiro, YoshinobuHagiwara, Hiroki Imamura,Yongwoon Choi Graduate School Information Science Soka University 1-236, Tangi-cho, Hachiouji City, Tokyo, Japan [e10d5201,yhagi,imamura,choi]@soka.ac.jp Abstract A conventional method, based on Fast Level Set Method (FLSM) for reconstruction of shapes of plural human bodies in occlusion that occurs between plural human bodies, reconstructs shape that is quite different from actual shape in case that human pose changes in occludedregion. Therefore we propose a method based on FLSM, which can precisely estimate shapes of plural human bodies even if human pose changes in occludedregion. In this method, we extract shape of each human body before occurring of occlusion using FLSM and obtain shape parts of it. In case of occurring of occlusion, we estimate a pose of each human body, and achieve precise estimation of shape of each human body by restructuring shape of each human body from estimated pose using the shape parts. Keywords:Fast Level Set Method, Occlusion, Shape Estimation. 7 Manufacturing of porous materials for dental applications through SLM F. Cardaropoli, V. Alfieri, F. Caiazzo, V. Sergi Dept. of Industrial Engineering, University of Salerno, Via Ponte Don Melillo, 84084, Fisciano, Italy [fcardaro, valfieri, f.caiazzo, sergi]@unisa.it Abstract The paper discusses the possibility of manufacturing dental implants through Selective Laser Melting (SLM) of a Ti-6Al-4V alloy powder. This alloy is widely used in biomedical applications due to high biocompatibility. SLM allows to obtain components with peculiar characteristics in terms of porosity gradient, roughness, customized geometry, and mechanical properties. Influence of input process parameters on porosity and analyses SLM capabilities in implant dentistry has been focused. Porosity is a key parameter in implant dentistry as it affects stiffness, which is related to Young’s modulus. Ti6Al-4V bulk material presents a Young’s modulus of 110 GPa, whereas bone one ranges from 10 to 26 GPa. The relative difference of mechanical properties causes the phenomenon of stress shielding, which has a detrimental effect on the longevity of the implant. Total porosity is important in reducing the effective modulus of porous metals. Specimens obtained during experimental phase have been examined in terms of porosity (in inverse ratio to relative density), microstructure, microhardness and roughness. According to test results discussed in this paper, SLM is proved to be an efficient technology for the construction of dental implants, because components with adequate properties can be obtained changing processing parameters. Other fabrication techniques fail to produce the desired features. Keywords: Selective Laser Melting, Biomaterials, Dental implants, Ti-6Al-4V, Porosity. Proposed UWB Real-Time Position Tracking System for a Cardiological IVUS catheter D. Fotiadis, A. Astaras, P. Bamidis, K. Papathanasiou, A. Kalfas Aristotle University of Thessaloniki, School of Medicine, Laboratory of Medical Informatics, Thessaloniki, Greece [dfotiadis, astaras, bamidis]@med.auth.gr, kostasp@physics.auth.gr, akalfas@auth.gr http://lomiweb.med.auth.gr Abstract Precise determination of the position of a medical device inside the human body, specifically the tip of an Intravascular Ultrasound (IVUS) catheter, is a process currently relying primarily on angiography techniques. The injection of a radio-opaque contrast agent into the bloodstream and subsequent use of contrast-enhanced Xray imaging is still the most common technique used by medical staff to track the exact position of the IVUS catheter inside the human body. This position tracking methodology has numerous shortcomings and imposes unnecessary risks on the patient, as compared to a new technology and associated methodology proposed in this paper. In the first part, a position tracking technology survey is presented, followed by the details of the proposed Ultra Wideband (UWB) methodology, a discussion of its advantages and disadvantages, as well as the definition of a development roadmap. Keywords: IVUS, UWB, SoC integration, Position Tracking, Precision Ranging. 8 Sequence Alignment Framework relying on Parallel Particle Swarm Optimization Amgad Kamal1, Ahmed Sayed2, Mohsen Mahroos3,4 and Amin Nassar4 1Valeo InterBranchAutomative Software, Smart Village, Cairo, Egypt 2Varkon Semiconductors, Cairo, Egypt 3 Umm Al-Qura University, Makkah, Saudi Arabia 4Cairo University, Giza, Egypt amgad085@gmail.com, asayed@varkonsemi.com, mmmahroos@uqu.edu.sa, aminassar@gawab.com Abstract Any biological study that compares two or more biological sequences in either an explicit or implicit manner performs the foundational procedure of sequence alignment to reason about which positions within these sequences are homologous; i.e. to find similarity regions between biological sequences. Such similarities facilitate the derivation of inferences about gene functionality and ancestry if compared to previously analyzed and characterized sequences, which can very well identify the susceptibility to certain diseases. With the great advent of parallel computing machines and architectures, it is a normal extension to develop parallelalgorithms and tools to perform sequence alignment with increased accuracy. In this paper, we propose a framework for sequence alignment relying on parallel computing of the particle swarm optimization(PSO) algorithm. We discuss the Benefits of the new framework with respect to the accuracy and scalability of the parallel PSO algorithm while scanning the relevant parameters involved. Keywords: sequence alignment; parallel programming; particle swarm optimization; message passing interface; cluster computing; bioinformatics Using Fuzzy Logic to Solve End Effects of Hilbert Huang Transform J. Kokes, N.B. Nghien Dept. of Automatic control and Engineering Informatics, Czech Technical University in Prague, Czech Republic [josef.kokes, nghien76]@fs.cvut.cz http://www.fs.cvut.cz Abstract Hilbert-Huang Transform (HHT), proposed by N. E. Huang in 1998, is a novel algorithm for nonlinear and non-stationary signal processing. However, it suffers from end effects problem. In this paper, we propose to apply Fuzzy Logic for predicting extended data at both end-sides of original data before executing Empirical Mode Decomposition (EMD) process to solve end effects problem. Our simulations showed that the method gives better result than other known methods. Keywords: HHT; EMD; IMF; Fuzzy Logic. 9 Utilisation des HOS pour le Calcul du Filtre Optimal et de la reduction du temps de Convergence en DMT H. Bellahsene, I. F. E. Fatani Departement TCSN, Faculte SNV, Universite de A/Mira Bejaia 06000, Algerie [bellahsene_ho]@yahoo.fr, http://www.univ-bejaia.dz Abstract Nous synthetisons dans cet article l’evolution de l’egalisation classique vers l’egalisation par reduction de canal. Nous appliquons le calcul du maximum de kurtosis pour retrouver le filtre TEQ (Timedomain EQualizer) optimal ainsi que le delai de synchronization dans l’algorithme du MSSNR (Maximum Shortening Signal to Noise Ratio). Nous comparons le filtre optimal retrouve par d’autres methodes et celui determine par la methode du maximum du kurtosis. Nous arrivons par utilisation des fonctions statistiques notamment gamma, a reduire de maniere consequente le delai de convergence au prix de la stabilite de l’algorithme.1 Keywords: Communications multiporteuses, HOS, kurtosis, TEQ (Time-domaine EQalizer), DMT, fonction Gamma Improving Text Sentiment Classification Performance by Balancing Positive and Negative Features Long-Sheng Chen*1, Chun-Chin Hsu2, Chia-Wei Chang1 *Department of Information Management, Chaoyang University of Technology, Taichung City, Taiwan. 2 Department of Department of Industrial Engineering and Management, Chaoyang University of Technology, Taichung City, Taiwan. [lschen, cchsu, s9814628]@cyut.edu.tw 1 Abstract To effectively identify Internet users’ sentiments, this study aims to propose a novel feature selection strategy called Category Features Oriented (CFO) method which equally selects features from both positive and negative sentiments. Moreover, support vector machines (SVM) have been employed to construct classifiers for identifying bloggers’ sentiments. Finally, one case study from real world blogs will be provided to illustrate the effectiveness of our proposed CFO approach. Compared with traditional methods including Information Gain (IG) and Fisher linear discriminant analysis (FLDA), experimental results indicated that the proposed method can improve sentiment classification performance. Keywords: Feature selection, Sentiment Classification, Support vector machines, Text mining 10 Process Optimization Relying on Meta-Heuristic Approach Hung-Chun Lin, Fang-Fang Wang, Chao-Ton Su Department of Industry Engineering and Engineering Management, National Tsing Hua University 101, Sec. 2, Kuang-Fu Rd., Hsinchu, Taiwan 30013, R.O.C. d9534801@oz.nthu.edu.tw, fangfang7276@hotmail.com, ctsu@mx.nthu.edu.tw http://www.ie.nthu.edu.tw/su/ Abstract For parameter design, Taguchi methods have been widely used in industry. When parameters are continuous values, nevertheless, Taguchi methods cannot obtain real optimal parameter combinations. Besides, traditional optimization methods begin from one point in a search area and then move sequentially to achieve a better solution, thereby operating rather locally and becoming highly prone to plummeting inside a local optimum. This study aims to discuss how to combine metaheuristic algorithms to deal with parameter design problems. A real example is presented to illustrate proposed approach’s effectiveness. Keywords: Meta-heuristic algorithms, quality engineering, Taguchi methods, parameter design. Knowledge Discovery from Support Vector Machines with Application to Credit Screening Yan-Cheng Chen and Chao-Ton Su Department of Industry Engineering and Engineering Management, National Tsing Hua University 101, Sec. 2, Kuang-Fu Rd., Hsinchu, Taiwan 30013, R.O.C. d9534818@oz.nthu.edu.tw, ctsu@mx.nthu.edu.tw http://www.ie.nthu.edu.tw/su/ Abstract Support vector machines (SVMs) are state-of–the-art tools used to address issues pertinent to classification. The explanation capabilities of SVMs are also their main weakness, which is why SVMs are typically regarded as incomprehensible black box models. We propose a rule extraction algorithm from SVMs, in which a kernel-based clustering algorithm approach integrates all support vectors and genetic algorithms into the extracted rule sets. Measurements of accuracy and comprehensibility were utilized to evaluate the performance of our proposed method on the credit screening data sets. Finally, the results indicated the practicality of the proposed method on the credit screening data sets. Keywords: Rule extraction, Support vector machines, Genetic algorithms, Credit screening. 11 Enhancing Particle Swarm Optimization for Feature Combination Optimization Li-Fei Chena, Kun-Huang Chenb and Fang-Fang Wangb a Graduate Program of Business Management, Fu-Jen Catholic University, Taipei, Taiwan b Department of Industrial Engineering and Engineering Management, National Tsing Hua University, Hsinchu, Taiwan E-mail: 075033@mail.fju.edu.tw,d9534809@oz.nthu.edu.tw,d9634816@oz.nthu.edu.tw Abstract Searching for an optimal feature combination from a high-dimensional feature space is an NPcomplete problem. Traditional optimization algorithms are inefficient when solving large-scale feature selection problems. Therefore, meta-heuristic algorithms are extensively adopted to solve the feature selection problem efficiently. This study proposes an enhanced particle swarm optimization (PSO) algorithm to avoid local optimal problem. The data sets collected from UCI machine learning databases are used to evaluate the effectiveness of the proposed approach. Classification results show that our proposed approach outperforms both genetic algorithms and sequential search algorithms. Keyword: Feature combination optimization, particle swarm optimization, sequential search algorithms Pattern Matching Techniques: A Survey Study Conducted on Social Security Numbers and Date of Births C. Varol Computer Science Department, Sam Houston State University, 1803 Ave I, AB1 214, Huntsville, TX, 77341 cvarol@shsu.edu, http://cs.shsu.edu/Faculty/varol.htm Abstract With increasing information re-produced each year, the quality of the data is subject to damage. Variations and errors in Social Security Numbers (SSNs) and date of births (DOBs) make business decisions problematic to be applied. In this survey paper, the sources of errors in SSNs and DOBs are discussed and also the pattern matching techniques that can be useful to fix the problems are evaluated. At the end, the algorithms are compared in terms of their efficiency and correction rates in SSNs and DOBs prediction. Jaro algorithm provided the highest correction and precision rates among all pattern matching algorithms for the SSNs and DOBs. Keywords: data quality, date of birth, pattern matching, social security number, string matching 12 Robust Identification of Adult Video based on Face and Skin Detection Hajar BOUIROUGA1, Sanaa EL FKIHI2, Abdelilah JILBAB3 and Driss ABOUTAJDINE4 LRIT, unité associée au CNRST,FSR, University Mohammed V Agdal,Rabat, Morocco1,4 ENSIAS, Mohammed V University Souissi Rabat, Morocco2 ENSET, Madinat Al Irfane Rabat-Instituts Rabat, Morocco3 Abstract Extracting high level characteristics is an important field in video indexing and retrieving. Our work proposes a method for identifying video adult. The proposed algorithm includes the detection of the human face based on the colour and motion information, skin colour races, backgrounds and faces' sizes. Besides, the proposal takes into account the object motion, skin and non skin areas as well. Experimental results demonstrate the successfulness of the algorithm used and its capability in recognition of adult video. Keywords: Skin detection, classification, adult videos, face detection, neural network. Shaping optimal parameters selection for most favorable robustness and imperceptibility in watermarking in the DWT domain Hassène Seddik and Ezzeddine Ben Braiek ESSTT, 5 Av. Taha Hussein, 1008, Tunis, Tunisie E-mails, hassene.seddik@esstt.rnu.tn and Ezzedine.BenBraiek@esstt.rnu.tn Abstract The widespread of new image technologies and data exchanges has created the need for new techniques able to insure copyright protection and data owner identification. Considering the deficiencies of steganographie and cryptography, watermarking is nowadays a new technique that provides an efficient mean for resolving these problems. Watermark embedding techniques depend on the representation domain of the image (spatial, frequency, and multiresolution). Every domain has its specific advantages and limitations. Moreover, each technique in a chosen domain is found to be robust to specific sets of attack types. The ultimate goal of each technique is to allow the embedded watermark to be invisible and robust against a wide range of attacks. The most damaging unintentional attacks are compression techniques. Many of these last techniques are based on the new coding procedures using Multiresolution domain. In order to develop a watermarking technique robust against large sets of attacks, we must exploit this domain to overcome these attacks constraints. In this paper, a study is developed considering all the parameters contributing in the watermarking scheme. An optimal point allowing robustness and imperceptibility of the embedded watermark is established. Using these optimized parameters any technique based on the multiresolution domain can reach the maximum of imperceptibility and robustness. These results can immediately be injected in previous algorithms to improve their results or to build new techniques outputting directly better results. Keywords: robust Image watermarking, wavelet transform, Stirmark, parameters optimization. 13 INNOVATION OF MULTI FIBER COUPLING OF FUSED SILICA FIBER Saktioto1,2, D. Irawan1,M. Hamdi1,2, Defrianto2, J.Ali1 1Institute of Advanced Photonics Science, Faculty of Science, Universiti Teknologi Malaysia Johor, Malaysia. 2Physics Dept, Math and Sciences Faculty, University of Riau, Pekanbaru, Indonesia saktioto@yahoo.com Abstract This paper presents the estimation of normalized coupling power among multi coupled fibers. Power transfer between the fibers has been determined based on coupled mode theory using Transfer Matrix Method. Theoretical calculation has shown that power in a fiber is no longer to be completely transferred to other M fibers (M>3). This is caused by the coupling coefficient between them. The coupled power or coupling ratio among M fibers can be controlled by maintaining the coupling parameters. Experimentally, the change of coupling ratio is investigated, and theoretically by applying dc voltage to the coupling region of fiber coupler. In three dimension, the coupling power distribution shows that strongly depends on the coupling coefficient and coupling length. However, by knowing the coupling power parameters, the fiber coupler of MXN fibers are easier to be fabricated and more applicable in optical network system. Keywords: Coupling power, Coupling coefficient, Single Mode Fiber, Coupling ratio. Genetic Algorithm for Optimal PMU Placement in Contingency Condition Houssem BEN ARIBIA, Nizar DERBEL, Hsan HADJ ABDALLAH and Abderrazak OUALI Ecole Nationale d'Ingénieurs de Sfax, BP W, 3038, Sfax - Tunisie houssem_ben_aribia@yahoo.fr, dernizar@yahoo.fr, hsan.haj@enis.rnu.tn, abderrazak.ouali@enis.rnu.tn Abstract This paper presents a novel approach to optimal placement PMUs in normal and contingency conditions. At first, an optimal measurement set is determined to achieve full network observability and maximizing the redundancy index. Then, we proposed two methods for solving the problem in contingency condition (failure of one or more PMU). A genetic algorithm is used as an optimization tool to obtain the minimal number of PMUs and their corresponding locations. The proposed method is tested on three systems and the results are compared with other techniques. The simulation results ensure the complete system observability and demonstrate the effectiveness of the proposed approach. Keywords: Phasor Measurement Unit, optimal placement, complete system observability, genetic algorithm. 14 Management de projet logiciel selon le référentiel PMBOK Modélisation et application à l’étude d’un projet de réseaux informatiques S.ERRIHANI, S.ELFEZAZI, K.BENHIDA ERGI, EST Safi Université Cadi Ayyad, Maroc safaa.errihani@gmail.com, selfezazi@gmail.com, kbenhida@gmail.com +212670234965, +212668853561, +212663098950 Résumé: Le management de projet apporte un avantage permanent dans le cadre de la dynamique des organisations actuelles. Il a évolué pour devenir aujourd’hui une fonction clé pour la réussite de tout projet. D’ailleurs le PMI (Project Management Institute) propose déjà plusieurs versions de son guide du Corpus des connaissances en management de projet logiciel (Guide PMBOK : Project Management Body Of Knowledge). Ainsi, ce guide est en phase de devenir un outil indispensable pour les praticiens dans l'ensemble des organisations et des secteurs d'activité. L’axe principal de la communication est réservé à l’analyse et la modélisation du PMBOK qui englobe l’ensemble des procédures et processus capables de réussir un projet technique. Rappelons que Le PMBOK définit le management de projet en termes d’intégration, de contenu, de délais, de coût, de management de la qualité, de management des ressources humaines, de communication, de risque et d’approvisionnement. Nous nous sommes aussi intéressés dans le cadre de ce travail à l’étude de l’application de l’ensemble de ces domaines de connaissances dans un projet réel de mise en place d’une politique de sécurité informatique et de réhabilitation du réseau local d’une entreprise. Mots clé: Management de projet, PMBOK, Modélisation, UML, réseaux informatiques. Contribution au diagnostic des événements défaillants dans un système dynamique hybride Bellahsene Hatem Noura Razika*, Mostefai Mohamed**, Aktouf Oum El Kheir*** *Laboratoire LTII, université A.Mira Béjaia **Laboratoire d’automatique, université de Setif *** Laboratoire LCIS, INPG Grenoble e-mail : hatemnora@yahoo.fr, prof_elec@ymail.com Abstract A dynamic hybrid system is described by a set of continuous variables and a set of discreet events interacting mutually. The reality imposes to take into account the failures of constituents (components) or the uncertainties on the knowledge of the system. The ceaseless increase of the complexity of the automatic systems made so that the task of the surveillance becomes more and more less easy. Therefore, the systems can work in several modes. Some of these modes correspond to a normal functioning and the others represent failing modes. In this article, we are interested in the evaluation of the probability of occurrence of the failing events in a hybrid dynamic system. We propose for it, a valuation method based on the knowledge in priori of the system, at least from the point of view of the state of its components in normal functioning (closed or opened, put out or lit, etc.). To validate our proposition, we applied her to the benchmark used by various authors for the calculation of the dynamic reliability. Our objective thus is to estimate the probability of occurrence of both events dreaded by the test case: the drying out and the overflowing of a reservoir. This example has for main interest to bring to light the problems of the safety of functioning of the systems. 15 Keywords: Diagnosis, dynamic hybrid systems. Reliability Suppression of Multitone Narrowband Interference for Orthogonal Multicarrier DS-CDMA System Ashraf Samy, Ahmed El-Mahdy Post-Graduate student in MTC, Prof. in Information Engineering & Technology, German University in Cairo Cairo, Egypt Ashraf166284@yahoo.com, Ahmed.elmahdy@guc.edu.eg Abstract In this paper, the performance of a multicarrier direct sequence code division multiple access (MCDSCDMA) system equipped with a suppression filter is analyzed. A Double sided filter is used in the MCDS-CDMA receiver for suppressing the intended multitone narrowband interference (NBI) over a Rayleigh fading channel. The effect of suppression filter coefficients, MC-DS-CDMA system parameters, and the NBI parameters on the performance of the system is studied. The analysis shows that the suppression filter can improve the MC-CDMA system performance significantly, and then increases the MC-CDMA system capacity. Keywords: Multicarrier CDMA; narrowband interference; suppression filter. Improved Context-Aware Saliency Detection Using Local Search Window Shanshan Wang and Amr Abdel-Dayem Department of Mathematics and Computer Science,Laurentian University,Ramsey Lake Road, Sudbury,Canada [sx2_wang, aabdeldayem]@cs.laurentian.ca Abstract In recent years, content-aware image retargeting has been an active research topic with the rapid growth of mobile devices. Retargeting techniques usually begin with computing an importance map, which represents the image regions that draw the human attention. Saliency map is highly considered as a vital component of the importance map to preserve the attended regions of the input image after resizing. Context-aware saliency detection has recently emerged as a promising direction in producing accurate maps. However, its high computational complexity, severely, limits its use in practical applications. In this paper, we propose the use of a local search window to limit the search space, when looking for similar patches within the image. Experimental study over a set of 86 benchmark images showed that the proposed approach significantly reduces the running time, while, at the same time, produces accurate results compared to the original Context-aware saliency detection algorithm. Moreover, we conducted a set of experiments to empirically set the size of the proposed search window. Keywords: Image retargeting, Seam carving, Visual attention, Saliency map. 16 Synchronization of the Hyperchaotic Lü System Using Feedback Linearization Controllers M. Zribi N. Smaoui and H. Salim Department of Electrical Engineering, Kuwait University, P.O. Box 5969, Safat, 13060, Kuwait Abstract This paper deals with the synchronization of hyperchaotic Lü systems. Feedback linearization controllers are proposed to synchronize two identical hyperchaotic Lü systems. The asymptotic convergence of the errors to zero between the states of the master and the slave systems is proved. Simulations results are presented to illustrate the developed theory; they indicate that the proposed control schemes work well. In addition, the proposed synchronization schemes are applied to the secure communications field; the simulation results indicate that the proposed schemes are e_ective. Keywords: hyperchaos, Lü System, synchronization, Feedback Linearization, Secure communication. Mode Detection of Color Histogram and Merging Algorithm by SpatialColor Compactness Degree Analysis H. Remmach1,2, A. Mouradi2, A. Sbihi1, L. Macaire3, O. Losson3 1LASTID, Ibn Tofail University, Faculty of Sciences, Kenitra-Morocco h.remmach@gmail.com, sbihi@ensat.ac.ma 2 LBBE, Ibn Tofail University, Faculty of Sciences, Kenitra-Morocco mouradi14@gmail.com 3LAGIS , University of science and technology, Lille1-France [ludovic.macaire, olivier.losson]@univ-lille1.fr Abstract This article presents a new approach for color image segmentation based on pixel classification. The classes of pixels are constructed by detecting the modes of the color histogram, namely the areas of color space with a high density of probability. The application of watersheds on the color histogram leads to an over-partitioning of the color plane, which can be processed by mode merging algorithm based on mode adjacency graph analysis. The over-partitioning modes of the color histogram are merged respecting the correspondence between modes of the histogram and significant regions of the image. For that we consider the spatial-color compactness degree of the pixels corresponding to two adjacent modes as a merging criterion. Keywords: modes detection, Color histogram, Mathematical morphology, Adjacency graph, spatial color compactness. 17 Combinatory logic and language engineering 1 I. Biskri1, A. Joly1 and B.A. Bensaber1 LAMIA, Département de Mathématiques et Informatique, Université du Québec à Trois-Rivières C.P. 500, Trois-Rivières (QC) G9A 5H7, Canada [ismail.biskri; adam.joly; Bensaber]@uqtr.ca http://www.uqtr.ca Abstract The combinatory logic was developed to logically analyze Russell’s paradoxes and the concept of substitution. It is a free variable logic. it avoids the telescoping of variables (with the same identifier) in complex systems. This logic has emerged as a formal tool that allows providing functional semantic representations of texts. It operates in typed applicative framework in which functions operate on arguments. In our paper, we will show how the combinatory logic can contribute to the development of softwares for the processing of natural languages. Keywords: Combinatory logic, language engineering. Screening of Retinal disorders by the Detection of Microaneurisms and Hemorrhage Nahed Solouma, Ph.D. and Amro El-Dib, MD. National Institute of Laser Enhanced Sciences (NILES), Cairo University, Giza – Egypt nsolouma@niles.edu.eg , dramreldib@yahoo.com www.niles.cu.edu.eg Abstract Retinal disorders are among the most dangerous diseases because many of them may lead to blindness if not early diagnosed and managed. Medical screening is very important as it allows the early diagnosis of the disease. Only ophthalmologists who have enough experience can differentiate between normal and abnormal retinas at the early stages of the disease. So, screening routines of the retina are very expensive and rarely to be done. In this work we provide a computer-aided screening system for the retinal disorders. The system could be used easily by the young physicians as it can automatically detect the early symptoms of abnormalities such as microaneurysms, hemorrhage and exudates. Using newly proposed image processing algorithms, we implemented a screening method based on the experience of the ophthalmology experts. Keywords: Computer-aided diagnosis, hemorrhage, microaneurysm detection. 18 A New Presentation Method of Nucleotide Sequences Minimizes Storage Size and Processing Time Nahed H. Solouma and Osama Fekry National Institute of Laser Enhanced Science (NILES) – Cairo university, Giza, Egypt. nsolouma@niles.edu.eg , osama.f.alblah@niles.edu.eg http://www.niles.cu.edu.eg Abstract The biological databases have a vast amount of data representing the sequences of genomes, genes and proteins of different species. Another related and/or deduced information such as protein structures and protein-protein interactions are also present. The number of sequences and the related information are drastically increasing. This deluge of data creates great challenges to computer scientists to store and process the so long sequences efficiently. We proposed a new method for nucleotide sequence encoding. Our encoding method is based on the fact that there are only four nucleotide bases i.e. four different states. Any sequence can be segmented to four-bases segments and hence, we have only 256 combinations to represent any sequence. The code of any sequence is thus a sequence of numbers ranging from 0- 255. We named the new sequence code as 4-into-1 code. Many sequences were encoded using the proposed encoding method which saves 75% of the storage capacity. The most common sequence analysis algorithms were modified and redesigned to be suitable for the application to the 4-into-1 codes. Surprisingly, the computation complexity and hence the calculation time are greatly reduced using our proposed methods. Using the 4-into-1 code, the computation complexity of the dot plots and global sequence alignment are reduced to one sixteenth of its original complexity. Dynamic programming can be efficiently applied to the 4-into-1 code for local sequence alignment. The palindrome regions in a sequence are easily obtained using the 4- into-1 code. The 4-into-1 code can be used to numerically represent the nucleotide sequence and hence, signal processing algorithms can be applied efficiently. Keywords: Compression, Nucleotide sequences, numerical representation. Intelligent Workpiece Detection on CNC Milling Machine J. Balic, F. Cus, S. Klancnik University of Maribor, Faculty of Mechanical Engineering, Smetanova 17, SI-2000, Maribor, Slovenia [joze.balic]@uni-mb.si http://www.uni-mb.si Abstract In this paper, system for optical determining the workpiece origin on the CNC (Computer Numerical Control) machine is presented. Similar high sophisticated systems are commercially available but in most cases they are very expensive and so their purchase is economically unjustified. The purpose of our research is to develop an inexpensive system for non-contact determination of the workpiece origin, which is also sufficiently precise for practical use. The system is implemented on a three-axis CNC milling machine, which is primarily designed for good machinability materials. Calibration procedure using feed-forward neural networks was developed. With this method the calibration procedure is simplified and the mathematical derivation of camera model is avoided. Learned neural network represents the camera calibration model. After neural network learning is complete, we can begin using the system for determining the workpiece origin. This developed system was through a number of tests proved to be reliable and suitable for use in practice. In the paper, working of system is illustrated with a practical example, which confirms the effectiveness of the implemented system in actual use on machine. Keywords: Neural networks, Image Processing, Milling, Workpiece Detection. 19 Wavelet Neural Networks with a New Translation Vector Initialization Approach for Multiclass Cancer Classification Zarita Zainuddin, Ong Pauline School of Mathematical Sciences, Universiti Sains Malaysia, 11800 USM, Penang, Malaysia. zarita@cs.usm.my, ong.p@usm.my http://math.usm.my/ Abstract The generalization capability of wavelet neural networks (WNNs) is sensitively influenced by the network topology, particularly the location and the number of translation vectors. In this paper, a new translation vector initialization approach – specifically, the modified point symmetry-based fuzzy C-means (MPSDFCM) was employed in selecting the translation vectors of WNNs, where its effectiveness was demonstrated in the multiclass cancer classification using the microarray gene expression profiles. Comparative studies showed that the proposed methodology possessed superior predictive capability as opposed to other initialization approaches, in terms of prediction accuracy, sensitivity and specificity. Keywords: Bioinformatics, Fuzzy C-Means, Microarray, Wavelet Neural Networks Optimization of the Pulping Process: Polynomial vs. Neural Network Models 1 Wan Rosli Wan Daud1*, Zarita Zainuddin2, Ong Pauline2, Amran Shafie1 Bioresource, Paper and Coating Division, School of Industrial Technology, Universiti Sains Malaysia, 11800 USM, Penang, Malaysia. 2 School of Mathematical Sciences, Universiti Sains Malaysia, 11800 USM, Penang Malaysia. wanrosli@usm.my, zarita@cs.usm.my, ong.pauline@hotmail.com http://www.indtech.usm.my/ Abstract Optimization of the experimental conditions for cost efficiency and time saving purposes is highly sought for an economically viable pulping process. In this paper, the integration of the polynomial model and wavelet neural networks (WNNs) in exploring the influence of the pulping variables (viz. cooking temperature and time, ethanol and sodium hydroxide concentration) on the resulting pulp and paper properties, i.e., screened yield, kappa number, tensile index and tear index during the pulping of the oil palm fronds was examined. Performance assessment signified that the WNNs demonstrated superior predictive capability than the polynomial model, where the former reproduce the experimental results with errors less than 6%, and preserve satisfactory determination coefficient. Keywords: Organosolv, palm fronds, pulping, response surface methodology, wavelet neural networks. 20 Classification of Vertically Distributed Data using Directed Acyclic Graph *Ahmed M. Khedr, **Ibrahim A. Attiya * Computer Science Department, Faculty of Science, Sharjah University, Sharjah, UAE ** Mathematics Department, Faculty of Science, Zagazig University, Zagazig, Egypt akhedr@sharjah.ac.ae, ibrahimateya@yahoo.com Abstract Most developed learning algorithms are designed for environments in which all the relevant data is stored at single computer site. With increasingly data volume and appearing of internet and high speed networks, the relevant dataset can be stored in geographically distributed databases that are connected by communication networks. These databases cannot be moved to other network sites due to communication costs, security, size, privacy, or data-ownership considerations. In this paper, using directed acyclic graph (DAG), we propose a new k-nearest neighbors classifier (k-NN classifier) algorithm for situational input stored in geographically distributed databases. We show that it is possible to perform global computation in a reasonably secure manner for vertically partitioned databases. The computation is completed by only exchanging a few local summaries among the databases. An empirical validation of our results is also presented in the paper. Keywords: Data Privacy, Directed acyclic graph, Nearest Neighbor Classifier, Vertically distributed Databases. Qualitative State Estimation from corrupted Data with Uncertain Parameters Mohamed F. Hassan Hala A. Mourad Electrical Engineering Department, College of Engineering, Kuwait University, 13060 Kuwait (phone: +965-2498-7634; fax: +965-2481-7451; e-mail: m.f.hassan47@gmail.com & m.fahim@ku.edu.kw ) Abstract In this paper, an estimator is developed to estimate the states of linear stochastic discrete-time dynamical systems with uncertain parameters. The system model and the measurements are assumed to be corrupted by uncorrelated zero mean white Gaussian noise sequences. The parameters of the system are assumed to be uncertain. The proposed approach is based on Kalman filter. Although the developed state estimator uses the nominal values of the system parameters; it showed to be stable, robust and gives satisfactory results. The effectiveness of the theoretical derivation of the developed estimator is illustrated via simulation examples and a DC Motor application. Keywords: Discrete-time systems, linear systems, nonlinear systems, stability, state estimation, stochastic systems. 21 Visual Simplified Characters’ Emotion Emulator Implementing OCC Model Ana Lilia Laureano-Cruces1,2,3, Laura Hernández-Domínguez2, Martha Mora-Torres2, Juan-Manuel Torres-Moreno3 1 Departamento de Sistemas, Universidad Autónoma Metropolitana – Azcapotzalco, San Pablo 180, CP.02200. México, DF. 2 Posgrado en Ciencia e Ingeniería de la Computación, Universidad Nacional Autónoma de México, Edif. Anexo IIMAS, 3er piso, Ciudad Universitaria, Coyoacán, México, D.F. C.P. 04510 clc@correo.azc.uam.mx (lili94@exalumno.unam.mx) laudobla@gmail.com, kabhun@yahoo.com.mx 3 Laboratoire Informatique d'Avignon / Université d'Avignon et des Pays de Vaucluse BP 91228, 84911 Avignon Cedex 9, France juan-manuel.torres@univ-avignon.fr Abstract In this paper, we present a visual emulator of the emotions seen in characters in stories. This system is based on a simplified view of the cognitive structure of emotions proposed by Ortony, Clore and Collins. The goal of this paper is to provide a visual platform that allows us to observe changes in the characters’ different emotions, and the intricate interrelationships between: 1) each character’s emotions, 2) their affective relationships and actions, 3) The events that take place in the development of a plot, and 4) the objects of desire that make up the emotional map of any story. This tool was tested on stories with a contrasting variety of emotional and affective environments: Othello, Twilight, and Harry Potter, behaving sensibly and in keeping with the atmosphere in which the characters were immersed. Keywords: synthetic emotions, OCC model, emotional environment, intelligent interfaces, decisionmaking process. GRASP Compared with other Heuristics to Find Minimal Reducts Iris Iddaly Méndez-Gurrola1,2,3, Javier Ramírez-Rodríguez2,4,6, Ana Lilia Laureano-Cruces2,4,6Jorge M. A. Sánchez de Antuñano Barranco2,3,5 1 Universidad Autónoma Metropolitana, Unidad Cuajimalpa. Departamento de Matemáticas Aplicadas y Sistemas 2 Universidad Autónoma Metropolitana, Unidad Azcapotzalco. 3 Posgrado en Diseño, Nuevas Tecnologías 4 Departamento de Sistemas 5 Departamento de Investigación y Conocimiento para el Diseño Av. San Pablo 180, Col. Reynosa Tamaulipas, Del. Azcapotzalco, México, D.F. iddalym@yahoo.com.mx, [jararo, clc, jsab]@correo.azc.uam.mx 6 LaboratoireInformatiqued'Avignon et des Pays de Vaucluse / Universitéd'A vignon BP 91228, 84911 Avignon Cedex 9, FRANCE Abstract In this paper we show some modifications to the programming of a GRASP algorithm [4], and how this algorithm can generate good or equal results compared with other algorithms to find reducts in an information system.The algorithm was used in four datasets of different dimensions and results are compared against other techniques. Keywords:rough sets, reduct, GRASP algorithm. 22 Using Tailored Chaotic Sequences In 3D Watermarking Amira E.Youssef, Walaa Sheta a Informatics Research Institute, City for Scientific Research and Technology Applications (MuCSAT), Alexandria 21934, Egypt Abstract We survey the basics of watermarking and the history of chaos and its properties. There are a lot of methods for the chaotic sequences generation, our proposed method we choose to use the geometry based spatial watermarking where we modify the positions of verticies. The methods in this approach make changes in the position of the vertices to satisfy some requirements specially defined for each watermark bit. Our aim is to make a secure watermark that doesn't affect the quality of our 3D model. The security of the watermark is based on the chaotic secret generated and embedded in the 3D model. The chaotic sequence itself has several secret keys that if not known the watermark can't be detected. Apart from the sequence security we depend on the hiding position and chosen threshold that are tailored for each model for more secrecy. Keywords: 3d watermarking, Chaos, Chaotic maps, Random sequences Mobile Augmented Reality Architecture for Indoor Arena with Markerless Tracking J. Keller, J. Štafa, L. Čegan Faculty of Electrical Engineering and Informatics, University of Pardubice, Studentská 95, 530 02 Pardubice, Czech Republic jan.keller@student.upce.cz, jan.stafa@student.upce.cz, lukas.cegan@upce.cz http://www.upce.cz/fei Abstract In this paper, we introduce a prototype of an augmented reality platform for accessing contextual information in real time using an indoors location system. Using this platform, object and environment can be augmented with related information, and queried and restricted by the location and view direction. We designed our own solution of an indoor location system based on a signal measurement of Wi-Fi devices (Access Points) in local network. For the best accurate projection of contextual data and models, without the need to use markers, we use algorithms for edge detection and object recognition. All of these techniques together serve for rendering information in real-time as accurately as possible. Keywords: Augmented reality, Indoor location, Real-time edge detection, Markerless object recognition. 23 AĞ SİMÜLATÖRÜ (NS2) Mehmet BİRLİK Okan Üniversitesi Fenbilimleri Enstitüsü Bilgisayar Mühendisliği Bölümü mehmet.birlik@altraoptik.com.tr Abstract Ns is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks. Ns began as a variant of the REAL network simulator in 1989 and has evolved substantially over the past few years. In 1995 ns development was supported by DARPA through the VINT project at LBL, Xerox PARC, UCB, and USC/ISI. Currently ns development is supported through DARPA with SAMAN and through NSF with CONSER, both in collaboration with other researchers including ACIRI. Ns has always included substantial contributions from other researchers, including wireless code from the UCB Daedelus and CMU Monarch projects and Sun Microsystems. NS2 is an open source tool that presents endless rights to the users. It provides you to add a new protocol, test it over the network and analys the graphical outputs of the ns2. What you need is knowledge of C++ and tcl script. This project covers the creating new queuing algorithm, adding it to ns2 platform, using it over the network and analysing the graphical outputs of the ns2. The most important step is evaluating the outputs of the network simulation. According to these results we decide whether the protocols performs the desired tasks or not. Keywords : Ns, Ns2, Ns2 Queuing protocol, adding new protocol to Ns2. Ağlarda Topluluk Yapılarının Algılanma Algoritmaları B. Ardıl Bilgisayar Mühendisliği Bölümü, Okan Üniversitei, Istanbul, Turkey boraardil@gmail.com Özet Ağlarda topluluk yapılarının algılanması, bilgisayar bilimlerinden, sosyal bilimlerden ve diğer disiplinlerden birçok araştırmacının üzerinde çalıştığı güncel bir konudur. Bu amaçla, günümüze kadar farklı birçok algoritma denenmiştir. Bu çalışmada topluluk yapılarının belirlenmesinde kullanılan algoritmalardan öne çıkanlar tanıtılacak, özellikle zaman karmaşıklığı ve ölçeklenebilirlik problemlerine ne kadar çözüm olabildikleri, hızları ve güvenilirlikleri irdelenecektir. Anahtar Kelimeler: Ağlar, topluluk yapıları, çizge madenciliği, algoritmalar. 24 Multivariable PID Controller for Lateral Motion of Aircraft A. Maddi, A. Guessoum and D. Berkani LATSI Laboratory, Department of Electronics, University of Blida, Algeria a_maddi@hotmail.com Abstract The aim of this paper is to provide a practical example to the Proportional-Integral-Derivative (PID) controller. This method includes a description and some discussion of the effects PID parameters. This method is developed and applied to a lateral motion of aircraft, in order to determine the lateral and directional control angles required for trim under steady turns and sideslips. This study also based on the directional and lateral static stability derivatives of the aircraft. Keywords: Aircraft, lateral motion, stability, sideslip angle, PID control. Meteorological satellite images modeling using autoregressive process L. Sadouki *, B. Haddad **, D. Kemikem ** * Institute of Electrical and Electronic Engineering, University M'Hamed Bougara of Boumerdes(UMBB), Independence Avenue, 35000 Boumerdes, Algeria ** Laboratory of Image Processing and Radiation, Faculty of Computer Science and Electronics, University of Sciences and Technology Houari Boumediene (USTHB), PObox 32 El Alia, Bab Ezzouar, Algiers, Algeria , h_boualem@hotmail.com, kemikemds@yahoo.frsdkleila@yahoo.fr http://www.umbb.dz, http://www.usthb.dz Abstract The objective of this work is a modeling of the satellite images precipitations (or rainfalls) that are useful for hydrologic applications and an investigation on a possible different description of precipitations over the sea and on the continent are attempted in the satellite images concerning the Mediterranean region. The model used in this paper is the autoregressive process AR (p), where p is its order. This model makes possible the description of a series of 2208 satellite images, recorded during a period of 3 months via the IR03.9 Meteosat channel. To conduct a detailed study of the phenomenon, a scanning area of 20×50 pixels in the two areas (sea and continent) is adapted to examine all precipitation areas on the images, using a window (5×5 pixels) and a pixel-by- pixel processes. The order of the AR model found in this paper, for the Mediterranean region, is “1”, which is invariant in time and space. Keywords: Images, Modeling, precipitations, rainfalls, Meteosat, Autoregressive, Satellite. 25 Control of Redundant Robot and Singularities Avoidance based ANFIS Network *M. BENZAOUI, ** H. CHEKIREB and ** M. TADJINE *Dpt de l’électrotechnique et de l’automatique Institue de génie électrique et électronique Université M’hamed Bougara, Boumerdès, avenue de l’Indépendance35000 Boumerdès, Algeria **Laboratoire de Commande des Processus. Dpt de Génie Electrique, ENP BP 182, 10 avenue Hassan Badi, 16200 El-harrach Alger, Algeria Email: benzaouimess@mail.com, chekireb@yahoo.fr Abstract In this work we exploit an ANFIS network to achieve the singularities avoidance of a redundant robot. This latter must carry out a trajectory tracking in the Cartesian space near a singularity point. The singularity avoidance without affecting trajectory tracking is involved via self-motion method. The analytical determination of this self motion is obtained on the optimization of scalar function depending on the robot manipulability measure. In view to reduce the on line cumbersome computations due to the analytical method, a learning network based ANFIS is used to generate this self-motion. The learning process uses the input-output data coming from the analytical self-motion. The two methods of avoiding singularity (based on analytical method and on ANFIS one) are tested in the case of 3 dof planar robot performing, in Cartesian space, a trajectory near a singular point. The obtained results show that the proposed criteria ensure a good control when the robot operates near a singularity point. Keywords: redundant robot, singularity avoidance, self-motion. adaptive neuro fuzzy inference system (ANFIS). 26