The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The production of well-developed software reduces the cost of the software maintainability. Therefore, many software metrics have been developed to measure the quality of the software design. Measuring class cohesion is considered as one of the most important software quality measurements. Unfortunately, most of approaches that have been proposed on cohesion metrics do not consider the different intersections...
The main goal of this paper is to investigate the applicability of a back-propagation artificial neural network on the encryption of huge-sized satellite images. The central contribution is using fixed, arbitrary keys in the training process as in classical symmetric and asymmetric cryptography. The used network is of NxMxN neurons representing the input, hidden, and output layers, respectively. The...
Service-oriented architecture (SOA) is an architectural style of software systems, in which a system is composed of isolated or independent services. XML has become the most common way for information exchange and data representation in SOA. Electronic bill presentment and payment (EBPP) is one of the most critical SOA applications for which security a major concern. State-based XML firewall systems...
With the increase of data volume, advanced query operators, such as skyline queries, are necessary in order to help users to handle the huge amount of available data by identifying a set of interesting data objects. Skyline queries help us to filter unnecessary information efficiently and provide us clues for various decision making tasks. Most of the existing skyline algorithms can not preserve individual's...
The problem of solving large systems of linear equations of the form (Ax = b) arises in various applications such as finite element analysis, computational fluid dynamics, and power systems analysis, which is of high algorithms complexities, that takes a lot of execution time. The high computational power required for fast solution of such problem is beyond the reach of present day conventional uniprocessor...
E-payment is considered a cornerstone in daily e-transactions. There are many proposed e-payment protocols but the majority of such protocols were designed just to satisfy the traditional flow of payment data which increases the users' risk because of security vulnerabilities and privacy leakage. The Secure Electronic Transaction protocol (SET), a de facto standard, is limited in application due to...
As Grids try to achieve optimal and balanced utilization of unused resources in a distributed system, efficient resource discovery mechanism is one of the fundamental requirement for Grid computing systems, as it aids in resource management and scheduling of applications. Resource discovery in Grid is a challenging issue because characteristics of its resources are heterogeneous, dynamic, various...
As e-commerce is increasingly becoming popular, the number of customer reviews that a product receives grows rapidly. However, for popular products, many online product reviews exist but for other reviews product reviews are very few. These online discussions about particular products may help other online users to make a decision in buying/ not buying those products, like in amazon.com1 and ebay...
In this paper, an efficient data hiding technique based on the discrete cosine transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits is embedded in all frequency component of the quantized DCT coefficient using least significant-bit (LSB) to enable a large message capacity. A comparison between the proposed...
Regression testing is the process of validating modifications introduced in a system during software maintenance. It is an expensive, yet an important process. As the test suite size is very large, system retesting consumes large amount of time and computing resources. Unfortunately, there may be insufficient resources to allow for the re-execution of all test cases during regression testing. Testcase...
Support Vector Machine (SVM) is a popular data classification method with many diverse applications. SVM has many parameters, which have significant influences on the performance of SVM classifier. In this paper, a Scatter Search approach is used to find near optimal values of the SVM parameters and its kernel parameters. The proposed method integrates a scatter search approach with support vector...
In this paper, we propose a non-linear model for fingerprints matching which handles more efficiently the nonlinear deformation problem in fingerprint matching. It is based on the fact that a fingerprint image is composed of different minutiae with various orientations separated by a spatial distance that can be successfully represented by an interaction vector. After extracting the minutiae and the...
Unfortunately, the Grid Computing doesn't support the business collaboration needs, due to many issues, e.g. the lack of standards for the Grid services. Although, the Grid infrastructure faces big challenges in interoperability, the Open Grid Services Architecture (OGSA) has been developed for the Grid applications. We believe that the cloud environment can be converged with the Grid environment,...
Enterprise Information Architecture (EIA) is a critical success factor for Business Process Re-engineering (BPR) and Information management. The knowledge of business information provides a vital leverage to the design of enterprise information architecture. This paper proposes an approach for semantically deriving EIA of an enterprise from the ontological representation of a given Business Process...
Quad tree is a common raster data structure that uses recursive decomposition to divide a raster into a hierarchy of quadrants. This papers aims to develop a vectorization model for the conversion of quad tree satellite images to vector format that can be used and processed in geographic information systems (GIS) projects. The proposed model consists of four main phases: applying noise removal filter,...
The success of model based object recognition in a closed world depends on the correct choice of parametric primitive shapes or correct choice of a set of basic features. The later could be the result of machine learning. In this paper a choice of parametric primitive shapes is made and a recognition procedure including a set of developed algorithms is presented. The procedure is in essence a divide...
Predicting bug fix-time is an important issue in order to assess the software quality or to estimate the time and effort needed during the bug triaging. Previous work has proposed several bug fix-time prediction models that had taken into consideration various bug report attributes (e.g. severity, number of developers, dependencies) in order to know which bug to fix first and how long it will take...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.