Volume 7, Issue 1, January 2016

Tree Reconfiguration with Network Resources Constraint
Pages: 1-4 (4) | [Full Text] PDF (430K)
Joel Christian Adépo, Boko Aka and Michel Babri
Sciences Fondamentales et Appliquées, Université Nangui Abrogoua, Laboratoire de Mathématique et informatique, Abidjan, Côte d’Ivoire
Mathématique et Informatique, INHPB, LARIT, Yamoussoukro, Côte d’Ivoire

Abstract -
We studied in this paper tree reconfiguration without lightpath interruption in a network wherein resources are limited. In our previous work, we proposed an algorithm called TRwRC. This paper proposes an algorithm which does reconfiguration without ligthpath interruption and which improves the reconfiguration duration in the network wherein resources are limited.
 Index Terms - Interruption, Reconfiguration, TRwRC and Constraint
Towards a Perspective of the Role of Mathematics in Computer Science and Engineering (CSE) Education
Pages: 5-9 (5) | [Full Text] PDF (258K)
Nana Yaw Asabere, Amevi Acakpovi, Wisdom Kwawu Torgby, Edwin Mends-Brew and Kwame Owusu Ampadu
Department of Computer Science, School of Applied Sciences and Arts, Accra Polytechnic, Accra, Ghana
Department of Electrical/Electronics Engineering, School of Engineering, Accra Polytechnic, Accra, Ghana
Department of Mathematics and Statistics, School of Applied Sciences and Arts, Accra Polytechnic, Accra, Ghana

Abstract -
In the field of Computer Science and Engineering (CSE), many students have very high aspirations but lack mathematical skills. These students do not realize the significance and importance of mathematics in CSE education. Through a review of relevant literature, this paper discusses several relevant areas of CSE and explains why CSE students require mathematics in order to master and have control of the materials/modules taught in these courses. The explanations elaborated in this paper will eventually enable a CSE student to gain success in computing both academically and professionally.
 Index Terms - Computer Science, Engineering, Education, Mathematics and Students
The Evaluation of Useful Method of Effort Estimation in Software Projects
Pages: 10-14 (5) | [Full Text] PDF (379K)
A. Moradbeiky and V. Khatibi Bardsiri
Islamic Azad University, Kerman Branch, Iran

Abstract -
Software projects atmosphere experiences much complexity and ambiguities putting software project managers in several challenges during making decisions. Different methods have been proposed helping managers’ decisions toward projects’ important parameters. The present study presents some of the most applicable methods of software development effort estimation. In addition, the proposed methods are compared and tested on three real databases. We made use of the most applicable and valid databases and available evaluation standard methods for carrying experiments. The results well familiarize the researcher with the capabilities of the available methods in different databases.
 Index Terms - Development Effort Estimation, Software Project, Analogy-Based Method and Regression
The Study of Self-protection Patterns and Techniques in Self-adaptive Software Systems
Pages: 15- (-) | [Full Text] PDF (K)
Roya Bagheri and Ali Broumandnia
Department of Computer Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

Abstract -
The software systems which deal with changeable environments with distributed applications often need human intervention to continue their activity in all conditions. These activities which include re-configuration, debugging and maintenance affairs are often time-consuming and costly. The self-adaptive software, are in fact a response for these activities and solving existing problems. The self-protection in the software systems is a class of self-adaptive systems that is able to identify and reduce security threats during runtime. One of the findings obtained from conducted researches in the field of self-protection, is the architectural patterns and techniques that are applied in the design of software systems for the self- protection purpose. In this article, we introduce self-protection and also the patterns classification and self-protection techniques.
 Index Terms - Autonomic Computing, Self-protection, Self-adaptive and Security Attacks
Feature Based Automatic Multiview Image Registration
Pages: - (-) | [Full Text] PDF (K)
Sruthi Krishna and Abraham Varghese
Computer Science and Engineering, Adi Shankara Institute of Engineering and Technology, Kalady, India

Abstract -
Automatic image registration is a vital yet challenging task, particularly for remote sensing images. A fully automatic registration approach which is accurate, robust, and fast is required. The registration process is divided into six main steps: feature detection, feature extraction, feature matching, outlier detection and removal, transform model estimation and resampling. In the feature detection, keypoints (PCA-SIFT), blob (SURF), region (MSER) features are detected. The features are then matched to produce point correspondences. The alignment process uses the RANSAC algorithm to estimate an outlier free transformation using point correspondences. The target image is transformed by using transformation function, which results in automatic image registration. Mutual information is used for fine tuning registration. In this thesis, feature descriptors used are SURF (Speeded Up Robust Features), MSER (Maximally Stable Extremal Regions) and PCA-SIFT. They are invariant to zoom, noise, scale, rotation and illumination, hence very useful. The analysis is conducted for various image transformations such as image rotation, scaling and change in illumination. For all these transformations, various quality checking parameters such as recall and RMSE error are evaluated to analyse the performance of registration. In the registration of multiview images, the affine transformation model applied is not suitable. So a more appropriate transformation models such as thin-plate spline is subtitled the affine model in the proposed work.
 Index Terms - Image Registration, SURF, PCA-SIFT, MSER, RMSE, Thin Plate Spline and Affine Transformation