Volume 03 Number 1 March 2013

    
Designing Next e-Book Reading Experience: Multi Device e-Book

Oh Se Beom, Chungkon Shi

https://doi.org/

Abstract The key question of this paper is what will come as the next e-book after the present ebook, which is merely a digitalized version of the paper book? This paper extracts three elements of book, and categorizes three generations of books by news analyzing. This paper suggests a new e-book model that can be realized with the advance of media... Read More


Skin Color Classification Using Color Mapping Co-occurrence Matrix

Ghazali Osman, Muhammad Suzuri Hitam

https://doi.org/

Abstract This paper presents a new technique for region-based skin color classification using texture features. Texture features were extracted from a new introduced technique called Color Mapping Co-occurrence Matrix (CMCM). Thirteen Haralick’s texture features were extracted from CMCM at four directions and were used as input parameters for two skin color classifiers namely stepwise Linear Discriminant Analysis (LDA) and Multi-Layer Perceptron... Read More


Fuzzy Expert System for Residual Analysis

Najar Yousra, Ketata Raouf, Ksouri Mekki

https://doi.org/

Abstract In industrial fields, decision making systems are very helpful. At critical situations such as failure occurrence, human being could not make the right decision at reasonable delays. This paper dealt with the conception and the development of an on line fuzzy system that simulates an hydraulic process and detects its abnormal behavior. Fuzzy logic is used to analyze residues of... Read More


Semantic Structure for XML Documents: Structuring and Pruning

Salma Ben Mefteh, Kaïs Khrouf, Jamel Feki, Chantal Soulé-Dupuy

https://doi.org/

Abstract The nature of information sources together with the multiple document description alternatives offered by these sources are permanently changing. This evolvement was accelerated by the expansion of the Web and, therefore has increased the volume of information available as XML documents. These latter are described through semantic-less tags (e.g., Content, Section, Paragraph). Despite the real and urgent need for a... Read More


Layered Network Security Policies on OSI Model

Sabeela Pasha, Attique Shah, Muhammad Aadil

https://doi.org/

Abstract Networks are undoubtedly the effective and efficient source for communication and resource sharing that enables and facilitates both business and personal usage globally. The technologies which are associated with networks have opened the new doors to an increasing number of security threats from which the companies must protect their networks. To resolve this issue the network should be protected with... Read More