You are on page 1of 12

Volume 4. No.

3 January - March 2010

ISSN-0973-5151
Subscribers copy
Not for sale

i-managers

Journal on Software Engineering


A brand new matrix of thoughts for the technology savvy of the modern era

Publications

Journal on Software Engineering


Editor-in-Chief
Joe Winston

EDITORIAL COMMITTEE
Dr. Kasim Mousa Al-Aubidy
Professor & Dean, Faculty of Engineering, Philadelphia University, Jordan. Associate Professor, Dean, College of Computers, University of Anbar, Iraq. Associate Professor, Department of Computer & Electrical Engineering, Al-Isra Private University, Amman, Jordan. Professor, Department of Computer Science & Engineering, R.M.K. Engineering College, Chennai, Tamilnadu, India.

Dr. Nag Raju

Professor, CSE KL University, Vijayawada, AP India. , Professor and Principal, Department of Electronics & Communication Engineering, Santhiram Engineering College, Nandyal, Andhra Pradesh, India. Associate Professor, University of Nottingham, Malaysia Campus, Malaysia. Senior Lecturer, Department of CSE, RMK Engineering College, Thiruvallur Dist., Tamil Nadu, India.

Dr. M.V. Subramanyam Dr. Sufyan T. Faraj

Dr. Karim M. Al-Jebory

Dr. Kenneth Ang Li-Minn

Dr. N.V. Balasubramanian

Dr. R. Jagadeesh Kannan

EDITORIAL TEAM
Renisha Winston Melbin Ritha V. Senthil Kumar Editorial Director Issue Editor Layout & Cover Design Krishna Kumari R David Willington Joy Robinson

OPERATIONS TEAM
Operations Support Marketing Support Production Support

Our Offices
Publication Office: 566, Christunagar Road, Nagercoil, Kanyakumari Dist.,Tamilnadu, India - 629 003. Registered Office: 3/343, Hill View, Town Railway Nager, Nagercoil, Kanyakumari Dist.,Tamilnadu, India-629 001.

i-manager's Journal on Software Engineering is being listed in the 11th Edition of Cabell's Directory of Publishing Opportunities in Computer Science. www.Cabells.com

i-manager Publications 2010. All rights reserved. No part of this Journal may be reproduced in any form without permission in writing from the publisher. Feedback can be e-mail : feedback@imanagerpublications.com

CONTENTS

RESEARCH PAPERS
1 AN INTELLIGENT SERVICE SYSTEM BASED ON SOUNDEX AND MULTI-LAYER NEURAL NETWORK ALGORITHMS
By Lubna Badri, Bilal Deya and Rami Zuhdi

7 18 23 28

FAULT TOLERANCE AND RELIABILITY OF MESH MULTI-COMPUTER NETWORKS A REVIEW


By Mostafa Abd-el-barr

DISCRETE WAVELET TRANSFORM WITH ENHANCEMENT FILTER FOR ECG SIGNAL


By Khaled Daqrouq, Abd Alrahman Qawasmi and Mikhled Alfaouri

LOCAL FEATURE DESCRIPTIVE MODELING FOR NATURAL IMAGES FOR IMAGE RETRIEVAL SYSTEM
By P .V.N. Reddy, K. Satya Prasad

ANALYSIS OF INDUCTIVE EFFECTS OF ON-CHIP AND ON-BOARD RETURN CURRENT PATH FOR PERFORMANCE DEGRADATION MODELING IN VLSI DESIGN
By Sourabh Sthapak, Jeffrey Fan

36 44 50 65

ASSOCIATION RULE MINING WITH NEURAL NETWORK FOR BRAIN TUMOR CLASSIFICATION
By P Rajendran, M. Madheswaran .

ON THE SIGNATURE ANALYSIS OF ANALOG-TO-DIGITAL CONVERTERS


By V. Geurkov, L. Kirischian

A SEAMLESS HANDOVER SCHEME FOR WIRELESS NETWORK USING SIGMA


By B. Jaiganesh, R. Ramachandran

COLOR IMAGE RESTORATION FOR AN EFFECTIVE STEGANOGRAPHY


By D.P Gaikwad, S.J. Wagh .

EDITORIAL

Kasim M. Al-Aubidy
Professor & Dean, Faculty of Engineering, Philadelphia University, Jordan.

Fault-Tolerant Networks and Software Fault Tolerance


After the extensive 1990 telephone outage caused by a mistakenly placed C break in the multimillion-line program that had crashed, an AT&T official made the public statement that such a thing would never happen again!!!. Perhaps he thought that the engineer who did it had been dead.(*)

In modern society and due to the availability of advance computer and communication technology, most activities are computerized to achieve good accuracy, fast access and networking. These computer-based activities are designed and implemented to ensure high standards of modern life and to work without failures. Fault-tolerance is the property that enables a computer-based system to continue operating properly in the event of the failure of one or more faults within some of its components. Several possible failures include hardware-related faults, software bugs, and interface errors between the hardware and software. Hardware fault-tolerance is the most common application of these systems, designed to prevent failures due to hardware components. There are special software and instrumentation packages designed to detect failures. Software fault-tolerance is based more around avoiding software errors using real-time redundancy, or static "emergency" subprograms to fill in for programs that crash. There are many ways to conduct such fault-regulation, depending on the application and the available hardware. Reliability is an essential requirement to design a faulttolerant computer-based system. It is necessary to make sure that such a design meets its requirements for reliable operation. This is done by using various hardware and software techniques to simulate failures, and produce suitable procedures to avoid the effect of failures. Research into the types of tolerances required for computer-based systems involves a large amount of interdisciplinary work. The more complex the system, the more carefully all possible interactions have to be considered. In the first paper, Lubna Badri et.al share an intelligent service system to receive, manage, and serve text messages sent by system users asking for files stored in a system database, in which the combination of two methods have been used, a supervised learning multilayer neural networks trained with back propagation and Soundex algorithms. Mostafa Abd-El-Barr presents a review of the fault tolerance and reliability assessing techniques of mesh MCSs, and a number of fault-tolerant routing techniques are analyzed including the dimension ordering, the turn model, and the block-fault model. Geurkov and Kirischian apply a signature analysis principle for the compaction of output responses of an ADC. The permissible tolerance bounds for a fault-free ADC are determined, and the aliasing rate is estimated. Khaled Daqrouq et.al propose a new approach of denoising of EGG signal using Wavelet Transform WT which achieved better results than conventional methods particularly in ECG signal case. Reddy and Satya Prasad develop an independent learning based mobile natural image watching learning system, which aims to construct an outdoor mobility-learning activity under the up-to-date wireless technology. Rajendran and Madheswaran investigate the use of different data mining techniques namely, neural network and association rule mining for anomaly detection and classification to classify the CT scan brain images into three categories namely normal, benign and malignant.

EDITORIAL
Sourabh Sthapak and Jeffrey Fan conduct a SPICE based analysis of on-board high speed return current path and techniques and results are then extended for on-chip return current path analysis. Jaiganesh and Ramachandran present a survey of the various types of handovers in the space environment and the simulation results of SIGMA handover performance in a space environment. Gaikwad and Wagh propose the simplicity of the image steganographic using LSB approach to provide a means of secure communication. We believe that the design and implementation of fault-tolerant computer systems will become a highly respected field of research. We are grateful to all authors and reviewers of this issue of i-manager's Journal on Software Engineering.

Prof. Kasim Al-Aubidy, The Dean, Faculty of Engineering, Philadelphia University, Jordan
(*) D Hamlet & J Maybee, "The Engineering of Software", Addison Wesley, USA, 2001.

ABOUT THE AUTHOR


Dr. Kasim Al-aubidy is currently the Professor and Dean in the Faculty of Engineering, Philadelphia University, Jordan. He received his B. Sc. degree in Computer Engineering in 1979, M.Sc. degree in Computer Control Engineering in 1982 and Ph.D degree in Computer Engineering in 1989. He has published many papers in National and International Conferences and Journals. He has published four books in the field of Computers (in Arabic) and more than thirty scientific articles about Computer Technology, Expert Systems, Microprocessor Programming, Interfacing & Applications. He has supervised fourteen thesis submitted for Ph.D. and M.Sc. degrees. He is a Member in IEE (UK), IEEE (USA), SCS (USA), AMC (USA) and the Arab Network for Open & Distance Education (Jordan).

RESEARCH PAPERS
AN INTELLIGENT SERVICE SYSTEM BASED ON SOUNDEX AND MULTI-LAYER NEURAL NETWORK ALGORITHMS
By LUBNA BADRI * BILAL DEYA **
*-*** Faculty of Engineering, Philadelphia University, Jordan.

RAMI ZUHDI ***

ABSTRACT The aim of this research is to develop an intelligent service system to receive, manage, and serve text messages sent by system users asking for files stored in a system database. The proposed system needs to understand the received text message and takes the decision about the required files. The system handles files and a corresponding computer program and a corresponding computer-readable storage, which can be used for handling e-mail attachments and sent the requested files to the user email. To improve the designed text message recognition system, the combination of two methods have been used, a supervised learning multilayer neural networks trained with back propagation and Soundex algorithms. Experimental results show that the combination of two classification techniques to recognize and manipulate the received text message improves the classification accuracy. Keywords: Text Recognition, Neural Network, Soundex, INTRODUCTION Busy life schedule has led to the use of mobile phones by all generations, and the wide spread of the short message service SMS due to low cost and ease of use have led us to think of employing mobile phones with SMS to enable learners to obtain information and knowledge any where and any time [1]. The Short Message Service (SMS) was developed as part of the Global System for Mobile Communications (GSM). The main advantage of SMS is that almost all subscription plans provided by wireless carriers include inexpensive SMS messaging service. Also it has become essential for students to access materials on the subject of their education courses such as lectures notes, e-books, passed examination papers, etc... In order to serve the above mentioned purpose, the proposed system can potentially be used for requesting the needed files with any mobile telephone that can send SMS. The user sends an SMS (containing the course name, the order needed and his email) to a mobile phone installed at the receiving end. At the receiver end, GSM modem receives the SMS and passes the data frame through serial port to a computer. The received text need to be understood using classification technique so as to perform the required action and send the requested files to the user email. The computer system also sends a data frame to the user mobile phone; requesting to resend an SMS if the first one was ambiguous and the classification algorithms were unable to recognize the requested material. Improving classier performance has been an area of intensive machine-learning research for the last two decades. Out of that work has evolved a new generation of state-of-the-art classiers, such as support vector machines, boosted decision trees, regularized logistic regression, neural networks, and random forests, [11]. Survey and comparison of well known machine learning tools for pattern recognition algorithms can be found in references [4,7,8]. This paper shows that the combination of multilayer back propagation neural networks and Soundex algorithms increases the matching rate of the designed text SMS classifier system. The ability of neural network classifier to generalize conclusions from the tested data which do not exactly match the training set is one of the significant strength of this type of classifiers. There was a need to make the matching process more accurate by considering the pronunciation errors that may occur while writing the text messages. Thus, Soundex is used which is a phonetic algorithm for indexing names by sound, as is pronounced in English. The goal is for names with the same pronunciation to be encoded to the same representation

i-managers Journal on Software Engineering, Vol. 4 l3 l No. January - March 2010

RESEARCH PAPERS
so that they can be matched despite minor differences in spelling [5]. The remainder of the paper is organized as follows: in section 1, the proposed intelligent service system based on text SMS recognition is described. Then, in section 2, an overview of multilayer neural network and Soundex is provided. This is followed, in section 3, by discussing the experimental results. Finally in section 4, a discussion of the features and advantages of the new system is included. 1. System Description The SMS serving system aims to receive requests from students asking for files related to their courses through SMS. The messages can be sent from any mobile phone with GSM modem to a predefined mobile phone number. The received text message will be processed by a text recognition model to understand the student request. Artificial neural networks using Back propagation algorithm and the implementation of Soundex searching algorithm are included in the system as text recognition algorithms that work in parallel. Both algorithms classify the requested files. If the Neural networks were unable to recognize the requested files due to typing or language mistakes the system will depend on the result of Soundex algorithm to decide the required response to the user. If both algorithms failed to understand the user request, a message will be sent to the user indicating a failed operation due to an ambiguous message. Once the recognition processes ended, it uses the recognized words to search the system data base for the needed files. Finally, the intelligent serving system sends an email with attachment files to the user email. Figure 1 shows an intelligent system main component.
Figure 2. The request message format.

2. Text Recognition Model Natural language processing explores how computers can be used to understand and manipulate written text to perform the desired task [5]. In this paper, two techniques are used to perform text recognition on the received text message. They are multi-layer perceptron MLP neural networks using Back propagation algorithm and Soundex algorithms. The proposed text recognition system involves the following steps: Digitizing the received message. preprocessing. Data Inputs to the neural networks and Soundex algorithms. System output according to the results obtained from both techniques. The request text message format includes three parts: the user email, the order, and the subject as shown in Figure 2. Figure 3 shows an example of a request message.

Figure 1. An Intelligent Service System main components.

Figure 3. A request message example.

i-managers Journal on Software Engineering, Vol. 4 l3 l No. January - March 2010

RESEARCH PAPERS
The order part of the message represents the type of order the students need. They are categorized into four classes: lecture notes, homework, passed examination papers, and e-book, as shown in Table 1. The subject part represents the course name as related to the order. The subjects included in this system are indicated in Table 2. 2.1 Artificial Neural Networks Neural networks are based on the idea that one can simulate the power of the human brain by artificial means. The neural networks help to solve these problems with natural mechanisms of generalization. They do classification by similarity and hence are not suitable in situations where we cannot trust similarity. Neural networks store pattern or function information with distributed encoding. They superimpose pattern information on the many synaptic connections between neurons. On the whole, neural network behaves as an adaptive function estimator [6]. The architecture of a neural network determines how a neural network transforms its input into an output. This transformation can be viewed as a computation [8]. Two MLP neural networks have been implemented, one for the order section and the other for the subject section in the text message. They are designed with three layers as shown in Figures 4 and 5. The MLP neural networks have two hidden layers of TANCH neurons followed by an output layer of linear neurons. In the first MLP the numbers of neurons in , the input, first hidden layer, second hidden layer, and the
No. 1 2 3 4 Order Notes Homework Passed Examination Papers E-book

Figure 4. The architecture of the first neural network.

Figure 5. The architecture of the second neural network.

output layer are 10, 22, 27, and 26 respectively. In the second MLP the numbers of neurons in the input, first , hidden layer, second hidden layer, and the output layer are 8, 18, 10, and 6 respectively. In practice, two hidden layers are often used to form any mapping needed and to speed up convergence. As the number of inputs to the NN increases, the ratio of hidden layer neurons to inputs decreases. Multiple layers of neurons with nonlinear transfer functions allow the network to learn nonlinear and linear relationship between input and output vectors [2]. The neurons within each layer are connected with the neurons of the adjacent layers through directed edges. There are no connections among the neurons within the same layer.

Table 1. The message order part items.


No. Subject 1 Advanced computer architecture 2 Computer architecture 3 Artificial intelligence 4 Programming language 5 Computer networking No. Subject 9 Digital techniques 10 Discrete mathematics 11 Embedded system design 12 Microprocessors 13 Object oriented programming

6 Data communication 14 Real time systems 15 System Programming and 7 Data Base analysis. 8 Digital signal analysis and processing

Table 2. The message subject part items.

i-managers Journal on Software Engineering, Vol. 4 l3 l No. January - March 2010

RESEARCH PAPERS
Only the direction of information flow for the feed forward phase of operation is shown. During the back propagation phase of learning, signals are sent in the reverse direction. 2.2 Soundex Algorithm Soundex is a phonetic algorithm for indexing names by sound, as pronounced in English. The goal is for names with the same pronunciation to be encoded to the same representation so that they can be matched despite minor differences in spelling [12]. The Soundex code for a name consists of a letter followed by three digits: the letter is the first letter of the name, and the digits encode the remaining consonants. Similar sounding consonants share the same digit so, for example, the labials B, F, P and V are each , encoded as 1. Vowels can affect the coding, but are not coded themselves except as the first letter. However if "h" or "w" separate two consonants that have the same Soundex code, the consonant to the right of the vowel is not coded. The correct value can be found as follows, [12]: Retain the first letter of the word. Drop all vowels, letter h, and letter y except the first letter. Replace consonants with digits as follows (but do not change the first letter): _ _ _ _ _ _ b, f, p, v => 1 c, g, j, k, q, s, x, z => 2 d, t => 3 l => 4 m, n => 5 r => 6 value. Remove all non-digits after the first letter. Retain the starting letter and the first three remaining digits. If needed, append zeroes to make them a letter and three digits. Soundex recognizes that certain consonants are similar sounding and groups them together. This means that if Soundex is used in text recognition of words written by users according to the way they spell the words, the user may spell the words incorrectly, and as a result Soundex, possibly still have the correctly spelled word [9]. Soundex grouping results in letters that are used for the same sounds to be grouped together. For example 'f' and the 'p' of 'ph' appear in group 1. This allows for common errors in how people may spell a location name if, for example, they had only heard about a place by word of mouth. For example, using Soundex algorithm, both "Robert" and "Rupert" return the same string "R163" while "Rubin" yields "R150" [12]. 3. Experimental Results In this section, the steps of designing and testing the proposed text recognition system are described. After digitizing the received text message, a preprocessing stage is required to scale and represent the data inputs, then to apply them to the inputs of the Back propagation MLNN and Soundex algorithms. During the design of the NNs, many scaling methods have been tested and it has been found that the MLNN learned the desired patterns and classified the tested patterns with better recognition rate when the following scaling steps are used: Convert each character in the input word to its binary representation. Add the binary numbers of all characters within one word and divide it by number 3. For example, the word "advanced" can be represented in ASCII characters as "97-100-118-97-110-99-101-100". After scaling, the number resulted from this word is "250H". The same procedure was applied to all the desired words and a unique number was found for each word. Table 3 shows the inputs of the subject part NN, second NN shown in Figure 5, after digitizing and scaling the desired input patterns. Similar table was created for the order part NN, first NN shown in Figure 4. This data representation provides a unique value for each trained pattern in the MLNN. The NN was able to recognize and classify the messages words correctly when the words have 40% and fewer errors in the word spelling or missing characters. Increasing the training set by adding all the possible mistakes that may happen while writing the message increased the recognition rate but the system needs another supporting technique that can deal with words sounds rather than spellings. The Soundex algorithm is used to satisfy this requirement.

adjacent identical digits into a single digit of that Drop

i-managers Journal on Software Engineering, Vol. 4 l3 l No. January - March 2010

RESEARCH PAPERS
Course Name Advanced Architecture Artificial Analysis Computer Communication Database Digital Data Discrete Design Embedded Intelligence Language Mathematics Microprocessors Networking Object Oriented Programming Processing Real Systems Signal Techniques Time ASCII Value 97-100-118-97-110-99-101-100 97-114-99-104-105-116-101-99-116-117-114 101 97-114-116-105-102-105-99-105-97-108 97-110-97-108-121-115-105-115 99-111-109-112-117-116-101-114 99-111-109-109-117-110-105-99-97-116-105 111-110 100-97-116-97-98-97-115-101 100-105-103-105-116-97-108 100-97-116-97 100-105-115-99-114-101-116-101 100-101-115-105-103-110 101-109-98-101-100-100-101-100 105-110-116-101-108-108-105-103-101-11099-101 108-97-110-103-117-97-103-101 109-97-116-104-101-109-97-116-105-99-115 109-105-99-114-111-112-114-111-99-101115-115-111-114-115 110-101-116-119-111-114-107-105-110-103 111-98-106-101-99-116 111-114-105-101-110-116-101-100 112-114-111-103-114-97-109-109-105-110103 112-114-111-99-101-115-115-105-110-103 114-101-97-108 115-121-115-116-101-109-115 115-105-103-110-97-108 116-101-99-104-110-105-113-117-101-115 116-105-109-101 S (ASCII Values)/3 250 3BF 303 232 2AD 3C6 22D 6C2 116 29F 20F 28C 3FA 276 361 500 381 1CA 2C6 3AF 35B 13C 208 1EE 358 161

suggested words; the word associated with the most minimum difference is taken. For example, assume the course name Architecture is sent by user as Arcgiteter. According to Soundex algorithm described in section 3.2, the word Arcgiteter will have the phonetic value equals to A622. This word does not exist in the designed Soundex data base. Thus, the software will compare it with similar words included in its database. Similar words that start with letter A are listed below: Words Advanced Analysis Architecture Artificial Phonetic Value A315 A542 A623 A631

The minimum difference between A622 and the listed words is associated with the word Architecture. Thus, the Soundex algorithm will recognize the word Arcgiteter as Architecture. The final decision of the system depends on the results obtained from neural networks and Soundex algorithms. When both algorithms are unable to recognize the order message, the system will notify the user that the order was not clear and asks to resend the order. The requested files will be sent to the user email. Conclusion It is concluded from the experiment that the recognition rate of the received text message increased by combining Soundex and multi-layer neural networks algorithms working in parallel. The study of the performance per received message shows that for some user's orders, the MLNN classifier achieved better results whereas for the others the Soundex algorithm gives better performances. The combination approach profits from the advantages offered by each classifier performance. The problem with Soundex algorithm is that, it uses the first letter of a word as a key component of the code it generates to represent the word. Words that do not begin with the same letter will never match each other. The user who writes the message asking for specific files may miss writes the first letter of a word. MLNN can recognize words

Table 3. Digitizing and scaling the desired input patterns of the subject part NN.

In this research, the SQL Server's variant on Soundex algorithm [3] was implemented. The database of the system was created using SQL server 2005 and it consists of the following tables: Soundex of the order part: this dictionary is customized to include all possible words of students' order. Soundex of the subject part: this dictionary is customized to include all the department subjects. links: this table includes links to all files that may be Files requested by students. Messages history: stores received messages from students; this can be used to do statistics on the requested files and analysis most common students writing errors that may help to improve text recognition system performance. The implemented Soundex software works as follows: reads the received text message words and It searches the Soundex database. each word, if the word is not in the Soundex For database, a list of possible suggestions is resulted. received unknown word is compared with the The

i-managers Journal on Software Engineering, Vol. 4 l3 l No. January - March 2010

RESEARCH PAPERS
with the first letter missing while Soundex algorithm will not produce a match with its database. Also, Soundex relies on predictable sound-to-letter relationships, so it will not overcome any random spelling variations, unless these just happen to coincide with a predictable pattern. References in Computational Intelligence. Vol. 160, Berlin, Heidelberg: Springer-Verlag. [7]. Duda, P E., and Stock, D. G. (2001). Pattern . Classication. Second Edition. New York: John Wiley & sons. [8]. El-Sebakhy, E. A., Raharja, I. D., and Khaeruzzaman, Y. (2007). Machine Learning and Data Mining Tools for the Pattern Recognition: Theory and Applications. Maryland Heights, USA: Elsevier Science. [9]. Hermansen, J. C. (1985). Automatic name searching in large data bases of international names. Ph.D. thesis, Washington, DC: Georgetown University. http://www. archives.gov/genealogy/census/soundex.html. [10]. Mani N., and Srinivasan, B. (1997). Application of Artificial Neural Network Model for Optical, Character Recognition. IEEE International Conference on Systems, Man and Cybernetics. Orlando, Florida, USA 12-15 Oct, 3, pp. 2517-2520. [11]. Manning, C. D., Raghavan, P and Schtze, H. (2007). ., An Introduction to Information Retrieval. Cambridge, England: Cambridge Universsity Press. [12]. National Archives and Records Administration. (2007). The Soundex Indexing System. Washington, DC: U.S. National Archives. http://www.codeproject.com/KB /recipes/soundex.aspx

[1]. Awwad, Y., Lin, C., and Yuan, S. (2006). Ubiquitous


Information Gathering with SMS Quer y Service. Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics. Istanbul, Turkey, May 27-29, pp. 203-206. [2]. Badri, L. (2010). Development of Neural Networks for Noise Reduction. International Arab Journal of Information Technology (IAJIT), accepted for publication, Vol. 7, No. 3, July. [3]. Birkby, R. (2002). A SoundEx implementation in .NET. http://www.codeproject.com/KB/recipes/soundex.aspx [4]. Bishop C. (1997). Neural networks for pattern recognition. Oxford: Oxford University Press. [5]. Chowdhury, G. G. (2003). Natural language processes. Annual Review of Information Science and Technology, Vol. 37, No. 1, pp. 51-89. [6]. David, V. K., and Rajasekaran, S. (2009). Pattern Recognition Using Neural and Functional Networks, Studies

ABOUT THE AUTHORS


Lubna Badri Mohammed received her B.Sc and M.Sc degree, in Computer and Control Engineering, from the University of Technology, Baghdad, Iraq in 1994 and 1996 respectively, and the PhD degree in Computer Engineering, from University of Technology in Baghdad, Iraq, in 1999. Her interest is in the fields of Neural Network and Fuzzy Logic, Knowledge Acquisition Systems, and Embedded System Design. She has one published book and more than 15 papers published in reputed Journals and conferences.

Bilal Deya AlSaleh received his B.Sc degree in Computer Engineering from Philadelphia University, Amman, Jordan in 2009. His research interest is in the fields of Neural Networks and Mobile Communications and Applications.

Rami Zuhdi AlKawamleh received his B.Sc degree in Computer Engineering from Philadelphia University, Amman, Jordan in 2009. His research interest is in the fields of Computer Networks and Programming and Software Engineering.

i-managers Journal on Software Engineering, Vol. 4 l3 l No. January - March 2010

e-mail: info@imanagerpublications.com contact@imanagerpublications.com www.imanagerpublications.com

i-manager Printing Press

3/343, Hill view, Town Railway Nager, Nagercoil Kanyakumari Dist. Pin-629 001. Tel: +91-4652-227816, 226215

You might also like