|
|
Issue 1, Volume 7,
January 2010
Title
of the Paper:
A Safe Antifraud System for Art: Safeart
DOWNLOAD FULL PDF
Authors:
Giovanni Neri, Matteo Artuso
Abstract: It is well known that the world of art (paintings, sculptures,
graphics etc) is plagued by the virus of counterfeits and this issue is
particularly sensible in a country like Italy where art has flourished for
centuries and where in the XX century too many pieces of art of great painters
were copied and/or counterfeited and sold for authentic. Counterfeiting is a
crime which involve great amounts of money and is perpetrated at all levels,
with no exclusion of the greatest art dealers. Once a style or painter has had
success it is even too simple to find a epigone which either can copy a single
painting or paints according to one particular style. Great examples in Italy
are Morandi, De Chirico, Vedova etc. artists with a well defined (and
therefore easy to copy) style. In our university we have developed and
implemented a digital system which can prove without any doubt the
authenticity of a piece of art and which is tamper-proof at all levels.
Keywords: Art authenticity, digital signature, wireless devices
Title
of the Paper:
A Time-Frequency Adaptation Based on Quantum Neural Networks for Speech
Enhancement
DOWNLOAD FULL PDF
Authors:
Kun-Ching Wang, Chiun-Li Chin
Abstract: In this paper, we propose a novel wavelet coefficient threshold (WCT)
depended on both time and frequency information for providing robustness to
non-stationary and correlated noisy environments. A perceptual wavelet
filter-bank (PWFB) is firstly used to decompose the noisy speech signal into
critical bands according to critical bands of psycho-acoustic model of human
auditory system. The estimation of wavelet coefficient threshold (WCT) is then
adjusted with the posterior SNR, which is determined by estimated noise power,
through the well-known “Quantum Neural Networks (QNN)”. In order to suppress
the appearance of musical residual noise produced by thresholding process, we
consider masking properties of human auditory system to reduce the effect of
musical residual noise. Simulation results showed that the proposed system is
capable of reducing noise with little speech degradation and the overall
performance is superior to several competitive methods.
Keywords: Speech enhancement; perceptual wavelet packet transformation;
adaptive wavelet coefficient threshold; musical residual noise
Title
of the Paper:
Research and Development of Application of Mobile Barcode to Mobile
Sightseeing Guide on Mobile Phone
DOWNLOAD FULL PDF
Authors:
Chih Ming Chen, Tingsheng Weng
Abstract: With rapid developments in the combined technologies of tourism and
mobile communications, Internet access is readily available, anytime and
anywhere. The mobile data service industry has gradually replaced voice
services, and become the target market of mobile telecommunication system
operators. In the mobile commerce field, the characteristics of Location Based
Services (LBS) vary widely according to the users' current environment,
service demands, and variations in positions. Therefore, how to know the
current position of a user and respond to requests to provide different
services is an important challenge of the future. This study proposes
corresponding solutions to overcome the above problems. Using the tour guide
map as an example, to complete a "mobile tourist guide map information
service", a user can employ the camera function of a mobile phone to sense and
capture a mobile barcode, and then connect it to the backend database of the
server, through a wireless network for e-map information and voice guides, and
make on-line inquiries regarding e-maps. The most convenient route of nearby
communications can be obtained through the tourist guide map, allowing users
an audio guide service to find their way.
Keywords: Mobile barcode, wireless network, LBS, mobile tourist guide
map, GIS
Title
of the Paper:
Design and Implementation of Monitoring and Management System for Tank Truck
Transportation
DOWNLOAD FULL PDF
Authors:
Wei Chen, Yan Chen, Donghui Guo
Abstract: In order to reduce the wastage and loss of petroleum products in
transit, a monitoring and management system is proposed for tank truck
transportation. In this system, a vehicle transport recorder is developed to
record the operations of inputs and outputs of a tank truck via a kind of Hall
Effect switch sensors. Wireless data transceivers are designed to start and
stop monitoring in the starting stations and destinations automatically. The
information recorded by the vehicle transport recorder is collected by a smart
card and then it is transferred to the host management software which is
developed to manage the transportation data, alarm messages, devices,
archives, etc. The integrated and intelligent system has been implemented and
applied to practice, and it reduces the loss of petroleum products during the
transportation efficiently.
Keywords: Monitoring, management, tank truck, transportation, smart
card, CC1100 chip, wireless data communication
Title
of the Paper:
Decoupled -Layer Optimal Stabilizer Design
DOWNLOAD FULL PDF
Authors:
T. Y. Hwang, C. H. Chang, C. C. Huang, Y. N. Lien, T. L. Huang, C. T. Wang, J.
S. Sheu
Abstract: The purpose of this paper is to address the design of
decoupled-level large system controllers using an optimal reduced order model
whose state variables are all output states. The reduced-order model retains
their physical meaning and is used to design a decoupled-level linear feedback
controller that takes into account the realities and constraints of the large
systems. The decoupled-level control strategy is used and a global control
signal is generated from the output variables to minimize the effect of
interactions. As a result, the effectiveness of this controller is evaluated
and considerable savings in computer memory are achieved. In conclusion, the
controllers determined at the subsystem level depend only on local information
operating to the particular machine. Example is given to illustrate the
advantages of the proposed method. Responses of the system with
decoupled-level scheme and optimal reduced order scheme are included for
comparative analyses. It is recommended that the proposed method can be
applied to supper large system.
Keywords: Optimal reduced order model, Decoupled controller
Title
of the Paper:
A Visitor Counter System Using Fuzzy Measure Theory and Boosting Method
DOWNLOAD FULL PDF
Authors:
M. Rahmat Widyanto, Ferdi Ferandi, Martin Leonard Tangel
Abstract: This paper proposes a visitor counter system which is capable of
counting single & multiple object visitors using fuzzy measure theory for
tracking and Boosting method for classification. Besides fuzzy measure theory,
the paper also uses Euclidean distance to track a visitor based on his
movement between each frame, while fuzzy measure theory tracks a visitor based
on trust degree. Both system performances are compared for their visitor
tracking accuracy and their computational speed. Experimental results show
that Euclidean distance and Fuzzy measure have similar accuracy for tracking
visitor. However, Euclidean distance is faster than those of fuzzy measure
theory in the computational speed. The proposed visitor counter system can be
further developed for real-time visitor counting in shopping mall, station,
and other places.
Keywords: Boosting classifier, object detection, fuzzy measure,
euclidean distance, tracking, counting
Title
of the Paper:
Design and Implementation of an Ontology-Based Psychiatric Disorder Detection
System
DOWNLOAD FULL PDF
Authors:
Y. C. Lin
Abstract: In this paper, we combine a decision tree algorithm with Protege, to
construct an ontology-based meridian method that serves as an example
psychiatric disorder inference and a knowledge-sharing platform. This method
may effectively detect a psychiatric disorder by pinpointing an association
between the meridian system and modern medicine; it may also help to build a
fuller picture of expert knowledge by constructing domain and task ontologies.
This system provides the general public an understanding of the issues
involved, while allowing experts to participate and be totally aware of
satisfying the requirements therein. Moreover, the system will help eliminate
information disparity between patients and physicians.
Keywords: Ontology, Psychiatric disorder, Domain ontology, Task
ontology, Ontology-based system
Title
of the Paper:
Application of Half-Life Theory and Fuzzy Theory to a Selection And
Recommendation System for Web Advertisement Delivery In Consideration of the
Time Effect
DOWNLOAD FULL PDF
Authors:
Tung-Yen Lai, Gwo-Haur Hwang
Abstract: With the rapid development of the Internet, Web marketing has become
more and more popular among businesses. However, excessive advertisement
information is not only a burden to consumers but also a waste of marketing
efforts. In this study, a personalized Web advertisement selection and
recommendation system is proposed through a membership-based advertisement
marketing website whose advertisement content is determined by consumer
preference. As consumer preference declines with time, which is called the
time effect, the proposed system applies the half-life theory and the fuzzy
theory to members’ browsing behaviors and automatically analyzes browsers’
time-affected preference levels associated with the advertised products. Then,
the target markets of the advertisement suppliers’ products are matched with
customer preference so as to filter out a portfolio of candidate
advertisements for delivery. Finally, advertisement delivery is arranged via a
commercial advertisement delivery scheduling and recommendation model so that
browsers obtain exactly the advertisements they need, the benefits of target
marketing are increased, and Web advertising service providers’ market
competitiveness is strengthened. Thus, a win-win-win scenario for the
consumers, the advertisement suppliers, and the Web advertising service
providers is realized.
Keywords: Fuzzy theory, Half-life theory, Personalized service, Web
advertisement selection, E-commerce
Title
of the Paper:
Nonparametric Procedures in ICTs-Based Agricultural Market Information Network
Pattern Analysis in Western African Regions
DOWNLOAD FULL PDF
Authors:
Wen-I Chang, Chao-Lin Tuan, Seydou Traore
Abstract: Information and communication technology (ICT) has become an
important and essential decision support tool in agricultural products
marketability. The high production cost of farms and the increasing demand for
food have pushed ICT to the forefront of the food supply chain. In developing
world such as Sub-Saharan African (SSA) regions where the farm profitability
is generally low, efforts have been focused on agronomy and production
technologies for enhancing farm productivity. In today’s competitive global
and regional marketplaces, however, producing a sound product is not enough to
ensure agricultural farm viability. Market information is considered as a
prerequisite of farm business to enable the management of the products flow
and substantially increase the benefit. Furthermore, ICT can reduce poverty by
improving poor people’s access to the market information to have better
managerial decisions for maximizing their farms profits. Nevertheless, the
realistic availability and effectiveness of ICT in current market information
network to farm management in Africa have not yet been much explored.
Therefore, this study aims to (i) analyse the ICT contribution in agricultural
products market information system (MIS) through nonparametric procedures and
(ii) identify the main problems for seeking an effective market-oriented
information network pattern. For this study, important data for horticultural
marketing have been collected in Saint-Louis and Dakar regions located in
Senegal, Western Africa. From the results of this study, it is mainly found
that there are different market information network patterns in the survey
areas. These market information network patterns mostly rely on weak personal
social contacts of producers and one-way media. Statistically, it is observed
that some widely available ICTs have not been used effectively for market
information dissemination in the survey areas. Basically, the major
constraints of ICTs application for MIS in Senegal are the poverty of
information contents, disadvantages of the remote communities, language
incapability and out-of-date information. Therefore, this study proposes an
information network scheme as an effective strategy to enhance the existing
market information system in Senegal.
Keywords: ICT, MIS, horticultural marketing, information network
pattern, farm profit, effective strategy, Western African regions
Title
of the Paper:
eDocument in eGovernment
DOWNLOAD FULL PDF
Authors:
Stanislava Simonova, Hana Kopackova
Abstract: This article focuses on the electronic documents in Czech
eGovernment. The utilization of so called data boxes for communication between
public administration and third parties (citizens, juristic persons) means
significant step of the complex project. Aim of this project is – the pure
electronic performance of Czech public administration. The prepared and
realized technological changes in Czech public administration are huge; they
affect state local and municipality authorities, legal entities and also
citizens. On the one side are new possibilities of friendly public
administration; on the other side are preparedness and informedness of future
users.
Keywords: Data box, smart government, Czech POINT, eGON, e-document
Title
of the Paper:
Generalized Entropy Optimization Distributions Dependent on Parameter in Time
Series
DOWNLOAD FULL PDF
Authors:
Aladdin Shamilov, Cigdem Giriftinoglu
Abstract: In this paper, we have proposed Generalized Entropy Optimization
Problems (GEOP) concerned with parameters which consist of maximizing Entropy
Functional subject to constraints dependent on parameters. Therefore,
MinMaxEnt and MaxMaxEnt distributions are obtained as solutions of these
problems. On bases of MinMaxEnt distribution we have developed a new
estimation method of obtaining missing values in time series. Mentioned
estimation method is applied to the data generated from autoregressive model
for one missing value. The performance of the developed method is evaluated by
mean square errors (MSE) calculated from simulation studies and the validity
of this method is shown.
Keywords: MinMaxEnt Distribution, MaxEnt Distribution, Time Series with
Missing Value, Estimation of Missing value, Autoregressive Modelling
Title
of the Paper:
Informative Global Community Development Index of Intelligent City
DOWNLOAD FULL PDF
Authors:
Jalaluddin Abdul Malek
Abstract: Informative Global Community Development Index (IGC) is an analysis
method that looks at the development of the community currently residing in a
intelligent city. From the understanding method, the development of
intelligent cities based on a deontological ethics, the process of developing
an intelligent city has to return maximum interest to the majority of the
residing community in terms of hardware and software. The enhancement of IGC
has become vital as the mile mark in developing Malaysia into a developed
nation by the year 2020. In conjunction to that the method of cumulative index
analysis IGC development has been used in this research as the main method in
measuring the development of IGC. About 127 middle class families in Subang
Jaya Smart City were chosen as research respondents in order to measure the
IGC development index in Subang Jaya. All the variables are covered under
ability component (humanware), management component and information
supervision (infoware), components of ownership and communication and
information technology usage (technoware), as well as the usage value of ICT
and cyber ethics (valueware). The IGC development Index which was used
utilized the Rogers scale which looked at levels of innovation,
pre-acceptance, pre-majority, final majority and final scale. The analysis
showed that most of the residents in Subang Jaya only achieved IGC development
in the pre-acceptance, pre-majority and final majority scale. This meant that
there weren’t any of the residents in Subang Jaya which achieved the final
scale.
Keywords: Informative Global Community Development Index and
Intelligent City
Title
of the Paper:
Spatial Analyses Help to Find Movement Barriers for Physically Impaired People
in the City Environment - Case Study of Pardubice, Czech Republic
DOWNLOAD FULL PDF
Authors:
Pavel Sedlak, Jitka Komarkova, Adriana Piverkova
Abstract: One of the main aims of the contemporary society is to provide
barrier-free environment so all physically impaired people can move safely and
without any discomfort. Utilization of GIS and spatial analyses to identify
barriers for physically impaired people in the city of Pardubice (Czech
Republic) is described in the paper. At first, data had to be collected. Then,
database queries, proximity analyses and network analyses were used to analyze
them, find barriers and evaluate friendliness of the city environment for
people with physical impairment. Proposal for the future work are presented in
the paper too.
Keywords: Physically impaired, GIS, barriers, spatial analyses
Title
of the Paper:
Visualization of the Packet Flows using Self Organizing Maps
DOWNLOAD FULL PDF
Authors:
Hiroshi Dozono, Takeru Kabashima, Masanori Nakakuni, Shigeomi Hara
Abstract: Recently, the spread of the Internet makes familiar to the incident
concerning the Internet, such as a DoS attack and a DDoS attack. Some methods
which detect the abnormal traffics in the network using the information from
headers and payloads of IP-packets transmitted in the networks are proposed.
In this research, the method for the analysis of the flow of IP packet based
on SOM (Self-Organizing Map) using the occurrence rate of the elements in
IP-packets as input vectors is proposed. The flow of the packets can be
visualized on the map and it will be available for detecting the abnormal
flows of packets.
Keywords: Packet Traffic Analysis, Self Organizing Map, IDS, Network
incident, TCP/IP
Title
of the Paper:
A GIS-Based Spatiotemporal Analysis of the Exposure to Direct Sun Light on
Rural Highways
DOWNLOAD FULL PDF
Authors:
Christos Chalkias, Antigoni Faka
Abstract: Geographical Information System (GIS) technology integrates
hardware, software and spatial data for capturing, storing, updating,
managing, analyzing and displaying geographical data and phenomena.
Spatiotemporal analysis of such phenomena is one of the major tasks of a GIS.
In this paper, we use GIS for the modeling of the exposure to direct sun light
in a rural road network. When a vehicle is moving towards the direction of the
sun, drivers may experience temporary loss of vision. The main target is to
build a system able to identify road sections at risk due to direct sun-light
for a specific time period. The proposed methodology is based on the road
network geometry, the relief of the study area under investigation (Digital
Elevation Model – DEM) and the sun position. The hillshade creation function
and various filtering techniques have been adopted. These techniques are based
on the geometry of road segments in comparison to the sun position. The output
of this analysis is the identification of road network parts that appeared at
risk for a specific time period. The proposed method is implemented in
Santorini Island during summertime period. The results in this case study
shows that a significant part (5% of the total road network length) of the
road network is highly exposed to the risk under investigation during the
summer. Additionally, the implementation of the proposed method for a long
time period allows a dynamic modeling of the conditions under investigation,
and the adoption of various preventing actions.
Keywords: GIS, spatiotemporal modeling, direct sun-light exposure, DEM,
road network risk analysis
Issue 2, Volume 7,
February 2010
Title
of the Paper:
An Ontology-Based Architecture for Consumer Support Systems
DOWNLOAD FULL PDF
Authors:
Jyhjong Lin, Jenperng Yu, Changling Hsu
Abstract: For enterprises, customer relationships have been commonly
recognized as a critical factor to succeed their business. Effective customer
relationships could help enterprises deliver services to customers based on
their needs, preferences, or past transactions. This model however emphasizes
on the use of customer information for benefiting enterprises; customers in
contrast receive less information from enterprises. To address this issue, a
new paradigm, namely Consumer Support Systems (CSS) is initiated to support
effective information provision for customers to help on their decision
making. In this paper, we present an ontology-based architecture for such a
new CSS paradigm. The architecture starts from the identification of CSS
characteristics, through the recognition of architectural components that
support the realization of these issues, and finally ends with the
specification of collaborations among architectural components to realize
these issues. In particular, for those inherent integration issues in CSS, it
imposes semantic ontologies on the specifications to facilitate integration
among customers and enterprises. The architecture is modeled by UML and
illustrated by a CSS for travel arrangement.
Keywords: Customer relationship management, consumer support system,
ontology-based, architecture, UML
Title
of the Paper:
A Study of Interactive Qualitative at Online Shopping Behavior
DOWNLOAD FULL PDF
Authors:
Chien-Yuan Lai, Dong-Her Shih, Hsiu-Sen Chiang, Ching-Chiang Chen
Abstract: As the information age arrives and the internet network has very
popular day by day. Internet network has already become quite important
activity in people's daily life. The research shows that there are more than
650 million non- repeating users shop on line, including shopping center
websites and sub channel. According to network auction and relevant literature
of network marketing, the behavior that consumers adopted the network platform
and e-shopping has been common in recent years. This paper focuses on the
interactive qualitative at online shopping behaviours, and in this study, the
research purposes are as follows: First, by the transaction costs theory to
probes into users’ attitude of online shopping behaviors to influence users’
using wills. Second, with IQA, focus group deeply interview, probes into the
real demands of e-shoppers. Third, carrying on the different ethnicities users
and probing into its different attitude and using aspiration. This research
finds out the common experience in group's interview, and through affinity and
theoretical coding. Finally, we find that the behavior of purchasing on line,
there was a huge different between men and women. Girls think interface
designing and security are important reasons to influence other factors. Men,
then, think interfaces designing and after-sale service are more important.
Based on the considered relation, women obviously have priority relation.
Besides interface designing, groups have no connection. It is obviously men
and women have loud difference to influence e-shopping behaviors.
Keywords: Interactive Qualitative Analysis (IQA), On-line shopping,
transaction cost, Interactive qualitative research
Title
of the Paper:
Three Efficient Algorithms for Implementing the Preferential Attachment
Mechanism in Yule-Simon Stochastic Process
DOWNLOAD FULL PDF
Authors:
Roberto Tonelli, Giulio Concas, Mario Locci
Abstract: We describe how different optimized algorithms may be effective in
implementing the preferential attachment mechanism in different cases. We
analyze performances with respect to different values of some parameters
related to the Yule process associated to the preferential attachment. We
examine how performance scales with system size and provide extensive
simulations to support our theoretical findings.
Keywords: Complex Systems, Software Process Simulation, Algorithms,
Modeling, Stochastic Processes
Title
of the Paper:
Relation between Successfulness of Birthday Attack on Digital Signature and
Hash Function Irregularity
DOWNLOAD FULL PDF
Authors:
Milan Tuba, Nadezda Stanarevic
Abstract: In many network communications it is crucial to be able to
authenticate both the contents and the origin of a message. Digital signatures
based on public key schemas are used for such authentication. In order to
provide message authentication the signature must depend on the contents of
the message being signed. Since the public key-based signature schemes take
too much time to compute, hash functions that map messages to short digests
h(M) are used. Among other desirable properties of hash functions, an
interesting one is that it should be collision-resistant, that is it should be
difficult to find two messages with the same hash value. To find a collision
the birthday attack is used, which shows that attacker may not need to examine
too many messages before he finds a collision. Even worse, in estimates of
attack successfulness it is always assumed that the hash function is regular,
meaning that all points in the range have the same number of pre-images under
h. If h is not regular, fewer trials are required to find a collision. In this
paper we first compute tighter upper and lower bounds for the number of
birthday attack trials when the hash function is regular. Then we examine
different types of irregularity of the hash function and the quantitative
changes in the required number of trials to find a collision which then
compromises the digital signature system.
Keywords: Digital signature, Birthday attack, Irregular hash function,
Hash collision
Title
of the Paper:
A Structure-Break Option Framework for Bank Margin Valuation When
Foreign-Denominated Loans Squeezing a Country
DOWNLOAD FULL PDF
Authors:
Jyh-Horng Lin, Ching-Hui Chang, Rosemary Jou
Abstract: The banking industry is recently experiencing a renewed focus on
retail banking, a trend often attributed to the stability and profitability of
retail activities (Hirtle and Stiroh, 2007). This paper examines operations
management in bank interest margin when foreign-denominated loans are
squeezing a country as its currency falters. In a call-option model with
fat-tail distribution framework where structural changes from exchange rate
depreciated dramatically are the source of uncertainty (we call such changes
bad events), exchange rates or bad events have direct effects on the bank’s
optimal interest margin. A depreciation in the domestic currency results in an
increased interest margin. We conclude that retail banking may be a relatively
shrinking lending activity but it is a high return one when an observed bad
event from the domestic-currency depreciation is becoming worse.
Keywords: Bank Interest Margin, Retail Banking, Exchange Rate,
Structural Change
Title
of the Paper:
Creating the Classroom Environment for Asynchronous E-learning
DOWNLOAD FULL PDF
Authors:
Ade G. Ola, Abiodun O. Bada, Emmanuel Omojokun, Adeyemi A. Adekoya
Abstract: In higher education, the trend continues to shift from traditional
teaching methods to student-centered strategies that are known to promote
learning. At the same time, the integration of online education into the
mainstream of higher education is intensifying. This paper addresses the
problem of adapting classroom strategies for asynchronous online learning, so
as to derive a learning model that combines the flexibility of online
education with effective classroom-based strategies. The paper prescribes
methods for putting into practice, for online education, active learning
strategies that have been proven to be effective in the traditional classroom
environment. First, the paper presents an overview of various active learning
strategies and common classroom activities. Next, it introduces an array of
open technologies and standards relating to learning resources, collaboration
and learning experience management, and media markup languages. Then, it
describes methods, which are based on the open technologies and standards, for
effecting the learning strategies and common classroom activities in
asynchronous online learning. This line of research (devising methods to
augment the flexibility and other advantages of asynchronous online learning
with classroom strategies that are known to enhance learning) has the
potential for changing the face of online education.
Keywords: Classroom strategies, Open technologies, Asynchronous online
education, Active learning strategies
Title
of the Paper:
Complex Scheduling Problems Using An Optimization Methodology
DOWNLOAD FULL PDF
Authors:
Jorge Magalhaes-Mendes
Abstract: Scheduling operations problems arise in diverse areas such as
flexible manufacturing, production planning and scheduling, logistics, supply
chain problem, etc. A common feature of many of these problems is that no
efficient solution algorithms are known that solve each instance to optimality
in a time bounded polynomially in the size of the problem, Dorndorf and Pesch
[22]. Discrete optimization can help to overcome these difficulties. This
paper presents an optimization approach to solve the complex scheduling
problem in a job shop environment. This problem is also known as the Job Shop
Scheduling Problem (JSSP). The JSSP is a difficult problem in combinatorial
optimization for which extensive investigation has been devoted to the
development of efficient algorithms. The proposed approach is based on a
genetic algorithm technique. Genetic algorithms are an optimization
methodology based on a direct analogy to Darwinian natural selection and
mutations in biological reproduction. The scheduling rules such as SPT and
MWKR are integrated into the process of genetic evolution. The chromosome
representation of the problem is based on random keys. The schedules are
constructed using a priority rule in which the priorities and delay times of
the operations are defined by the genetic algorithm. Schedules are constructed
using a procedure that generates parameterized active schedules. After a
schedule is obtained a local search heuristic is applied to improve the
solution. The approach is tested on a set of standard instances taken from the
literature and compared with other approaches. The computation results
validate the effectiveness of the proposed approach.
Keywords: Scheduling, manufacturing, heuristics, genetic algorithm,
optimization, local search, JSSP
Title
of the Paper:
Applying Self-Organizing Mapping Neural Network for Discovery Market Behavior
of Equity Fund
DOWNLOAD FULL PDF
Authors:
Jen-Hua Chen, Chiung-Fen Huang, An-Pin Chen
Abstract: Maximizing the profit and minimizing the loss notwithstanding the
trend of the market is always desirable in any investment strategy. The
present research develops an investment strategy, which has been verified
effective in the real world, by employing self-organizing map neural network
for mutual funds tracking the trends of stock market indices according to
macroeconomics indicators and weighted indices and rankings of mutual funds.
Our experiment shows if utilizing strategy 3 according to our model during a
period from January 2002 to December 2008 the total returns could be at 122
percents even though the weighted index fell 22 percents during the same
period and averaged investment returns for random transaction strategies stand
at minus 25 percents. As such, we conclude that our model does efficiently
increase the investment return.
Keywords: Equity Fund, Neural Network, Self-Organizing Mapping,
Investment Strategy
Title
of the Paper:
Fostering the Integration of Web 2.0 Technologies and E-learning in Vocational
Education and Training
DOWNLOAD FULL PDF
Authors:
Tanja Arh, Matija Pipan, Marija Mojca Peternel, Matjaz Debevc, Borka Jerman
Blazic
Abstract: The European Commission placed e-learning on the top of its
political agenda, calling for education and training systems to be adapted to
meet this challenge. E-learning and Web 2.0 technologies contribute education
and training to meet this aim by fostering the integration of ICT in
educational process as a lever for change and as an opportunity for increasing
quality, convenience, diversity and effectiveness of education. The paper
describes one of the possible approaches to the development of Vocational
Educational and Training (VET) EduCenter (www.educenter.eu) focussing on the
presentation of five main elements of the centre (e-learning solutions,
e-learning environment, communications, content repository and other tools)
and the proposed methodology of e-learning, education and training for
teachers of general and vocational subject in VET schools. Special attention
is paid to the project »e4 VET«, which presents an integral part of the
Leonardo da Vinci – Transfer of Innovation – Lifelong Learning Programme aimed
at supporting the role of innovation process in improving the quality in
Vocational education and training systems.
Keywords: E-learning, e-learning environment, Vocational Education and
Training (VET), EduCenter, e-course, Content Creator
Title
of the Paper:
The Detailed Evaluation Criteria for Designation of Critical Information
Infrastructure in the field of Broadcasting and Communication
DOWNLOAD FULL PDF
Authors:
Soontai Park, Wan S. Yi, Bong-Nam Noh
Abstract: Increasing to dependency on information infrastructures involves
various threats to cyber incidents. Most of nations or organizations work on
protect to not only infrastructure but also information infrastructure. Korea
established Critical Information Infrastructure Protection Act in 2001 that
include 5 evaluation criteria for designation of National CII. This research
makes a suggestion that detailed evaluation criteria for objectification and
measuring for designation of CII in the field of broadcasting and
Communication. Also this paper shows the result of simulation and application
using proposed criteria.
Keywords: CII (Critical Information Infrastructure), CIIP (CII
Protection), Cyber incident, Cyber Security, Designation Criteria, Information
Assets
Title
of the Paper:
Evaluation and Optimal Computation of Angular Momentum Matrix Elements: An
Information Theory Approach
DOWNLOAD FULL PDF
Authors:
Maria Eugenia Castro, Alfonso Nino, Camelia Munoz-Caro
Abstract: In this work, we determine all possible angular momentum matrix
elements arising in the variational treatment of the rovibrational molecular
Hamiltonian. In addition, the logic of the associated computing process is
organized in a series of decision tables. Using Shwayder/s approach,
information theory is applied to obtain optimal computing codes from the
decision tables. The needed decision rules apparition frequencies are computed
as a function of the rotational quantum number J. Using these values, we show
that the codes obtained are optimal for any value of J. In all cases, the
optimal codes exhibit an efficiency of at least a 97% of the theoretical
maximum. In addition, pessimal codes are obtained as a counterpart of the
optimal ones. We find that the efficiency difference between the optimal and
pessimal codes reaches quickly a limit for increasing values of the J quantum
number.
Keywords: Molecular rovibrational Hamiltonian; Angular momentum
operators; Matrix elements; Decision tables; Information theory; Information
entropy
Title
of the Paper:
Evaluation of a Use-Case-Driven Requirements Analysis Tool Employing Web UI
Prototype Generation
DOWNLOAD FULL PDF
Authors:
Shinpei Ogata, Saeko Matsuura
Abstract: It has been widely acknowledged that ambiguous or incomplete
customer requirements are a major reason for the failure of software
development projects. A key example of this is the inconsistency between
implementation image and specifications provided in the early stages of
software development. To address this, we propose a method for automatic
generation of user interface prototypes for developing Web-based business
applications, based on the requirements specifications defined in the Unified
Modeling Language (UML). In this study, we compare the proposed method with
traditional use case modeling to evaluate the effectiveness of the proposed
method.
Keywords: Use Case, Prototyping, Web Application, Requirements
Analysis, Unified Modeling Language
Title
of the Paper:
An Interactive Fuzzy Multi-Objective Approach for Operational Transport
Planning in an Automobile Supply Chain
DOWNLOAD FULL PDF
Authors:
David Peidro, Manuel Diaz-Madronero, Josefa Mula
Abstract: A novel supply chain operational transport planning model is
developed in this paper. The goals of the model are to minimize the number of
used trucks and the total inventory levels. Because of somewhat imprecise
nature of vehicle capacities and decision makers’ aspiration levels for the
goals, a fuzzy multiobjective linear programming (FMOLP) modeling approach is
adopted. Moreover, an interactive solution methodology is proposed to
determine the preferred compromise solution. An industrial case from a
real-world automobile supply chain demonstrates the feasibility of applying
the proposed model and the solution methodology to a realistic operational
transport planning problem. The computational results indicate that the
proposed approach improves the results obtained by the heuristic
decision-making procedure spreadsheet-based which is actually applied in the
automobile supply chain under study.
Keywords: Supply chain planning, transport planning, fuzzy
multi-objective linear programming, uncertainty
Title
of the Paper:
RAMEPs: A Goal-Ontology Approach to Analyse the Requirements for Data
Warehouse Systems
DOWNLOAD FULL PDF
Authors:
Azman Taa, Mohd Syazwan Abdullah, Norita Md. Norwawi
Abstract: The data warehouse (DW) systems design involves several tasks such
as defining the DW schemas and the ETL processes specifications, and these
have been extensively studied and practiced for many years. However, the
problems in heterogeneous data integration are still far from being resolved
due to the complexity of ETL processes and the fundamental problems of data
conflicts in information sharing environments. Current approaches that are
based on existing software requirement methods still have limitations on
translating the business semantics for DW requirements toward the ETL
processes specifications. This paper proposes the Requirement Analysis Method
for ETL processes (RAMEPs) that utilize ontology with the goal-driven approach
in analysing the requirements of ETL processes. A case study of student affair
domain is used to illustrate how the method can be implemented.
Keywords: Requirement Analysis, ETL Processes, Data Warehouse,
Ontology, Business Intelligence
Title
of the Paper:
Multi-Method Audio-based Retrieval of Multimedia Information
DOWNLOAD FULL PDF
Authors:
Mario Malcangi
Abstract: Multimedia information and embedded systems are two major
technological advances that have significantly changed the way people interact
with systems and information in recent years. In this context, audio proves to
be the most advantageous media for interacting with embedded systems and their
content. Advantages include: hands-free operation; unattended interaction; and
simple, cheap devices for capture and playback. The use of embedded systems to
seek information stored locally or on the web points up several difficulties
inherent in the nature of multimedia-information signals. These difficulties
are especially evident when palmtop or deeply embedded devices are used for
such purposes. Developing a set of digital-signal-processing-based algorithms
for extracting audio information is a primary step toward providing
user-friendly access to multimedia information and developing powerful
communication interfaces. The algorithms aim to extract semantic and syntactic
information from audio signals, including voice. Extracted audio features are
employed to access information in multimedia databases, as well as to index
it. More extensive, higher-level information, such as audio-source
identification (speaker identification) and genre (in the case of music), must
be extracted from the audio signal. One basic task involves transforming audio
into symbols (e.g. music transformed into a score, speech transformed into
text) and transcribing symbols into audio (e.g. score transformed into musical
audio, text transformed into speech). The purpose is to search for and access
any kind of multimedia information by means of audio. To attain these results,
digital audio-processing, digital speech-processing, and soft-computing
methods need to be integrated. Neural networks are used as classifiers and
fuzzy logic is used for making smart decisions.
Keywords: Audio features, multimedia information, speech-to-text,
audio-to-score, text-to-speech, score-to-audio, digital audio processing,
pattern matching, soft computing
Issue 3, Volume 7,
March 2010
Title
of the Paper:
Management of Storyboard Graphs for Adaptive Courseware Construction
DOWNLOAD FULL PDF
Authors:
Dessislava Vassileva, Boyan Bontchev
Abstract: Adaptive e-learning systems try to improve teaching processes on
Internet by providing different educational content and activities for
different learners. Modern tendencies of adaptation require usage of learning
styles on student grouping. Main idea of adaptive e-learning applications is
to use a different pedagogical approach for each of these groups. This paper
presents a software module called instructor tool for creating training
courses suitable for learners with different learning styles. This module is a
part of a platform for building edutainment (education plus entertainment)
services called ADOPTA (ADaptive technOlogy-enhanced Platform for eduTAinment).
E-learning courses within the tool are presented by directed storyboard
graphs. The course instructor can create and edit their graphs and pages by a
user-friendly visual interface. Our article is aimed primarily at description
of the graph management which is behind the visual presentation and specially
at discovering working paths within these graphs.
Keywords: Adaptive e-learning systems, adaptive hypermedia systems,
instructor tool, storyboard graph, learning styles
Title
of the Paper:
Student Learning Contribution through E-learning Dimension at Course
“Management Information Systems”
DOWNLOAD FULL PDF
Authors:
Karmela Aleksic-Maslac, Dina Vasic, Mirna Korican
Abstract: E-learning offers great opportunities for education quality
improvement in both - the classical teaching combined with e-learning, and
distance learning. Zagreb School of Economics & Management (ZSEM) is one of
the few higher education institutions in Croatia that systematically uses
e-learning in teaching. Systematically means that all courses are developed in
e-learning form and that among all courses is used the same LMS (Learning
Management System) WebCT. School management played an important role in the
systematic introduction of e-learning in the educational process. At ZSEM we
use a combination of traditional teaching methods with intensive use of
e-learning. Each teacher is required to develop an e-learning course in
accordance with default 11 standards developed by the e-learning group. In
this way at ZSEM we currently have about 1,200 students and about 120 advanced
e-learning courses. Course named Management Information System (MIS) is on the
list of obligatory courses for the 7th semester. In this paper we will show
how to connect all the elements of Course Syllabus with e-learning system:
online tests, discussions, WebCT activities, exercises, etc. Special attention
is given to group projects and ability to project groups to jointly discuss,
submit weekly reports and to project documentation within the LMS system. The
research will show whether there is a correlation between the activities of
students in a closed discussion among project groups and final grade.
Keywords: Discussion, project, e-learning, student activity,
information and communication technologies, learning management system,
management information systems
Title
of the Paper:
Comparison of Cluster Analysis Algorithms for Heavy Metals Contamination in
Atmospheric Precipitation
DOWNLOAD FULL PDF
Authors:
Miloslava Kasparova, Jiri Krupka, Jaromira Chylkova
Abstract: The submitted article addresses the problematic of the cluster
analysis. Real data sets concerning the atmospheric precipitation in chosen
localities of the Czech Republic were used. The designed models use monthly
data from years 2000 to 2007. Presented results refer to a pair of heavy
metals – cadmium and lead. The data was processed by the help of the cluster
analysis with presenting the results received through the Self organizing map,
Two Step and K-Means methods. On the basis of the achieved results it is
possible to decide about “quality” and “contamination” in the locality.
Keywords: Heavy metal contamination, atmospheric precipitation,
correlation, cluster analysis algorithms
Title
of the Paper:
Towards a Community-Oriented Map-Based Portal for Cultural Heritage
DOWNLOAD FULL PDF
Authors:
Boyan Bontchev
Abstract: Modern Internet portals to cultural heritage of given nation provide
aggregation of multimedia content from digital libraries plus some semantic
services but miss support of community collaboration in content enrichment and
metadata annotation. The paper presents a new portal for internationalized
content authoring, enhancing and annotating, and management of various types
of descriptions of immovable cultural monuments. The portal provides community
collaboration services in order to encourage and facilitate accumulation of
distributed public knowledge about immovable cultural heritage. The conceptual
design of the portal is based on ontology and metadata templates for each
monument type used for content creation and management with community support.
There are explained the software architecture of the portal and the practical
realization of its first prototype.
Keywords: Cultural heritage, immovable monuments, metadata, annotation,
templates, portal, maps, community
Title
of the Paper:
Conceptual Models and Advanced Architectures for Adaptive Hypermedia Systems
in Education
DOWNLOAD FULL PDF
Authors:
Iulian Pah, Dan Chiribuca, Camil Postelnicu
Abstract: Computer-assisted learning has become one of the most dynamic fields
of multi-disciplinary research. The major issues studied in this field have
been the development of systems focusing on acquiring skills; while in the
beginning, such systems were not quite adequate to the learner’s profile and
did not provide guidance in decision making throughout the learning cycle,
they are now becoming increasingly intelligent, with more and more powerful
pedagogical capacities. The emergence of new information and communication
technologies (ICT) and especially of artificial intelligence technologies has
revolutionized thinking in this respect for several reasons: firstly, ICT can
be used to disseminate knowledge on a wide scale; secondly, courses can be
selected tacking into account the behavior of the learner, her expectations
and her preferences. Therefore, hypermedia systems destined to structuring
courses based on the concept of reusing didactic items have started to be
developed. In the literature of the field there are three categories of such
systems: classical hypermedia, adaptive hypermedia and dynamic adaptive
hypermedia.
Keywords: Information and communication technology, Dynamic adaptive
hypermedia, Computer-assisted learning, Internet, Learning systems
Title
of the Paper:
Three Algorithms for Analyzing Fractal Software Networks
DOWNLOAD FULL PDF
Authors:
Mario Locci, Giulio Concas, Roberto Tonelli, Ivana Turnu
Abstract: In this work we propose an algorithm for computing the fractal
dimension of a software network, and compare its performances with two other
algorithms. Object of our study are various large, object-oriented software
systems. We built the associated graph for each system, also known as software
network, analyzing the binary relationships (dependencies), among classes. We
found that the structure of such software networks is self-similar under a
length-scale transormation, confirming previous results of a recent paper from
the authors. The fractal dimension of these networks is computed using a Merge
algorithm, first devised by the authors, a Greedy Coloring algorithm, based on
the equivalence with the graph coloring problem, and a Simulated Annealing
algorithm, largely used for efficiently determining minima in
multi-dimensional problems. Our study examines both efficiency and accuracy,
showing that the Merge algorithm is the most efficient, while the Simulated
Annealing is the most accurate. The Greeding Coloring algorithm lays in
between the two, having speed very close to the Merge algorithm, and accuracy
comparable to the Simulated Annealing algorithm.
Keywords: Complex Systems, Complex Networks, Self-similarity, Software
Graphs, Software Metrics, Object-Oriented Systems
Title
of the Paper:
Synthesis and Analysis of Fuzzy Diagnostic Systems for Railway Bridges
DOWNLOAD FULL PDF
Authors:
Jiri Krupka, Petr Rudolf, Jaroslav Mencik
Abstract: This paper deals with the use of fuzzy logic for building of
classification models for the technical condition evaluation of bridge
objects, both their superstructure and substructure. The proposed models have
hierarchical architecture, built of the Mamdani’s fuzzy inference systems. The
models were validated on a data set of real bridges in operation. In the
modelling process, the analysis of bridge rating methods in the Czech Republic
and abroad was applied. The analysis of the number and shapes of input and
output membership functions of given fuzzy sets was carried out, and the
numbers of fuzzy inference rules were determined. On the basis of the achieved
results, the utility of the presented method of soft computing in the
evaluation of the bridge technical conditions was proved.
Keywords: Bridge condition evaluations; soft computing; fuzzy logic;
hierarchical architecture
Title
of the Paper:
Clustering Based Adaptive Refactoring
DOWNLOAD FULL PDF
Authors:
Gabriela Czibula, Istvan Gergely Czibula
Abstract: It is well-known that maintenance and evolution represent important
stages in the lifecycle of any software system, about 66% from the total cost
of the software systems development. Improving the software systems design
through refactoring is one of the most important issues during the evolution
of object oriented software systems. Refactoring aims at changing a software
system in such a way that it does not alter the external behavior of the code,
but improves its internal structure. In this paper we approach the problem of
adaptive refactoring, and we propose an adaptive method to cope with the
evolving structure of any object oriented application. Namely, we handle here
the case when new application classes are added to the software system and the
current restructuring scheme must be accordingly adapted. The approach
proposed in this paper extends our previous clustering based approach for
identifying refactorings in an object oriented software system. We also
provide an example illustrating the efficiency of the proposed approach.
Keywords: Restructuring, adaptive refactoring, clustering
Title
of the Paper:
Traveling Wave Solutions for Two Non-linear Equations by (G'/G)-Expansion
Method
DOWNLOAD FULL PDF
Authors:
Qinghua Feng, Bin Zheng
Abstract: In this paper, we study the application of the known generalized
(G'/G)-expansion method for seeking more exact travelling solutions solutions
and soliton solutions of the Kaup-Kupershmidt equation and the (2+1)
dimensional breaking soliton equation. As a result, we come to the conclusion
that the traveling wave solutions for the two non-linear equations are
obtained in three arbitrary functions including hyperbolic function solutions,
trigonometric function solutions and rational solutions. The method appears to
be easier and faster by means of some mathematical software.
Keywords: (G'/G)-expansion method, Traveling wave solutions,
Kaup-Kupershmidt equation, (2+1) dimensional breaking soliton equation, exact
solution, evolution equation, nonlinear equation
Title
of the Paper:
Toward Language-Independent Text-to-Speech Synthesis
DOWNLOAD FULL PDF
Authors:
Mario Malcangi, Philip Grew
Abstract: Text-to-speech (TTS) synthesis is becoming a fundamental part of any
embedded system that has to interact with humans. Language-independence in
speech synthesis is a primary requirement for systems that are not practical
to update, as is the case for most embedded systems. Because current
text-to-speech synthesis usually refers to a single language and to a single
speaker (or at most a limited set of voices), a framework for
language-independent, text-to-speech synthesis is proposed to overcome these
limitations in implementing speech synthesis on embedded systems. The proposed
text-to-speech synthesis framework was designed to embed phonetic and prosodic
information in a set of rules. To complete this language-independent
speechsynthesis solution, a universal set of phones has been defined so that
the appropriate speech sounds for every language are available at run time.
Synthesis of more than one language can easily be carried out by switching
from one rule set to another while keeping a common phone-data set. Using a
vocal-track-based speech synthesizer, the system does not depend on phone sets
recorded from an actual specific human voice, so voice types can be chosen at
run time.
Keywords: Text-to-speech, multi-language speech synthesis, rule-based
speech synthesis
Title
of the Paper:
Daily Life Support and Widely Applicable Living Arrangement System under the
Internet Environment
DOWNLOAD FULL PDF
Authors:
Hidetoshi Wakamatsu, Takuri Takahashi
Abstract: A simple technology in principle is proposed on the basis of its
safety, reliability and flexibility, reflecting past technical achievements
for the well-being in ageing society. Hereby, the active use of the Internet
environment is described for the wide provision of convenience and help of
daily life on public benefits. We propose some methods concerning system
management and software provision to start up the computer from a distance,
which can help better use of these networks. We present technical viewpoints
from our studies with comprehensive engineering issues related to development
and practical utilization of basic functions required by the Internet. From
the progress in information and communication technology, appropriate systems
were systematically developed for the help of daily life, amusement, guidance,
health care, rehabilitation, nursing and medicare. They enabled the
beneficiaries not only to ask neighbors in emergency and to have daily
necessities, but also to cover effective activity and communications in remote
islands and/or depopulated area where sufficient resource of medical staff
might not be provided. In order to bilaterally communicate with beneficiaries,
an extended functions of the proposed basic system are utilized for all the
various systems, which we propose as the concrete methods and apparatus to
communicate their concerning data. In the present study, important methods for
the help of everyday life and rescue of a lonely living person with sudden
illness threatened to life are realized by the combination of the additional
button type computer with the proposed communication techniques without any
complicated manipulation under the Internet environment.
Keywords: Welfare, Remote, Daily life support, Communication, Button
computer, Internet
Title
of the Paper:
Linear Multiple Regression Model of High Performance Liquid Chromatography
DOWNLOAD FULL PDF
Authors:
Stanislava Labatova
Abstract: The multiple regression analysis is proposed as method for
presentation results of high performance liquid chromatography (HPLC), which
simultaneously depends on several parameters. The coefficients of linear
multiple regression model are assessed by the least square method. In this way
dependent variable – retention volume – is expressed by more than one
explanatory variable (i.e. by the molar mass, concentrations of eluent and
temperature). The approach was to depict dependences of retention volumes on
molar mass of polystyrene probes in tetrahydrofuran (THF) and in mixed eluents
THF plus dimethylformamide eluents on the silica gel alkyl bonded column
packing. The dependences retention volumes on molar mass, concentrations of
eluent and are shown.
Keywords: Multiple regression analysis, model specification, high
performance liquid chromatography, calibration curves
Title
of the Paper:
Business Activity Monitoring System Design Framework Integrated With
Process-Based Performance Measurement Model
DOWNLOAD FULL PDF
Authors:
Kwan Hee Han, Sang Hyun Choi, Jin Gu Kang, Geon Lee
Abstract: Recently, strong interests in the real-time performance management
are increasing to gain competitive advantages in the rapidly changing business
environment. For better business performance or continuous process improvement
of an enterprise, real-time measurement and analysis of the performance of
managerial activities is essential. Business activity monitoring (BAM) which
provides real-time access to key performance indicators or business processes
is one of core elements for successful business process management (BPM)
system. Since performance measurement cannot be managed independently of
business processes, BAM system needs to monitor performance metrics in terms
of business process. This paper proposes BAM system design framework
integrated with the process-based performance measurement model (PPMM), in
which monitored KPIs are closely related with business processes. The proposed
PPMM consists of three sub-models: KPI model, process model, and K-P model. To
show the applicability of proposed framework, BAM system prototype was also
developed using a real case. This paper is expected to be a practical help to
the practitioners who are planning and executing the BAM system implementation
for continuous process improvement.
Keywords: Business Activity Monitoring (BAM), Business Process
Management (BPM), Business Performance, Key Performance Indicator (KPI)
Title
of the Paper:
Transformation of UML Activity Diagrams into Analyzable Systems and Software
Blueprints Construction
DOWNLOAD FULL PDF
Authors:
Chien-Yuan Lai, Dong-Her Shih, Hsiu-Sen Chiang, Ching-Chiang Chen
Abstract: Unified Modeling Language (UML) is a standard language for software
blueprints, UML can be used to visualize, specify, construct and document
software-intensive system of heritage. In the UML, the activity diagrams often
are widely used to workflow and system flow in system analysis. However, the
activity diagram of UML now there are still many drawbacks to be overcome,
such as lacks support for simulation, dynamic semantics limits and
verifiability capabilities. Petri nets are a popular technique for modeling
the control flow dimension of workflows. Associative Petri nets (APNs) not
only take all the advantages of PNs but also has a complete semantics,
simulation and verifiability capabilities. Therefore, in this paper, we
propose a methodology to describe how UML Activity diagrams can be intuitively
translated into an APN model. This work can improve the simulation and
verifiability capabilities of activity diagram and provides the systematic
procedure to reduce complexity of translating activity diagrams into
associative Petri net.
Keywords: Unified Modeling Language, Activity Diagram, Visualize,
System Description
Issue 4, Volume 7,
April 2010
Title
of the Paper:
Economic Production Quantity Model with Backordering, Rework and Machine
Failure Taking Place in Stock Piling Time
DOWNLOAD FULL PDF
Authors:
Feng-Tsung Cheng, Huei-Hsin Chang, Singa Wang Chiu
Abstract: This paper investigates the optimal inventory replenishment policy
for an economic production quantity (EPQ) model with backordering, rework and
machine breakdown taking place in stock piling time. A prior paper by Chiu has
examined the lot-sizing problem on an imperfect quality EPQ model. Due to
another reliability factor - random machine breakdown seems to be inevitable
in most real world manufacturing environments, and to deal with it the
production planners must practically compute the mean time between failures (MTBF)
and establish a robust production plan accordingly in terms of the optimal
replenishment lot size that minimizes total production-inventory costs for
such an unreliable system. This study extends Chiu’s work and incorporates a
machine breakdown taking place in the stock piling stage into his model. The
effects of random machine failure on optimal run time and on the long-run
average costs are examined in this paper. Mathematical modeling and cost
analysis are employed. The renewal reward theorem is utilized to cope with
variable cycle length. Convexity of the long-run average cost function is
proved and an optimal lot-size that minimizes the expected overall costs for
such an imperfect system is derived. Numerical example is given to demonstrate
its practical usage. Managers in the field can adopt this run time decision to
establish their own robust production plan accordingly.
Keywords: Optimization, Run time, Breakdown, Lot size, Production,
Backorder, Rework, Inventory
Title
of the Paper:
Composed Fuzzy Measure of Maximized L-Measure and Delta-Measure
DOWNLOAD FULL PDF
Authors:
Hsiang-Chuan Liu, Hsien-Chang Tsai, Yu-Du Jheng, Tung-Sheng Liu
Abstract: The well known fuzzy measures, λ-measure and P-measure, have only
one formulaic solution. Two multivalent fuzzy measures with infinitely many
solutions, L-measure and δ-measure, were proposed by our previous works, but
the former do not include the additive measure as the latter and the latter
has not so many measure solutions as the former, therefore, a composed fuzzy
measure of above two measures, called Lδ -measure was proposed by our
additional previous work. However, all of abovementioned fuzzy measures do not
contain the largest measure, B-measure, which all not completed measures. In
this paper, an improved completed fuzzy measure composed of maximized
L-measure and δ-measure, denoted m L δ -measure, is proposed. For evaluating
the Choquet integral regression models with our proposed fuzzy measure and
other different ones, two real data experiments by using a 5-fold
cross-validation mean square error (MSE) were conducted. The performances of
Choquet integral regression models with fuzzy measure based m L δ -measure, m
L δ -measure, Lδ -measure, L-measure, δ-measure, λ-measure, and P-measure,
respectively, a ridge regression model, and a multiple linear regression model
are compared. Both of two experimental results show that the Choquet integral
regression models with respect to our new measure based on γ-support
outperforms others forecasting models.
Keywords: Lambda-measure, P-measure, Delta-measure, L-measure, composed
fuzzy measure
Title
of the Paper:
Computational Intelligence-Based Personalization of Interactive Web Systems
DOWNLOAD FULL PDF
Authors:
Tricia Rambharose, Alexander Nikov
Abstract: The main Computational Intelligence (CI) models for personalization
of interactive web systems are identified as Fuzzy Systems, Genetic
Algorithms, Neural Networks, Artificial Immune Systems and Swarm Intelligence
which includes Particle Swarm Optimization, Ant Colony Optimization, Bee
Colony Optimization and Wasp Colony Optimization. These models are reviewed
and compared regarding their inception, functions, performance and application
to personalization of interactive web systems. A taxonomy for personalization
of interactive web systems based on CI methods is proposed. It uses two
approaches to personalize web-based systems as profile generation and profile
exploitation. Based on this taxonomy a general procedure and recommendations
for personalization of interactive web systems are suggested. Future
directions for application of CI modelling for personalization are discussed.
Keywords: Personalization, computational intelligence, taxonomy, web
systems, modelling
Title
of the Paper:
Vitality Detection in Fingerprint Identification
DOWNLOAD FULL PDF
Authors:
Mojtaba Sepasian, Cristinel Mares, Wamadeva Balachandran
Abstract: The fingerprint liveness detection refers to the inspection of the
finger characteristics to ensure whether the input finger is live or
artificial. A number of fingerprint identification systems are used widely and
implemented at various important places such as border and immigration
services. However, it is not declared by the manufacturers of these systems
whether liveness detection is actually implemented. Possible measures to
detect liveness are only proposed in patents and published literature. There
are three major schemes, which are reported in fingerprint liveness
literature. These coupled with the additional hardware, software, or
combination of fingerprint with other identifications is aimed to verify the
liveness in submitted fingerprints. The hardware-based methods use auxiliary
sensors to detect the biological and physiological measurements from finger,
whereas software-based methods utilize changes in physical properties that
take place in early stages of pressing the finger. In this paper, various
fingerprint liveness detection methods, which are categorized as voluntary and
involuntary, are explored. These categories are based on determining the
presence of a user by different responses from either voluntary (e.g.
passwords or multiple biometrics) or involuntary (e.g. pulse oximetry or blood
pressure) liveness detections. The main objective of this paper is to
critically review the voluntary and involuntary fingerprint liveness detection
techniques proposed in the literature, and discuss their effectiveness and
possible limitations.
Keywords: Liveness Detection, Spoofing, Fingerprint, Biometric
Security, Voluntary and Involuntary Technique
Title
of the Paper:
Gastroenterology Dataset Clustering Using Possibilistic Kohonen Maps
DOWNLOAD FULL PDF
Authors:
Anas Dahabiah, John Puentes, Basel Solaiman
Abstract: Kohonen maps are an efficient mechanism in signal processing and
data mining applications. However, all the existing versions and approaches of
this special type of neural networks are still incapable to efficiently handle
within a simple, fast, and unified framework, the imperfection of the
patterns’ information elements on the one hand like the uncertainty, the
missing data, etc., and the heterogeneity of their measuring scale
(qualitative, quantitative, ordinal, etc.) on the other hand. Therefore, we
propose in this paper a possibilistic Kohonen network essentially based on two
fuzzy measures: the possibility and the necessity degrees, to deal with all
these aspects together in a robust way. Concrete examples and medical
applications will also be given to clarify and to easily explain the proposed
algorithm.
Keywords: Self-Organizing Maps (SOMs), Fuzzy Logic (Possibility
Theory), Imperfect information, Gastroenterology Dataset, Similarity
Title
of the Paper:
Model of Usability Evaluation of Web Portals Based on the Fuzzy Logic
DOWNLOAD FULL PDF
Authors:
Miloslav Hub, Michal Zatloukal
Abstract: This paper presents a model of usability evaluation based on fuzzy
logic which results from a need to establish a common approach to deal with
the usability evaluation of various kinds of systems. The model definition
arises from the methodology of fuzzy usability evaluation that was presented
in the previous research of the authors. As a result of a particular
evaluation, usability score is obtained. The score combines various factors
affecting the usability of target system. The authors demonstrate the model on
the example of usability evaluation of Web portals. Paper also includes
results and analysis of the case study and validation of the proposed model.
Keywords: Usability, usability evaluation, usability engineering, fuzzy
logic, software engineering
Title
of the Paper:
An Image Search for Tourist Information Using a Mobile Phone
DOWNLOAD FULL PDF
Authors:
Wichian Premchaiswadi
Abstract: Currently, Mobile phones perform like a personal computer. In
searching for information, people generally use keywords or character sets to
search for information using a computer or mobile phone. When using keyword to
search, users have to define the appropriate keywords for things that they
want to search for. In some cases, multiple keywords must be given in order to
obtain satisfactory results. However, defining the appropriate keyword is
sometimes difficult. This paper proposes a mobile application for searching
travel related information by using images to search instead of keywords. The
image used in this application is taken from a mobile phone camera and sent to
the server. The Auto-correlogram and Color Different Correlogram (AC/CDC)
algorithms are deployed in the image retrieval system. The images and travel
related information are sent back and forth through the Internet by using
Web-services. This proposed system could provide more convenience for users
and/or tourists and decrease the restriction of searching information from a
mobile phone through GPRS.
Keywords: Autocorrelogram, Autocorrelogram and Color Different
Correlogram, AC/CDC, Image search, Mobile phone, Web Services
Title
of the Paper:
Shape Approximation using Circular Grids
DOWNLOAD FULL PDF
Authors:
Azzam Sleit, Atef Abu-Areda, Hasan Al-Hasan
Abstract: Research in shape approximation has been motivated by object
analysis, matching and recognition. Polygonal shape approximation is widely
acceptable and gives reasonable reflection for the shape of the object. This
paper presents an object shape approximation algorithm which generates
polygons for closed objects. The algorithm is also capable of handling open
objects as well as handwritten characters. The proposed algorithm utilizes
circular grids to generate the segments. The user can control the number of
segments generated by adjusting the granularity of the grid. The outcome of
the proposed algorithm is scale and rotation invariant.
Keywords: Polygon, Shape approximation, Circular grid, Rotation
invariant, Scale invariant, Handwritten characters, Open shape, closed shape
Title
of the Paper:
A Competency-based System for Supporting Corporate Information Systems
Planning
DOWNLOAD FULL PDF
Authors:
Sang-Hyun Choi, Kwan-Hee Han, Jin-Wook Kim
Abstract: The purpose of this paper is to address a framework to suggest a set
of To-Be enablers for planning strategic information systems. One feature of
the framework is the incorporation of measuring incomplete preferences in IT
and process competency of experts. This paper presents a competency-based
decision support system for supporting corporate strategic information systems
planning (SISP), which is based on a prescriptive group decision making method
showing how to aggregate experts’ incomplete preference judgments. The system
is suggested on the competency leverage concept for selecting technical or
organizational enablers to attain organizational business objectives. We put
the competencies between the objectives and enablers, measure the importance
rates of competencies on the objectives, and derive target enablers for the
company. This system is implemented in practice via a detailed three stage
methodology. The three stages are defining current business, analyzing
competency, and suggesting To Be Enablers. We apply the system to SISP task of
a Korean manufacturing company.
Keywords: Strategic information systems planning, Information systems
selection, Decision support systems, Multiple attribute group decision making,
Incomplete preference
Title
of the Paper:
Towards a Possibilistic Processing of Missing Values Under Complex Conditions
DOWNLOAD FULL PDF
Authors:
Anas Dahabiah, John Puentes, Basel Solaiman
Abstract: To estimate the missing values of an attribute in the records of a
dataset, all the information provided by the other attributes and the
knowledge databases must be considered. However, the information elements
could be imperfect (imprecise, possibilistic, probabilistic, etc.) and could
have different measuring scales (quantitative, qualitative, ordinal, etc.) at
the same time. Furthermore, the relationships and the correlation between the
considered attribute and the others should also be pondered. Unlike the prior
works that have separately processed these issues using complex and
conditional techniques, our approach, essentially based on the tools provided
by the possibility theory, can easily handle these aspects within a unified,
robust, and simple frameworks. Several numeric examples and applications have
been given to simply illustrate the main steps of our method, and some
promising perspectives have been proposed at the end of this paper.
Keywords: Possibility Theory, Missing Data, Information Imperfection
(Uncertainty and Ambiguity), Data Mining
Title
of the Paper:
A Study of Generating Teaching Portfolio from LMS Logs
DOWNLOAD FULL PDF
Authors:
Hsieh-Hua Yang, Hung-Jen Yang, Wan-Ching Wu, Lung-Hsing Kuo, Lan-Hua Wang
Abstract: The purpose of this study was to identify the relationship of LMS
log and teaching portfolio. The elements of teaching portfolio for different
universities were analyzed. The analyzed results would support designing and
developing logic relationship between LMS log and professional teaching
portfolio. Eight major elements were drawn as an integrated type of
professional teaching portfolio. For each element of professional teaching
portfolio, the data convert flow was designed based upon LMS log. The
relationship between LMS log and professional teaching portfolio was
identified upon these information flows. Besides, according to the
relationship identified in each data convert flow, we could conclude that it
is possible to generate meaningful information from LMS log to support
teaching portfolio.
Keywords: Teaching Portfolio, Learning Management System, Server Log
Title
of the Paper:
Benchmark Database and GUI Environment for Printed Arabic Text Recognition
Research
DOWNLOAD FULL PDF
Authors:
Amin G. Al-Hashim, Sabri A. Mahmoud
Abstract: This paper presents the details of a comprehensive database of
Printed Arabic text for Arabic text recognition research. It consists of
scanned images of different forms of Arabic printed text (viz. book chapters,
advertisements, magazines, newspapers, and reports) scanned with 200, 300, and
600 dpi resolutions. A total of 6954 pages are scanned. The database may be
utilized by Arabic printed text recognition research community. It may be used
as a benchmark database where researchers can evaluate their algorithms and
results compared with published work of other researchers using the same
database. To the best of our knowledge, there is no public comprehensive
printed Arabic text database that is freely available. Hence, this database
may address this deficiency in Arabic printed text recognition research. This
database will be made freely available to interested researchers. In addition,
this paper presents a software GUI environment to make the manipulation of the
created database easier. Moreover, the software GUI provides a number of
imageprocessing functions that can be used in the field of automatic text
recognition.
Keywords: Arabic Printed Text Database, OCR Datasets, Arabic Text
Recognition, OCR
Title
of the Paper:
A Method of Automatic Integration Test Case Generation from UML-based Scenario
DOWNLOAD FULL PDF
Authors:
Shinpei Ogata, Saeko Matsuura
Abstract: One key to success for high quality enterprise information systems
development is to validate the customers' requirements sufficiently at the
early stage. Scenarios are an effective means to an end because they make it
possible to represent various situations of system usage. Most scenarios are
defined by using a natural language or such a formal language as Unified
Modeling Language (UML) and describe normal, alternative, and exceptional
service flows from the point of view of system usage. As a result, scenarios
make it easy for the customers to confirm their requirements intuitively
because of the concreteness. On the other hand, based on the V-model, which is
well-known software development process and denotes the correspondence of
requirement analysis stage to integration test stage, it is desirable that the
testers should test the system by using the test cases derived from the
validated scenarios. We have proposed a UML-based requirements analysis (RA)
model with automatic prototype system generation for enterprise Web
application development. This paper proposes a way to efficiently create
reliable test cases from the scenarios that have been validated by the
customers using the prototype system which was generated by the RA model.
Keywords: Unified Modeling Language, Web Application, Scenario, Test
Case for Integration Testing
Issue 5, Volume 7,
May 2010
Title
of the Paper:
Software Agents as a Versatile Simulation Tool to Model Complex Systems
DOWNLOAD FULL PDF
Authors:
Filippo Neri
Abstract: In the paper we will describe how the software agent paradigm can be
a powerful and versatile simulation tool to model and study complex systems.
Software agents allow to approximate the behaviour of complex systems under
several scenario conditions. In some cases, software agents can also be used
to approximate solutions to difficult problems occurring in complex systems.
To support our position, we will introduce two different domains: consumer
decisions in fast moving consumers goods and mobile telecom network management
applications. Finally we will show how a software agent modeling approach
could be used to study their behaviour in various scenarios.
Keywords: Software agents, Consumer markets, Telecom network management
systems, Cellular networks, Distributed simulation systems
Title
of the Paper:
A Secure Remote Authentication Scheme Preserving User Anonymity with
Non-Tamper Resistant Smart Cards
DOWNLOAD FULL PDF
Authors:
Wen-Bing Horng, Cheng-Ping Lee, Jian-Wen Peng
Abstract: Anonymity is one of the important properties of remote
authentication schemes to preserve user privacy. Besides, it can avoid
unauthorized entities from using the user ID and other intercepted information
to forge legal login messages. In 2004, Das et al. first proposed a remote
user authentication scheme with smart cards using dynamic ID to protect user
anonymity. Later, in 2005, Chien and Chen demonstrated that Das et al.’s
scheme fails to preserve user anonymity and then presented a new scheme to
remedy this problem. In 2007, Hu et al. pointed out that Chien-Chen’s scheme
cannot preserve user anonymity if the smart card is non-tamper resistant;
i.e., the secret information stored in the smart card can be revealed. They
then proposed an improved scheme to cope with this problem. In this paper,
however, we will show that Hu et al.’s scheme still cannot preserve user
anonymity under their assumption. In addition, their scheme is also vulnerable
to the offline password guessing attack. We then present an improvement to
overcome these weaknesses, while preserving all the merits of their scheme.
Keywords: Anonymity, non-tamper resistant, cryptanalysis, remote
authentication, smart card
Title
of the Paper:
Modeling Recognizing Behavior of Radar High Resolution Range Profile Using
Multi-Agent System
DOWNLOAD FULL PDF
Authors:
Jiansheng Fu, Kuo Liao, Daiying Zhou, Wanlin Yang
Abstract: In an Automatic Target Recognition (ATR) system, target
recognition-makers need assistance to determine which class a new High
Resolution Range Profile (HRRP) belongs to. Note that the HRRP data can be
obtained from an Open Database (ODB) freely, we present a new Multi-Agent
System (MAS) model in which specialized intelligent agents, namely Individual
Target Analyzing (ITA) agents, are designed to perform recognizing behaviour
on behalf of their corresponding target classes, and then show their identity
information and claims that Public Recognition Arbitrating (PRA) agent may
adopt for HRRP analyzing and judging. In order to describe the details, we
apply Generalized Discriminant Analysis (GDA) in the model, and accordingly,
two new GDA variations come forth, called Distributed-GDA (D-GDA) and
Synthetic-GDA (S-GDA) respectively. Generally, the traditional application of
GDA is to emphasize the Common-Discrimination Information (C-DI) among all
targets while D-GDA prefers to the Individual-Discrimination Information
(1-DI) against other targets one by one, so their syntheses S-GDA can obtain
more useful discrimination information than both of them. Experimental results
for measured and simulated data show that GDA and D-GDA are complementary in
many facets and can be considered as a feature extraction method couple.
Furthermore, compared with GDA and D-GDA, the proposed S-GDA not only achieves
better and better recognition performance with the number of targets
increasing, but also is more robust to many challenges, such as noise
disturbance, aspect variation, Small Sample Size (SSS) problem and etc. All
these experimental results confirm the effectiveness of the MAS model proposed
in this paper.
Keywords: Agent, target recognition, high resolution range profile,
generalized discriminant analysis
Title
of the Paper:
Creating WEB Based Didactical Resources for Teachers in Physical Education
DOWNLOAD FULL PDF
Authors:
Danimir Mandic, Dragan Martinovic, Milovan Stamatovic
Abstract: Creating adequate didactical resources and planning the student’s
activities for physical education classes is very important in modern schools.
Students prefer playing computer games and there are not enough physical
activities in their everyday lives. This paper deals with software for
measuring pupil’s abilities in elementary school. To assess the physical
abilities of students we used the battery of tests "Eurofit. Tests are carried
out in certain order: taping hand - segmentary speed, reach the sedu -
flexibility, jump from a place - the power leg, jump in - static force,
running 10 times 5 m - agility, running 20 m - sprint speed, coordination with
bat - coordination, endurance running in (progressively increasing the load) -
endurance. Sample includes 1002 students. Based on the results and comparisons
with available standards of other authors, we can say that the level of
development of motor abilities of students from IV to VII grade school, in
most cases within the norms for their age.
Keywords: Informational technology, WEB resources, Motor
characteristics, Pphysical education, Sport-technical education
Title
of the Paper:
A Novel Strategy Approach for Agent-based Resource Management System
DOWNLOAD FULL PDF
Authors:
Steven K. C. Lo, Lu Wang, Huan-Chao Keh, Yi-Hong Lin
Abstract: The purpose of resource management is based on the limit resource
and unknown users which retrieve the resources at any time to increase the
resource exploitation rate, flexibility and availability. In this study, we
propose four types of strategy including Expansion (when user loads are large
and available resources are not limiting), Constraint (when user loads are
large and resources are limiting), Modulation (when user loads are small and
excess resources are held), and Supervision (when user loads are small and
available resources are also small). The four types of strategy are
abbreviated as MSCE. The MSCE strategy of resource management delivers
efficient control and management of available resources, allowing for
adaptations to changes in the system environment and changes in user
requirements. The Monitor agent is responsible for monitoring the resource
management system, controlling the rate of resource consumption while
simultaneously keeping track of user loads. By employing the Monitor agent in
this fashion, the system’s resources have greater availability and their
control becomes more flexible and efficient.
Keywords: Multi-agent, MSCE, Resource Management System
Title
of the Paper:
A Conceptual Framework on Mobile Commerce Acceptance and Usage Among Malaysian
Consumers: The Influence of Location, Privacy, Trust and Purchasing Power
DOWNLOAD FULL PDF
Authors:
Jayashree Sreenivasan, Mohd Nazri Mohd Noor
Abstract: The aim of this conceptual paper is to investigate the mobile
commerce acceptance among Malaysian consumers. With mobile commerce or
m-commerce technology, consumers can use mobile phones, Personal Digital
Assistant (PDA) and laptop computers to access the internet, send and receive
messages and make transactions at any time from any places without having tied
to a particular location. This new electronic marketing concept has broadened
the scope of service and offer great experience to consumers. On the other
hand, marketers are able to obtain numerous benefits related to customization
of products and services based on the location of the consumer. However, with
the abundance of access to information system and high frequency of exposure
to mass media, consumers are now becoming more concerned about the fraudulent
issues that appear in electronic marketing. Therefore, considerations must be
given to the implications of privacy and trust in m-commerce, if utilization
and mutual benefits is to be derived on a lasting basis between consumers and
marketers. It is very important to examine the privacy and trust elements to
understand the acceptance and use of m-commerce according to Malaysian context
thus enrich the model of m-commerce acceptance and use behavior. This
conceptual paper is also engrossed to examine the influence of purchasing
power on behavioral intent and specifies an extension model for the acceptance
and use of m-commerce. By reading this paper, readers will be able to obtain
clearer picture about conducting future research in order to understand the
behavior of Malaysian consumers related to location, privacy, trust and
purchasing power.
Keywords: Mobile Commerce, Consumer acceptance, Privacy, Trust,
Location, Purchasing power
Title
of the Paper:
Industrial Experiences of Developing a Model for Software Development Quality
Gates
DOWNLOAD FULL PDF
Authors:
Pasi Ojala
Abstract: The purposes to use quality gates in software development are many.
Quite often companies see that the usage of quality gates improves their
overall efficiency, effectiveness and output quality of software delivery
chain. They also see that the usage of quality gates helps them to make things
right at once by not skipping quality assurance actions. This paper defines
quality gate model for a software company. As well it shows that even quality
gates might be in place they are not always followed because of a business
reason. Companies can forget their well structured quality gate systems when
business reason justifies it. The results of neglecting quality gates might
lead to a situation where software asset output is not trusted anymore and
quality is not known. In a longer run quality gate system seems to be as good
as human being who is keeping it. This paper discusses about the most typical
software development quality gates in an industrial context. As well it gives
reasoning why these gates are usable and defines general criteria for each of
them. Paper notifies that even quality gates are in place, they are not useful
if not followed. The theoretical discussion in this paper is constructive and
follows the constructive research method. Industrial experiments are explained
using a case study method.
Keywords: Software quality, quality gates, software development
Title
of the Paper:
New Outlier Detection Method Based on Fuzzy Clustering
DOWNLOAD FULL PDF
Authors:
Moh'd Belal Al-Zoubi, Ali Al-Dahoud, Abdelfatah A. Yahya
Abstract: In this paper, a new efficient method for outlier detection is
proposed. The proposed method is based on fuzzy clustering techniques. The
c-means algorithm is first performed, then small clusters are determined and
considered as outlier clusters. Other outliers are then determined based on
computing differences between objective function values when points are
temporarily removed from the data set. If a noticeable change occurred on the
objective function values, the points are considered outliers. Test results
were performed on different well-known data sets in the data mining
literature. The results showed that the proposed method gave good results.
Keywords: Outlier detection, Data mining, Clustering, Fuzzy clustering,
FCM algorithm, Noise removal
Title
of the Paper:
A Parallel Algorithm to Compute Data Synopsis
DOWNLOAD FULL PDF
Authors:
Carlo Dell'aquila, Francesco Di Tria, Ezio Lefons, Filippo Tangorra
Abstract: Business Intelligence systems are based on traditional OLAP, data
mining, and approximate query processing. Generally, these activities allow to
extract information and knowledge from large volumes of data and to support
decisional makers as concerns strategic choices to be taken in order to
improve the business processes of the Information System. Among these, only
approximate query processing deals with the issue of reducing response time,
as it aims to provide fast query answers affected with a tolerable quantity of
error. However, this kind of processing needs to pre-compute a synopsis of the
data stored in the Data Warehouse. In this paper, a parallel algorithm for the
computation of data synopses is presented.
Keywords: Data warehouse, approximate query processing, data synopsis,
parallel algorithm, message passing interface
Title
of the Paper:
Estimation of Pause Length Set by Storyteller at Sentence Boundary in Nursery
Tale: Design of Synthesized Speech to Support Listener’s Comprehension
DOWNLOAD FULL PDF
Authors:
Hideji Enokizu, Kazuhiro Uenosono, Seiichi Komiya
Abstract: In the present study, we examined the pause length which the
storyteller sets at each sentence boundary in the story text to support
children’s comprehension and proposed one method of estimating the pause
length preliminarily to apply to the speech synthesis. While reading the story
text, the reader constructs the situation model that is the mental microworld
described in each sentence. Unlike the reader who can read the text at his own
pace, however, the listener must hear the story at the storyteller’s reading
pace. Therefore we assumed that the experienced storyteller can set the pause
length at each sentence boundary necessary for the listener to construct the
situation model. If the listener is a young child, this assumption is true.
Then we focused on the relationship between the mental operations for
constructing the situation model and the pause length set by the experienced
storyteller to help the listener comprehend the story. Specifically, we
devised a knowledge representation with multilayered frame structure
corresponding to the situation model to predict the mental operations for
constructing the situation model. The knowledge representation was named as
the situation frame. The results indicated that the storyteller controlled the
pause length on the basis of several operations. The formula, that can
estimate the pause length from the operation needed to construct the situation
frame, seems to provide us the reasonable method to determine the pause length
in the synthesized speech preliminarily.
Keywords: Speech synthesis, Pause length at sentence boundary, Story
comprehension, Situation model, Event-indexing model, Mental operation,
Multilayered frame representation, Multiple linear regression analysis
Title
of the Paper:
Deriving Priority in AHP using Evolutionary Computing Approach
DOWNLOAD FULL PDF
Authors:
Nur Farha Zakaria, Halina Mohamed Dahlan, Ab Razak Che Hussin
Abstract: In the real world, human will face the problem and dilemma to making
decision. Making decision is the critical part in choosing the best solution.
Multi-criteria decision making (MCDM) is one of the most well known branches
of decision making and it is referring to making decision in the presence of
multiple criteria. MCDM problem are common occurrences in everyday life. In
1977, Saaty introduced Analytic Hierarchy Process (AHP) to solve the MCDM
problem. The AHP is widely used for MCDM. Since AHP has been introduced, it
has been applied in numerous situations with impressive results. However, AHP
has been also criticized in the literature review, mainly in priority
derivation procedure. This paper has identified three main problems in current
priority derivation procedure which are: (1) Inconsistency of the judgment,
(2) Non-evolutionary computing approach, and (3) Accuracy performance of the
prioritization method. To solve the criticism and the problems; this paper
proposes AHPEC which is using Evolutionary Computing (EC) to derive priorities
in AHP. The AHPEC gives better result compare to the other prioritization
methods based on accuracy of derived priorities. The comparison is based on
the value of Total Deviation (TD) which is measure accuracy o the solution.
The case study from Srdjevic, 2005 was chosen to compare the performance of
the AHPEC and the current prioritization methods based on accuracy of the
solution as a criterion to be optimized.
Keywords: Decision making, Analytic Hierarchy Process (AHP),
Evolutionary Computing (EC), and Web-based Decision Support System (WDSS)
Title
of the Paper:
Conceptual Fuzzy Temporal Relational Model (FTRM) for Patient Data
DOWNLOAD FULL PDF
Authors:
Aqil Burney, Nadeem Mahmood, Tahseen Jilani, Hussain Saleem
Abstract: Classical relational model offer very little built-in support for
managing time varying data. Relational model mainly deal with crisp data and
not with imprecise data. Managing temporal data in the relational environment
keeping the imprecise and fuzzy nature of the data requires the extension of
the relational model. Small numbers of extended models at conceptual level are
proposed and there is no significant implementation of such model exists.
Importance of developing ontological framework for imprecise data and temporal
data is required in many applications such as health and patient databases. In
this paper we propose a temporal fuzzy ontology for patient data in a hospital
environment. On the basis of the ontology defined we propose a conceptual
fuzzy temporal relational model (FTRM) for handling time varying attributes
and fuzzy attributes in the relational database environment. The proposed
model is easy to define, manage and incorporates the important and relevant
features in the target fuzzy temporal relational model.
Keywords: Relational model, time varying data, fuzzy data, ontology,
fuzzy attributes, fuzzy temporal model
Title
of the Paper:
ICT and Disaster Preparedness in Malaysia: An Exploratory Study
DOWNLOAD FULL PDF
Authors:
D. Magiswary, R. Murali, M. Saravanan, K. Maniam
Abstract: Malaysians are increasingly finding themselves exposed to disasters
especially land slides and flood. However, concern can be raised about
citizen’s preparedness of disasters, and the extent to which they are
consequently prepared, protected and equipped to deal with emergencies that
they may encounter. This paper discusses the level of disaster preparedness
among Malaysians from a survey of 346 citizens to assess their perceptions of
disaster issues, and their attitudes towards increasing the disaster
preparedness. The findings reveal that although there is a high degree of
confidence at surface level, with respondents claiming to be aware of the
disaster issues and the ability to utilize many of the relevant safety
methods, a deeper assessment suggests that there are several areas in which
desirable knowledge and understanding is lacking. The study presents the role
of ICT in the form of knowledge management systems as the recommendation for
Malaysians and the Malaysian government as a tool to improve the level of
disaster preparedness. The study is timely to the public especially to the
local community to preempt, deal with and, ultimately, survive a disaster.
Keywords: Disaster preparedness, knowledge, Malaysia, disaster,
knowledge management systems
Issue 6, Volume 7,
June 2010
Title
of the Paper:
Input Space Reduction for Rule Based Classification
DOWNLOAD FULL PDF
Authors:
Mohammed M. Mazid, A. B. M. Shawkat Ali, Kevin S. Tickle
Abstract: Rule based classification is one of the most popular way of
classification in data mining. There are number of algorithms for rule based
classification. C4.5 and Partial Decision Tree (PART) are very popular
algorithms among them and both have many empirical features such as continuous
number categorization, missing value handling, etc. However in many cases
these algorithms takes more processing time and provides less accuracy rate
for correctly classified instances. One of the main reasons is high
dimensionality of the databases. A large dataset might contain hundreds of
attributes with huge instances. We need to choose most related attributes
among them to obtain higher accuracy. It is also a difficult task to choose a
proper algorithm to perform efficient and perfect classification. With our
proposed method, we select the most relevant attributes from a dataset by
reducing input space and simultaneously improve the performance of these two
rule based algorithms. The improved performance is measured based on better
accuracy and less computational complexity. We measure Entropy of Information
Theory to identify the central attribute for a dataset. Then apply correlation
coefficient measure namely, Pearson’s, Spearman and Kendall correlation
utilizing the central attribute of the same dataset. We have conducted a
comparative study using these three most popular correlation coefficient
measures to choose the best method. We have picked datasets from well known
data repository UCI (University of California Irvine) database. We have used
box plot to compare experimental results. Our proposed method has showed
better performance in most of the individual experiment.
Keywords: Classification, C4.5, PART, Entropy, Pearson’s Correlation,
Spearman Correlation, Kendall Correlation
Title
of the Paper:
A Default Risk Model with Multi-Loan Lending Operations: A System of Integral
Scale with Scope
DOWNLOAD FULL PDF
Authors:
Jeng-Yan Tsai, Jyh-Jiuan Lin, Jyh-Horng Lin
Abstract: Recent research on multi-loan lending operations has remained
largely silent on the question of what ties together the retail banking
functions of scale and scope lending. Our main point is that in a sense, they
are just two different manifestations of banking expansion. This is especially
true to the extent that banks are heavily involved in consolidation-based
lending. In a multi-loan call pricing model, changes in lending scope have
direct effects on the bank’s interest margin related to lending scale and thus
bank profits and risks. Comparative static analysis shows that scale and scope
lending are complements. However, this commingling is not guaranteed to
produce higher return and greater safety for the bank. As a result, bank
equity return and default risk are overvalued when the integral role on the
inclusion of more realistic loan portfolio management in the consolidated
banking is ignored.
Keywords: Bank Interest Margin, Default Risk, Scale, Scope
Title
of the Paper:
Resolution of Resource Conflict Between the Different Two Projects in MPL-CCPM
Representation
DOWNLOAD FULL PDF
Authors:
Munenori Kasahara, Hirotaka Takahashi, Hiroyuki Goto
Abstract: Max-Plus-Linear (MPL) system is known as a solution for scheduling
problems of a class of discrete event systems. Typical systems include:
manufacturing system and project management, etc. In such systems, the initial
schedule is frequently changed due to unpredictable disturbances. Critical
Chain Project Management (CCPM) method is a management method that can shorten
the time required to complete a project based on the Theory Of Constraints
(TOC). Therefore, in our previous papers [1] [2], we proposed a method for
applying the concepts of the CCPM to MPL representation in order to control
the occurrence of an undesirable state change. The CCPM method also provides a
solution for the problem of the resource conflict. However, we did not discuss
the resource conflict for simplicity. In this paper, we propose a method for
discovering resource conflict between the different two projects in the
MPL-CCPM representation. We also discuss how to shift the resource in order to
resolve the conflict.
Keywords: Max-Plus Algebra, Max-Plus-Linear system, Discrete Event
Systems, Critical Chain Project Management, Resource Conflict, State-Space
Representation, Scheduling
Title
of the Paper:
A Proposal of a Method to Navigate Interview-driven Software Requirements
Elicitation Work
DOWNLOAD FULL PDF
Authors:
Takatoshi Yamanaka, Hajime Noguchi, Shimon Yato, Seiichi Komiya
Abstract: System development for software is in accordance with requirements
specification. Omissions or errors in requirements specification cause
omissions or errors in subsequent deliverables. Therefore, requirements
elicitation work in order to prepare requirements specification is a very
important process. However, it is very difficult to extract customer
requirements for software development without omissions or errors, mainly
because customers and software engineers (SE) do not share common knowledge
resulting in omissions or errors in the requirements elicitation work due to
poor mutual communication. Therefore, in this paper we are proposing a
structure to navigate requirements elicitation work through interviews in
order for SEs to elicit customer requirements without omissions or errors by
using the interview technique. We are also conducting a comparative experiment
in regards to the cases that requirements elicitation work is conducted by
both utilizing and not utilizing this structure. As a result, we were better
able to elicit customer requirements without omissions or errors in the case
of the former rather than the latter; therefore we successfully verified that
the structure proposed in this paper by utilizing this structure is effective.
Keywords: Requirements Elicitation Requirements Elicitation Work
Requirements Specification Navigation Rule Interview IEEE830
Title
of the Paper:
Supervised Learning Vector Quantization for Projecting Missing Weights of
Hierarchical Neural Networks
DOWNLOAD FULL PDF
Authors:
Cin-Ru Chen, Liang-Ting Tsai, Chih-Chien Yang
Abstract: A supervised learning vector quantization (LVQ) method is proposed
in this paper to project stratified random samples to infer hierarchical
neural networks. Comparing with two traditional methods, i.e., list-wise
deletion (LWD), and non-amplified (NA), the supervised LVQ shows satisfying
efficiencies and accuracies in simulation studies. The accomplishments of
proposed LVQ method can be significant for sociological and psychological
surveys in properly inferring the targeted populations with hierarchical
neural network structure. In the numerical simulation study, successes of LVQ
in projecting samples to infer the original population are further examined by
experimental factors of sampling sizes, missing rates, and disproportion
rates. The experimental design is to reflect practical research and under
these conditions it shows the neural network approach is more accurate and
reliable than its competitors.
Keywords: Neural Network, Learning Vector Quantization, Missing
Weights, Stratified Structure, Simulation Study, Large Scale Data
Title
of the Paper:
Integrating Thin Client Solution in Human-Computer Interaction Study
DOWNLOAD FULL PDF
Authors:
Abdul Rahman Bin Ahlan, Yusri Bin Arshad, Murni Bt Mahmud
Abstract: Over the past decades the field of education has witnessed the
introduction of Internet, a new and revolutionary technology that seems to
radically alter the way humans teach and learn. Offering thin client solution
for Orang Asli provides opportunities for the team to undertake human-computer
interaction related studies. Thin client is an effective and efficient ways to
provide least computer computers and internet facilities and infrastructure
for organizations or communities. Orang Asli community is continuously given
attention by the government for their development so as not to widen digital
gap with other advanced races in Malaysia. IT education and access to
computers and internets seem to be one of the noble viable options for the
young generations to nurture the knowledge society values. This is due to many
adverse reports related to Orang Asli attitudes and behaviours in the media as
well as research publications. Thus, our IT social inclusion project is timely
and hoped to contribute to their development for better lives. This paper
describes the proposed thin client configuration for Orang Asli community in
Gombak area. It begins with literature reviews on previous studies, concepts
and products available and description of Orang Asli schoolchildren in the
area as well as introduction to human-computer interaction and usability
testing and evaluation. Based on risk management assessment, thin client
system is chosen for the community and the proposed architecture configuration
is described and illustrated. The HCI is described and proposed for future
researches.
Keywords: Human-computer interaction, thin client, schools, Malaysia,
Orang Asli, information technology
Title
of the Paper:
A Multi Purpose Web-based Contractual Management System
DOWNLOAD FULL PDF
Authors:
Sharil Tumin, Sylvia Encheva
Abstract: A Web-based multi purpose contractual management system can provide
support to contractual process workflows for difeerent types of contractual
process of unilateral, bilateral or multilateral contracts. These processes
can be done on-line i.e. Web-based without the need for all actors to be
synchronously present with respect to both time and space. Di erent
contractual processes of initialization, negotiation, agreement, signing
(witness), and archive are managed within the application securely by
analyzing data-flow between actors, ushering actors to perform their duties in
a timely manner and employing appropriate cryptographic techniques on every
step of the way. The implementation must deliver a management system that
provides operational properties of authenticity, privacy, trustworthy,
reliability, verifiability, and linkability.
Keywords: Contract, Contract Management, Applications security,
SecureWeb-based Application, SecureWorkflow Modelling, Applied Cryptography
Title
of the Paper:
Simplifying Enterprise Wide Authorization Management Through Distribution of
Concerns and Responsibilities
DOWNLOAD FULL PDF
Authors:
Sharil Tumin, Sylvia Encheva
Abstract: Authentication lets a system know who you are, while authorization
controls your resources access rights and what operations you are allow to
perform. Resources have owners to whom the resources belong to. The owner
knows best who is allowed to access her resources at any one time.
Distribution of concerns and responsibilities can be effectively used for
efficient management of enterprise wide authorization. A collection of users
with similar rights to a resource can be logically grouped. Managing user
groups, recourse groups, access relationships and permissions is tedious due
to complex inter-relationships between actors and among actions. A Web-based
application which implements a higher level abstraction of access management
that mappes specific low level operating system access control can be deployed
to access local manager to manage their resource access effectively and
economically, which in turn will increase the system’s security level of the
entire organization.
Keywords: Authentication, Authorization, Distributed Management,
Delegation, Enterprise IT security, Multitiers Web-based System
Title
of the Paper:
Secure Multi Party Computation Algorithm Based on Infinite Product Series
DOWNLOAD FULL PDF
Authors:
Abdolreza Rasouli, Mohd Aizaini Maarof, Mahboubeh Shamsi
Abstract: Nowadays, data mining has been extremely interested; because of its
ability to give the companies a better view for strategic decisions. In case
of, contribution of several companies for a shared data mining, there is a big
problem: confidentially of data. Here, the companies are avoided passing their
data to the miner directly. The best solution is applying a cryptographic
tools named as Multi Party Computation (MPC). In this paper, we represent a
secure MPC algorithm for online transactions, where the clients’ information,
especially joint time and public keys are not clear. The algorithm emerges the
excessively useful response time. The mathematic demonstration also ensures
the privacy of clients’ data.
Keywords: Multi Party Computation, Privacy Preserving, Secure Counting
Algorithm, Distributed Data
Title
of the Paper:
Spatial Clustering and Outlier Analysis for the Regionalization of Maize
Cultivation in China
DOWNLOAD FULL PDF
Authors:
Hu Wang, Xiaodong Zhang, Shaoming Li, Xiaomei Song
Abstract: Regionalization has been the foundation of large-scale plantation
and local optimization for crop cultivation. Current regionalization
approaches practiced mainly rely on qualitative analysis and heuristic
methods, which cannot meet the increasingly challenging demands. In this
paper, we demonstrate the use of spatial clustering method on the
regionalization of crop cultivation, with the maize growing in China as an
example. In the proposed method, we adopt four indicators [that is, elevation,
effective accumulated temperature (EAT), precipitation and yield] which are
the major factors reflecting the maize cultivation differences. In addition,
by taking into account the spatial information of counties in the clustering
process, we achieve a more spatially coherent clustering result. As a
post-processing step, adjustment with the help of a Geographic Information
System (GIS) eliminates regions that appear inconsistent with the vicinity.
With the proposed approach, we classify the 2,831 counties of China into 7
regions, and show that the result is highly consistent with the conventional
regionalization of maize cultivation in China. This result proves the
feasibility of our approach, and suggests its possible application on other
crops. Furthermore, we carry out outlier analysis for each of the regions to
identify the counties that show abnormal behaviors in maize cultivation, and
further analyze the possible causes. This study provides valuable information
for cultivation region selection in large-scale crop plantation.
Keywords: Spatial clustering, regionalization, maize-growing region,
outlier analysis
Title
of the Paper:
Spatial Clustering for the Regionalization of Maize Cultivation in China and
its Outlier Analysis
DOWNLOAD FULL PDF
Authors:
Hu Wang, Xiaodong Zhang, Shaoming Li, Xiaomei Song
Abstract: Regionalization of crop cultivation is the foundation of large-scale
planting and a reasonable layout scheme, but current approaches mainly rely on
qualitative analysis and heuristic methods, which cannot meet the
progressively challenging demands. In this study, we propose a spatial
clustering approach that consists of two steps. First, attributive clustering
is applied on the indicators. Second, post-processing step of spatial
contiguity adjustment is applied according to specific rules. This two-step
algorithm results in clustered regions which are both contiguous in spatial
relation and similar in attributes. In this paper, we demonstrate the use of a
spatial clustering method on the regionalization of crop cultivation, with the
maize growing in China as an example. The result shows that the result is
highly consistent with the conventional regionalization of maize cultivation
in China, which proves the feasibility of our approach, and suggests its
possible application on other crops. Furthermore, we carry out outlier
analysis for each of the regions to identify the counties that show abnormal
behaviors in maize cultivation, and further analyze the possible causes.
Keywords: Spatial clustering, regionalization, maize-growing region,
outlier analysis
Title
of the Paper:
Maize Varieties Combination Model of Multi-Factor and Implement
DOWNLOAD FULL PDF
Authors: Lin
Yang, Xiaodong Zhang, Shaoming Li
Abstract: The maize varieties combination model which fully uses all kinds of
resources and strikes a balance between low risk and high yield has been built
by taking the county as the research unit.It analyzes the factors influencing
over corn production so as to determining the indexes impact on corn
varieties,profits from the mature investment portfolio selection model and
considers from both of qualitative and quantitative point of view.In addtion,
under the idea of object-oriented programming, the system of the model, which
has both problem solving and visualization, has been designed and implemented
in the .net platform by using C language. The result indicated that the model
can provide maize planting proportion and make useful decision support for
seed companies, agricultural enterprises, agricultural extension agents,
farmers and so on in accurate popularization of maize varieties.
Keywords: Maize varieties, combination , LPM model, markowitz mean -
variance model, varietal character,climate type,terrain, pest environment,
farming arrangements
Title
of the Paper:
The Research of Ubiquitous Infrastructure of Museum Service Applications in
National Palace Museum
DOWNLOAD FULL PDF
Authors:
Chen-Wo Kuo, Shrane-Koung Chou
Abstract: Based on abundant artifact collections together with the employment
of Radio Frequency Identification (RFID) and wireless networking technologies,
NPM has been implementing Ubiquitous Project with aims to transform NPM from a
traditional museum into a U-Museum and to assist domestic cultural and
creative industries in reaching out the world. New technologies also
facilitate other missions such as public service, ticketing, digital
value-added applications and cultural creativity, while advanced digital
technologies bring new excitement and visiting experience to the audience.
This essay will highlight the project for digital value-added application in
marketing and licensing department of NPM.
Keywords: RFID, NPM, Ubiquitous, U-museum, Wireless, Sensor
Issue 7, Volume 7,
July 2010
Title
of the Paper:
Computerized Access System for Entry into Enterprises
DOWNLOAD FULL PDF
Authors:
Marius-Constantin Popescu, Nikos E. Mastorakis, Jean-Octavian Popescu
Abstract: This paper develops two distinct systems in terms of their use: the
classic centralized access control in a building (or building complex) based
on a card and the proposed system of development for applications based on PIC
16F628 microcontroller. These systems are studied in terms of advantages and
disadvantages involved in using them. In the second part of the paper shows
how to implement video-tracking device used to access an enterprises.
Keywords: System implementation, Microcontroler PIC 16F628, Programator
IC-Prog
Title
of the Paper:
A Head Pose and Facial Actions Tracking Method Based on Effecient Online
Appearance Models
DOWNLOAD FULL PDF
Authors:
Xiaoyan Wang, Xiangsheng Huang, Huiwen Cai, Xin Wang
Abstract: Target modeling and model fitting are the two important parts of the
problem of object tracking. The former has to provide a good reference for the
latter. Online appearance models (OAM) has been successfully used for facial
features tracking on account of their strong ability to adapt to variations,
however, it suffers from time-consuming model fitting. Inverse Compositional
Image Alignment (ICIA) algorithm has been proved to be an efficient, robust
and accurate fitting algorithm. In this work, we introduce an efficient online
appearance models based on ICIA, and apply it to track head pose and facial
actions in video. A 3d parameterized model, CANDIDE model, is used to model
the face and facial expression, a weak perspective projection method is used
to model the head pose, an adaptive appearance model is built on shape free
texture, and then the efficient fitting algorithm is taken to track parameters
of head pose and facial actions. Experiments demonstrate that the tracking
algorithm is robust and efficient.
Keywords: Visual tracking, Online appearance models, Inverse
Compositional Image Alignment, model learning, facial feature tracking
Title
of the Paper:
Integration of Item Hierarchy and Concept Tree based on Clustering Approach
with Application in Statistics Learning
DOWNLOAD FULL PDF
Authors:
Yuan-Horng Lin
Abstract: Item hierarchy and concept tree provide references for cognition
diagnosis and remedial instruction. Therefore, integration of data analysis on
item hierarchy and concept tree should be important. The purpose of this study
is to provide an integrated methodology of item hierarchy and concept tree
analysis. Besides, fuzzy clustering is adopted to classify sample so that
homogeneity appear in the same cluster and adaptive instruction will be more
feasible. Polytomous item relational structure (PIRS) is the foundation of
item hierarchy analysis. Interpretive structural modeling (ISM) combined with
calculation of ordering coefficient is to construct concept tree. Source data
sets of PIRS and ISM are based on response data matrix and item-attribute
matrix respectively. In this study, the empirical test data is the statistics
assessment of university students. The results show that the integration of
PIRS and ISM based on fuzzy clustering are useful for cognition diagnosis and
adaptive instruction. Finally, further suggestions and recommendations based
on findings are discussed.
Keywords: Cognition diagnosis, concept tree, fuzzy clustering, ISM,
item hierarchy, PIRS
Title
of the Paper:
Two Novel Effort Estimation Models Based on Quality Metrics in Web Projects
DOWNLOAD FULL PDF
Authors:
Ljubomir Lazic, Nikos E. Mastorakis
Abstract: Web development projects are certainly different from traditional
software development projects and, hence, require differently tailored
measures for accurate effort estimation. Effort estimation accuracy will
affect the availability of resource allocation and task scheduling. In this
paper, we investigate the suitability of a newly proposed quality metrics and
models to estimate the effort and duration for small or medium-size Web
development projects. It then describes a new size metrics, presents two novel
methods (WEBMO+ and VPM+), based on WEB model (WEBMO) using Web objects
instead of SLOC and Vector Prediction Model (VPM), to fast estimate the
development effort of Web-based information systems. We also empirically
validate the approach with a four projects study. The results indicate that
the approach provides a mechanism to measure the size of software systems,
classify software systems, and estimate development effort early in the
software life cycle to within +/-20 percent across a range of application
types. In contrast with other existing methods, WEBMO+ and VPM+ uses raw
historical information about development capability and high granularity
information about the system to be developed, in order to carry out such
estimations. This method is simple and specially suited for small or
medium-size Web based information systems.
Keywords: Web Quality, Effort Estimation Method, Sizing Metric,
Web-based Metrics, Web Engineering
Title
of the Paper:
Assessment of Road Pavement Condition, Based on the Combined Concept of
Chance, Change and Entropy
DOWNLOAD FULL PDF
Authors:
Radu Andrei, Zeynep Durmusoglu, Vasile Boboc, Elena Puslau
Abstract: This paper presents a new methodology for the assessment of road
pavement condition, based on three powerful concepts, aimed to accommodate the
uncertainty caused by the complex interrelationships, material defects,
structural deficiencies, human errors, and ambient fluctuations characterizing
the pavement systems. These very useful concepts, selected with the aim, to
approach, in a new comprehensive manner, the difficult task of assessment of
road pavement condition are as follows: the concept of chance, expressed in
terms of probabilities and reliability; the concept of change, expressed in
terms of dynamics, e.g. of change of the pavement condition in time; the
concept of entropy, expressed in terms of differences in pavement system's
entropy, occurred in time, as an appropriate quantitative parameter, measuring
the degree of uncertainty of a pavement to meet its specific structural,
surface and traffic safety requirements.
Keywords: Pavement condition, chance, probability, change, dynamics,
entropy
Title
of the Paper:
A New Approach for Identification of MIMO Non Linear System with RKHS Model
DOWNLOAD FULL PDF
Authors:
Taouali Okba, Elaissi Ilyes, Garna Tarek, Messaoud Hassani
Abstract: In this paper we propose a new approach for the modelling of the
multi-variable systems (MIMO) on the Reproducing Kernel Hilbert Space (RKHS).
The proposed approach considers the MIMO system as a set of MISO processes
modelled in RKHS space. We propose also a comparative study of three
identification kernel methods of nonlinear systems modelled in Reproducing
Kernel Hilbert Space (RKHS), where the model output results from a linear
combination of kernel functions. Theses methods are support vector machines
(SVM), regularization networks (RN) and kernel Principal Component Analysis
(KPCA). The performances of the proposed MIMO RKHS model and of each kernel
method in terms of generalization ability and computing time were evaluated on
numerical simulations.
Keywords: Identification, RKHS, SLT, MIMO model, SVM, RN, KPCA
Title
of the Paper:
Exploring the Effects of Game-based Instructional Design on 3D Animation: A
Perspective of Technology Acceptance
DOWNLOAD FULL PDF
Authors:
Jung-Chuan Yen, Chih-Hsiao Tsai, I-Jung Chen
Abstract: The purpose of this study was to investigate the effects of
individual differences on learners’ performances of three-dimensional
animation through game-based instructional design. Participants were 78
college juniors enrolled in a 3D animation course, an 18-week course designed
for enhancing students’ animation skills. A t-test was conducted to analyze
the independent variables by self-regulation, perceived parents’ expectancy,
perceived teachers’ expectancy, and perceived initiative on project
performance as the dependent variables. An online questionnaire was conducted
at the end of the semester to obtain learners’ perceptions of the system. The
results showed that (a) students with higher self-regulation and stronger
parents’ expectancy outperformed the lower-group on project performance, (b)
there were no significant differences on learners’ acceptance grouped by
gender and perceived parents’ expectancy, (c) students with stronger teachers’
expectancy demonstrated higher acceptance on perceived ease to use, perceived
usefulness, and perceived willingness to use, and (d) students with higher
perceived initiative showed more positive attitude in willingness to use the
system.
Keywords: 3D animation, Game-based learning, Individual differences,
Virtual reality, Self-regulation
Title
of the Paper:
Implementing Data Security in Student Lifecycle Management System at the
University of Prishtina
DOWNLOAD FULL PDF
Authors:
Blerim Rexha, Haxhi Lajqi, Myzafere Limani
Abstract: In this paper is presented a novel approach for fulfilling the data
security criteria in a Student Lifecycle Management System at the University
of Prishtina. The four main criteria of data security such as: privacy,
authentication, integrity and non-repudiation are fulfilled through carefully
selected security policies. Student data privacy is achieved using the Secure
Socket Layer protocol for web communication with web server. Each user, being
student, academic or administrative staff is provided with unique user name
and initial password in the Student Lifecycle Management System. Data
integrity and non-repudiation are fulfilled using digital signatures. The
novelty of implemented solution is based on extending the subject name in
X.509 digital certificates and using this certificate for securing student
grades, which is in full compliance with the Kosovo Law on Information
Society. Public Key Infrastructure and X.509 digital certificates have been
established as the most trustworthy methods for assuring data security
criteria in modern software applications. Security policy enforces that
digital certificate and its associated private key shall be stored in a smart
card. Access to private key stored in a smart card is protected by Personal
Identification Number, known only by smart card holder. This implementation
was installed at the Faculty of Electrical and Computer Engineering and has
successfully passed a six semester testing period and students were, for the
first time in the history of the University of Prishtina, able to apply online
to take an exam.
Keywords: Authentication, Digital Signature, Non-Repudiation, Privacy,
Security, Smart Cards, Student Lifecycle Management, X.509 Certificate
Title
of the Paper:
Stochastic Optimization Algorithm with Probability Vector in Mathematical
Function Minimization and Travelling Salesman Problem
DOWNLOAD FULL PDF
Authors:
Jan Pohl, Vaclav Jirsik, Petr Honzik
Abstract: In the paper there is introduced the newly developed optimization
method the Stochastic Optimization Algorithm with Probability Vector (PSV). It
is related to Stochastic Learning Algorithm with Probability Vector for
artificial neural networks. Both algorithms are inspired by stochastic
iterated function system SIFS for generating the statistically self similar
fractals. The PSV is gradient method where the direction of individual future
movement from the population is based stochastically. PSV was tested on
mathematical function minimization and on the travelling sales man problem.
The influence of the quantity of individuals upon the best achieved fitness
function was also tested on the mathematical functions minimization.
Keywords: Stochastic, Optimization Algorithm, PSV, SIFS, Random Walk,
Travelling Salesman Problem
Title
of the Paper:
Study on Context Understanding, Knowledge Transformation and Decision Support
Systems
DOWNLOAD FULL PDF
Authors:
Dana Klimesova, Eva Ocelikova
Abstract: The contribution deals with the problem of detecting, interpretation
and understanding various contexts on the background of the process
understanding and the context applying. Also the problem of multi-criteria
evaluation is addressed and the different ways of knowledge integration is
discussed. Despite rapid progress in this area, there are still a significant
number of challenges that need to be addressed to enable automatic contextual
decision making. Those challenges include robust detection of the context, its
interpretation, multi-level semantic information and understanding on the base
of inference from object interactions. The contribution is focused also on the
use of Voronian diagrams in combination with standard spatial data to support
the decisions in the field of nearest objects selection with regards to the
additional considerations. It is shown that the localized knowledge make
possible to aggregate important aspects of defined objects and phenomena and
evaluate them in context of different requirements.
Keywords: Decision making, contextual modelling, knowledge
transformation, Voronian diagram, nearest triangulation, decision support,
Delaneu triangulation
Title
of the Paper:
Correlation between Netspeak Elements and Asynchronous Discussion
DOWNLOAD FULL PDF
Authors:
Karmela Aleksic-Maslac, Dina Vasic, Jagoda Poropat Darrer
Abstract: Asynchronous discussion can take place no matter how distant the
collocutors are and therefore is playing a very important role of any
e-learning system. Online discussion allows students to consider and examine
other people’s thoughts and opinions on a specific topic and answer them in a
concise and logical way. Within the ICT course taught in a first semester at
Zagreb School of Economics and Management, we use two types of online
discussion, so called opened and closed discussions. Opened discussions
represent every day, informal communication between the students and the
professors; while the closed ones are related strictly to the course topics.
In this paper we will analyze the use of some particular elements of language
in closed discussion on two levels: professor – student and student – student.
Netspeak is a new language of information communication found on Internet in a
form of chat, text messages and msn. It is rapidly developed, more direct,
natural and for its features is close to a spoken language. Analyzed parts of
the Netspeak in this paper are those the most subjected to changes, as for
Croatian language those are the omission of diacritical marks, increasing use
of acronyms and abbreviations, prolongation of graphemes, the use of uppercase
when lower cases are required and the introduction of signs meaning actual
state of mind or mood, so called emoticons. We expected the discussion between
students and professors to be formal, highly respecting the norms of the
written Croatian language and the discussion between students to be less
formal, more near to the Netspeak. As well we wanted to see whether there are
some relations among students using Netspeak, Discussion Quality, Dominant
Members and Discussion Moderators.
Keywords: Online discussion, Netspeak, e-learning, Information and
Communication Technologies, education, asynchronous, language
Title
of the Paper:
An Advanced Learning and Discovering System
DOWNLOAD FULL PDF
Authors:
J. B. Savkovic-Stevanovic
Abstract: This paper presents a new approach and method for learning and
discovering. Concept learning illustrates acquiring descriptions that make the
structure of generalizations explicit. Two kinds of concept learning are
distinguished inductive and deductive. The entity structure in which all
components are encoded has modeled knowledge representation scheme.
Discovering with process knowledge acquisition and learning were applied.
Learning by discovering systems enhance their knowledge base. In this paper
examines the entity structure for chemical system building in organic
chemistry. The obtained results has illustrated the development of discovering
model for surfactants formation.
Keywords: Concept learning, process discovering, compounds, functional
groups, formulation
Issue 8, Volume 7,
August 2010
Title
of the Paper:
Training of RFB Neural Networks using a Full-Genetic Approach
DOWNLOAD FULL PDF
Authors:
Iulian-Constantin Vizitiu, Petrica Ciotirnae, Teofil Oroian, Adrian Radu,
Florin Popescu, Cristian Avram
Abstract: The efficiency of pattern recognition (PR) systems using RBF neural
networks to implement their recognition function, depends a lot by the
training algorithms of these neural networks and especially, by the specific
techniques (e.g., supervised, clustering techniques etc.) used for RBF center
positioning. Having as starting point the basic property of genetic algorithms
(GA) to represent global searching tools, a full-genetic approach to assure
optimization both connectivity and neural weights of RBF networks is proposed.
In order to confirm the broached theoretical aspects and based on real pattern
recognition task, a comparative study (as performance level) with others
standard RBF training methods and SART neural network is also indicated.
Keywords: RBF neural networks, clustering techniques, genetic
algorithms
Title
of the Paper:
Nuchal Translucency Marker Detection Based on Artificial Neural Network and
Measurement via Bidirectional Iteration Forward Propagation
DOWNLOAD FULL PDF
Authors:
Lai Khin Wee, Too Yuen Min, Adeela Arooj, Eko Supriyanto
Abstract: Ultrasound screening is performed during early pregnancy for
assessment of fetal viability and prenatal diagnosis of fetal chromosomal
anomalies including measurement of nuchal translucency (NT) thickness. The
drawback of current NT measurement technique is restricted with inter and
intra-observer variability and inconsistency of results. Hence, we present an
automated detection and measurement method for NT in this study. Artificial
neural network was trained to locate the region of interest (ROI) that
contains NT. The accuracy of the trained network was achieved at least 93.33
percent which promise an efficient method to recognize NT automatically.
Border of NT layer was detected through automatic computerized algorithm to
find the optimum thickness of the windowed region. Local measurements of
intensity, edge strength and continuity were extracted and became the weighted
terms for thickness calculation. Finding showed that this method is able to
provide consistent and more objective results.
Keywords: Nuchal translucency, ultrasound, fetal, pattern recognition,
artificial neural network
Title
of the Paper:
Mobile and Wireless Services and Technologies for M-Government Solution
Proposal for Dubai Government
DOWNLOAD FULL PDF
Authors:
Mansoor Alrazooqi, Rohan De Silva
Abstract: Electronic governments (e-governments) are fast emerging replacing
functions performed by traditional governments. However, as new mobile and
wireless technologies are penetrating even faster and more and more people
prefer them than the landline connections, the governments are faced with a
new challenge. The mobility of people and use of mobile devices necessitate
the provision of anytime, anywhere access to government resources. As such,
governments need to move to mobile governments (m-governments). In this paper,
an m-government solution for the Dubai government is proposed by gathering and
analysing the requirements of the public that visit the Dubai Police. For this
purpose, quantitative and qualitative data were gathered using interviews and
questionnaires and qualitative data were analysed using Thematic Content
Analysis. Finally, the mobile and wireless service and technology components
of m-Government solution for the Dubai government are presented.
Keywords: E-government, m-government, ICT, mobility, mobile
penetration, technology and services
Title
of the Paper:
Hybrid Magnetoacoustic Method for Breast Tumor Detection: An In-vivo and
In-vitro Modelling and Analysis
DOWNLOAD FULL PDF
Authors:
Maheza Irna Mohamad Salim, Mohammad Azizi Tumiran, Siti Noormiza Makhtar,
Bustanur Rosidi, Ismail Ariffin, Abd Hamid Ahmad, Eko Supriyanto
Abstract: A new breast cancer detection method that is based on tissue
bioelectric and acoustic characteristics has been developed by using a hybrid
magnetoacoustics method. This method manipulates the interaction between
acoustic and magnetic energy upon moving ions inside the breast tissue.
Analytical in-vivo and in-vitro modelling and analysis on the system
performance have been done on normal and pathological mice breast tissue
models. Analysis result shows that, hybrid magnetoacoustic method is capable
to give unique characteristics between normal and pathological mice breast
tissue models especially in in-vitro application. However, additional
parameter such as analysis of current distribution in tissue should be taken
into account for in-vivo application due to the redundancy of the existing
result.
Keywords: Magnetic field, acoustic wave, breast tissue, normal and
pathological
Title
of the Paper:
Language Assessment and Training Support System (LATSS) for Down Syndrome
Children Under 6 Years Old
DOWNLOAD FULL PDF
Authors:
Tan Meng Kuan, Yeo Kee Jiar, Eko Supriyanto
Abstract: Theoretically and generally, Down syndrome children in this study
are defined as children who are proven scientifically and medically of their
impairment in mental health or developmental abilities. Although some of the
limitations of Down syndrome children cannot be overcome, early childhood
intervention is proven to be able to improve the quality of their lives. Early
childhood intervention includes screening for common problems, and vocational
training can improve the development of the Down syndrome children. The
language ability is emphasized in this study as the speech and language skill
of Down syndrome children are significantly delayed – more delayed than
non-verbal abilities. Besides that, the speech and language skill underpin
social and cognitive development, therefore affecting all aspects of
development. In other words, improving the language ability of individuals
with Down syndrome will improve all aspects of their development and quality
of lives. In this study, the support system provides the most effective
assessment and training method for language ability to the children. This
software utilizes speech recognition technology, with modified internationally
recognized curriculum, implemented in C sharp programming language. In
conclusion, the result of this study is expected to be beneficial and able to
assist parents and trainers on effective language training for Down syndrome
children.
Keywords: Support system, Language training, Language assessment, Down
syndrome children, Speech recognition, Early Intervention Program
Title
of the Paper:
Computerized Automatic Nasal Bone Detection based on Ultrasound Fetal Images
Using Cross Correlation Techniques
DOWNLOAD FULL PDF
Authors:
Lai Khin Wee, Adeela Arooj, Eko Supriyanto
Abstract: Recent study shows that fetal chromosomal abnormalities can be
detected in early ultrasonic prenatal screening by identifying the absence of
fetus nasal bone. The drawbacks of current method are operator dependent,
observer variability and improper training. In particular, accurate nasal bone
detection requires highly trained sonographers, obstetricians and fetal
medicine specialists since the ultrasound markers may easily confuse with
noise and echogenic line in ultrasound image background. We present a
computerized method of detecting the absence of nasal bone by using normalized
grayscale cross correlation techniques. Image preprocessing is implemented
prior to cross correlation to assess the availability of nasal bone. The
resultant threshold, bordering the absence and presence of nasal bone, is set
to a value of 0.35. The accuracy of the developed algorithm achieved was,
around 96.26 percent which promises an efficient method to recognize nasal
bone automatically. The threshold can be further improved if a larger set of
nasal bone ultrasound images are applied.
Keywords: Chromosomal abnormalities, nasal bone, cross correlation,
ultrasound image, matching, trisomy
Title
of the Paper:
The FAME Tool: An Automated Supporting Tool for Assessing Methodology
DOWNLOAD FULL PDF
Authors:
Filippo Eros Pani, Giulio Concas, Daniele Sanna, Luca Carrogu
Abstract: The FAMEtool is a support tool for the FAME (Filter, Analyze,
Measure and Evaluate) Methodology, an iterative approach for open source
software assessment. The FAMEtool does not replace evaluation experts, but it
serves to improve the productivity of experts in evaluating the different
solutions. The efficacy of the FAMEtool is reported in this paper. Several
methods have been created to define a process for assessing Free/Open Source
software. Some focus on some aspects like the maturity, the durability and the
strategy of the organization around the Open Source project itself. Other
methodologies add functional aspects to the assessment process. Only some of
these methodologies are supported by specific tools. This paper describes the
FAMEtool that implements the steps of the FAME methodology, particularly in
the filtering and analysis phases, trying to follow the logic of the
simplified method that allows a faster application and gives support to who
will be engaged in the selection of the new IT solution. Such a tool is
introduced in the form of Web application and has been developed in Java.
Keywords: Open Source software, Software evaluation, Technology
transfer, Software quality, Assessment model
Title
of the Paper:
Modeling of a Real Situation as a Method of the Algorithmic Thinking
Development and Recursively Given Sequences
DOWNLOAD FULL PDF
Authors:
Stepan Hubalovsky, Eva Milkova, Pavel Prazak
Abstract: A method of developing students’ algorithmic thinking is
demonstrated in the paper first. This is followed by an example of a physical
problem step by step modeling and several approaches to its solution. These
approaches demonstrate possible interdisciplinary learning, which is
considered to be a very important part of future teachers’ education.
Especially the relationship among physics, computer science and mathematics is
introduced. Finally the benefit of CAS for explaining and visualizing
recursively defined sequences is discussed.
Keywords: Algorithms, interdisciplinary learning, modeling,
visualization, motivation, CAS, Maple, recursively defined sequence, linear
recursive equation, logistic equation, cobweb plot, bifurcation diagram.
Title
of the Paper:
Knowledge Coding Methods for Rule-Based Expert Systems
DOWNLOAD FULL PDF
Authors:
Petr Polach, Jan Valenta, Vaclav Jirsik
Abstract: This paper gives an overview of knowledge representation methods
that are currently being implemented for use in a hybrid expert system shell
that has been under development at the Department of Control and
Instrumentation, BUT. Two approaches are discussed – a diagnostic and a
planning expert system knowledge base coding. A new method suitable for
diagnostic rule-based expert systems with automated weight tuning, deriving
from neural networks, is proposed. Next, an approach to modeling knowledge
bases using Petri Nets is discussed and inference engine operations are
compared for both diagnostic and planning expert system.
Keywords: Expert systems, Knowledge Engineering, Knowledge base tuning,
Resla, Petri Nets
Issue 9, Volume 7,
September 2010
Title
of the Paper:
Web Based Real-Time Meteorological Data Analysis and Mapping Information
System
DOWNLOAD FULL PDF
Authors:
Refik Samet, Serhat Tural
Abstract: In this paper, the real-time meteorological data analysis and
mapping information system is proposed. This system makes real-time data and
the results of analysis available through all end users. It captures the
real-time meteorological data from meteorological stations, pushes these data
into geodatabase and publishes the raw data and the results of analysis
through server as a web mapping service that can be accepted by any desktop
and web applications. One of contributions of the proposed system is executing
the real-time analysis and mapping operations whenever the latest real-time
meteorological data arrive to the system via a determined protocol from
meteorological stations. This contribution allows the system to store, analyze
and map each meteorological data once. Other contribution is related to
mapping operations. Proposed system creates the map for certain data and for
the results of analysis and renews each time when the data is changed. Due to
these contributions proposed information system allows the end users to get
newest metrological information in instant. Besides, because these operations
are performed on the server side, any end user can use them without the need
for custom code.
Keywords: Geographical Information System, Web Based Information
System, Real-Time Meteorological Data, Mapping, Statistical Analysis,
Geostatistical Analysis, Krigging Interpolation Method
Title
of the Paper:
Enhancing the Quality of Administration, Teaching and Testing of Computer
Science Using Learning Management System
DOWNLOAD FULL PDF
Authors:
Martin Capay, Julia Tomanova
Abstract: In the 21st century, the digital technologies are firmly implemented
in all part of industry and services. Communication and also cooperation is
often realized only via electronic connection. Using of modern concepts based
on information and communication technologies in education too is still
growing. That requires modern approach in control, teaching and testing
process, which is commonly carry out by LMS. The authors analyze the using of
learning management systems and e-learning in Slovakia. They try to describe
computer science e-learning courses created mainly for blended learning at the
Department of Informatics, Faculty of Natural Sciences, Constantine the
Philosopher University in Nitra, Slovak republic. They describe their own
experiences in managing the teaching process with -LMS, present interactive
dynamic visualizations and finally present the outcomes of survey about
electronic testing.
Keywords: Computer science course, teaching, e-learning, LMS Moodle,
on-line testing
Title
of the Paper:
A Self-Organized Neuro-Fuzzy System for Stock Market Dynamics Modeling and
Forecasting
DOWNLOAD FULL PDF
Authors:
Ching Long Su, Chuen Jyh Chen, Shih Ming Yang
Abstract: A self-organized, five-layer neuro-fuzzy model is developed to model
the dynamics of stock market by using technical indicators. The model
effectiveness in prediction and forecasting is validated by a set of data
containing four indicators: the stochastic oscillator (%K and %D), volume
adjusted moving average (VAMA) and ease of movement (EMV) from TAIEX (Taiwan
Stock Exchange Capitalization Weighted Stock Index). A modified moving average
method is proposed to predict the input set for the neuro-fuzzy model in
forecasting stock price. Simulation results show that the model is effective
in prediction and accurate in forecasting. The input error from the prediction
of the modified moving average method is attenuated significantly by the
neuro-fuzzy model to yield better forecasting results.
Keywords: Neuro-fuzzy system, Sugeno fuzzy system, Forecasting, VAMA,
EMV
Title
of the Paper:
The Appearance of Printing Activity in the Romanian Space: an Integral Part of
a European Phenomenon
DOWNLOAD FULL PDF
Authors:
Agnes Erich
Abstract: In the context of the European Cyrillic print, the printing activity
in Wallachia occupies an important place, reflecting the degree of cultural
development reached by Romanian principalities and, at the same time,
constituting itself as an integral part of a European phenomenon. It is known
that between the Romanian culture and the culture of the South-Slavic peoples
there was a strong connection. The first printed books from Targoviste
(1508-1512), executed by the monk Macarie, spread in the Slavic world, being
used as a model for the books printed in this space. The relations of the
Romanian written culture with the other cultures in South-eastern Europe
manifested on several plans: the printing activity was in a constant
evolution, printers, proofreaders, engravers or bookbinders coming to work in
the Romanian principalities, the same way as the Romanian craftsmen produced
manuscripts and books for the Balkan communities or even traveled to remote
places to set up printing workshops.
Keywords: Liturgy book, Targoviste, Macarie, Wallachia, Printing
history, Book History, Cetinje
Title
of the Paper:
Information-based Item Selection with Blocking Strategy based on a Bayesian
Network
DOWNLOAD FULL PDF
Authors:
Tien-Yu Hsieh, Bor-Chen Kuo
Abstract: With the rapid development of computer technology information theory
has been implemented for searching optimal adaptive item sequence in
computerised adaptive test systems based on Bayesian network. Information
theory such as entropy between dichotomous concepts and test items generalise
common intuitions about item comparison for heuristic methodology. However,
the executive time and the storage space are still open problems in
constructing and storing decision item trees. The blocking strategy is
proposed for overcoming those problems. Experimental results show that the
blocking strategy could overcome both the executive time and storage space
problems.
Keywords: Bayesian network, Information, Entropy, Computerised adaptive
testing, Blocking strategy
Title
of the Paper:
Integrating Patient Information and Research Data for Maxillofacial and
Craniofacial Domain into a Single Database
DOWNLOAD FULL PDF
Authors:
Fariza Hanum Nasaruddin, Maizatul Akmar Ismail, Somasundaram Nagappan
Abstract: Research in the area of maxillofacial and craniofacial surgery
almost always comes from images of patients. This paper discusses the
possibility of integrating the database for daily medical operational needs
together with data for research purposes in the area of maxillofacial and
craniofacial surgery. Currently, medical institutions concentrate on systems
which have the main function of managing daily operational data. Even at
medical institutions where researches are being conducted, data to be used for
research are separated from the data from the hospital system. Maxillofacial
and craniofacial surgeries are mostly preceded with the development of models,
and this nowadays would mean three dimensional digital models This opens an
opportunity for medical team to collaborate with other department for example
a team from a computer science department. The main task of the CS team is to
develop digital models and part of the ongoing research would be on modeling
techniques to improve the design of the models. The data from the surgical
team can be used the CS team and stored data and models can be reviewed by
surgical team to analyze past procedures, diagnoses and prognoses. The design
of the database and the system architecture of the proposed system are
discussed in this paper.
Keywords: Research database, image data, maxillofacial data,
craniofacial modeling
Title
of the Paper:
Website Model for Top 10 Travel Guides
DOWNLOAD FULL PDF
Authors:
Mirela-Catrinel Voicu, Marilen Pirtea, Sandra Bazavan
Abstract: Top 10 is a famous series of travel guides in the world. Starting
from the data presented in these travel guides, we propose a website model.
Our model supposes a single implementation, which can be used for all city
destinations. The website can be used easily and includes plenty and various
information. The displayed data in the website pages are stored in a database.
These data can be quickly modified or deleted. We present our implementation
in Java.
Keywords: Travel guides, websites, Java
Title
of the Paper:
Teaching Information Technology for Elder Participation: A Qualitative
Analysis of Taiwan Retirees
DOWNLOAD FULL PDF
Authors:
Hsieh-Hua Yang, Chien Yu, Chih-Hsun Huang, Lung-Hsing Kuo, Hung-Jen Yang
Abstract: The present inquiry considers the nature and meaning of elder
participation in information technology and the degree to which
computer-mediated communication increases in the social capital of elder
adults. This study compares 27 elder computer participants and 27
nonparticipants by means of open-ended interviews. Three primary themes
emerged from the interviews. The first concerns the different conceptions of
old age held by the computer-participants and the nonparticipants, and in
particular, differing views on learning capacity in later life. The second
concerns their intentions of applying information technology. The third
concerns the learning problems of operating computers. The findings from the
current study also show that older persons are able to study and to use
computers if a good training program exists that encourages them to do so. On
the other hand, it cannot be dismissed that those who chose to participate and
to study computer use may have done so because they had a stronger prior
desire and/or ability to engage in this particular undertaking. It might be
that the elderly information technology participants had a positive approach
to the computer, a priori, and perhaps a better capability for learning new
things as well.
Keywords: Elder participation, information technology, qualitative
analysis, Taiwan retirees
Title
of the Paper:
Monitoring the Stability of the Processes in Defined Level Software Companies
Using Control Charts with Three Sigma Limits
DOWNLOAD FULL PDF
Authors:
G. Vijaya, S. Arumugam
Abstract: Monitoring the stability of the software process in the lower level
companies is a challenging issue to software engineers. In this paper, SPC is
applied to software metrics. Defect Density, Review Performance and Rework
percentage and results after applying the SPC to various processes of software
are discussed and analyzed, using control charts, the most sophisticated tools
of SPC. The difficulties in the application of Statistical Process Control to
lower level software organization are observed and relevant suggestions are
provided.
Keywords: Control Chart, Statistical Process control (SPC), Defect
density, Inspection Performance, Rework percentage, CMM
Issue 10, Volume 7,
October 2010
Title
of the Paper:
A Study of Online Asynchronous Learning Monitored by Face Recognition
DOWNLOAD FULL PDF
Authors:
Lung-Hsing Kuo, Hsieh-Hua Yang, Hung-Jen Yang, Wen-Chen Hu, S. M. Sue
Abstract: The purpose of this study was focused on the learning behavior and
performance of asynchronous distance learning with face recognition system
among in-service teachers. There were 48 participants invited. In this study,
teacher's gender, age, job status, educational level, school level, and school
district were analyzed to explore the differences in learning behaviors and
performance. The results showed that the higher average face identification
rate, the more learning satisfaction, subjects had more login times, login
times in the morning, time total quantity of login, study time total quantity,
participation modular unit numbers, the higher summary examination average
scores. We also found subjects had more summary examination average times, the
less summary examination average scores, subjects had more time total quantity
of login, average face identification rate, the more learning satisfaction,
and subjects’ summary examination average times can predict summary
examination average scores.
Keywords: Learning behavior, Asynchronous distance learning, Face
recognition system, In-service teacher
Title
of the Paper:
Monitoring the Stability of the Processes in Defined Level Software Companies
Using Control Charts with Three Sigma Limits
DOWNLOAD FULL PDF
Authors:
G. Vijaya, S. Arumugam
Abstract: Monitoring the stability of the software process in the lower level
companies is a challenging issue to software engineers. In this paper, SPC is
applied to software metrics. Defect Density, Review Performance and Rework
percentage and results after applying the SPC to various processes of software
are discussed and analyzed, using control charts, the most sophisticated tools
of SPC. The difficulties in the application of Statistical Process Control to
lower level software organization are observed and relevant suggestions are
provided.
Keywords: Control Chart, Statistical Process control (SPC), Defect
density, Inspection Performance, Rework percentage, CMM
Title
of the Paper:
Research Contributions to the Seismic Performance of ICF Technology Wall
Systems
DOWNLOAD FULL PDF
Authors:
Andreea-Terezia Mircea, Ruxandra Crutescu
Abstract: Being a very easy to install system, increasing job site efficiency
and worker productivity which saves time and money, Insulated Concrete Form
(ICF) tilt-up wall systems ensure a more sustainable construction with
superior energy efficiency, low material costs, and versatility for the built
environment. A research was carried out in order to asses an ICF tilt-up wall
system with regard to the requirements of the actual earthquake resistant
design of reinforced concrete wall systems and reinforced concrete wall
equivalent dual systems. After a preliminary analysis of the constructive
provisions, a comprehensive structural analysis program was performed in order
to identify the best practices in implementing the system on the market. As
variables were considered the design ground acceleration (0.08g, 0.20g and
0.32g), the normalized axial force (0.05, 0.20 and 0.40), the quality of
concrete (classes C 16/20 and C 20/25), the effective thickness of the walls
(i.e., 150 mm and 200 mm), the longitudinal reinforcing ratio at the ends of
the wall (0.005, 0.020 and 0.040) and the type of primary shear wall (i.e.,
high ductility and medium ductility respectively). The full compliance with
the European structural design frame can be reached by two detailing
strategies, related to the severity of the actions specific to each site and
solution. The results are presented in a synthetic manner, which enables an
easy comprehension of the conclusions drawn from the processing of the
numerical data.
Keywords: Reinforced concrete, primary shear wall, ductility,
non-linear behavior, seismic design
Title
of the Paper:
Development the Strategics and Customer Relationship Management Model for
Medical Center Outpatient Services
DOWNLOAD FULL PDF
Authors:
Ching-Kuo Wei, Ming-Chin Yang, Kuo-Piao Chung
Abstract: After the implementation of national health insurance in Taiwan, the
hospitals are facing severe operational competition, particularly in Taipei.
Thus, to develop customer management model, hospitals have introduced Customer
Relationship Management (CRM) to gain new customers, maintain the relationship
with existing customers, and enhance customer satisfaction and loyalty. After
analyzing the patients’ needs, the hospitals can satisfy the patients who will
thus revisit the hospitals. The patients’ customer loyalty will be enhanced.
It is also the effective approach to monitor customer relationship. This study
targets on 600 outpatient service customers in a medical center in Taipei, and
probes into the relationship between outpatient service customers’
characteristics and satisfaction, as well as importance by correlation
analysis. This study then divides outpatient service customers into four
clusters by cluster analysis, and proposes different managerial strategies
with regard to four clusters’ characteristics as the criteria for CRM in the
hospital.
Keywords: Customer Relationship Management, Hospital Customer
Relationship Management, Medical Center Outpatient Services, Strategic
Analysis, Cluster Analysis
Title
of the Paper:
Implementation and Evaluation Methodology for the Asynchronous Search
Techniques in DisCSP-NetLogo
DOWNLOAD FULL PDF
Authors:
Ionel Muscalagiu, Manuela Panoiu, Diana Maria Muscalagiu, Caius Panoiu
Abstract: The implementation and evaluation of asynchronous search techniques
can be done in any programming language allowing a distributed programming.
Nevertheless, for the study of such techniques and for their evaluation, it is
easier and more efficient to implement the techniques under certain
distributed environments, which offer various facilities, such as NetLogo and
are open-source. This article proposes a solution of evaluation for the
asynchronous search techniques in NetLogo. This model will allow the use of
the NetLogo environment as a basic simulator for the evaluation of
asynchronous search techniques. Starting from the proposed evaluation model,
we obtain one multi-agent system which can be used for implementing and
evaluating the asynchronous search techniques, that can run on a single
computer. In this paper there is presented a methodology of implementation and
evaluation for the asynchronous search techniques in NetLogo, using the
proposed evaluation model.
Keywords: Constraints programming, distributed problems, asynchronous
searching techniques, multi-agent systems
Title
of the Paper:
Educational Software for Study the Performances of Some Known Parallel and
Sequential Algorithms
DOWNLOAD FULL PDF
Authors:
Manuela Panoiu, Ionel Muscalagiu, Caius Panoiu, Maria Raich
Abstract: The paper presents an educational software package, implemented in
Java which shows and analyzes through visual simulation some well known
sequential and parallel algorithms. It was study the memory access for PRAM
model and some known algorithms for PRAM model. It was analyze also the most
know sorting algorithms and the main graph algorithms in both variants
sequential and parallel. It was also performed a comparative study between a
classic sequential algorithm and a parallel algorithm in terms of execution
times. The software is very useful to both students and teachers because the
computer science especially computer programming is difficult to understand
for most students.
Keywords: Java, educational software, parallel algorithms, Parallel
sorting algorithms, performance analysis, simulation software
Title
of the Paper:
Comparison of Design and Performance of Snow Cover Computing on GPUs and
Multi-Core Processors
DOWNLOAD FULL PDF
Authors:
Ladislav Huraj, Vladimir Siladi, Jozef Silaci
Abstract: The aim of this work is the depth of the snow cover computing in the
desired point based on the geographical characteristics of a specific
geographical point in a modeled area. The measured data are known on few
places. These places are coincident with raingauge stations. These data have
been collected by many continuous observations and measurements at the
specific climatologic raingauging stations of Slovak Hydrometeorogical
Institute. An interpolation method is necessary to obtain a representation of
real situation about whole surface. The main characteristic of the
interpolation computing is the fact that it is timeconsuming. In paper, we
present two cheap approaches of HPC. The first solution is a utilization of
graphics processing units (GPUs) where the availability of enormous
computational performance of easily programmable GPUs can rapidly decrease
time of computing. The second one is a utilization of multi-thread CPUs. In
our article we demonstrate how to deploy the CUDA architecture, which utilizes
the powerful parallel computation capacity of GPU, to accelerate computational
process of snow cover depth using the inversedistance weighting (IDW) method.
The performance of GPU we face with OpenMP implementation of IDW method. We
consider variable number of threads per CPU. The outputs are visualized by the
GIS Grass tool.
Keywords: GPGPU, CUDA, Multi-core processor, OpenMP, Snow cover depth,
Interpolation
Title
of the Paper:
Hospital Information System using HL7 and DICOM Standards
DOWNLOAD FULL PDF
Authors:
Alin Cordos, Bogdan Orza, Aurel Vlaicu, Serban Meza, Carmen Avram, Bogdan
Petrovan
Abstract: In the medical world of nowadays, the information systems and the
standardization of the transmission protocols have been gaining more and more
importance. Therefore, the integration of different kinds of medical software
applications has become mandatory. In order to achieve this, the HL7 – Health
Level Seven standard has been developed, which offers a set of rules and
algorithms related to the medical field. This paper illustrates the use of HL7
and Web Services to form an integrated medical pilot system, specially adapted
to the Romanian sanitary system.
Keywords: HIS-Hospital Information System, HL7 – Health Level Seven,
eHeatlh, DICOM, Web Services, XML
Title
of the Paper:
The Digital Social Impact in ICT Literacy Programme for Rural Community
DOWNLOAD FULL PDF
Authors:
Jalaluddin Abdul Malek, Norizan Abdul Razak
Abstract: This paper will be discussing ICT literacy at rural community in
bridging digital divide for rural digital divide community by Perak State
Government in Malaysia. This study is looking at the impact of ICT literacy
program for rural community after infomediaries conducted a training for the
community. The understanding of the research is looking at the social digital
impact such as social digital impact formation, social digital impact
imbrications and social digital impact articulation. Methodology of the
research is conducted by distributing questionnaire to 583 respondents in the
familiar village choose by Perak State Government. The finding of the research
shows that social digital impact formation .majority used for chatting and
online services. Social digital impact implications revealed that majority
used ICT to access internet and do homework. They also used ICT for playing
computer games. Meanwhile, social digital impact articulations revelaed
majority used ICT for general knowledge and academic purpose, also used ICT
for online banking and utility bill.
Keywords: Digital Social Impact in ICT literacy programme for Rural
community
Issue 11, Volume 7,
November 2010
Title
of the Paper:
Statechart Normalizations
DOWNLOAD FULL PDF
Authors:
Benjamin De Leeuw, Albert Hoogewijs
Abstract: Simplified statecharts are derived by excluding all redundant
constructs of the UML (Unified Modeling Language) metamodel on statecharts. In
previous papers we introduced this basic concept and pointed out some
interesting applications. We transformed and compacted state machines into
serializable objects that clearly highlight their basic constructs and showed
how a lot of sparse edges were created during this transformation. Sparse
edges contain little or no information (e.g. empty transitions). From this
compaction we derived a theory in which state machines are reduced to two
distinct partial orderings on states. For the sake of convenience to read this
paper, we briefly recapture part of this theory and show the exponentially
growing complexity of calculating all possible values of variables that appear
on state machine edges. In order to arrive at feasible algorithms leading to
practical applications of the implicity complex partial ordering relations we
need to reduce this complexity by formulating and proving reductions to state
machine normal forms. Apart from aligning formal and behavioral equivalence,
normal forms allow us to reduce the number of sparse edges and useless states
thereby limiting calculational complexity. In this paper, we extend our theory
with normal forms and inject them into the theory of simplified statecharts
presented in earlier work. Some statecharts are only seemingly different from
others if one analyzes the different paths in those statecharts. The UML is
designed to allow for this kind of (uncontrollable) flexibility but in
mathematical descriptions it has adverse effects. We introduce an equivalence
relation on simplified statecharts and derive a normalization procedure which
converts a simplified sc to a normalized simplified sc equivalent to the
original one. Our formalism allows us to unravel superficial differences
between simplified statecharts.
Keywords: Statecharts, Statechart Normalization, UML, Model Checking,
State Machine Theory
Title
of the Paper:
Indexing the Fully Evolvement of Spatiotemporal Objects
DOWNLOAD FULL PDF
Authors:
Hung-Yi Lin
Abstract: This paper proposes a novel economic and efficient framework of
indexing spatiotemporal objects based on compressed B+-trees. Our new index
technique can compress data records in leaves and in turn reduce index size to
improve update and query efficiencies. The contribution of our framework is
threefold. First, the proposed index structures are more succinct to resident
in the main memory. Second, sufficient data with high similarity inside all
indexing pages for the high retrieval quality of cache fetches are attainable.
Third, in addition to process multi-dimensional spatial information, our
framework is typically appropriate to model the valid- and transaction-time of
a fact. We present the index efficiency analyses and experimental results
which show that our technique outperforms others.
Keywords: Spatio-temporal databases, Compressed B+-trees, Trajectories,
Data aggregation, Storage utilization
Title
of the Paper:
Simulation of Meshes and Tori in an asymmetric Faulty Incrementally Extensible
Hypercube with Unbounded Expansion
DOWNLOAD FULL PDF
Authors:
Jen-Chih Lin
Abstract: The paper considers the problem of finding meshes and tori in a
Faulty Incrementally Extensible Hypercube if any. We develop novel algorithms
to facilitate the embedding job when the Incrementally Extensible Hypercube
(IEH) contains faulty nodes. We present strategies for reconfiguring a mesh or
tori in an IEH with unbounded expansion. These simulation approach shows a
mesh or torus can be embedded into a faulty IEH Gn(N) with load 1, congestion
1 and dilation 3 such that O(n2-?log2m ? 2) faults can be tolerated.
Furthermore, the technology can be apply in grid computing and cloud
computing.
Keywords: Incrementally Extensible Hypercube (IEH), hypercube, mesh,
torus, embedding, expansion
Title
of the Paper:
Exploring the Perception and Behavior of Software Engineers about Computer
Software Patent
DOWNLOAD FULL PDF
Authors:
Shann-Bin Chang, Shu-Min Chang
Abstract: Patent is one kind of the intellectual property, and the nature of
patent institution is to accelerate the speed of innovation and invention. It
is likely to the patent of computer software. But the opinion voiced by
exponents of open source and free software is extremely opposed to patenting
computer software. They are concerned the software patent acts as a barrier to
technology improvement. This study employs a modified technological acceptance
model (TAM) to explore the perception and behavior of software engineers, and
examines the relationship between perception and management behavior about
patent. The findings of this study are two-fold: 1. Most of the relations of
this research model are positively significant, including knowledge of patent,
dependency on patent, perceived usefulness of patent, perceived ease of use of
patent, intention to use patent, and actual behavior of patent management; 2.
The scales of firm and number of patents owned by firms have a significantly
different effect from the above constructs, but the individual attributes of
engineers are not significantly different from those constructs. Finally, this
study provides two suggestions for future study: one is concerned with the
willingness and capability of computer software inventors to codify invention;
another concern the competency of absorbing the patent knowledge from computer
software engineer. Based on these two aspects, researchers can achieve a
deeper understanding of the knowledge innovation and technology diffusion.
Keywords: Patent, computer software, software engineer, technological
acceptance model (TAM)
Title
of the Paper:
An Approach to Designing Distributed Knowledge-based Software Platform for
Injection Mould Industry
DOWNLOAD FULL PDF
Authors:
Milko Marinov, Nicola Magaletti, Tsvetelin Pavlov, Fabian Gaus, Domenico
Rotondi, Pavel Vitliemov, Slavina Ivanova
Abstract: Nowadays, the globalization of the manufacturing enterprises
requires collaboration across frontiers. In order to attain effective
collaboration, the information about the product life cycle must be captured
and administrated in a way that supports the decision taken during the product
development. In this context, the manufacturing process information needs to
be shared between manufacturers. The moulding process is quite complex
involving many variable process parameters like pressure, temperature and time
settings. These process parameters have to be optimally set in order to
improve part quality and maximize the production capacity of the injection
moulding machine. In this paper we propose an approach to designing
distributed knowledge-based software platform for injection mould industry.
The user requirements to the software tools and the key features of our design
are defined. The basic principles and the architecture of the software
platform and decision support tools are considered.
Keywords: Distributed systems; Service-oriented architecture;
Rule-based knowledge representation; Rule engine tools; User requirements
analysis; Injection moulding
Issue 12, Volume 7,
December 2010
Title
of the Paper:
Manpower or Relationships: An Empirical Study on Early Childhood Teachers’ Job
Seeking
DOWNLOAD FULL PDF
Authors:
Yi-Gean Chen, Jao-Nan Cheng
Abstract: Chinese society values relationships; thus, this study attempts to
discover if relationships are effective during job seeking. Due to a lower
birth rate, many kindergartens in Taiwan have encountered difficulties in
operation. This study investigates the following question: When recruiting
teachers, will kindergartens focus on selecting candidates with higher
education and professional certificates, in order to increase competitiveness,
or will kindergartens focus on selecting candidates who have a relationship
with the school? This study collected 1058 valid samples of teachers in 23
counties and cities in Taiwan, using stratified cluster random sampling.
Results of statistical analysis showed that teachers with higher education,
teaching experience, and professional certificates tend to acquire teaching
positions with higher salaries. Moreover, educational factors significantly
influence opportunities to acquire jobs in public early childhood education
institutions, indicating that human capital is a priority. However, teaching
positions secured using relationships tend to be in private institutions with
lower salaries. Nowadays, in Taiwan, people need to invest in human capital in
order to acquire ideal teaching positions in early childhood education, and
not rely on relationships. The findings can serve as a reference for other
countries influenced by Chinese culture.
Keywords: Early childhood teachers, occupation acquisition, human
capital, favor relationship
Title
of the Paper:
The Factors Affecting Adoption Intention in Navigational Information System –
A Study of Mariner’s Perception on Utilizing ECDIS
DOWNLOAD FULL PDF
Authors:
Hui-Ling Yu, Sheng-Fei Hsu
Abstract: Although the International Maritime Organization had approved
electronic chart display and information system as a paper chart equivalent,
parts of mariners still doubted of its feasibility on safe navigation. For
analyzing mariner?¦s more or less hesitations on using such navigational
information system, this study surveyed the samples of the students in the
navigational department for understanding how the perceived risk affected the
user?¦s adoption intention over and above perceivability of usefulness and
ease of use on electronic chart display and information system by comparing
the students with/without practical experience on board. Research found that
perceived risk presented different levels of negative influences on user?¦s
adoption intention directly and mediated through perceived usefulness and
perceived ease of use as well.
Keywords: International Maritime Organization (IMO), Electronic chart
display and information system (ECDIS), Perceived risk, Perceived usefulness,
Perceived ease of use, Adoption intention
Title
of the Paper:
Lifetime Based Routing Algorithm in Emergency Object Tracking
DOWNLOAD FULL PDF
Authors:
Yihjia Tsai, Wenfa Huang, Chengchin Lin
Abstract: Sensor networks have many applications, a typical setting is in
nature environment monitoring, such as forest fire, tsunami, and earthquake.
In order to be easily deployed in this environment, sensor device is design to
have small form factor, and as lightweight as possible, thus, its battery
capacity is limited. The issue of battery capacity is more important when
applied in tracking moving objects, and when real time response of the system
is critical where the routing algorithm do not need to perform data
aggregation. This paper proposed a routing algorithm for tracking objects and
perform emergency reporting when a situation occurred and at the same time
reducing total energy consumption and thus prolonging the system lifetime. Our
algorithm is called sensor on demand betweenness vector(SOBV). This algorithm
is a multipath routing algorithm based on the characteristics of network
topology.
Keywords: Betweenness, Network model, Routing algorithm, Object
tracking
Title
of the Paper:
Effects of Interactively Virtual Reality on Achievements and Attitudes of
Pupils- A Case Study on a Natural Science Course
DOWNLOAD FULL PDF
Authors:
Chun-Ming Hung, Gwo-Jen Hwang, Iwen Huang, Jiun-Ming Li
Abstract:This study aimed at investigating the effects of interactively
virtual reality on learning achievements and attitudes of elementary school
pupils to natural science. A quasi-experiment with unequal class pre-post
evaluations was carried out. Within the 136 participants from four Grade 5
classes in an elementary school, 68 pupils from two classes were randomly
assigned as the experimental group, while another 68 pupils from other two
classes were the control group. Within the 80 minutes experimental teaching,
the experimental group was instructed with interactively virtual reality, and
the control group was taught with multimedia presentations. Regarding the
process of experimental teaching, both groups received pretest, experiment,
and post-test; and, the data were tested with covariance analyses. The
findings showed that the learning achievement of the students in the
experimental group was significantly better than that in the control group,
indicating that interactively virtual reality could effectively enhance the
learning achievement of pupils. Regarding the learning achievement of
different genders, both males and females did not present remarkable
difference in learning with the virtual reality approach. Moreover, the
average of questionnaire analyses on the attitudes to the application of
actively virtual reality into the instruction was 4.46, showing that pupils
affirmed the instruction with actively virtual reality.
Keywords: Virtual reality, natural science, mosquito, dengue fever,
information technology
|
|
|