WSEAS CONFERENCES. WSEAS, Unifying the Science

Main Page of the Journal                                                           Main Page of the WSEAS

WSEAS TRANSACTIONS on
INFORMATION SCIENCE & APPLICATIONS

 Volume 5,  2008
Print
ISSN: 1790-0832
E-ISSN: 2224-3402

 
 

 

 

 

 

 

 


Issue 1, Volume 5, January 2008


Title of the Paper:  Application of Image Processing to Measure Road Distresses

DOWNLOAD FULL PDF

Authors: Maher I. Rajab, Mohammad H. Alawi, Mohammed A. Saif

Abstract: Pavements usually experience different types of distresses due to repeated traffic loads, aggressive environmental conditions, construction materials, soil condition of the underline subgrade, and the method of construction. Longitudinal and transverse cracking, potholes, rutting, and bleeding are common examples of such distresses associated with flexible pavements. As time progresses, the severity of these distresses increases and consequently, ride quality is adversely affected. Early detection and measurement of the extent of distresses coupled with prompt reactive measures are necessary to keep the pavement function at an acceptable level. Traditional methods for distress detection and measurement are laborious, time consuming, and subject the involved personnel to accidents. In contrast, image measurement methods are effortless, safe, and can be performed in a short time. This research paper performs image processing measurements to estimate areas of a pothole and alligator cracking, and sets a program for plane measurements of an area that experience rutting. The image measurements are compared with the traditional measurements. The results show that image measurements are close to those obtained by using the traditional methods.

Keywords: Pavement surface cracking, road distresses, alligator cracking, rutting, image measurements.


Title of the Paper: A Design and Implementation of a Web Server Log File Analyzer

DOWNLOAD FULL PDF

Authors: Yu-Hsin Cheng, Chien-Hung Huang

Abstract: More and more enterprises use network to communicate with the suppliers or the customers, and also in receiving order forms, data transmission, produces goods, stock warehousing in all enterprise management procedure, carry on to the e-movement and enterprise competitive ability, this act not only may save the production cost, moreover may fast reflect the correlation information. But the enterprise owners or the website administrators often cannot judge precisely whether their commercial websites play the leading role in marketing function. In the settlement of this problem, an intelligent website analysis software can often provide good and effective assistance to business owners or website administrators, and then improve the marketing results of the websites. The website analysis software usually uses the log files in the system to produce statistical-related data, and then obtains the useful information through the analysis. In this paper, we discuss the implementation of an enterprise website analysis software we have developed, and by the modification and the expansion the Analog from free software to analyze the log files in the Apache web server, provides more important information about visitors. We provide a user friendly interface in the system for the enterprise administrators to accumulate the important information of log files, in establishing the system, we add on functions which detect illegal information, make the protective action, and provide the dynamic E-Mail report function to the user.

Keywords: log file, web server, website analysis, Configuration Interface Subsystem, Illegal Information Detection Subsystem, Report Delivery Subsystem


Title of the Paper: Batu Aceh Typology Identification Using Back Propagation Algorithm

DOWNLOAD FULL PDF

Authors: Azlinah Mohamed, Faizatul Huda Bt Mat, Sofianita Mutalib, Shuzlina Abdul Rahman, Noor Habibah Arshad

Abstract: Historical and cultural artifacts have defined the existence of humankind all over the world. It is therefore important to preserve this heritage for future endeavors. In the Malay-Indonesia Archipelago, the forgotten and extinct artifact is the Islamic gravestone that originated in Aceh known as Batu Aceh. This research is an attempt to preserve our heritage by developing a prototype to guide the future generation to appreciate these precious cultural heritage artifacts. Back propagation algorithm is applied on a supervised classification of Batu Aceh object images. Several images of each type of Batu Aceh are used as training samples. Data samples were converted into binary forms and used to train the network. To ensure the performance of the system, network parameters such as momentum value, learning rate and number of hidden neuron would be adjusted to get the appropriate setting. It is found that the prototype devised can identify the type of Batu Aceh presented and its century. This research would provide experts in this field an alternative to identify damaged or unclear images of Batu Aceh.

Keywords: Artificial Neural Network, Back Propagation, Batu Aceh, Image Processing, Image Classification and Pattern Recognition.


Title of the Paper: A Neuro-Fuzzy Model for Function Point Calibration

DOWNLOAD FULL PDF

Authors: Wei Xia, Luiz Fernando Capretz, Danny Ho

Abstract: The need to update the calibration of Function Point (FP) complexity weights is discussed, whose aims are to fit specific software application, to reflect software industry trend, and to improve cost estimation. Neuro-Fuzzy is a technique that incorporates the learning ability from neural network and the ability to capture human knowledge from fuzzy logic. The empirical validation using ISBSG data repository Release 8 shows a 22% improvement in software effort estimation after calibration using Neuro-Fuzzy technique.

Keywords: neuro-fuzzy, neural networks, fuzzy logic, software cost estimation.


Title of the Paper: Applications of Fuzzy Theory on Health Care: An Example of Depression Disorder Classification Based on FCM

DOWNLOAD FULL PDF

Authors: Sen-Chi Yu, Yuan-Horng Lin

Abstract: The purpose of this study is to apply fuzzy theory on health care. To achieve this goal, Beck Depression Inventory (BDI)-II was adopted as the instrument and outpatients of a psychiatric clinic were recruited as samples and undergraduates as non-clinical sample as well. To elicit the membership degree, we asked the subjects are free to choose more than one alternative for each item listed in BDI and, in turn, assign percentages on the chosen alternatives. Moreover, the sum of percentages of the chosen categories is restricted to 100%.We performed the possibility- based (fuzzy c-means, FCM) and probability-based classification (Wald’s method and k-means) to classification of severity of depression. The scoring of BDI of subjects were analyzed by clustering analysis while the diagnose of depression-severity by a psychiatrist was used as the criterion to evaluate classification accuracy. The percentage of correct classification among FCM, Wald’s method and k-means were compared. The analytical results show the Kendall's
τ coefficient of FCM, Wald’s method and k-means were .549, .316, and .395, respectively. That is, FCM exhibited a higher association between the original and classified membership than did Wald’s and k-means methods. We concluded that FCM identified the data structure more accurately than the two crisp clustering methods. It is also suggested that considerable cost concerning prevention and cure of depression might be reduced via FCM.

Keywords: fuzzy c-means, depression, fuzzy logic, psychological assessment.


Issue 2, Volume 5, February 2008


Title of the Paper:  A Detecting Peak’s Number Technique for Multimodal Function Optimization

DOWNLOAD FULL PDF

Authors: Qiang Hua, Bin Wu, Hao Tian

Abstract: A Detecting Peak's Number (DPN) technique is proposed for multimodal optimization. In DPN technique, we want to know the peak’s number of locally multimodal domain of every individual, firstly we use the idea of orthogonal intersection for getting the exploration direction in every locally multimodal domain, and then we attempt to detect peak’s number in every one-dimension direction as the result of detecting of locally multimodal domain. At last we design an evolution algorithm (DPNA) based on the characters of DNP technique, which contain four characters: niching, variable population, variable radius and life time, and then give a series of experiment results which show the effectiveness of algorithm, as the DPNA is not only adapting to obtaining multiple optima or suboptima, but also effective for problem of ill-scaled and locally multimodal domain described in [11].

Keywords: Evolution Algorithm; Multimodal Function Optimization; Niching; Detecting Peak's Number


Title of the Paper: Context-Dependent Extensible Syntax-Oriented Verifier
with Recursive Verification

DOWNLOAD FULL PDF

Authors: Nhor Sok Lang, Takao Shimomura, Quan Liang Chen, Kenji Ikeda

Abstract: In order to develop Web applications of high quality, it is important to apply efficient frameworks to standardize the process of development in projects, or apply useful design patterns to produce the program code that can easily be enhanced. However, it is not enough. In addition to these efforts, we have to check the programs to see whether they keep various kinds of rules such as verification items for security which are common for all kinds of Web applications, and verification items for coding styles or code conventions which are pertain to each project. This paper proposes a verification method for the syntax-oriented verifier, and describes the implementation of its prototype system, SyntaxVerifier. SyntaxVerifier makes it possible to detect syntactical objects based on their syntactic contexts. It realizes a recursive verification which makes it easy to dynamically trace a syntax tree in a verification process itself.

Keywords: Customaizable, Extensible, Recursive, Syntax analysis, Verification


Title of the Paper: Context-Dependent Extensible Syntax-Oriented Verifier
with Recursive Verification

DOWNLOAD FULL PDF

Authors: Nhor Sok Lang, Takao Shimomura, Quan Liang Chen, Kenji Ikeda

Abstract: In order to develop Web applications of high quality, it is important to apply efficient frameworks to standardize the process of development in projects, or apply useful design patterns to produce the program code that can easily be enhanced. However, it is not enough. In addition to these efforts, we have to check the programs to see whether they keep various kinds of rules such as verification items for security which are common for all kinds of Web applications, and verification items for coding styles or code conventions which are pertain to each project. This paper proposes a verification method for the syntax-oriented verifier, and describes the implementation of its prototype system, SyntaxVerifier. SyntaxVerifier makes it possible to detect syntactical objects based on their syntactic contexts. It realizes a recursive verification which makes it easy to dynamically trace a syntax tree in a verification process itself.

Keywords: Customaizable, Extensible, Recursive, Syntax analysis, Verification


Title of the Paper: Stroke Order Computer-based Assessment with Fuzzy Measure Scoring

DOWNLOAD FULL PDF

Authors: Guey-Shya Chen, Yu-Du Jheng, Hsu-Chan Yao, Hsiang-Chuan Liu

Abstract: The purpose of this research is to develop a computer-based assessment for stroke order and a novel algorithm based on Choquet integral with fuzzy measure for scoring stroke order of Chinese Character writing. The learning of stroke order is very important for a fixed stroke writing character system therefore this research based on the theory of “five indexing system of Chinese characters” and combine the features of strokes develops a stroke order assessment system to real-time evaluate learners’ stroke order and score their character writings. Except using traditional additive scoring method, a non-additive scoring algorithm based on Choquet integral with
λ-measure and L-measure was proposed. A real data set with 121 samples was examined and experiment results show that the performances of this novel scoring model based on Choquet integral with both λL-measure and -measure outperform the performance of traditional scoring approach.

Keywords: stroke order, computer-based assessment, five indexing systems of Chinese characters, λL-measure, -measure, Choquet integral


Title of the Paper: Analysis of Neural Network Edge Pattern Detectors in Terms of Domain Functions

DOWNLOAD FULL PDF

Authors: Maher I. Rajab, Khalid A. Al-Hindi

Abstract: This paper investigates the analysis of feed-forward BP neural network that has been trained to detect noisy edge patterns, so as to achieve close insight into their internal functionality. The analysis of neural network edge detector’s hidden units, as templates, were analysed into three gradient components: low pass or averaging, gradient, and second-order gradients. The weights between NNets hidden units and their output units represent the importance of the hidden unit’s edge detection outcome. To this purpose, the elements of the NNets, that have been trained to detect prototype noisy edge patterns with various angle of operation, were analysed in terms of domain functions. The results show that the NNets analysis using the domain functions method could confirms the results of NNets recognition accuracies. Although the work presented only gives some analysis results for the units in the NNets hidden units, it should be clear that a characterization of the neural network as a whole could also be derived from these results.

Keywords: Neural networks analysis, domain functions, BP, recognition accuracy, domain-specific base functions, Taylor series coefficients.


Title of the Paper: Using System Dynamics for Managing Risks in Information Systems

DOWNLOAD FULL PDF

Authors: Denis Trcek

Abstract: Each and every security oriented activity in information systems has to start with the basics, which is risk management. Although risk management is a well established and known discipline in many other areas, its direct translation to information systems is not an easy and straightforward because of specifics of contemporary information systems. Among these specifics there are the global connectivity of information systems, the large number of elements (e.g. thousands of software components), strong involvement of human factor, almost endless possible ways of interactions, etc. Thus a new methodological approach is presented in this paper that is based on business dynamics. It enables effective addressing of the above-mentioned elements, and through this it supports and improves decision making in information systems security.

Keywords: information systems, security, risk management methodologies, system dynamics, simulations, reference models.


Title of the Paper: Contrast Enhancement and Clustering Segmentation of Gray Level Images with Quantitative Information Evaluation

DOWNLOAD FULL PDF

Authors: Zhengmao Ye, Habib Mohamadian, Su-Seng Pang, Sitharama Iyengar

Abstract: Improper illumination and medium dispersing could occur in quite some gray level image collecting processes. Contrast enhancement and clustering segmentation are two effective approaches for the related pattern recognition problems. Image enhancement and image segmentation can be applied to different areas of science and engineering, such as biometric identification, national defense and resource exploration. Thus, adaptive image enhancement can be implemented to improve the image quality and to reduce random noise simultaneously, which is used to adapt to the intensity distribution within an image. Nonlinear K-means clustering can be applied for image segmentation, which is to classify an image into parts which have strong correlations with objects in order to reflect the actual information being collected. For example, it can be used against the effects from unevenly distributed pressure or temperature condition under atmosphere medium and water medium. To evaluate the actual roles of image enhancement and image segmentation, some quantity measures should be taken into account. In this study, a set of quantitative measures is proposed to evaluate the information flow of gray level image processing. Concepts of the gray level energy, discrete entropy, relative entropy and mutual information are proposed to measure outcomes of the adaptive image enhancement and K-means image clustering.

Keywords: Contrast Enhancement, K-Means Segmentation, Gray Level Image, Energy, Entropy, Relative Entropy, Mutual Information


Title of the Paper: A Case Study of Usability Testing – The SUMI Evaluation Approach of the EducaNext Portal

DOWNLOAD FULL PDF

Authors: Tanja Arh, Borka Jerman Blazic

Abstract: The new challenge for designers and Human–computer interaction (HCI) researchers is to develop software tools and applications for effective e-learning. Software usability is one aspect of Human–computer interaction that can benefit from knowledge of the user and their tasks. However, in practice not much attention is given to this issue during testing. Evaluators often do not have the knowledge, instruments and/or time available to handle usability. One set of methods for determining whether an application enables users to achieve their predetermined goals effectively and efficiently is usability evaluation with end users. The paper presents the results of empirical study of usability evaluation which was based on SUMI (Software Usability Measurement Inventory) questionnaires. The software application tested was a multilingual educational portal EducaNext.

Keywords: human computer interaction (HCI), EducaNext educational portal, distance learning, software usability measurement inventory (SUMI), usability, end users


Title of the Paper: Dynamic Backward Scheduling Method for Max-Plus Linear Systems with a Repetitive, MIMO, FIFO Structure

DOWNLOAD FULL PDF

Authors: Hiroyuki Goto, Shiro Masuda

Abstract: This paper proposes a dynamic scheduling method that considers no-concurrency of resource with a subsequent event. We focus on repetitive discrete event systems with a MIMO (Multiple Inputs and Multiple Outputs)-FIFO structure. The behavior of this kind of system can be described with linear equations in the max-plus algebra, also referred to as MPL (Max-Plus Linear). Conventional MPL representation formulates no-concurrency of resource with a previous event and can provide the earliest starting times in internal facilities. We recently proposed a calculation method for a single job; however, resource no-concurrency with a subsequent job is not considered. Thus, it may not give an optimal solution if a large number of jobs have to be considered simultaneously. Therefore, we derive a general form of the MPL representation that provides the latest start times considering no-concurrency with a subsequent event. We also consider an effective rescheduling method that is applicable in cases in which the system parameters are changed after the job has commenced.

Keywords: Repetitive system, state-space representation, max-plus linear system, earliest/latest time, forward/backward type, rescheduling


Title of the Paper: Intelligent Support to Specific Design Aspects

DOWNLOAD FULL PDF

Authors: Urska Sancin, Jasmin Kaljun, Bojan Dolsak

Abstract: Due to increased rivalry on the market, some specific design aspects like the use of modern plastics materials, ergonomics and aesthetics are becoming more important and are not kept in the background any more in correlation with functionality and economic aspect of the product. Design engineer faces many dilemmas while designing new products as a single person is not able to possess a wide spectrum of knowledge needed for optimal design solutions. At this point designer have to rely on his or her experience and on the knowledge of the expert team involved in the project. The fundamental purpose of the research presented in this paper is to make the product development process less experience dependent. The main goal of thematically oriented research is to develop intelligent advisory system with integrated modules for some specific design aspects.

Keywords: product development, ergonomics, aesthetics, plastics, knowledge based engineering, intelligent systems


Title of the Paper: Mining Long High Utility Itemsets in Transaction Databases

DOWNLOAD FULL PDF

Authors: Guangzhu Yu, Shihuang Shao, Xianhui Zeng

Abstract: Existing algorithms for utility mining are column enumeration based, adopt an Apriori-like candidate set generation-and-test approach, and thus are inadequate on datasets with high dimensions or long patterns. To solve the problem, this paper proposes a hybrid model and a row enumeration based algorithm, i.e., inter-transaction, to discover high utility itemsets from two directions: existing algorithms such as UMining [1] can be used to seek short high utility itemsets from the bottom, while inter-transaction seeks long high utility itemsets from the top. By intersecting relevant transactions, the new algorithm can identify long high utility itemsets directly, without extending short itemsets step by step. In addition, new pruning strategies are used to cut down search space; optimization technique is adopted to improve the performance of the intersection of transactions. Experiments on synthetic data show that our method achieves high performance, especially in large high dimensional datasets.

Keywords: long high utility itemset; hybrid mode; utility; intersection transaction; row enumeration


Issue 3, Volume 5, March 2008


Title of the Paper: An Interactive Web-Based Wedding Planner with Comparative Analysis Decision Support System

DOWNLOAD FULL PDF

Authors: L. Y. Por, R. F. Boey, T. F. Ang, C. S. Liew

Abstract: Preparing for weddings is always tedious, especially when it does not involve hired help. Long checklists await soon-to-be brides and grooms before their auspicious wedding ceremony. Without experienced assistance, these brides and grooms face frustrating situations in hunting for suitable bridal products and services. This work presents an ideal one stop solution, called the Wedding Arch, for the brides and grooms to retrieve information on available bridal products and services in the shortest possible time. This web based wedding planner provides a platform for brides and grooms to acquire information on bridal products and services, as well as information of vendors registered with Wedding Arch and make wedding planning reservations online with the simple click of a mouse. Thus, the long and tedious task of information gathering has been shortened and made more convenient. Most importantly, Wedding Arch also functions as a web based comparative analysis decision support system that allows the brides and grooms to subscribe to a service that will assist them in the process of wedding planning and preparations. The system assists brides and grooms in making decisions based on their preferences and budget while taking in updated and current market pricings for their desired bridal products and services.

Keywords: Wedding Arch, Wedding planner, Decision support system (DSS), Budget planning and Web-based.


Title of the Paper: FAQ-master: An Ontological Multi-Agent System for Web FAQ Services

DOWNLOAD FULL PDF

Authors: Sheng-Yuan Yang, Chun-Liang Hsu, Dong-Liang Lee, Lawrence Y. Deng

Abstract: This paper expresses the results of our research in developing a multi-agent system: FAQ-master as an intelligent Web information integration system based upon intelligent retrieval, filtering, integration, and ranking capabilities in order to provide highquality FAQ answers from the Web to meet the user information request. We are describing FAQ-master, discussing how it improves FAQ query quality from the following three aspects of Web search activities at the same time: user intention, document content processing, and website search. The system is implemented as four agents working together through an ontology-supported content base. Techniques involved in the design include domain ontology, ontology-supported user query processing, ontology-supported solution caching, ontology-directed FAQ wrapping, storage, retrieval and ranking, and ontology-supported website classification and expansion.

Keywords: Ontology, User Modeling, Proxy Mechanism, Website Modeling, Multi-Agent Systems.


Title of the Paper: Online and Post-processing of AVL Data in Public Bus Transportation System

DOWNLOAD FULL PDF

Authors: Dejan Rancic, Bratislav Predic, Vladan Mihajlovic

Abstract: For a number of years vehicle fleet tracking systems are in use in companies operating large number of vehicles in the field. Proliferation of cheap and compact GPS receivers had the effect that Automatic Vehicle Location (AVL) systems today almost exclusively use satellite based locating systems. This paper presents characteristics of realized system tracking and analyzing city bus transit traffic in the city of Niš. Since the described system also uses GPS for vehicle location, initially, data about vehicles’ locations acquired from AVL subsystem need to be transformed into form that is adequate for further usage in the system, analysis and prediction. Also, city bus transit tracking systems are specific concerning functionalities differing them from other vehicle fleet tracking systems. These specifics include cyclic vehicle routes, the need for specific performance reports etc. This paper specifically deals with vehicle motion prediction with on station arrival time estimation coupled with automatic report generation.

Keywords: Automatic Vehicle Location (AVL), Prediction of arrival times, Continuous query processing, Information services, Intelligent transportation systems (ITS), line matching


Title of the Paper: Questionnaire-based Evaluation of Characteristics of a Community in SNS

DOWNLOAD FULL PDF

Authors: Susumu Takeuchi, Masanori Akiyoshi, Norihisa Komoda

Abstract: Currently, SNSes (Social Networking Services) are widely available on the Internet. In a SNS, users can communicate with the users who have a similar interest in a community. To activate communications drastically in SNS, users are encouraged to join other dissimilar communities. In this paper, utilizing activities of communities and relationships with communities is proposed to realize a dissimilar community recommendation. However, such communities tend to be useless for the users, so that investigating characteristics of communities that are selected by the methods is necessary to recommend. By utilizing real data in the largest SNS in Japan, the correlations between the users’ subjective judgments and the characteristics of communities are evaluated. As a result, it is clarified that effective recommendation of dissimilar communities will be possible by integrating activities of communities and relationships with communities.

Keywords: SNS, Social network, Interpersonal communication, Activation, Community, Recommendation


Title of the Paper: An Extraction of Emotion in Human Speech Using Speech Synthesize and Classifiers for Each Emotion

DOWNLOAD FULL PDF

Authors: Masaki Kurematsu, Jun Hakura, Hamido Fujita

Abstract: The typical method of estimation of emotion in speech has the 3 steps. First, researchers collect a lot of human speech. Next, researchers get speech features from human speech using frequency analysis and calculate the statistical value of them. Finally they make a classifier from the statistical value using a learning algorithm. Most researchers consider the collection of human speech, feature selection and learning algorithm to increase the validity of estimation. But the validity of estimation is not high. In this paper, we propose the 3 new methods to enhance the typical method of estimation of emotion in speech. First method is that we use synthetic speech to make a classifier. Second method is that we use not only mean and maximum but also Standard Deviation (SD), skewness and kurtosis to make a classifier. Third method is that we use the classifier for each emotion. In order to evaluate our approach, we did experiments. Experimental results show the possibility in which our approach is effective for improving the former method.

Keywords: Emotion, Speech Synthesize, Regression Tree, Linear Discriminant Analysis, Extraction of Emotion in Speech


Title of the Paper: Prototype of Knowledge Management System in Chinese Offshore Software Development Company

DOWNLOAD FULL PDF

Authors: Li Cai, Zuoqi Wang, Yufeng Jiao, Masanori Akiyoshi, Norihisa Komoda

Abstract: This paper illustrates preliminary design and evaluation of a knowledge managing system in Chinese offshore software development company. The major features of the knowledge management system are a BBS style Q&A function, a management of Q&A results based on domain knowledge, an association retrieval function for coping with grammatical ambiguity including in the queries, and a display of Q&A texts on the plain for grasping the general distribution of knowledge and problems. The prototype system has developed using JAVA and .Net Frameworks, and has used in-house. Through the trial use in-house, not only the advantage but also several improvement problems are clarified.

Keywords: knowledge management, question and answer system, association retrieval


Title of the Paper: Decision Making With Textual and Spatial Information

DOWNLOAD FULL PDF

Authors: Hana Kopackova, Jitka Komarkova, Pavel Sedlak

Abstract: The aim of the paper is to show the way how textual and spatial information can be used in decision making process. Structured information represents only 10 % of available information. Despite of this fact managers mostly rely on this type of information. Due to their marginalization in decision making practice, we focused on textual and spatial information in this article. Four case studies clearly illustrate usage of these types of information on practical examples.

Keywords: Decision Making, Information, Text Categorization, Clustering, GIS.


Title of the Paper: Application of Social Relation Graphs for Early Detection of Transient Spammers

DOWNLOAD FULL PDF

Authors: Radoslaw Brendel, Henryk Krawczyk

Abstract: Early detection of social threats and anomalies is a real challenge in today’s dynamic societies. The people form many complex social relations that can be shown by various types of graphs in which the nodes would represent the subjects (individuals or groups of people) and the links would indicate specific relations between them. The analysis of these constantly changing relations can point out specific social threats that are imminent. Observing the tendency of changes in the social relation graphs, such threats can be early detected and adequate preventative steps can be taken. In the paper we present how this approach can be efficiently used to early detect imminent threats of spam to a local e-mail society and isolate groups of spammers before their messages reach the users inboxes.

Keywords: social graphs, imminent threats, graph patterns, spam detection, security


Title of the Paper: A New Method for Enhanced Information Content in Product Model

DOWNLOAD FULL PDF

Authors: Laszlo Horvath

Abstract: This paper introduces a new method in order to establish a better communication between engineers and modeling procedures during lifecycle management of product information in computer based engineering systems. The proposed method is intended as one of the initial attempts for resolution of an inherent conflict in product modeling. This conflict is between information content based thinking of engineer and data based processing in classical product modeling systems. The author applies a new sector of product model that describes information content for engineering activities. This sector controls engineering object data in the second sector for classical product model entities. In this manner, the new modeling can be interconnected with existing modeling in industrially applied engineering systems. Information content is stored in interconnected levels of the product model for human intent, meaning of concepts, engineering objectives, contexts, and decisions. This paper explains basic concepts, refers to research in the related topics, introduces role of humans and human-computer interactions in the proposed modeling, and details information content based product modeling. Following this, it emphasizes difficulties of decisions in case of high number of dependencies amongst engineering objects in large product models and proposes a new method for change management in those models. Implementation of the proposed product modeling methods can be realized in industrial professional modeling systems by using of their functionality for open architecture.

Keywords: Product modeling, Lifecycle management of product information, Information content based product model, Design intent, Product changes, Affect zone of modified engineering object


Title of the Paper: Warehouse Redesign to Satisfy Tight Supply Chain Management Constraints

DOWNLOAD FULL PDF

Authors: Roman Buil, Miquel Angel Piera

Abstract: The picking process is a critical supply chain component for many companies. A proper warehouse configuration, storage policy, trays replenishment policy, and other factors are also important to reduce not only the delivery time, but also increase productivity while maintaining quality factors at competitive costs. This paper presents an integrated approach to tackle the complexity of warehouse redesign under several space and quality factor constraints. The proposed design methodology integrates warehouse layout configuration, storage policy, replenishment policy, picking policy, routing policy and also trays and shelves sizes design. As a result of the proposed strategy, considerable savings on resource costs (equipment and workers) can be achieved.

Keywords: Picking, warehouse, simulation, colored petri nets, logistics, supply chain.


Title of the Paper: Outcome Based Education Performance Measurement: A Rasch-based Longitudinal Assessment Model to measure Information Management Courses LO’s

DOWNLOAD FULL PDF

Authors: Azlinah Mohamed, Azrilah Abd. Aziz, Abd. Rahman Ahlan Sohaimi Zakaria, Mohdsaidfudin Masodi

Abstract: Malaysia Qualification Framework, 2005 (MQF) promotes outcome based education (OBE) learning process. OBE calls for the evaluation of the course’s Learning Outcomes (CLO) as specified in the Program Specification. This good practice is implemented in the Faculty of Information Technology and Quantitative Science, Universiti Teknologi MARA (FTMSK) teaching and learning processes which was duly certified to ISO 9001:2000. Assessment methods include giving students’ tasks such as tests, quizzes or assignments at intervals during the 14 weeks study period per semester. CLO’s were evaluated based on the students’ performance which gives an indication of their learning achievements. Despite the marks obtained is orderly in manner, it is on a continuum scale. Hence, further evaluation using the raw score is rather complex to be carried out. This paper describes a Rasch-based measurement model as performance assessment tool to measure the CLO. Rasch Model uses ‘logit’ as the measurement unit thus transforms the assessment results into a linear correlation. An overview of the measurement model and its key concepts were presented and illustrated. An assessment form using Bloom’s Taxonomy as parameter was designed showing each dimension of the ability to be measured. The results there from were evaluated on how well it relates to the attributes being assessed and scrutinized. It is further checked against the CLO Maps for consistency and used as a guide for future improvement of the teaching method and style. This provides the lecturers a more accurate insight of the student level of competency achieved. The study shows that this model of measurement can classify students’ grades into linear competency scale accurately using only very few primary data sets to enable corrective action to be taken effectively at the early stage of learning.

Keywords: Learning Outcomes, performance assessment, evaluation, competency, Bloom’s Taxonomy, quality.


Title of the Paper: Testing Cognitive Characteristics of Users in Interaction with Computer

DOWNLOAD FULL PDF

Authors: Nebojsa Dordevic, Dejan Rancic

Abstract: This paper presents some new research results on Human Computer Interaction (HCI) methodologies. We present an extension of cognitive model for HCI - (XUAN/t), based on decomposition of user dialogue into elementary actions (GOMS). Using this model, descriptions of elementary (sensor, cognitive and motor) actions performed by user and system are introduced sequentially, as they will happen. Based on the described model and psychometric concepts, we developed software CASE tool for testing cognitive as well as psychomotor abilities of a user in HCI. Software tool arranges tests into test groups for psychosensomotor and memory capabilities. User test results are persistently stored in a database and available for further statistical analysis. The main research goal was suitability verification of different HCI techniques for special user groups. Case study was performed and numerical results verifying the proposed model are presented in the paper.

Keywords: HCI, User interface, Cognitive models, HCI testing tool, User profile.


Title of the Paper: PIRR: A Methodology for Distributed Network Management in Mobile Networks

DOWNLOAD FULL PDF

Authors: Filippo Neri

Abstract: The current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. The next generation mobile networks proposed by 3rd Generation Partnership Project (3GPP) envision a flat network architecture comprising some thousands of network nodes, each of which will need to be managed, in a timely and efficient fashion. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches. section approach to deal with the increasing network size and complexity is to move from a centralized Network Management system to a more distributed or decentralized approach where each Network Management application consists of a controller part and a set of distributed parts running on the individual network elements. This approach however raises questions of how to measure and estimate the resource requirements when planning to distribute the Network Management applications in the mobile networks before starting to produce commercial systems. In this paper, we describe the PIRR methodology we have developed to measure resource requirements for distributed applications in mobile networks and the experimental findings of its application to new Network Management applications.

Keywords: Software Agents, JADE, Telecom network management system, distributed simulation systems, 3G cellular system.


Title of the Paper: A Hierarchical Relevance Feedback Algorithm for Improving the Precision of Virtual Tutoring Assistant Systems

DOWNLOAD FULL PDF

Authors: Ji-Wei Wu, Judy C.R. Tseng

Abstract: In recent years, several virtual tutoring assistant systems had been proposed based on question-answering systems. These virtual tutoring assistant systems are very helpful for the students to get instant helps when the teachers are not available. Pedagogic scholars think that when a student is stuck on a certain problem while learning, an instant tutoring assistant is very helpful to promote his/her study. Therefore, the qualities (precision) of the answers of virtual tutoring assistant systems are very important. It determines the effectiveness of these systems. In practices, some students are suffered from not being able to properly express their need; some may not even know exactly what information they need. As a result, some problems do not match any existing solutions, even if they do contain some clues for finding solutions. That makes the effectiveness of the virtual tutoring assistant systems not being acceptable. In the literatures, researchers found that relevance feedback information are quite useful for information retrieval systems to improve their effectiveness. Among them, the Rocchio’s Relevance Feedback (RRF) algorithm is the most well-known and have been employed in several information retrieval systems. In this paper, we proposed a novel pseudo relevance feedback algorithm, called Hierarchical Relevance Feedback (HRF) algorithm. The HRF algorithm is used for improving the precision of virtual tutoring assistant systems. After a query is submitted by some student, the new virtual tutoring assistant system will automatically modify the student’s query according to the HRF algorithm and re-submit it to the system. Experimental results showed that the effectiveness of the system is improved by automatically modifying user’s query using the HRF algorithm. Moreover, the HRF algorithm is also outperformed the famous RRF algorithm.

Keywords: E-learning, Tutoring assistant, Information Retrieval, Question-answering, Relevance feedback


Issue 4, Volume 5, April 2008


Title of the Paper: Analysis of the Potential for Nearly Circular Slope Failure Using On-site Survey Information with Adverse Calculation

DOWNLOAD FULL PDF

Authors: Tienfuan Kerh, Y. M. Wang, H. C. Tsai

Abstract: Slope stability analysis is crucial for decreasing unwanted economical loss at mountain highways which are prone to damage from heavy rains. The objective of this study is to perform on-site investigation and adverse calculation of slope damage at a specified road section along Tai-27 highway in Taiwan. By analysing a total of 38 on-site survey results, it is found that the types of slope damage may include debris flow (26%), shallow soil layer sliding (26%), nearly circular sliding (8%), slope oriented sliding (3%), falling rock (11%), river erosion (13%), and others (13%). Based on available geological information at three locations with nearly circular slope failure, the adverse calculations using computer software show that these slopes all failed at a shallow soil layer. Some of the important soil strength parameters such as cohesion force and friction angle are estimated, and a critical sliding surface is predicted for a minimum safety factor. The results provide useful information for choosing a suitable engineering protection work at these hazardous locations by the relevant agency.

Keywords: mountain highway, circular slope failure, adverse calculation, on-site survey, factor of safety, cohesion force, friction angle, critical sliding surface


Title of the Paper: Analysis on the Adaptive Scaffolding Learning Path and the Learning Performance of e-Learning

DOWNLOAD FULL PDF

Authors: Chun-Hsiung Lee, Gwo-Guang Lee, Yungho Leu

Abstract: Existing instruction websites record learners’ portfolios, they only collect the browsing time and homepage information, without directly provide teachers with more data for further analyzing learner behaviors. Consequently, this investigation uses the learners’ portfolio left in the e-learning environment, and adopts “data mining” techniques to establish for each cluster of learners the most adaptive learning path pattern, which can provide a “scaffolding” to guide each cluster of learners. Using statistical methods, this investigation analyzes whether the navigational learning map of “scaffolding learning path (SLP)” can improve learning performance. This investigation discovers that among the three clusters of learners, the learners in the experimental group under the two clusters other than high-score cluster, after taking the “scaffolding learning path” as their navigational learning map, achieve more significant progress than the learners of comparative group. This implies that through the “scaffolding learning path,” the learning performance of most learners can be improved.

Keywords: E-learning, Learning path, Scaffolding theory, Learning portfolio, Data mining


Title of the Paper: Using Integer Programming to Solve the Crew Scheduling Problem in the Taipei Rapid Transit Corporation

DOWNLOAD FULL PDF

Authors: Chui-Yen Chen

Abstract: The transport operation volume has reached millions of people since the Taipei Rapid Transit Corporation (TRTC) started operating 28 March 1996. TRTC has become the key public transportation in Taipei city. Crew scheduling of station employees has become one of the basic costs of operating the Public Rapid Transit System. During the planning stage of the project, a mathematical model of planning phases was established and used to find answers to crew scheduling and reduce costs. In general, the crew scheduling problems relate to the “set covering” problem or “set partitioning” problem; therefore, it is often described by the methods of 0-1 Integer Programming. Hence, this study will adopt the methods of integer programming for mathematical programming to establish a crew scheduling program. The Target-based formula of using integer programming to solve the crew shift scheduling problem is meant to meet the interests of station employees. Furthermore, this study will use comparison analysis to research (1) common shift scheduling; (2) employee’s preferred working hours; and (3) specified work day for employees to help solve day off or other problems. We hope to provide this method to the TRTC in a rapid and convenient timetable to improve the efficiency of operations and business competition.

Keywords: Crew scheduling problem (CSP), 0-1 Integer programming, Taipei Rapid Transit Corporation (TRTC)


Title of the Paper: Malaysian Smart School Courseware Usability study: The Effectiveness of Analytical Evaluation Technique Compared to Empirical Study

DOWNLOAD FULL PDF

Authors: Azizah Jaafar

Abstract: Usability evaluation methods are used to evaluate the interaction of the human with the computer for the purpose of identifying aspects of interaction that could be improved t increase usability. This research was carried out to determine the effectiveness of analytical evaluation technique that was designed, developed and named as Jalan Rentasan Kognitif (JRK) evaluation technique. This evaluation technique was conducted on thirty-seven surrogate users that consist of courseware developers, teachers and university students using the Malaysian Smart School Mathematics courseware. The usability result was then compared statistically with the empirical usability evaluation called Task Analysis Exploratory through Observation using video camera (TAEO). The respondents of the empirical method were secondary school students who used the same courseware as one of the learning aids in school. Usability indicators used in the study were usability problems and users’ satisfaction. The study showed that the effectiveness of the two techniques was quite similar if they were used independently during the evaluation process. The usability indicators obtained in the study could be used as references in the usability comparisons of other educational courseware.

Keywords: Usability Evaluation Technique, Task Analysis, Surrogate user, Usability problems.


Title of the Paper: Analysis on Types of Mobile Games Played among the IHL Students in Malaysia

DOWNLOAD FULL PDF

Authors: Hafizullah Amin Hashim, Siti Hafizah Ab Hamid, Mas Idayu Md Sabri

Abstract: Mobile phones are no longer a luxury but are now considered a necessity by its users. Many applications are developed to replace electronic devices and extra ‘baggage’ that people used to carry around with them. A mobile phone now also serves as a planner, camera, music player, video player, gaming console, calculator and other useful gadgets. Mobile gaming is getting more attention from gamers as one of the most preferable type of digital games. One good reason that contributes to the success of mobile game is because of its mobility, which means gamers can play games anytime and anywhere. In this paper, we examine the usage of mobile games as compared to other types of digital games such as console or arcade games in Malaysia. We also perform a series of analysis regarding to students preferences in every gaming phase from console or arcade games to mobile games. A survey on user preferences among students of Institute of Higher Learning (IHL) has been done to gather useful information and relevant data to support this paper. The survey showed that an overwhelming majority (60%) of the respondents prefer to play games on mobile phone. The data that have been gathered from the survey were analyzed using Statistical Package for Social Science (SPSS), Release 13.0.0, to investigate the number and percentage of students that use mobile games. The future direction of this study is discussed at the end of the paper.

Keywords: Mobile game, mobile learning, mobile phone, programming.


Title of the Paper: Automated Decision Support System Based on Ordered Sources

DOWNLOAD FULL PDF

Authors: Sylvia Encheva, Sharil Tumin

Abstract: Making a decision based on comparing responses coming from different sources has allways been difficult. In this paper we propose application of a decision support system for selecting a shipyard based on the quality of services provided by a number of shipyards.

Keywords: Quality of services, selection, Web-based systems.


Title of the Paper: The Introduction of Supply Chain Management Concepts to e-Government Research and Practice

DOWNLOAD FULL PDF

Authors: Ales Groznik, Peter Trkman

Abstract: The paper deals with various aspects of e-government and highlights the importance of the holistic treatment of business process renovation in order to facilitate the transition towards e-government. It analyses both upstream and downstream supply chain renovation and describes a four-step procedure for downstream renovation. A new definition of e-government that includes the whole supply chain of the public administration is proposed. The chief problems of the proposed approach are analysed, along with some interesting topics for further research. The findings are partly illustrated with a case study of the development of the Slovenian eprocurement portal.

Keywords: e-government, e-procurement, supply chain management, business renovation, case study.


Title of the Paper: E-logistics: Slovenian Transport Logistics Cluster creation

DOWNLOAD FULL PDF

Authors: Ales Groznik

Abstract: In the pursuit of enhanced competitiveness organisations are today searching for innovative business models in order to foster economic benefits. In Slovenia, several clusters are being formed, including the Slovenian Transport Logistics Cluster (STLC) as one of the most important. The STLC is currently in the stage of dynamic growth, demanding business model formation and adequate informatisation. The main goal of the paper is to present the informatisation of the STLC, bridging the gap between Supply Chain Management (SCM) and e-Logistics. The STLC’s informatisation of is presented in several phases. The first phase involves business modelling of the existing business processes of organisations (AS-IS model). The results of the first phase allow an in-depth view of the STLC that is used in the future in the business model setup. Next, TO-BE processes are created which are to be implemented and supported via informatisation. The result of the informatisation project is revealed to be homogenous and transparent business activity between cluster members. The purposes of the STLC’s informatisation are to create a business model, standardise business processes, allow cost cutting and improved business performance, reduce operating times, support asset management, and trace shipments which are the basics of economic competitiveness.

Keywords: SCM, e-logistics, cluster, informatisation, business renovation.


Title of the Paper: Experiences of Implementing a Value-Based Approach

DOWNLOAD FULL PDF

Authors: Pasi Ojala

Abstract: This study tries to advance and define the concepts, principles and practical methods of a value-based approach, involving definition of the essential concepts of value, cost and worth in software development. These definitions originate from the Value Engineering (VE) method, originally applied and developed for the needs of the production industry. Therefore, for the purposes of this study these concepts are firstly justified and secondly defined. In order to study and evaluate the value-based approach, a method called value assessment is developed and used when assessing processes and products. The results of industrial case show that even though there is still much to do in making the economic-driven view complete in software engineering, the value-based approach outlines a way towards a more comprehensive understanding of it. For industrial users value assessment seems to give a practical help for handling cost and profitability related challenges.

Keywords: Software process and product improvement, assessment, value, worth, cost and Value Engineering.


Title of the Paper: A New Version of Flusser Moment Set for Pattern Feature Extraction

DOWNLOAD FULL PDF

Authors: Constantin-Iulian Vizitiu, Doru Munteanu, Cristian Molder

Abstract: The choice of a suitable feature extraction method is essential for the success of the classification or recognition process. This paper proposes a design method for a new pattern descriptor set based on the Flusser moment class, which is invariant to elementary geometric transforms and has an increased robustness to the action of some perturbations. Experimental results based on the use of a real video image database confirm the basic properties of this new descriptor set.

Keywords: Pattern feature extraction, Flusser moment class, pattern recognition, neural network.


Title of the Paper: The Characteristics of Learning in Limited Data and the Comparative Assessment of Learning Methods

DOWNLOAD FULL PDF

Authors: Fengming M. Chang

Abstract: Many studies about learning in limited data were made in recent years. Without double, small data set learning is a challenging problem. Information in data of small size is scarce and has some learning limit. While discussing the learning accuracy in limited data, different classification method causes different results for different data because each classification method has its property. A method is the best solution for one data but is not the best for another. Therefore, this study analyzes the characteristics of small data set learning by the comparison of classification methods. The Mega-fuzzification method for small data set learning is applied mainly. The comparison of different classification methods for small data set learning with several kinds of data is also presented.

Keywords: Small data set, Mega-fuzzification, Machine learning, Classification method, Paucity of data.


Title of the Paper: The Effects of DTAI on Nursing Skills and Self-Efficacy

DOWNLOAD FULL PDF

Authors: Mei-Huang Huang , Aih-Fung Chiu, Ju-Ling Liu

Abstract: This research is to evaluate the effects of Digital Technology Assisted Instruction (DTAI) applied in the Physical-Examining (PE) skill courses for nursing students. Both a "Learning Satisfaction with DTAI" survey and a "Self-efficacy" survey for these courses had been designed as tools in this study. Students of the third grade (five years program) in the nursing department of a technological college in Taiwan were recruited. One hundred and twenty-seven subjects who took the DTAI program on internet were assigned to be the experimental group, while the other 77 subjects with the traditional program to be the control one. All data were analyzed by SPSS 13.0 for Windows. The results were: (1) The practice time after classes, scores of the skill test, and scores of the "Self-efficacy" survey of the experimental group were significantly higher than those of the control group. (2) The average time of online-browsing through DTAI in the experimental group was 122.22 minutes. (3) The average score (5-points scale) of the "Learning Satisfaction with DTAI" survey was 4.37. (4). There were significantly positive correlations between the practice time after classes, scores of the skill test and scores of "Self-efficacy" (p < .001). (5) DTAI for the PE skill courses made a good impression for nursing students. DTAI was indeed a convenient and efficient tool without limitations to time or places, and still made a great improvement in learning effects. Moreover, the students get more confidence in problem-solving and nursing skill learning. Such intervention can be incorporated into the teaching instruction to improve the nursing skills and self-efficacy for the novices. Finally the destinations of teaching and learning can be achieved.

Keywords: Digital Technology Assisted Instruction (DTAI), Learning effects, Nursing students, Physical-Examining Course (PE), Self-efficacy.


Title of the Paper: A New Approach for the Creation of a Non-Profit Website with the Example of a Regional Museum

DOWNLOAD FULL PDF

Authors: Pavel Makagonov, Celia B. Reyes Espinosa

Abstract: In the engineering of Internet applications the main demand is to concentrate on interests of the user. That means that the user is predetermined. In this paper, a new approach is proposed for the case when the stakeholder is not a user and the final user is not sharply defined. This situation is typical for design of a website for a non-profit rural regional museum. The first stages in this case consist of; the creation the user’s model for the regional museum’s website; the study of characteristics of existing successful regional museum sites, the creation of a quick prototype of the site taking into account characteristic features of successful sites; the use of the prototype for monitoring the users’ behavior and organizing direct feedback with them. In this article basic elements of these new first stages are considered and shown by example in the creation of a prototype website for future sites for regional museums in the southeast region of Mexico.

Keywords: regional museum websites, user profiles, access monitoring, sample of successful websites.


Title of the Paper: Wavelets Families and Similarity Metrics Analysis in VIR System Design

DOWNLOAD FULL PDF

Authors: L. Flores-Pulido, O. Starostenko, R. Contreras-Gomez, L. Alvarez-Ochoa

Abstract: This paper presents an analysis of some novel approaches for visual information retrieval (VIR) system design which are based on extraction of wavelet coefficients and applying specific similarity metrics. Four families of wavelets and three techniques for computing similarity between queried and retrieved images have been tested using designed Image Retrieval by Neural Network and Wavelet Coefficients (RetNew) system. The best Symlet transform and similarity metrics based on Euclidian distance have been adopted in a proposed VIR system called Image Retrieval by Wavelet Coefficients (IRWC). Additionally, in order to evaluate a proposed approach and a novel designed system the recall and precision metrics used for analysis of the performance of VIR facilities have been applied on base of the standard COIL-100 image collection. The obtained results show the increment of retrieval efficiency up to 93% without additional increasing a processing time. Therefore a proposed approach may be considered as a good alternative for designing new VIR systems. The obtained results allow facilitating the development of new methods for solving this still open problem of efficient image retrieval.

Keywords: Image Processing, Visual Information Retrieval, Similarity Metrics, Wavelets


Title of the Paper: Fuzzy Model for Estimation of Passenger Car Unit

DOWNLOAD FULL PDF

Authors: Praveen Aggarwal

Abstract: In most of the developing countries including India mixed traffic condition prevail on roads and highways. There is a wide variation in the static and the dynamic characteristics of different types of traffic. The only way of accounting for this non-uniformity for any traffic analysis in traffic stream is to convert all vehicles into a common unit and the most accepted unit for this purpose is passenger car unit (PCU). PCU value for a vehicle is not constant but varies with traffic and roadway condition around. A number of factors have been identifies affecting PCU values. The current study aims at developing a fuzzy based model for the estimation of PCU values for bus. Fuzzy based model is of importance because of a number of independent affecting factors. Results of developed fuzzy MATLAB based model are compared with the quoted results and are found with high degree of correlation.

Keywords: Passenger Car Unit, fuzzy model.


Title of the Paper: Using Data Mining to Provide Recommendation Service

DOWNLOAD FULL PDF

Authors: Ruey-Shun Chen, Yung-Shun Tsai, K.C. Yeh, D.H. Yu, Yip Bak-Sau

Abstract: This research introduces personalized recommendation service into library services. Using the borrowing record of the library as basis, the association rules of data mining technique are used to look for book association by focusing on reader’s borrowing mode, personal interest and trait in order to simplify the complexity of recommendation structure. The Bayesian network concept is used to build up a personalized book recommender system in order to generate different book recommendations, ranking from high to low, to help reader to locate book information most suitable to his requirement. Meanwhile we use user satisfaction questionnaire to understand the accuracy of recommended books and further to feedback information in order to help the post learning of Bayesian network parameter. This is for the perfection of the overall structure of recommender system so that readers could make use of the resource of the library more effectively and the value of the library system could be further improved.

Keywords: Recommendation System, Bayesian Network, Data Mining.


Title of the Paper: Optimal Run Time for EMQ Model with Backordering, Failure-In- Rework and Breakdown Happening in Stock-Piling Time

DOWNLOAD FULL PDF

Authors: Yuan-Shyi Peter Chiu, Shun-Sheng Wang, Chia-Kuan Ting, Hsien-Ju Chuang, Yu-Lung Lien

Abstract: This study examines the optimal run time for the economic manufacturing quantity (EMQ) model with failure-in-work, backlogging, and random breakdown happening in stock-piling time. A recent article by Chiu and Chiu [Mathematical modeling for production system with backlogging and failure in repair, Journal of Scientific & Industrial Research, 65 (2006) 499-506] investigated optimal lot-size for EMQ model with backordering and failure-in-rework. By incorporating random machine breakdown-another inevitable reliability factor into their model, this research examines its effects on the optimal run time and on the long-run average costs. Mathematical modeling and cost analysis are employed and the renewal reward theorem is used to cope with variable cycle length. Convexity of the expected production- inventory cost function is proved. An optimal replenishment policy that minimizes overall costs is derived for such an unreliable system. Numerical example is provided to show its practical usage. Managers in the field can adopt this run time decision to establish their own robust production plan accordingly.

Keywords: Manufacturing, Run time, Breakdown, Failure-in-rework, Backorder.


Title of the Paper: An Optimized Pseudorandom Generator using Packed Matrices

DOWNLOAD FULL PDF

Authors: Jose-Vicente Aguirre, Rafael Alvarez, Leandro Tortosa, Antonio Zamora

Abstract: Most cryptographic services and information security protocols require a dependable source of random data; pseudorandom generators are convenient and efficient for this application working as one of the basic foundation blocks on which to build the required security infrastructure. We propose a modification of a previously published matricial pseudorandom generator that significantly improves performance and security by using word packed matrices and modifying key scheduling and bit extraction schemes. The resulting generator is then successfully compared to world class standards.

Keywords: Pseudorandom Generator, Stream Ciphers, Binary Matrices, Cryptography, Security.


Title of the Paper: Understanding Participant Loyalty Intentions in Virtual Communities

DOWNLOAD FULL PDF

Authors: Echo Huang, Meng-Hsiang Hsu, Yu-Ren Yen

Abstract: This study proposes a conceptual model based on expectation confirmation theory with extended antecedent variables (human assets, technical assets, and complementary assets) to examine the impact of virtual communities’ assets on member satisfaction and perception of usefulness. The members of JavaWorld@TW, a representative professional community in Taiwan, were chosen to participate in the survey, and 235 usable responses were collected in three months. Partial Least Square(PLS) regression were used to test the model, the findings show that satisfaction is the strongest predictor of revisiting, following perceived usefulness. Furthermore, higher confirmation of human assets, technical assets, and complementary assets are accompanied with higher positive satisfaction and perceived usefulness which influence the intention to revisit. We also advanced to explore the difference within groups, weak-tie members and strong-tie members were separated for further examination. The difference in the behavioral models of weak-tie and strong-tie, particularly in the revisit context, shed light on the importance of development related theories that can be applied to shape the post-use behavior of specific groups. Implications are proposed in the final section.

Keywords: Resource-Based Theory, Expectation Confirmation Theory, Revisit, Virtual Communities, human assets, technical assets, complementary assets.


Title of the Paper: Characterization of Imaging Phone Cameras Using Minimum Description Length Principle

DOWNLOAD FULL PDF

Authors: Adrian Burian, Aki Happonen, Mihaela Cirlugea

Abstract: In this paper, a new Minimum Description Length (MDL) approach for the characterization of a mobile phone’s color camera is presented. The use of high-order polynomials, Fourier sine series, and artificial neural networks (ANN) for solving this problem are compared and contrasted. The MDL formalism is used for determining the stochastic complexity of polynomial and Fourier sine models for the characterization of a Nokia N93 mobile phone camera. A quantitative evaluation of their performances, as well as for using an ANN, is provided.

Keywords: Minimum Description Length, High-Order Polynomial, Artificial Neural Network, Imaging Mobile Phone.


Title of the Paper: The Internet Visit Rate, its Monitoring and Analysis

DOWNLOAD FULL PDF

Authors: Jiri Kohout, Antonin Slaby

Abstract: Currently the Internet visit rate is a topic of increasing importance. It is a tool for monitoring marketing campaigns’ success and comparing the popularity rate to other competitors. This article aims at analyzing the process of measuring the frequency distribution of online customer’s behaviour, highlighting the risks in interpretation of the results and presenting methods used in the data analysis process. Part one outlines a way of collecting data for the analysis by recording them to the web log. Then another method working on the active content principle is presented. The comparison of both methods follows, supported by an overview of advantages and disadvantages. Consequently, the gained findings are summarized and result in the list of essential preconditions necessary for objective and complex analysis of visit rate data.

Keywords: Internet visit rate, Monitoring, Web Server Logs.


Title of the Paper: Real Time Trajectory Based Hand Gesture Recognition

DOWNLOAD FULL PDF

Authors: Daniel Popa, Georgiana Simion, Vasile Gui, Marius Otesteanu

Abstract: The recognition of hand gestures from image sequences is an important and challenging problem. This paper presents a robust solution to track and recognize a list of hand gestures from their trajectory. The main tools of the proposed solution are robust kernel density estimation and the related mean shift algorithm, used in both video tracking and trajectory segmentation. The gesture definition is based on strokes in order to allow the use of a low complexity gesture recognition method. The gesture recognition process is trivial, being reduced to a syntactic analysis of the feature vector avoiding the necessity of complex classification methods based on curve matching. Despite the restrictions derived from the stroke based definition of gestures, the low computational complexity of the algorithm allows its implementation on low-cost processing systems.

Keywords: gesture recognition, mean shift, robust methods, video tracking, human machine interface.


Title of the Paper: MeDiMed - Regional Center for Medicine Multimedia Data Exchange

DOWNLOAD FULL PDF

Authors: Karel Slavicek, Michal Javornik, Otto Dostal

Abstract: Institute of Computer Science of Masaryk University is working on the field of supporting medicine multimedia data transport archiving and processing more than ten years. Since first steps like transport of ultrasound and CT images across private fiber optics network these activities have grown up to regional PACS archive. This paper describes the technology background of the MeDiMed project.

Keywords: PACS, DICOM, medicine multimedia data.


Title of the Paper: Analysis of Retailer Web Sites with Microeconomic Interpretation

DOWNLOAD FULL PDF

Authors: Tomislav Herceg, Bozidar Jakovic, Milivoj Markovic

Abstract: The competition in the Croatian retailing business is on its peak, but is vague when it is going to settle. This situation is a great field for new market opportunities and finding new niches might be of a crucial importance. Leaders and followers switched their places, as well as the CEOs and marketing policies. Although the fight with the prices is still very important, its detrimental effect on the profits attracts retailers to differentiate their products by several means, one of which may be the e-retailing. Even though it accounts for a certain share of the sales in the World, it is yet to be set in Croatia. The speed of the implementation of broadband connections and new companies on the communications market decreased the price and increased the accessibility of the Internet. It is now on the retailing companies to recognize this opportunity and occupy this newly created area of business. The comparison between 18 greatest retailers in Croatia and in the World, using the previously devised Web-metric and methods, brought the following conclusions: Only one company offers a possibility of e-purchase, and many have only the basic information on their web site. However there is some connection between the size of a company and its web site development level. Companies should invest their web sites and develop an e-sales point, including online shops, Web site maintenance, Web design, and user-friendliness, as well as in the measurement of the e-activities. Multimedia content should not be forgotten since it is what makes a site recognizable.

Keywords: Web sites, Retailers, Web metrics, Croatian retail market, Market congestion, Competitive market, Retailing market analysis, E-purchase, Web shop.


Title of the Paper: E-learning and its Application to Microeconomics

DOWNLOAD FULL PDF

Authors: Bozidar Jakovic, Tomislav Herceg, Fran Galetic

Abstract: Distance learning is a growingly important component of education. Its low cost and easily accessible education materials are to play an important role in raising overall education level in the world, since Internet access is growing exponentially. At the same time, it allows better flow of labour because it lets students live much further from the University they attend. It also decreases living costs, as well as the costs of the education institution itself. Microeconomics is a discipline easily adaptable to the e-learning process because its graphical representations and complicated deductions can be easily taught using interactive presentations and simple software. Several authors offer a multiple possibilities for implementation of the eLearning systems. We analyzed some cases in which distance learning offers even greater possibilities than the traditional teaching techniques, using illustrative graphs, thorough analytic step-by-step deductions of main microeconomics connecting the theory and practice through the use of statistic and econometric programmes and methods. The final aim of this paper is to introduce more efficient, more comprehensive and cheaper teaching method.

Keywords: Microeconomics, 3d graphs, e-learning, education, distant learning, multimedia materials, interactive presentation, teaching techniques, Web 2.0


Issue 5, Volume 5, May 2008


Title of the Paper: Error Measurements and Parameters Choice in the GNG3D Model for Mesh Simplification

DOWNLOAD FULL PDF

Authors: Rafael Alvarez, Leandro Tortosa, Jose F. Vicent, Antonio Zamora

Abstract: In this paper we present different error measurements with the aim to evaluate the quality of the approximations generated by the GNG3D model for mesh simplification. The first phase of this method consists on the execution of the GNG3D algorithm, described in the paper. The primary goal of this phase is to obtain a simplified set of vertices representing the best approximation of the original 3D object. In the reconstruction phase we use the information provided by the optimization algorithm to reconstruct the faces thus obtaining the optimized mesh. The implementation of three error functions, named Eavg,Emax,Esur, allows us to control the error of the simplified model, as it is shown in the examples studied. Besides, from the error measurements implemented in the GNG3D model, it is established a procedure to determine the best values for the different parameters involved in the optimization algorithm. Some examples are shown in the experimental results.

Keywords: Surface simplification, mesh reconstruction, error approximations, neural networks, growing neural gas, growing cell structures.


Title of the Paper: Enhancing Software Projects Course Work by Advanced Management

DOWNLOAD FULL PDF

Authors: Jyhjong Lin

Abstract: Software projects are an important course in software engineering curricula. They provide students with an opportunity to gain valuable experiences in applying the theoretical materials learned at software engineering courses. However, many drawbacks in current projects course work make these benefits difficult to realize. In this paper, we discuss these drawbacks and how they affect the effectiveness of this course. To address these difficulties, we advocate a model of enhancing the management approach to provide an effective administration for each project. Our experiments from the model have shown significant improvements in the quality of projects and the experiencing effects of students.

Keywords: software engineering education, software project, management, model.


Title of the Paper: Algorithm MONSA for All Closed Sets Finding: Basic Concepts and New Pruning Techniques

DOWNLOAD FULL PDF

Authors: Rein Kuusik, Grete Lind

Abstract: In this paper an algorithm named MONSA for closed sets mining is presented. It does not use such kind of techniques as in ChARM by Zaki and Hsiao. MONSA is an exact depth-first search algorithm extracting only frequent closed sets using several new very effective pruning techniques to be free from repetitive and empty patterns. MONSA does not depend on the initial order of objects. In MONSA there is active only one branch which is under construction. The purpose of this paper is to describe the approach used in MONSA and the correspondence of its basics and concepts to the approach by Zaki and Hsiao. A full example of the algorithm’s work is presented. By the algorithm the intersections (closed sets) and IF…THEN rules on the subsets of source data set simultaneously are found. MONSA treats not only binary data, but a larger set of discrete values.

Keywords: Data mining, Frequent closed sets, Pruning techniques, Depth-first search, Monotone systems.


Title of the Paper: Business Intelligence Systems: A Comparative Analysis

DOWNLOAD FULL PDF

Authors: Carlo Dell’aquila, Francesco Di Tria, Ezio Lefons, Filippo Tangorra

Abstract: A set of evaluation criteria is described and considered for comparing some popular OLAP systems that support Business Intelligence. These criteria involve critical aspects such as: information delivery, system and user administration, and OLAP queries. The measurement method is based on the functional complexity analysis. Experimental results have been carried out using a data warehouse in academic environment and they allow to evidence the weaknesses and the points of force of each compared system.

Keywords: Data warehouse, Data mart, OLAP system, Functional size measurement, Business Intelligence. platform.


Title of the Paper: Feasibility of Implementing B2B e-Commerce in Small and Medium Enterprises

DOWNLOAD FULL PDF

Authors: Tien-Chin Wang, Ying-Ling Lin

Abstract: E-commerce has substantially affected the business world in the recent, and its importance is expected to continue increasing in future. Since implementing B2B e-commerce in small and medium enterprises (SMEs) is a long-term commitment and such enterprises are more limited in terms of resources than large enterprises, the predicted value of successful implementation is extremely useful in deciding whether to initiate B2B e-commerce. This investigation establishes an analytical hierarchy framework to help SMEs predicting implementation success as well as identifying the actions necessary before implementing B2B ecommerce to increase e-commerce initiative feasibility. The consistent fuzzy preference relation is used to improve decision making consistency and effectiveness. A case study involving six influences solicited from a Taiwanese steel company is used to illustrate the feasibility and effectiveness of the proposed approach.

Keywords: B2B e-commerce; small and medium enterprises; multi-criteria decision making; consistent fuzzy preference relation.


Title of the Paper: Improving Query Performance in Virtual Data Warehouses

DOWNLOAD FULL PDF

Authors: Adela Bâra, Ion Lungu, Manole Velicanu, Vlad Diaconiţa, Iuliana Botha

Abstract: In order to improve the quality of Business Intelligence Systems in an organization we can choose to build the system using BI techniques such as OLAP and data warehousing or by using traditional reports based on SQL queries. The cost and developing time for BI tools is greater than those for SQL Reports and these factors are important in taking decisions on what type of techniques we used for BIS, also the problem of low performance in data extraction from data warehouse can be critical because of the major impact in the using the data from data warehouse: if a BI report is taking a lot of time to run or the data displayed are no longer available for taking critical decisions, the project can be compromised. In this case there are several techniques that can be applied to reduce queries’ execution time and to improve the performance of the BI analyses and reports. In this paper we present an overview of an implementation of a Business Intelligence project in a national company, the problems we confronted with and the techniques that we applied to reduce the cost of execution for improving query performance in this decisional support system.

Keywords: Tuning and optimization, SQL query plans, Business Intelligence projects, Virtual data warehouse, Data extraction, Query optimization and performance, Partitioning techniques, Indexes, Analytical functions.


Title of the Paper: Automatically Extracting Important Sentences from Story based on Connection Patterns of Propositions in Propositional Network

DOWNLOAD FULL PDF

Authors: Hideji Enokizu, Satoshi Murakami, Moriaki Kumasaka, Kazuhiro Uenosono, Seiichi Komiya

Abstract: In recent years, the world is filled with a large amount of information through the internet and so on. Such a situation increasingly enhances the worth of the automatic text summarization which can support a quick grasp of the text content. The automatic text summarization has so far been accomplished by extracting some important sentences from a text based on various surface cues. To be compared, we tried to devise a new method to extract the important sentences from the story according to the way in which the people comprehend it. In designing this new method, we took account of the text comprehension model, that is, how people comprehend the story text. Then we devised the procedure for transforming from a set of the propositions to the propositional network. In Experiment 1, the participants were asked to select the sentences regarded as important from five stories. Then we examined how the propositions drawn from each important sentence were connected in the propositional network of each story. As a result, we identified three distinctive connection patterns. In Experiment 2, it was examined whether those connection patterns are valid as the rules to extract the important sentences from five new stories. From the sentences extracted our system and the important sentences selected by the participants, we calculated the aggregation accuracy measures. As a result, it was found that they were clearly higher than the baselines. Moreover they were equal to or higher than ones obtained in the previous researches. This finding was replicated to the stories used in Experiment 1.

Keywords: Automatic Text Summarization, Extracting Important Sentences, Extended Rules of Connecting Propositions, Propositional list, Propositional network, Connection Patterns.


Title of the Paper: Performance Evaluation of the Software Visualization tools and A New Framework to Manage Cognitive Load in Computer Program Learning

DOWNLOAD FULL PDF

Authors: Muhammed Yousoof, Mohd Sapiyan, K. Ramasamy

Abstract: Cognitive load experienced while learning programming is very high due to the high element of interactivity and poor instructional design. Prior researchers [2][5][6][10] have focused to minimize the load such as program visualization, pair programming etc. There are many computer based tools available in the market which are aimed to reduce the cognitive load experienced by the learners and to facilitate faster learning. In this paper, two such tools such as JELIOT, BlueJ are taken into consideration. We evaluate the effectiveness of each of the above mentioned tools in their ability of easing the learning process. An experiment was conducted among the students of Computer Science at Dhofar University to evaluate the effectiveness of each tool to reduce the load experienced by the learner. The impact of these measures is not determinable since there is no mechanism to monitor the load and thus the results of the previous studies are very subjective. We also propose a framework which consists of 3 layers, to help in managing the load by monitoring .When the load exceeds the capacity, the instructional design could be altered or customized to enable the learning. The proposed framework is a novel way to ease the learning process of computer programming.

Keywords: Cognitive Load, Jeliot, BlueJ, Physiological Measures, Galvanic Skin Response.


Title of the Paper: Use of Wavelet-based Basis Functions to Extract Rotation Invariant Features for Automatic Image Recognition

DOWNLOAD FULL PDF

Authors: Santiago Akle, Maria-Elena Algorri, Ante Salcedo

Abstract: In this paper we explore the use of orthogonal functions as generators of representative, compact descriptors of image content. In Image Analysis and Pattern Recognition such descriptors are referred to as image features, and there are some useful properties they should possess such as rotation invariance and the capacity to identify different instances of one class of images. We exemplify our algorithmic methodology using the family of Daubechies wavelets, since they form an orthogonal function set. We benchmark the quality of the image features generated by doing a comparative OCR experiment with three different sets of image features. Our algorithm can use a wide variety of orthogonal functions to generate rotation invariant features, thus providing the flexibility to identify sets of image features that are best suited for the recognition of different classes of images.

Keywords: Rotation Invariant Features, Zernike Moments, Haar Wavelets, Daubechies Wavelets, Orthogonal Functions, OCR.


Title of the Paper: A Protocol For Self-Organizing Peer-to-Peer Network Supporting Content-Based Search

DOWNLOAD FULL PDF

Authors: Igor Mekterovic, Mirta Baranovic, Kresimir Krizanovic

Abstract: For a peer-to-peer(P2P) content sharing network holding large amount of data, an efficient semantic based search mechanism is a key requisite. Semantic based search should generate as little traffic (messages) possible while achieving precision and recall rates comparable to those of correspondent centralized system. In this paper protocols for self-organizing P2P networks that arranges links between peers according to peer's content are developed and tested. Peers organize themselves into "semantic communities" without losing links to other semantic communities. Proposed network requires no prior knowledge of the semantics of documents that are to be shared in the system. Through simulations, it is shown that proposed network is resilient to membership changes and achieves high recall rates.

Keywords: Peer-to-peer, Content-based search, Information retrieval, Algorithm, Semantic.


Title of the Paper: Visual Reinforcement Learning Algorithm using Self Organizing Maps and Its Simulation in OpenGL Environment

DOWNLOAD FULL PDF

Authors: Hiroshi Dozono Ryouhei Fujiwara, Takeshi Takahashi

Abstract: Recently, the camera systems becomes more available for mobile robots . But scene analysis for generating control signals is still difficult and consumes large computational power. For this problem, the control method which generates the control signals directly from the raw camera images will be effective. In this paper, we use the reinforcement learning using the camera image as input data. For the division of the states represented with camera images, self organizing map is introduced. The division of the states and learning of the control signal using reinforcement learning are executed simultaneously on the map. For examining the performance of this algorithm, we made the simulation system with Graphical User Interface using OpenGL.

Keywords: Reinforcement Learning, Self Organizing Map, Learning algorithm, Mobile robot, OpenGL.


Title of the Paper: Numerical Experiments on Pareto-optimal Task Assignment Representations by Tabu-based Evolutionary Algorithm

DOWNLOAD FULL PDF

Authors: Jerzy Balicki

Abstract: Meta-heuristics like evolutionary algorithms require extensive numerical experiments to adjust their capabilities of solving decision making problems. Evolutionary algorithm can be applied for finding solution in distributed computer systems. Reliability and the load balancing are crucial factors for a quality evaluation of distributed systems. Load balancing of the Web servers can be implemented by reduction of the workload of the bottleneck computer what improves both a performance of the system and the safety of the bottleneck computers. An evolutionary algorithm based on a tabu search procedure is discussed for multi-criteria optimization of distributed systems A tabu mutation is applied for minimization the workload of the bottleneck computer. It can be obtained by task assignment as well as selection of suitable computer sorts. Moreover, a negative selection procedure is developed for improving non-admissible solutions. Extended numerical results are submitted.

Keywords: Evolutionary algorithm, Multi-criterion optimization, Distributed systems, Artificial intelligence, Pareto solutions.


Title of the Paper: Nodal Analysis- based Design for Improving Gas Lift Wells Production

DOWNLOAD FULL PDF

Authors: Edgar Camargo, Jose Aguilar, Addison Ríos, Francklin Rivas, Joseph Aguilar-Martin

Abstract: In this work, a gas lift-based oil production wells improvement technique is presented. This technique is based on Nodal Analysis, which is applied to well head level, where the production data are available. Thus, a production model is obtained, representing the production curve. This model allows calculating the production flow and pressure drop relationship that can be found in all the components of the completion system. So, it will be possible to determine the oil or gas flow that can be produced by the well, considering the perforation and completion geometry. With this information, we can build a production optimization system in order to increase the production flow rate.

Keywords: Nodal Analysis, Production Systems, Artificial Gas Lift Well, Production Control.


Title of the Paper: Hand-Written Digits Recognition by Graph matching and Annealing Neural Networks

DOWNLOAD FULL PDF

Authors: Kyunghee Lee

Abstract: Mean field annealing(MFA) is a promising tool in optimization and a neural network model based on the graph matching have attracted attention due to a number of benefits over conventional recognition models. We present a neural network model for hand-written digits recognition using graph matching and two annealing techniques, MFA and one-variable stochastic simulated annealing(OSSA). OSSA makes it possible to evaluate the equilibrium spin average value effectively by Monte Carlo technique. In this paper hand-written digits recognition can be formulated as elastic graph matching, which is performed here by annealing techniques of matching cost function. Our model provides not only the function of recognition but also the segmentation ability such that input characters are correctly recognized and segmented simultaneously even if they are touching, connected, and defected by noise. Some simulation results show the capability of our model and the characteristics of MFA and OSSA.

Keywords: Pattern recognition, Segmentation, Optimization, Mean field annealing, Annealing neural networks.


Title of the Paper: Platform Support for an Intelligent Enterprise Business Management

DOWNLOAD FULL PDF

Authors: Gabriela Rodica Hrin, Lucian Emanuel Anghel, Adrian David

Abstract: The platform IDEA assists all the specific processes of an enterprise, from the meat processing industry, to help decision makers to manage performances by implementing the concepts Business Performance Management (BPM) and Business Intelligence (BI). The platform transforms data into information and then into knowledge being focused on business, technological and economical aspects specific to the meat processing enterprises helping them to realise an efficient use of their business policies, financial, human and material resources. The platform integrates the software developed components dedicated to decision processes management, customer relation management and enterprise resources planning components. The platform offers support for an intelligent management of the business processes, of the manufacture flows, and of the enterprise resources. Some tools considered in the development of the platform are business management systems, business workflow analysis, business performance management, OLAP (Online Analytical Processing), data modeling, data visualisation, report servers, AJAX (Asynchronous JavaScript and XML) technology.

Keywords: Business Performance Management, dynamic interfaces, process modeling, data mining.


Title of the Paper: Fuzzy with LabVIEW Software for Reliability Prediction at Nuclear Complex System (NCS)

DOWNLOAD FULL PDF

Authors: Vasile Anghel

Abstract: The reliability level for a nuclear installation is given in generally by the technological process quality of operation and maintenance and in particular by a lot of technical, technological, economic and human factors. The maintenance role is fundamental for a nuclear installation. In the maintenance activity as in any dynamic area, appear continuously new elements which, sometimes, require new methods of approach, thus for considered installation that is a Nuclear Detritiation Plant (NDP) existent as part of National Research and Development Institute for Cryogenics and Isotopic Technologies – ICSI, Rm.Valcea, for assurance the reliability level in operation is proposed for predictive maintenance the theory fuzzy, entropy theory and software LabVIEW. The final aim is to achieve the best practices for maintenance of Plant that process tritium.

Keywords: simulation, nuclear, reliability, maintenance, LabVIEW.


Title of the Paper: Continuous Auditing System Based on Registration Center

DOWNLOAD FULL PDF

Authors: Huanzhuo Ye, Yuning He, Zhuoyuan Xiang

Abstract: With the acceleration of information technologies and the availability of online real-time information systems, a rapidly growing number of organizations are conducing business and publishing business and financial reports online and in real time. Real-time financial reports provided by continuous auditing technologies are likely to necessitate continuous auditing, so what continuous auditing technologies can be utilized to facilitate continuous auditing for the next generation of accounting systems has become very important. As one of emerging information technologies, Web services technology could be seen as a good way to facilitate continuous auditing. Relying on a number of components of Web services technology, we propose a Web-service-based model using a registration center for continuous auditing called the Web-service-based continuous auditing model (WSCAM). This continuous auditing mechanism would run in the auditee’s system and could be applied to provide assurance about specific business processes. In such a model, auditor could confirm specific information with the supplier of accounting materials for validation purpose, and auditee could provide specific financial information to the third party for their transaction. The frameworks and technologies which can support such a Web-service-based continuous auditing mechanism are described. The features are also presented to illustrate WSCAM.

Keywords: Continuous auditing; Web services; XML; XBRL GL, Registration center.


Title of the Paper: Implementation of a Network Sport Training Platform in E-Learning Information System

DOWNLOAD FULL PDF

Authors: Huay Chang

Abstract: In the earlier study paper, the author uses the corresponding information system technologies to present a newly teaching training method. Based on the E-Learning web-site and the network teaching, we use skilled system to establish the interactive Sport Teaching E-Learning structure. The proposed method provides a newly teaching model and an innovative learning point. In this paper, we implement the E-Learning Information System in the Network Sport Teaching E-Learning Platform and obtain some special features. The positive features of the Network Sport Teaching E-Learning Platform includes ‘The convenience of Learning Guide’, ‘The Characteristics of Individual Course Programs’, ‘The Multiple-types of Learning Contents’, ‘The Creation of Sport Groupware’ and ‘The Instant Interactive Phase’.

Keywords: E-Learning, information system, network, skilled system, web-site.


Title of the Paper: Intelligent Monitoring Of Containers - IMC

DOWNLOAD FULL PDF

Authors: Gabriela Rodica Hrin

Abstract: Intelligent monitoring of containers is an innovative and modern system dedicated to container management in multimodal transport being developed in Romania into an national research project. The system offers services for planning and real time survey of the container transport and transported freight. The system is an information system that support activities regarding freight mobility being dedicated to goods providers, goods buyers, brokers, road transport operators, railway transport operators, naval transport operators, air transport operators, assurance agencies, container owners, The technologies that have been used and integrated during system development are .Net, GPS (Global Positioning System), GIS (Geographical Information System), GSM (Global System for Mobile Communications).

Keywords: Goods multimodal transport, container monitoring, transport planning and surveying, Net, GPS, GIS, GSM.


Title of the Paper: Project Management Stage Mutations within Agile Methodological Framework Process Transformations

DOWNLOAD FULL PDF

Authors: Evangelos Markopoulos, Javier Bilbao, Eugenio Bravo, Todor Stoilov, Tanjia E. J. Vos, Carlo Figa Talamanca, Katrin Reschwamm

Abstract: Projects are living entities. They are born with the project idea and end with the project termination. The time in between can last for many years, in most of the cases, requiring continuous implementation and management effort. Over the time project changes on requirements change the implementation process and in turn the management process, the maintenance process and so on. In order to maintain qualitative and quantitative project results both the project implementation and management processes need to be adjusted in the overall project changes and environment. This adjustment can be made by using agile project management methodologies, defining processes based on the identification of the project goals, constraints and expatiations. Unfortunately that is not enough, and projects, especially software projects are still in implementation and management crisis. This paper presents the concept of process mutation on project management methodological frameworks as a supplementary method to the agile models and agility the concept.

Keywords: Project Management, Process Mutation, Agility, Process Framework.


Title of the Paper: Integrating Computer Aided Design and Computer Aided Process Planning: A Computational Techniques Model Approach

DOWNLOAD FULL PDF

Authors: Ionel Botef

Abstract: One of the most daunting challenges in Computer Integrated Manufacturing (CIM) is bridging the gap between Computer Aided Design (CAD) and Computer Aided Process Planning (CAPP). Past research into CAPP, considered one of the most important and most complicated computer aided systems, resulted in a wealth of knowledge but unresolved problems still exist. The actual CAPP systems are considered large, complex, and monolithic, with limited extensibility, low-level of integration with other applications, and high development and maintenance costs. Consequently, this paper focuses on a computational technique model for CAD/CAPP integration. Supported by authorities, evidence or logic, it is demonstrated that a limited number of important design and manufacturing features can be used to achieve an integrated product model that provides not only a direct interpretation of CAD data to the CAPP system, but supplies sufficient information for the generation of the correct process plan’s operations sequence. The approach simplifies engineering drawing’s information complexity, and offers better computability, reusability and improved communication between CAD and CAPP. As a result, the approach is used to develop software applications that apply object-oriented programming as a new way of thinking about solving CAD/CAPP problems and as a promising alternative to other techniques.

Keywords: CAD, CAPP, Computational Technique


Title of the Paper: UML Data Models From An ORM (Object-Role Modeling) Perspective. Data Modeling at Conceptual Level

DOWNLOAD FULL PDF

Authors: Daniel Ioan Hunyadi, Mircea Adrian Musan

Abstract: This paper provides an overview of Object-Role Modeling (ORM), a fact-oriented method for performing information analysis at the conceptual level. It provides both a graphical and textual languages and a procedure which guides the use of the languages. The article is structured in two main parts. The first part presents an overview of ORM along a real example, while the second part of the article makes a comparison between ORM and UML from the conceptual data modeling perspective. This paper examining data modeling in the Unified Modeling Language (UML) from the perspective of Object Role Modeling (ORM). It provided some historical background on both approaches, identified design criteria for modeling languages, and discussed how object reference and single-valued attributes are modeled in both. It compared UML multi-valued attributes with ORM relationship types, and discussed basic constraints on both, as well as instantiation using UML object diagrams or ORM fact tables. This third issue compares UML associations and related multiplicity constraints with ORM relationship types and related uniqueness, mandatory role and frequency constraints. It also contrasts instantiation of associations using UML object diagrams and ORM fact tables.

Keywords: Object-Role Modeling (ORM), FORML (Formal Object-Role Modeling Language), ER diagrams, CSDP, abstraction mechanism, semantic stability, semantic relevance, formal foundation.


Title of the Paper: Two Integration Flavors in Public Institutions

DOWNLOAD FULL PDF

Authors: Vlad Diaconita, Iuliana Botha, Adela Bara, Ion Lungu, Manole Velicanu

Abstract: Integration within public institutions is useful in better aligning the IT with the core processes, but also helps the various parts of the business work with each other better, enabling important business strategies like straight-through processing, improved public service through singe-view-of-customer portals, business activity monitoring and higher data quality. Portals and SOA can help this integration occur. In time, portals have evolved to meet the integration needs of companies. Even though not taken very seriously, they have slowly become leaders in turning new principles into practical experiences. In the beginning, portals focused on aggregating, organizing, and indexing unstructured data, but modern portals now do much more. A portal is a point of integration, useful to the organization by integrating internal business processes and by offering information to the outside world. The increased adoption of business process management (BPM) and Service-Oriented Architecture (SOA) initiatives are both driving portal usage.

Keywords: Portals, SOA, Web services, public institutions, dynamic reports.


Title of the Paper: Conceptual Framework on Risk Management in IT Outsourcing Projects

DOWNLOAD FULL PDF

Authors: Syaripah Ruzaini Hj Syed Aris, Noor Habibah Arshad, Azlinah Mohamed

Abstract: Outsourcing is becoming a trend nowadays. Malaysia also takes this opportunity and embraces in IT outsourcing. As a result, Malaysia has been ranked as the third most attractive destination for outsourcing after India and China. Despite increasing number of organizations that involve in IT outsourcing, it should be noted that IT outsourcing is not a panacea. It comes together with risks. The risks, if not managed, will lead to outsourcing failure. Even though other areas have adopted risk management as their patching material, the application of risk management in IT outsourcing was not quite accomplished. Risk management should be conducted in IT outsourcing as it will foresee risks that might disturb the smooth flowing of IT outsourcing and prevent or reduce the impact of risks if they occur. It should be conducted at early stage and should be continuously performed until the end of outsourcing life cycle. This paper presents a conceptual framework to manage risk in IT outsourcing. The framework will cover the process in risk management in IT outsourcing as well as the risk management principle that should be conducted at each and every phases of IT Outsourcing life cycle. A set of questionnaire was distributed to organizations to validate the conceptual framework. The findings showed that the consequences of not practicing risk management would result in poor controlling and managing of IT outsourcing projects. Based on the findings, future empirical and exploratory survey will be conducted and risk management in IT outsourcing framework will be developed.

Keywords: Risk Management, Malaysia, Analysis of Decision to outsource, Selection of Service Provider, Contract Management, On-Going Monitoring.


Title of the Paper: Computing and Modeling for Crop Yields in Burkina Faso Based on Climatic Data Information

DOWNLOAD FULL PDF

Authors: Yu-Min Wang, Seydou Traore, Tienfuan Kerh

Abstract: The crop yields deficit under rainfed condition is attributed to cumulative effects of low precipitation and inappropriate cropping calendar in Burkina Faso which is located in a dry tropical climate. An efficient use of agricultural water for gaining better productivity in African semi-arid region has been widely suggested based on a cropping calendar approach. Therefore, a suitable cropping calendar could be determined by using the relationship between water and yields in order to have better water management and crop output. This paper aims to model the crop water balance analysis by applying the climatic data information collected from 1995 to 2006 to a reference model and rainfall contribution index recently developed for Ouagadougou and Banfora of Burkina Faso. Also, after the analysis, the crop water yield function concept is used for establishing climatic data information model to examine the final output under different planting dates. From the results, it was found that the difference between potential and expected yields was causally affected by the planting dates applied. In addition, by comparing the maximum expected yields to the average values, the yields were reduced between 5 to 18% and 4 to 23% in Ouagadougou and Banfora, respectively. The difference is small when the planting dates are closer to the established suitable dates. The suitable cropping calendar determined using the model in this study should therefore be used to alleviate water shortage and yield deficit under rainfed condition. Finally, a low water consuming crop species coupled with suitable planting dates could be recommended for agriculture water management in African semi-arid region.

Keywords: Reference model, rainfall contribution index, climatic data information, modeling, yields, planting dates, water management


Title of the Paper: The Users Perceptions and Opportunities in Malaysia in Introducing RFID System for Halal Food Tracking

DOWNLOAD FULL PDF

Authors: Norman Azah Anir, Nasir Mohd Hairul Nizam, Azmi Masliyana

Abstract: The lack of information presented on the food packaging of specific food product usually lead to confusion, thus redundant unsold goods are stacked-up in the shopping market. Barcode, labels and ingredients information by far is not adequate to authenticate the validity of the food information claimed by the manufacturer or food producer. This long-established approach fails to inform the users and no longer fitting in this cyber world. Much work has been carried out to find the best solution to ensure information presented on the food packaging is true yet legitimate. In similar cases by big food store, shows the agility of RFID has assist them to better track their food status. By taking this example, we have carried out some studies to better understand the capability of RFID in tracking Halal status in Malaysia food market. This study is aimed to understand the Malaysian users’ perception on implementing a real-time tool in order to feed users with genuine and validated information in the user-buying process. Furthermore, by conducting this study, researcher can better understand and identify the market opportunities to deploy such technology to the Malaysia users. A quantitative approach was chosen to gather data from the users around Klang Valley and Kuala Lumpur, Malaysia. A survey form consisting of 32 questions were distributed to 50 to 60 identified users, where respondents were selected varies from Halal and non-Halal users. Graphs and tables are presented to depict the findings of users’ perception on the RFID tag for Halal Tracking in Malaysia. The results show 48% of the users agreed that a real-time system is required for the information dissemination. However, sadly only 34% knows what RFID is and what RFID can do in developing a real-time system for Halal tracking. Approximately 98% of the respondent agrees that a new tracking system is required for information traceability. This result shows clear opportunity to introduce new tools, nevertheless solid awareness activities are required to ensure the success of the new system.

Keywords: Halal information, Halal tracking, RFID, User tracking system.


Title of the Paper: Structured Data Representation Using Ruby Syntax

DOWNLOAD FULL PDF

Authors: Kazuaki Maeda

Abstract: This paper describes Ribbon (Ruby Instructions Becoming Basic Object Notation), a new representation written in a text-based data format using Ruby syntax. The design principle of Ribbon is good readability and simplicity of structured data representation. An important feature of Ribbon is an executable representation. Once Ribbon-related definitions are loaded into a Ruby interpreter, the representation can be executed corresponding to the definitions. Java programs are expected to read/write Java objects to persistent storage-media, or to traverse the structured data. A program generator was developed to create Ruby and Java programs from Ribbon definitions. In the author’s experience, productivity was improved in the design and implementation of programs that manipulate structured data.

Keywords: Data Representation, Structured Data, Domain Specific Languages, Ruby, Java.


Issue 6, Volume 5, June 2008


Title of the Paper: An analysis of the Research on Adaptive Learning: The Next Generation of e-Learning

DOWNLOAD FULL PDF

Authors: Elena Verdu, Luisa M. Regueras, Maria Lesus Verdu, Juan Pablo De Castro, Maria Angeles Perez

Abstract: This study examines the evidence for the effectiveness of adaptive learning and the satisfaction level of students when using this type of learning. It first analyses the different classifications of adaptive learning systems existing in the literature, to focus later on describing some adaptive and intelligent e-learning systems, mainly those included in the groups of Intelligent Tutoring Systems (ITS), Adaptive Hypermedia Systems (AHS) and Intelligent Collaborative Learning systems. Next, the Effect Size (ES) tool is adopted as a standard way to compare the results of one pedagogical experiment to another. ES is used to analyse the effectiveness of some of the systems previously described, in order to demonstrate that adaptive learning can provide significant improvements in the learning process of students. Secondly, the learners’ opinion is analysed in order to estimate their satisfaction and to know their preferred mode of studying. Finally, a number of conclusions and future trends are discussed.

Keywords: Adaptive learning, E-Learning, Intelligent Tutoring Systems, Intelligent Collaborative Learning, Intelligent Educational Systems, Adaptive Hypermedia Systems, Learning effectiveness.


Title of the Paper: Multimedia Applications and their Benefit for Teaching and Learning at Universities

DOWNLOAD FULL PDF

Authors: Eva Milkova

Abstract: Multimedia applications together with individual approaches within the didactic process substantially influence education. They give us an excellent chance how to support not only demonstrating and visualizing the explained subject matter to be much clearer and comprehensible, but also enable us to prepare such study material for students that optimizes their study habits. The top applications of multimedia are represented by virtual reality. Well organized and fulfilled virtual learning environment has been becoming important part of teaching and learning. On a few examples of multimedia products created by our students on a script given by the author of this paper we discus their benefit when explaining and visualizing the subject matter and testing knowledge of students through several kinds of self-tests and we also mention advantages of the professional virtual learning environment containing such study material.

Keywords: Multimedia study material, virtual learning environment, self-preparation of students, on-line testing


Title of the Paper: Using Formal Concept Analysis to Design and Improve Multidisciplinary Clinical Processes

DOWNLOAD FULL PDF

Authors: Telung Pan, Yunchun Tsai, Kwoting Fang

Abstract: Recent changes in health care have focused attention on new tools for planning and managing clinical processes. Clinical process employ a concept long used in other industries: the explicit design and documentation of a process. However, the knowledge driven perspective is seldom used when modeling or redesigning a process. Using formal concept analysis, we propose a knowledge management perspective to provide a method for modeling and designing a new multidisciplinary clinical process, in which different medical specialist coordinate the treatment of specific groups of patients and improve the medical quality.

Keywords: Multidisciplinary clinical process, Formal concept analysis, Process modeling


Title of the Paper: Analytical Study of Object Components for Distributed and Ubiquitous Computing Environment

DOWNLOAD FULL PDF

Authors: Usha Batra, Deepak Dahiya, Sachin Bhardwaj

Abstract: The Distributed object computing is a paradigm that allows objects to be distributed across a heterogeneous network, and allows each of the components to interoperate as a unified whole. A new generation of distributed applications, such as telemedicine and e-commerce applications, are being deployed in heterogeneous and ubiquitous computing environments. The objective of this paper is to explore an applicability of a component based services in ubiquitous computational environment. While the fundamental structure of various distributed object components is similar, there are differences that can profoundly impact an application developer or the administrator of a distributed simulation exercise and to implement in Ubiquitous Computing Environment.

Keywords: Ubiquitous Computing, one.world, COM, DCOM, RMI, CORBA, SOAP


Title of the Paper: The Design of Interactive Conversation Agents

DOWNLOAD FULL PDF

Authors: Ong Sing Goh, Chung Che Fung

Abstract: Interactive conversation agents or CAs are computer programs or application software designed to simulate conversation with one or more human users in natural language. Providing CAs with knowledge, intelligence and humanoid interface has allowed them to be used in several practical applications. This paper presented the development and its performance of the interactive CAs called Artificial Intelligent Naturallanguage Identity or AINI.

Keywords: Conversation Agents (CAs), Artificial Intelligence (AI), Artificial Intelligent Natural-Language Identity (AINI), Natural Language Processing (NLP)


Title of the Paper: Semantic Approach to Knowledge Processing

DOWNLOAD FULL PDF

Authors: Mladen Stanojevic, Sanja Vranes

Abstract: The processing of semantic information requires the adequate knowledge representation and ability to interpret semantically related knowledge. The majority of present day approaches to knowledge representation and processing are based on symbolic approach, i.e. on describing the meaning of represented domain knowledge and procedural knowledge used to process this domain knowledge. Hierarchical Semantic Form (HSF) implements the semantic approach to semantic knowledge representation and processing, which is not based on naming as a means to describe the meaning of the knowledge, but on semantic contexts that enable an implicit way to define the meaning of represented knowledge, and on simple and complex semantic categories used to interpret the semantics of represented knowledge. HSF facilitates the automatic translation of knowledge expressed in natural language into structured form and vice versa with no loss of information and its processing including natural language understanding, semantic search and question answering.

Keywords: Semantic Knowledge Processing, Knowledge Representation, Connectionist Model, Question Answering


Title of the Paper: Conducting Fuzzy Division by using Linear Programming

DOWNLOAD FULL PDF

Authors: Murat Alper Basaran, Cagdas Hakan Aladag, Cem Kadilar

Abstract: Some approximation methods have been proposed for fuzzy multiplication and division in the literature. Instead of doing arithmetic operations using fuzzy membership functions for fuzzy numbers, parameterized representation of fuzzy numbers have been used in arithmetic operations. The most applied parameterized fuzzy numbers used in many of the research papers are symmetric and asymmetric triangular and trapezoidal fuzzy numbers. In this study, we propose a new approximation method based on linear programming for fuzzy division. In order to show the applicability of the proposed method, some examples are solved using the proposed method and the results are compared with those generated by other methods in the literature. The proposed method has produced better results than those generated by the others.

Keywords: Approximation method; Fuzzy arithmetic; Fuzzy division; Linear programming; Triangular fuzzy number


Title of the Paper: A Graph-Segment-Based Unsupervised Classification for Multispectral Remote Sensing Images

DOWNLOAD FULL PDF

Authors: Nana Liu, Jingwen Li, Ning Li

Abstract: With more applications of multispectral remote sensing images, how to effectively and correctly make automated classification of multispectral images is still a great challenge. Utilizing both spatial contextual information and spectral information can achieve better classification performance. In order to make better utilization of the spatial contextual information, we apply graph model to the multispectral image, and use graph-based segmentation to produce units of pixels for further classification. In this paper, we present an unsupervised approach for multispectral remote sensing image classification with graph-based segment and fuzzy c-means clustering. Our method mainly involves following steps: First, represent image as graph H = (V,E) based on the feature vector of per pixel and the relationships among neighboring pixels, and segment the graph into groups of sub-regions as basic object units using the effective graph segmentation algorithm. Then according to those global feature vectors of sub-regions, the fuzzy c-means clustering is used to obtain the classification map based on these sub-regions. Experiments shows the results by different segmentation scales, and then turn out that the approach proposed in this paper can achieve better accuracy and efficiency.

Keywords: Multispectral image; Segment-based classification; Graph-based segmentation; Fuzzy c-means; Unsupervised classification; Remote sensing images classification


Title of the Paper: Organizational Aspect of Trusted Legally Valid Long-Term Electronic Archive Solution

DOWNLOAD FULL PDF

Authors: Helena Halas, Jan Porekar, Tomaz Klobucar, Aleksej Jerman Blazic

Abstract: Due to increase of electronic business and business process dematerialization organizations are facing today a problem of preserving vast amounts of electronic documents in coherent and trustworthy manner. A large amount of digital documents are produced every day even in small and medium-sized companies. The documents range from simple receipts to complex legal contracts and service level agreements. Many such documents need to be stored and preserved for longer period of time. Some services and technical solutions providing long term proofs of authenticity, integrity and non-repudiation of electronic documents are available on the market today. In order for these technical electronic archiving solutions and services to be successfully adopted by organizations they need to be deployed in a proper operational and organizational manner. Beside this organization needs to establish required operational procedures and to operate in accordance with them to assure that trusted electronic archive is legally valid. In this paper we present the first set of organizational approaches that organizations need to utilize in order to successfully integrate the operational and legal aspects of electronic archiving and to change the business processes accordingly. Following the approach of pattern oriented organizational design we capture the organizational trusted archiving solutions and best practices in the form of patterns, providing the context of the problem, the generic solution captured in the form of organizational diagrams, and preconditions that need to be met by the organization, and dependencies on other patterns are described. Finally the paper presents implementation of the generic solution to different organizations’ contexts and indicates influence of different applications of the pattern to further solution development.

Keywords: electronic archive, long-term preservation, security, legal compliance, durable integrity, durable authenticity, organizational patterns


Title of the Paper: Reinforcing the Concept of Calculating Isotope Pattern Using Theoretical Isotope Generator (TIG)

DOWNLOAD FULL PDF

Authors: Massila Kamalrudin, Soong Hoong Cheng, Azlianor Abdul Aziz, Muhammad Suhaizan Sulong

Abstract: This paper describes how the isotope patterns are calculated for chemists, students, lecturers and researchers using Theoretical Isotope Generator (TIG) integrated from the .NET framework (specifically VB.NET) with the data from the dual databases (Microsoft Access and Microsoft SQL 2000). Accordingly, TIG in terms of its functionality and features is an application developed to gain related information on molecules and their relative intensity for educational purposes (chemists, students, lecturers and researchers). Although various mass spectrometer applications are available as web-based and windows-based systems, the projected software is indeed practical, beneficial and constructive for the academic learners as well for the intellectual researchers for rapidly defining the numbers of the possibility isotope patterns obtainable from a substance(chemical compound) for example methane (CH2). Therefore, TIG with the mathematical application called Cartesian Products is used to obtain the isotope patterns of any atom or molecules. TIG provides extra features than others that are proficient to retrieve the information of the mass (atomic/molecular weight) from the substance specified based from the isotope patterns available. Additionally, TIG is completely with several functionalities such as drawing, normalizing and zooming the generated graph that convey with the molecular information in a number of formats by providing the details of the calculation and molecules.

Keywords: Isotope pattern, Cartesian Products, Calculation, Engine, Isotopic Distribution and Theoretical Isotope Generator (TIG)


Title of the Paper: The Design and Implementation of Background Pass-Go Scheme Towards Security Threats

DOWNLOAD FULL PDF

Authors: L. Y. Por, X. T. Lim, M. T. Su, F. Kianoush

Abstract: Currently, access to computer systems is often based on the use of alpha-numeric. The textual passwords or alpha-numeric passwords have been the basis of authentication systems for centuries. Similarly, it had also been the major attraction for crackers and attackers. However, users tend to face difficulty in remembering a password that is considered as secured password because this type of secured password usually has long string of characters and they appear randomly [14]. Hence, most users tend to create simple, short and insecure passwords. As a consequence, most of the time, the usability level of passwords has not achieved an optimum for a secured password [14]. In order to solve this problem, a new password scheme had been invented, known as Graphical Password System (GPS). Graphical password is an alternative mean of authentication for login intended to be used in place of conventional password; it utilizes images instead of text. In this paper, we discuss the design and intention of our proposed scheme, called Background Pass-Go (BPG). BPG is an improved version of Pass-Go, as it keeps most of the advantages of Pass-Go and achieves better usability. We had analyzed the BPG scheme in terms of 1) how BPG is able to improve other schemes of GPS especially in Pass-Go, 2) how BPG acts as a solution to different types of threats to networked computer systems. We had verified that BPG manages to overcome the shortage of other GPS schemes. Moreover, the BPG also manages to address most of the security threats for the network security system.

Keywords: BPG, Background Pass-Go, Pass-Go, GPS, Graphical Passwords System, Security.


Title of the Paper: Ontology based Framework for Data Integration

DOWNLOAD FULL PDF

Authors: Alberto Salguero, Francisco Araque, Cecilia Delgado

Abstract: One of the most complex issues of the data integration is the case where there are multiple sources for the same data element. It is not easy to generate and maintain the integrated scheme. In this paper we describe a framework which encompasses the entire data integration process. The data source schemas as well as the integrated schema are expressed using an extension of an ontology definition language which allows the incorporation of metadata to support the integration process. The proposed model allows the user to concentrate in modeling the problem itself and not in the issues of dealing with the temporal and the spatial aspects concerning to many of the data sources usually used in the enterprises information systems.

Keywords: temporal model, data integration, ontology, OWL, metadata, enterprise information system.


Title of the Paper: Multiple Linear Regression in Forecast the Number of Asthmatics

DOWNLOAD FULL PDF

Authors: Darmesah Gabda, Zainodin Hj Jubok, Kamsia Budin, Suriani Hassan

Abstract: The objective of this study was to determine the association between the number of asthmatic patients in Kota Kinabalu, Sabah with the air quality and meteorological factors using multiple linear regression. The main eight independent variables with the fourth order interactions were included in the model. There were 80 possible models considered and the best model was obtained using the eight selection criteria (8SC). The result showed that the best model would represent the cause of the rise in the number of asthmatics modeled by M80.23.

Keywords: multiple regression, eight selection criteria, fourth-order interaction, best model, asthma.


Title of the Paper: Comparitive Analysis of Fuzzy Decision Tree and Logistic Regression Methods for Pavement Treatmenr Prediction

DOWNLOAD FULL PDF

Authors: Devinder Kaur, Haricharan Pulugurta

Abstract: Data mining is the process of extraction of hidden predictive information from large databases and expressing them in a simple and meaningful manner. This paper explains the use of Fuzzy logic as a data mining process to generate decision trees from a pavement (road) database obtained from Ohio Department of Transportation containing historical pavement information from 1985 to 2006. Generally there are many attributes in the pavement database and often it is a complicated process to develop a mathematical model to classify the data. This study demonstrates the use of fuzzy logic to generate decision tree to classify the pavement data. Further, the fuzzy decision tree is then converted to fuzzy rules. These fuzzy rules will assist decision-making process for selecting a particular type of repair on a pavement based on its current condition. The fuzzy decision tree induction method used is based on minimizing the measure of classification ambiguity for different attributes. These models overcome the sharp boundary problems, providing soft controller surface and good accuracy dealing with continuous attributes and prediction problems. This method was compared with common logistic regression model for predicting the pavement treatment. The results show that the fuzzy decision method outperforms the logistic regression model by 10%. The fuzzy decision tree method generates the rules, which gives the better understanding of the relationship between the parameters and the pavement treatment prediction.

Keywords: Pavement Management, Classification Ambiguity, fuzzy ID3, Logistic Regression


Title of the Paper: Modeling Reference Evapotranspiration by Generalized Regression Neural Network in Semiarid Zone of Africa

DOWNLOAD FULL PDF

Authors: Seydou Traore, Yu-Min Wang, Tienfuan Kerh

Abstract: This paper investigates for the first time in Burkina Faso, the potential of using an artificial neural network (ANN) for reference evapotranspiration (ETo) estimation. The ANN algorithm generalized regression neural network (GRNN) was selected for its ability to model the ETo from minimum climatic data. The irrigation management in Burkina Faso still faced to climatic data unavailability for estimating the ETo with the recommended Penman-Monteith (PM) equation. Recently, to overcome the climatic data unavailability difficulty, a reference model for Burkina Faso (RMBF) using only temperature as input has been developed for irrigation management purpose in two production sites, Banfora and Ouagadougou. In this study, four alternative methods to PM, including GRNN, RMBF, Hargreaves (HRG) and Blaney-Criddle (BCR) were employed to study their performances in three production sites, Dori, Bogande and Fada N’gourma. The minimum climatic data were set to the maximum and minimum air temperature as input variables collected from 1996 to 2006. The results revealed that, RMBF, HRG and BCR overestimated the ETo and showed poor performance. In addition, GRNN performance was higher than RMBF, HRG and BCR. Finally, wind has been determined as a sensitive parameter in the ETo estimation for the areas studied. Obviously, using GRNN with minimum climatic variables for ETo estimation is more reliable than the other alternative methods. It is possible to estimate ETo by using ANN in semiarid zone of Africa.

Keywords: Evapotranspiration, estimating, GRNN, minimum climatic data, semiarid zone, irrigation management.


Title of the Paper: Development of a Learning Content Management System

DOWNLOAD FULL PDF

Authors: Lejla Abazi-Bexheti

Abstract: Change appears to be the only constant in the field of ICT and what was treated as advanced feature few years ago is today old-fashioned. If dealing with such rapid change in the field is increasingly difficult and complex, it is even more complicated when one tries to simplify the concepts and processes and define the learning system’s model and the features that would contribute to a more effective teaching and learning. As part of the research project team, which aims to develop software for Learning Content Management System at SEE University, we primarily had to select the features that would cover our needs and also comply with the actual trends in this area of software development, and then design and develop the system. In this paper we present the in house development of an LCMS for South East European University, its architecture, conception and strengths.

Keywords: e-learning, LCMS, e-learning systems, conceptual design, architecture, system modules


Title of the Paper: Network Structure Mining: Locating and isolating core members in covert terrorist networks

DOWNLOAD FULL PDF

Authors: Muhammad Akram Shaikh, Wang Jiaxin

Abstract: Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure mining is especially suitable for mining a large volume of association data to discover hidden structural patterns in criminal networks. Covert networks share some features with conventional (real world) networks, but they are harder to identify because they mostly hide their illicit activities. After the September 11, 2001 attacks, social network analysis (SNA) has increasingly been used to study criminal networks. However, Finding out who is related to whom on a large scale in a covert network is a complex problem. In this paper we will discuss how network structure mining is applied in the domain of terrorist networks using structural (indices) measures or properties from social network analysis (SNA) and web structural mining research and proposed an algorithm for network disruption. Structural properties are determined by the graph structure of the network. These structural properties are used for locating and isolating core members by using importance ranking score and thereby analyzing the effect to remove these members in terrorist networks. The discussion is supported with a case study of Jemma Islamiah (JI) terrorist network.

Keywords: Networks, Centrality, Dependency, Rank, Influence, and Destabilization.


Title of the Paper: Classification of Personal Arabic Handwritten Documents

DOWNLOAD FULL PDF

Authors: Salama Brook, Zaher Al Aghbari

Abstract: This paper presents a novel holistic technique for classifying Arabic handwritten text documents. The classification of Arabic handwritten documents is performed in several steps. First, the Arabic handwritten document images are segmented into words, and then each word is segmented into its connected parts. Second, several structural and statistical features are extracted from these connected parts and then combined to represent a word with one consolidated feature vector. Finally, a generalized feedforward neural network is used to learn and classify the different styles/fonts into word classes, which are used to retrieve Arabic handwritten text documents. The extraction of structural and statistical features from the individual connected parts as compared to the extraction of these features from the whole word improved the performance of the system.

Keywords: Data mining of Arabic text, Word recognition, Arabic handwriting, Segmentation of Arabic handwritten documents, Feature extraction, Classification, and Retrieval of Arabic handwritten documents


Title of the Paper: Localization of Distributed Data in a CORBA-based environment

DOWNLOAD FULL PDF

Authors: Milko Marinov, Svetlana Stefanova

Abstract: Query processing over distributed and fragmented databases is more challenging than doing so in a centralized environment. In a distributed environment, the DBMS needs to know where each node is located. The main role of data localization layer is to localize the query’s data using data distribution information. We propose an approach to incorporate the artificial intelligence techniques into a distributed database management system (DBMS), namely to extend the core of a distributed CORBA-based environment with deductive functionalities of the query and view services during the process of data localization. The basic principles and the architecture of the software tool are considered. The implementation and class hierarchy of the objectoriented theorem prover which is built in the core of distributed CORBA-based system are also discussed.

Keywords: Distributed systems, Data localization, CORBA-based architecture, Theorem prover.


Title of the Paper: Issues in the Implementation of Software Process Improvement Project in Malaysia

DOWNLOAD FULL PDF

Authors: Mohd Hairul Nizam Md. Nasir, Rodina Ahmad, Noor Hafizah Hassan

Abstract: Software Process Improvement (SPI) became known in the last twenty years. SPI is crucial to augment software process capabilities in software companies to face present demanding and global market. There were numerous published studies in United States, Europe, Australia and North America. Yet, there was still being short of research and published studies on SPI in Malaysia. This research attempts to fill this gap by focusing to analyze the resistance factors that de-motivate the implementation of SPI project specifically software companies operated in Malaysia. This research has been conducted during March 2008 until August 2008 and it used a survey instrument to gather data from 39 companies operated across Malaysia with the total of 251 professionals responded. The findings showed that organizational factors specifically human factors are playing an important role in determining the success of the SPI project. Participation and commitments from all individuals across the organization are also vital and imperative to ensure success for SPI initiative.

Keywords: Software Process Improvement, Resistance Factors, SPI Implementation, SPI in Malaysia


Title of the Paper: A Fuzzy AHP Application on Evaluation of High-Yield Bond Investment

DOWNLOAD FULL PDF

Authors: Chen-Yu Lee, Jao-Hong Cheng

Abstract: The returns and risks of high-yield bond (HYB) lie between the stocks and Treasury bonds. In view of investment opportunities and the rate of return, the advantages of HYB are both lower risks and higher shares. Therefore, HYB has become one of important components in the portfolios. The purpose of this study is to identify critical factors related to the selection of HYB. Primary criteria to evaluate HYB selection are obtained by the literatures survey and applying fuzzy Delphi method (FDM), and then fuzzy analytic hierarchy process (FAHP) is employed to calculate the weights of these criteria, so as to build the fuzzy multi-criteria model of HYB investment. The results indicate a greatest weight on the dimension of economic environment, and three critical evaluation criteria related to HYB selection are: (1) spread versus Treasury, (2) bond callability, and (3) default rate indicator.

Keywords: High-Yield Bond, Portfolio Management, Credit Rating, Financial Failure, Analytic Hierarchy Process (AHP), Fuzzy Delphi Method (FDM), Fuzzy Analytic Hierarchy Process (FAHP).


Title of the Paper: Adapting Software Engineering Design Patterns for Ontology Construction

DOWNLOAD FULL PDF

Authors: Stanislav Ustymenko, Daniel Schwartz

Abstract: In this paper, we present an argument for designing metadata schemata with design patterns. Design patterns are structured descriptions of solutions to some class of problems, and are used extensively in various stages of object-oriented software engineering. We present a use case of collaborative construction of metadata for a digital library. We explore design challenges this scenario presents and then adapt a pattern called Composite from a standard software engineering design patterns reference to address parts of these challenges. Additionally, we propose a new design pattern called History suggested by a collaborative metadata construction scenario and applicable to a wider class of problems in metadata design.

Keywords: Design Patterns, Knowledge Engineering, Object-Oriented Design, Semantic Metadata, Web Ontology


Title of the Paper: Towards a Flexible Tool for Supporting Data Collection & Analysis in Personal Software Process (PSP)

DOWNLOAD FULL PDF

Authors: Mohd Hairul Nizam Md Nasir, Azah Anir Norman, Noor Hafizah Hassan

Abstract: Personal Software Process (PSP) ultimately provides software engineers an excellent framework and practice that can help them to improve the quality of their work, by analyzing their performance statistically and helping them to achieve realistic goals set by them. Besides, PSP offers many benefits to software engineers. However, through findings and studies, it is found that the Personal Software Process adoption problem may be caused by the overhead in data collection, manual execution in data analysis, and inflexibility of process definition. This paper presents in details the factors that influence the PSP adoption problem and explains the need for automated tool to support the adoption of PSP. It is believed that with the highly flexible automated tool support, it can give the flexibility to the software engineers to manage their process definition rather than staying freeze. Other than that, it can minimize the overhead during the data collection and data analysis phases. Software engineers should be easily monitors, measure and improve their software development process by using other additional features provided by this tool.

Keywords: Personal Software Process, PSP, Automated Tool, Software Process, Flexible Tool.


Issue 7, Volume 5, July 2008


Title of the Paper: Modeling and Development of the Real-time Control Strategy For Parallel Hybrid Electric Urban Buses

DOWNLOAD FULL PDF

Authors: Yuanjun Huang, Chengliang Yin, Jianwu Zhang

Abstract: This paper proposes a feed-forward control model for SWB6105 parallel hybrid electric urban bus (PHEUB) by using Matlab/Simulink. In order to optimize the fuel economy, balance the battery state of charge (SOC), and satisfy the requirements of the vehicle performance and drivability as well, a logic threshold torque distribution control strategy (LTTDCS) incorporating with an instantaneous optimization algorithm was developed for the PHEUB. Bench tests results for the key components of the hybrid powertrain are selected as reliable references in the modeling. The control strategy is validated by the simulation results of the engine, the motor and the battery in terms of fuel economy and deviations of battery SOC.

Keywords: Parallel hybrid electric urban bus (PHEUB), Hybrid powertrain, Hybrid system modeling, Logic threshold torque distribution control strategy (LTTDCS), Instantaneous optimization algorithm, Real-time control


Title of the Paper: Combinatorial Effect of Various Features Extraction on Computer Aided Detection of Pulmonary Nodules in X-ray CT Images

DOWNLOAD FULL PDF

Authors: Noriyasu Homma, Kazunori Takei, Tadashi Ishibashi

Abstract: In this paper, we propose a new method for computer aided detection of pulmonary nodules in X-ray CT images to reduce false positive rate under high true positive rate conditions. An essential part of the method is to extract and combine two novel and effective features from the original CT images: One is orientation features of nodules in a region of interest (ROI) extracted by a Gabor filter, while the other is variation of CT values of the ROI in the direction along body axis. By using the extracted features, pattern recognition techniques can then be used to discriminate between nodule and non-nodule images. Simulation results show that discrimination performance using the proposed features is extremely improved compared to that of the conventional method.

Keywords: Computer aided diagnosis, Lung cancer, Pulmonary nodules, Feature extraction, Image recognition, X-ray CT images


Title of the Paper: Multi-Grid Background Pass-Go

DOWNLOAD FULL PDF

Authors: L. Y. Por, X. T. Lim

Abstract: Computer security depends largely on passwords to authenticate the human user for access to secure systems. Remembering the password they have chosen is a frequent problem for all users. As a result, they tend to choose short and insecure passwords as compared to secure passwords which usually consist of a long mixture of random alphanumeric and non-alphanumeric characters. Thus, the tendency of choosing insecure passwords has brought up many security problems. Graphical password is an alternative to replace alphanumeric password in which users only have to click on the images in order to authenticate themselves rather than typing alphanumeric strings. The main objectives of this paper are to present a classification of graphical passwords system (GPS) and identify its future research area. In this paper, we attempt to identify a number of threats to the networked computer systems, focus on the research of graphical password system (GPS) and analysis on some aspects of GPS; 1) how each GPS algorithm works, 2) the advantages and disadvantages of each GPS algorithm, 3) how each GPS algorithm is able to address solutions to the threats. Besides, the paper also concentrates on the design and the implication of a proposed prototype, namely Multi-Grid Background Pass-Go (MGBPG) which is targeted to be its strength and the winning edge over other graphical password systems. The preliminary result and analysis of the proposed prototype is then presented by comparing it on its role in addressing the drawbacks of current existing GPS and several security attacks. Finally, we highlight a few aspects, which need to be improved in the future to overcome the deficiencies of previous GPS methods that have been invented.

Keywords: GPS, Graphical Password System, Background Pass-Go, BPG, Multi-Grid Background Pass-Go, MGBPG, Password, Authentication, Threat.


Title of the Paper: Learning Schemes in Using PCA Neural Networks for Image Restoration Purposes

DOWNLOAD FULL PDF

Authors: Ion Rosca, Luminita State, Catalina Lucia Cocianu

Abstract: Image restoration methods are used to improve the appearance of an image by application of a restoration process that uses a mathematical model for image degradation. The restoration can be viewed as a process that attempts to reconstruct or recover an image that has been degraded by using some a priori knowledge about the degradation phenomenon. Principal component analysis allows the identification of a linear transformation such that the axes of the resulted coordinate system correspond to the largest variability of the investigated signal. The advantages of using principal components reside from the fact that bands are uncorrelated and no information contained in one band can be predicted by the knowledge of the other bands, therefore the information contained by each band is maximum for the whole set of bits. The multiresolution support set is a data structure suitable for developing noise removal algorithms. The multiresolution algorithms perform the restoration tasks by combining, at each resolution level, according to a certain rule, the pixels of a binary support image. The multiresolution support can be computed using the statistically significant wavelet coefficients. We investigate the comparative performance of different PCA algorithms derived from Hebbian learning, lateral interaction algorithms and gradient–based learning for digital signal compression and image processing purposes. The final sections of the paper focus on PCA based approaches for image restoration tasks based on the multirezolution support set as well as on PCA based shrinkage technique for noise removal. The proposed algorithms were tested and some of the results are presented and commented in the final part of each section.

Keywords: dimensionality reduction, image restoration, shrinkage functions, neural networks


Title of the Paper: Knowledge Management in the HR Sector of RD Organizations

DOWNLOAD FULL PDF

Authors: Valentina Janev, Ana Dokic, Marija Minic, Sanja Vranes

Abstract: This paper presents a solution for managing the specific HR assets in research organizations, i.e. the scientific track record of scientists and researchers. The solution has already been installed at the Mihajlo Pupin Institute (MPI) in Belgrade as a part of the knowledge management initiative started a few years ago. It is based on SAP Human Capital Management (HCM) solution that ensures standardized integration and automation of HR activities and provides a wide range of reporting options. However, as standard SAP HCM solution does not cover the specific aspects of the R&D business process, the additional functionalities were built upon the standard SAP system in order to keep an extensive record of the employee professional and scientific life including scientific and professional skills and expertise, degrees and certificates obtained, information about engagements in concrete projects with details about their roles and competences, scientific achievements (patents, technical solutions, scientific papers / books), other achievements / awards, etc. The new functionalities were build taking into consideration the recommendations of Serbian Ministry of Science for compilation of the Researchers file. The new HCM solution is used for analysis and reporting indoors, as well as towards Serbian Ministry of Science and Statistical Office of the Republic of Serbia. Moreover, CVs of researchers are also kept in several standard forms (European Commission, World Bank, Microsoft, etc), facilitating preparation of international project proposals and bidding material. In this paper we discuss the implementation aspects of the solution, as well as the lessons learned and the benefits gained.

Keywords: knowledge management, scientific track record, R&D organization, SAP HCM, ontology, integrated KM platform


Title of the Paper: A Lightweight Buyer’s Trust Model for Micropayment Systems

DOWNLOAD FULL PDF

Authors: Samad Kardan, Mehdi Shajari

Abstract: In this paper we present a trust model for an enhanced version of MR2 micropayment scheme. We named this scheme TMR2. TMR2’s light-weight trust model is based on user polling, sales volume and vendor’s reputation. We claim that TMR2 can solve the mind barrier problem, which will result in the expansion of micropayment usage. The new token proposed to handle trust is a certificate called Rating certificate. We propose a new Rating certificate for merchants to support users’ trust. Our proposed purchase process needs validation of this certificate, therefore, compared to MR2, the proposed scheme needs only one extra on-line digital signature validation. This validation adds less than 4 percent computational overhead in the purchase process, which is acceptable, considering the benefits that users will gain.

Keywords: User Trust Model, MR2 Micropayment Scheme, Micropayment Schemes, Computational Trust.


Title of the Paper: Correlational Analysis of Layered Superconducting Cuprates

DOWNLOAD FULL PDF

Authors: Vlad Grigore Lascu, Lidia Petrova, Cristina Zarioiu, Anca Novac

Abstract: The paper is a review based on a three level correlational analysis of the behaviour of one compound, of a homologous series and a third interseries multiparametrical analysis, revealing multiple correlation between the critical temperature value and different bond lengths versus the oxygen content. It is described an experimental setup for Tc measurements. A unifying structural scheme of all layered superconducting cuprates is proposed.

Keywords: Superconductivity, Layered cuprates, Homologous series, Correlational analysis, Mercury compound.


Title of the Paper: Analytical and Numerical Results for Detecting Attractors

DOWNLOAD FULL PDF

Authors: Mirela-Catrinel Voicu

Abstract: In this paper we present some qualitative and quantitative results for a particular type of k-order exchange rate models. These results concern the existence of attractors: the fixed point, its stability and its attraction domain, period-p cycles, limit cycles and chaotic attractors. Given the nonlinear nature, the dynamics of these systems cannot be detected using only analytical tools. For this reason, in the last section, we make numerical simulations and we present some examples. The algorithms implementation is made using VBA (Visual Basic for Applications) program in Excel, and the images of the figures in this paper are made using Mathematica.

Keywords: Nonlinear system, Attractors, Numerical Simulations, Programming, VBA & Excel.


Title of the Paper: Line Detection Techniques for Automatic Content Conversion Systems

DOWNLOAD FULL PDF

Authors: Costin-Anton Boiangiu, Bogdan Raducanu

Abstract: In an image processing application there is often need to identify and extract different morphological elements such as characters or lines. This paper studies one general method of identifying vertical or horizontal lines. However, the techniques described here can be used to detect other analytical objects like circles, or even ellipses. Line Detection is an important add-on to an automatic content conversion system which builds digital documents from scanned papers. After identifying lines, other layout elements can be extracted: columns, paragraphs, tables, headers. The present paper is a study of the Hough Transform for which several new enhancements are introduced.

Keywords: Automatic content conversion, Line detection, Edge detection, Hough transform, Feature extraction


Title of the Paper: 3D Mesh Simplification Techniques for Image-Page Clusters Detection

DOWNLOAD FULL PDF

Authors: Costin-Anton Boiangiu, Bogdan Raducanu

Abstract: Entity clustering is a vital feature of any automatic content conversion system. Such systems generate digital documents from hard copies of newspapers, books, etc. At application level, the system processes an image (usually in black and white color mode) and identifies the various content layout elements, such as paragraphs, tables, images, columns, etc. Here is where the entity clustering mechanism comes into play. Its role is to group atomic entities (characters, points, lines) into layout elements. To achieve this, the system takes on different approaches which rely on the geometrical properties of the enclosed items: their relative position, size, boundaries and alignment. This paper describes such an approach based on 3D mesh reduction.

Keywords: automatic content conversion, document digitization, layout identification, entity clustering, mesh reduction, heightmaps, terrain, level of detail


Title of the Paper: Internet Congestion Control Model

DOWNLOAD FULL PDF

Authors: Gabriela Mircea

Abstract: In this paper, we consider an Internet model with n access links, which respond to congestion signals from the network, and study the bifurcation of such a system. By choosing the gain parameter as a bifurcation parameter, we prove that a Hopf bifurcation occurs. The stability of bifurcating periodic solutions and the direction of the Hopf bifurcation are determined by applying the normal form theory and the center manifold theorem. Finally a numerical example is given to verify the theoretical analysis.

Keywords: Internet model, Hopf bifurcation, feedback delay, numerical simulation


Title of the Paper: Blending Implicit Shapes Using Fuzzy Set Operations

DOWNLOAD FULL PDF

Authors: Qingde Li, Jie Tian

Abstract: Implicit modelling is a powerful technique to design geometric shapes, where a geometric object is described by a real function. In general, the real functions used in implicit modelling are unbounded and can take any values in space R. In general, the shapes described by different level sets of an unbounded implicit function can be varied significantly and are very unpredictable. In addition, allowing the underlying implicit function to take negative values also makes the construction of shape blending operations a difficult task. In this paper, we propose an implicit shape modelling technique, where each implicit shape is represented as the membership function of a fuzzy set which is bounded and nonnegative with value taken in [0, 1]. The most obvious benefit of representing an implicit shape as fuzzy set is that the blending of a set of implicit shapes is simply a problem of aggregating a set of fuzzy sets, which can be done in various ways by choosing a proper fuzzy set aggregation operator from a wide variety of fuzzy set operations.

Keywords: Implicit curves and surfaces, isosurfaces, blending operations, Generalized algebraic operations, Piecewise algebraic operations, Fuzzy sets, Soft computing


Title of the Paper: Identifying Web Strategies for Large-Scale Firms

DOWNLOAD FULL PDF

Authors: Tuncay Bayrak

Abstract: The World Wide Web has become increasingly important in helping businesses stay competitive. Hence, in the current business environment, it is essential for large firms in established industries to take advantage of the Web and all it has to offer in order to stay competitive. Integrating the Web into business processes may enable companies to operate more effectively and efficiently while doing the same things that they have always done before. While the Web has transformed many industries, organizations need to make conscious and informed decisions on what aspects of the Web they believe will positively impact their organizations. Our goal is to provide a framework in addressing issues of how to use the Web as a platform to develop various strategies. This research will address various web strategies that can be used by large organizations to support various business functions.

Keywords: Internet, Strategy, Web, Organizational Goals, Integration.


Title of the Paper: A Method for Modeling Service Management of e-Learning

DOWNLOAD FULL PDF

Authors: Jyhjong Lin

Abstract: For the rapid advances of Internet technologies and Web applications in recent years, providing opportunities to learn outside of the traditional classroom-based education has gained many attentions as a new theme for prospect learners to acquire knowledge in a more convenient way. In this new paradigm of the so called electronic learning (e-Learning), many efforts have been made to build Web based learning systems that manage desired e-Learning processes. From the managerial perspective on education, this means that each desired e-Learning process is monitored and controlled for fulfilling an expected learning objective. In this paper, we propose an object-oriented modeling method that addresses this issue by dividing required mechanisms into three layers: learning objective, learning service agent, and learning service composition ones. With this architecture, e-Learning processes are managed via the recognition of a learning objective, the employment of a learning service agent that arranges a process of demanded learning services for achieving the objective, and the confirmation of interactions/coordination among these services in achieving the objective. For specification, an object-oriented model is presented for each layer that describes the working detail of that layer. To illustrate, these models are applied in the fulfillment of an e-Learning plan for learning about Software Engineering that involves a set of learning objectives to be achieved by various processes of learning services.

Keywords: e-Learning, service management, object-orientation, modeling method


Title of the Paper: A Study for Comparative Evaluation of the Methods for Image Processing Using Texture Characteristics

DOWNLOAD FULL PDF

Authors: Mariana Jurian, Ioan Lita, Florentina Enescu, Daniel Alexandru Visan

Abstract: In this paper a comparative study has been made regarding certain methods of image processing by the texture characteristic, to find the optimum method for detecting color texture. The study is based on the experiments. There are two main points: the quality of the detection and the response time. For the experiments have been used the co-occurrence matrix and the iso-segments matrix of the gray or color levels. These methods are based on processing the image at a pixel level and the making of matrix that contain certain spatial positions of pixels. The resulting matrix was analyzed and, based on the existing information, the characteristics vectors associated to the matrix was determined. Each method was studied by analyzing the pixels of the image files in certain situations and directions and at certain distances. The co-occurrence methods had better results for the queries based on water, wood and grass textures and on the ones based on sand, ruble and clouds, better results were obtained using the iso-segment matrix.

Keywords: texture, co-occurrence, iso-segments, pixel, propinquity, grain, contrast, directionality, regularity, roughness, line-likeness.


Title of the Paper: An Efficient Stream Mining Technique

DOWNLOAD FULL PDF

Authors: Hatim A. Aboalsamh, Alaaeldin M. Hafez, Ghazy M. R. Assassa

Abstract: Stream analysis is considered as a crucial component of strategic control over a broad variety of disciplines in business, science and engineering. Stream data is a sequence of observations collected over intervals of time. Each data stream describes a phenomenon. Analysis on Stream data includes discovering trends (or patterns) in a Stream sequence. In the last few years, data mining has emerged and been recognized as a new technology for data analysis. Data Mining is the process of discovering potentially valuable patterns, associations, trends, sequences and dependencies in data. Data mining techniques can discover information that many traditional business analysis and statistical techniques fail to deliver. In our study, we emphasis on the use of data mining techniques on data streams, where mining techniques and tools are used in an attempt to recognize, anticipate and learn the stream behavior with different directly related or looked unrelated factors. Targeted data are sequences of observations collected over intervals of time. Each sequence describes a phenomenon or a factor. Such factors could have either a direct or indirect impact on the stream data under study. Examples of factors with direct impact include the yearly budgets and expenditures, taxations, local stocks prices, unemployment rates, inflation rates, fallen angels, and rising odds for upgrades. Indirect factors could include any phenomena in the local or global environments, such as, global stocks prices, education expenditures, weather conditions, employment strategies, and medical services. Analysis on data includes discovering trends (or patterns) and association between sequences in order to generate non-trivial knowledge. In this paper, we propose a data mining technique to predict the dependency between factors that affect performance. The proposed technique consists of three phases: (a) for each data sequence that represents a chosen phenomenon, generate its trend sequences, (b) discover maximal frequent trend patterns, generate pattern vectors (to keep information of frequent trend patterns), use trend pattern vectors to predict future factor sequences.

Keywords: Data Mining, Stream Mining, Time Series Mining, Mining Trends, Data Sequences, Association Mining, Maximal Trend Patterns, Global Trends, Local Trends.


Title of the Paper: Study on Pseudo Update of Building Shape in Road Ledger Digital Map

DOWNLOAD FULL PDF

Authors: Tsuyoshi Takayama, Akitsugu Oki, Hidemi Fukada, Yoshitoshi Murata, Nobuyoshi Sato, Tetsuo Ikeda

Abstract: Recently, in the area of GIS(Geographic Information System), lots of researchers are attracted to efficient update of a digital map data. However, its update cost in the conventional methods is not low. On the other hand, in the case of carrying out some works in a municipal government by employing GIS, the following problem occurs. That is, it is not easy to carry out them because the shape or ‘existence or not’ of a building on a base map of road ledger generated from GIS is not always relevant to its truth. In our discussion, we limit the scope to building shape. The purpose of our research is to develop an efficient and available update method of building shape with satisfying the following two conditions: (i) it does not contain a data structuring phase from raster images and the update cost in it is not too high, and (ii) it use a map updated more frequently than the basic map which should be updated, and is practically available. Authors investigate semi-automatic and pseudo update of a building by employing an urban design map which has higher update frequency but less precision than the base map of road ledger. In here, ‘pseudo’ means that we put the major interest to carry out the municipal government works and provide the first priority with the relevance to the truth on the shape or ‘existence or not’ of a building, even if we sacrifice its precision of the map. In the present paper, we propose its concrete algorithm and evaluate it. According to the evaluation, our proposition has achieved 85.0 % recall and 91.9 % precision. Our proposition has also obtained good result in qualitative evaluation.

Keywords: GIS(Geographic Information System), update, frequency, recall, precision, evaluation, and municipal government work.


Title of the Paper: Constructing a Data Schema from an Information Flow Model

DOWNLOAD FULL PDF

Authors: Junkang Feng, Sufen Wang

Abstract: The ‘information content’ of a data schema is concerned with the capacity of a database in representing the information that the database is designed to provide. It is recognized to be ‘difficult to define and measure’. Our literature survey seems to show that this is an unsolved problem and the difficulties seem to lie with the lack of separation of information and data, and particularly with intuitive treatment of information. We examine what is required for solving this problem. We propose an approach to information and information flow for conceptual data modeling by drawing on a set of contemporary theories concerning the semantic aspect of information. With this approach, we formulate an information flow model from human purposeful activities from which to construct a data schema. This way it can be sure that the data schema represents required information, and therefore the latter is definitely in the ‘information content’ of the former. We observe that this constitutes a possible solution to this problem, and it also represents a ‘semantic information theoretic’ approach to conceptual data modeling. This work is a result of a substantial study of this problem including several real world case studies.

Keywords: Information content, Conceptual modeling, Database design, Requirements engineering, Human purposeful activity

 


Issue 8, Volume 5, August 2008


Title of the Paper: Ontology used in a E-Learning Multiagent Architecture

DOWNLOAD FULL PDF

Authors:Daniel Hunyadi, Iulian Pah

Abstract: The main goal of this article is to develop a virtual educational environment model which makes learning easier by using collaboration (and extension, team-research model) as a form of social interplay. The model represents a universe where human agents interact with artificial agents (software agents). Considering the vision of the system, it can be classified among advanced systems for it is client-oriented (student) and provides value added educational services, due to the collaborative learning attribute. The model proposes an original architecture where elements of the socio-cultural theory of collaborative learning are assigned to the artificial intelligence components (the multi-agent system). The expected results are: conceptual models (agents, learning and teaching strategies, student profiles and group profiles, communication between agents, negotiation strategies and coalition formation), software entities, and a methodology to evaluate the performance of eLearning systems.

Keywords: human-computer interaction (HCI), multi-agent system, multi-agent architectures, collaborative
learning, artificial agents.


Title of the Paper: Web Image Retrieval Systems with Automatic Web Image Annotating Techniques

DOWNLOAD FULL PDF

Authors: Hsien-Tsung Chang

Abstract: Due to the popularity of digital cameras and web authors’ enriching the visual aesthetics, the number of web images is growing in an uncontrolled speed. The images in the World Wide Web are becoming a large image library for browsing. It is an important issue that how to retrieve the images accurately on the World Wide Web. In this paper we describe the architecture of the web image retrieval systems with automatic image annotation techniques. And we propose four methods to generate the annotation automatically for every image from its hosted web page, by analyzing the structural blocks, collecting anchor text of link structures, and gathering shared annotation with other images with the same visual signature.

Keywords: Image Annotation, Image Retrieval


Title of the Paper: Accident States Simulation. Process Fluids Release

DOWNLOAD FULL PDF

Authors: Cornelia Croitoru, Mihai Anghel, Floarea Pop, Ioan Stefanescu, Gheorghe Titescu, Mihai Patrascu, Ervin Watzlawek, Dorin Cheresdi

Abstract: Seveso II Directive imposes for high hazardous plants quantitative risk evaluation of the major accident. In a general context the risk is defined as product between frequency and consequences of accident state. There are five steps in quantitative risk assessment: identification of significant accident initiating events, development of accident sequences, frequency estimation for accident sequences, computation of post accident events parameters and consequences estimation. In the case of hazardous emissions, post accident events characterization means calculus of flow rates, quantities and duration. The paper presents mathematical models used to describe the process fluids release in emergency states, locally and by safety systems, as well as the results obtained with simulation programs, elaborated for the heavy water concentrations plants based on chemical exchange between water and hydrogen sulphide.

Keywords: Hazard, Risk, Release, Safety system, Simulation, Hydrogen sulphide, Mathematical model


Issue 9, Volume 5, September 2008


Title of the Paper: An Analysis on Taiwan Broiler Farm Prices under Different Chicken Import Deregulation Policies

DOWNLOAD FULL PDF

Authors: Meng-Long Shih, Shouhua Lin, Biing-Wen Huang, Wei-Yu Hu, Chi-I Hsu

Abstract: - According to the changes of chicken import policy, it could be divided into three periods: control import, quota import and free import. This study adopts GARCH models and weekly data to analyze the broiler farm prices during these different periods. Based on the empirical test results, it indicates that there is larger long-run persistence effect of shocks in the free import period. The reactions of broiler farm prices to the lag broiler farm prices, survey number of chick after six weeks, pig prices, colorful broiler farm prices, chick prices and feedstuff prices are different during these three periods.

Keywords: - Import regulation periods, Volatility, Price response, GARCH model.


Title of the Paper:  Matlab-like Scripting for the Java Platform with the jLab environment

DOWNLOAD FULL PDF

Authors:  Stergios Papadimitriou, Konstantinos Terzidis

Abstract: - The jLab environment extends the potential of Java for scientific computing. It provides a Matlab/Scilab like scripting language that is executed by an interpreter implemented in the Java language. The jLab environment combines effectively Groovy like compiled scripting with the interpreted jScript one. A special purpose modification of the Groovy language, called GroovySci is developed for effective compiled scripting. The paper concentrates on the topic of using the jLab scripting engine from within a pure Java application, in order to allow the application to utilize the scientific scripting potential of jLab and its large scientific libraries. The implementation is inspired by the JSR 223 standard but it is much simpler. The same methodology for script invocation can also be used within the Groovy effective compiled scripting framework. We describe the basics of the Groovy scripting environment. To our knowledge, this is the first full Matlab like scientific scripting for Java. The jLab environment is open source and can be downloaded from https://jlab.dev.java.net

Key-Words: - Java, Scripting, Interpreters, Matlab, Scientific Programming, Groovy Scripting.


Title of the Paper:   Environment-Independent Methodology for Accessing External Data Sources

DOWNLOAD FULL PDF

Authors: Laura M. Castro, Victor M. Gulias, Carlos Abalde, Javier Paris

Abstract: - Software engineering is not a static field. Hardware is evolving, and so needs to do software development. Someone walking into a computer store today and buying a personal computer, will most likely end up owning a machine with more than one CPU. And that machine will most likely end up on a network, connected to a lot of other machines and devices. We are talking about paralelism and distribution, two features that threaten to make the software development process harder. To cope with these new parameters, new tools are claiming a place in the vangard of software creation. At the same time, there are also well-known established components, such as our traditional databases, that we still use (and need to use) the same way they have been used for many years. In this article, an environment-independent methodology to combine these two different worlds is be presented, showing that past and future can work together if we properly use abstraction and high-level software engineering tools.

Key-Words: - Software engineering, database access, design patterns, functional programming.


Title of the Paper: Assessing Value of Software Architecture: A Case Study

DOWNLOAD FULL PDF

Authors: Pasi Ojala

Abstract: - During the last decades software architecture has become increasingly important for companies creating competitive product structures. Recently more and more attention has also been focused on the costs, cost-effectiveness, productivity and value of software development and products. This study outlines concepts, principles and process of implementing a value assessment for SW architecture. It outlines also existing possibilities for implementing value assessments. The main purpose of this study is to collect experiences whether the value assessment for product architecture is useful for companies, works in practice, and what are the strengths and weaknesses of using it. This is done by implementing value assessment in a case company step by step to see which phases possibly work and which phases possibly do not work. The practical industrial case shows that proposed value assessment for product architecture is useful and supports companies trying to find value in product architecture.

Key-Words: - Software process and product improvement, Architecture, Assessment, Value, Worth, Cost and Value engineering.


Title of the Paper: A Distributed Virtual M&S Framework for Military Tactical Training

DOWNLOAD FULL PDF

Authors:  SeongKee Lee, ChanGon Yoo, JungChan Park, JaeHyun Park

Abstract: This paper shows a distributed simulation framework for tactical training in Networked Virtual Environment (NVE). These days the NVE technology for an operational tactical training system plays a significant role in military training courses. The existing military training simulation systems are mostly full simulated systems operating on single platform. They are to train individual’s operation skill, but don’t support team level tactical training. In order to train team level combat and command skill in dynamic battlefield, the interaction among distributed combat objects and diverse battlefield composition are required. This paper designs a distributed simulation framework to satisfy these requirements. The framework produces the networked virtual environment using virtual reality, event based simulation and HLA/RTI based interoperation techniques. This paper implements a small scale tactical training system based on the framework.

Key-Words: Modeling and simulation, Simulation Framework, Networked virtual environment, Tactical training.


Title of the Paper: Efficient and Secure Protocol in Fair Certified E-Mail Delivery

DOWNLOAD FULL PDF

Authors:  Ren-Junn Hwang, Chih-Hua Lai

Abstract: - An efficient and secure protocol in certified e-mail delivery is proposed in this paper. With the widespread use of public Internet, communication via electronic mail (e-mail) becomes a convenience application instead of traditional manuscript letter. People can easily append his/her digital signature to the email in order to achieve the goal of non-repudiation of origin. However, the evidence of receipt still relies on the willingness of the recipient in the standard e-mail service. Hence, the recipient has no responsible for the received e-mail. In this paper, we present an efficient and secure protocol in fair certified e-mail delivery (CEMD). Our protocol efficiently provides non-repudiation of origin and receipt in the fair manner. In other words, the sender can obtain the irrefutable receipt if and only if the recipient gets the certified e-mail from the sender, otherwise, neither of them. Moreover, the proposed CEMD is efficiently in sending the other mails to the same recipient by using the pre-computation function. As the evaluations of computational cost and communication overhead, our protocol is cost-effective and efficient than other relevant protocols.

Key-Words: - Certified e-mail, Digital signature, Fair exchange, RSA signature, Security.


Title of the Paper: A Simulation Study to Increase The Capacity of a Rusk Production Line

DOWNLOAD FULL PDF

Authors: Seraj Yousef Abed

Abstract: - This study was conducted in a food processing company on its Rusk production line. The goal of the study was to increase the production rate of the line to meet the continuously increasing demand on its product within the existing limited space in the plant. The production line was thoroughly studied and analyzed. Several bottlenecks that were causing sever congestions in different areas on the production line were found. An Arena Simulation model was developed and used to resolve all bottlenecks found on the line and a simulation experiment consisting of seven different scenarios was conducted to search for a good feasible solution to increase the production rate.The changes made in the production line resolved all bottlenecks, improved utilization of all production equipment, eliminated all congestions and most of the queues at all production stations. An increase of about 50% in production and a decrease of 11.4% in average total production time for a box of Rusk in the system were achieved. The capital investment required to implement the new improvements can be paid back in a period of 35 days from the expected profit that would be realized from the additional increased quantity produced. The changes that were made on the production line to achieve the above improvements were adding two new machines, replacing three other old machines, modifying two other machines and decreasing the time of one of the processes, without affecting the quality of the product.

Key-Words: - Production planning, Food processing, Productivity, Simulation models, Business Process Reengineering.


Title of the Paper: Principles for Support of the Business Processes

DOWNLOAD FULL PDF

Authors:  Dzenana Donko, Ismet Traljic


Abstract: - This paper describes basic components and principles for support of the normatively regulated organizational activities. These activities are characterized by precise objective or purpose, participation of actors as role-holders, and norms and rules that govern the performance of these activities. In order to perform normatively regulated activities efficiently and effectively, actors need proper information and documents, but also have to act in accordance to relevant norms and rules. This paper focuses on a particular aspect and modeling of the normatively regulated activities. Particular example of processing claim is described as the formal model. Some aspects of applicability of object view on normatively regulated activities are described as the improvement on the more complex case of procurement activity.

Key-Words: - Normatively regulated organizational activities, object oriented modeling, business processes.


Issue 10, Volume 5, October 2008


Title of the Paper: Determination of Insurance Policy Using Neural Networks and Simplified Models with Factor Analysis Technique

DOWNLOAD FULL PDF

Authors: Yu-Ju Lin, Chin-Sheng Huang, Che-Chern Lin

Abstract: In this paper, we use feed forward neural networks with the back-propagation algorithm to build decision models for five insurances including life, annuity, health, accident, and investment-oriented insurances. Six features (variables) were selected for the inputs of the neural networks including age, sex, annual income, educational level, occupation, and risk preference. Three hundred insurants from an insurance company in Taiwan were used as examples for establishing the decision models. Six experiments were conducted in this study. These experiments were mainly categorized into two phases: Phase 1 (Experiments 1 to 3) and Phase 2 (Experiments 4 to 6). In Phase 1, we used the six features as the inputs of the neural networks. In Phase 2, we employed the factor analysis method to select three more important features from the six features. In Phase 1, Experiment 1 used a single neural network to classify the five insurances simultaneously while Experimental 2 utilized five neural networks to classify them independently. Experiments 1 and 2 adopted the purchase records of primary and additional insurances as experimental data. Experiment 3, however, utilized the primary insurance purchase dada only. In Phase 2, we repeated the similar experimental procedure as Phase 1. We also applied statistical methods to test the differences of the classification results between Phases 1 and 2. Discussion and concluding remarks are finally provided at the end of this paper.

Key-words: - Insurance policy, Neural networks, Back-propagation algorithm, Classification, Factor analysis, Feature extraction.


Title of the Paper: A Case Study on the SCORM-Based E-learning in Computer-Aided Drafting Course with Users’ Satisfaction Survey

DOWNLOAD FULL PDF

Authors: Che-Chern Lin, Jia-Hseng Pan

Abstract: -. In this paper, we propose a case study to compare the learning difference on a Computer added Drafting (CAD) course between traditional learning and e-learning. The learning materials for the e-learning were designed in Shareable Contents Object Reference Model (SCORM) standard. Seventy-four students from a vocational high school in Taiwan attended the experiment. These students were divided into two groups: the control group and the treatment group. The control group was provided with traditional learning in a regular classroom. The treatment group utilized an e-learning platform to conduct learning activities. The experimental results show that the learning performance between the traditional learning and the e-learning on CAD course is not different. Finally, a survey was also conducted to realize the users’ satisfaction of using thee-learning course.

Key-words: - CAD, e-learning, SCORM, Engineering Education, Moodle, User satisfaction.


Title of the Paper: A Study on Internet Usages, Academic Achievements, and the Exploring Capability of Regional Culture Knowledge Using Internet – A Case of Primary School Students in Taiwan

DOWNLOAD FULL PDF

Authors:  Che-Chern Lin, Wen-Shun Chen

Abstract: - In this paper, we present a case study to discuss the internet usages of primary school students and the exploring capabilities of using internet on regional culture course. 226 students of grade five from a primary school in Taiwan were selected as samples. We designed a questionnaire to analyze the internet usages and behaviors of these sampled students including time spending in internet, frequency, location, and reason of using internet, internet activity, and recognition of internet functionality. We designed questions for the regional culture test and conducted experiments to analyze the relationships between the internet usages and the scores of the regional culture test. Furthermore, we analyzed the relationships among students’ backgrounds, academic achievements, internet usages, and the scores of the regional test. Concluding remarks and the suggestions for future studies are also provided at the end of this paper.

Key-words :- Regional culture, Exploring capability, Internet usages, Academic achievement.


Title of the Paper: Systems Modeling on the Basis of Rough and Rough-Fuzzy Approach

DOWNLOAD FULL PDF

Authors:  Jirava Pavel, Krupka Jiri, Kasparova Miroslava

Abstract: In this paper the modeling of the information, economic and social systems is presented. The models are based on the rough sets theory, and the fuzzy and rough sets theory. These models have represented two real information systems, and a system of an internal human population migration. The information systems are represented as a table where every column represents an attribute (a variable, a property). This attribute can be measured or may also be supplied by a human expert. To obtain the necessary data questionnaires were use. To the migration model selected socioeconomic data, indicators, are applied. Economic and demographic indicators that affect size of migration for districts in the Czech Republic are defined. In data pre-processing we focused on different processing of data inputs. It means for all indicators we used selected data discrimination techniques. In the migration models creation phase we deal with a new design of membership function shapes and rule base definition. The classifier models were carried out in MATLAB. Performed experiments have proven the accuracy of the proposed approach.

Key-words: Modeling, rough sets theory, fuzzy sets, information system, internal human migration, evaluation, classification.


Title of the Paper: New Developments for Determinacy Analysis: Diclique-based Approach

DOWNLOAD FULL PDF

Authors:  Grete Lind, Rein Kuusik

Abstract: - Determinacy Analysis (DA) is a method that solves tasks of data mining (it enables to describe by the rules the subset of objects determined by the user). There are different treatments in DA: step by step and DAS-like in algorithmic view, one solution and multiple solutions as a result, additive and non-additive sets of rules in systematic view. Thereat the essence of the method itself does not change, only the rules change. There is a number of lacks in DA base algorithms: they are too labour-intensive (step by step approach) or they find only a limited set of rules (i.e. only one system of rules of many possible systems, in case of DAS). In this paper we show that DA can be reduced to the dialogue finding task that is well-known from the graph theory, we present the prerequisites to take into account and explain how it influences the rules. The dialogue-based DA enables to set up the DA tasks of new type: to find a system with minimal number of rules, to find a system with minimal number of shortest rules (for example). Reducing DA to a dialogue finding task, the basis for the new generation of DA algorithms is founded.

Key-Words: - Determinacy Analysis, Data mining, Rules, Dialogue, Dialogue extracting task.


Title of the Paper: Web Services Research Challenges, Limitations and Opportunities

DOWNLOAD FULL PDF

Authors: Florije Ismaili, Bogdan Sisediev

Abstract – Service Oriented Architecture (SOA) is an architecture style where software components that provide a piece of functionality communicate with each other via message they exchange. Within SOA these pieces are called services. Nowadays, the technology platform most associated with the realization of SOA is Web Services. Web Services have received much interest due to their ability to transcend programming language, operating system, network communication protocol, and data representation dependencies and issues. In this paper we suggest a new XML & Web Services Framework which relies on the Service Oriented Architecture and is a way of reorganizing applications into a set of services.

Key-Words: - SOA, Web Services, Web Services Framework, Research Challenges .


Title of the Paper: iCamp Space - An Environment for Self-Directed Learning, Collaboration and Social Networking

DOWNLOAD FULL PDF

Authors: Tomaz Klobucar

Abstract: - In the paper a learning environment for self–directed learning, collaboration and social networking composed of loosely coupled web 2.0-based educational tools is described. The set of building blocks includes blogs, wikis, social book marking tools, tools for synchronous and asynchronous communication, tools for federated search, tools for management of learning contracts and personal communication, feed aggregators, tools for scheduling appointments, etc. Contrary to monolithic learning environments, such as learning management systems, learners can choose the tools from the set by themselves and compose a personal learning environment according to their preferences. The environment has been validated in teaching process in the context of higher education. Five facilitators and 27 students from 4 countries participated in the trial that was conducted from April 2007 till June 2008. The presented work has been performed within the iCamp project (www.icamp.eu) from the 6th Framework Programme of EU.

Key-Words: - self-directed learning, iCamp, learning environment, social networking, collaboration, trial.


Title of the Paper: Design of a Real Time Transaction Processing Monitor  (TPM) Benchmark Testbed

DOWNLOAD FULL PDF

Authors: Maria Luisa Catalan, Dennis A. Ludena R., Hidenori Umeno, Masayoshi Aritsugi

Abstract: - The Transaction Processing Monitor (TPM) is the most-used middleware in different e-commerce systems from large enterprises to medium and small businesses available in the internet. Due to its growing popularity, the necessity for a more efficient TPM performance is now the major concern between the developers and researchers. The need for a high-end benchmark platform for a TPM is at present very vital to meet the high performance needs of online transactions. In addition to the performance characteristics of the TPM, we also have to ensure the security of the transactions. In this paper, we perform a detailed analysis of the current software packages available for this application. And therefore, we propose a secure, isolated, and highly configurable environment using the real-time emulation capabilities of NS2 and the virtualization capabilities of Xen, in order to provide a testbed with the characteristics and behavior of a real network.

Key-Words: - Virtualization, Emulation, Networking, Transaction Processing, Benchmark, Modelling


Title of the Paper: Design and Development of a Secure Military Communication based on AES Prototype Crypto Algorithm and Advanced Key Management

DOWNLOAD FULL PDF

Authors: Nikolaos G. Bardis, Nikolaos Doukas, Konstantinos Ntaikos


Abstract: - In this article, a study is presented that aims at the development of a prototype system for the secure real-time exchange of messages between users of workstations connected to the same TCP/IP network. The security is provided based on the AES prototype cryptographic algorithm. An advanced key management scheme is used within this system that enhances the security of the system, reduced the effects of possible security breaches and simultaneously hides from users the unnecessary complexity related to handling multiple encryption keys. The scope of application is military units and is intended to become the basis for the design and development of an integrated framework for the exchange of secure messages between different sites of military or other organizations that are concerned about information security. The present design is limited in its application to local area networks only. There are however no fundamental restrictions and an expansion to wide area networks and the internet is also possible. The design of the application is firstly presented. Problems of security and ease of use that are related to the management of the secret encryption keys are explained. A solution is hence presented for these problems, that is based on an innovative scheme for key storage and management. The design and implementation of the application is presented in detail along with description of its basic functionality. The plans for application and further development of the application are described and conclusions are finally drawn.

Key-Words: - Secure messaging, AES, encryption, key management

 


Issue 11, Volume 5, November 2008


Title of the Paper: Scientific Programming with an Environment that Combines Effectively Compiled and Interpreted Scripting at the Java Platform

DOWNLOAD FULL PDF

Authors: Stergios Papadimitriou, Konstantinos Terzidis


Abstract: The jLab environment extends the potential of Java for scientific computing. It provides a Matlab/Scilab like scripting language that is executed by an interpreter implemented in the Java language. The scripting language supports the basic programming constructs with Matlab like matrix manipulation operators. The jLab "core" provides the general purpose functionality with an extensive set of built in mathematical routines that cover all the basic numerical analysis tasks. The important advantage of jLab compared to other similar environments is the potentiality to dynamically and automatically integrate Java code to the system in order to obtain both execution speed and to reduce the programming effort. This task is supported both by an easy to use extension Java class wizard and by application specific class wizards that automate the utilization of jLab's scientific libraries. However, the incorporation of external Java general purpose code is not as convenient as the scripting code development is. Also, j-scripting is relatively slow compared to Groovy scripting that operates by compiling the scripts to Java classes. This was the motivation for the adaptation of the general purpose Groovy “scripting SuperJava” language as a parallel and cooperative scripting option in the jLab environment. The paper concentrates on the issues involved in the implementation of the multiscripting environment and on the benefits that can be obtained by the combination of these two very different scripting frameworks. The Groovy agile scripting language for the Java platform is both very flexible and powerful. We describe the modifications to the Groovy language and some of the most basic extensions that we have implemented in order to build the GroovySci language, the compiled scripting language of the jLab platform.

Keywords: Java, Scripting, Interpreters, Matlab, Scientific Programming, Class Loaders, Groovy, Binding


Title of the Paper: Traversal Patterns for Content Designed Web Environment

DOWNLOAD FULL PDF

Authors: Perwaiz B. Ismaili, Richard M. Golden


Abstract: This paper describe new ways of observing effects of content presentation and domain knowledge upon navigation behaviors by designing web (hypertext) presentation format that adheres to content design inspired by discourse and text comprehension literature. More specifically logical connections between web pages at macro level for all web sites were constructed meticulously and kept consistent across all three knowledge domains. Twenty undergraduate Psychology students participated in this preliminary study in investigating domain knowledge and content presentation influence on Hypertext (web) site traversal behavior. Classical data analysis (ANOVA) were used to explore these qualitative phenomena. Contrary to our belief expertise difference were not significant for total number of web pages (nodes) visited or overall time spent on each knowledge domain web sites. However, these differences were significantly strong for super-ordinate nodes, nodes with more semantic (logical) connections and irrelevant nodes.

Keywords: Hypertext, Navigation, User Behavior, Content Design, Expertise, Scientific Text, Web Design


Title of the Paper: Real-Time Face Detection using Dynamic Background Subtraction

DOWNLOAD FULL PDF

Authors: K. Sundaraj


Abstract: Face biometrics is an automated method of recognizing a person’s face based on a physiological or behavioral characteristic. Face recognition works by first obtaining an image of a person. This process is usually known as face detection. In this paper, we describe an approach for face detection that is able to locate a human face embedded in an outdoor or indoor background. Segmentation of novel or dynamic objects in a scene, often referred to as background subtraction or foreground segmentation, is a critical early step in most computer vision applications in domains such as surveillance and human-computer interaction. All previous implementations aim to handle properly one or more problematic phenomena, such as global illumination changes, shadows, highlights, foreground-background similarity, occlusion and background clutter. Satisfactory results have been obtained but very often at the expense of real-time performance. We propose a method for modeling the background that uses per-pixel time-adaptive Gaussian mixtures in the combined input space of pixel color and pixel neighborhood. We add a safety net to this approach by splitting the luminance and chromaticity components in the background and use their density functions to detect shadows and highlights. Several criteria are then combined to discriminate foreground and background pixels. Our experiments show that the proposed method possesses robustness to problematic phenomena such as global illumination changes, shadows and highlights, without sacrificing real-time performance, making it well-suited for a live video event like face biometric that requires face detection and recognition.

Keywords: Face Detection, Background Subtraction


Title of the Paper: Non-linear Estimation Methods for Hematocrit Density based on Changing Pattern of Transduced Anodic Current Curve

DOWNLOAD FULL PDF

Authors: Hieu Trung Huynh, Jung-Ja Kim, Yonggwan Won


Abstract: Many studies reported that the hematocrit (HCT) is the most highly influencing factor affecting the accuracy of the glucose measurements by portable/handheld devices. It is also known as an important factor for clinical decision-making situations. Therefore, estimation of HCT plays a crucial role for enhancing accuracy of glucose measurements and performance of therapy. In this paper, we present novel methods for hematocrit estimation from the transduced current curve which is produced by glucose-oxidase reaction in strip-type electrochemical biosensors. The proposed methods are nonlinear, including neural networks and support vector machine. Input features are composed of two parts: the sampled points of the time-varying current curve and extended extra features computed from those sampled points.

Keywords: Hematocrit, hematocrit estimation, nonlinear methods, biosensors, transduced current curve


Title of the Paper: Using RFID Technology in Food Produce Traceability

DOWNLOAD FULL PDF

Authors: Ruey-Shun Chen, C.-C. Chen, K. C. Yeh, Y.-C. Chen, C.-W. Kuo


Abstract: Food safety events occur frequently because of epizooty. Many countries build food traceability systems to solve these problems. However, the current food traceability system must be executed by paper work and need a lot of manpowers. It also cannot trace and tracking back the origin and destination of food. The fact that RFID technology can trace object, therefore, it can solve these problems. The method of this research integrates RFID technology on the food produce traceability system. Using RFID technology will be easy to trace each object, not only for the goods lots. RFID technology can also record all events automatically and acquire the information about the food production by handhold devices. The result of this paper is providing an integrated tactility system for the entire food supply chain by RFID technology. The benefit of this research can trace the food production, and let consumers get the complete food production information to choose and buy the safety food.

Keywords: RFID, Produce traceability, Food supply chain, Food safety


Title of the Paper: Application of Multifractal Analysis on Medical Images

DOWNLOAD FULL PDF

Authors: Jelena Andjelkovic, Natasa Zivic, Branimir Reljin, Vladimir Celebic, Iva Salom


Abstract: This paper shows results of computer analysis of images in the purpose of finding differences between medical images in order of their classifications in terms of separation malign tissue from normal and benign tissue. The diagnostics of malign tissue is of the crucial importance in medicine. Therefore, ascertainment of the correlation between multifractals parameters and “chaotic” cells could be of the great appliance. This paper shows the application of multifractal analysis for additional help in cancer diagnosis, as well as diminishing. of the subjective factor and error probability.

Keywords: Fractals, Multifractals, Holder exponent, Medical images, Carcinomas, FracLac, FracLab


Title of the Paper: Methodology of Fuzzy Usability Evaluation of Information Systems in Public Administration

DOWNLOAD FULL PDF

Authors: Miloslav Hub, Michal Zatloukal


Abstract: This paper suggests methodology of usability evaluation of information systems in public administration based on fuzzy logic theory. The first part of this paper is devoted to the problem formulation. The following parts of this paper formulate the methodology of usability evaluation aimed to public administration information systems. The authors introduce new ways how to evaluate the user interface with help of vague terms. Fuzzy Usability Evaluator – an application that is able to operate with the vague nature of evaluating is also introduced.

Keywords: Usability, information systems, public administration, fuzzy logic, methodology, software quality, software engineering


Title of the Paper: Optimizing the Minimum Vertex Guard Set on Simple Polygons via a Genetic Algorithm

DOWNLOAD FULL PDF

Authors: Antonio L. Bajuelos, Santiago Canales, Gregorio Hernandez, Ana Mafalda Martins


Abstract: Abstract: - The problem of minimizing the number of vertex-guards necessary to cover a given simple polygon (MINIMUM VERTEX GUARD (MVG) problem) is NP-hard. This computational complexity opens two lines of investigation: the development of algorithms that establish approximate solutions and the determination of optimal solutions for special classes of simple polygons. In this paper we follow the first line of investigation and propose an approximation algorithm based on general metaheuristic genetic algorithms to solve the MVG problem. Based on our algorithm, we conclude that on average the minimum number of vertex-guards needed to cover an arbitrary and an orthogonal polygon with n vertices is n / 6.38 and n / 6.40 , respectively. We also conclude that this result is very satisfactory in the sense that it is always close to optimal (with an approximation ratio of 2, for arbitrary polygons; and with an approximation ratio of 1.9, for orthogonal polygons).

Keywords: Computational Geometry, Art Gallery Problems, Visibility, Approximation Algorithms, Metaheuristics, Genetic Algorithms


Title of the Paper: Fast Algorithm for Detecting the Most Unusual Part of 2d and 3d Digital Images. Application to Large Medical Databases

DOWNLOAD FULL PDF

Authors: Kostadin Koroutchev, Elka Korutcheva


Abstract: In this paper we introduce a fast algorithm that can detect the most unusual part of a digital image. The most unusual part of a given shape is de ned as a part of the image that has the maximal distance to all non intersecting shapes with the same form. The method is tested on two and three-dimensional images and have shown very good results without any prede ned model. The results can be used to scan large image databases, as for example medical databases.

Keywords: Image processing, image statistics, image recognition


Title of the Paper: B-Spline Curve Generation and Modification based on Specified Radius of Curvature

DOWNLOAD FULL PDF

Authors: Tetsuzo Kuragano, Kazuhiro Kasono


Abstract: A method to generate a quintic B-spline curve which passes through given points is described. In this case, there are four more equations than there are control point positions. Two methods have been developed to compensate for the difference between the number of unknowns and that of the equations. These are assuming that the curvatures at both ends of the curve are zero, and assigning four gradients to the given points. In addition to this method, another method to generate a quintic B-spline curve which passes close to given points, and which has the first derivative at these given points is described. In this case, a linear system will be underdetermined, determined or overdetermined depending on the number of given points with gradients. A method to modify a quintic B-spline curve shape according to the specified radius of curvature distribution to realize an aesthetically pleasing freeform curve is described. The difference between the B-spline curve radius of curvature and the specified radius of curvature is minimized by introducing the least-squares method. Examples of curve generation are given.

Keywords: B-spline curve generation, curvature vector, curve shape modification, given points, given points with gradients, underdetermined system, overdetermined system


Title of the Paper: An Analysis of Patterns for Automating Information System Operations

DOWNLOAD FULL PDF

Authors: Matsuki Yoshino, Norihisa Komoda, Michiko Oba


Abstract: Automation of operations is essential for effective and efficient information system operation. For the very first step towards establishing a design methodology for system management operations, operation patterns based upon analysis of existing operations conducted in data centers have been proposed. For each pattern, feasibility of automation and recommendation for improvement is analyzed. The correlation between operation patterns and the objectives of operations has been also analyzed.

Keywords: System management, workflow, patterns, automation, autonomous computing


Title of the Paper: Study about the Process Control of an Electric Arc Furnace using Simulations based on an Adaptive Algorithm

DOWNLOAD FULL PDF

Authors: Manuela Panoiu, Caius Panoiu, Ioan Sora, Anca Iordan


Abstract: The electric arc furnaces are a very large power load, determining the negative effects on the power quality (harmonics currents, unbalanced load, and reactive power). For a maximum efficiency of the power consumption it is necessary to use an automat system for control the harmonics filters, the reactive power compensation installation and the electrodes position, in order to obtain a high value of power factor and a maximum efficiency. In this paper is used an adaptive algorithm for process control for an Electric Arc Furnace. The method is validating using simulation in PSCAD EMTDC software dedicated to Power Systems.

Keywords: Adaptive control, LMS algorithm, active power control


Issue 12, Volume 5, December 2008


Title of the Paper: Interorganizational Partnership, Switching Cost, and Strategic Flexibility in Supply Chain

DOWNLOAD FULL PDF

Authors: Jao-Hong Cheng, Chih-Huei Tang, Huei-Ping Chen


Abstract: Many studies work focusing on the interaction between the various dimensions of supply chain (SC) relationships (such as trust, commitment, satisfaction, investment, communication and collaboration) but far less on the impact of SC relationships on switching cost and strategic flexibility. The partnership interaction between the SC and the strategic flexibility is the most important factor when the manufacturer and subcontractors linked together. However, there has also been a few empirical researches that have examined the impact of switching cost and strategic flexibility. The effect of SC relationships on strategic flexibility has received less attention. As a result, it becomes the key issue in this study. To address these situations, we developed a conceptual framework incorporating dimensions of SC relationships, switching cost, and strategic flexibility. Data is drawn from the survey responses of 202 in Taiwan enterprises. Our findings provide considerable support for our conceptual model.

Keywords: Trust of partnerships, Strategic flexibility, Switching cost, Supply chain


Title of the Paper: A Modified Hopfield Neural Network for Perfect Calculation of Magnetic Resonance Spectroscopy

DOWNLOAD FULL PDF

Authors: Hazem M. El-Bakry, Nikos Mastorakis


Abstract: In this paper, an automatic determination algorithm for nuclear magnetic resonance (NMR) spectra of the metabolites in the living body by magnetic resonance spectroscopy (MRS) without human intervention or complicated calculations is presented. In such method, the problem of NMR spectrum determination is transformed into the determination of the parameters of a mathematical model of the NMR signal. To calculate these parameters efficiently, a new model called modified Hopfield neural network is designed. The main achievement of this paper over the work in literature [30] is that the speed of the modified Hopfield neural network is accelerated. This is done by applying cross correlation in the frequency domain between the input values and the input weights. The modified Hopfield neural network can accomplish complex dignals perfectly with out any additinal computation steps. This is a valuable advantage as NMR signals are complex-valued. In addition, a technique called “modified sequential extension of section (MSES)” that takes into account the damping rate of the NMR signal is developed to be faster than that presented in [30]. Simulation results show that the calculation precision of the spectrum improves when MSES is used along with the neural network. Furthermore, MSES is found to reduce the local minimum problem in Hopfield neural networks. Moreover, the performance of the proposed method is evaluated and there is no effect on the performance of calculations when using the modified Hopfield neural networks.

Keywords: Hopfield Neural Networks, Cross Correlation, Nuclear Magnetic Resonance, Magnetic Resonance Spectroscopy, Fast Fourier Transform


Title of the Paper: Prediction of the Impact Point for Spin and Fin Stabilized Projectiles

DOWNLOAD FULL PDF

Authors: Dimitrios N. Gkritzapis, Dionissios P. Margaris, Elias E. Panagiotopoulos, George Kaimakamis, Konstantinos Siassiakos


Abstract: A method for real time in flight prediction of the ground impact point of indirect fire projectiles is investigated. The projectiles is assumed to be both rigid (non-flexible), and rotationally symmetric about its spin axis launched at low and high pitch angles. A six degree of freedom projectile model solution is used to propagate the projectile state from an arbitrary point along the trajectory to the ground impact point. The projectiles manoeuvring motion depends on the most significant force and moment variations, in addition to gravity. The developed computational method gives satisfactory agreement with published data of verified experiments and computational codes on atmospheric projectile trajectory analysis for various initial firing flight conditions.

Keywords: Aerodynamic forces and moments, low and high pitch angles


Title of the Paper: New Correlation Analysis Method for Nonstationary Signal

DOWNLOAD FULL PDF

Authors: Zuojin Li, Weiren Shi, Kai Wang, Xiaowei Sun, Zhi Zhong


Abstract: This paper proposes a new correlation analysis method for nonstationary and energy-limited continual signals, which works out a formula similar to time correlation theory; that is to say when the operator, , meets a certain condition, its auto-correlation property of Fourier transform can be presented by Fourier transform of its energy function, f2)(tf, revealing its correlation of the Fourier transform coefficients of frequency interval, ω. It proves that the Parseval identical equation is the special case happening when0=ω. The above conclusion explains the theory of image compressing and noise removing through wavelet transform.

Keywords: Operator, energy function, wavelet transform, correlation function, image process


Title of the Paper: A Sensorless Closing Control for an AC Contactor Based on a New Armature Displacement Estimator

DOWNLOAD FULL PDF

Authors: Chieh-Tsung Chi


Abstract: This paper presents a new approach to solve the contact bounce after contacts closing problem for prolonging the lifespan and improving operation reliability. Based on combining a armature displacement estimator (ADE) with a simple hysteresis controller, such that the coil-current difference between the ac electromagnetic contactor (abbreviated ac contactor) body and the estimator is minimized, the proposed method overcomes the installation of an armature displacement measuring mechanism is indispensable restrictions imposed by previously described closing control methodologies. By using the proposed algorithm, an efficient control configuration can be obtained to reduce bounce duration. Computer simulations, of the proposed method, illustrate lots of benefits that are provided by proposed sensorless closing control configuration.

Keywords: Contact bounce, Estimator, Hysteresis controller, Armature displacement, Sensorless, AC electromagnetic contactor


Title of the Paper: Assessing the SMEs' Competitive Strategies on the Impact of Environmental Factors: A Quantitative SWOT Analysis Application

DOWNLOAD FULL PDF

Authors: Hui-Lin Hai


Abstract: Strength, Weakness, Opportunity and Threat (SWOT) analysis is an established methodology for assisting the formulation of strategy. This paper proposes a new quantified SWOT analytic method incorporated with the vote-ranking method. The indices of SWOT are voted, weighted and quantified to assess the competitive strategy, from top to the bottom, meanwhile the total weighted scores method will be used to get the best strategy alternatives. The competitive strategies of the Taiwanese Small and Medium Enterprises (SMEs) in the Environmental Management Systems (EMS) are taken as a case study, where eighteen certificated ISO9000 or ISO14000 auditors (or lead auditors) are invited to establish a decision group. Under the impact of environmental factors, the results show that company’s image and profitability is the most important strategy for SMEs within the global markets. Lastly, Taiwanese SMEs apperceive the significance of EMS and also recognize the importance to survive within the diversified competing market environment, whereas they need to build up its environmental management that has to suit the EMS specification and attention. The findings are also applicable for other developing countries within the global markets or barriers.

Keywords: Strength, Weakness, Opportunity and Threat (SWOT), Small and Medium Enterprises (SME), Environmental Management System (EMS)


Title of the Paper: Enhancement of Lifespan and Operating Reliability using a New Intelligent Control Method

DOWNLOAD FULL PDF

Authors: Chieh-Tsung Chi


Abstract: This paper presents a bounce-duration reduction method for electromagnetic contactor systems. It combines the experience-based fuzzy algorithm and the hysteresis comparator with simple structure to form a newly fuzzy-hysteresis methodology, which is a valuable for minimizing the bounce duration after contacts closing. The proposed method is implemented in a microcontroller program with a specially designed data structure for obtaining the dynamic spring anti-force and the upper and lower force error limitations of the hysteresis comparator. Tests on the experimental prototype show that the newly proposed method is valid and fast in practical applications.

Keywords: Electromagnetic contactor, Bounce duration, Fuzzy, Hysteresis, Microcontroller, Contacts, Controller


Title of the Paper: A Search Mechanism Based on Ontology Technology for Students in Elementary School

DOWNLOAD FULL PDF

Authors: Dowming Yeh, Su-Ling Hsiang


Abstract: Searching information on the Web has become part of everyone’s daily activity in the modern society. The Web brings much convenience into our lives; however, with the amount of information growing in a staggering speed, how to sieve out useful information and knowledge effectively has become an important skill. In order to obtain a better search result, one needs to know how to form appropriate key words and phrases for search engines. However, elementary school students don’t have sufficient abilities of sub-cognition, and they often form a search string in a natural language which contains few keywords in a long sentence; therefore, the search results do not often satisfy their need. This study addresses this problem by introducing an agent to parse the search string, align synonyms, sift out keywords, and include hyponyms in the intended field. Knowledge in a specific learning unit is represented with Ontology technology and transformed into keywords and associated structure. This study also integrates Google API and establishes specific function characteristics to eliminate unrelated files to conduct the search. The result shows that the prototype system can provide pupils with more accurate results.

Keywords: Search engine, empirical study, natural language, agent, ontology


Title of the Paper: Comparative Genome Sequence Analysis by Efficient Pattern Matching Technique

DOWNLOAD FULL PDF

Authors: Muneer Ahmad, Hassan Mathkour


Abstract: Genetic Sequences of different species contain precious biological information. This information is hidden in the order of appearing nucleotide base characters (A-Adenine, T-Thymine, G-Guanine and C-Cytosine), this order is definitely variant in different organisms but one can conclude some of the similarities and differences in nature, habits and living of species by comparing the biological information contained in sequence.
In this paper, we are presenting an algorithm that provides approximate comparative match between any input strands. It will overcome the draw backs and short comings in prevailing techniques. It becomes most difficult to find approximate match when Genome Adoptive Points (GAPS) are present in the input sequences, this algorithms tries to handle the complex situations and finds the number of approximate matches for optimal results.

Keywords: Limitation Check, Upper Bound, Lower Bound, Page Size, Position Specification, Counters


Title of the Paper: Coding of Checksum Components for Increasing the Control Reliability of Data Transmission for Military Applications

DOWNLOAD FULL PDF

Authors: Nikolaos Bardis


Abstract: Computer Systems used in Military and other challenging applications, are often exposed to increased levels of electromagnetic radiation. Embedded systems falling in this category often suffer from this exposure due to the operation of the device to which they belong. Consequently data communications within such devices need to be protected against transmission errors. Current general purpose encoding schemes that are used in other communication applications are prohibitively complex for this application. In this paper an innovative extension to the well known checksum concept is proposed that is capable of controlling errors in intra device data transfers. The new technique is shown to be simple enough for implementation and to increase the probability of detection of errors by several orders of magnitude. The scheme is hence shown to be suitable for embedded computing platforms for military and other demanding systems. More specifically, the modified checksum is examined in respect of its suitability for use in schemes for the transient error detection in schemes for reliable data storage within computing systems and it is explained why it is extremely suitable for this application. The modified checksum is also considered in the context of algorithm based fault tolerance schemes and it is again concluded that it can contribute to the overall scheme efficiency and effectiveness. The modified checksum is hence shown to be an algorithmic tool that can significantly contribute to the design of reliable and fault tolerant computing systems, such as the ones used for military systems or other applications that operate in adverse environments.

Keywords: Checksum, differential Boolean transformations, error detection, data integrity, fault tolerance


Title of the Paper: A Tool for Military Officers Enchasing Life Long Learning Applied on the Paradigm of Risk Preparedness and Management

DOWNLOAD FULL PDF

Authors: Nikolaos V. Karadimas, Nikolaos Doukas, Nikolaos P. Papastamatiou


Abstract: In this paper model for managing the Job Rotation of personnel attached to specific military units is proposed. This model aims to maintain the level of the overall preparedness of the units against known risks, by maintaining the presence of skilled personnel present in the unit at any time. The model is used for the development of a software tool that manages the systematic training of army officers in risk prevention and crisis management. The aim of this tool is to globally optimize the movements of army officers between units and training centers so that no units are ever left without skilled staff trained for a particular type of contingency. While officers are in training, they prepare for new hazards and prepare emergency plans for dealing with these particular hazards with the support of more experienced trainers or mentors. When this rotation ends, officers return to their units and assume responsibilities in both implementing the plans they have helped create, as well as in disseminating the knowledge and skills they have acquired and training more of the unit’s staff in being able to conduct appropriate parts of the newly introduced emergency procedures.

Keywords: Risk Preparedness, Job Rotation, Training Sessions, Military Units, Military Applications, Web Services, Grid Architecture


Title of the Paper: Information Spillover Effects of IPOs using 2SLS

DOWNLOAD FULL PDF

Authors: Jao-Hong Cheng, Huei-Ping Chen


Abstract: There are several Initial Public Offerings (IPOs) regulatory changes implemented in Taiwan stock markets since 2005. One of those new mechanisms is to release the stock IPOs pricing rules to underwriters. The underwriters and listed companies have been growing up rapidly in recent years, and the whole offer size has become full-scaled. However, foreign scholars found that pioneer companies have many uncertainties in IPOs due to there isn’t any information about offer price and proceeds to refer. When companies want to decide the appropriate offer price and proceeds, they have to spend a lot of time and money on information gathering. If there existed information spillover, and the information would be acquired from the other companies which had finished IPOs. Therefore, we try to research whether there existed information spillover in Taiwan IPOs market using 2SLS and Probit to analyze. By empirical results, there exist positive information spillover in offer price and listing price revision. For underwriters, underwriter rank is based on underwriter reputation, and the underwriters which have better rank usually couldn’t get the high initial return.

Keywords: Initial Public Offerings (IPOs), information spillover, underwriting reputation, Two-Stage Least Squares (2SLS)


Title of the Paper: A Brand Position Model for the Resort Hotels at Kenting Area in Taiwan

DOWNLOAD FULL PDF

Authors: Tsuen-Ho Hsu, Hsiu-Hui Cheng, Ching-Cheng Shen


Abstract: Under the considerations for the rapid development in leisure tourism and the demand increase for resort hotels, most enterprises will meet a pressure of drastic competition. Therefore, they will intend to build a unique brand in the mind of consumers and to enhance competitiveness and increase their profits. In this study, we will address the issue on the position of brand equity and key factors of competition for the resort hotels. The questionnaire method will be applied to collect the data and the resort hotels in Kenting area will be taken as an illustrative example in our study. The primary findings of this study can be summarized as follows:
1. Customers will have a higher degree of recognition for the environmental quality, local quality and uniqueness brand to the resort Hotels in Kenting area.
2. According to the brand equity diagram derived by using the multidimensional scaling (MDS) to those tourists at kenting area, we can find out that those resort hotels can be clustered into four clusters.
From above findings, it can provide the useful reference about the marketing strategy and differentiation competition for the resort hotels in Kenting area. Besides, we also construct a brand equality recognition model by using fisher’s discriminant function technique. It will aid the necessary analysis since the enterprises would like to realize their position on the competition environment via the brand equity recognition.

Keywords: Brand Equity, Resort Hotels, Multidimensional Scaling (MDS), Discriminant Function


   
[Journals], [Books], [Conferences], [Research], [Contact us], [Indexing], [Reports], [E-Library], [FAQ],
[Upcoming Conferences with Expired Deadline], [History of the WSEAS Conferences]

Copyright © WSEAS          
www.wseas.org