Abstract: The purpose of this paper is to examine the financing
practices of SMEs in Libya in two different phases of business life
cycle: start-up and matured stages. Moreover, SMEs- accessing bank
loan issues is also identified. The study was conducted by taking into
account the aspect of demand. The findings are based on a sample of
76 SMEs in Libya through the adoption of questionnaires. The results
have pinpointed several things- evidently, SMEs use informal
financing sources which prefer personal savings; SME owners are
willing to apply for bank loan, that the most pressing problem has
been identified, not to apply bank loan is loan with interest (religion
factor).
Abstract: The purposes of this study are 1) to study the impact
of the 3-community-core model: House (H), Temple (T), and School
(S) with the co-operation of official departments on community
development to ASEAN economic community involvement and 2) to
study the procedures and extension of the model. The research which
is a qualitative research is based on the formal and informal
interviews. Local people in a community are observed. Group
interview is, also, operated by executors and cooperators in the
school in the community. In terms of social and cultural dimension,
the 3-community-core model consisting of house, temple and school
is the base of Thai cultures bringing about understanding, happiness
and unity to the community. The result of this research is that the
official departments in accompanied with this model developers
cooperatively work together in the community to support such factors
as budget, plan, activities. Moreover, the need of community, and the
continual result to sustain the community are satisfied by the model
implementation. In terms of the procedures of the model
implementation, executors and co-operators can work, coordinate,
think, and launch their public relation altogether. Concerning the
model development, this enables the community to achieve its goal to
prepare the community’s readiness for ASEAN Economic
Community involvement.
Abstract: For a given specific problem an efficient algorithm has been the matter of study. However, an alternative approach orthogonal to this approach comes out, which is called a reduction. In general for a given specific problem this reduction approach studies how to convert an original problem into subproblems. This paper proposes a formal modeling language to support this reduction approach in order to make a solver quickly. We show three examples from the wide area of learning problems. The benefit is a fast prototyping of algorithms for a given new problem. It is noted that our formal modeling language is not intend for providing an efficient notation for data mining application, but for facilitating a designer who develops solvers in machine learning.
Abstract: In recent years multi-agent systems have emerged as one of the interesting architectures facilitating distributed collaboration and distributed problem solving. Each node (agent) of the network might pursue its own agenda, exploit its environment, develop its own problem solving strategy and establish required communication strategies. Within each node of the network, one could encounter a diversity of problem-solving approaches. Quite commonly the agents can realize their processing at the level of information granules that is the most suitable from their local points of view. Information granules can come at various levels of granularity. Each agent could exploit a certain formalism of information granulation engaging a machinery of fuzzy sets, interval analysis, rough sets, just to name a few dominant technologies of granular computing. Having this in mind, arises a fundamental issue of forming effective interaction linkages between the agents so that they fully broadcast their findings and benefit from interacting with others.
Abstract: In this paper, we combine a probabilistic neural method with radial-bias functions in order to construct the lithofacies of the wells DF01, DF02 and DF03 situated in the Triassic province of Algeria (Sahara). Lithofacies is a crucial problem in reservoir characterization. Our objective is to facilitate the experts' work in geological domain and to allow them to obtain quickly the structure and the nature of lands around the drilling. This study intends to design a tool that helps automatic deduction from numerical data. We used a probabilistic formalism to enhance the classification process initiated by a Self-Organized Map procedure. Our system gives lithofacies, from well-log data, of the concerned reservoir wells in an aspect easy to read by a geology expert who identifies the potential for oil production at a given source and so forms the basis for estimating the financial returns and economic benefits.
Abstract: The Czech Republic is a country whose economy has
undergone a transformation since 1989. Since joining the EU it has
been striving to reduce the differences in its economic standard and
the quality of its institutional environment in comparison with
developed countries. According to an assessment carried out by the
World Bank, the Czech Republic was long classed as a country
whose institutional development was seen as problematic. For many
years one of the things it was rated most poorly on was its bankruptcy
law. The new Insolvency Act, which is a modern law in terms of its
treatment of bankruptcy, was first adopted in the Czech Republic in
2006. This law, together with other regulatory measures, offers debtridden
Czech economic subjects legal instruments which are well
established and in common practice in developed market economies.
Since then, analyses performed by the World Bank and the London
EBRD have shown that there have been significant steps forward in
the quality of Czech bankruptcy law. The Czech Republic still lacks
an analytical apparatus which can offer a structured characterisation
of the general and specific conditions of Czech company and
household debt which is subject to current changes in the global
economy. This area has so far not been given the attention it
deserves. The lack of research is particularly clear as regards analysis
of household debt and householders- ability to settle their debts in a
reasonable manner using legal and other state means of regulation.
We assume that Czech households have recourse to a modern
insolvency law, yet the effective application of this law is hampered
by the inconsistencies in the formal and informal institutions
involved in resolving debt. This in turn is based on the assumption
that this lack of consistency is more marked in cases of personal
bankruptcy. Our aim is to identify the symptoms which indicate that
for some time the effective application of bankruptcy law in the
Czech Republic will be hindered by factors originating in
householders- relative inability to identify the risks of falling into
debt.
Abstract: Statistical analysis of electrophysiological recordings
obtained under, e.g. tactile, stimulation frequently suggests participation
in the network dynamics of experimentally unobserved “hidden"
neurons. Such interneurons making synapses to experimentally
recorded neurons may strongly alter their dynamical responses to
the stimuli. We propose a mathematical method that formalizes this
possibility and provides an algorithm for inferring on the presence
and dynamics of hidden neurons based on fitting of the experimental
data to spike trains generated by the network model. The model
makes use of Integrate and Fire neurons “chemically" coupled
through exponentially decaying synaptic currents. We test the method
on simulated data and also provide an example of its application to
the experimental recording from the Dorsal Column Nuclei neurons
of the rat under tactile stimulation of a hind limb.
Abstract: Generally, in order to create 3D sound using binaural
systems, we use head related transfer functions (HRTF) including the
information of sounds which is arrived to our ears. But it can decline
some three-dimensional effects in the area of a cone of confusion
between front and back directions, because of the characteristics of
HRTF.
In this paper, we propose a new method to use psychoacoustics
theory that reduces the confusion of sound image localization. In the
method, HRTF spectrum characteristic is enhanced by using the
energy ratio of the bark band. Informal listening tests show that the
proposed method improves the front-back sound localization
characteristics much better than the conventional methods
Abstract: This paper provides new ways to explore the old
problem of failure of information systems development in an
organisation. Based on the theory of cognitive dissonance,
information systems (IS) failure is defined as a gap between what the
users expect from an information system and how well these
expectations are met by the perceived performance of the delivered
system. Bridging the expectation-perception gap requires that IS
professionals make a radical change from being the proprietor of
information systems and products to being service providers. In order
to deliver systems and services that IS users perceive as valuable, IS
people must become expert in determining and assessing users-
expectations and perceptions. It is also suggested that the IS
community, in general, has given relatively little attention to the
front-end process of requirements specification for IS development.
There is a simplistic belief that requirements are obtainable from
users, they are then translatable into a formal specification. The
process of information needs analysis is problematic and worthy of
investigation.
Abstract: As the Internet technology has developed rapidly, the
number of identities (IDs) managed by each individual person has
increased and various ID management technologies have been
developed to assist users. However, most of these technologies are
vulnerable to the existing hacking methods such as phishing attacks
and key-logging. If the administrator-s password is exposed, an
attacker can access the entire contents of the stolen user-s data files in
other devices. To solve these problems, we propose here a new ID
management scheme based on a Single Password Protocol. The paper
presents the details of the new scheme as well as a formal analysis of
the method using BAN Logic.
Abstract: People usually have a telephone voice, which means
they adjust their speech to fit particular situations and to blend in with
other interlocutors. The question is: Do we speak differently to
different people? This possibility has been suggested by social
psychologists within Accommodation Theory [1]. Converging toward
the speech of another person can be regarded as a polite speech
strategy while choosing a language not used by the other interlocutor
can be considered as the clearest example of speech divergence [2].
The present study sets out to investigate such processes in the course
of everyday telephone conversations. Using Joos-s [3] model of
formality in spoken English, the researchers try to explore
convergence to or divergence from the addressee. The results
propound the actuality that lexical choice, and subsequently, patterns
of style vary intriguingly in concordance with the person being
addressed.
Abstract: Graph transformation has recently become more and
more popular as a general visual modeling language to formally state
the dynamic semantics of the designed models. Especially, it is a
very natural formalism for languages which basically are graph (e.g.
UML). Using this technique, we present a highly understandable yet
precise approach to formally model and analyze the behavioral
semantics of UML 2.0 Activity diagrams. In our proposal, AGG is
used to design Activities, then using our previous approach to model
checking graph transformation systems, designers can verify and
analyze designed Activity diagrams by checking the interesting
properties as combination of graph rules and LTL (Linear Temporal
Logic) formulas on the Activities.
Abstract: To offer a large variety of products while maintaining
low costs, high speed, and high quality in a mass customization
product development environment, platform based product
development has much benefit and usefulness in many industry fields.
This paper proposes a product configuration strategy by similarity
measure, incorporating the knowledge engineering principles such as
product information model, ontology engineering, and formal concept
analysis.
Abstract: Biclustering is a very useful data mining technique for
identifying patterns where different genes are co-related based on a
subset of conditions in gene expression analysis. Association rules
mining is an efficient approach to achieve biclustering as in
BIMODULE algorithm but it is sensitive to the value given to its
input parameters and the discretization procedure used in the
preprocessing step, also when noise is present, classical association
rules miners discover multiple small fragments of the true bicluster,
but miss the true bicluster itself. This paper formally presents a
generalized noise tolerant bicluster model, termed as μBicluster. An
iterative algorithm termed as BIDENS based on the proposed model
is introduced that can discover a set of k possibly overlapping
biclusters simultaneously. Our model uses a more flexible method to
partition the dimensions to preserve meaningful and significant
biclusters. The proposed algorithm allows discovering biclusters that
hard to be discovered by BIMODULE. Experimental study on yeast,
human gene expression data and several artificial datasets shows that
our algorithm offers substantial improvements over several
previously proposed biclustering algorithms.
Abstract: The research study was based on an evaluation of the
ability of glued test samples to pass the criterion of sufficient
bondline adhesion under the exposure conditions defined in EN 302-
1. Additionally, an infrared spectroscopic analysis of the evaluated
adhesives (phenol-resorcinol-formaldehyde PRF and melamine-ureaformaldehyde
MUF) with different mix ratios was carried out to
evaluate the possible effects of a faulty technological process.
Abstract: Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.
Abstract: One major difficulty that faces developers of
concurrent and distributed software is analysis for concurrency based
faults like deadlocks. Petri nets are used extensively in the
verification of correctness of concurrent programs. ECATNets [2] are
a category of algebraic Petri nets based on a sound combination of
algebraic abstract types and high-level Petri nets. ECATNets have
'sound' and 'complete' semantics because of their integration in
rewriting logic [12] and its programming language Maude [13].
Rewriting logic is considered as one of very powerful logics in terms
of description, verification and programming of concurrent systems.
We proposed in [4] a method for translating Ada-95 tasking
programs to ECATNets formalism (Ada-ECATNet). In this paper,
we show that ECATNets formalism provides a more compact
translation for Ada programs compared to the other approaches based
on simple Petri nets or Colored Petri nets (CPNs). Such translation
doesn-t reduce only the size of program, but reduces also the number
of program states. We show also, how this compact Ada-ECATNet
may be reduced again by applying reduction rules on it. This double
reduction of Ada-ECATNet permits a considerable minimization of
the memory space and run time of corresponding Maude program.
Abstract: The paper presents the method developed to assess
rating points of objects with qualitative indexes. The novelty of the
method lies in the fact that the authors use linguistic scales that allow
to formalize the values of the indexes with the help of fuzzy sets. As
a result it is possible to operate correctly with dissimilar indexes on
the unified basis and to get stable final results. The obtained rating
points are used in decision making based on fuzzy expert opinions.
Abstract: Science parks are often established to drive regional
economic growth, especially in countries with emerging economies.
However, mixed findings regarding the performances of science park
firms are found in the literature. This study tries to explain these
mixed findings by taking a relational approach and exploring
(un)intended knowledge transfers between new technology-based
firms (NTBFs) in the emerging South African economy. Moreover,
the innovation outcomes of these NTBFs are examined by using a
multi-dimensional construct. Results show that science park location
plays a significant role in explaining innovative sales, but is
insignificant when a different indicator of innovation outcomes is
used. Furthermore, only for innovations that are new to the firms,
both science park location and intended knowledge transfer via
informal business relationships have a positive impact; whereas
social relationships have a negative impact.
Abstract: We decribe a formal specification and verification of the Rabin public-key scheme in the formal proof system Is-abelle/HOL. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. The analysis presented uses a given database to prove formal properties of our implemented functions with computer support. Thema in task in designing a practical formalization of correctness as well as security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as eficient formal proofs. This yields the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Consequently, we get reliable proofs with a minimal error rate augmenting the used database. This provides a formal basis for more computer proof constructions in this area.