Abstract: Prospective readers can quickly determine whether a document is relevant to their information need if the significant phrases (or keyphrases) in this document are provided. Although keyphrases are useful, not many documents have keyphrases assigned to them, and manually assigning keyphrases to existing documents is costly. Therefore, there is a need for automatic keyphrase extraction. This paper introduces a new domain independent keyphrase extraction algorithm. The algorithm approaches the problem of keyphrase extraction as a classification task, and uses a combination of statistical and computational linguistics techniques, a new set of attributes, and a new machine learning method to distinguish keyphrases from non-keyphrases. The experiments indicate that this algorithm performs better than other keyphrase extraction tools and that it significantly outperforms Microsoft Word 2000-s AutoSummarize feature. The domain independence of this algorithm has also been confirmed in our experiments.
Abstract: Fractional Fourier Transform is a generalization of the
classical Fourier Transform. The Fractional Fourier span in general
depends on the amplitude and phase functions of the signal and varies
with the transform order. However, with the development of the
Fractional Fourier filter banks, it is advantageous in some cases to
have different transform orders for different filter banks to achieve
better decorrelation of the windowed and overlapped time signal. We
present an expression that is useful for finding the perturbation in the
Fractional Fourier span due to the erroneous transform order and the
possible variation in the window shape and length. The expression is
based on the dependency of the time-Fractional Fourier span
Uncertainty on the amplitude and phase function of the signal. We
also show with the help of the developed expression that the
perturbation of span has a varying degree of sensitivity for varying
degree of transform order and the window coefficients.
Abstract: Industrial design engineering is an information and
knowledge intensive job. Although Wikipedia offers a lot of this
information, design engineers are better served with a wiki tailored to
their job, offering information in a compact manner and functioning
as a design tool. For that reason WikID has been developed.
However for the viability of a wiki, an active user community is
essential. The main subject of this paper is a study to the influence of
the communication and the contents of WikID on the user-s
willingness to contribute.
At first the theory about a website-s first impression, general
usability guidelines and user motivation in an online community is
studied. Using this theory, the aspects of the current site are analyzed
on their suitability. These results have been verified with a
questionnaire amongst 66 industrial design engineers (or students
industrial design engineering).
The main conclusion is that design engineers are enchanted with
the existence of WikID and its knowledge structure (taxonomy) but
this structure has not become clear without any guidance. In other
words, the knowledge structure is very helpful for inspiring and
guiding design engineers through their tailored knowledge domain in
WikID but this taxonomy has to be better communicated on the main
page. Thereby the main page needs to be fitted more to the target
group preferences.
Abstract: In this paper we report a study aimed at determining
the effects of animation on usability and appeal of educational
software user interfaces. Specifically, the study compares 3
interfaces developed for the Mathsigner™ program: a static
interface, an interface with highlighting/sound feedback, and an
interface that incorporates five Disney animation principles. The
main objectives of the comparative study were to: (1) determine
which interface is the most effective for the target users of
Mathsigner™ (e.g., children ages 5-11), and (2) identify any Gender
and Age differences in using the three interfaces. To accomplish
these goals we have designed an experiment consisting of a
cognitive walkthrough and a survey with rating questions. Sixteen
children ages 7-11 participated in the study, ten males and six
females. Results showed no significant interface effect on user task
performance (e.g., task completion time and number of errors);
however, interface differences were seen in rating of appeal, with
the animated interface rated more 'likeable' than the other two.
Task performance and rating of appeal were not affected
significantly by Gender or Age of the subjects.
Abstract: Equipment miniaturisation offers several opportunities such as an increased surface-to-volume ratio and higher heat transfer coefficients. However, moving towards small-diameter channels demands extra attention to fouling, reliability and stable operation of the system. The present investigation explores possibilities to enhance the stability of the once-through micro evaporator by reducing its flow boiling induced pressure fluctuations. Experimental comparison shows that the measured reduction factor approaches a theoretically derived value. Pressure fluctuations are reduced by a factor of ten in the solid conical channel and a factor of 15 in the porous conical channel. This presumably leads to less backflow and therefore to a better flow control.
Abstract: In practice, wireless networks has the property that
the signal strength attenuates with respect to the distance from the
base station, it could be better if the nodes at two hop away are
considered for better quality of service. In this paper, we propose a
procedure to identify delay preserving substructures for a given
wireless ad-hoc network using a new graph operation G 2 – E (G) =
G* (Edge difference of square graph of a given graph and the
original graph). This operation helps to analyze some induced
substructures, which preserve delay in communication among them.
This operation G* on a given graph will induce a graph, in which 1-
hop neighbors of any node are at 2-hop distance in the original
network. In this paper, we also identify some delay preserving
substructures in G*, which are (i) set of all nodes, which are mutually
at 2-hop distance in G that will form a clique in G*, (ii) set of nodes
which forms an odd cycle C2k+1 in G, will form an odd cycle in G*
and the set of nodes which form a even cycle C2k in G that will form
two disjoint companion cycles ( of same parity odd/even) of length k
in G*, (iii) every path of length 2k+1 or 2k in G will induce two
disjoint paths of length k in G*, and (iv) set of nodes in G*, which
induces a maximal connected sub graph with radius 1 (which
identifies a substructure with radius equal 2 and diameter at most 4 in
G). The above delay preserving sub structures will behave as good
clusters in the original network.
Abstract: Many works have been carried out to compare the
efficiency of several goodness of fit procedures for identifying
whether or not a particular distribution could adequately explain a
data set. In this paper a study is conducted to investigate the power
of several goodness of fit tests such as Kolmogorov Smirnov (KS),
Anderson-Darling(AD), Cramer- von- Mises (CV) and a proposed
modification of Kolmogorov-Smirnov goodness of fit test which
incorporates a variance stabilizing transformation (FKS). The
performances of these selected tests are studied under simple
random sampling (SRS) and Ranked Set Sampling (RSS). This
study shows that, in general, the Anderson-Darling (AD) test
performs better than other GOF tests. However, there are some
cases where the proposed test can perform as equally good as the
AD test.
Abstract: Carrier mobility has become the most important
characteristic of high speed low dimensional devices. Due to
development of very fast switching semiconductor devices, speed of
computer and communication equipment has been increasing day by
day and will continue to do so in future. As the response of any
device depends on the carrier motion within the devices, extensive
studies of carrier mobility in the devices has been established
essential for the growth in the field of low dimensional devices.
Small-signal ac transport of degenerate two-dimensional hot
electrons in GaAs quantum wells is studied here incorporating
deformation potential acoustic, polar optic and ionized impurity
scattering in the framework of heated drifted Fermi-Dirac carrier
distribution. Delta doping is considered in the calculations to
investigate the effects of double delta doping on millimeter and submillimeter
wave response of two dimensional hot electrons in GaAs
nanostructures. The inclusion of delta doping is found to enhance
considerably the two dimensional electron density which in turn
improves the carrier mobility (both ac and dc) values in the GaAs
quantum wells thereby providing scope of getting higher speed
devices in future.
Abstract: Nowadays social media are important tools for web
resource discovery. The performance and capabilities of web searches
are vital, especially search results from social research paper
bookmarking. This paper proposes a new algorithm for ranking
method that is a combination of similarity ranking with paper posted
time or CSTRank. The paper posted time is static ranking for
improving search results. For this particular study, the paper posted
time is combined with similarity ranking to produce a better ranking
than other methods such as similarity ranking or SimRank. The
retrieval performance of combination rankings is evaluated using
mean values of NDCG. The evaluation in the experiments implies
that the chosen CSTRank ranking by using weight score at ratio 90:10
can improve the efficiency of research paper searching on social
bookmarking websites.
Abstract: Web applications have become very complex and crucial, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reengineering), the scientific community has focused attention to Web applications design, development, analysis, and testing, by studying and proposing methodologies and tools. This paper proposes an approach to automatic multi-dimensional concern mining for Web Applications, based on concepts analysis, impact analysis, and token-based concern identification. This approach lets the user to analyse and traverse Web software relevant to a particular concern (concept, goal, purpose, etc.) via multi-dimensional separation of concerns, to document, understand and test Web applications. This technique was developed in the context of WAAT (Web Applications Analysis and Testing) project. A semi-automatic tool to support this technique is currently under development.
Abstract: This paper describes the evolution of language
politics and the part played by political leaders with reference to
the Dravidian parties in Tamil Nadu. It explores the interesting
evolution from separatism to coalition in sustaining the values of
parliamentary democracy and federalism. It seems that the
appropriation of language politics is fully ascribed to the DMK
leadership under Annadurai and Karunanidhi. For them, the Tamil
language is a self-determining power, a terrain of nationhood, and
a perennial source of social and political powers. The DMK
remains a symbol of Tamil nationalist party playing language
politics in the interest of the Tamils. Though electoral alliances
largely determine the success, the language politics still has
significant space in the politics of Tamil Nadu. Ironically, DMK
moves from the periphery to centre for getting national recognition
for the Tamils as well as for its own maximization of power. The
evolution can be seen in two major phases as: language politics for
party building; and language politics for state building with three
successive political processes, namely, language politics in the
process of separatism, representative politics and coalition. The
much pronounced Dravidian Movement is radical enough to
democratize the party ideology to survive the spirit of
parliamentary democracy. This has secured its own rewards in
terms of political power. The political power provides the means to
achieve the social and political goal of the political party.
Language politics and leadership pattern actualized this trend
though the movement is shifted from separatism to coalition.
Abstract: This study focuses on bureau management
technologies and information systems in developing countries.
Developing countries use such systems which facilitate executive and
organizational functions through the utilization of bureau
management technologies and provide the executive staff with
necessary information.
The concepts of data and information differ from each other in
developing countries, and thus the concepts of data processing and
information processing are different. Symbols represent ideas,
objects, figures, letters and numbers. Data processing system is an
integrated system which deals with the processing of the data related
to the internal and external environment of the organization in order
to make decisions, create plans and develop strategies; it goes
without saying that this system is composed of both human beings
and machines. Information is obtained through the acquisition and
the processing of data. On the other hand, data are raw
communicative messages. Within this framework, data processing
equals to producing plausible information out of raw data.
Organizations in developing countries need to obtain information
relevant to them because rapid changes in the organizational arena
require rapid access to accurate information. The most significant
role of the directors and managers who work in the organizational
arena is to make decisions. Making a correct decision is possible only
when the directors and managers are equipped with sound ideas and
appropriate information. Therefore, acquisition, organization and
distribution of information gain significance. Today-s organizations
make use of computer-assisted “Management Information Systems"
in order to obtain and distribute information.
Decision Support System which is closely related to practice is an
information system that facilitates the director-s task of making
decisions. Decision Support System integrates human intelligence,
information technology and software in order to solve the complex
problems. With the support of the computer technology and software
systems, Decision Support System produces information relevant to
the decision to be made by the director and provides the executive
staff with supportive ideas about the decision.
Artificial Intelligence programs which transfer the studies and
experiences of the people to the computer are called expert systems.
An expert system stores expert information in a limited area and can
solve problems by deriving rational consequences.
Bureau management technologies and information systems in
developing countries create a kind of information society and
information economy which make those countries have their places
in the global socio-economic structure and which enable them to play
a reasonable and fruitful role; therefore it is of crucial importance to
make use of information and management technologies in order to
work together with innovative and enterprising individuals and it is
also significant to create “scientific policies" based on information
and technology in the fields of economy, politics, law and culture.
Abstract: Sixteen female Holstein calves allocated in three
treatments including: 1: control, 2: fed raw fiber concentrate (RFC)
for 45 days and 3: fed RFC for 90 days. RFC supplement (Vitacel®
200) was added to milk immediately before feeding (10 g/L milk).
Withers height and body weights of calves were measured monthly.
Individual dry matter intake was recorded daily. Blood samples were
taken monthly. The result showed that calves consumed RFC had
significantly greater weaning and final body weight. Treatment effect
on dry matter intake was not significant (p>0.05). Calves fed RFC
had better feed efficiency. Withers height of calves fed RFC were
taller than the control group (p
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: An adaptive software reliability prediction model
using evolutionary connectionist approach based on Recurrent Radial
Basis Function architecture is proposed. Based on the currently
available software failure time data, Fuzzy Min-Max algorithm is
used to globally optimize the number of the k Gaussian nodes. The
corresponding optimized neural network architecture is iteratively
and dynamically reconfigured in real-time as new actual failure time
data arrives. The performance of our proposed approach has been
tested using sixteen real-time software failure data. Numerical results
show that our proposed approach is robust across different software
projects, and has a better performance with respect to next-steppredictability
compared to existing neural network model for failure
time prediction.
Abstract: Software maintenance and mainly software
comprehension pose the largest costs in the software lifecycle. In
order to assess the cost of software comprehension, various
complexity measures have been proposed in the literature. This paper
proposes new cognitive-spatial complexity measures, which combine
the impact of spatial as well as architectural aspect of the software to
compute the software complexity. The spatial aspect of the software
complexity is taken into account using the lexical distances (in
number of lines of code) between different program elements and the
architectural aspect of the software complexity is taken into
consideration using the cognitive weights of control structures
present in control flow of the program. The proposed measures are
evaluated using standard axiomatic frameworks and then, the
proposed measures are compared with the corresponding existing
cognitive complexity measures as well as the spatial complexity
measures for object-oriented software. This study establishes that the
proposed measures are better indicators of the cognitive effort
required for software comprehension than the other existing
complexity measures for object-oriented software.
Abstract: These days wireless local area networks has become
very popular, when the initial IEEE802.11 is the standard for
providing wireless connectivity to automatic machinery, equipment
and stations that require rapid deployment, which may be portable,
handheld or which may be mounted on moving vehicles within a
local area. IEEE802.11 Wireless local area network is a sharedmedium
communication network that transmits information over
wireless links for all IEEE802.11 stations in its transmission range to
receive. When a user is moving from one location to another, how
the other user knows about the required station inside WLAN. For
that we designed and implemented a system to locate a mobile user
inside the wireless local area network based on RSSI with the help of
four specially designed architectures. These architectures are based
on statistical or we can say manual configuration of mapping and
radio map of indoor and outdoor location with the help of available
Sniffer based and cluster based techniques. We found a better
location of a mobile user in WLAN. We tested this work in indoor
and outdoor environments with different locations with the help of
Pamvotis, a simulator for WLAN.
Abstract: This paper aims to select the optimal location and
setting parameters of TCSC (Thyristor Controlled Series
Compensator) controller using Particle Swarm Optimization (PSO)
and Genetic Algorithm (GA) to mitigate small signal oscillations in a
multimachine power system. Though Power System Stabilizers
(PSSs) are prime choice in this issue, installation of FACTS device
has been suggested here in order to achieve appreciable damping of
system oscillations. However, performance of any FACTS devices
highly depends upon its parameters and suitable location in the
power network. In this paper PSO as well as GA based techniques are
used separately and compared their performances to investigate this
problem. The results of small signal stability analysis have been
represented employing eigenvalue as well as time domain response in
face of two common power system disturbances e.g., varying load
and transmission line outage. It has been revealed that the PSO based
TCSC controller is more effective than GA based controller even
during critical loading condition.
Abstract: At the previous study of new metal gasket, contact
width and contact stress were important design parameter for
optimizing metal gasket performance. However, the range of contact
stress had not been investigated thoroughly. In this study, we
conducted a gasket design optimization based on an elastic and plastic
contact stress analysis considering forming effect using FEM. The
gasket model was simulated by using two simulation stages which is
forming and tightening simulation. The optimum design based on an
elastic and plastic contact stress was founded. Final evaluation was
determined by helium leak quantity to check leakage performance of
both type of gaskets. The helium leak test shows that a gasket based
on the plastic contact stress design better than based on elastic stress
design.
Abstract: A mobile Ad-hoc network consists of wireless nodes
communicating without the need for a centralized administration. A
user can move anytime in an ad hoc scenario and, as a result, such a
network needs to have routing protocols which can adopt
dynamically changing topology. To accomplish this, a number of ad
hoc routing protocols have been proposed and implemented, which
include DSR, OLSR and AODV. This paper presents a study on the
QoS parameters for MANET application traffics in large-scale
scenarios with 50 and 120 nodes. The application traffics analyzed in
this study is File Transfer Protocol (FTP). In large scale networks
(120 nodes) OLSR shows better performance and in smaller scale
networks (50 nodes)AODV shows less packet drop rate and OLSR
shows better throughput.