Abstract: From the perspective of industrial structure
coordination and based on an explicit definition for the connotation of
industrial structure coordination, the synergetic coefficients are used
to measure the coordination degree between three industries' input
structure and output structure, and then the efficacy function method is
employed to comprehensively evaluate the level of China-s industrial
structure optimization. It is showed that Chinese industrial structure
presented a "v-shaped" variation tendency between 1996 and 2008,
and its industrial structure adjustment got obvious achievements after
2003, with the industrial structure optimization level increasing
continuously. However in 2009, the level of China-s industrial
structure optimization declined sharply due to the decreasing
contribution degree of value added structure and energy structure
coordination and the lower coordination degree of value added
structure and capital structure.
Abstract: Hypertension is characterized with stress on the heart and blood vessels thus increasing the risk of heart attack and renal diseases. The Renin angiotensin system (RAS) plays a major role in blood pressure control. Renin is the enzyme that controls the RAS at the rate-limiting step. Our aim is to develop new drug-like leads which can inhibit renin and thereby emerge as therapeutics for hypertension. To achieve this, molecular dynamics (MD) simulation and receptor-based pharmacophore modeling were implemented, and three rennin-inhibitor complex structures were selected based on IC50 value and scaffolds of inhibitors. Three pharmacophore models were generated considering conformations induced by inhibitor. The compounds mapped to these models were selected and subjected to drug-like screening. The identified hits were docked into the active site of renin. Finally, hit1 satisfying the binding mode and interaction energy was selected as possible lead candidate to be used in novel renin inhibitors.
Abstract: Information society is an absolutely new public formation at which the infrastructure and the social relations correspond to the socialized essence of «information genotype» mankind. Information society is a natural social environment which allows the person to open completely the information nature, to use intelligence for joint creation with other people of new information on the basis of knowledge earlier saved up by previous generations.
Abstract: Construction project control attempts to obtain real-time information and effectively enhance dynamic control and management via information sharing and analysis among project participants to eliminate construction conflicts and project delays. However, survey results for Taiwan indicate that construction commercial project management software is not widely accepted for subcontractors and suppliers. To solve the project communications problems among participants, this study presents a novel system called the Construction Dynamic Teams Communication Management (Con-DTCM) system for small-to-medium sized subcontractors and suppliers in Taiwanese Construction industry, and demonstrates that the Con-DTCM system responds to the most recent project information efficiently and enhances management of project teams (general contractor, suppliers and subcontractors) through web-based environment. Web-based technology effectively enhances information sharing during construction project management, and generates cost savings via the Internet. The main unique characteristic of the proposed Con-DTCM system is extremely user friendly and easily design compared with current commercial project management applications. The Con-DTCM system is applied to a case study of construction of a building project in Taiwan to confirm the proposed methodology and demonstrate the effectiveness of information sharing during the construction phase. The advantages of the Con-DTCM system are in improving project control and management efficiency for general contractors, and in providing dynamic project tracking and management, which enables subcontractors and suppliers to acquire the most recent project-related information. Furthermore, this study presents and implements a generic system architecture.
Abstract: Automated discovery of Rule is, due to its applicability, one of the most fundamental and important method in KDD. It has been an active research area in the recent past. Hierarchical representation allows us to easily manage the complexity of knowledge, to view the knowledge at different levels of details, and to focus our attention on the interesting aspects only. One of such efficient and easy to understand systems is Hierarchical Production rule (HPRs) system. A HPR, a standard production rule augmented with generality and specificity information, is of the following form: Decision If < condition> Generality Specificity . HPRs systems are capable of handling taxonomical structures inherent in the knowledge about the real world. This paper focuses on the issue of mining Quantified rules with crisp hierarchical structure using Genetic Programming (GP) approach to knowledge discovery. The post-processing scheme presented in this work uses Quantified production rules as initial individuals of GP and discovers hierarchical structure. In proposed approach rules are quantified by using Dempster Shafer theory. Suitable genetic operators are proposed for the suggested encoding. Based on the Subsumption Matrix(SM), an appropriate fitness function is suggested. Finally, Quantified Hierarchical Production Rules (HPRs) are generated from the discovered hierarchy, using Dempster Shafer theory. Experimental results are presented to demonstrate the performance of the proposed algorithm.
Abstract: With the proliferation of the mobile device
technologies, mobile learning can be used to complement and
improve traditional learning problems. Both students and teachers
need a proper and handy system to monitor and keep track the
performance of the students. This paper presents an implementation
of M-learning for primary school in Malaysia by using an open
source technology. It focuses on learning mathematics using
handheld devices for primary schools- students aged 11 and 12 years
old. Main users for this system include students, teachers and the
administrator. This application suggests a new mobile learning
environment with mobile graph for tracking the students- progress
and performance. The purpose of this system is not to replace
traditional classroom but to complement the learning process. In a
testing conducted, students who used this system performed better in
their examination.
Abstract: For scores of years now, several microfinance
organizations, non governmental organizations and other welfare
organizations have, with a view to aiding the progress of
communities rooted in poverty have been focusing on creating
microentrepreneurs, besides taking several other measures. In recent
times, business corporations have joined forces to combat poverty by
taking up microenterprise development. Hindustan Unilever Limited
(HUL), the Indian subsidiary of Unilever Limited exemplifies this
through its Project Shakti. The company through the Project creates
rural women entrepreneurs by making them direct to home sales
distributors of its products in villages that have thus far been ignored
by multinational corporations. The members participating in Project
Shakti are largely self help group members. The paper focuses on
assessing the impact made by the company on the members engaged
in Project Shakti. The analysis involves use of quantitative methods
to study the effect of Project Shakti on those self help group
members engaged in Project Shakti and those not engaged with
Project Shakti. Path analysis has been used to study the impact made
on those members engaged in Project Shakti. Significant differences
were observed on fronts of entrepreneurial development, economic
empowerment and social empowerment between members associated
with Project Shakti and those not associated with Project Shakti.
Path analysis demonstrated that involvement in Project Shakti led to
entrepreneurial development resulting in economic empowerment
that in turn led to social empowerment and that these three elements
independently induced a feeling of privilege in the women for being
associated with the Project.
Abstract: Although current competitive challenges induced by today-s digital economy place their main emphasis on organizational knowledge, customer knowledge has been overlooked. On the other hand, the business community has finally begun to realize the important role customer knowledge can play in the organizational boundaries of the corporate arena. As a result, there is an emerging market for the tools and utilities whose objective is to provide the intelligence for knowledge sharing between the businesses and their customers. In this paper, we present a conceptual model of customer knowledge management by identifying and analyzing the existing tools in the market. The focus will be upon the emerging British dotcom industry whose customer based B2C behavior has been an influential part of the knowledge based intelligence tools in existence today.
Abstract: Near-infrared (NIR) spectroscopy is a widely used
method for material identification for laboratory and industrial applications.
While standard spectrometers only allow measurements at
one sampling point at a time, NIR Spectral Imaging techniques can
measure, in real-time, both the size and shape of an object as well as
identify the material the object is made of. The online classification
and sorting of recovered paper with NIR Spectral Imaging (SI)
is used with success in the paper recycling industry throughout
Europe. Recently, the globalisation of the recycling material streams
caused that water-based flexographic-printed newspapers mainly from
UK and Italy appear also in central Europe. These flexo-printed
newspapers are not sufficiently de-inkable with the standard de-inking
process originally developed for offset-printed paper. This de-inking
process removes the ink from recovered paper and is the fundamental
processing step to produce high-quality paper from recovered paper.
Thus, the flexo-printed newspapers are a growing problem for the
recycling industry as they reduce the quality of the produced paper
if their amount exceeds a certain limit within the recovered paper
material.
This paper presents the results of a research project for the
development of an automated entry inspection system for recovered
paper that was jointly conducted by CTR AG (Austria) and PTS
Papiertechnische Stiftung (Germany). Within the project an NIR
SI prototype for the identification of flexo-printed newspaper has
been developed. The prototype can identify and sort out flexoprinted
newspapers in real-time and achieves a detection accuracy
for flexo-printed newspaper of over 95%. NIR SI, the technology the
prototype is based on, allows the development of inspection systems
for incoming goods in a paper production facility as well as industrial
sorting systems for recovered paper in the recycling industry in the
near future.
Abstract: Self-organizing map (SOM) is a well known data reduction technique used in data mining. Data visualization can reveal structure in data sets that is otherwise hard to detect from raw data alone. However, interpretation through visual inspection is prone to errors and can be very tedious. There are several techniques for the automatic detection of clusters of code vectors found by SOMs, but they generally do not take into account the distribution of code vectors; this may lead to unsatisfactory clustering and poor definition of cluster boundaries, particularly where the density of data points is low. In this paper, we propose the use of a generic particle swarm optimization (PSO) algorithm for finding cluster boundaries directly from the code vectors obtained from SOMs. The application of our method to unlabeled call data for a mobile phone operator demonstrates its feasibility. PSO algorithm utilizes U-matrix of SOMs to determine cluster boundaries; the results of this novel automatic method correspond well to boundary detection through visual inspection of code vectors and k-means algorithm.
Abstract: Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.
Abstract: Game theory could be used to analyze the conflicted
issues in the field of information hiding. In this paper, 2-phase game
can be used to build the embedder-attacker system to analyze the
limits of hiding capacity of embedding algorithms: the embedder
minimizes the expected damage and the attacker maximizes it. In the
system, the embedder first consumes its resource to build embedded
units (EU) and insert the secret information into EU. Then the attacker
distributes its resource evenly to the attacked EU. The expected
equilibrium damage, which is maximum damage in value from the
point of view of the attacker and minimum from the embedder against
the attacker, is evaluated by the case when the attacker attacks a
subset from all the EU. Furthermore, the optimal equilibrium capacity
of hiding information is calculated through the optimal number of EU
with the embedded secret information. Finally, illustrative examples
of the optimal equilibrium capacity are presented.
Abstract: This paper aims to describe how student satisfaction is
measured for work-based learners as these are non-traditional
learners, conducting academic learning in the workplace, typically
their curricula have a high degree of negotiation, and whose
motivations are directly related to their employers- needs, as well as
their own career ambitions. We argue that while increasing WBL
participation, and use of SSD are both accepted as being of strategic
importance to the HE agenda, the use of WBL SSD is rarely
examined, and lessons can be learned from the comparison of SSD
from a range of WBL programmes, and increased visibility of this
type of data will provide insight into ways to improve and develop
this type of delivery. The key themes that emerged from the analysis
of the interview data were: learners profiles and needs, employers
drivers, academic staff drivers, organizational approach, tools for
collecting data and visibility of findings. The paper concludes with
observations on best practice in the collection, analysis and use of
WBL SSD, thus offering recommendations for both academic
managers and practitioners.
Abstract: Authentication plays a vital role in many secure
systems. Most of these systems require user to log in with his or her
secret password or pass phrase before entering it. This is to ensure all
the valuables information is kept confidential guaranteeing also its
integrity and availability. However, to achieve this goal, users are
required to memorize high entropy passwords or pass phrases.
Unfortunately, this sometimes causes difficulty for user to remember
meaningless strings of data. This paper presents a new scheme which
assigns a weight to each personal question given to the user in
revealing the encrypted secrets or password. Concentration of this
scheme is to offer fault tolerance to users by allowing them to forget
the specific password to a subset of questions and still recover the
secret and achieve successful authentication. Comparison on level of
security for weight-based and weightless secret recovery scheme is
also discussed. The paper concludes with the few areas that requires
more investigation in this research.
Abstract: Internet access is a vital part of the modern world and an important tool in the education of our children. It is present in schools, homes and even shopping malls. Mastering the use of the internet is likely to be an important skill for those entering the job markets of the future. An internet user can be anyone he or she wants to be in an online chat room, or play thrilling and challenging games against other players from all corners of the globe. It seems at present time (or near future) for many people relationships in the real world may be neglected as those in the virtual world increase in importance. Internet is provided a fast mode of transportation caused freedom from family bonds and mixing with different cultures and new communities. This research is an attempt to study effect of Internet on Social capital. For this purpose a survey technique on the sample size amounted 168 students of Payame Noor University of Kermanshah city in country of Iran were considered. Degree of social capital is moderate. With the help of the Multi-variable Regression, variables of Iranian message attractive, Interest to internet with effect of positive and variable Creating a cordial atmosphere with negative effect be significant.
Abstract: The present work deals with the structural analysis of
turbine blades and modeling of turbine blades. A common failure
mode for turbine machines is high cycle of fatigue of compressor and
turbine blades due to high dynamic stresses caused by blade vibration
and resonance within the operation range of the machinery. In this
work, proper damping system will be analyzed to reduce the
vibrating blade. The main focus of the work is the modeling of under
platform damper to evaluate the dynamic analysis of turbine-blade
vibrations. The system is analyzed using Bond graph technique. Bond
graph is one of the most convenient ways to represent a system from
the physical aspect in foreground. It has advantage of putting together
multi-energy domains of a system in a single representation in a
unified manner. The bond graph model of dry friction damper is
simulated on SYMBOLS-shakti® software. In this work, the blades
are modeled as Timoshenko beam. Blade Vibrations under different
working conditions are being analyzed numerically.
Abstract: Extensive research has been devoted to economic
production quantity (EPQ) problem. However, no attention has been
paid to problems where production period length is constrained. In
this paper, we address the problem of deciding the optimal
production quantity and the number of minor setups within each
cycle, in which, production period length is constrained but a minor
setup is possible for pass the constraint. A mathematical model is
developed and Iterated Local Search (ILS) is proposed to solve this
problem. Finally, solution procedure illustrated with a numerical
example and results are analyzed.
Abstract: Buildings with floating column are highly undesirable built in seismically active areas. Many urban multi-storey buildings today have floating column buildings which are adopted to accommodate parking at ground floor or reception lobbies in the first storey. The earthquake forces developed at different floor levels in a building need to be brought down along the height to the ground by the shortest path; any deviation or discontinuity in this load transfer path results in poor performance of the building. Floating column buildings are severely damaged during earthquake. Damage on this structure can be reduce by taking the effect of infill wall. This paper presents the effect of stiffness of infill wall to the damage occurred in floating column building when ground shakes. Modelling and analysis are carried out by non linear analysis programme IDARC-2D. Damage occurred in beams, columns, storey are studied by formulating modified Park & Ang model to evaluate damage indices. Overall structural damage indices in buildings due to shaking of ground are also obtained. Dynamic response parameters i.e. lateral floor displacement, storey drift, time period, base shear of buildings are obtained and results are compared with the ordinary moment resisting frame buildings. Formation of cracks, yield, plastic hinge, are also observed during analysis.
Abstract: Access Management is the proactive management of
vehicular access points to land parcels adjacent to all manner of
roadways. Good access management promotes safe and efficient use
of the transportation network. This study attempts to utilize archived
data from the University Technology of Malaysia on-campus area to
assess the accuracy with which access management display some
benefits. Results show that usage of access management reduces
delay and fewer crashes. Clustered development can improve
walking, cycling and transit travel, reduce parking requirements and
improve emergency responses. Effective Access Management
planning can also reduce total roadway facility costs by reducing the
number of driveways and intersections. At the end after presenting
recommendations some of the travel impact, and benefits that
can be derived if these suggestions are implemented have
been summarized with the related comments.
Abstract: This study examines knowledge management in the public organizations in Iran. The purpose of this article is to provide a conceptual framework for application of knowledge management in public organizations. The study indicates that an increasing tendency for implementation of knowledge management in organizations is emerging. Nonetheless knowledge management in public organizations is toddler and little has been done to bring the subject to use in the public sector. The globalization of change and popularization of some values like participation, citizen-orientation and knowledge-orientation in the new theories of public administration requires that the knowledge management is considered and attend to in the public sector. This study holds that a knowledge management framework for public organizations is different from this in the public sector, because public sector is stakeholder-dependent while the private is shareholder-dependent. Based on the research, we provide a conceptual model. The model proposed involves three factors: Organizational, knowledge citizens and contextual factors. The study results indicate these factors affect on knowledge management in public organizations in Iran.