Abstract: Trust management and Reputation models are
becoming integral part of Internet based applications such as CSCW,
E-commerce and Grid Computing. Also the trust dimension is a
significant social structure and key to social relations within a
collaborative community. Collaborative Decision Making (CDM) is
a difficult task in the context of distributed environment (information
across different geographical locations) and multidisciplinary
decisions are involved such as Virtual Organization (VO). To aid
team decision making in VO, Decision Support System and social
network analysis approaches are integrated. In such situations social
learning helps an organization in terms of relationship, team
formation, partner selection etc. In this paper we focus on trust
learning. Trust learning is an important activity in terms of
information exchange, negotiation, collaboration and trust
assessment for cooperation among virtual team members. In this
paper we have proposed a reinforcement learning which enhances the
trust decision making capability of interacting agents during
collaboration in problem solving activity. Trust computational model
with learning that we present is adapted for best alternate selection of
new project in the organization. We verify our model in a multi-agent
simulation where the agents in the community learn to identify
trustworthy members, inconsistent behavior and conflicting behavior
of agents.
Abstract: In the past few decades, researchers have witnessed a
paradigm shift in Human Resource Management-from individual
performance to organizational outcomes with the role of Human
resource (HR) managers becoming increasingly significant to the
organization. In such a context, it is important to examine HR
practices from a strategic perspective on the sustained competitive
advantage (SCA) of the organizations. The present study explores
how Indian organisations look at their human resources strategically
when faced with competitive environment. Also, it explores strategic
initiatives being taken to manage human resources within the
organisations and how these initiatives promote SCA in terms of
enhancing the overall customer-centric delivery of goods and
services.
Abstract: Fungal infections are becoming more common and the
range of susceptible individuals has expanded. While Candida
albicans remains the most common infective species, other Candida
spp. are becoming increasingly significant. In a range of large-scale
studies of candidaemia between 1999 and 2006, about 52% of 9717
cases involved C. albicans, about 30% involved either C. glabrata or
C. parapsilosis and less than 15% involved C. tropicalis, C. krusei or
C. guilliermondii. However, the probability of mortality within 30
days of infection with a particular species was at least 40% for C.
tropicalis, C. albicans, C. glabrata and C. krusei and only 22% for
C. parapsilopsis. Clinical isolates of Candida spp. grew at rates
ranging from 1.65 h-1 to 4.9 h-1. Three species (C. krusei, C. albicans
and C. glabrata) had relatively high growth rates (μm > 4 h-1), C.
tropicalis and C. dubliniensis grew moderately quickly (Ôëê 3 h-1) and
C. parapsilosis and C. guilliermondii grew slowly (< 2 h-1). Based
on these data, the log of the odds of mortality within 30 days of
diagnosis was linearly related to μm. From this the underlying
probability of mortality is 0.13 (95% CI: 0.10-0.17) and it increases
by about 0.09 ± 0.02 for each unit increase in μm. Given that the
overall crude mortality is about 0.36, the growth of Candida spp.
approximately doubles the rate, consistent with the results of larger
case-matched studies of candidaemia.
Abstract: This study presents a new approach based on Tanaka's
fuzzy linear regression (FLP) algorithm to solve well-known power
system economic load dispatch problem (ELD). Tanaka's fuzzy linear
regression (FLP) formulation will be employed to compute the
optimal solution of optimization problem after linearization. The
unknowns are expressed as fuzzy numbers with a triangular
membership function that has middle and spread value reflected on
the unknowns. The proposed fuzzy model is formulated as a linear
optimization problem, where the objective is to minimize the sum of
the spread of the unknowns, subject to double inequality constraints.
Linear programming technique is employed to obtain the middle and
the symmetric spread for every unknown (power generation level).
Simulation results of the proposed approach will be compared with
those reported in literature.
Abstract: This paper describes an optimal approach for feature
subset selection to classify the leaves based on Genetic Algorithm
(GA) and Kernel Based Principle Component Analysis (KPCA). Due
to high complexity in the selection of the optimal features, the
classification has become a critical task to analyse the leaf image
data. Initially the shape, texture and colour features are extracted
from the leaf images. These extracted features are optimized through
the separate functioning of GA and KPCA. This approach performs
an intersection operation over the subsets obtained from the
optimization process. Finally, the most common matching subset is
forwarded to train the Support Vector Machine (SVM). Our
experimental results successfully prove that the application of GA
and KPCA for feature subset selection using SVM as a classifier is
computationally effective and improves the accuracy of the classifier.
Abstract: The power consumption of an Optical Packet Switch
equipped with SOA technology based Spanke switching fabric is
evaluated. Sophisticated analytical models are introduced to evaluate
the power consumption versus the offered traffic, the main
switch parameters, and the used device characteristics. The impact
of Amplifier Spontaneous Emission (ASE) noise generated by a
transmission system on the power consumption is investigated. As
a matter of example for 32×32 switches supporting 64 wavelengths
and offered traffic equal to 0,8, the average energy consumption per
bit is 5, 07 · 10-2 nJ/bit and increases if ASE noise introduced by
the transmission systems is increased.
Abstract: The group mutual exclusion (GME) problem is a
variant of the mutual exclusion problem. In the present paper a
token-based group mutual exclusion algorithm, capable of handling
transient faults, is proposed. The algorithm uses the concept of
dynamic request sets. A time out mechanism is used to detect the
token loss; also, a distributed scheme is used to regenerate the token.
The worst case message complexity of the algorithm is n+1. The
maximum concurrency and forum switch complexity of the
algorithm are n and min (n, m) respectively, where n is the number of
processes and m is the number of groups. The algorithm also satisfies
another desirable property called smooth admission. The scheme can
also be adapted to handle the extended group mutual exclusion
problem.
Abstract: Transient simulation of power electronic circuits is of
considerable interest to the designer. The switching nature of the
devices used permits development of specialized algorithms which
allow a considerable reduction in simulation time compared to
general purpose simulation algorithms. This paper describes a
method used to simulate a power electronic circuits using the
SIMULINK toolbox within MATLAB software. Theoretical results
are presented provides the basis of transient analysis of a power
electronic circuits.
Abstract: Chronic diseases prevailed along with economic
growth as well as life style changed in recent years in Taiwan.
According to the governmental statistics, hypertension related disease
is the tenth of death causes with 1,816 died directly from hypertension
in 2010. There were more death causes amongst the top ten had been
proofed that having strong association with the hypertension, such as
heart diseases, cardiovascular diseases, and diabetes. Hypertension or
High blood pressure is one of the major indicators for chronic diseases,
and was generally perceived as the major causes of mortality. The
literature generally suggested that regular physical exercise was
helpful to prevent the occurrence or to ease the progress of a
hypertension. This paper reported the process and outcomes in
detailed of an improvement project of physical exercise intervention
specific for hypertension patients. Physical information were
measured before and after the project to obtain information such as
weight, waistline, cholesterol (HD & LD), blood examination, as well
as self-perceived health status. The intervention project involved a
six-week exercise program, of which contained three times a week, 30
minutes of tutored physical exercise intervention. The project had
achieved several gains in changing the subjects- behavior in terms of
many important biophysical indexes. Around 20% of the participants
had significantly improved their cholesterols, BMI, and changed
unhealthy behaviors. Results from the project were encouraging, and
would be good reference for other samples.
Abstract: As originally designed for wired networks, TCP (transmission control protocol) congestion control mechanism is triggered into action when packet loss is detected. This implicit assumption for packet loss mostly due to network congestion does not work well in Mobile Ad Hoc Network, where there is a comparatively high likelihood of packet loss due to channel errors and node mobility etc. Such non-congestion packet loss, when dealt with by congestion control mechanism, causes poor TCP performance in MANET. In this study, we continue to investigate the impact of the interaction between transport protocols and on-demand routing protocols on the performance and stability of 802.11 multihop networks. We evaluate the important wireless networking events caused routing change, and propose a cross layer method to delay the unnecessary routing changes, only need to add a sensitivity parameter α , which represents the on-demand routing-s reaction to link failure of MAC layer. Our proposal is applicable to the plain 802.11 networking environment, the simulation results that this method can remarkably improve the stability and performance of TCP without any modification on TCP and MAC protocol.
Abstract: Although agriculture is an important part of the world
economy, accounting in agriculture still has many shortcomings. The
adoption of IAS 41 “Agriculture” has tried to improve this situation
and increase the comparability of financial statements of entities in
the agricultural sector. Although controversial, IAS 41 is the first
step of a consistent transition to fair value assessment in the
agricultural sector. The objective of our work is the analysis of IAS
41 and current accounting agricultural situation in Romania.
Accounting regulations in Romania are in accordance with European
directives and, in many respects, converged with IFRS referential.
Provisions of IAS 41, however, are not reflected directly in
Romanian regulations. With the increase of forest land transactions,
it is expected that recognition and measurement of biological assets
under IAS 41 to become a necessity.
Abstract: This paper presents a methodology for operational and
economic characteristics based evaluation and selection of a power
plant using Graph theoretic approach. A universal evaluation index
on the basis of Operational and economics characteristics of a plant is
proposed which evaluates and ranks the various types of power plants.
The index thus obtained from the pool of operational characteristics
of the power plant attributes Digraph. The Digraph is developed
considering Operational and economics attributes of the power plants
and their relative importance for their smooth operation, installation
and commissioning and prioritizing their selection. The sensitivity
analysis of the attributes towards the objective has also been carried
out in order to study the impact of attributes over the desired outcome
i.e. the universal operational-economics index of the power plant.
Abstract: Personal name matching system is the core of
essential task in national citizen database, text and web mining,
information retrieval, online library system, e-commerce and record
linkage system. It has necessitated to the all embracing research in
the vicinity of name matching. Traditional name matching methods
are suitable for English and other Latin based language. Asian
languages which have no word boundary such as Myanmar language
still requires sounds alike matching system in Unicode based
application. Hence we proposed matching algorithm to get analogous
sounds alike (phonetic) pattern that is convenient for Myanmar
character spelling. According to the nature of Myanmar character, we
consider for word boundary fragmentation, collation of character.
Thus we use pattern conversion algorithm which fabricates words in
pattern with fragmented and collated. We create the Myanmar sounds
alike phonetic group to help in the phonetic matching. The
experimental results show that fragmentation accuracy in 99.32% and
processing time in 1.72 ms.
Abstract: Baseball is unique among other sports in Taiwan.
Baseball has become a “symbol of the Taiwanese spirit and Taiwan-s
national sport". Taiwan-s first professional sports league, the Chinese
Professional Baseball League (CPBL), was established in 1989.
Starters pitch many more innings over the course of a season and for
a century teams have made all their best pitchers starters. In this
study, we attempt to determine the on-field performance these
pitchers and which won the most CPBL games in 2009. We utilize
the discriminate analysis approach to solve the problem, examining
winning pitchers and their statistics, to reliably find the best starting
pitcher. The data employed in this paper include innings pitched (IP),
earned runs allowed (ERA) and walks plus hits per inning pitched
(WPHIP) provided by the official website of the CPBL. The results
show that Aaron Rakers was the best starting pitcher of the CPBL.
The top 10 CPBL starting pitchers won 14 games to 8 games in the
2009 season. Though Fisher Discriminant Analysis, predicted to top
10 CPBL starting pitchers probably won 20 games to 9 games, more
1 game to 7 games in actually counts in 2009 season.
Abstract: Hierarchical high-level PNs (HHPNs) with time
versions are a useful tool to model systems in a variety of application
domains, ranging from logistics to complex workflows. This paper
addresses an application domain which is receiving more and more
attention: procedure that arranges the final inpatient charge in
payment-s office and their management. We shall prove that Petri net
based analysis is able to improve the delays during the procedure, in
order that inpatient charges could be more reliable and on time.
Abstract: In this paper, we propose a hardware and software
design method for automotive Electronic Control Units (ECU)
considering the functional safety. The proposed ECU is considered for
the application to Electro-Mechanical Actuator systems and the
validity of the design method is shown by the application to the
Electro-Mechanical Brake (EMB) control system which is used as a
brake actuator in Brake-By-Wire (BBW) systems. The importance of a
functional safety-based design approach to EMB ECU design has been
emphasized because of its safety-critical functions, which are executed
with the aid of many electric actuators, sensors, and application
software. Based on hazard analysis and risk assessment according to
ISO26262, the EMB system should be ASIL-D-compliant, the highest
ASIL level. To this end, an external signature watchdog and an
Infineon 32-bit microcontroller TriCore are used to reduce risks
considering common-cause hardware failure. Moreover, a software
design method is introduced for implementing functional
safety-oriented monitoring functions based on an asymmetric dual
core architecture considering redundancy and diversity. The validity
of the proposed ECU design approach is verified by using the EMB
Hardware-In-the-Loop (HILS) system, which consists of the EMB
assembly, actuator ECU, a host PC, and a few debugging devices.
Furthermore, it is shown that the existing sensor fault tolerant control
system can be used more effectively for mitigating the effects of
hardware and software faults by applying the proposed ECU design
method.
Abstract: It is important problems to increase the detection rates
and reduce false positive rates in Intrusion Detection System (IDS).
Although preventative techniques such as access control and
authentication attempt to prevent intruders, these can fail, and as a
second line of defence, intrusion detection has been introduced. Rare
events are events that occur very infrequently, detection of rare
events is a common problem in many domains. In this paper we
propose an intrusion detection method that combines Rough set and
Fuzzy Clustering. Rough set has to decrease the amount of data and
get rid of redundancy. Fuzzy c-means clustering allow objects to
belong to several clusters simultaneously, with different degrees of
membership. Our approach allows us to recognize not only known
attacks but also to detect suspicious activity that may be the result of
a new, unknown attack. The experimental results on Knowledge
Discovery and Data Mining-(KDDCup 1999) Dataset show that the
method is efficient and practical for intrusion detection systems.
Abstract: In the past many uneconomic solutions for limitation
and interruption of short-circuit currents in low power applications
have been introduced, especially polymer switch based on the
positive temperature coefficient of resistance (PCTR) concept.
However there are many limitations in the active material, which
consists of conductive fillers. This paper presents a significantly
improved and simplified approach that replaces the existing current
limiters with faster switching elements. Its elegance lies in the
remarkable simplicity and low-cost processes of producing the device
using polyaniline (PANI) doped with methane-sulfonic acid (MSA).
Samples characterized as lying in the metallic and critical regimes of
metal insulator transition have been studied by means of electrical
performance in the voltage range from 1V to 5 V under different
environmental conditions. Moisture presence is shown to increase the
resistivity and also improved its current limiting performance.
Additionally, the device has also been studied for electrical resistivity
in the temperature range 77 K-300 K. The temperature dependence of
the electrical conductivity gives evidence for a transport mechanism
based on variable range hopping in three dimensions.
Abstract: The city of Melbourne in Victoria, Australia, provides a number of examples of how a growing city can integrate urban planning and water planning to achieve sustainable urban development, environmental protection, liveability and integrated water management outcomes, and move towards becoming a “Water Sensitive City". Three examples are provided - the development at Botanic Ridge, where a 318 hectare residential development is being planned and where integrated water management options are being implemented using a “triple bottom line" sustainability investment approach; the Toolern development, which will capture and reuse stormwater and recycled water to greatly reduce the suburb-s demand for potable water, and the development at Kalkallo where a 1,200 hectare industrial precinct development is planned which will merge design of the development's water supply, sewerage services and stormwater system. The Paper argues that an integrated urban planning and water planning approach is fundamental to creating liveable, vibrant communities which meet social and financial needs while being in harmony with the local environment. Further work is required on developing investment frameworks and risk analysis frameworks to ensure that all possible solutions can be assessed equally.
Abstract: This paper discusses a curriculum approach that will
give emphasis on practical portions of teaching network security
subjects in information and communication technology courses. As
we are well aware, the need to use a practice and application oriented
approach in education is paramount. Research on active learning and
cooperative groups have shown that students grasps more and have
more tendency towards obtaining and realizing soft skills like
leadership, communication and team work as opposed to the more
traditional theory and exam based teaching and learning. While this
teaching and learning paradigm is relatively new in Malaysia, it has
been practiced widely in the West. This paper examines a certain
approach whereby students learning wireless security are divided into
and work in small and manageable groups where there will be 2
teams which consist of black hat and white hat teams. The former
will try to find and expose vulnerabilities in a wireless network while
the latter will try their best to prevent such attacks on their wireless
networks using hardware, software, design and enforcement of
security policy and etc. This paper will try to show that the approach
taken plus the use of relevant and up to date software and hardware
and with suitable environment setting will hopefully expose students
to a more fruitful outcome in terms of understanding of concepts,
theories and their motivation to learn.