Abstract: The purpose of this paper is to analyze determinants of
information security affecting adoption of the Web-based integrated
information systems (IIS). We introduced Web-based information
systems which are designed to formulate strategic plans for Peruvian
government. Theoretical model is proposed to test impact of
organizational factors (deterrent efforts and severity; preventive
efforts) and individual factors (information security threat; security
awareness) on intentions to proactively use the Web-based IIS .Our
empirical study results highlight that deterrent efforts and deterrent
severity have no significant influence on the proactive use intentions
of IIS, whereas, preventive efforts play an important role in proactive
use intentions of IIS. Thus, we suggest that organizations need to do
preventive efforts by introducing various information security
solutions, and try to improve information security awareness while
reducing the perceived information security threats.
Abstract: One of the most attractive and important field of chaos theory is control of chaos. In this paper, we try to present a simple framework for chaotic motion control using the feedback linearization method. Using this approach, we derive a strategy, which can be easily applied to the other chaotic systems. This task presents two novel results: the desired periodic orbit need not be a solution of the original dynamics and the other is the robustness of response against parameter variations. The illustrated simulations show the ability of these. In addition, by a comparison between a conventional state feedback and our proposed method it is demonstrated that the introduced technique is more efficient.
Abstract: Com Poisson distribution is capable of modeling the count responses irrespective of their mean variance relation and the parameters of this distribution when fitted to a simple cross sectional data can be efficiently estimated using maximum likelihood (ML) method. In the regression setup, however, ML estimation of the parameters of the Com Poisson based generalized linear model is computationally intensive. In this paper, we propose to use quasilikelihood (QL) approach to estimate the effect of the covariates on the Com Poisson counts and investigate the performance of this method with respect to the ML method. QL estimates are consistent and almost as efficient as ML estimates. The simulation studies show that the efficiency loss in the estimation of all the parameters using QL approach as compared to ML approach is quite negligible, whereas QL approach is lesser involving than ML approach.
Abstract: As various mobile sensing technologies, remote
control and ubiquitous infrastructure are developing and expectations
on quality of life are increasing, a lot of researches and developments
on home network technologies and services are actively on going,
Until now, we have focused on how to provide users with high-level
home network services, while not many researches on home network
security for guaranteeing safety are progressing. So, in this paper, we
propose an access control model specific to home network that
provides various kinds of users with home network services up one-s
characteristics and features, and protects home network systems from
illegal/unnecessary accesses or intrusions.
Abstract: In recent years, strategic alliances have taken
increasing importance as a means to control competitive forces and to
enter into new markets. Joint ventures are one of the most frequently
used contractual forms in strategic alliances. There are various
motivations for cooperation between two or more firms e.g.,
accessing to technical know-how, accessing to financial resources
and managing risks. The firms must know about these motivations to
encourage for establishing joint venture. So, it is important for
managers to understand about these motives. On the other hand, the
cooperation section is one of the most effective parts in each country.
In this way, our study identifies goals of joint venture between
cooperative manufacturing firms, and prioritizes those using
TOPSIS1. The results show that the most important of joint venture
goals are: accessing to managerial know-how, sharing total capital
investment.
Abstract: This article deals with the numerical simulation of the
floor heating convector in 3D. Presented convector can operate in
two modes – cooling mode and heating mode. This initial numerical
simulation is focused on cooling mode of the convector. Models with
different temperature of the fins are compared and three various
shapes of the fins are examined as well. The objective of the work is
to predict air flow and heat transfer inside convector for further
optimalization of these devices. For the numerical simulation was
used commercial software Ansys Fluent.
Abstract: Various security APIs (Application Programming
Interfaces) are being used in a variety of application areas requiring
the information security function. However, these standards are not
compatible, and the developer must use those APIs selectively
depending on the application environment or the programming
language. To resolve this problem, we propose the standard draft of
the information security component, while SSL (Secure Sockets
Layer) using the confidentiality and integrity component interface has
been implemented to verify validity of the standard proposal. The
implemented SSL uses the lower-level SSL component when
establishing the RMI (Remote Method Invocation) communication
between components, as if the security algorithm had been
implemented by adding one more layer on the TCP/IP.
Abstract: This paper is aimed to give an illustration on the
application of Data Envelopment Analysis (DEA) as a tool to assess
Quality Management (QM) efficiency. A variant of DEA, slack based
measure (SBM) is used for this purpose. From this study, it is found
that DEA is suitable to measure QM efficiency and give
improvement suggestions to the inefficient QM.
Abstract: Program slicing is the task of finding all statements in a program that directly or indirectly influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some point in a program is called a program slice. In several software engineering applications, such as program debugging and measuring program cohesion and parallelism, several slices are computed at different program points. In this paper, algorithms are introduced to compute all backward and forward static slices of a computer program by traversing the program representation graph once. The program representation graph used in this paper is called Program Dependence Graph (PDG). We have conducted an experimental comparison study using 25 software modules to show the effectiveness of the introduced algorithm for computing all backward static slices over single-point slicing approaches in computing the parallelism and functional cohesion of program modules. The effectiveness of the algorithm is measured in terms of time execution and number of traversed PDG edges. The comparison study results indicate that using the introduced algorithm considerably saves the slicing time and effort required to measure module parallelism and functional cohesion.
Abstract: Aggression is a behavior that cannot be approved by
the society. Vandalism which is aggression towards objects is an
action that tends to damage public or personal property. The
behaviors that are described as vandalism can often be observed in
the schools as well. According to Zwier and Vaughan (1)
previous research about the reasons of and precautionary measures
for vandalism in schools can be grouped in three tendency categories:
conservative, liberal and radical. In this context, the main aim of this
study is to discover which ideological tendency of the reasons of
school vandalism is adopted by the teachers and what are their
physical, environmental, school system and societal solutions for
vandalism. A total of 200 teachers participated in this study, and the
mean age was 34.20 years (SD = 6.54). The sample was made up of
109 females and 91 males. For the analysis of the data, SPSS 15.00,
frequency, percentage, and t-test were used. The research showed
that the teachers have tendencies in the order of conservative, liberal
and radical for the reasons of vandalism. The research also showed
that the teachers do not have any tendency for eliminating vandalism
physically and general solutions on the level of society; on the other
hand they mostly adopt a conservative tendency in terms of
precautions against vandalism in the school system. Second most,
they adopt the liberal tendency in terms of precautions against
vandalism in the school system. . It is observed that the findings of
this study are comparable to the existing literature on the subject.
Future studies should be conducted with multiple variants and
bigger sampling.
Abstract: There are various kinds of medical equipment which
requires relatively accurate positional adjustments for successful
treatment. However, patients tend to move without notice during a
certain span of operations. Therefore, it is common practice that
accompanying operators adjust the focus of the equipment. In this
paper, tracking controllers for medical equipment are suggested to
replace the operators. The tracking controllers use AHRS sensor
information to recognize the movements of patients. Sensor fusion is
applied to reducing the error magnitudes through linear Kalman filters.
The image processing of optical markers is included to adjust the
accumulation errors of gyroscope sensor data especially for yaw
angles.
The tracking controller reduces the positional errors between the
current focus of a device and the target position on the body of a
patient. Since the sensing frequencies of AHRS sensors are very high
compared to the physical movements, the control performance is
satisfactory. The typical applications are, for example, ESWT or
rTMS, which have the error ranges of a few centimeters.
Abstract: Implemented 5-bit 125-MS/s successive
approximation register (SAR) analog to digital converter (ADC) on
FPGA is presented in this paper.The design and modeling of a high
performance SAR analog to digital converter are based on monotonic
capacitor switching procedure algorithm .Spartan 3 FPGA is chosen
for implementing SAR analog to digital converter algorithm. SAR
VHDL program writes in Xilinx and modelsim uses for showing
results.
Abstract: In this contribution an innovative platform is being
presented that integrates intelligent agents in legacy e-learning environments. It introduces the design and development of a scalable
and interoperable integration platform supporting various assessment agents for e-learning environments. The agents are implemented in
order to provide intelligent assessment services to computational intelligent techniques such as Bayesian Networks and Genetic
Algorithms. The utilization of new and emerging technologies like web services allows integrating the provided services to any web
based legacy e-learning environment.
Abstract: Curing of paints by exposure to UV radiations is
emerging as one of the best film forming technique as an alternative
to traditional solvent borne oxidative and thermal curing coatings.
The composition and chemistry of UV curable coatings and role of
multifunctional and monofunctional monomers, oligomers, and
photoinitiators have been discussed. The limitations imposed by
thermodynamic equilibrium and tendency for acrylic double bond
polymerizations during synthesis of multifunctional acrylates have
been presented. Aim of present investigation was thus to explore the
reaction variables associated with synthesis of multifunctional
acrylates. Zirconium oxychloride was evaluated as catalyst against
regular acid functional catalyst. The catalyzed synthesis of glyceryl
acrylate and neopentyl glycol acrylate was conducted by variation of
following reaction parameters: two different reactant molar ratios-
1:4 and 1:6; catalyst usage in % by moles on polyol- 2.5, 5.0 and 7.5
and two different reaction temperatures- 45 and 75 0C. The reaction
was monitored by determination of acid value and hydroxy value at
regular intervals, besides TLC, HPLC, and FTIR analysis of
intermediates and products. On the basis of determination of reaction
progress over 1-60 hrs, the esterification reaction was observed to
follow 2nd order kinetics with rate constant varying from 1*10-4 to
7*10-4. The thermal and catalytic components of second order rate
constant and energy of activation were also determined. Uses of
these kinetic and thermodynamic parameters in design of reactor for
manufacture of multifunctional acrylate ester have been presented.
The synthesized multifunctional acrylates were used to formulate and
apply UV curable clear coat followed by determination of curing
characteristics and mechanical properties of cured film. The overall
curing rates less than 05 min. were easily attained indicating
economical viability of radiation curable system due to faster
production schedules
Abstract: With the advent of emerging personal computing paradigms such as ubiquitous and mobile computing, Web contents are becoming accessible from a wide range of mobile devices. Since these devices do not have the same rendering capabilities, Web contents need to be adapted for transparent access from a variety of client agents. Such content adaptation results in better rendering and faster delivery to the client device. Nevertheless, Web content adaptation sets new challenges for semantic markup. This paper presents an advanced components platform, called MorfeoSMC, enabling the development of mobility applications and services according to a channel model based on Services Oriented Architecture (SOA) principles. It then goes on to describe the potential for integration with the Semantic Web through a novel framework of external semantic annotation of mobile Web contents. The role of semantic annotation in this framework is to describe the contents of individual documents themselves, assuring the preservation of the semantics during the process of adapting content rendering, as well as to exploit these semantic annotations in a novel user profile-aware content adaptation process. Semantic Web content adaptation is a way of adding value to and facilitates repurposing of Web contents (enhanced browsing, Web Services location and access, etc).
Abstract: The conjugate gradient optimization algorithm is combined with the modified back propagation algorithm to yield a computationally efficient algorithm for training multilayer perceptron (MLP) networks (CGFR/AG). The computational efficiency is enhanced by adaptively modifying initial search direction as described in the following steps: (1) Modification on standard back propagation algorithm by introducing a gain variation term in the activation function, (2) Calculation of the gradient descent of error with respect to the weights and gains values and (3) the determination of a new search direction by using information calculated in step (2). The performance of the proposed method is demonstrated by comparing accuracy and computation time with the conjugate gradient algorithm used in MATLAB neural network toolbox. The results show that the computational efficiency of the proposed method was better than the standard conjugate gradient algorithm.
Abstract: Computer-mediated communication technologies which provide for virtual communities have typically evolved in a cross-dichotomous manner, such that technical constructs of the technology have evolved independently from the social environment of the community. The present paper analyses some limitations of current implementations of computer-mediated communication technology that are implied by such a dichotomy, and discusses their inhibiting effects on possible developments of virtual communities. A Socio-Technical Indicator Model is introduced that utilizes integrated feedback to describe, simulate and operationalise increasing representativeness within a variety of structurally and parametrically diverse systems. In illustration, applications of the model are briefly described for financial markets and for eco-systems. A detailed application is then provided to resolve the aforementioned technical limitations of moderation on the evolution of virtual communities. The application parameterises virtual communities to function as self-transforming social-technical systems which are sensitive to emergent and shifting community values as products of on-going communications within the collective.
Abstract: Software reuse can be considered as the most realistic
and promising way to improve software engineering productivity and
quality. Automated assistance for software reuse involves the
representation, classification, retrieval and adaptation of components.
The representation and retrieval of components are important to
software reuse in Component-Based on Software Development
(CBSD). However, current industrial component models mainly focus
on the implement techniques and ignore the semantic information
about component, so it is difficult to retrieve the components that
satisfy user-s requirements. This paper presents a method of business
component retrieval based on specification matching to solve the
software reuse of enterprise information system. First, a business
component model oriented reuse is proposed. In our model, the
business data type is represented as sign data type based on XML,
which can express the variable business data type that can describe the
variety of business operations. Based on this model, we propose
specification match relationships in two levels: business operation
level and business component level. In business operation level, we
use input business data types, output business data types and the
taxonomy of business operations evaluate the similarity between
business operations. In the business component level, we propose five
specification matches between business components. To retrieval
reusable business components, we propose the measure of similarity
degrees to calculate the similarities between business components.
Finally, a business component retrieval command like SQL is
proposed to help user to retrieve approximate business components
from component repository.
Abstract: A dynamic software risk assessment model is
presented. Analogies between dynamic financial analysis and
software risk assessment models are established and based on these
analogies it suggested that dynamic risk model for software projects
is the way to move forward for the risk assessment of software
project. It is shown how software risk assessment change during
different phases of a software project and hence requires a dynamic
risk assessment model to capture these variations. Further evolution
of dynamic financial analysis models is discussed and mapped to the
evolution of software risk assessment models.
Abstract: Reversible logic is becoming more and more prominent
as the technology sets higher demands on heat, power, scaling
and stability. Reversible gates are able at any time to "undo" the
current step or function. Multiple-valued logic has the advantage of
transporting and evaluating higher bits each clock cycle than binary.
Moreover, we demonstrate in this paper, combining these disciplines
we can construct powerful multiple-valued reversible logic structures.
In this paper a reversible block implemented by pseudo floatinggate
can perform AD-function and a DA-function as its reverse
application.