Abstract: Network-Centric Air Defense Missile Systems
(NCADMS) represents the superior development of the air defense
missile systems and has been regarded as one of the major research
issues in military domain at present. Due to lack of knowledge and
experience on NCADMS, modeling and simulation becomes an effective
approach to perform operational analysis, compared with
those equation based ones. However, the complex dynamic interactions
among entities and flexible architectures of NCADMS put forward
new requirements and challenges to the simulation framework
and models. ABS (Agent-Based Simulations) explicitly addresses
modeling behaviors of heterogeneous individuals. Agents have capability
to sense and understand things, make decisions, and act on the
environment. They can also cooperate with others dynamically to
perform the tasks assigned to them. ABS proves an effective approach
to explore the new operational characteristics emerging in
NCADMS. In this paper, based on the analysis of network-centric
architecture and new cooperative engagement strategies for
NCADMS, an agent-based simulation framework by expanding the
simulation framework in the so-called System Effectiveness Analysis
Simulation (SEAS) was designed. The simulation framework specifies
components, relationships and interactions between them, the
structure and behavior rules of an agent in NCADMS. Based on scenario
simulations, information and decision superiority and operational
advantages in NCADMS were analyzed; meanwhile some
suggestions were provided for its future development.
Abstract: A fuzzy classifier using multiple ellipsoids approximating decision regions for classification is to be designed in this paper. An algorithm called Gustafson-Kessel algorithm (GKA) with an adaptive distance norm based on covariance matrices of prototype data points is adopted to learn the ellipsoids. GKA is able toadapt the distance norm to the underlying distribution of the prototypedata points except that the sizes of ellipsoids need to be determined a priori. To overcome GKA's inability to determine appropriate size ofellipsoid, the genetic algorithm (GA) is applied to learn the size ofellipsoid. With GA combined with GKA, it will be shown in this paper that the proposed method outperforms the benchmark algorithms as well as algorithms in the field.
Abstract: This article investigates a contribution of synthesized visual speech. Synthesis of visual speech expressed by a computer consists in an animation in particular movements of lips. Visual speech is also necessary part of the non-manual component of a sign language. Appropriate methodology is proposed to determine the quality and the accuracy of synthesized visual speech. Proposed methodology is inspected on Czech speech. Hence, this article presents a procedure of recording of speech data in order to set a synthesis system as well as to evaluate synthesized speech. Furthermore, one option of the evaluation process is elaborated in the form of a perceptual test. This test procedure is verified on the measured data with two settings of the synthesis system. The results of the perceptual test are presented as a statistically significant increase of intelligibility evoked by real and synthesized visual speech. Now, the aim is to show one part of evaluation process which leads to more comprehensive evaluation of the sign speech synthesis system.
Abstract: Among all geo-hydrological relationships, rainfallrunoff
relationship is of utmost importance in any hydrological
investigation and water resource planning. Spatial variation, lag time
involved in obtaining areal estimates for the basin as a whole can
affect the parameterization in design stage as well as in planning
stage. In conventional hydrological processing of data, spatial aspect
is either ignored or interpolated at sub-basin level. Temporal
variation when analysed for different stages can provide clues for its
spatial effectiveness. The interplay of space-time variation at pixel
level can provide better understanding of basin parameters.
Sustenance of design structures for different return periods and their
spatial auto-correlations should be studied at different geographical
scales for better management and planning of water resources.
In order to understand the relative effect of spatio-temporal
variation in hydrological data network, a detailed geo-hydrological
analysis of Betwa river catchment falling in Lower Yamuna Basin is
presented in this paper. Moreover, the exact estimates about the
availability of water in the Betwa river catchment, especially in the
wake of recent Betwa-Ken linkage project, need thorough scientific
investigation for better planning. Therefore, an attempt in this
direction is made here to analyse the existing hydrological and
meteorological data with the help of SPSS, GIS and MS-EXCEL
software. A comparison of spatial and temporal correlations at subcatchment
level in case of upper Betwa reaches has been made to
demonstrate the representativeness of rain gauges. First, flows at
different locations are used to derive correlation and regression
coefficients. Then, long-term normal water yield estimates based on
pixel-wise regression coefficients of rainfall-runoff relationship have
been mapped. The areal values obtained from these maps can
definitely improve upon estimates based on point-based
extrapolations or areal interpolations.
Abstract: The aims of this study were to compare the
differences of being good membership behavior among faculties and
staffs of Suan Sunandha Rajabhat University with different sex, age,
income, education, marital status, and working period, and
investigate the relationships between organizational commitment and
being good membership behavior. The research methodology
employed a questionnaire as a quantitative method. The respondents
were 305 faculties and staffs of Suan Sunandha Rajabhat University.
This research used Percentage, Mean, Standard Deviation, t-test,
One-Way ANOVA Analysis of Variance, and Pearson’s Product
Moment Correlation Coefficient in data analysis. The results showed
that organizational commitment among faculties and staffs of Suan
Sunandha Rajabhat University was at a high level. In addition,
differences in sex, age, income, education, marital status, and
working period revealed differences in being good membership
behavior. The results also indicated that organizational commitment
was significantly related to being good membership behavior.
Abstract: This paper presents comparative emission study of
newly introduced gasoline/LPG bifuel automotive engine in Indian
market. Emissions were tested as per LPG-Bharat stage III driving
cycle. Emission tests were carried out for urban cycle and extra urban
cycle. Total time for urban and extra urban cycle was 1180 sec.
Engine was run in LPG mode by using conversion system. Emissions
were tested as per standard procedure and were compared. Corrected
emissions were computed by deducting ambient reading from sample
reading. Paper describes detail emission test procedure and results
obtained. CO emissions were in the range of38.9 to 111.3 ppm. HC
emissions were in the range of 18.2 to 62.6 ppm. Nox emissions were
08 to 3.9 ppm and CO2 emissions were from 6719.2 to 8051 ppm.
Paper throws light on emission results of LPG vehicles recently
introduced in Indian automobile market. Objectives of this
experimental study were to measure emissions of engines in gasoline
& LPG mode and compare them.
Abstract: In the paper a method of modeling text for Polish is
discussed. The method is aimed at transforming continuous input text
into a text consisting of sentences in so called canonical form, whose
characteristic is, among others, a complete structure as well as no
anaphora or ellipses. The transformation is lossless as to the content
of text being transformed. The modeling method has been worked
out for the needs of the Thetos system, which translates Polish
written texts into the Polish sign language. We believe that the
method can be also used in various applications that deal with the
natural language, e.g. in a text summary generator for Polish.
Abstract: This study investigated the relationships between the
active learning strategies (discussion, video clips, game show, role–
play, five minute paper, clarification pauses, and small group) and
academic achievement among a sample of 158 undergraduate
psychology students in The University of the West Indies (UWI),
Barbados. Results revealed statistically significant positive
correlations between active learning strategies and students’
academic achievement; so also the active learning strategies
contributed 22% (Rsq=0.222) to the variance being accounted for in
academic achievement and this was found to be statistically
significant (F(7,150) = 6.12, p < .05). Additionally, group work
emerged as the best active learning strategy and had the highest
correlation with the students’ academic achievement. These results
were discussed in the light of the importance of the active learning
strategies promoting academic achievement among the university
students.
Abstract: This paper proposes an analytical method for the
dynamics of generating firms- alliance networks along with business
phases. Dynamics in network developments have previously been
discussed in the research areas of organizational strategy rather than in
the areas of regional cluster, where the static properties of the
networks are often discussed. The analytical method introduces the
concept of business phases into innovation processes and uses
relationships called prior experiences; this idea was developed in
organizational strategy to investigate the state of networks from the
viewpoints of tradeoffs between link stabilization and node
exploration. This paper also discusses the results of the analytical
method using five cases of the network developments of firms. The
idea of Embeddedness helps interpret the backgrounds of the
analytical results. The analytical method is useful for policymakers of
regional clusters to establish concrete evaluation targets and a
viewpoint for comparisons of policy programs.
Abstract: Educational institutions increasingly adopt the
students-as-customers concept to satisfy their students.
Understanding students- perspectives on the use of this business
concept in educational institutions is necessary for the institutions to
effectively align these perspectives with their management practice.
The study investigates whether students in technology and business
disciplines have significantly different attitudes toward using the
students-as-customers concept in educational institutions and
explores the impact of treating students as customers in technology
disciplines under students- perspectives. The results from
quantitative and qualitative data analyses show that technology
students, in contrast to business students, fairly disagree with
educational institutions to treat students as customers. Treating
students as customers in technology disciplines will have a negative
influence on teaching performance, instructor-student relationships
and educational institutions- aim, but a positive influence on service
quality in educational institutions. The paper discusses the findings
and concludes with implications and limitations of the study.
Abstract: This paper discusses the use of explorative data
mining tools that allow the educator to explore new relationships
between reported learning experiences and actual activities,
even if there are multiple dimensions with a large number
of measured items. The underlying technology is based on
the so-called Compendium Platform for Reproducible Computing
(http://www.freestatistics.org) which was built on top the computational
R Framework (http://www.wessa.net).
Abstract: A review of the literature found that Domestic
violence and child maltreatment co-occur in many families, the
purpose of this study attempts to emphasize the factors relating to
intra-family relationships (order point of view) on violence against
the children, For this purpose a survey technique on the sample size
amounted 200 students of governmental guidance schools of city of
Gilanegharb in country of Iran were considered. For measurement of
violence against the children (VAC) the CTS scaled has been used
.The results showed that children have experienced the violence more
than once during the last year. degree of order in family is high.
Explanation result indicated that the order variables in family
including collective thinking, empathy, communal co-circumstance
have significant effects on VAC.
Abstract: There is a real threat on the VIPs personal pages on
the Social Network Sites (SNS). The real threats to these pages is
violation of privacy and theft of identity through creating fake pages
that exploit their names and pictures to attract the victims and spread
of lies. In this paper, we propose a new secure architecture that
improves the trusting and finds an effective solution to reduce fake
pages and possibility of recognizing VIP pages on SNS. The
proposed architecture works as a third party that is added to
Facebook to provide the trust service to personal pages for VIPs.
Through this mechanism, it works to ensure the real identity of the
applicant through the electronic authentication of personal
information by storing this information within content of their
website. As a result, the significance of the proposed architecture is
that it secures and provides trust to the VIPs personal pages.
Furthermore, it can help to discover fake page, protect the privacy,
reduce crimes of personality-theft, and increase the sense of trust and
satisfaction by friends and admirers in interacting with SNS.
Abstract: An Optimal Power Flow based on Improved Particle
Swarm Optimization (OPF-IPSO) with Generator Capability Curve
Constraint is used by NN-OPF as a reference to get pattern of
generator scheduling. There are three stages in Designing NN-OPF.
The first stage is design of OPF-IPSO with generator capability curve
constraint. The second stage is clustering load to specific range and
calculating its index. The third stage is training NN-OPF using
constructive back propagation method. In training process total load
and load index used as input, and pattern of generator scheduling
used as output. Data used in this paper is power system of Java-Bali.
Software used in this simulation is MATLAB.
Abstract: The results of the two-phase gas-solid jet in pneumatic
powder injection process analysis were presented in the paper. The
researches were conducted on model set-up with high speed camera
jet movement recording. Then the recorded material was analyzed to
estimate main particles movement parameters. The values obtained
from this direct measurement were compared to those calculated with
the use of the well-known formulas for the two-phase flows
(pneumatic conveying). Moreover, they were compared to
experimental results previously achieved by authors. The analysis led
to conclusions which to some extent changed the assumptions used
even by authors, regarding the two-phase jet in pneumatic powder
injection process. Additionally, the visual analysis of the recorded
clips supplied data to make a more complete evaluation of the jet
behavior in the lance outlet than before.
Abstract: Static synchronous compensator (STATCOM) is a shunt connected voltage source converter (VSC), which can affect rapid control of reactive flow in the transmission line by controlling the generated a.c. voltage. The main aim of the paper is to design a power system installed with a Static synchronous compensator (STATCOM) and demonstrates the application of the linearised Phillips-heffron model in analyzing the damping effect of the STATCOM to improve power system oscillation stability. The proposed PI controller is designed to coordinate two control inputs: Voltage of the injection bus and capacitor voltage of the STATCOM, to improve the Dynamic stability of a SMIB system .The power oscillations damping (POD) control and power system stabilizer (PSS) and their coordinated action with proposed controllers are tested. The simulation result shows that the proposed damping controllers provide satisfactory performance in terms of improvements of dynamic stability of the system.
Abstract: Cryptographic algorithms play a crucial role in the
information society by providing protection from unauthorized
access to sensitive data. It is clear that information technology will
become increasingly pervasive, Hence we can expect the emergence
of ubiquitous or pervasive computing, ambient intelligence. These
new environments and applications will present new security
challenges, and there is no doubt that cryptographic algorithms and
protocols will form a part of the solution. The efficiency of a public
key cryptosystem is mainly measured in computational overheads,
key size and bandwidth. In particular the RSA algorithm is used in
many applications for providing the security. Although the security
of RSA is beyond doubt, the evolution in computing power has
caused a growth in the necessary key length. The fact that most chips
on smart cards can-t process key extending 1024 bit shows that there
is need for alternative. NTRU is such an alternative and it is a
collection of mathematical algorithm based on manipulating lists of
very small integers and polynomials. This allows NTRU to high
speeds with the use of minimal computing power. NTRU (Nth degree
Truncated Polynomial Ring Unit) is the first secure public key
cryptosystem not based on factorization or discrete logarithm
problem. This means that given sufficient computational resources
and time, an adversary, should not be able to break the key. The
multi-party communication and requirement of optimal resource
utilization necessitated the need for the present day demand of
applications that need security enforcement technique .and can be
enhanced with high-end computing. This has promoted us to develop
high-performance NTRU schemes using approaches such as the use
of high-end computing hardware. Peer-to-peer (P2P) or enterprise
grids are proven as one of the approaches for developing high-end
computing systems. By utilizing them one can improve the
performance of NTRU through parallel execution. In this paper we
propose and develop an application for NTRU using enterprise grid
middleware called Alchemi. An analysis and comparison of its
performance for various text files is presented.
Abstract: Activity-Based Costing (ABC) represents an
alternative paradigm to traditional cost accounting system and
it often provides more accurate cost information for decision
making such as product pricing, product mix, and make-orbuy
decisions. ABC models the causal relationships between
products and the resources used in their production and traces
the cost of products according to the activities through the use
of appropriate cost drivers. In this paper, the implementation
of the ABC in a manufacturing system is analyzed and a
comparison with the traditional cost based system in terms of
the effects on the product costs are carried out to highlight the
difference between two costing methodologies. By using this
methodology, a valuable insight into the factors that cause the
cost is provided, helping to better manage the activities of the
company.
Abstract: This paper includes a positive analysis to quantitatively grasp the relationship among vulnerability, information security incidents, and the countermeasures by using data based on a 2007 questionnaire survey for Japanese ISPs (Internet Service Providers). To grasp the relationships, logistic regression analysis is used. The results clarify that there are relationships between information security incidents and the countermeasures. Concretely, there is a positive relationship between information security incidents and the number of information security systems introduced as well as a negative relationship between information security incidents and information security education. It is also pointed out that (especially, local) ISPs do not execute efficient information security countermeasures/ investment concerned with systems, and it is suggested that they should positively execute information security education. In addition, to further heighten the information security level of Japanese telecommunication infrastructure, the necessity and importance of the government to implement policy to support the countermeasures of ISPs is insisted.