Abstract: To date, one of the few comprehensive indicators for
the measurement of food security is the Global Food Security Index
(GFSI). This index is a dynamic quantitative and qualitative
benchmarking model, constructed from 28 unique indicators, that
measures drivers of food security across both developing and
developed countries. Whereas the GFSI has been calculated across a
set of 109 countries, in this paper we aim to present and compare, for
the Middle East and North Africa (MENA), 1) the Food Security
Index scores achieved and 2) the data available on affordability,
availability, and quality of food. The data for this work was taken
from the latest available report published by the creators of the GFSI,
which in turn used information from national and international
statistical sources. MENA countries rank from place 17/109 (Israel,
although with resent political turmoil this is likely to have changed)
to place 91/109 (Yemen) with household expenditure spent in food
ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food
as a share of household consumption in most countries and better
food safety net programs in the MENA have contributed to a notable
increase in food affordability. The region has also, however,
experienced a decline in food availability, owing to more limited
food supplies and higher volatility of agricultural production. In
terms of food quality and safety the MENA has the top ranking
country (Israel). The most frequent challenges faced by the countries
of the MENA include public expenditure on agricultural research and
development as well as volatility of agricultural production. Food
security is a complex phenomenon that interacts with many other
indicators of a country’s wellbeing; in the MENA it is slowly but
markedly improving.
Abstract: Locating Radio Controlled (RC) devices using their
unintended emissions has a great interest considering security
concerns. Weak nature of these emissions requires near field
localization approach since it is hard to detect these signals in far
field region of array. Instead of only angle estimation, near field
localization also requires range estimation of the source which makes
this method more complicated than far field models. Challenges of
locating such devices in a near field region and real time environment
are analyzed in this paper. An ESPRIT like near field localization
scheme is utilized for both angle and range estimation. 1-D search
with symmetric subarrays is provided. Two 7 element uniform linear
antenna arrays (ULA) are employed for locating RC source.
Experiment results of location estimation for one unintended emitting
walkie-talkie for different positions are given.
Abstract: Cost of governance in Nigeria has become a challenge
to development and concern to practitioners and scholars alike in the
field of business and social science research. In the 2010 national
budget of NGN4.6 trillion or USD28.75billion for instance, only a
pantry sum of NGN1.8trillion or USD11.15billion was earmarked for
capital expenditure. Similarly, in 2013, out of a total national budget
of NGN4.92trillion or USD30.75billion, only the sum of
NGN1.50trllion or USD9.38billion was voted for capital expenditure.
Therefore, based on the data sourced from the Nigerian Office of
Statistics, Central bank of Nigeria Statistical Bulletin as well as from
the United Nations Development Programme, this study examined
the causes of high cost of governance in Nigeria. It found out that the
high cost of governance in the country is in the interest of the ruling
class, arising from their unethical behaviour – corrupt practices and
the poor management of public resources. As a result, the study
recommends the need to intensify the war against corruption and
mismanagement of public resources by government officials as
possible solution to overcome the high cost of governance in Nigeria.
This could be achieved by strengthening the constitutional powers of
the various anti-corruption agencies in the area of arrest, investigation
and prosecution of offenders without the interference of the executive
arm of government either at the local, state or federal level.
Abstract: Climate change confronts the built environment with
many new challenges in the form of more severe and frequent hydrometeorological
events. A series of strategies is proposed whereby the
various aspects of buildings and their sites can be made more resilient
to the effects of such events.
Abstract: e-Service has moved from the usual manual and
traditional way of rendering services to electronic service provision
for the public and there are several reasons for implementing these
services, Airline ticketing have gone from its manual traditional way
to an intelligent web-driven service of purchasing. Many companies
have seen their profits doubled through the use of online services in
their operation and a typical example is Hewlett Packard (HP) which
is rapidly transforming their after sales business into a profit
generating e-service business unit.
This paper will examine the various challenges confronting e-
Service adoption and implementation in Nigeria and also analyse
lessons learnt from e-Service adoption and implementation in Asia to
see how it could be useful in Nigeria which is a lower middle income
country. From the analysis of the online survey data, it has been
identified that the public in Nigeria are much aware of e-Services but
successful adoption and implementation have been the problems
faced.
Abstract: In this paper, we present a robust algorithm to recognize extracted text from grocery product images captured by mobile phone cameras. Recognition of such text is challenging since text in grocery product images varies in its size, orientation,
style, illumination, and can suffer from perspective distortion.
Pre-processing is performed to make the characters scale and
rotation invariant. Since text degradations can not be appropriately
defined using well-known geometric transformations such
as translation, rotation, affine transformation and shearing, we
use the whole character black pixels as our feature vector.
Classification is performed with minimum distance classifier
using the maximum likelihood criterion, which delivers very
promising Character Recognition Rate (CRR) of 89%. We
achieve considerably higher Word Recognition Rate (WRR) of
99% when using lower level linguistic knowledge about product
words during the recognition process.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: Logistics distributors face the issue of having to
provide increasing service levels while being forced to reduce costs at
the same time. Same-day delivery, quick order processing and rapidly
growing ranges of articles are only some of the prevailing challenges.
One key aspect of the performance of an intra-logistics system is how
often and in which amplitude congestions and dysfunctions affect the
processing operations. By gaining knowledge of the so called
‘performance availability’ of such a system during the planning stage,
oversizing and wasting can be reduced whereas planning
transparency is increased. State of the art for the determination of this
KPI is simulation studies. However, their structure and therefore their
results may vary unforeseeably. This article proposes a concept for
the establishment of ‘certified’ and hence reliable and comparable
simulation models.
Abstract: This paper investigates the joint effect of the
interconnected (n,k)-star network topology and Multi-Agent
automated control on restoration and reconfiguration of power
systems. With the increasing trend in development in Multi-Agent
control technologies applied to power system reconfiguration
in presence of faulty components or nodes. Fault tolerance is
becoming an important challenge in the design processes of the
distributed power system topology. Since the reconfiguration of a
power system is performed by agent communication, the (n,k)-star
interconnected network topology is studied and modeled in this
paper to optimize the process of power reconfiguration. In this paper,
we discuss the recently proposed (n,k)-star topology and examine its
properties and advantages as compared to the traditional multi-bus
power topologies. We design and simulate the topology model for
distributed power system test cases. A related lemma based on the
fault tolerance and conditional diagnosability properties is presented
and proved both theoretically and practically. The conclusion is
reached that (n,k)-star topology model has measurable advantages
compared to standard bus power systems while exhibiting fault
tolerance properties in power restoration, as well as showing
efficiency when applied to power system route discovery.
Abstract: Ontologies offer a means for representing and sharing
information in many domains, particularly in complex domains. For
example, it can be used for representing and sharing information
of System Requirement Specification (SRS) of complex systems
like the SRS of ERTMS/ETCS written in natural language. Since
this system is a real-time and critical system, generic ontologies,
such as OWL and generic ERTMS ontologies provide minimal
support for modeling temporal information omnipresent in these SRS
documents. To support the modeling of temporal information, one
of the challenges is to enable representation of dynamic features
evolving in time within a generic ontology with a minimal redesign
of it. The separation of temporal information from other information
can help to predict system runtime operation and to properly design
and implement them. In addition, it is helpful to provide a reasoning
and querying techniques to reason and query temporal information
represented in the ontology in order to detect potential temporal
inconsistencies. To address this challenge, we propose a lightweight
3-layer temporal Quality of Service (QoS) ontology for representing,
reasoning and querying over temporal and non-temporal information
in a complex domain ontology. Representing QoS entities in separated
layers can clarify the distinction between the non QoS entities
and the QoS entities in an ontology. The upper generic layer of
the proposed ontology provides an intuitive knowledge of domain
components, specially ERTMS/ETCS components. The separation of
the intermediate QoS layer from the lower QoS layer allows us to
focus on specific QoS Characteristics, such as temporal or integrity
characteristics. In this paper, we focus on temporal information that
can be used to predict system runtime operation. To evaluate our
approach, an example of the proposed domain ontology for handover
operation, as well as a reasoning rule over temporal relations in this
domain-specific ontology, are presented.
Abstract: Excavation and retaining walls are of challenging
issues in civil engineering. In this study, the behavior of one
important type of supporting systems called Contiguous Bored Pile
(CBP) retaining wall is investigated using a physical model. Besides,
a comparison is made between two modes of free end piles (soft bed)
and fixed end piles (stiff bed). Also a back calculation of effective
length (the real free length of pile) is done by measuring lateral
deflection of piles in different stages of excavation in both
aforementioned cases. Based on observed results, for the fixed end
mode, the effective length to free length ratio (Leff/L0) is equal to
unity in initial stages of excavation and less than 1 in its final stages
in a decreasing manner. While this ratio for free end mode, remains
constant during all stages of excavation and is always less than unity.
Abstract: Communicating and managing customers’
requirements in software development projects play a vital role in the
software development process. While it is difficult to do so locally, it
is even more difficult to communicate these requirements over
distributed boundaries and to convey them to multiple distribution
customers. This paper discusses the communication of multiple
distribution customers’ requirements in the context of customised
software products. The main purpose is to understand the challenges
of communicating and managing customisation requirements across
distributed boundaries. We propose a model for Communicating
Customisation Requirements of Multi-Clients in a Distributed
Domain (CCRD). Thereafter, we evaluate that model by presenting
the findings of a case study conducted with a company with
customisation projects for 18 distributed customers. Then, we
compare the outputs of the real case process and the outputs of the
CCRD model using simulation methods. Our conjecture is that the
CCRD model can reduce the challenge of communication
requirements over distributed organisational boundaries, and the
delay in decision making and in the entire customisation process
time.
Abstract: Learner motivation is considered to be an important
component for the Blended e-Learning (BL) Method. BL is an
effective learning method in multiple domains, which opens several
opportunities for its participants to engage in the learning
environment. This research explores the learners’ perspective of BL
according to the Self-Determination Theory (SDT). It identifies the
opportunities and challenges for using the BL in Logistics Education
(LE) in Egyptian Higher Education (HE). SDT is approached from
different perspectives within the relationship between Intrinsic
Motivation (IM), Extrinsic Motivation (EM) and Amotivation (AM).
A self-administered face-to-face questionnaire was used to collect
data from learners who were geographically widely spread around
three colleges of International Transport and Logistics (CILTs) at the
Arab Academy for Science, Technology and Maritime Transport
(AAST&MT) in Egypt. Six hundred and sixteen undergraduates
responded to a questionnaire survey. Respondents were drawn from
three branches in Greater Cairo, Alexandria, and Port Said. The data
analysis used was SPSS 22 and AMOS 18.
Abstract: This paper aims to analyze the role of natural
language processing (NLP). The paper will discuss the role in the
context of automated data retrieval, automated question answer, and
text structuring. NLP techniques are gaining wider acceptance in real
life applications and industrial concerns. There are various
complexities involved in processing the text of natural language that
could satisfy the need of decision makers. This paper begins with the
description of the qualities of NLP practices. The paper then focuses
on the challenges in natural language processing. The paper also
discusses major techniques of NLP. The last section describes
opportunities and challenges for future research.
Abstract: Underwater acoustic network is one of the rapidly
growing areas of research and finds different applications for
monitoring and collecting various data for environmental studies. The
communication among dynamic nodes and high error probability in
an acoustic medium forced to maximize energy consumption in
Underwater Sensor Networks (USN) than in traditional sensor
networks. Developing energy-efficient routing protocol is the
fundamental and a curb challenge because all the sensor nodes are
powered by batteries, and they cannot be easily replaced in UWSNs.
This paper surveys the various recent routing techniques that mainly
focus on energy efficiency.
Abstract: The research conducted in early seventies apparently
assumed the existence of a universal decision model for union
negotiators and furthermore tended to regard financial information as
a ‘neutral’ input into a rational decision making process. However,
research in the eighties began to question the neutrality of financial
information as an input in collective bargaining rather viewing it as a
potentially effective means for controlling the labour force.
Furthermore, this later research also started challenging the simplistic
assumptions relating particularly to union objectives which have
underpinned the earlier search for universal union decision models.
Despite the above developments there seems to be a dearth of studies
in developing countries concerning the use of financial information in
collective bargaining. This paper seeks to begin to remedy this
deficiency. Utilising a case study approach based on two enterprises,
one in the public sector and the other a multinational, the universal
decision model is rejected and it is argued that the decision whether
or not to use financial information is a contingent one and such a
contingency is largely defined by the context and environment in
which both union and management negotiators work. An attempt is
also made to identify the factors constraining as well as promoting
the use of financial information in collective bargaining, these being
regarded as unique to the organisations within which the case studies
are conducted.
Abstract: E-business technologies, whereby business
transactions are conducted remotely using the Internet, present
unique opportunities and challenges for business. E-business
technologies are applicable to a wide range of organizations and
small and medium-sized enterprises (SMEs) are no exception. There
is an established body of literature about e-business, looking at
definitions, concepts, benefits and challenges. In general, however,
the research focus has been on larger organizations, not SMEs. In an
attempt to redress the balance of research, this paper looks at ebusiness
technologies specifically from a small business perspective.
It seeks to identify the possible barriers that SMEs might face when
considering adoption of the e-business concept and practice as part of
their business process change initiatives and implementation. To
facilitate analysis of these barriers a conceptual framework has been
developed which outlines the key conceptual and practical challenges
of e-business implementation in SMEs. This is developed following a
literature survey comprised of three categories: characteristics of
SMEs, issues of IS/IT use in SMEs and general e-business adoption
and implementation issues. The framework is then empirically
assessed against 7 SMEs who have yet to implement e-business or
whose e-business efforts have been unsatisfactory. Conclusions from
the case studies can be used to verify the framework, and set
parameters for further larger scale empirical investigation.
Abstract: As enterprise computing becomes more and more
complex, the costs and technical challenges of IT system maintenance
and support are increasing rapidly. One popular approach to managing
IT system maintenance is to prepare and use a FAQ (Frequently Asked
Questions) system to manage and reuse systems knowledge. Such a
FAQ system can help reduce the resolution time for each service
incident ticket. However, there is a major problem where over time the
knowledge in such FAQs tends to become outdated. Much of the
knowledge captured in the FAQ requires periodic updates in response
to new insights or new trends in the problems addressed in order to
maintain its usefulness for problem resolution. These updates require a
systematic approach to define the exact portion of the FAQ and its
content. Therefore, we are working on a novel method to
hierarchically structure the FAQ and automate the updates of its
structure and content. We use structured information and the
unstructured text information with the timelines of the information in
the service incident tickets. We cluster the tickets by structured
category information, by keywords, and by keyword modifiers for the
unstructured text information. We also calculate an urgency score
based on trends, resolution times, and priorities. We carefully studied
the tickets of one of our projects over a 2.5-year time period. After the
first 6 months we started to create FAQs and confirmed they improved
the resolution times. We continued observing over the next 2 years to
assess the ongoing effectiveness of our method for the automatic FAQ
updates. We improved the ratio of tickets covered by the FAQ from
32.3% to 68.9% during this time. Also, the average time reduction of
ticket resolution was between 31.6% and 43.9%. Subjective analysis
showed more than 75% reported that the FAQ system was useful in
reducing ticket resolution times.
Abstract: Particles are the most common and cheapest
reinforcement producing discontinuous reinforced composites with
isotropic properties. Conventional fabrication methods can be used to
produce a wide range of product forms, making them relatively
inexpensive. Optimising composite development must include
consideration of all the fundamental aspect of particles including
their size, shape, volume fraction, distribution and mechanical
properties. Research has shown that the challenges of low fracture
toughness, poor crack growth resistance and low thermal stability can
be overcome by reinforcement with particles. The unique properties
exhibited by micro particles reinforced ceramic composites have
made them to be highly attractive in a vast array of applications.
Abstract: Mammography has been one of the most reliable
methods for early detection of breast cancer. There are different
lesions which are breast cancer characteristic such as
microcalcifications, masses, architectural distortions and bilateral
asymmetry. One of the major challenges of analysing digital
mammogram is how to extract efficient features from it for accurate
cancer classification. In this paper we proposed a hybrid feature
extraction method to detect and classify all four signs of breast
cancer. The proposed method is based on multiscale surrounding
region dependence method, Gabor filters, multi fractal analysis,
directional and morphological analysis. The extracted features are
input to self adaptive resource allocation network (SRAN) classifier
for classification. The validity of our approach is extensively
demonstrated using the two benchmark data sets Mammographic
Image Analysis Society (MIAS) and Digital Database for Screening
Mammograph (DDSM) and the results have been proved to be
progressive.