Abstract: Transmission control protocol (TCP) Vegas detects
network congestion in the early stage and successfully prevents
periodic packet loss that usually occurs in TCP Reno. It has been
demonstrated that TCP Vegas outperforms TCP Reno in many
aspects. However, TCP Vegas suffers several problems that affect its
congestion avoidance mechanism. One of the most important
weaknesses in TCP Vegas is that alpha and beta depend on a good
expected throughput estimate, which as we have seen, depends on a
good minimum RTT estimate. In order to make the system more
robust alpha and beta must be made responsive to network conditions
(they are currently chosen statically). This paper proposes a modified
Vegas algorithm, which can be adjusted to present good performance
compared to other transmission control protocols (TCPs). In order to
do this, we use PSO algorithm to tune alpha and beta. The simulation
results validate the advantages of the proposed algorithm in term of
performance.
Abstract: Compliance requires an effective communication
within an enterprise as well as towards a company-s external
environment. This requirement commences with the
implementation of compliance within large scale compliance
projects and still persists in the compliance reporting within
standard operations. On the one hand the understanding of
compliance necessities within the organization is promoted.
On the other hand reduction of asymmetric information with
compliance stakeholders is achieved. To reach this goal, a
central reporting must provide a consolidated view of different
compliance efforts- statuses. A concept which could be
adapted for this purpose is the balanced scorecard by Kaplan /
Norton. This concept has not been analyzed in detail
concerning its adequacy for a holistic compliance reporting
starting in compliance projects until later usage in regularly
compliance operations.
At first, this paper evaluates if a holistic compliance
reporting can be designed by using the balanced scorecard
concept. The current status of compliance reporting clearly
shows that scorecards are generally accepted as a compliance
reporting tool and are already used for corporate governance
reporting. Additional specialized compliance IT - solutions
exist in the market. After the scorecard-s adequacy is
thoroughly examined and proofed, an example strategy map as
the basis to derive a compliance balanced scorecard is defined.
This definition answers the question on proceeding in
designing a compliance reporting tool.
Abstract: the article analyzes the development prospects of
education system in Kazakhstan. Education is among key sources of
culture and social mobility. Modern education must become civic
which means availability of high quality education to all people
irrespective of their racial, ethnic, religious, social, gender and any
other differences. Socially focused nature of modernization of
Kazakhstan-s society is predicated upon formation of a civic
education model in the future. Kazakhstan-s education system
undergoes intensive reforms first of all intended to achieve
international education standards and integration into the global
educational and information space.
Abstract: In open settings, the participants in virtual
organization are autonomous and there is no central authority to
ensure the felicity of their interactions. When agents interact in such
settings, each relies upon being able to model the trustworthiness of
the agents with whom it interacts. Fundamentally, such models must
consider the past behavior of the other parties in order to predict their
future behavior. Further, it is sensible for the agents to share
information via referrals to trustworthy agents. In this article, trust is
a bet on the future contingent actions of others" and enumerates six
major factors supporting it: (1) reputation, (2) performance, (3)
appearance, (4) accountability, (5) precommitment, and (6)
contextual facilitation.
Abstract: A new secure knapsack cryptosystem based on the
Merkle-Hellman public key cryptosystem will be proposed in this
paper. Although it is common sense that when the density is low, the
knapsack cryptosystem turns vulnerable to the low-density attack. The
density d of a secure knapsack cryptosystem must be larger than
0.9408 to avoid low-density attack. In this paper, we investigate a
new Permutation Combination Algorithm. By exploiting this
algorithm, we shall propose a novel knapsack public-key cryptosystem.
Our proposed scheme can enjoy a high density to avoid the
low-density attack. The density d can also exceed 0.9408 to avoid
the low-density attack.
Abstract: XML files contain data which is in well formatted manner. By studying the format or semantics of the grammar it will be helpful for fast retrieval of the data. There are many algorithms which describes about searching the data from XML files. There are no. of approaches which uses data structure or are related to the contents of the document. In these cases user must know about the structure of the document and information retrieval techniques using NLPs is related to content of the document. Hence the result may be irrelevant or not so successful and may take more time to search.. This paper presents fast XML retrieval techniques by using new indexing technique and the concept of RXML. When indexing an XML document, the system takes into account both the document content and the document structure and assigns the value to each tag from file. To query the system, a user is not constrained about fixed format of query.
Abstract: Information and communication technology (ICT) is
essential to the operation of business, and create many employment
opportunities. High volumes of students graduate in ICT however
students struggle to find job placement. A discrepancy exists between
graduate skills and industry skill requirements. To address the need
for ICT skills required, universities must create programs to meet the
demands of a changing ICT industry. This requires a partnership
between industry, universities and other stakeholders. This situation
may be viewed as a critical systems thinking problem situation as
there are various role players each with their own needs and
requirements. Jackson states a typical critical systems methods has a
pluralistic nature. This paper explores the applicability and suitability
of Maslow and Dooyeweerd to guide understanding and make
recommendations for change in ICT WIL, to foster an all-inclusive
understanding of the situation by stakeholders. The above methods
provide tools for understanding softer issues beyond the skills
required. The study findings suggest that besides skills requirements,
a deeper understanding and empowering students from being a
student to a professional need to be understood and addressed.
Abstract: Knowledge management is a critical component of
competitive success in service organizations. Knowledge
management centers on creating new knowledge and utilizing
existing knowledge. While utilizing existing knowledge relates to
input and control and can lead to a reduction in costs; creating new
knowledge relates to output and growth and can lead to an increase in
revenue. Therefore managers must ensure that they can successfully
optimize the knowledge and talent in their organizations. To do this
they and must try to develop an environment that promotes the
generation, acquisition, transfer and use of valuable knowledge in
creative ways. However knowledge management is complex and
diverse. Research suggests that organizations in general and SMEs in
particular are finding it difficult to implement successful knowledge
management initiatives. Our research attempts to understand whether
organizations are adopting best practice initiatives in their
organizations. This paper presents findings from an exploratory study
of 139 SMEs operating in the tourism sector across Europe. The
goals of the survey is to assess the level of awareness of knowledge
and talent management strategies and methodologies and to
determine whether the responding companies implement best practice
knowledge management initiatives in their organizations Analysis of
the findings from the study are presented and discussed.
Abstract: Composite steel shear wall is a lateral load resisting system which consists of a steel plate with concrete wall attached to one or both sides to prevent it from elastic buckling. The composite behavior is ensured by utilizing high-strength bolts. This paper investigates the effect of distance between bolts, and for this purpose 14 one-story one-bay specimens with various bolts spacing were modeled by finite element code which is developed by the authors. To verify the model, numerical results were compared with a valid experiment which illustrate proper agreement. Results depict increasing the distance between bolts would improve the seismic ever, this increase must be limited, because of large distances will cause widespread buckling of the steel plate in free subpanels between bolts and would result in no improvement. By comparing the results in elastic region, it was observed initial stiffness is not affected by changing the distance.
Abstract: According to historical legend, after the revelation of the holy Qur'an, which gave the hijab compulsory and women were required to cover the head and body with a handkerchief, and the general form of clothing in her veil, Muslim women have begun to comply with this worthy tradition. This article discusses the history of the rise and spread of the hijab and its types. And here is described in detail types of hijab and its intended value, style hijab in different regions. Now wearing the hijab, hijab in general the problem is important not only in the Arab world, but also in the world.
Abstract: Memory forensic is important in digital investigation.
The forensic is based on the data stored in physical memory that
involve memory management and processing time. However, the
current forensic tools do not consider the efficiency in terms of
storage management and the processing time. This paper shows the
high redundancy of data found in the physical memory that cause
inefficiency in processing time and memory management. The
experiment is done using Borland C compiler on Windows XP with
512 MB of physical memory.
Abstract: This paper propose the robust character segmentation method for license plate with topological transform such as twist,rotation. The first step of the proposed method is to find a candidate region for character and license plate. The character or license plate
must be appeared as closed loop in the edge image. In the case of
detecting candidate for character region, the evaluation of detected
region is using topological relationship between each character. When
this method decides license plate candidate region, character features
in the region with binarization are used. After binarization for the detected candidate region, each character region is decided again. In
this step, each character region is fitted more than previous step. In the
next step, the method checks other character regions with different
scale near the detected character regions, because most license plates
have license numbers with some meaningful characters around them.
The method uses perspective projection for geometrical normalization.
If there is topological distortion in the character region, the method
projects the region on a template which is defined as standard license
plate using perspective projection. In this step, the method is able to
separate each number region and small meaningful characters. The
evaluation results are tested with a number of test images.
Abstract: Establishing pumping stations is one of the most common ways of providing water from rivers. There are many issues involved in the design and operation of pumping stations most important of which is the problem of sedimentation. One of the significant issues which must be taken into consideration in designing pumping stations is the operation method and technical matters related to it. Safety and convenience of operation is one of the issues that must be always considered by the designer. Some of the major issues in making decisions regarding the type of design for the station are geographical condition, the location of the station and availability of experts in maintenance and operation of the station. Dimensions of the station must allow free movement for checking and operating pumps after installation of pumps and plumbing system.
Abstract: A power cable is widely used for power supply in
power distributing networks and power transmission lines. Due to
limitations in the production, delivery and setting up power cables,
they are produced and delivered in several separate lengths. Cable
itself, consists of two cable terminations and arbitrary number of
cable joints, depending on the cable route length. Electrical stress
control is needed to prevent a dielectric breakdown at the end of the
insulation shield in both the air and cable insulation. Reliability of
cable joint depends on its materials, design, installation and operating
environment. The paper describes design and performance results for
new modeled cable joints. Design concepts, based on numerical
calculations, must be correct. An Equivalent Electrodes
Method/Boundary Elements Method-hybrid approach that allows
electromagnetic field calculations in multilayer dielectric media,
including inhomogeneous regions, is presented.
Abstract: Reasonably priced and well-constructed housing must
be an integral and element supporting a healthy society. The absence
of housing everyone in society can afford negatively affects the
people's health, education, ability to get jobs, develop their
community. Without access to decent housing, economic
development, integration of immigrants and inclusiveness, the society
is negatively impacted. Canada has a sterling record in creating
housing compared to many other nations around the globe. Canadian
housing gets support from a mature and responsive mortgage network
and a top-quality construction industry as well as safe and excellent
quality building materials that are readily available. Yet 1.7 million
Canadian households occupy substandard abodes. During the past
hundred years, Canada's government has made a wide variety of
attempts to provide decent residential facilities every Canadian can
afford. Despite these laudable efforts, today Canada is left with
housing that is inadequate for many Canadians. People who own their
housing are given all kinds of privileges and perks, while people with
relatively low incomes who rent their apartments or houses are
discriminated against.
To help solve these problems, zoning that is based on an
"inclusionary" philosophy is tool developed to help provide people
the affordable residences that they need. No, thirty years after its
introduction, this type of zoning has been shown effective in helping
build and provide Canadians with a houses or apartments they can
afford to pay for. Using this form of zoning can have different results
+depending on where and how it is used. After examining Canadian
affordable housing and four American cases where this type of
zoning was enforced in the USA, this makes various
recommendations for expanding Canadians' access to housing they
can afford.
Abstract: Model-based approaches have been applied successfully
to a wide range of tasks such as specification, simulation, testing, and
diagnosis. But one bottleneck often prevents the introduction of these
ideas: Manual modeling is a non-trivial, time-consuming task.
Automatically deriving models by observing and analyzing running
systems is one possible way to amend this bottleneck. To
derive a model automatically, some a-priori knowledge about the
model structure–i.e. about the system–must exist. Such a model
formalism would be used as follows: (i) By observing the network
traffic, a model of the long-term system behavior could be generated
automatically, (ii) Test vectors can be generated from the model,
(iii) While the system is running, the model could be used to diagnose
non-normal system behavior.
The main contribution of this paper is the introduction of a model
formalism called 'probabilistic regression automaton' suitable for the
tasks mentioned above.
Abstract: Using the animations video of teaching materials is an
effective learning method. However, we thought that more effective learning method is to produce the teaching video by learners
themselves. The learners who act as the producer must learn and understand well to produce and present video of teaching materials to
others. The purpose of this study is to propose the project based learning (PBL) technique by co-producing video of IT (information
technology) teaching materials. We used the T2V player to produce
the video based on TVML a TV program description language. By
proposed method, we have assigned the learners to produce the
animations video for “National Examination for Information
Processing Technicians (IPA examination)" in Japan, in order to get
them learns various knowledge and skill on IT field. Experimental
result showed that learning effect has occurred at the video production
process that useful for IT personnel resources development.
Abstract: An electronic portal image device (EPID) has become
a method of patient-specific IMRT dose verification for radiotherapy.
Research studies have focused on pre and post-treatment verification,
however, there are currently no interventional procedures using EPID
dosimetry that measure the dose in real time as a mechanism to
ensure that overdoses do not occur and underdoses are detected as
soon as is practically possible. As a result, an EPID-based real time
dose verification system for dynamic IMRT was developed and was
implemented with MATLAB/Simulink. The EPID image acquisition
was set to continuous acquisition mode at 1.4 images per second. The
system defined the time constraint gap, or execution gap at the image
acquisition time, so that every calculation must be completed before
the next image capture is completed. In addition, the
Abstract: The implementations of green roof have been widely
used in the developed countries such as Germany, United Kingdom,
United States and Canada. Green roof have many benefits such as
aesthetic and economic value, ecological gain which are optimization
of storm water management, urban heat island mitigation and energy
conservation. In term of pollution, green roof can control the air and
noise pollution in urban cities. The application of green roof in
Malaysian building has been studied with the previous work of green
roof either in Malaysia or other Asian region as like Indonesia,
Singapore, Thailand, Taiwan and several other countries that have
similar climate and environment as in Malaysia. These technologies
of adapting green roof have been compared to the Green Building
Index (GBI) of Malaysian buildings. The study has concentrated on
the technical aspect of green roof system having focused on i) waste
& recyclable materials ii) types of plants and method of planting and
iii) green roof as tool to reduce storm water runoff. The finding of
these areas will be compared to the suitability in achieving good
practice of the GBI in Malaysia. Results show that most of the
method are based on the countries own climate and environment.
This suggests that the method of using green roof must adhere to the
tropical climate of Malaysia. Suggestion of this research will be
viewed in term of the sustainability of the green roof. Further
research can be developed to implement the best method and
application in Malaysian climate especially in urban cities and
township.
Abstract: If science is supposed to gain greater social
relevance and acceptance, researchers must not only relate to
the broader public, but also promote intercourse within the
ivory tower itself. The latter process has been under way
successfully for a number of years in the form of
transdisciplinary research initiatives. What is still lacking is a
broad debate about the necessity to look around properly and
face up to opposing views on one and the same topic within
our own discipline.