The Ability of Forecasting the Term Structure of Interest Rates Based On Nelson-Siegel and Svensson Model

Due to the importance of yield curve and its estimation it is inevitable to have valid methods for yield curve forecasting in cases when there are scarce issues of securities and/or week trade on a secondary market. Therefore in this paper, after the estimation of weekly yield curves on Croatian financial market from October 2011 to August 2012 using Nelson-Siegel and Svensson models, yield curves are forecasted using Vector autoregressive model and Neural networks. In general, it can be concluded that both forecasting methods have good prediction abilities where forecasting of yield curves based on Nelson Siegel estimation model give better results in sense of lower Mean Squared Error than forecasting based on Svensson model Also, in this case Neural networks provide slightly better results. Finally, it can be concluded that most appropriate way of yield curve prediction is Neural networks using Nelson-Siegel estimation of yield curves.

Prevention of Corruption in Public Purchases

The results of dissertation research "Preventing and  combating corruption in public procurement" are presented in this  publication. The study was conducted 2011 till 2013 in a Member  State of the European Union– in the Republic of Latvia.  Goal of the thesis is to explore corruption prevention and  combating issues in public procurement sphere, to identify the  prevalence rates, determinants and contributing factors and  prevention opportunities in Latvia.  In the first chapter the author analyzes theoretical aspects of  understanding corruption in public procurement, with particular  emphasis on corruption definition problem, its nature, causes and  consequences. A separate section is dedicated to the public  procurement concept, mechanism and legal framework. In the first  part of this work the author presents cognitive methodology of  corruption in public procurement field, based on which the author has  carried out an analysis of corruption situation in public procurement  in Republic of Latvia.  In the second chapter of the thesis, the author analyzes the  problem of corruption in public procurement, including its historical  aspects, typology and classification of corruption subjects involved,  corruption risk elements in public procurement and their  identification. During the development of the second chapter author's  practical experience in public procurements was widely used.  The third and fourth chapter deals with issues related to the  prevention and combating corruption in public procurement, namely  the operation of the concept, principles, methods and techniques,  subjects in Republic of Latvia, as well as an analysis of foreign  experience in preventing and combating corruption. The fifth chapter  is devoted to the corruption prevention and combating perspectives  and their assessment. In this chapter the author has made the  evaluation of corruption prevention and combating measures  efficiency in Republic of Latvia, assessment of anti-corruption  legislation development stage in public procurement field in Latvia. 

Comparative Study of Scheduling Algorithms for LTE Networks

Scheduling is the process of dynamically allocating physical resources to User Equipment (UE) based on scheduling algorithms implemented at the LTE base station. Various algorithms have been proposed by network researchers as the implementation of scheduling algorithm which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of PF, MLWDF and EXP/PF scheduling algorithms. The evaluation is considered for a single cell with interference scenario for different flows such as Best effort, Video and VoIP in a pedestrian and vehicular environment using the LTE-Sim network simulator. The comparative study is conducted in terms of system throughput, fairness index, delay, packet loss ratio (PLR) and total cell spectral efficiency.

High Capacity Reversible Watermarking through Interpolated Error Shifting

Reversible watermarking that not only protects the copyright but also preserve the original quality of the digital content have been intensively studied. In particular, the demand for reversible watermarking has increased. In this paper, we propose a reversible watermarking scheme based on interpolation-error shifting and error pre-compensation. The intensity of a pixel is interpolated from the intensities of neighboring pixels, and the difference histogram between the interpolated and the original intensities is obtained and modified to embed the watermark message. By restoring the difference histogram, the embedded watermark is extracted and the original image is recovered by compensating for the interpolation error. The overflow and underflow are prevented by error pre-compensation. To show the performance of the method, the proposed algorithm is compared with other methods using various test images.

Generation of Photo-Mosaic Images through Block Matching and Color Adjustment

Mosaic refers to a technique that makes image by gathering lots of small materials in various colors. This paper presents an automatic algorithm that makes the photo-mosaic image using photos. The algorithm is composed of 4 steps: partition and feature extraction, block matching, redundancy removal and color adjustment. The input image is partitioned in the small block to extract feature. Each block is matched to find similar photo in database by comparing similarity with Euclidean difference between blocks. The intensity of the block is adjusted to enhance the similarity of image by replacing the value of light and darkness with that of relevant block. Further, the quality of image is improved by minimizing the redundancy of tiles in the adjacent blocks. Experimental results support that the proposed algorithm is excellent in quantitative analysis and qualitative analysis.

Migration of the Relational Data Base (RDB) to the Object Relational Data Base (ORDB)

This paper proposes an approach for translating an existing relational database (RDB) schema into ORDB. The transition is done with methods that can extract various functions from a RDB which is based on aggregations, associations between the various tables, and the reflexive relationships. These methods can extract even the inheritance knowing that no process of reverse engineering can know that it is an Inheritance; therefore, our approach exceeded all of the previous studies made for ​​the transition from RDB to ORDB. In summation, the creation of the New Data Model (NDM) that stocks the RDB in a form of a structured table, and from the NDM we create our navigational model in order to simplify the implementation object from which we develop our different types. Through these types we precede to the last step, the creation of tables. The step mentioned above does not require any human interference. All this is done automatically, and a prototype has already been created which proves the effectiveness of this approach.

The Use of Ontology Framework for Automation Digital Forensics Investigation

One of the main goals of a computer forensic analyst is to determine the cause and effect of the acquisition of a digital evidence in order to obtain relevant information on the case is being handled. In order to get fast and accurate results, this paper will discuss the approach known as Ontology Framework. This model uses a structured hierarchy of layers that create connectivity between the variant and searching investigation of activity that a computer forensic analysis activities can be carried out automatically. There are two main layers are used, namely Analysis Tools and Operating System. By using the concept of Ontology, the second layer is automatically designed to help investigator to perform the acquisition of digital evidence. The methodology of automation approach of this research is by utilizing Forward Chaining where the system will perform a search against investigative steps and atomically structured in accordance with the rules of the Ontology.

Relay Node Selection Algorithm for Cooperative Communications in Wireless Networks

IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct transmission to the destination at low rate. In the legacy cooperative protocols, a source node chooses a relay node only based on the transmission rate. Therefore, they are not so feasible in multi-flow environments since they do not consider the effect of other flows. To alleviate the effect, we propose a new relay node selection algorithm based on the transmission rate and channel contention level. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and delay.

On the Catalytic Combustion Behaviors of CH4 in a MCFC Power Generation System

Catalytic combustion is generally accepted as an environmentally preferred alternative for the generation of heat and power from fossil fuels mainly due to its advantages related to the stable combustion under very lean conditions with low emissions of NOx, CO, and UHC at temperatures lower than those occurred in conventional flame combustion. Despite these advantages, the commercial application of catalytic combustion has been delayed because of complicated reaction processes and the difficulty in developing appropriate catalysts with the required stability and durability. To develop the catalytic combustors, detailed studies on the combustion characteristics of catalytic combustion should be conducted. To the end, in current research, quantitative studies on the combustion characteristics of the catalytic combustors, with a Pd-based catalyst for MCFC power generation systems, relying on numerical simulations have been conducted. In addition, data from experimental studies of variations in outlet temperatures and fuel conversion, taken after operating conditions have been used to validate the present numerical approach. After introducing the governing equations for mass, momentum, and energy equations as well as a description of catalytic combustion kinetics, the effects of the excess air ratio, space velocity, and inlet gas temperature on the catalytic combustion characteristics are extensively investigated. Quantitative comparisons are also conducted with previous experimental data. Finally, some concluding remarks are presented.

Extraction of Polystyrene from Styrofoam Waste: Synthesis of Novel Chelating Resin for the Enrichment and Speciation of Cr(III)/Cr(VI) Ions in Industrial Effluents

Polystyrene (PS) was extracted from Styrofoam (expanded polystyrene foam) waste, so called white pollutant. The PS was functionalized with N,N- Bis(2-aminobenzylidene)benzene-1,2-diamine (ABA) ligand through an azo spacer. The resin was characterized by FT-IR spectroscopy and elemental analysis. The PS-N=N-ABA resin was used for the enrichment and speciation of Cr(III)/Cr(VI) ions and total Cr determination in aqueous samples by flame atomic absorption spectrometry (FAAS). The separation of Cr(III)/Cr(VI) ions was achieved at pH 2. The recovery of Cr(VI) ions was achieved ≥ 95.0% at optimum parameters: pH 2; resin amount 300mg; flow rates 2.0mL min-1 of solution and 2.0mL min-1 of eluent (2.0mol L-1 HNO3). Total Cr was determined by oxidation of Cr(III) to Cr(VI) ions using H2O2. The limit of detection (LOD) and quantification (LOQ) of Cr(VI) were found to be 0.40 and 1.20μg L-1, respectively with preconcentration factor of 250. Total saturation and breakthrough capacitates of the resin for Cr(IV) ions were found to be 0.181 and 0.531mmol g-1, respectively. The proposed method was successfully applied for the preconcentration/speciation of Cr(III)/Cr(VI) ions and determination of total Cr in industrial effluents.

A Novel Gene Encoding Ankyrin-Repeat Protein, SHG1, is Indispensable for Seed Germination under Moderate Salt Stress

Salt stress adversely affects plant growth at various stages of development including seed germination, seedling establishment, vegetative growth and finally reproduction. Because of their immobile nature, plants have evolved mechanisms to sense and respond to salt stress. Seed dormancy is an adaptive trait that enables seed germination to coincide with favorable environmental conditions. We identified a novel locus of Arabidopsis, designated SHG1 (salt hypersensitive germination 1), whose disruption leads to reduced germination rate under moderate salt stress conditions. SHG1 encodes a transmembrane protein with an ankyrin-repeat motif that has been implicated in diverse cellular processes such as signal transduction. The shg1-disrupted Arabidopsis mutant died at the cotyledon stage when sown on salt-containing medium, although wild-type plants could form true leaves under the same conditions. On the other hand, this mutant showed similar phenotypes to wild-type plants when sown on medium without salt and transferred to salt-containing medium at the vegetative stage. These results suggested that SHG1 played indispensable role in the seed germination and seedling establishment under moderate salt stress conditions. SHG1 may be involved in the release of seed dormancy.

Neural Network Monitoring Strategy of Cutting Tool Wear of Horizontal High Speed Milling

The wear of cutting tool degrades the quality of the product in the manufacturing processes. The on line monitoring of the cutting tool wear level is very necessary to prevent the deterioration of the quality of machining. Unfortunately there is not a direct manner to measure the cutting tool wear on line. Consequently we must adopt an indirect method where wear will be estimated from the measurement of one or more physical parameters appearing during the machining process such as the cutting force, the vibrations, or the acoustic emission etc…. In this work, a neural network system is elaborated in order to estimate the flank wear from the cutting force measurement and the cutting conditions.

Comparison of Prognostic Models in Different Scenarios of Shoreline Position on Ponta Negra Beach in Northeastern Brazil

Prognostic studies of the shoreline are of utmost importance for Ponta Negra Beach, located in Natal, Northeastern Brazil, where the infrastructure recently built along the shoreline is severely affected by flooding and erosion. This study compares shoreline predictions using three linear regression methods (LMS, LRR and WLR) and tries to discern the best method for different shoreline position scenarios. The methods have shown erosion on the beach in each of the scenarios tested, even in less intense dynamic conditions. The WLA_A with confidence interval of 95% was the well-adjusted model and calculated a retreat of -1.25 m/yr to -2.0 m/yr in hot spot areas. The change of the shoreline on Ponta Negra Beach can be measured as a negative exponential curve. Analysis of these methods has shown a correlation with the morphodynamic stage of the beach.

Numerical Study of Laminar Mixed Convection Heat Transfer of a Nanofluid in a Concentric Annular Tube Using Two-Phase Mixture Model

Laminar mixed Convection heat transfer of a nanofluid with prescribed constant heat flux on the inner wall of horizontal annular tube has been studied numerically based on two-phase mixture model in different Rayleigh Numbers and Azimuth angles. Effects of applying of different volume fractions of Al2O3 nanoparticles in water as a base fluid on hydrodynamic and thermal behaviors of the fluid flow such as axial velocity, secondary flow, temperature, heat transfer coefficient and friction coefficient at the inner and outer wall region, has been investigated. Conservation equations in elliptical form has been utilized and solved in three dimensions for a steady flow. It is observed that, there is a good agreement between results in this work and previously published experimental and numerical works on mixed convection in horizontal annulus. These particles cause to increase convection heat transfer coefficient of the fluid, meanwhile there is no considerable effect on friction coefficient.

Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analyzed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Theoretical Analysis of the Effect of Accounting for Special Methods in Similarity-Based Cohesion Measurement

Class cohesion is an important object-oriented software quality attributes, and it refers to the degree of relatedness of class attributes and methods. Several class cohesion measures are proposed in the literature, and the impact of considering the special methods (i.e., constructors, destructors, and access and delegation methods) in cohesion calculation is not thoroughly theoretically studied for most of them. In this paper, we address this issue for three popular similarity-based class cohesion measures. For each of the considered measures we theoretically study the impact of including or excluding special methods on the values that are obtained by applying the measure. This study is based on analyzing the definitions and formulas that are proposed for the measures. The results show that including/excluding special methods has a considerable effect on the obtained cohesion values and that this effect varies from one measure to another. The study shows the importance of considering the types of methods that have to be accounted for when proposing a similarity-based cohesion measure.

Trial Development the Evaluation Method of Quantification the Feeling of Preventing Visibility by Front A Pillar

There are many drivers who feel right A pillar of Japanese right-hand-drive car preventing visibility on turning right or left at intersection. On the other hand, there is a report that almost pedestrian accident is caused by the delay of finding pedestrian by drivers and this is found by drivers’ eye movement. Thus, we developed the evaluation method of quantification using drivers’ eye movement data by least squares estimation and we applied this method to commercial vehicle and evaluation the visibility. It is suggested that visibility of vehicle can be quantified and estimated by linear model obtained from experimental eye fixation data and information of vehicle dimensions.

Stability Analysis of Neural Networks with Leakage, Discrete and Distributed Delays

This paper deals with the problem of stability of neural networks with leakage, discrete and distributed delays. A new Lyapunov functional which contains some new double integral terms are introduced. By using appropriate model transformation that shifts the considered systems into the neutral-type time-delay system, and by making use of some inequality techniques, delay-dependent criteria are developed to guarantee the stability of the considered system. Finally, numerical examples are provided to illustrate the usefulness of the proposed main results.

A New Efficient RNS Reverse Converter for the 4-Moduli Set 

In this paper, we propose a new efficient reverse converter for the 4-moduli set {2n, 2n + 1, 2n − 1, 22n+1 – 1} based on a modified Chinese Remainder Theorem and Mixed Radix Conversion. Additionally, the resulting architecture is further reduced to obtain a reverse converter that utilizes only carry save adders, a multiplexer and carry propagate adders. The proposed converter has an area cost of (12n + 2) FAs and (5n + 1) HAs with a delay of (9n + 6)tFA + tMUX. When compared with state of the art, our proposal demonstrates to be faster, at the expense of slightly more hardware resources. Further, the Area-Time square metric was computed which indicated that our proposed scheme outperforms the state of the art reverse converter.

Comparative Study on Status and Development of Transient Flow Analysis Including Simple Surge Tank

This paper presents the problem of modeling and simulating of transient phenomena in conveying pipeline systems based on the rigid column and full elastic methods. Transient analysis is important and one of the more challenging and complicated flow problem in the design and the operation of water pipeline systems. Transient can produce large pressure forces and rapid fluid acceleration into a water pipeline system, these disturbances may result in device failures, system fatigue or pipe ruptures, and even the dirty water intrusion. Several methods have been introduced and used to analyze transient flow, an accurate analysis and suitable protection devices should be used to protect water pipeline systems. The fourth-order Runge-Kutta method has been used to solve the dynamic and continuity equations in the rigid column method, while the characteristics method used to solve these equations in the full elastic method. The results obtained provide that the model is an efficient tool for flow transient analysis and provide approximately identical results by using these two methods. Moreover; using the simple surge tank ”open surge tank” reduces the unfavorable effects of transients.