Abstract: Creation of information society, or in other words, a
society based on knowledge, has wide consequences, both on
individual and complete society, and in general – on a economy of
one country. Development and implementation of ICT represents a
stimulant for economic growth. On individual level, knowledge,
skills and information gathered using ICT, are expanding individual
possibilities of persons, enabling them to have access to timely
sensitive information, such as market prices or investment
conditions, possibilities to access Government-s or private
development funds, etc. By doing so, productivity is increased both
on individual and national level and therefore social wellbeing in
general. In one word, creation of information society - a knowledge
society is happening.
This work will describe challenges and strategies that will follow
the development as well as obstacles in creating information society
– knowledge society in Montenegro.
Abstract: In many applications there is a broad variety of
information relevant to a focal “object" of interest, and the fusion of such heterogeneous data types is desirable for classification and
categorization. While these various data types can sometimes be treated as orthogonal (such as the hull number, superstructure color,
and speed of an oil tanker), there are instances where the inference and the correlation between quantities can provide improved fusion
capabilities (such as the height, weight, and gender of a person). A
service-oriented architecture has been designed and prototyped to
support the fusion of information for such “object-centric" situations.
It is modular, scalable, and flexible, and designed to support new data sources, fusion algorithms, and computational resources without affecting existing services. The architecture is designed to simplify
the incorporation of legacy systems, support exact and probabilistic entity disambiguation, recognize and utilize multiple types of
uncertainties, and minimize network bandwidth requirements.
Abstract: Suppose G(V,E) is a graph, a function f : V \cup E \to \{1, 2, 3, \cdots, k\} is called the total edge(vertex) irregular k-labelling for G such that for each two edges are different having distinct weights. The total edge(vertex) irregularity strength of G, denoted by tes(G)(tvs(G), is the smallest k positive integers such that G has a total edge(vertex) irregular k-labelling. In this paper, we determined the total edge(vertex) irregularity strength of an amalgamation of two isomorphic cycles. The total edge irregularity strength and the total vertex irregularity strength of two isomorphic cycles on n vertices are \lceil (2n+2)/3 \rceil and \lceil 2n/3 \rceil for n \geq 3, respectively.
Abstract: Unintentional falls are rife throughout the ages and
have been the common factor of serious or critical injuries especially
for the elderly society. Fortunately, owing to the recent rapid
advancement in technology, fall detection system is made possible,
enabling detection of falling events for the elderly, monitoring the
patient and consequently provides emergency support in the event of
falling. This paper presents a review of 3 main categories of fall
detection techniques, ranging from year 2005 to year 2010. This
paper will be focusing on discussing the techniques alongside with
summary and conclusion for them.
Abstract: This work shows a basic philosophical difficulty in the constructivist foundations of the cognitive posracionalist psychology of Vittorio Guidano. This is a difficulty caused by the problem of the existential crisis. It will be analyzed how Guidano-s suggestions about this problem depend on felt experience. Then it will appear how Guidano-s philosophy and psychotherapy must turn towards a phenomenological approach. Finally, some references are given about Eugen Gendlin-s philosophy which could be considered as a radical way to confront these questions.
Abstract: The strawberry jam is rich in bioactive compounds. It
is economically and commercially important and widely consumed.
Different strawberries cultivars can be used for its preparation,
however, a careful selection should be performed to guarantee the
preservation of bioactive compounds during jam storage. Two
strawberry cultivars (Camarosa and American 13) were analyzed by
HPLC, three anthocyanins: cyanidin-3-glucoside, pelargonidin-3-
glucoside and pelargonidin-3-rutinoside were quantified. Camarosa
strawberries presented significantly higher concentration of
anthocyanins (p
Abstract: This paper presents one comprehensive modelling approach for maintenance scheduling problem of thermal power units in competitive market. This problem is formulated as a 0/1 mixedinteger linear programming model. Model incorporates long-term bilateral contracts with defined profiles of power and price, and weekly forecasted market prices for market auction. The effectiveness of the proposed model is demonstrated through case study with detailed discussion.
Abstract: Bead-on-plate welds were carried out on AISI 316L
(N) austenitic stainless steel (ASS) using flux cored arc welding
(FCAW) process. The bead on plates weld was conducted as per L25
orthogonal array. In this paper, the weld bead geometry such as depth
of penetration (DOP), bead width (BW) and weld reinforcement (R)
of AISI 316L (N) ASS are investigated. Taguchi approach is used as
statistical design of experiment (DOE) technique for optimizing the
selected welding input parameters. Grey relational analysis and
desirability approach are applied to optimize the input parameters
considering multiple output variables simultaneously. Confirmation
experiment has also been conducted to validate the optimized
parameters.
Abstract: This research gathered local wisdom towards career building of people in Kamchanoad Community, Baan Muang sub-district, Baan Dung district, Udon Thani province. Data was collected through in-depth interviews with village headmen, community board, teachers, monks, Kamchanoad forest managers and revered elderly aged over 60 years old. All of these 30 interviewees have resided in Kamchanoad Community for more than 40. Descriptive data analysis result revealed that the most prominent local wisdom of Kamchanoad community is their beliefs and religion. Most people in the community have strongly maintained local tradition, the festival of appeasing Chao Pu Sri Suttho on the middle of the 6th month of Thai lunar calendar which falls on the same day with Vesak Day. 100 percent of the people in this community are Buddhist. They believe that Naga, an entity or being, taking the form of a serpent, named “Sri Suttho” lives in Kamchanoad forest. The local people worship the serpent and ask for blessings. Another local wisdom of this community is Sinh fabric weaving.
Abstract: Functionalities and control behavior are both primary
requirements in design of a complex system. Automata theory plays
an important role in modeling behavior of a system. Z is an ideal
notation which is used for describing state space of a system and then
defining operations over it. Consequently, an integration of automata
and Z will be an effective tool for increasing modeling power for a
complex system. Further, nondeterministic finite automata (NFA)
may have different implementations and therefore it is needed to
verify the transformation from diagrams to a code. If we describe
formal specification of an NFA before implementing it, then
confidence over transformation can be increased. In this paper, we
have given a procedure for integrating NFA and Z. Complement of a
special type of NFA is defined. Then union of two NFAs is
formalized after defining their complements. Finally, formal
construction of intersection of NFAs is described. The specification
of this relationship is analyzed and validated using Z/EVES tool.
Abstract: There have been numerous implementations of
security system using biometric, especially for identification and
verification cases. An example of pattern used in biometric is the iris
pattern in human eye. The iris pattern is considered unique for each
person. The use of iris pattern poses problems in encoding the human
iris.
In this research, an efficient iris recognition method is proposed.
In the proposed method the iris segmentation is based on the
observation that the pupil has lower intensity than the iris, and the
iris has lower intensity than the sclera. By detecting the boundary
between the pupil and the iris and the boundary between the iris and
the sclera, the iris area can be separated from pupil and sclera. A step
is taken to reduce the effect of eyelashes and specular reflection of
pupil. Then the four levels Coiflet wavelet transform is applied to the
extracted iris image. The modified Hamming distance is employed to
measure the similarity between two irises.
This research yields the identification success rate of 84.25% for
the CASIA version 1.0 database. The method gives an accuracy of
77.78% for the left eyes of MMU 1 database and 86.67% for the
right eyes. The time required for the encoding process, from the
segmentation until the iris code is generated, is 0.7096 seconds.
These results show that the accuracy and speed of the method is
better than many other methods.
Abstract: In order to achieve competitive advantage and better
performance of firm, supply chain management (SCM) strategy
should support and drive forward business strategy. It means that
supply chain should be aligned with business strategy, at the same
time supply chain (SC) managers need to use appropriate information
system (IS) solution to support their strategy, which would lead to
stay competitive. There are different kinds of IS strategies which
enable managers to meet the SC requirement by selecting the best IS
strategy. Therefore, it is important to align IS strategies and practices
with SC strategies and practices, which could help us to plan for an
IS application that supports and enhances a SCMS. In this study,
aligning IS with SC in strategy level is considered. The main aim of
this paper is to align the various IS strategies with SCM strategies
and demonstrate their impact on SC and firm performance.
Abstract: The purpose of this research aims to discover the
knowledge for analysis student motivation behavior on e-Learning
based on Data Mining Techniques, in case of the Information
Technology for Communication and Learning Course at Suan
Sunandha Rajabhat University. The data mining techniques was
applied in this research including association rules, classification
techniques. The results showed that using data mining technique can
indicate the important variables that influence the student motivation
behavior on e-Learning.
Abstract: The growing interest on national heritage
preservation has led to intensive efforts on digital documentation of
cultural heritage knowledge. Encapsulated within this effort is the
focus on ontology development that will help facilitate the
organization and retrieval of the knowledge. Ontologies surrounding
cultural heritage domain are related to archives, museum and library
information such as archaeology, artifacts, paintings, etc. The growth
in number and size of ontologies indicates the well acceptance of its
semantic enrichment in many emerging applications. Nowadays,
there are many heritage information systems available for access.
Among others is community-based e-museum designed to support the
digital cultural heritage preservation. This work extends previous
effort of developing the Traditional Malay Textile (TMT) Knowledge
Model where the model is designed with the intention of auxiliary
mapping with CIDOC CRM. Due to its internal constraints, the
model needs to be transformed in advance. This paper addresses the
issue by reviewing the previous harmonization works with CIDOC
CRM as exemplars in refining the facets in the model particularly
involving TMT-Artifact class. The result is an extensible model
which could lead to a common view for automated mapping with
CIDOC CRM. Hence, it promotes integration and exchange of
textile information especially batik-related between communities in
e-museum applications.
Abstract: In aircraft applications, according to the nature of
electrical equipment its location may be in unpressurized area or very
close to the engine; thus, the environmental conditions may change
from atmospheric pressure to less than 100 mbar, and the temperature
may be higher than the ambient one as in most real working
conditions of electrical equipment. Then, the classical Paschen curve
has to be replotted since these parameters may affect the discharge
ignition voltage. In this paper, we firstly investigate the domain of
validity of two corrective expressions on the Paschen-s law found in
the literature, in case of changing the air environment and known as
Peek and Dunbar corrections. Results show that these corrections are
no longer valid for combined variation of temperature and pressure.
After that, a new empirical expression for breakdown voltage is
proposed and is validated in the case of combined variations of
temperature and pressure.
Abstract: This paper has two main ideas. Firstly, it describes Evans and Wurster-s concepts “the trade-off between reach and richness", and relates them to the impact of technology on the virtual markets. Authors Evans and Wurster see the transfer of information as a 'trade'off between richness and reach-. Reach refers to the number of people who share particular information, with Richness ['Rich'] being a more complex concept combining: bandwidth, customization, interactivity, reliability, security and currency. Traditional shopping limits the number of shops the shopper is able to visit due to time and other cost constraints; the time spent traveling consequently leaves the shopper with less time to evaluate the product. The paper concludes that although the Web provides Reach, offering Richness and the sense of community required for creating and sustaining relationships with potential clients could be difficult.
Abstract: Data gathering is an essential operation in wireless
sensor network applications. So it requires energy efficiency
techniques to increase the lifetime of the network. Similarly,
clustering is also an effective technique to improve the energy
efficiency and network lifetime of wireless sensor networks. In this
paper, an energy efficient cluster formation protocol is proposed with
the objective of achieving low energy dissipation and latency without
sacrificing application specific quality. The objective is achieved by
applying randomized, adaptive, self-configuring cluster formation
and localized control for data transfers. It involves application -
specific data processing, such as data aggregation or compression.
The cluster formation algorithm allows each node to make
independent decisions, so as to generate good clusters as the end.
Simulation results show that the proposed protocol utilizes minimum
energy and latency for cluster formation, there by reducing the
overhead of the protocol.
Abstract: Drought is one of the most damaging climate-related
hazards, it is generally considered as a prolonged absence of
precipitation. This normal and recurring climate phenomenon had
plagued civilization throughout history because of the negative
impacts on economical, environmental and social sectors. Drought
characteristics are thus recognized as important factors in water
resources planning and management. The purpose of this study is to
detect the changes in drought frequency, persistence and severity
in the Ruhr river basin. The frequency of drought events was
calculated using the Standardized Precipitation Index (SPI). Used
data are daily precipitation records from seven meteorological
stations covering the period 1961-2007. The main benefit of the
application of this index is its versatility, only rainfall data is required
to deliver five major dimensions of a drought : duration, intensity,
severity, magnitude, and frequency. Furthermore, drought can be
calculated in different time steps. In this study SPI was calculated for
1, 3, 6, 9, 12, and 24 months. Several drought events were detected
in the covered period, these events contain mild, moderate and severe
droughts. Also positive and negative trends in the SPI values were
observed.
Abstract: In order to characterize the soy protein hydrolysate obtained in this study, gel chromatography on Sephadex G-25 was used to perform the separation of the peptide mixture and electrophoresis in SDS-polyacrylamide gel has been employed. Protein hydrolysate gave high antioxidant activities, but didn't give any antimicrobial activities. The antioxidant activities of protein hydrolysate was in the same trend of peptide content which gave high antioxidant activities and high peptide content between fractions 15 to 50. With increasing peptide concentrations, the scavenging effect on DPPH radical increased until about 70%, thereafter reaching a plateau. In compare to different concentrations of BHA, which exhibited higher activity (90%), soybean protein hydrolysate exhibited high antioxidant activities (70%) at a concentration of 1.45 mg/ml at fraction 25. Electrophoresis analysis indicated that, low- MW hydrolysate fractions (F1) appeared, on average, to have higher DPPH scavenging activities than high-MW fractions. These results revealed that soybean peptides probably contain substances that were proton donors and could react with free radicals to convert them to stable diamagnetic molecules.
Abstract: The potential of entomopathogenic nematodes in suppressing T. squalida population on cauliflower from transplanting to harvest was evaluated. Significant reductions in plant infestation percentage and population density (/m2) were recorded throughout the plantation seasons, 2011 and 2012 before and after spraying the plants. The percent reduction in numbers/m2 was the highest in March for the treatments with Heterorhabditis indica Behera and Heterorhabditis bacteriophora Giza during the plantation season 2011, while at the plantation season 2012, the reduction in population density was the highest in January for Heterorhabditis Indica Behera and in February for H . bacteriophora Giza treatments. In a comparison test with conventional insecticides Hostathion and Lannate, there were no significant differences in control measures resulting from treatments with H. indica Behera, H. bacteriophora Giza and Lannate. At the plantation season is 2012. Also, the treatments reduced the economic threshold of T. squalida on cauliflower in this experiment as compared with before and after spraying with both the two entomopathogenic nematodes at both seasons 2011 and 2012. This means an increase in the marketability of heads harvested as a consequence of monthly treatments.