Abstract: Statistical analysis of electrophysiological recordings
obtained under, e.g. tactile, stimulation frequently suggests participation
in the network dynamics of experimentally unobserved “hidden"
neurons. Such interneurons making synapses to experimentally
recorded neurons may strongly alter their dynamical responses to
the stimuli. We propose a mathematical method that formalizes this
possibility and provides an algorithm for inferring on the presence
and dynamics of hidden neurons based on fitting of the experimental
data to spike trains generated by the network model. The model
makes use of Integrate and Fire neurons “chemically" coupled
through exponentially decaying synaptic currents. We test the method
on simulated data and also provide an example of its application to
the experimental recording from the Dorsal Column Nuclei neurons
of the rat under tactile stimulation of a hind limb.
Abstract: The low power wireless sensor devices which usually
uses the low power wireless private area network (IEEE 802.15.4)
standard are being widely deployed for various purposes and in
different scenarios. IPv6 low power wireless private area network
(6LoWPAN) was adopted as part of the IETF standard for the
wireless sensor devices so that it will become an open standard
compares to other dominated proprietary standards available in the
market. 6LoWPAN also allows the integration and communication of
sensor nodes with the Internet more viable. This paper presents a
comparative study on different available IPv6 platforms for wireless
sensor networks including open and close sources. It also discusses
about the platforms used by these stacks. Finally it evaluates and
provides appropriate suggestions which can be use for selection of
required IPv6 stack for low power devices.
Abstract: Aims for this study: first, to compare the expertise
level in data analysis, communication and information technologies
in undergraduate psychology students. Second, to verify the factor
structure of E-ETICA (Escala de Experticia en Tecnologias de la Informacion, la Comunicacion y el Análisis or Data Analysis,
Communication and Information'Expertise Scale) which had shown
an excellent internal consistency (α= 0.92) as well as a simple factor
structure. Three factors, Complex, Basic Information and
Communications Technologies and E-Searching and Download
Abilities, explains 63% of variance. In the present study, 260
students (119 juniors and 141 seniors) were asked to respond to
ETICA (16 items Likert scale of five points 1: null domain to 5: total
domain). The results show that both junior and senior students report
having very similar expertise level; however, E-ETICA presents a
different factor structure for juniors and four factors explained also
63% of variance: Information E-Searching, Download and Process;
Data analysis; Organization; and Communication technologies.
Abstract: According to dramatic growth of internet services, an easy and prompt service deployment has been important for internet service providers to successfully maintain time-to-market. Before global service deployment, they have to pay the big cost for service evaluation to make a decision of the proper system location, system scale, service delay and so on. But, intra-Lab evaluation tends to have big gaps in the measured data compared with the realistic situation, because it is very difficult to accurately expect the local service environment, network congestion, service delay, network bandwidth and other factors. Therefore, to resolve or ease the upper problems, we propose multiple cloud based GPES Broker system and use case that helps internet service providers to alleviate the above problems in beta release phase and to make a prompt decision for their service launching. By supporting more realistic and reliable evaluation information, the proposed GPES Broker system saves the service release cost and enables internet service provider to make a prompt decision about their service launching to various remote regions.
Abstract: Enterprise Architecture (EA) is a framework for description, coordination and alignment of all activities across the organization in order to achieve strategic goals using ICT enablers. A number of EA-compatible frameworks have been developed. We, in this paper, mainly focus on Federal Enterprise Architecture Framework (FEAF) since its reference models are plentiful. Among these models we are interested here in its business reference model (BRM). The test process is one important subject of an EA project which is to somewhat overlooked. This lack of attention may cause drawbacks or even failure of an enterprise architecture project. To address this issue we intend to use International Software Testing Qualification Board (ISTQB) framework and standard test suites to present a method to improve EA testing process. The main challenge is how to communicate between the concepts of EA and ISTQB. In this paper, we propose a method for integrating these concepts.
Abstract: The internet is constantly expanding. Identifying web
links of interest from web browsers requires users to visit each of the
links listed, individually until a satisfactory link is found, therefore
those users need to evaluate a considerable amount of links before
finding their link of interest; this can be tedious and even
unproductive. By incorporating web assistance, web users could be
benefited from reduced time searching on relevant websites. In this
paper, a rough set approach is presented, which facilitates
classification of unlimited available e-vocabulary, to assist web users
in reducing search times looking for relevant web sites. This
approach includes two methods for identifying relevance data on web
links based on the priority and percentage of relevance. As a result of
these methods, a list of web sites is generated in priority sequence
with an emphasis of the search criteria.
Abstract: Skin color can provide a useful and robust cue
for human-related image analysis, such as face detection,
pornographic image filtering, hand detection and tracking,
people retrieval in databases and Internet, etc. The major
problem of such kinds of skin color detection algorithms is
that it is time consuming and hence cannot be applied to a real
time system. To overcome this problem, we introduce a new
fast technique for skin detection which can be applied in a real
time system. In this technique, instead of testing each image
pixel to label it as skin or non-skin (as in classic techniques),
we skip a set of pixels. The reason of the skipping process is
the high probability that neighbors of the skin color pixels are
also skin pixels, especially in adult images and vise versa. The
proposed method can rapidly detect skin and non-skin color
pixels, which in turn dramatically reduce the CPU time
required for the protection process. Since many fast detection
techniques are based on image resizing, we apply our
proposed pixel skipping technique with image resizing to
obtain better results. The performance evaluation of the
proposed skipping and hybrid techniques in terms of the
measured CPU time is presented. Experimental results
demonstrate that the proposed methods achieve better result
than the relevant classic method.
Abstract: The aim of this paper is to propose a dynamic integrated approach, based on modularity concept and on the business ecosystem approach, that exploit different eBusiness services for SMEs under an open business network platform. The adoption of this approach enables firms to collaborate locally for delivering the best product/service to the customers as well as globally by accessing international markets, interrelate directly with the customers, create relationships and collaborate with worldwide actors. The paper will be structured as following: We will start by offering an overview of the state of the art of eBusiness platforms among SME of food and tourism firms and then we discuss the main drawbacks that characterize them. The digital business ecosystem approach and the modularity concept will be described as the theoretical ground in which our proposed integrated model is rooted. Finally, the proposed model along with a discussion of the main value creation potentialities it might create for SMEs will be presented.
Abstract: Quality of school meals is one of the major concerns of governments and international organizations worldwide. This study aims to evaluate nutritional compliance of meals served at a Portuguese primary school considering the portions stated by Portuguese Education Ministry. To evaluate adequacy of portions served, weighing of all meal components offered to students and leftovers was performed during ten consecutive days at two different moments. Plate waste (%) was calculated by the ratio of food discarded and food served to the children. Nutritional evaluation of menus was made using the Portuguese Food Composition Table. Meals evaluated showed a percent contribution to energetic daily intake higher than recommendations. Meals served to children were considered high energy and protein dense. No significant waste of soup was accounted and the main meal components wasted were fish and vegetables. It will be necessary to adjust portions indicated by Ministry of Education in order to comply with recommendations and reduce food waste.
Abstract: This article discusses the problem of estimating the
orientation of inclined ground on which a human subject stands based
on information provided by the vestibular system consisting of the
otolith and semicircular canals. It is assumed that body segments are
not necessarily aligned and thus forming an open kinematic chain.
The semicircular canals analogues to a technical gyrometer provide a
measure of the angular velocity whereas the otolith analogues to a
technical accelerometer provide a measure of the translational
acceleration. Two solutions are proposed and discussed. The first is
based on a stand-alone Kalman filter that optimally fuses the two
measurements based on their dynamic characteristics and their noise
properties. In this case, no body dynamic model is needed. In the
second solution, a central extended disturbance observer that
incorporates a body dynamic model (internal model) is employed.
The merits of both solutions are discussed and demonstrated by
experimental and simulation results.
Abstract: Internet addiction has become a critical problem on
adolescents in Taiwan, and its negative effects on various dimensions
of adolescent development caught the attention of educational and
psychological experts. This study examined the correlation between
cognitive (locus of control) and emotion (emotion venting strategies)
factors on internet addiction of adolescents in Taiwan. Using the
Compulsive Internet Use (CIU) and the Emotion Venting Strategy
scales, a survey was conducted and 215 effective samples (students
ranging from12 to14 years old) returned. Quantitative analysis
methods such as descriptive statistics, t-test, ANOVA, Pearson
correlations and multiple regression were adopted. The results were as
follows: 1. Severity of Internet addiction has significant gender
differences; boys were at a higher risk than girls in becoming addicted
to the Internet. 2. Emotion venting, locus of control and internet
addiction have been shown to be positive correlated with one another.
3. Setting the locus of control as the control variable, emotion venting
strategy has positive and significant contribution to internet addiction.
The results of this study suggest that coaching deconstructive emotion
strategies and cognitive believes are encouraged to integrate with
actual field work.
Abstract: A simple network model is developed in OPNET to
study the performance of the Wi-Fi protocol. The model is simulated
in OPNET and performance factors such as load, throughput and delay
are analysed from the model. Four applications such as oracle, http, ftp
and voice are applied over the Wireless LAN network to determine the
throughput. The voice application utilises a considerable amount of
bandwidth of up to 5Mbps, as a result the 802.11g standard of the
Wi-Fi protocol was chosen which can support a data rate of up to
54Mbps. Results indicate that when the load in the Wi-Fi network is
increased the queuing delay on the point-to-point links in the Wi-Fi
network significantly reduces until it is comparable to that of WiMAX.
In conclusion, the queuing delay of the Wi-Fi protocol for the network
model simulated was about 0.00001secs comparable to WiMAX
network values.
Abstract: This paper contributes to our knowledge about buyerseller
relations by identifying barriers and conflict situations
associated with maintaining and developing durable business
relationships by small companies. The contribution of prior studies
with regard to negative aspects of marketing relationships is
presented in the first section. The international research results are
discussed with regard to the existing conceptualizations and main
research implications identified at the end.
Abstract: Biodiversity crisis is one of the many crises that
started at the turn of the millennia. Concrete form of expression is
still disputed, but there is a relatively high consensus regarding the
high rate of degradation and the urgent need for action. The strategy
of action outlines a strong economic component, together with the
recognition of market mechanisms as the most effective policies to
protect biodiversity. In this context, biodiversity and ecosystem
services are natural assets that play a key role in economic strategies
and technological development to promote development and
prosperity. Developing and strengthening policies for transition to an
economy based on efficient use of resources is the way forward.
To emphasize the co-viability specific to the connection economyecosystem
services, scientific approach aimed on one hand how to
implement policies for nature conservation and on the other hand, the
concepts underlying the economic expression of ecosystem services-
value, in the context of current technology. Following the analysis of
business opportunities associated with changes in ecosystem services
was concluded that development of market mechanisms for nature
conservation is a trend that is increasingly stronger individualized
within recent years. Although there are still many controversial issues
that have already given rise to an obvious bias, international
organizations and national governments have initiated and
implemented in cooperation or independently such mechanisms.
Consequently, they created the conditions for convergence between
private interests and social interests of nature conservation, so there
are opportunities for ongoing business development which leads,
among other things, the positive effects on biodiversity. Finally,
points out that markets fail to quantify the value of most ecosystem
services. Existing price signals reflect at best, only a proportion of the
total amount corresponding provision of food, water or fuel.
Abstract: Currently, most of distance learning courses can only
deliver standard material to students. Students receive course content
passively which leads to the neglect of the goal of education – “to suit
the teaching to the ability of students". Providing appropriate course
content according to students- ability is the main goal of this paper.
Except offering a series of conventional learning services, abundant
information available, and instant message delivery, a complete online
learning environment should be able to distinguish between students-
ability and provide learning courses that best suit their ability.
However, if a distance learning site contains well-designed course
content and design but fails to provide adaptive courses, students will
gradually loss their interests and confidence in learning and result in
ineffective learning or discontinued learning. In this paper, an
intelligent tutoring system is proposed and it consists of several
modules working cooperatively in order to build an adaptive learning
environment for distance education. The operation of the system is
based on the result of Self-Organizing Map (SOM) to divide students
into different groups according to their learning ability and learning
interests and then provide them with suitable course content.
Accordingly, the problem of information overload and internet traffic
problem can be solved because the amount of traffic accessing the
same content is reduced.
Abstract: This study aims to assess the environmental hazards
from radon exhalation rate in the soil samples in selected locations in
Iraqi Kurdistan, using passive (CR-39NTDs) and active (RAD7)
detecting method. Radon concentration, effective radium content and
radon exhalation rate were estimated in soil samples that collected at
the depth level of 30 cm inside 124 houses. The results show that the
emanation rate for radon gas was variation from location to other,
depending on the geological formation. Most health risks come from
emanation of radon and its daughter due to its contribution for indoor
radon, so the results showed that there is a linear relationship
between the ratio of soil and indoor radon concentration (CSoil Rn222/
Cindoor Rn222) and the effective radium content in soil samples. The
results show that radon concentration has high and low values in
Hajyawa city and Er. Tyrawa Qr, respectively. A comparison
between our results with that mentioned in international reports was
done.
Abstract: Countries in recession, among them Croatia, have
lower tax revenues as a result of unfavorable economic situation,
which is decrease of the economic activities and unemployment. The
global tax base has decreased. In order to create larger state revenues,
states use the institute of tax authorities. By controlling transfer
pricing in the international companies and using certain techniques,
tax authorities can create greater tax obligations for the companies in
a short period of time.
Abstract: As the Internet technology has developed rapidly, the
number of identities (IDs) managed by each individual person has
increased and various ID management technologies have been
developed to assist users. However, most of these technologies are
vulnerable to the existing hacking methods such as phishing attacks
and key-logging. If the administrator-s password is exposed, an
attacker can access the entire contents of the stolen user-s data files in
other devices. To solve these problems, we propose here a new ID
management scheme based on a Single Password Protocol. The paper
presents the details of the new scheme as well as a formal analysis of
the method using BAN Logic.
Abstract: Internal combustion engines rejects 30-40% of the
energy supplied by fuel to the environment through exhaust gas. thus, there is a possibility for further significant improvement of efficiency with the utilization of exhaust gas energy and its conversion to mechanical energy or electrical energy. The Thermo-Electric
Generator (TEG) will be located in the exhaust system and will make use of an energy flow between the warmer exhaust gas and the external environment. Predict to th optimum position of temperature
distribution and the performance of TEG through numerical analysis.
The experimental results obtained show that the power output significantly increases with the temperature difference between cold
and hot sides of a thermoelectric generator.
Abstract: An experimental study of Reinforced Concrete, RC, columns strengthened using a steel jacketing technique was conducted. The jacketing technique consisted of four steel vertical angles installed at the corners of the column joined by horizontal steel straps confining the column externally. The effectiveness of the technique was evaluated by testing the RC column specimens under eccentric monotonic loading until failure occurred. Strain gauges were installed to monitor the strains in the internal reinforcement as well as the external jacketing system. The effectiveness of the jacketing technique was demonstrated, and the parameters affecting the technique were studied.