Abstract: The literature has argued that firms based in industrial districts enjoy advantages for creating internal knowledge and absorbing external knowledge as a consequence of to the knowledge flows and spillovers that exist in the district. However, empirical evidence to show how belonging to an industrial district affects the business processes of creation and absorption of knowledge is scarce and, moreover, empirical research has not taken into account the influence of variations in the flows of knowledge circulating in each cluster. This study aims to extend empirical evidence on the effect that the stock of shared competencies in industrial districts has on the business processes of creation and absorption of knowledge, through data from an initial study on 952 firms and 35 industrial districts in Spain.
Abstract: This paper presents a research conducted to investigate the effect of mixing process on polypropylene (PP) modified bitumen mixed with well graded aggregate to form modified bituminous concrete mix. Two mode of mixing, namely dry and wet with different concentration of polymer polypropylene was used with 80/100 pen bitumen, to evaluate the bituminous concrete mix properties. Three percentages of polymer varying from 1-3% by the weight of bitumen was used in this study. Three mixes namely control mix, wet mix and dry mix were prepared. Optimum binder content was calculated considering Marshall Stability, flow, air voids and Marshall Quotient at different bitumen content varying from 4% - 6.5% for control, dry and wet mix. Engineering properties thus obtained at the calculated optimum bitumen content revealed that wet mixing process is advantageous in comparison to dry mixing as it increases the stiffness of the mixture with the increase in polymer content in bitumen. Stiffness value for wet mix increases with the increase in polymer content which is beneficial in terms of rutting. 1% PP dry mix also shows enhanced stiffness, with the air void content limited to 4%.The flow behaviour of dry mix doesn't indicate any major difference with the increase in polymer content revealing that polymer acting as an aggregate only without affecting the viscosity of the binder in the mix. Polypropylene (PP) when interacted with 80 pen base bitumen enhances its performance characteristics which were brought about by altered rheological properties of the modified bitumen. The decrease in flow with the increase in binder content reflects the increase in viscosity of binder which induces the plastic flow in the mix. Workability index indicates that wet mix were easy to compact up to desired void ratio in comparison to dry mix samples.
Abstract: Among the most fundamental prerequisites for the successful development of electronic Government Services (e- Government) is Citizen Acceptance. Based on the UTAUT model, the paper describes a hypothetical framework that integrates the unique features of E- government to improve our understanding of the acceptance and usage of e-Government Saudi Arabia. The proposed model, based on UTAUT, includes the characteristics of Egovernment, consideration and inclusion of trust, privacy, and Saudi culture and context.
Abstract: The purpose of this work was to study the effect of the
irrigation using waste water with various electric conductivities (T(0,92ds/m), EC3 (3ds/m) and EC6 (6ds/m) on three varieties of
quinoa cultivated in a field south of Morocco. The follow up of the evolution of the chemical and agronomic parameters throughout the
culture made it possible to determine the responses to the saline stress in arid conditions. Results showed that the salinity caused the
depression of plant-s height, and reduced the fresh and dry weight in
the different parts of the three varieties plants. The increase of the irrigation water EC didn-t affect the yield for the varieties. Thus,
quinoa resisted to salinity and proved a behavior of a facultative halophyte crop. In fact, the cultivation of this using treated wastewater is feasible especially in arid areas for a sustainable use of
water resources.
Abstract: Protein residue contact map is a compact
representation of secondary structure of protein. Due to the
information hold in the contact map, attentions from researchers in
related field were drawn and plenty of works have been done
throughout the past decade. Artificial intelligence approaches have
been widely adapted in related works such as neural networks,
genetic programming, and Hidden Markov model as well as support
vector machine. However, the performance of the prediction was not
generalized which probably depends on the data used to train and
generate the prediction model. This situation shown the importance
of the features or information used in affecting the prediction
performance. In this research, support vector machine was used to
predict protein residue contact map on different combination of
features in order to show and analyze the effectiveness of the
features.
Abstract: The advancement in wireless technology with the wide
use of mobile devices have drawn the attention of the research and
technological communities towards wireless environments, such as
Wireless Local Area Networks (WLANs), Wireless Wide Area
Networks (WWANs), and mobile systems and ad-hoc networks.
Unfortunately, wired and wireless networks are expressively different
in terms of link reliability, bandwidth, and time of propagation delay
and by adapting new solutions for these enhanced
telecommunications, superior quality, efficiency, and opportunities
will be provided where wireless communications were otherwise
unfeasible. Some researchers define 4G as a significant improvement
of 3G, where current cellular network’s issues will be solved and data
transfer will play a more significant role. For others, 4G unifies
cellular and wireless local area networks, and introduces new routing
techniques, efficient solutions for sharing dedicated frequency bands,
and an increased mobility and bandwidth capacity. This paper
discusses the possible solutions and enhancements probabilities that
proposed to improve the performance of Transmission Control
Protocol (TCP) over different wireless networks and also the paper
investigated each approach in term of advantages and disadvantages.
Abstract: This paper proposes an efficient method to classify
inverse synthetic aperture (ISAR) images. Because ISAR images can
be translated and rotated in the 2-dimensional image place, invariance
to the two factors is indispensable for successful classification. The
proposed method achieves invariance to translation and rotation of
ISAR images using a combination of two-dimensional Fourier
transform, polar mapping and correlation-based alignment of the
image. Classification is conducted using a simple matching score
classifier. In simulations using the real ISAR images of five scaled
models measured in a compact range, the proposed method yields
classification ratios higher than 97 %.
Abstract: The practice of burying the solid waste under the ground is one of the waste disposal methods and dumping is known as an ultimate method in the fastest-growing cities like Rasht city in Iran. Some municipalities select the solid waste landfills without feasibility studies, programming, design and management plans. Therefore, several social and environmental impacts are created by these sites. In this study, the suitability of solid waste landfill in Rasht city, capital of Gilan Province is reviewed using Regional Screening Method (RSM), Geographic Information System (GIS) and Analytical Hierarchy Process (AHP). The results indicated that according to the suitability maps, the value of study site is midsuitable to suitable based on RSM and mid-suitable based on AHP.
Abstract: Dilated cardiomyopathy (DCM) is a severe
cardiovascular disorder characterized by progressive systolic
dysfunction due to cardiac chamber dilatation and inefficient
myocardial contractility often leading to chronic heart failure.
Recently, a genome-wide association studies (GWASs) on DCM
indicate that the ZBTB17 gene rs10927875 single nucleotide
polymorphism is associated with DCM. The aim of the study was to
identify the distribution of ZBTB17 gene rs10927875 polymorphism
in 50 Slovak patients with DCM and 80 healthy control subjects
using the Custom Taqman®SNP Genotyping assays. Risk factors
detected at baseline in each group included age, sex, body mass
index, smoking status, diabetes and blood pressure. The mean age of
patients with DCM was 52.9±6.3 years; the mean age of individuals
in control group was 50.3±8.9 years. The distribution of investigated
genotypes of rs10927875 polymorphism within ZBTB17 gene in the
cohort of Slovak patients with DCM was as follows: CC (38.8%), CT
(55.1%), TT (6.1%), in controls: CC (43.8%), CT (51.2%), TT
(5.0%). The risk allele T was more common among the patients with
dilated cardiomyopathy than in normal controls (33.7% versus
30.6%). The differences in genotype or allele frequencies of ZBTB17
gene rs10927875 polymorphism were not statistically significant
(p=0.6908; p=0.6098). The results of this study suggest that ZBTB17
gene rs10927875 polymorphism may be a risk factor for
susceptibility to DCM in Slovak patients with DCM. Studies of
numerous files and additional functional investigations are needed to
fully understand the roles of genetic associations.
Abstract: In this paper a new concept of partial complement of a graph G is introduced and using the same a new graph parameter, called completion number of a graph G, denoted by c(G) is defined. Some basic properties of graph parameter, completion number, are studied and upperbounds for completion number of classes of graphs are obtained , the paper includes the characterization also.
Abstract: This paper analyzes different techniques of the fine grained security of relational databases for the two variables-data accessibility and inference. Data accessibility measures the amount of data available to the users after applying a security technique on a table. Inference is the proportion of information leakage after suppressing a cell containing secret data. A row containing a secret cell which is suppressed can become a security threat if an intruder generates useful information from the related visible information of the same row. This paper measures data accessibility and inference associated with row, cell, and column level security techniques. Cell level security offers greatest data accessibility as it suppresses secret data only. But on the other hand, there is a high probability of inference in cell level security. Row and column level security techniques have least data accessibility and inference. This paper introduces cell plus innocent security technique that utilizes the cell level security method but suppresses some innocent data to dodge an intruder that a suppressed cell may not necessarily contain secret data. Four variations of the technique namely cell plus innocent 1/4, cell plus innocent 2/4, cell plus innocent 3/4, and cell plus innocent 4/4 respectively have been introduced to suppress innocent data equal to 1/4, 2/4, 3/4, and 4/4 percent of the true secret data inside the database. Results show that the new technique offers better control over data accessibility and inference as compared to the state-of-theart security techniques. This paper further discusses the combination of techniques together to be used. The paper shows that cell plus innocent 1/4, 2/4, and 3/4 techniques can be used as a replacement for the cell level security.
Abstract: The objective of this research was to study influence
parameters affecting to mechanical property of austenitic stainless
steel grade 304 (AISI 304) with Gas Metal Arc Welding (GMAW).
The research was applying factorial design experiment, which have
following interested parameters: welding current at 80, 90, and 100
Amps, welding speeds at 250, 300, and 350 mm/min, and shield gas
of 75% Ar + 25% CO2, 70% Ar + 25% CO2 + 5% O2 and 69.5% Ar +
25% CO2 + 5% O2 + 0.5% He gas. The study was done in following
aspects: ultimate tensile strength and elongation. A research study of
ultimate tensile strength found that main factor effect, which had the
highest strength to AISI 304 welding was shield gas of 70% Ar +
25% CO2 + 5% O2 at average of 954.81 N/mm2. Result of the highest
elongation was showed significantly different at interaction effect
between shield gas of 69.5%Ar+25%CO2+5%O2+.5%He and
welding speed at 250 mm/min at 47.94%.
Abstract: Due to some reasons, observed images are degraded which are mainly caused by noise. Recently image denoising using the wavelet transform has been attracting much attention. Waveletbased approach provides a particularly useful method for image denoising when the preservation of edges in the scene is of importance because the local adaptivity is based explicitly on the values of the wavelet detail coefficients. In this paper, we propose several methods of noise removal from degraded images with Gaussian noise by using adaptive wavelet threshold (Bayes Shrink, Modified Bayes Shrink and Normal Shrink). The proposed thresholds are simple and adaptive to each subband because the parameters required for estimating the threshold depend on subband data. Experimental results show that the proposed thresholds remove noise significantly and preserve the edges in the scene.
Abstract: Many water supply systems in Australia are currently
undergoing significant reconfiguration due to reductions in long term
average rainfall and resulting low inflows to water supply reservoirs
since the second half of the 20th century. When water supply systems
undergo change, it is necessary to develop new operating rules,
which should consider climate, because the climate change is likely
to further reduce inflows. In addition, water resource systems are
increasingly intended to be operated to meet complex and multiple
objectives representing social, economic, environmental and
sustainability criteria. This is further complicated by conflicting
preferences on these objectives from diverse stakeholders. This paper
describes a methodology to develop optimum operating rules for
complex multi-reservoir systems undergoing significant change,
considering all of the above issues. The methodology is demonstrated
using the Grampians water supply system in northwest Victoria,
Australia. Initial work conducted on the project is also presented in
this paper.
Abstract: Quantitative methods of economic decision-making as
the methodological base of the so called operational research
represent an important set of tools for managing complex economic
systems,both at the microeconomic level and on the macroeconomic
scale. Mathematical models of controlled and controlling processes
allow, by means of artificial experiments, obtaining information
foroptimalor optimum approaching managerial decision-making.The
quantitative methods of economic decision-making usually include a
methodology known as structural analysis -an analysisof
interdisciplinary production-consumption relations.
Abstract: Rainfall records of rainfall station including the
rainfall potential per hour and rainfall mass of five heavy storms are
explored, respectively from 2001 to 2010. The rationalization formula
is to investigate the capability of flood peak duration of flood
detention pond in different rainfall conditions. The stable flood
detention model is also proposed by using system dynamic control
theory to get the message of flood detention pond in this research.
When rainfall frequency of one hour rainfall duration is more than
100-year frequency which exceeds the flood detention standard of
20-year frequency for the flood detention pond, the flood peak
duration of flood detention pond is 1.7 hours at most even though the
flood detention pond with maximum drainage potential about 15.0
m3/s of pumping system is constructed. If the rainfall peak current is
more than maximum drainage potential, the flood peak duration of
flood detention pond is about 1.9 hours at most. The flood detention
pond is the key factor of stable drainage control and flood prevention.
The critical factors of flood disaster is not only rainfall mass, but also
rainfall frequency of heavy storm in different rainfall duration and
flood detention frequency of flood detention system.
Abstract: This paper provides a flexible way of controlling
Variable-Bit-Rate (VBR) of compressed digital video, applicable to
the new H264 video compression standard. The entire video
sequence is assessed in advance and the quantisation level is then set
such that bit rate (and thus the frame rate) remains within
predetermined limits compatible with the bandwidth of the
transmission system and the capabilities of the remote end, while at
the same time providing constant quality similar to VBR encoding.
A process for avoiding buffer starvation by selectively eliminating
frames from the encoded output at times when the frame rate is slow
(large number of bits per frame) will be also described. Finally, the
problem of buffer overflow will be solved by selectively eliminating
frames from the received input to the decoder. The decoder detects
the omission of the frames and resynchronizes the transmission by
monitoring time stamps and repeating frames if necessary.
Abstract: Heart sound is an acoustic signal and many techniques
used nowadays for human recognition tasks borrow speech recognition
techniques. One popular choice for feature extraction of accoustic
signals is the Mel Frequency Cepstral Coefficients (MFCC) which
maps the signal onto a non-linear Mel-Scale that mimics the human
hearing. However the Mel-Scale is almost linear in the frequency
region of heart sounds and thus should produce similar results with
the standard cepstral coefficients (CC). In this paper, MFCC is
investigated to see if it produces superior results for PCG based
human identification system compared to CC. Results show that the
MFCC system is still superior to CC despite linear filter-banks in
the lower frequency range, giving up to 95% correct recognition rate
for MFCC and 90% for CC. Further experiments show that the high
recognition rate is due to the implementation of filter-banks and not
from Mel-Scaling.
Abstract: In this paper, we design an integration security system
that provides authentication service, authorization service, and
management service of security data and a unified interface for the
management service. The interface is originated from XKMS protocol
and is used to manage security data such as XACML policies, SAML
assertions and other authentication security data including public keys.
The system includes security services such as authentication,
authorization and delegation of authentication by employing SAML
and XACML based on security data such as authentication data,
attributes information, assertions and polices managed with the
interface in the system. It also has SAML producer that issues
assertions related on the result of the authentication and the
authorization services.
Abstract: Relational databases are often used as a basis for persistent storage of ontologies to facilitate rapid operations such as search and retrieval, and to utilize the benefits of relational databases management systems such as transaction management, security and integrity control. On the other hand, there appear more and more OWL files that contain ontologies. Therefore, this paper proposes to extract ontologies from OWL files and then store them in relational databases. A prerequisite for this storing is transformation of ontologies to relational databases, which is the purpose of this paper.