Abstract: Regression testing is a maintenance activity applied to
modified software to provide confidence that the changed parts are
correct and that the unchanged parts have not been adversely affected
by the modifications. Regression test selection techniques reduce the
cost of regression testing, by selecting a subset of an existing test
suite to use in retesting modified programs. This paper presents the
first general regression-test-selection technique, which based on code
and allows selecting test cases for any programs written in any
programming language. Then it handles incomplete program. We
also describe RTSDiff, a regression-test-selection system that
implements the proposed technique. The results of the empirical
studied that performed in four programming languages java, C#, Cµ
and Visual basic show that the efficiency and effective in reducing
the size of test suit.
Abstract: In most cases, it is considerably difficult to directly measure structural vibration with a lot of sensors because of complex
geometry, time and equipment cost. For this reason, this paper deals
with the problem of locating sensors on a plate model by four advanced sensor placement optimization (S.P.O) techniques. It also
suggests the evaluation index representing the characteristic of orthogonal between each of natural modes. The index value provides the assistance to selecting of proper S.P.O technique and optimal
positions for monitoring of dynamic systems without the experiment.
Abstract: Supplier appraisal fosters energy in Supply Chain
Management and helps in best optimization of viable business
partners for a company. Many Decision Making techniques have
already been proposed by researchers for supplier-s appraisal.
However, Analytic Hierarchy Process (AHP) is assumed to be the
most structured technique to attain near-best solution of the problem.
This paper focuses at implementation of AHP in the procurement
processes. It also suggests that on what factors a Public Sector
Enterprises must focus while dealing with their suppliers and what
should the suppliers do to synchronize their activities with the
strategic objectives of Organization. It also highlights the weak areas
in supplier appraisal process with a view to suggest viable
recommendations.
Abstract: Image watermarking has become an important tool for
intellectual property protection and authentication. In this paper a
watermarking technique is suggested that incorporates two
watermarks in a host image for improved protection and robustness.
A watermark, in form of a PN sequence (will be called the secondary
watermark), is embedded in the wavelet domain of a primary
watermark before being embedded in the host image. The technique
has been tested using Lena image as a host and the camera man as
the primary watermark. The embedded PN sequence was detectable
through correlation among other five sequences where a PSNR of
44.1065 dB was measured. Furthermore, to test the robustness of the
technique, the watermarked image was exposed to four types of
attacks, namely compression, low pass filtering, salt and pepper noise
and luminance change. In all cases the secondary watermark was
easy to detect even when the primary one is severely distorted.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Application
developers extend the framework to build their particular
applications using hooks. Hooks are the places identified to show
how to use and customize the framework. Hooks define the
Framework Interface Classes (FICs) and their possible specifications,
which helps in building reusable test cases for the implementations of
these classes. This paper introduces a novel technique called all
paths-state to generate state-based test cases to test the FICs at class
level. The technique is experimentally evaluated. The empirical
evaluation shows that all paths-state technique produces test cases
with a high degree of coverage for the specifications of the
implemented FICs comparing to test cases generated using round-trip
path and all-transition techniques.
Abstract: Medical services are usually provided in hospitals; however, in developing country, some rural residences have fewer opportunities to access in healthcare services due to the limitation of transportation communication. Therefore, in Thailand, there are charitable organizations operating to provide medical treatments to these people by shifting the medical services to operation sites; this is commonly known as mobile medical service. Operation routing is important for the organization to reduce its transportation cost in order to focus more on other important activities; for instance, the development of medical apparatus. VRP is applied to solve the problem of high transportation cost of the studied organization with the searching techniques of saving algorithm to find the minimum total distance of operation route and satisfy available time constraints of voluntary medical staffs.
Abstract: All climate models agree that the temperature in
Greece will increase in the range of 1° to 2°C by the year 2030 and
mean sea level in Mediterranean is expected to rise at the rate of 5
cm/decade. The aim of the present paper is the estimation of the
coastline displacement driven by the climate change and sea level
rise. In order to achieve that, all known statistical and non-statistical
computational methods are employed on some Greek coastal areas.
Furthermore, Kalman filtering techniques are for the first time
introduced, formulated and tested. Based on all the above, shoreline
change signals and noises are computed and an inter-comparison
between the different methods can be deduced to help evaluating
which method is most promising as far as the retrieve of shoreline
change rate is concerned.
Abstract: Many artificial intelligence (AI) techniques are inspired
by problem-solving strategies found in nature. Robustness is a key
feature in many natural systems. This paper studies robustness in
artificial neural networks (ANNs) and proposes several novel, nature
inspired ANN architectures. The paper includes encouraging results
from experimental studies on these networks showing increased
robustness.
Abstract: In this work a software simulation model has been
proposed for two driven wheels mobile robot path planning; that can
navigate in dynamic environment with static distributed obstacles.
The work involves utilizing Bezier curve method in a proposed N
order matrix form; for engineering the mobile robot path. The Bezier
curve drawbacks in this field have been diagnosed. Two directions:
Up and Right function has been proposed; Probability Recursive
Function (PRF) to overcome those drawbacks.
PRF functionality has been developed through a proposed;
obstacle detection function, optimization function which has the
capability of prediction the optimum path without comparison
between all feasible paths, and N order Bezier curve function that
ensures the drawing of the obtained path.
The simulation results that have been taken showed; the mobile
robot travels successfully from starting point and reaching its goal
point. All obstacles that are located in its way have been avoided.
This navigation is being done successfully using the proposed PRF
techniques.
Abstract: In this paper, an efficient technique is proposed to manage the cache memory. The proposed technique introduces some modifications on the well-known set associative mapping technique. This modification requires a little alteration in the structure of the cache memory and on the way by which it can be referenced. The proposed alteration leads to increase the set size virtually and consequently to improve the performance and the utilization of the cache memory. The current mapping techniques have accomplished good results. In fact, there are still different cases in which cache memory lines are left empty and not used, whereas two or more processes overwrite the lines of each other, instead of using those empty lines. The proposed algorithm aims at finding an efficient way to deal with such problem.
Abstract: Bladder carcinoma is an important worldwide health problem. Both cystoscopy and urine cytology used in detecting bladder cancer suffer from drawbacks where cystoscopy is an invasive method and urine cytology shows low sensitivity in low grade tumors. This study validates easier and less time-consuming techniques to evaluate the value of combined use of angiogenin and clusterin in comparison and combination with voided urine cytology in the detection of bladder cancer patients. This study includes malignant (bladder cancer patients, n= 50), benign (n=20) and healthy (n=20) groups. The studied groups were subjected to cystoscopic examination, detection of bilharzial antibodies, urine cytology, and estimation of urinary angiogenin and clusterin by ELISA. The overall sensitivity and specificity were 66% and 75% for angiogenin, 70% and 82.5% for clusterin and 46% and 80% for voided urine cytology. Combined sensitivity of angiogenin and clusterin with urine cytology increased from 82 to 88%.
Abstract: Among many different methods that are used for
optimizing different engineering problems mathematical (numerical)
optimization techniques are very important because they can easily
be used and are consistent with most of engineering problems. Many
studies and researches are done on stability analysis of three
dimensional (3D) slopes and the relating probable slip surfaces and
determination of factors of safety, but in most of them force
equilibrium equations, as in simplified 2D methods, are considered
only in two directions. In other words for decreasing mathematical
calculations and also for simplifying purposes the force equilibrium
equation in 3rd direction is omitted. This point is considered in just a
few numbers of previous studies and most of them have only given a
factor of safety and they haven-t made enough effort to find the most
probable slip surface. In this study shapes of the slip surfaces are
modeled, and safety factors are calculated considering the force
equilibrium equations in all three directions, and also the moment
equilibrium equation is satisfied in the slip direction, and using
nonlinear programming techniques the shape of the most probable
slip surface is determined. The model which is used in this study is a
3D model that is composed of three upper surfaces which can cover
all defined and probable slip surfaces. In this research the meshing
process is done in a way that all elements are prismatic with
quadrilateral cross sections, and the safety factor is defined on this
quadrilateral surface in the base of the element which is a part of the
whole slip surface. The method that is used in this study to find the
most probable slip surface is the non-linear programming method in
which the objective function that must get optimized is the factor of
safety that is a function of the soil properties and the coordinates of
the nodes on the probable slip surface. The main reason for using
non-linear programming method in this research is its quick
convergence to the desired responses. The final results show a good
compatibility with the previously used classical and 2D methods and
also show a reasonable convergence speed.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: Normally business changes are made in order to
change a level of activity in some way, whether it is sales, cash flow,
productivity, or product portfolio. When attempts are made to make
such changes, too often the business reverts to the old levels of
activity as soon as management attention is diverted. Risk
management is a field of growing interest to project managers as well
as in general business and organizational management. There are
several approaches used to manage risk in projects and this paper is a
brief outline of some that you might encounter, with an indication of
their strengths and weaknesses.
Abstract: The research is to minimize environmental damage
pertinent to maritime activities about the operation of lighter boat
anchorage and its tugboat. The guidance on upgrading current
harbor service and infrastructure has been provided to Kho Sichang
Municpality. This will involve a study of the maritime logistics of
the water area under jurisdiction of the Sichang island Municipality
and possible recommendations may involve charging taxes,
regulations and fees. With implementing these recommendations will
help in protection of the marine environment and in increasing
operator functionality. Additionally, our recommendation is to
generate a consistent revenue stream to the municipality. The action
items contained in this research are feasible and effective, the success
of these initiatives are heavily dependent upon successful promotion
and enforcement. Promoting new rules and regulations effectively
and peacefully can be done through theories and techniques used in
the psychology of persuasion. In order to assure compliance with the
regulations, the municipality must maintain stringent patrols and
fines for violators. In order to become success, the Municipality
must preserve a consistent, transparent and significant enforcement
system. Considering potential opportunities outside of the current
state of the municipality, the authors recommend that Koh Sichang be
given additional jurisdiction to capture value from the master vessels,
as well as to confront the more significant environmental challenges
these vessels pose. Finally, the authors recommend that the Port of
Koh Sichang Island obtain a free port status in order to increase
economic viability and overall sustainability.
Abstract: Image clustering is a process of grouping images
based on their similarity. The image clustering usually uses the color
component, texture, edge, shape, or mixture of two components, etc.
This research aims to explore image clustering using color
composition. In order to complete this image clustering, three main
components should be considered, which are color space, image
representation (feature extraction), and clustering method itself. We
aim to explore which composition of these factors will produce the
best clustering results by combining various techniques from the
three components. The color spaces use RGB, HSV, and L*a*b*
method. The image representations use Histogram and Gaussian
Mixture Model (GMM), whereas the clustering methods use KMeans
and Agglomerative Hierarchical Clustering algorithm. The
results of the experiment show that GMM representation is better
combined with RGB and L*a*b* color space, whereas Histogram is
better combined with HSV. The experiments also show that K-Means
is better than Agglomerative Hierarchical for images clustering.
Abstract: Selecting the routes and the assignment of link flow in a computer communication networks are extremely complex combinatorial optimization problems. Metaheuristics, such as genetic or simulated annealing algorithms, are widely applicable heuristic optimization strategies that have shown encouraging results for a large number of difficult combinatorial optimization problems. This paper considers the route selection and hence the flow assignment problem. A genetic algorithm and simulated annealing algorithm are used to solve this problem. A new hybrid algorithm combining the genetic with the simulated annealing algorithm is introduced. A modification of the genetic algorithm is also introduced. Computational experiments with sample networks are reported. The results show that the proposed modified genetic algorithm is efficient in finding good solutions of the flow assignment problem compared with other techniques.
Abstract: In this paper, the techniques for estimating the
residual stress in high velocity oxy fuel thermal spray coatings have
been discussed and compared. The development trend and the last
investigation have been studied. It is seemed that the there is not
effective study on the effect of the peening action in HVOF
analytically and numerically.
Abstract: Optimal design of structure has a main role in reduction of material usage which leads to deduction in the final cost of construction projects. Evolutionary approaches are found to be more successful techniques for solving size and shape structural optimization problem since it uses a stochastic random search instead of a gradient search. By reviewing the recent literature works the problem found was the optimization of weight. A new meta-heuristic algorithm called as Cuckoo Search (CS) Algorithm has used for the optimization of the total weight of the truss structures. This paper has used set of 10 bars and 25 bars trusses for the testing purpose. The main objective of this work is to reduce the number of iterations, weight and the total time consumption. In order to demonstrate the effectiveness of the present method, minimum weight design of truss structures is performed and the results of the CS are compared with other algorithms.
Abstract: Human Resource (HR) applications can be used to
provide fair and consistent decisions, and to improve the
effectiveness of decision making processes. Besides that, among
the challenge for HR professionals is to manage organization
talents, especially to ensure the right person for the right job at the
right time. For that reason, in this article, we attempt to describe
the potential to implement one of the talent management tasks i.e.
identifying existing talent by predicting their performance as one of
HR application for talent management. This study suggests the
potential HR system architecture for talent forecasting by using
past experience knowledge known as Knowledge Discovery in
Database (KDD) or Data Mining. This article consists of three
main parts; the first part deals with the overview of HR
applications, the prediction techniques and application, the general
view of Data mining and the basic concept of talent management
in HRM. The second part is to understand the use of Data Mining
technique in order to solve one of the talent management tasks, and
the third part is to propose the potential HR system architecture for
talent forecasting.