Abstract: Deep and radical social reforms of the last century-s
nineties in many Eastern European countries caused changes in
Information Technology-s (IT) field. Inefficient information
technologies were rapidly replaced with forefront IT solutions, e.g.,
in Eastern European countries there is a high level penetration of
qualitative high-speed Internet. The authors have taken part in the
introduction of those changes in Latvia-s leading IT research
institute. Grounding on their experience authors in this paper offer an
IT services based model for analysis the mentioned changes- and
development processes in the higher education and research fields,
i.e., for research e-infrastructure-s development. Compare to the
international practice such services were developed in Eastern Europe
in an untraditional way, which provided swift and positive
technological changes.
Abstract: Sputum smear conversion after one month of antituberculosis
therapy in new smear positive pulmonary tuberculosis
patients (PTB+) is a vital indicator towards treatment success. The
objective of this study is to determine the rate of sputum smear
conversion in new PTB+ patients after one month under treatment of
National Institute of Diseases of the Chest and Hospital (NIDCH).
Analysis of sputum smear conversion was done by re-clinical
examination with sputum smear microscopic test after one month.
Socio-demographic and hematological parameters were evaluated to
perceive the correlation with the disease status. Among all enrolled
patients only 33.33% were available for follow up diagnosis and of
them only 42.86% patients turned to smear negative. Probably this
consequence is due to non-coherence to the proper disease
management. 66.67% and 78.78% patients reported low haemoglobin
and packed cell volume level respectively whereas 80% and 93.33%
patients accounted accelerated platelet count and erythrocyte
sedimentation rate correspondingly.
Abstract: This article outlines conceptualization and
implementation of an intelligent system capable of extracting
knowledge from databases. Use of hybridized features of both the
Rough and Fuzzy Set theory render the developed system flexibility
in dealing with discreet as well as continuous datasets. A raw data set
provided to the system, is initially transformed in a computer legible
format followed by pruning of the data set. The refined data set is
then processed through various Rough Set operators which enable
discovery of parameter relationships and interdependencies. The
discovered knowledge is automatically transformed into a rule base
expressed in Fuzzy terms. Two exemplary cancer repository datasets
(for Breast and Lung Cancer) have been used to test and implement
the proposed framework.
Abstract: This conference paper discusses a risk allocation problem for subprime investing banks involving investment in subprime structured mortgage products (SMPs) and Treasuries. In order to solve this problem, we develop a L'evy process-based model of jump diffusion-type for investment choice in subprime SMPs and Treasuries. This model incorporates subprime SMP losses for which credit default insurance in the form of credit default swaps (CDSs) can be purchased. In essence, we solve a mean swap-at-risk (SaR) optimization problem for investment which determines optimal allocation between SMPs and Treasuries subject to credit risk protection via CDSs. In this regard, SaR is indicative of how much protection investors must purchase from swap protection sellers in order to cover possible losses from SMP default. Here, SaR is defined in terms of value-at-risk (VaR). Finally, we provide an analysis of the aforementioned optimization problem and its connections with the subprime mortgage crisis (SMC).
Abstract: The conjugate gradient optimization algorithm
usually used for nonlinear least squares is presented and is
combined with the modified back propagation algorithm yielding
a new fast training multilayer perceptron (MLP) algorithm
(CGFR/AG). The approaches presented in the paper consist of
three steps: (1) Modification on standard back propagation
algorithm by introducing gain variation term of the activation
function, (2) Calculating the gradient descent on error with
respect to the weights and gains values and (3) the determination
of the new search direction by exploiting the information
calculated by gradient descent in step (2) as well as the previous
search direction. The proposed method improved the training
efficiency of back propagation algorithm by adaptively modifying
the initial search direction. Performance of the proposed method
is demonstrated by comparing to the conjugate gradient algorithm
from neural network toolbox for the chosen benchmark. The
results show that the number of iterations required by the
proposed method to converge is less than 20% of what is required
by the standard conjugate gradient and neural network toolbox
algorithm.
Abstract: This paper investigated the organizational
innovativeness of public listed housing developers in Malaysia. We
conceptualized organizational innovativeness as a multi-dimensional
construct consisting of 5 dimensions: market innovativeness, product
innovativeness, process innovativeness, behavior innovativeness and
strategic innovativeness. We carried out questionnaire survey with all
accessible public listed developers in Malaysia and received a 56
percent response. We found that the innovativeness of public listed
housing developers is low. The paper ends by providing some
explanations for the results.
Abstract: This article discusses the customs and traditions in
Turkestan in the late XIXth and early XXth centuries. Having a long
history, Turkestan is well-known as the birthplace of many nations
and nationalities. The name of Turkestan is also given to it for a
reason - the land of the Turkic peoples who inhabited Central Asia
and united under together. Currently, nations and nationalities of the
Turkestan region formed their own sovereign states, and every year
they prove their country names in the world community. Political,
economic importance of Turkestan, which became the gold wire
between Asia and Europe was always very high. So systematically
various aggressive actions were made by several great powers. As a
result of expansionary policy of colonization of the Russian Empire -
the Turkestan has appeared.
Abstract: Using mini modules of Tmotes, it is possible to automate a small personal area network. This idea can be extended to large networks too by implementing multi-hop routing. Linking the various Tmotes using Programming languages like Nesc, Java and having transmitter and receiver sections, a network can be monitored. It is foreseen that, depending on the application, a long range at a low data transfer rate or average throughput may be an acceptable trade-off. To reduce the overall costs involved, an optimum number of Tmotes to be used under various conditions (Indoor/Outdoor) is to be deduced. By analyzing the data rates or throughputs at various locations of Tmotes, it is possible to deduce an optimal number of Tmotes for a specific network. This paper deals with the determination of optimum distances to reduce the cost and increase the reliability of the entire sensor network with Wireless Local Loop (WLL) capability.
Abstract: In present work, drying characteristics of fresh papaya (Carica papaya L.) was studied to understand the dehydration process and its behavior. Drying experiments were carried out by a laboratory scaled microwave-vacuum oven. The parameters affecting drying characteristics including operating modes (continuous, pulsed), microwave power (400 and 800 W), and vacuum pressure (20, 30, and 40 cmHg) were investigated. For pulsed mode, two levels of power-off time (60 and 120 s) were used while the power-on time was fixed at 60 s and the vacuum pressure was fixed at 40 cmHg. For both operating modes, the effects of drying conditions on drying time, drying rate, and effective diffusivity were investigated. The results showed high microwave power, high vacuum, and pulsed mode of 60 s-on/60 s-off favored drying rate as shown by the shorten drying time and increased effective diffusivity. The drying characteristics were then described by Page-s model, which showed a good agreement with experimental data.
Abstract: Computations with higher than the IEEE 754 standard double-precision (about 16 significant digits) are required recently. Although there are available software routines in Fortran and C for high-precision computation, users are required to implement such routines in their own computers with detailed knowledges about them. We have constructed an user-friendly online system for octupleprecision computation. In our Web system users with no knowledges about high-precision computation can easily perform octupleprecision computations, by choosing mathematical functions with argument(s) inputted, by writing simple mathematical expression(s) or by uploading C program(s). In this paper we enhance the Web system above by adding the facility of uploading Fortran programs, which have been widely used in scientific computing. To this end we construct converter routines in two stages.
Abstract: In this paper we present a method for gene ranking
from DNA microarray data. More precisely, we calculate the correlation
networks, which are unweighted and undirected graphs, from
microarray data of cervical cancer whereas each network represents
a tissue of a certain tumor stage and each node in the network
represents a gene. From these networks we extract one tree for
each gene by a local decomposition of the correlation network. The
interpretation of a tree is that it represents the n-nearest neighbor
genes on the n-th level of a tree, measured by the Dijkstra distance,
and, hence, gives the local embedding of a gene within the correlation
network. For the obtained trees we measure the pairwise similarity
between trees rooted by the same gene from normal to cancerous
tissues. This evaluates the modification of the tree topology due to
progression of the tumor. Finally, we rank the obtained similarity
values from all tissue comparisons and select the top ranked genes.
For these genes the local neighborhood in the correlation networks
changes most between normal and cancerous tissues. As a result
we find that the top ranked genes are candidates suspected to be
involved in tumor growth and, hence, indicates that our method
captures essential information from the underlying DNA microarray
data of cervical cancer.
Abstract: It is known that if harmonic spectra are decreased, then
acoustic noise also decreased. Hence, this paper deals with a new
random switching strategy using DSP TMS320F2812 to decrease the
harmonics spectra of single phase switched reluctance motor. The
proposed method which combines random turn-on, turn-off angle
technique and random pulse width modulation technique is shown. A
harmonic spread factor (HSF) is used to evaluate the random
modulation scheme. In order to confirm the effectiveness of the new
method, the experimental results show that the harmonic intensity of
output voltage for the proposed method is better than that for
conventional methods.
Abstract: Environmental factors affect agriculture production
productivity and efficiency resulted in changing of profit efficiency.
This paper attempts to estimate the impacts of environmental factors
to profitability of rice farmers in the Red River Delta of Vietnam. The
dataset was extracted from 349 rice farmers using personal
interviews. Both OLS and MLE trans-log profit functions were used
in this study. Five production inputs and four environmental factors
were included in these functions. The estimation of the stochastic
profit frontier with a two-stage approach was used to measure
profitability. The results showed that the profit efficiency was about
75% on the average and environmental factors change profit
efficiency significantly beside farm specific characteristics. Plant
disease, soil fertility, irrigation apply and water pollution were the
four environmental factors cause profit loss in rice production. The
result indicated that farmers should reduce household size, farm
plots, apply row seeding technique and improve environmental
factors to obtain high profit efficiency with special consideration is
given for irrigation water quality improvement.
Abstract: Quality control charts indicate out of control
conditions if any nonrandom pattern of the points is observed or any
point is plotted beyond the control limits. Nonrandom patterns of
Shewhart control charts are tested with sensitizing rules. When the
processes are defined with fuzzy set theory, traditional sensitizing
rules are insufficient for defining all out of control conditions. This is
due to the fact that fuzzy numbers increase the number of out of
control conditions. The purpose of the study is to develop a set of
fuzzy sensitizing rules, which increase the flexibility and sensitivity
of fuzzy control charts. Fuzzy sensitizing rules simplify the
identification of out of control situations that results in a decrease in
the calculation time and number of evaluations in fuzzy control chart
approach.
Abstract: All practical real-time scheduling algorithms in multiprocessor systems present a trade-off between their computational complexity and performance. In real-time systems, tasks have to be performed correctly and timely. Finding minimal schedule in multiprocessor systems with real-time constraints is shown to be NP-hard. Although some optimal algorithms have been employed in uni-processor systems, they fail when they are applied in multiprocessor systems. The practical scheduling algorithms in real-time systems have not deterministic response time. Deterministic timing behavior is an important parameter for system robustness analysis. The intrinsic uncertainty in dynamic real-time systems increases the difficulties of scheduling problem. To alleviate these difficulties, we have proposed a fuzzy scheduling approach to arrange real-time periodic and non-periodic tasks in multiprocessor systems. Static and dynamic optimal scheduling algorithms fail with non-critical overload. In contrast, our approach balances task loads of the processors successfully while consider starvation prevention and fairness which cause higher priority tasks have higher running probability. A simulation is conducted to evaluate the performance of the proposed approach. Experimental results have shown that the proposed fuzzy scheduler creates feasible schedules for homogeneous and heterogeneous tasks. It also and considers tasks priorities which cause higher system utilization and lowers deadline miss time. According to the results, it performs very close to optimal schedule of uni-processor systems.
Abstract: Biometric techniques are gaining importance for
personal authentication and identification as compared to the
traditional authentication methods. Biometric templates are
vulnerable to variety of attacks due to their inherent nature. When a
person-s biometric is compromised his identity is lost. In contrast to
password, biometric is not revocable. Therefore, providing security
to the stored biometric template is very crucial. Crypto biometric
systems are authentication systems, which blends the idea of
cryptography and biometrics. Fuzzy vault is a proven crypto
biometric construct which is used to secure the biometric templates.
However fuzzy vault suffer from certain limitations like nonrevocability,
cross matching. Security of the fuzzy vault is affected
by the non-uniform nature of the biometric data. Fuzzy vault when
hardened with password overcomes these limitations. Password
provides an additional layer of security and enhances user privacy.
Retina has certain advantages over other biometric traits. Retinal
scans are used in high-end security applications like access control to
areas or rooms in military installations, power plants, and other high
risk security areas. This work applies the idea of fuzzy vault for
retinal biometric template. Multimodal biometric system
performance is well compared to single modal biometric systems.
The proposed multi modal biometric fuzzy vault includes combined
feature points from retina and fingerprint. The combined vault is
hardened with user password for achieving high level of security.
The security of the combined vault is measured using min-entropy.
The proposed password hardened multi biometric fuzzy vault is
robust towards stored biometric template attacks.
Abstract: Heat powered solid sorption is a feasible alternative to
electrical vapor compression refrigeration systems. In this paper,
activated carbon (powder type Maxsorb and fiber type ACF-A10)-
CO2 based adsorption cooling cycles are studied using the pressuretemperature-
concentration (P-T-W) diagram. The specific cooling
effect (SCE) and the coefficient of performance (COP) of these two
cooling systems are simulated for the driving heat source
temperatures ranging from 30 ºC to 90 ºC in terms of different
cooling load temperatures with a cooling source temperature of 25
ºC. It is found from the present analysis that Maxsorb-CO2 couple
shows higher cooling capacity and COP. The maximum COPs of
Maxsorb-CO2 and ACF(A10)-CO2 based cooling systems are found
to be 0.15 and 0.083, respectively. The main innovative feature of
this cooling cycle is the ability to utilize low temperature waste heat
or solar energy using CO2 as the refrigerant, which is one of the best
alternative for applications where flammability and toxicity are not
allowed.
Abstract: Centrally controlled authentication and authorization services can provide enterprise with an increase in security, more flexible access control solutions and an increased users' trust. By using redirections, users of all Web-based applications within an organization are authenticated at a single well known and secure Web site and using secure communication protocol. Users are first authenticated at the central server using their domain wide credentials before being redirected to a particular Web-based application. The central authentication server will then provide others with pertinence authorization related particulars and credentials of the authenticated user to the specific application. The trust between the clients and the server hosts is established by secure session keys exchange. Case- studies are provided to demonstrate the usefulness and flexibility of the proposed solution.
Abstract: This paper proposes a specialized Web robot to automatically collect objectionable Web contents for use in an objectionable Web content classification system, which creates the URL database of objectionable Web contents. It aims at shortening the update period of the DB, increasing the number of URLs in the DB, and enhancing the accuracy of the information in the DB.
Abstract: The wind resource in the Italian site of Lendinara
(RO) is analyzed through a systematic anemometric campaign
performed on the top of the bell tower, at an altitude of over 100 m
above the ground. Both the average wind speed and the Weibull
distribution are computed. The resulting average wind velocity is in
accordance with the numerical predictions of the Italian Wind Atlas,
confirming the accuracy of the extrapolation of wind data adopted for
the evaluation of wind potential at higher altitudes with respect to the
commonly placed measurement stations.