Abstract: Vitamin A deficiency is a public health problem in
Zimbabwe. Addressing vitamin A deficiency has the potential of
enhancing resistance to disease and reducing mortality especially in
children less than 5 years. We implemented and adapted vitamin A
outreach supplementation strategy within the National Immunization
Days and Extended Programme of Immunization in a rural district in
Zimbabwe. Despite usual operational challenges faced this approach
enabled the district to increase delivery of supplementation coverage.
This paper describes the outreach strategy that was implemented in
the remote rural district. The strategy covered 63 outreach sites with
2 sites being covered per day and visited once per month for the
whole year. Coverage reached 71% in an area of previous coverage
rates of around less than 50%. We recommend further exploration of
this strategy by others working in similar circumstances. This
strategy can be a potential way for use by Scaling-Up-Nutrition
member states.
Abstract: Although e-mail is the most efficient and popular communication method, unwanted and mass unsolicited e-mails, also called spam mail, endanger the existence of the mail system. This paper proposes a new algorithm called Dynamic Weighted Majority Concept Drift Detection (DWM-CDD) for content-based filtering. The design purposes of DWM-CDD are first to accurate the performance of the previously proposed algorithms, and second to speed up the time to construct the model. The results show that DWM-CDD can detect both sudden and gradual changes quickly and accurately. Moreover, the time needed for model construction is less than previously proposed algorithms.
Abstract: The gas safety management system using an
intelligent gas meter we proposed is to monitor flow and
pressure of gas, earthquake, temperature, smoke and leak of
methane. Then our system takes safety measures to protect a
serious risk by the result of an event, to communicate with a
wall-pad including a gateway by zigbee network in buildings
and to report the event to user by the safety management
program in a server. Also, the inner cutoff valve of an
intelligent gas meter is operated if any event occurred or
abnormal at each sensor.
Abstract: I/O workload is a critical and important factor to
analyze I/O pattern and file system performance. However tracing I/O
operations on the fly distributed parallel file system is non-trivial due
to collection overhead and a large volume of data. In this paper, we
design and implement a parallel file system logging method for high
performance computing using shared memory-based multi-layer
scheme. It minimizes the overhead with reduced logging operation
response time and provides efficient post-processing scheme through
shared memory. Separated logging server can collect sequential logs
from multiple clients in a cluster through packet communication.
Implementation and evaluation result shows low overhead and high
scalability of this architecture for high performance parallel logging
analysis.
Abstract: As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
infrastructures effectively.
Abstract: The usual correctness condition for a schedule of
concurrent database transactions is some form of serializability of
the transactions. For general forms, the problem of deciding whether
a schedule is serializable is NP-complete. In those cases other approaches
to proving correctness, using proof rules that allow the steps
of the proof of serializability to be guided manually, are desirable.
Such an approach is possible in the case of conflict serializability
which is proved algebraically by deriving serial schedules using
commutativity of non-conflicting operations. However, conflict serializability
can be an unnecessarily strong form of serializability restricting
concurrency and thereby reducing performance. In practice,
weaker, more general, forms of serializability for extended models of
transactions are used. Currently, there are no known methods using
proof rules for proving those general forms of serializability. In this
paper, we define serializability for an extended model of partitioned
transactions, which we show to be as expressive as serializability
for general partitioned transactions. An algebraic method for proving
general serializability is obtained by giving an initial-algebra specification
of serializable schedules of concurrent transactions in the
model. This demonstrates that it is possible to conduct algebraic
proofs of correctness of concurrent transactions in general cases.
Abstract: This paper proposes a bi-objective model for the
facility location problem under a congestion system. The idea of the
model is motivated by applications of locating servers in bank
automated teller machines (ATMS), communication networks, and so
on. This model can be specifically considered for situations in which
fixed service facilities are congested by stochastic demand within
queueing framework. We formulate this model with two perspectives
simultaneously: (i) customers and (ii) service provider. The
objectives of the model are to minimize (i) the total expected
travelling and waiting time and (ii) the average facility idle-time.
This model represents a mixed-integer nonlinear programming
problem which belongs to the class of NP-hard problems. In addition,
to solve the model, two metaheuristic algorithms including nondominated
sorting genetic algorithms (NSGA-II) and non-dominated
ranking genetic algorithms (NRGA) are proposed. Besides, to
evaluate the performance of the two algorithms some numerical
examples are produced and analyzed with some metrics to determine
which algorithm works better.
Abstract: Pulse code modulation is a widespread technique
in digital communication with significant impact on existing
modern and proposed future communication technologies. Its
widespread utilization is due to its simplicity and attractive
spectral characteristics. In this paper, we present a new
approach to the spectral analysis of PCM signals using
Riemann-Stieltjes integrals, which is very accurate for high bit
rates. This approach can serve as a model for similar spectral
analysis of other competing modulation schemes.
Abstract: Corporate identity, which has several advantages such
that the employees become integrated with their corporations,
corporation is distinguished from its competitors and it is recognized
by the masses, is the total of the distinctive corporate features that
and corporation has. That the information takes part in production as
a more important component than labor and capital has required that
the corporations are reorganized as information-based. Therefore,
information and its management have reached a basic and prevalent
position in having sustainable competitive advantage. Thanks to the
information management which regulates the information and makes
it reachable and available, information will be produced in line with a
specific purpose in the corporations and be used in all the corporate
processes. As an auxiliary power for increase in the economic
potential, efficiency and productivity of the corporation, corporate
identity consists of four components. These are corporate philosophy,
corporate design, corporate behavior and corporate communication.
In this study, the effects of the information management on corporate
identity are discussed from the point of these four elements.
Abstract: Open Agent System platform based on High Level
Architecture is firstly proposed to support the application involving
heterogeneous agents. The basic idea is to develop different wrappers
for different agent systems, which are wrapped as federates to join a
federation. The platform is based on High Level Architecture and the
advantages for this open standard are naturally inherited, such as
system interoperability and reuse. Especially, the federal architecture
allows different federates to be heterogeneous so as to support the
integration of different agent systems. Furthermore, both implicit
communication and explicit communication between agents can be
supported. Then, as the wrapper RTI_JADE an example, the
components are discussed. Finally, the performance of RTI_JADE is
analyzed. The results show that RTI_JADE works very efficiently.
Abstract: The software industry has been considered a critical
infrastructure for any nation. Several studies have indicated that
national competitiveness increasingly depends upon Information and
Communication Technology (ICT), and software is one of the major
components of ICT, important for both large and small enterprises.
Even though there has been strong growth in the software industry in
Thailand, the industry has faced many challenges and problems that
need to be resolved. For example, the amount of pirated software has
been rising, and Thailand still has a large gap in the digital divide.
Additionally, the adoption among SMEs has been slow. This paper
investigates various issues in the software industry in Thailand, using
information acquired through analysis of secondary sources,
observation, and focus groups. The results of this study can be used
as “lessons learned" for the development of the software industry in
any developing country.
Abstract: Radio propagation from point-to-point is affected by
the physical channel in many ways. A signal arriving at a destination
travels through a number of different paths which are referred to as
multi-paths. Research in this area of wireless communications has
progressed well over the years with the research taking different
angles of focus. By this is meant that some researchers focus on
ways of reducing or eluding Multipath effects whilst others focus on
ways of mitigating the effects of Multipath through compensation
schemes. Baseband processing is seen as one field of signal
processing that is cardinal to the advancement of software defined
radio technology. This has led to wide research into the carrying out
certain algorithms at baseband. This paper considers compensating
for Multipath for Frequency Modulated signals. The compensation
process is carried out at Radio frequency (RF) and at Quadrature
baseband (QBB) and the results are compared. Simulations are
carried out using MatLab so as to show the benefits of working at
lower QBB frequencies than at RF.
Abstract: Shot boundary detection is a fundamental step for the organization of large video data. In this paper, we propose a new method for video gradual shots detection and classification, using advantages of fractal analysis and AIS-based classifier. Proposed features are “vertical intercept" and “fractal dimension" of each frame of videos which are computed using Fourier transform coefficients. We also used a classifier based on Clonal Selection Algorithm. We have carried out our solution and assessed it according to the TRECVID2006 benchmark dataset.
Abstract: This paper describes the smart energy monitoring system with a wireless sensor network for monitoring of electrical usage in smart house. Proposed system is composed of wireless plugs and energy control wallpad server. The wireless plug integrates an AC power socket, a relay to switch the socket ON/OFF, a Hall effect sensor to sense current of load appliance and a Kmote. The Kmote is a wireless communication interface based on TinyOS. We evaluated wireless plug in a laboratory, analyzed and presented energy consumption data from electrical appliances for 3 months in home.
Abstract: Nowadays, we are facing with network threats that
cause enormous damage to the Internet community day by day. In
this situation, more and more people try to prevent their network
security using some traditional mechanisms including firewall,
Intrusion Detection System, etc. Among them honeypot is a versatile
tool for a security practitioner, of course, they are tools that are meant
to be attacked or interacted with to more information about attackers,
their motives and tools. In this paper, we will describe usefulness of
low-interaction honeypot and high-interaction honeypot and
comparison between them. And then we propose hybrid honeypot
architecture that combines low and high -interaction honeypot to
mitigate the drawback. In this architecture, low-interaction honeypot
is used as a traffic filter. Activities like port scanning can be
effectively detected by low-interaction honeypot and stop there.
Traffic that cannot be handled by low-interaction honeypot is handed
over to high-interaction honeypot. In this case, low-interaction
honeypot is used as proxy whereas high-interaction honeypot offers
the optimal level realism. To prevent the high-interaction honeypot
from infections, containment environment (VMware) is used.
Abstract: A large number of semantic web service composition
approaches are developed by the research community and one is
more efficient than the other one depending on the particular
situation of use. So a close look at the requirements of ones particular
situation is necessary to find a suitable approach to use. In this paper,
we present a Technique Recommendation System (TRS) which using
a classification of state-of-art semantic web service composition
approaches, can provide the user of the system with the
recommendations regarding the use of service composition approach
based on some parameters regarding situation of use. TRS has
modular architecture and uses the production-rules for knowledge
representation.
Abstract: Writer identification is one of the areas in pattern
recognition that attract many researchers to work in, particularly in
forensic and biometric application, where the writing style can be
used as biometric features for authenticating an identity. The
challenging task in writer identification is the extraction of unique
features, in which the individualistic of such handwriting styles
can be adopted into bio-inspired generalized global shape for
writer identification. In this paper, the feasibility of generalized
global shape concept of complimentary binding in Artificial
Immune System (AIS) for writer identification is explored. An
experiment based on the proposed framework has been conducted
to proof the validity and feasibility of the proposed approach for
off-line writer identification.
Abstract: Globalization, supported by information and
communication technologies, changes the rules of competitiveness
and increases the significance of information, knowledge and
network cooperation. In line with this trend, the need for efficient
trust-building tools has emerged. The absence of trust building
mechanisms and strategies was identified within several studies.
Through trust development, participation on e-business network and
usage of network services will increase and provide to SMEs new
economic benefits. This work is focused on effective trust building
strategies development for electronic business network platforms.
Based on trust building mechanism identification, the questionnairebased
analysis of its significance and minimum level of requirements
was conducted. In the paper, we are confirming the trust dependency
on e-Skills which play crucial role in higher level of trust into the
more sophisticated and complex trust building ICT solutions.
Abstract: This research contribution propels the idea of collaborating environment for the execution of student satellite projects in the backdrop of project management principles. The recent past has witnessed a technological shift in the aerospace industry from the big satellite projects to the small spacecrafts especially for the earth observation and communication purposes. This vibrant shift has vitalized the academia and industry to share their resources and to create a win-win paradigm of mutual success and technological development along with the human resource development in the field of aerospace. Small student satellites are the latest jargon of academia and more than 100 CUBESAT projects have been executed successfully all over the globe and many new student satellite projects are in the development phase. The small satellite project management requires the application of specific knowledge, skills, tools and techniques to achieve the defined mission requirements. The Authors have presented the detailed outline for the project management of student satellites and presented the role of industry to collaborate with the academia to get the optimized results in academic environment.
Abstract: The purpose of this paper is to guide the effort in
improving the economic added value of Indonesian fisheries product
through post fishing program, which is cold storage program.
Indonesia's fisheries potential has been acknowledged by the world.
FAO (2009) stated that Indonesia is one of the tenth highest
producers of fishery products in the world. Based on BPS (Statistics
Indonesia data), the national fisheries production in 2011 reached
5.714 million tons, which 93.55% came from marine fisheries and
6.45% from open waters. Indonesian territory consist of 2/3 of
Indonesian waters, has given enormous benefits for Indonesia,
especially fishermen. To improve the economic level of fishermen
requires efforts to develop fisheries business unit. On of the efforts is
by improving the quality of products which are marketed in the
regional and international levels. It is certainly need the support of
the existence of various fishery facilities (infrastructure to
superstructure), one of which is cold storage. Given the many
benefits of cold storage as a means of processing of fishery resources,
Indonesia Maritime Security Coordinating Board (IMSCB) as one of
the maritime institutions for maritime security and safety, has a
program to empower the coastal community through encourages the
development of cold storage in the middle and lower fishery business
unit. The development of cold storage facilities which able to run its
maximum role requires synergistic efforts of various parties.