Abstract: Various intelligences and inspirations have been
adopted into the iterative searching process called as meta-heuristics.
They intelligently perform the exploration and exploitation in the
solution domain space aiming to efficiently seek near optimal
solutions. In this work, the bee algorithm, inspired by the natural
foraging behaviour of honey bees, was adapted to find the near
optimal solutions of the transportation management system, dynamic
multi-zone dispatching. This problem prepares for an uncertainty and
changing customers- demand. In striving to remain competitive,
transportation system should therefore be flexible in order to cope
with the changes of customers- demand in terms of in-bound and outbound
goods and technological innovations. To remain higher service
level but lower cost management via the minimal imbalance scenario,
the rearrangement penalty of the area, in each zone, including time
periods are also included. However, the performance of the algorithm
depends on the appropriate parameters- setting and need to be
determined and analysed before its implementation. BEE parameters
are determined through the linear constrained response surface
optimisation or LCRSOM and weighted centroid modified simplex
methods or WCMSM. Experimental results were analysed in terms
of best solutions found so far, mean and standard deviation on the
imbalance values including the convergence of the solutions
obtained. It was found that the results obtained from the LCRSOM
were better than those using the WCMSM. However, the average
execution time of experimental run using the LCRSOM was longer
than those using the WCMSM. Finally a recommendation of proper
level settings of BEE parameters for some selected problem sizes is
given as a guideline for future applications.
Abstract: Pregnancy is considered a special period in a woman’s life. There are myths about pregnancy that describe gender predictions, dietary beliefs, pregnancy signs, and risk of magic or witchcraft. Majority of these myths is in connection with the early childcare. In traditional societies midwives and experienced women practice and teach these myths to young mothers. Mother who feel special and vulnerable, at the same time feel secure in following these socially transmitted myths. Rural Punjab, a province of Pakistan has a culture rich with beliefs and myths. Myths about pregnancy are significant in rural culture and pregnancy care is seen as mother and childcare. This paper presents my research reflections that I did as a part of my Ph.D studies about early childcare beliefs and rituals practiced in rural Punjab, Pakistan.
Abstract: There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
Abstract: In the field of concepts, the measure of Wu and Palmer [1] has the advantage of being simple to implement and have good performances compared to the other similarity measures [2]. Nevertheless, the Wu and Palmer measure present the following disadvantage: in some situations, the similarity of two elements of an IS-A ontology contained in the neighborhood exceeds the similarity value of two elements contained in the same hierarchy. This situation is inadequate within the information retrieval framework. To overcome this problem, we propose a new similarity measure based on the Wu and Palmer measure. Our objective is to obtain realistic results for concepts not located in the same way. The obtained results show that compared to the Wu and Palmer approach, our measure presents a profit in terms of relevance and execution time.
Abstract: New generalization of the new class matrix polynomial set have been obtained. An explicit representation and an expansion of the matrix exponential in a series of these matrix are given for these matrix polynomials.
Abstract: Political transition of agricultural properties in Poland and the former German Democratic Republic (GDR) after 1989 had
to include not only Reprivatization but also the issue of returning the
properties in kind to their former owners. Restitution in kind applied
in GDR to all forms of ownership which were subject to
expropriation between 1933 and 1989 except for properties taken
over during Soviet occupation in 1945-49. This issue was one of the flashpoints during the process of ownership changes. Privatization,
limited as it was, took place in unequal legal environment where only
one group of owners was privileged. Executing restitution in kind
created a feeling of uncertainty among potential real estate buyers.
Abstract: Insider abuse has recently been reported as one of
the more frequently occurring security incidents, suggesting that
more security is required for detecting and preventing unauthorised
financial transactions entered by authorised users. To address the
problem, and based on the observation that all authorised interbanking
financial transactions trigger or are triggered by other
transactions in a workflow, we have developed a security solution
based on a redefined understanding of an audit workflow. One audit
workflow where there is a log file containing the complete workflow
activity of financial transactions directly related to one financial
transaction (an electronic deal recorded at an e-trading system). The
new security solution contemplates any two parties interacting on
the basis of financial transactions recorded by their users in related
but distinct automated financial systems. In the new definition interorganizational
and intra-organization interactions can be described
in one unique audit trail. This concept expands the current ideas of
audit trails by adapting them to actual e-trading workflow activity, i.e.
intra-organizational and inter-organizational activity. With the above,
a security auditing service is designed to detect integrity drifts with
and between organizations in order to detect unauthorised financial
transactions entered by authorised users.
Abstract: This study discusses the stumbling blocks stifling the
adoption of GPS technology in the public sector of Pakistan. This
study has been carried out in order to describe the value of GPS
technology and its adoption at various public sector organisations in
Pakistan. Sample size for the research conducted was 200; personnel
working in public sector having age above 29 years were surveyed.
Data collected for this research has been quantitatively analysed with
the help of SPSS. Regression analysis, correlation and cross
tabulation were the techniques used to determine the strength of
relationship between key variables. Findings of this research indicate
that main hurdles in GPS adoption in the public sector of Pakistan are
lack of awareness about GPS among masses in general and the
stakeholders in particular, lack of initiative on part of government in
promoting new technologies, unavailability of GPS infrastructure in
Pakistan and prohibitions on map availability because of security
reasons.
Abstract: Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.
Abstract: As the latest advancement and trend in IT field, Green
& Smart IT has attracted more and more attentions from researchers.
This study focuses on the development of assessing tools which can be
used for evaluating Green & Smart IT level within an organization. In
order to achieve meaningful results, a comprehensive review of
relevant literature was performed in advance, then, Delphi survey and
other processes were also employed to develop the assessment tools
for Green & Smart IT level. Two rounds of Delphi questionnaire
survey were conducted with 20 IT experts in public sector. The results
reveal that the top five weighted KPIs to evaluate maturity of Green &
Smart IT were: (1) electronic execution of business process; (2)
shutdown of unused IT devices; (3) virtualization of severs; (4)
automation of constant temperature and humidity; and (5) introduction
of smart-work system. Finally, these tools were applied to case study
of a public research institute in Korea. The findings presented in this
study provide organizations with useful implications for the
introduction and promotion of Green & Smart IT in the future
Abstract: Grid scheduling is the process of mapping grid jobs to resources over multiple administrative domains. Traditionally, application-level schedulers have been tightly integrated with the application itself and were not easily applied to other applications. This design is generic that decouples the scheduler core (the search procedure) from the application-specific (e.g. application performance models) and platform-specific (e.g. collection of resource information) components used by the search procedure. In this decoupled approach the application details are not revealed completely to broker, but customer will give the application to resource provider for execution. In a decoupled approach, apart from scheduling, the resource selection can be performed independently in order to achieve scalability.
Abstract: This research presents the development of simulation
modeling for WIP management in semiconductor fabrication.
Manufacturing simulation modeling is needed for productivity
optimization analysis due to the complex process flows involved
more than 35 percent re-entrance processing steps more than 15 times
at same equipment. Furthermore, semiconductor fabrication required
to produce high product mixed with total processing steps varies from
300 to 800 steps and cycle time between 30 to 70 days. Besides the
complexity, expansive wafer cost that potentially impact the
company profits margin once miss due date is another motivation to
explore options to experiment any analysis using simulation
modeling. In this paper, the simulation model is developed using
existing commercial software platform AutoSched AP, with
customized integration with Manufacturing Execution Systems
(MES) and Advanced Productivity Family (APF) for data collections
used to configure the model parameters and data source. Model
parameters such as processing steps cycle time, equipment
performance, handling time, efficiency of operator are collected
through this customization. Once the parameters are validated, few
customizations are made to ensure the prior model is executed. The
accuracy for the simulation model is validated with the actual output
per day for all equipments. The comparison analysis from result of
the simulation model compared to actual for achieved 95 percent
accuracy for 30 days. This model later was used to perform various
what if analysis to understand impacts on cycle time and overall
output. By using this simulation model, complex manufacturing
environment like semiconductor fabrication (fab) now have
alternative source of validation for any new requirements impact
analysis.
Abstract: The neurogenic potential of many herbal extracts used
in Indian medicine is hitherto unknown. Extracts derived from
Clitoria ternatea Linn have been used in Indian Ayurvedic system of
medicine as an ingredient of “Medhya rasayana", consumed for
improving memory and longevity in humans and also in treatment of
various neurological disorders. Our earlier experimental studies with
oral intubation of Clitoria ternatea aqueous root extract (CTR) had
shown significant enhancement of learning and memory in postnatal
and young adult Wistar rats. The present study was designed to
elucidate the in vitro effects of 200ng/ml of CTR on proliferation,
differentiation and growth of anterior subventricular zone neural
stem cells (aSVZ NSC-s) derived from prenatal and postnatal rat
pups. Results show significant increase in proliferation and growth of
neurospheres and increase in the yield of differentiated neurons of
aSVZ neural precursor cells (aSVZNPC-s) at 7 days in vitro when
treated with 200ng/ml of CTR as compared to age matched control.
Results indicate that CTR has growth promoting neurogenic effect on
aSVZ neural stem cells and their survival similar to neurotrophic
factors like Survivin, Neuregulin 1, FGF-2, BDNF possibly the basis
for enhanced learning and memory.
Abstract: Power system state estimation is the process of
calculating a reliable estimate of the power system state vector
composed of bus voltages' angles and magnitudes from telemetered
measurements on the system. This estimate of the state vector
provides the description of the system necessary for the operation
and security monitoring. Many methods are described in the
literature for solving the state estimation problem, the most important
of which are the classical weighted least squares method and the nondeterministic
genetic based method; however both showed
drawbacks. In this paper a modified version of the genetic
algorithm power system state estimation is introduced, Sensitivity of
the proposed algorithm to genetic operators is discussed, the
algorithm is applied to case studies and finally it is compared with
the classical weighted least squares method formulation.
Abstract: The study of proteomics reached unexpected levels of
interest, as a direct consequence of its discovered influence over some
complex biological phenomena, such as problematic diseases like
cancer. This paper presents the latest authors- achievements regarding
the analysis of the networks of proteins (interactome networks), by
computing more efficiently the betweenness centrality measure. The
paper introduces the concept of betweenness centrality, and then
describes how betweenness computation can help the interactome net-
work analysis. Current sequential implementations for the between-
ness computation do not perform satisfactory in terms of execution
times. The paper-s main contribution is centered towards introducing
a speedup technique for the betweenness computation, based on
modified shortest path algorithms for sparse graphs. Three optimized
generic algorithms for betweenness computation are described and
implemented, and their performance tested against real biological
data, which is part of the IntAct dataset.
Abstract: Shadows add great amount of realism to a scene and
many algorithms exists to generate shadows. Recently, Shadow
volumes (SVs) have made great achievements to place a valuable
position in the gaming industries. Looking at this, we concentrate on
simple but valuable initial partial steps for further optimization in SV
generation, i.e.; model simplification and silhouette edge detection
and tracking. Shadow volumes (SVs) usually takes time in generating
boundary silhouettes of the object and if the object is complex then
the generation of edges become much harder and slower in process.
The challenge gets stiffer when real time shadow generation and
rendering is demanded. We investigated a way to use the real time
silhouette edge detection method, which takes the advantage of
spatial and temporal coherence, and exploit the level-of-details
(LOD) technique for reducing silhouette edges of the model to use
the simplified version of the model for shadow generation speeding
up the running time. These steps highly reduce the execution time of
shadow volume generations in real-time and are easily flexible to any
of the recently proposed SV techniques. Our main focus is to exploit
the LOD and silhouette edge detection technique, adopting them to
further enhance the shadow volume generations for real time
rendering.
Abstract: In this paper the Analytic Network Process (ANP) is
applied to the selection of photovoltaic (PV) solar power projects.
These projects follow a long management and execution process
from plant site selection to plant start-up. As a consequence, there are
many risks of time delays and even of project stoppage.
In the case study presented in this paper a top manager of an
important Spanish company that operates in the power market has to
decide on the best PV project (from four alternative projects) to
invest based on risk minimization. The manager identified 50 project
execution delay and/or stoppage risks.
The influences among elements of the network (groups of risks
and alternatives) were identified and analyzed using the ANP
multicriteria decision analysis method. After analyzing the results the
main conclusion is that the network model can manage all the
information of the real-world problem and thus it is a decision
analysis model recommended by the authors. The strengths and
weaknesses ANP as a multicriteria decision analysis tool are also
described in the paper.
Abstract: COPD is characterized by loss of elastic fibers from
small airways and alveolar walls, with the decrease in elastin
increasing with disease severity. It is unclear why there is a lack of
repair of elastic fibers. We have examined fibroblasts cultured from
lung tissue from normal and COPD subjects to determine if the
secretory profile explains lack of tissue repair. In this study,
fibroblasts were cultured from lung parenchyma of bronchial
carcinoma patients with varying degrees of COPD; controls
(non-COPD, n=5), mild COPD (GOLD 1, n=5) and moderate-severe
COPD (GOLD 2-3, n=12). Measurements were made of proliferation,
senescence-associated beta-galactosidase-1, mRNA expression of
IL-6, IL-8, MMP-1, tropoelastin and versican, and protein levels for
IL-6, IL-8, PGE2, tropoelastin, insoluble elastin, and versican. It was
found that GOLD 2-3 fibroblasts proliferated more slowly (p
Abstract: This paper presents a part of research on the
rheological properties of bitumen modified by thermoplastic namely
linear low density polyethylene (LLDPE), high density polyethylene
(HDPE) and polypropylene (PP) and its interaction with 80 pen base
bitumen. As it is known that the modification of bitumen by the use
of polymers enhances its performance characteristics but at the same
time significantly alters its rheological properties. The rheological
study of polymer modified bitumen (PMB) was made through
penetration, ring & ball softening point and viscosity test. The results
were then related to the changes in the rheological properties of
polymer modified bitumen. It was observed that thermoplastic
copolymer shows profound effect on penetration rather than
softening point. The viscoelastic behavior of polymer modified
bitumen depend on the concentration of polymer, mixing
temperature, mixing technique, solvating power of base bitumen and
molecular structure of polymer used. PP offer better blend in
comparison to HDPE and LLDPE. The viscosity of base bitumen was
also enhanced with the addition of polymer. The pseudoplastic
behavior was more prominent for HDPE and LLDPE than PP. Best
results were obtained when polymer concentration was kept below
3%
Abstract: During recent years, the traditional learning
approaches have undergone fundamental changes due to the
emergence of new technologies such as multimedia, hypermedia and
telecommunication. E-learning is a modern world phenomenon that
has come into existence in the information age and in a knowledgebased
society. E-learning has developed significantly within a short
period of time. Thus it is of a great significant to secure information,
allow a confident access and prevent unauthorized accesses. Making
use of individuals- physiologic or behavioral (biometric) properties is
a confident method to make the information secure. Among the
biometrics, fingerprint is more acceptable and most countries use it as
an efficient methods of identification. This article provides a new
method to compare the fingerprint comparison by pattern recognition
and image processing techniques. To verify fingerprint, the shortest
distance method is used together with perceptronic multilayer neural
network functioning based on minutiae. This method is highly
accurate in the extraction of minutiae and it accelerates comparisons
due to elimination of false minutiae and is more reliable compared
with methods that merely use directional images.