Abstract: Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: Environmental management implementation is
presently one of the ways of organization success and value
improvement. Increasing an organization motivation to
environmental measures introduction is caused primarily by the rising
pressure of the society that generates various incentives to endeavor
for the environmental performance improvement.
The aim of the paper is to identify and characterize the key
incentives and expectations leading organizations to the
environmental management implementation. The author focuses on
five businesses of different size and field, operating in the Czech
Republic. The qualitative approach and grounded theory procedure
are used in research.
The results point out that the significant incentives for
environmental management implementation represent primarily
demands of customers, the opportunity to declare the environmental
commitment and image improvement. The researched enterprises less
commonly expect the economical contribution, competitive
advantage increase or export rate improvement. The results show that
marketing contributions are primarily expected from the
environmental management implementation.
Abstract: This paper reports a structured literature review of the
application of Health Information Technology in developing
countries, defined as the World Bank categories Low-income
countries, Lower-middle-income, and Upper-middle-income
countries. The aim was to identify and classify the various
applications of health information technology to assess its current
state in developing countries and explore potential areas of research.
We offer specific analysis and application of HIT in Libya as one of
the developing countries. A structured literature review was
conducted using the following online databases: IEEE, Science
Direct, PubMed, and Google Scholar. Publication dates were set for
2000-2013. For the PubMed search, publications in English, French,
and Arabic were specified. Using a content analysis approach, 159
papers were analyzed and a total number of 26 factors were identified
that affect the adoption of health information technology. Of the 2681
retrieved articles, 159 met the inclusion criteria which were carefully
analyzed and classified. The implementation of health information
technology across developing countries is varied. Whilst it was
initially expected financial constraints would have severely limited
health information technology implementation, some developing
countries like India have nevertheless dominated the literature and
taken the lead in conducting scientific research. Comparing the
number of studies to the number of countries in each category, we
found that Low-income countries and Lower-middle-income had
more studies carried out than Upper-middle-income countries.
However, whilst IT has been used in various sectors of the economy,
the healthcare sector in developing countries is still failing to benefit
fully from the potential advantages that IT can offer.
Abstract: Ontologies offer a means for representing and sharing
information in many domains, particularly in complex domains. For
example, it can be used for representing and sharing information
of System Requirement Specification (SRS) of complex systems
like the SRS of ERTMS/ETCS written in natural language. Since
this system is a real-time and critical system, generic ontologies,
such as OWL and generic ERTMS ontologies provide minimal
support for modeling temporal information omnipresent in these SRS
documents. To support the modeling of temporal information, one
of the challenges is to enable representation of dynamic features
evolving in time within a generic ontology with a minimal redesign
of it. The separation of temporal information from other information
can help to predict system runtime operation and to properly design
and implement them. In addition, it is helpful to provide a reasoning
and querying techniques to reason and query temporal information
represented in the ontology in order to detect potential temporal
inconsistencies. To address this challenge, we propose a lightweight
3-layer temporal Quality of Service (QoS) ontology for representing,
reasoning and querying over temporal and non-temporal information
in a complex domain ontology. Representing QoS entities in separated
layers can clarify the distinction between the non QoS entities
and the QoS entities in an ontology. The upper generic layer of
the proposed ontology provides an intuitive knowledge of domain
components, specially ERTMS/ETCS components. The separation of
the intermediate QoS layer from the lower QoS layer allows us to
focus on specific QoS Characteristics, such as temporal or integrity
characteristics. In this paper, we focus on temporal information that
can be used to predict system runtime operation. To evaluate our
approach, an example of the proposed domain ontology for handover
operation, as well as a reasoning rule over temporal relations in this
domain-specific ontology, are presented.
Abstract: The objective of meta-analysis is to combine results
from several independent studies in order to create generalization
and provide evidence base for decision making. But recent studies
show that the magnitude of effect size estimates reported in many
areas of research significantly changed over time and this can
impair the results and conclusions of meta-analysis. A number of
sequential methods have been proposed for monitoring the effect
size estimates in meta-analysis. However they are based on statistical
theory applicable only to fixed effect model (FEM) of meta-analysis.
For random-effects model (REM), the analysis incorporates the
heterogeneity variance, τ 2 and its estimation create complications.
In this paper we study the use of a truncated CUSUM-type test with
asymptotically valid critical values for sequential monitoring in REM.
Simulation results show that the test does not control the Type I error
well, and is not recommended. Further work required to derive an
appropriate test in this important area of applications.
Abstract: In EFL programs, rating scales used in writing
assessment are often constructed by intuition. Intuition-based scales
tend to provide inaccurate and divisive ratings of learners’ writing
performance. Hence, following an empirical approach, this study
attempted to develop a rating scale for elementary-level writing at an
EFL program in Saudi Arabia. Towards this goal, 98 students’ essays
were scored and then coded using comprehensive taxonomy of
writing constructs and their measures. An automatic linear modeling
was run to find out which measures would best predict essay scores.
A nonparametric ANOVA, the Kruskal-Wallis test, was then used to
determine which measures could best differentiate among scoring
levels. Findings indicated that there were certain measures that could
serve as either good predictors of essay scores or differentiators
among scoring levels, or both. The main conclusion was that a rating
scale can be empirically developed using predictive and
discriminative statistical tests.
Abstract: Recommendation systems are widely used in
e-commerce applications. The engine of a current recommendation
system recommends items to a particular user based on user
preferences and previous high ratings. Various recommendation
schemes such as collaborative filtering and content-based approaches
are used to build a recommendation system. Most of current
recommendation systems were developed to fit a certain domain such
as books, articles, and movies. We propose1 a hybrid framework
recommendation system to be applied on two dimensional spaces
(User × Item) with a large number of Users and a small number
of Items. Moreover, our proposed framework makes use of both
favorite and non-favorite items of a particular user. The proposed
framework is built upon the integration of association rules mining
and the content-based approach. The results of experiments show
that our proposed framework can provide accurate recommendations
to users.
Abstract: Due to the importance of ports to trade and economic
development of the regions in which they are inserted, in recent
decades the number of studies devoted to this subject has increased.
Part of these studies considers the ports as business agglomerations
and focuses on port governance. This is an important approach since
the port performance is the result of activities performed by actors
belonging to the port-logistics chain, which need to be properly
coordinated. This coordination takes place through a port governance
model. Given this context, this study aims to analyze the governance
model of the port of Santos from the perspective of port customers.
To do this, a closed-ended questionnaire based on a conceptual model
that considers the key dimensions associated with port governance
was applied to the international freight forwarders that operate in the
port. The results show the applicability of the considered model and
highlight improvement opportunities to be implemented at the port of
Santos.
Abstract: This study presents a cost-effective approach for rapid
fabricating modeling platforms utilized in fused deposition modeling
system. A small-batch production of modeling platforms about 20
pieces can be obtained economically through silicone rubber mold
using vacuum casting without applying the plastic injection molding.
The air venting systems is crucial for fabricating modeling platform
using vacuum casting. Modeling platforms fabricated can be used for
building rapid prototyping model after sandblasting. This study offers
industrial value because it has both time-effectiveness and
cost-effectiveness.
Abstract: Learner motivation is considered to be an important
component for the Blended e-Learning (BL) Method. BL is an
effective learning method in multiple domains, which opens several
opportunities for its participants to engage in the learning
environment. This research explores the learners’ perspective of BL
according to the Self-Determination Theory (SDT). It identifies the
opportunities and challenges for using the BL in Logistics Education
(LE) in Egyptian Higher Education (HE). SDT is approached from
different perspectives within the relationship between Intrinsic
Motivation (IM), Extrinsic Motivation (EM) and Amotivation (AM).
A self-administered face-to-face questionnaire was used to collect
data from learners who were geographically widely spread around
three colleges of International Transport and Logistics (CILTs) at the
Arab Academy for Science, Technology and Maritime Transport
(AAST&MT) in Egypt. Six hundred and sixteen undergraduates
responded to a questionnaire survey. Respondents were drawn from
three branches in Greater Cairo, Alexandria, and Port Said. The data
analysis used was SPSS 22 and AMOS 18.
Abstract: Ontologies provide a common understanding of a
specific domain of interest that can be communicated between people
and used as background knowledge for automated reasoning in a
wide range of applications. In this paper, we address the design of
multilingual ontologies following well-defined knowledge
engineering methodologies with the support of novel collaborative
development approaches. In particular, we present a collaborative
platform which allows ontologies to be developed incrementally in
multiple languages. This is made possible via an appropriate mapping
between language independent concepts and one lexicalization per
language (or a lexical gap in case such lexicalization does not exist).
The collaborative platform has been designed to support the
development of the Universal Knowledge Core, a multilingual
ontology currently in English, Italian, Chinese, Mongolian, Hindi and
Bangladeshi. Its design follows a workflow-based development
methodology that models resources as a set of collaborative objects
and assigns customizable workflows to build and maintain each
collaborative object in a community driven manner, with extensive
support of modern web 2.0 social and collaborative features.
Abstract: The paper follows a discourse on computer-assisted
language learning. We examine problems of foreign language
teaching and learning and introduce a metamodel that can be used to
define learning models of language grammar structures in order to
support teacher/student interaction. Special attention is paid to the
concept of a virtual language lab. Our approach to language
education assumes to encourage learners to experiment with a
language and to learn by discovering patterns of grammatically
correct structures created and managed by a language expert.
Abstract: The fuzzy composition of objects depicted in images
acquired through MR imaging or the use of bio-scanners has often
been a point of controversy for field experts attempting to effectively
delineate between the visualized objects. Modern approaches in
medical image segmentation tend to consider fuzziness as a
characteristic and inherent feature of the depicted object, instead of
an undesirable trait. In this paper, a novel technique for efficient
image retrieval in the context of images in which segmented objects
are either crisp or fuzzily bounded is presented. Moreover, the
proposed method is applied in the case of multiple, even conflicting,
segmentations from field experts. Experimental results demonstrate
the efficiency of the suggested method in retrieving similar objects
from the aforementioned categories while taking into account the
fuzzy nature of the depicted data.
Abstract: The research conducted in early seventies apparently
assumed the existence of a universal decision model for union
negotiators and furthermore tended to regard financial information as
a ‘neutral’ input into a rational decision making process. However,
research in the eighties began to question the neutrality of financial
information as an input in collective bargaining rather viewing it as a
potentially effective means for controlling the labour force.
Furthermore, this later research also started challenging the simplistic
assumptions relating particularly to union objectives which have
underpinned the earlier search for universal union decision models.
Despite the above developments there seems to be a dearth of studies
in developing countries concerning the use of financial information in
collective bargaining. This paper seeks to begin to remedy this
deficiency. Utilising a case study approach based on two enterprises,
one in the public sector and the other a multinational, the universal
decision model is rejected and it is argued that the decision whether
or not to use financial information is a contingent one and such a
contingency is largely defined by the context and environment in
which both union and management negotiators work. An attempt is
also made to identify the factors constraining as well as promoting
the use of financial information in collective bargaining, these being
regarded as unique to the organisations within which the case studies
are conducted.
Abstract: Enterprise Architecture (EA) is a strategy that is
employed by enterprises in order to align their business and
Information Technology (IT). EA is managed, developed, and
maintained through Enterprise Architecture Implementation
Methodology (EAIM). Effectiveness of EA implementation is the
degree in which EA helps to achieve the collective goals of the
organization. This paper analyzes the results of a survey that aims to
explore the factors that affect the effectiveness of EAIM and
specifically the relationship between factors and effectiveness of the
output and functionality of EA project. The exploratory factor
analysis highlights a specific set of five factors: alignment,
adaptiveness, support, binding, and innovation. The regression
analysis shows that there is a statistically significant and positive
relationship between each of the five factors and the effectiveness of
EAIM. Consistent with theory and practice, the most prominent
factor for developing an effective EAIM is innovation. The findings
contribute to the measuring the effectiveness of EA implementation
project by providing an indication of the measurement
implementation approaches which is used by the Enterprise
Architects, and developing an effective EAIM.
Abstract: As enterprise computing becomes more and more
complex, the costs and technical challenges of IT system maintenance
and support are increasing rapidly. One popular approach to managing
IT system maintenance is to prepare and use a FAQ (Frequently Asked
Questions) system to manage and reuse systems knowledge. Such a
FAQ system can help reduce the resolution time for each service
incident ticket. However, there is a major problem where over time the
knowledge in such FAQs tends to become outdated. Much of the
knowledge captured in the FAQ requires periodic updates in response
to new insights or new trends in the problems addressed in order to
maintain its usefulness for problem resolution. These updates require a
systematic approach to define the exact portion of the FAQ and its
content. Therefore, we are working on a novel method to
hierarchically structure the FAQ and automate the updates of its
structure and content. We use structured information and the
unstructured text information with the timelines of the information in
the service incident tickets. We cluster the tickets by structured
category information, by keywords, and by keyword modifiers for the
unstructured text information. We also calculate an urgency score
based on trends, resolution times, and priorities. We carefully studied
the tickets of one of our projects over a 2.5-year time period. After the
first 6 months we started to create FAQs and confirmed they improved
the resolution times. We continued observing over the next 2 years to
assess the ongoing effectiveness of our method for the automatic FAQ
updates. We improved the ratio of tickets covered by the FAQ from
32.3% to 68.9% during this time. Also, the average time reduction of
ticket resolution was between 31.6% and 43.9%. Subjective analysis
showed more than 75% reported that the FAQ system was useful in
reducing ticket resolution times.
Abstract: Enterprise Architecture (EA) Implementation
Methodologies have become an important part of EA projects.
Several implementation methodologies have been proposed, as a
theoretical and practical approach, to facilitate and support the
development of EA within an enterprise. A significant question when
facing the starting of EA implementation is deciding which
methodology to utilize. In order to answer this question, a framework
with several criteria is applied in this paper for the comparative
analysis of existing EA implementation methodologies. Five EA
implementation methodologies including: EAP, TOGAF, DODAF,
Gartner, and FEA are selected in order to compare with proposed
framework. The results of the comparison indicate that those
methodologies have not reached a sufficient maturity as whole due to
lack of consideration on requirement management, maintenance,
continuum, and complexities in their process. The framework has
also ability for the evaluation of any kind of EA implementation
methodologies.
Abstract: Mammography has been one of the most reliable
methods for early detection of breast cancer. There are different
lesions which are breast cancer characteristic such as
microcalcifications, masses, architectural distortions and bilateral
asymmetry. One of the major challenges of analysing digital
mammogram is how to extract efficient features from it for accurate
cancer classification. In this paper we proposed a hybrid feature
extraction method to detect and classify all four signs of breast
cancer. The proposed method is based on multiscale surrounding
region dependence method, Gabor filters, multi fractal analysis,
directional and morphological analysis. The extracted features are
input to self adaptive resource allocation network (SRAN) classifier
for classification. The validity of our approach is extensively
demonstrated using the two benchmark data sets Mammographic
Image Analysis Society (MIAS) and Digital Database for Screening
Mammograph (DDSM) and the results have been proved to be
progressive.