Abstract: In this work we introduce an efficient method to limit
the impact of the hiding process on the quality of the cover speech.
Vector quantization of the speech spectral information reduces drastically
the number of the secret speech parameters to be embedded
in the cover signal. Compared to scalar hiding, vector quantization
hiding technique provides a stego signal that is indistinguishable from
the cover speech. The objective and subjective performance measures
reveal that the current hiding technique attracts no suspicion about the
presence of the secret message in the stego speech, while being able
to recover an intelligible copy of the secret message at the receiver
side.
Abstract: The paper shows how the CASMAS modeling language,
and its associated pervasive computing architecture, can be
used to facilitate continuity of care by providing members of patientcentered
communities of care with a support to cooperation and
knowledge sharing through the usage of electronic documents and
digital devices. We consider a scenario of clearly fragmented care to
show how proper mechanisms can be defined to facilitate a better
integration of practices and information across heterogeneous care
networks. The scenario is declined in terms of architectural components
and cooperation-oriented mechanisms that make the support
reactive to the evolution of the context where these communities
operate.
Abstract: This paper describes a novel approach for deriving
modules from protein-protein interaction networks, which combines
functional information with topological properties of the network.
This approach is based on weighted clustering coefficient, which
uses weights representing the functional similarities between the
proteins. These weights are calculated according to the semantic
similarity between the proteins, which is based on their Gene
Ontology terms. We recently proposed an algorithm for identification
of functional modules, called SWEMODE (Semantic WEights for
MODule Elucidation), that identifies dense sub-graphs containing
functionally similar proteins. The rational underlying this approach is
that each module can be reduced to a set of triangles (protein triplets
connected to each other). Here, we propose considering semantic
similarity weights of all triangle-forming edges between proteins. We
also apply varying semantic similarity thresholds between
neighbours of each node that are not neighbours to each other (and
hereby do not form a triangle), to derive new potential triangles to
include in module-defining procedure. The results show an
improvement of pure topological approach, in terms of number of
predicted modules that match known complexes.
Abstract: The significance of emissions from the road transport
sector (such as air pollution, noise, etc) has grown considerably in
recent years. In Australia, 14.3% of national greenhouse gas
emissions in 2000 were the transport sector-s share which 12.9% of
net national emissions were related to a road transport alone.
Considering the growing attention to the green house gas(GHG)
emissions, this paper attempts to provide air pollution modeling
aspects of environmental consequences of the road transport by using
one of the best computer based tools including the Geographic
Information System (GIS). In other word, in this study, GIS and its
applications is explained, models which are used to model air
pollution and GHG emissions from vehicles are described and GIS is
applied in real case study that attempts to forecast GHG emission
from people who travel to work by car in 2031 in Melbourne for
analysing results as thematic maps.
Abstract: Organizational communication is an administrative
function crucial especially for executives in the implementation of
organizational and administrative functions. Executives spend a
significant part of their time on communicative activities. Doing his or her daily routine, arranging meeting schedules, speaking on the telephone, reading or replying to business correspondence, or
fulfilling the control functions within the organization, an executive typically engages in communication processes.
Efficient communication is the principal device for the adequate implementation of administrative and organizational activities. For
this purpose, management needs to specify the kind of
communication system to be set up and the kind of communication
devices to be used. Communication is vital for any organization.
In conventional offices, communication takes place within the hierarchical pyramid called the organizational structure, and is known as formal or informal communication. Formal communication
is the type that works in specified structures within the organizational rules and towards the organizational goals. Informal communication, on the other hand, is the unofficial type taking place among staff as
face-to-face or telephone interaction.
Communication in virtual as well as conventional offices is
essential for obtaining the right information in administrative
activities and decision-making. Virtual communication technologies
increase the efficiency of communication especially in virtual teams.
Group communication is strengthened through an inter-group central
channel. Further, ease of information transmission makes it possible
to reach the information at the source, allowing efficient and correct decisions. Virtual offices can present as a whole the elements of information which conventional offices produce in different
environments.
At present, virtual work has become a reality with its pros and
cons, and will probably spread very rapidly in coming years, in line
with the growth in information technologies.
Abstract: As a popular rank-reduced vector space approach,
Latent Semantic Indexing (LSI) has been used in information
retrieval and other applications. In this paper, an LSI-based content
vector model for text classification is presented, which constructs
multiple augmented category LSI spaces and classifies text by their
content. The model integrates the class discriminative information
from the training data and is equipped with several pertinent feature
selection and text classification algorithms. The proposed classifier
has been applied to email classification and its experiments on a
benchmark spam testing corpus (PU1) have shown that the approach
represents a competitive alternative to other email classifiers based
on the well-known SVM and naïve Bayes algorithms.
Abstract: In the paper, the energetic features of the loaded gait
are newly analyzed depending on the trunk flexion change. To
investigate the loaded gait, walking experiments are performed for five
subjects and, the ground reaction forces and kinematic data are
measured. Based on these information, we compute the impulse,
momentum and mechanical works done on the center of body mass,
through the trunk flexion change. As a result, it is shown that the trunk
flexion change does not affect the impulses and momentums during
the step-to-step transition as well. However, the direction of the
pre-collision momentum does change depending on the trunk flexion
change, which is degenerated just after (or during) the collision period.
Abstract: Phytases are enzymes used as an important component
in monogastric animals feeds in order to improve phosphorous
availability, since it is not readily assimilated by these animals in the
form of the phytate presented in plants and grains. As these enzymes
are used in industrial activities, they must retain its catalytic activities
during a certain storage period. This study presents information about
the stability of 4 different phytases, produced by four macromycetes
fungi through solid-state fermentation (SSF). There is a lack of data
in literature concerning phytase from macromycetes shelf-life in
storage conditions at room, cooling and freezing temperatures. The 4
phytases from macromycetes still had enzymatic activities around
100 days of storage at room temperature. At cooling temperature in
146 days of studies, the phytase from G. stipitatum was the most
stable with 44% of the initial activity, in U.gds (units per gram of
dried fermented substrate). The freezing temperature was the best
condition storage for phytases from G. stipitatum and T. versicolor.
Each condition provided a study for each mushroom phytase,
totalizing 12 studies. The phytases showed to be stable for a long
period without the addition of additives.
Abstract: Genetically modified (GM) technology in food
production continued to generate controversies. Consumers were
concerned with the GM foods about the healthy and environmental
risks. While consumers- acceptance was a critical factor affecting how
widely this technology be used. According to the research review,
consumers- lack of information was one of the reasons to explain
consumers- low acceptance toward GM foods. The objective for this
study wanted to find out would informative product package affect
consumers- behavior toward GM foods. An experiment was designed
to investigate consumer behavior toward different product package
information. The results indicated that the product package
information influenced consumer product trust toward GM foods.
Compared with the traceability production system information, the
information about the GM rice was approved by authorized
organizations could increase consumers product trust in GM foods.
Consumers in Taiwan saw the information provided by authorized
organizations more credible than other information.
Abstract: A manufacturing feature can be defined simply as a
geometric shape and its manufacturing information to create the shape.
In a feature-based process planning system, feature library plays an
important role in the extraction of manufacturing features with their
proper manufacturing information. However, to manage the
manufacturing information flexibly, it is important to build a feature
library that is easy to modify. In this paper, a Wiki-based feature
library is proposed.
Abstract: This paper describes a blind algorithm for estimating a time varying and frequency selective fading channel. In order to identify blindly the impulse response of these channels, we have used Higher Order Statistics (HOS) to build our algorithm. In this paper, we have selected two theoretical frequency selective channels as the Proakis-s 'B' channel and the Macchi-s channel, and one practical frequency selective fading channel called Broadband Radio Access Network (BRAN A). The simulation results in noisy environment and for different data input channel, demonstrate that the proposed method could estimate the phase and magnitude of these channels blindly and without any information about the input, except that the input excitation is i.i.d (Identically and Independent Distributed) and non-Gaussian.
Abstract: This paper proposes two novel schemes for pilot-aided
integer frequency offset (IFO) estimation in orthogonal frequency
division multiplexing (OFDM)-based digital video broadcastingterrestrial
(DVB-T) systems. The conventional scheme proposed for
estimating the IFO uses only partial information of combinations
that pilots can provide, which stems from a rigorous assumption
that the channel responses of pilots used for estimating the IFO
change very rapidly. Thus, in this paper, we propose the novel IFO
estimation schemes exploiting all information of combinations that
pilots can provide to improve the performance of IFO estimation.
The simulation results show that the proposed schemes are highly
accurate in terms of the IFO detection probability.
Abstract: Computer network courses are essential parts of college computer science curriculum and hands-on networking experience is well recognized as an effective approach to help students understand better about the network concepts, the layered architecture of network protocols, and the dynamics of the networks. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up and maintain the lab environment. Many universities/colleges lack the resources and build-ups in this field and have difficulty to provide students with hands-on practice labs. A new affordable and easily-adoptable approach to networking labs is desirable to enhance network teaching and learning. In addition, current network labs are short on providing hands-on practice for modern wireless and mobile network learning. With the prevalence of smart mobile devices, wireless and mobile network are permeating into various aspects of our information society. The emerging and modern mobile technology provides computer science students with more authentic learning experience opportunities especially in network learning. A mobile device based hands-on labware can provide an excellent ‘real world’ authentic learning environment for computer network especially for wireless network study. In this paper, we present our mobile device-based hands-on labware (series of lab module) for computer network learning which is guided by authentic learning principles to immerse students in a real world relevant learning environment. We have been using this labware in teaching computer network, mobile security, and wireless network classes. The student feedback shows that students can learn more when they have hands-on authentic learning experience.
Abstract: Due to the limited lifetime of the nodes in ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can be improved. One common design for routing protocols in mobile ad hoc networks is to use positioning information; we use the node-s geometric locations to introduce an algorithm that can construct the virtual backbone structure locally in 3D environment. The algorithm construction has a constant time.
Abstract: Interaction of inorganic water-soluble salts and building stones is studied in the paper. Two types of sandstone and one type of spongillite as representatives of materials used in historical masonry are subjected to experimental testing. Within the performed experiments, measurement of moisture and chloride concentration profiles is done in order to get input data for computational inverse analysis. Using the inverse analysis, moisture diffusivity and chloride diffusion coefficient of investigated materials are accessed. Additionally, the effect of salt presence on water vapor storage is investigated using dynamic vapor sorption device. The obtained data represents valuable information for restoration of historical masonry and give evidence on the performance of studied stones in contact with water soluble salts.
Abstract: Formulation of biological profile is one of the modern roles of forensic anthropologist. The present study was conducted to estimate height using foot and shoeprint length of Malaysian population. The present work can be very useful information in the process of identification of individual in forensic cases based on shoeprint evidence. It can help to narrow down suspects and ease the police investigation. Besides, stature is important parameters in determining the partial identify of unidentified and mutilated bodies. Thus, this study can help the problem encountered in cases of mass disaster, massacre, explosions and assault cases. This is because it is very hard to identify parts of bodies in these cases where people are dismembered and become unrecognizable. Samples in this research were collected from 200 Malaysian adults (100 males and 100 females) with age ranging from 20 to 45 years old. In this research, shoeprint length were measured based on the print of the shoes made from the flat shoes. Other information like gender, foot length and height of subject were also recorded. The data was analyzed using IBM® SPSS Statistics 19 software. Results indicated that, foot length has a strong correlation with stature than shoeprint length for both sides of the feet. However, in the unknown, where the gender was undetermined have shown a better correlation in foot length and shoeprint length parameter compared to males and females analyzed separately. In addition, prediction equations are developed to estimate the stature using linear regression analysis of foot length and shoeprint length. However, foot lengths give better prediction than shoeprint length.
Abstract: Ontologies and tagging systems are two different ways to organize the knowledge present in the current Web. In this paper we propose a simple method to model folksonomies, as tagging systems, with ontologies. We show the scalability of the method using real data sets. The modeling method is composed of a generic ontology that represents any folksonomy and an algorithm to transform the information contained in folksonomies to the generic ontology. The method allows representing folksonomies at any instant of time.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: The aim of the article is to describe modern
contemporary systems of employees' remuneration used in
organizations, to give a general overview of these questions based on
the questionnaire survey made by the authors, as well as to assess
possible effects of economic crisis in this area. It is necessary to be
aware of the fact that firm's success in the contemporary business
environment depends not only on the technical equipment, financial
resources, availability of raw materials and information and effective
management, but one of the crucial factors of firm's success is its
human potential. The article emphasizes that the well working
remuneration system has a very important position in the
organization in the broadest sense. The paper also aims to the current
situation in the area of employees' remuneration in one of Czech
Republic regions, in the Moravian-Silesian Region.
Abstract: In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the information security education would have rather higher recognition concerning countermeasures than other users including self-educated users. It is suggested that the information security education should be enhanced so that the users may appropriately take the information security countermeasures. In addition, the information security policy such as carrying out "e- net caravan" and "information security seminars" are effective in improving the users' awareness on the information security in Japan.