Abstract: In many applications there is a broad variety of
information relevant to a focal “object" of interest, and the fusion of such heterogeneous data types is desirable for classification and
categorization. While these various data types can sometimes be treated as orthogonal (such as the hull number, superstructure color,
and speed of an oil tanker), there are instances where the inference and the correlation between quantities can provide improved fusion
capabilities (such as the height, weight, and gender of a person). A
service-oriented architecture has been designed and prototyped to
support the fusion of information for such “object-centric" situations.
It is modular, scalable, and flexible, and designed to support new data sources, fusion algorithms, and computational resources without affecting existing services. The architecture is designed to simplify
the incorporation of legacy systems, support exact and probabilistic entity disambiguation, recognize and utilize multiple types of
uncertainties, and minimize network bandwidth requirements.
Abstract: This research gathered local wisdom towards career building of people in Kamchanoad Community, Baan Muang sub-district, Baan Dung district, Udon Thani province. Data was collected through in-depth interviews with village headmen, community board, teachers, monks, Kamchanoad forest managers and revered elderly aged over 60 years old. All of these 30 interviewees have resided in Kamchanoad Community for more than 40. Descriptive data analysis result revealed that the most prominent local wisdom of Kamchanoad community is their beliefs and religion. Most people in the community have strongly maintained local tradition, the festival of appeasing Chao Pu Sri Suttho on the middle of the 6th month of Thai lunar calendar which falls on the same day with Vesak Day. 100 percent of the people in this community are Buddhist. They believe that Naga, an entity or being, taking the form of a serpent, named “Sri Suttho” lives in Kamchanoad forest. The local people worship the serpent and ask for blessings. Another local wisdom of this community is Sinh fabric weaving.
Abstract: Probability-based identity disclosure risk
measurement may give the same overall risk for different
anonymization strategy of the same dataset. Some entities in the
anonymous dataset may have higher identification risks than the
others. Individuals are more concerned about higher risks than the
average and are more interested to know if they have a possibility of
being under higher risk. A notation of overall risk in the above
measurement method doesn-t indicate whether some of the involved
entities have higher identity disclosure risk than the others. In this
paper, we have introduced an identity disclosure risk measurement
method that not only implies overall risk, but also indicates whether
some of the members have higher risk than the others. The proposed
method quantifies the overall risk based on the individual risk values,
the percentage of the records that have a risk value higher than the
average and how larger the higher risk values are compared to the
average. We have analyzed the disclosure risks for different
disclosure control techniques applied to original microdata and
present the results.
Abstract: This paper presents a novel method that allows an
agent host to delegate its signing power to an anonymous mobile
agent in such away that the mobile agent does not reveal any information about its host-s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service
provision. The solution introduces a verification server to verify the
signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The solution incorporates
three methods: Agent Signature Key Generation method, Agent
Signature Generation method, Agent Signature Verification method.
The most notable feature of the solution is that, in addition to allowing secure and anonymous signature delegation, it enables
tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed solution are analyzed, and the solution is compared with the most related work.
Abstract: Citizens are increasingly are provided with choice and
customization in public services and this has now also become a key
feature of higher education in terms of policy roll-outs on personal
development planning (PDP) and more generally as part of the
employability agenda. The goal here is to transform people, in this
case graduates, into active, responsible citizen-workers. A key part of
this rhetoric and logic is the inculcation of graduate attributes within
students. However, there has also been a concern with the issue of
student lack of engagement and perseverance with their studies. This
paper sets out to explore some of these conceptions that link graduate
attributes with citizenship as well as the notion of how identity is
forged through the higher education process. Examples are drawn
from a quality enhancement project that is being operated within the
context of the Scottish higher education system. This is further
framed within the wider context of competing and conflicting
demands on higher education, exacerbated by the current worldwide
economic climate. There are now pressures on students to develop
their employability skills as well as their capacity to engage with
global issues such as behavioural change in the light of
environmental concerns. It is argued that these pressures, in effect,
lead to a form of personalization that is concerned with how
graduates develop their sense of identity as something that is
engineered and re-engineered to meet these demands.
Abstract: This paper presents a cold chain monitoring system which focuses on assessment of quality and dynamic pricing information about food in cold chain. Cold chain is composed of many actors and stages; however it can be seen as a single entity since a breakdown in temperature control at any stage can impact the final quality of the product. In a cold chain, the shelf life, quality, and safety of perishable food throughout the supply chain is greatly impacted by environmental factors especially temperature. In this paper, a prototype application is implemented to retrieve timetemperature history, the current quality and the dynamic price setting according to changing quality impacted by temperature fluctuations in real-time.
Abstract: Mankind has entered into an extremely complex and
controversial stage of its development: the world is simultaneously
organized and chaoticized, globalized and localized, combined and
split. Analysts point out that globalization as a process of
strengthening economic, cultural, financial and other ties of states
cause many problems. In the economic sphere, it creates the danger
of growing gap between the states, in the sphere of politics it leads to
the weakening of political power and influence of nation-states.
Abstract: This paper explores the scalability issues associated
with solving the Named Entity Recognition (NER) problem using
Support Vector Machines (SVM) and high-dimensional features. The
performance results of a set of experiments conducted using binary
and multi-class SVM with increasing training data sizes are
examined. The NER domain chosen for these experiments is the
biomedical publications domain, especially selected due to its
importance and inherent challenges. A simple machine learning
approach is used that eliminates prior language knowledge such as
part-of-speech or noun phrase tagging thereby allowing for its
applicability across languages. No domain-specific knowledge is
included. The accuracy measures achieved are comparable to those
obtained using more complex approaches, which constitutes a
motivation to investigate ways to improve the scalability of multiclass
SVM in order to make the solution more practical and useable.
Improving training time of multi-class SVM would make support
vector machines a more viable and practical machine learning
solution for real-world problems with large datasets. An initial
prototype results in great improvement of the training time at the
expense of memory requirements.
Abstract: The world is entering a new path of development which is becoming the driving force of globalization. It is seen as an irreversible process of the present reality and has a significant impact on the transformation of economic, social and cultural rights. This also applies to changes in the rural environment which while emphasizing the global development should also maintain its identity and locality, and a rural community should do more to recognize the globalization of an opportunity than a threat to the Polish countryside. The paper discusses theoretical problems of rural development and the importance of diversification in rural areas and preserving the countryside life and there werepresente the opinions of residents of the Polish countryside on the impact of globalization on the development.
Abstract: For the past thirty years the Malaysian economy has been said to contribute well to the progress of the nations. However, the intensification of global economy activity and the extensive use of Information Communication Technologies (ICTs) in recent years are challenging government-s effort to further develop Malaysian society. The competition posed by the low wage economies such as China and Vietnam have made the government realise the importance of engaging in high-skill and high technology industries. It is hoped this will be the basis of attracting more foreign direct investment (FDI) in order to help the country to compete in globalised world. Using Vision 2020 as it targeted vision, the government has decided to engage in the use of ICTs and introduce many policies pertaining to it. Mainly based on the secondary analysis approach, the findings show that policy pertaining to ICTs in Malaysia contributes to economic growth, but the consequences of this have resulted in greater division within society. Although some of the divisions such as gender and ethnicity are narrowing down, the gap in important areas such as regions and class differences is becoming wider. The widespread use of ICTs might contribute to the further establishment of democracy in Malaysia, but the increasing number of foreign entities such as FDI and foreign workers, cultural hybridisation and to some extent cultural domination are contributing to neocolonialism in Malaysia. This has obvious consequences for the government-s effort to create a Malaysian national identity. An important finding of this work is that there are contradictions within ICT policy between the effort to develop the economy and society.
Abstract: In this paper we propose a novel approach for ascertaining human identity based on fusion of profile face and gait biometric cues The identification approach based on feature learning in PCA-LDA subspace, and classification using multivariate Bayesian classifiers allows significant improvement in recognition accuracy for low resolution surveillance video scenarios. The experimental evaluation of the proposed identification scheme on a publicly available database [2] showed that the fusion of face and gait cues in joint PCA-LDA space turns out to be a powerful method for capturing the inherent multimodality in walking gait patterns, and at the same time discriminating the person identity..
Abstract: Increasing use of cell phone as a medium of human interaction is playing a vital role in solving riddles of crime as well. A young girl went missing from her home late in the evening in the month of August, 2008 when her enraged relatives and villagers physically assaulted and chased her fiancée who often frequented her home. Two years later, her mother lodged a complaint against the relatives and the villagers alleging that after abduction her daughter was either sold or killed as she had failed to trace her. On investigation, a rusted cell phone with partial visible IMEI number, clothes, bangles, human skeleton etc. recovered from abandoned well in the month of May, 2011 were examined in the lab. All hopes pinned on identity of cell phone, for only linking evidence to fix the scene of occurrence supported by call detail record (CDR) and to dispel doubts about mode of sudden disappearance or death as DNA technology did not help in establishing identity of the deceased. The conventional scientific methods were used without success and international mobile equipment identification number of the cell phone could be generated by using statistical analysis followed by online verification.
Abstract: This article deals with the conceptual modeling under uncertainty. First, the division of information systems with their definition will be described, focusing on those where the construction of a conceptual model is suitable for the design of future information system database. Furthermore, the disadvantages of the traditional approach in creating a conceptual model and database design will be analyzed. A comprehensive methodology for the creation of a conceptual model based on analysis of client requirements and the selection of a suitable domain model is proposed here. This article presents the expert system used for the construction of a conceptual model and is a suitable tool for database designers to create a conceptual model.
Abstract: Grid computing provides a virtual framework for
controlled sharing of resources across institutional boundaries.
Recently, trust has been recognised as an important factor for
selection of optimal resources in a grid. We introduce a new method
that provides a quantitative trust value, based on the past interactions
and present environment characteristics. This quantitative trust value
is used to select a suitable resource for a job and eliminates run time
failures arising from incompatible user-resource pairs. The proposed
work will act as a tool to calculate the trust values of the various
components of the grid and there by improves the success rate of the
jobs submitted to the resource on the grid. The access to a resource
not only depend on the identity and behaviour of the resource but
also upon its context of transaction, time of transaction, connectivity
bandwidth, availability of the resource and load on the resource. The
quality of the recommender is also evaluated based on the accuracy
of the feedback provided about a resource. The jobs are submitted for
execution to the selected resource after finding the overall trust value
of the resource. The overall trust value is computed with respect to
the subjective and objective parameters.
Abstract: This essay endeavors to read Ama Ata Aidoo-s Our Sister Killjoy with a postocolonially-inflected consciousness. It aims at demonstrating how her work could be read as a sophisticated postcolonial revision of the colonial travel narrative whereby the protagonist-s black-eyed squint operates as 'the all-seeing-eye' to subvert the historically unbroken legacy of the Orientalist ideology. It tries to demonstrate how Sissie assumes authority and voice in an act that destabilizes the traditionally established modes of western representation. It is also an investigation into how Aidoo-s text adopts processes which disengage the Eurocentric view produced by the discursive itineraries of western institutions through diverse acts of resistance and 'various strategies of subversion and appropriation'. Her counter discursive strategies of resistance are shaped up in various ways by a feminist consciousness that attempts to articulate a distinct African version of identity and preserve cultural distinctiveness.
Abstract: To motivate users to adopt and use information
systems effectively, the nature of motivation should be carefully
investigated. People are usually motivated within ongoing processes
which include a chain of states such as perception, stimulation,
motivation, actions and reactions and finally, satisfaction. This study
assumes that the relevant motivation processes should be executed in
a proper and continuous manner to be able to persistently motivate
and re-motivate people in organizational settings and towards
information systems. On this basis, the study attempts to propose
possible relationships between this process-nature view of
motivation in terms of the common chain of states and the nearly
unique properties of information systems as is perceived by users in
the sense of a knowledgeable and authoritative entity. In the
conclusion section, some guidelines for practitioners are suggested to
ease their tasks for motivating people to adopt and use information
systems.
Abstract: As a result of the ever-changing environment and the demands of rganisations- customers, it is important to recognise the importance of some important managerial challenges. It is the sincere belief that failure to meet these challenges, will ultimately contribute to inevitable problems for organisations. This recognition
requires from managers and by implication organisations to be engaged in ethical behaviour, identity awareness and learning organisational behaviour. All these aspects actually reflect on the
importance of intellectual capital as the competitive weapons for
organisations in the future.
Abstract: Public housing is a vital factor in community
development. Successful city, housing and eco system regeneration
design is essential in providing positive community development.
This concerns work places, nice dwellings, providing premises for
child care, care of the elderly, providing qualitative premises for
different kinds of commercial service, providing a nice built
environment and housing areas and not the least activating tenants.
The public housing companies give value to society by stimulating
people, renovating socially and economically sustainable as well as
being partners to local business and authorities. By their activities the
housing companies contribute to sustainable local and regional
growth and the identity and reputation of cities. A Social, Economic
and Ecological Reputation Effect (SEERE) model for actions to
promote housing and community reputation is presented. The model
emphasizes regenerative actions to restore natural eco systems as part
of housing renewal strategies and to strengthen municipality
reputation.
Abstract: Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of everyday life. Yet, the paper argues, neither of security discourses accounted for, disclosed and challenged the fundamental aporias embedded in Western security narratives. In turn, the paper aims to unpick the conventional security wisdom, which is haunted with strong ontologies, embedded in the politics of Orientalism, and (in)security nexus. The paper concludes that current security affair conceals the integral impossibility of fulfilling its very own promise of assured security. The paper also provides suggestions about alternative security discourse based on mutual dialogue.
Abstract: According to celebrated Hurwitz theorem, there exists
four division algebras consisting of R (real numbers), C (complex
numbers), H (quaternions) and O (octonions). Keeping in view
the utility of octonion variable we have tried to extend the three
dimensional vector analysis to seven dimensional one. Starting with
the scalar and vector product in seven dimensions, we have redefined
the gradient, divergence and curl in seven dimension. It is shown
that the identity n(n - 1)(n - 3)(n - 7) = 0 is satisfied only
for 0, 1, 3 and 7 dimensional vectors. We have tried to write all
the vector inequalities and formulas in terms of seven dimensions
and it is shown that same formulas loose their meaning in seven
dimensions due to non-associativity of octonions. The vector formulas
are retained only if we put certain restrictions on octonions and split
octonions.