Abstract: Automatic reusability appraisal is helpful in
evaluating the quality of developed or developing reusable software
components and in identification of reusable components from
existing legacy systems; that can save cost of developing the
software from scratch. But the issue of how to identify reusable
components from existing systems has remained relatively
unexplored. In this research work, structural attributes of software
components are explored using software metrics and quality of the
software is inferred by different Neural Network based approaches,
taking the metric values as input. The calculated reusability value
enables to identify a good quality code automatically. It is found that
the reusability value determined is close to the manual analysis used
to be performed by the programmers or repository managers. So, the
developed system can be used to enhance the productivity and
quality of software development.
Abstract: This paper reported an experimental research of
steady-state heat transfer behaviour of a gas flowing through a fixed
bed under the different operating conditions. Studies had been carried
out in a fixed-bed packed methanol synthesis catalyst percolated by air
at appropriate flow rate. Both radial and axial direction temperature
distribution had been investigated under the different operating
conditions. The effects of operating conditions including the reactor
inlet air temperature, the heating pipe temperature and the air flow rate
on temperature distribution was investigated and the experimental
results showed that a higher inlet air temperature was conducive to
uniform temperature distribution in the fixed bed. A large temperature
drop existed at the radial direction, and the temperature drop increased
with the heating pipe temperature increasing under the experimental
conditions; the temperature profile of the vicinity of the heating pipe
was strongly affected by the heating pipe temperature. A higher air
flow rate can improve the heat transfer in the fixed bed. Based on the
thermal distribution, heat transfer models of the fixed bed could be
established, and the characteristics of the temperature distribution in
the fixed bed could be finely described, that had an important practical
significance.
Abstract: Recently, web services to access from many type devices
are often used. We have developed the shortest path planning
system called "Bus-Net" in Tottori prefecture as a web application
to sustain the public transport. And it used the same user interface
for both devices. To support both devices, the interface cannot use
JavaScript and so on.
Thus, we developed the method that use individual user interface
for each device type to improve its convenience. To be concrete,
we defined formats of condition input to the path planning system
and result output from it and separate the system into the request
processing part and user interface parts that depend on device types.
By this method, we have also developed special device for Bus-Net
named "Intelligent-Bus-Stop".
Abstract: Image compression can improve the performance of
the digital systems by reducing time and cost in image storage
and transmission without significant reduction of the image quality.
Furthermore, the discrete cosine transform has emerged as the new
state-of-the art standard for image compression. In this paper, a
hybrid image compression technique based on reversible blockade
transform coding is proposed. The technique, implemented over
regions of interest (ROIs), is based on selection of the coefficients
that belong to different transforms, depending on the coefficients is
proposed. This method allows: (1) codification of multiple kernals
at various degrees of interest, (2) arbitrary shaped spectrum,and (3)
flexible adjustment of the compression quality of the image and the
background. No standard modification for JPEG2000 decoder was
required. The method was applied over different types of images.
Results show a better performance for the selected regions, when
image coding methods were employed for the whole set of images.
We believe that this method is an excellent tool for future image
compression research, mainly on images where image coding can
be of interest, such as the medical imaging modalities and several
multimedia applications. Finally VLSI implementation of proposed
method is shown. It is also shown that the kernal of Hartley and
Cosine transform gives the better performance than any other model.
Abstract: Worm propagation profiles have significantly changed
since 2003-2004: sudden world outbreaks like Blaster or Slammer
have progressively disappeared and slower but stealthier worms
appeared since, most of them for botnets dissemination. Decreased
worm virulence results in more difficult detection.
In this paper, we describe a stealth worm propagation model
which has been extensively simulated and analysed on a huge virtual
network. The main features of this model is its ability to infect any
Internet-like network in a few seconds, whatever may be its size while
greatly limiting the reinfection attempt overhead of already infected
hosts. The main simulation results shows that the combinatorial
topology of routing may have a huge impact on the worm propagation
and thus some servers play a more essential and significant role than
others. The real-time capability to identify them may be essential to
greatly hinder worm propagation.
Abstract: TiO2/Ag composite films were prepared by
incorporating Ag in the pores of mesoporous TiO2 films using a
photoreduction method. The Ag nanoparticle sizes were in a range of
3.66-38.56 nm. The TiO2/Ag composite films were characterized by
X-ray diffraction (XRD), scanning electron microscopy (SEM) and
transmission electron microscropy (TEM). The TiO2 films and
TiO2/Ag composite films were immersed in a 0.3 mM N719 dye
solution and characterized by UV-Vis spectrophotometer. The
TiO2/Ag/N719 composite film showed that an optimal size of Ag
nanoparticles was 19.12 nm and, hence, gave the maximum optical
absorption spectra. The improved absorption was due to surface
plasmon resonance induced by the Ag nanoparticles to enhance the
absorption coefficient of the dye.
Abstract: Because of the great advance in multimedia
technology, digital multimedia is vulnerable to malicious
manipulations. In this paper, a public key self-recovery block-based
video authentication technique is proposed which can not only
precisely localize the alteration detection but also recover the missing
data with high reliability. In the proposed block-based technique,
multiple description coding MDC is used to generate two codes (two
descriptions) for each block. Although one block code (one
description) is enough to rebuild the altered block, the altered block
is rebuilt with better quality by the two block descriptions. So using
MDC increases the ratability of recovering data. A block signature is
computed using a cryptographic hash function and a doubly linked
chain is utilized to embed the block signature copies and the block
descriptions into the LSBs of distant blocks and the block itself. The
doubly linked chain scheme gives the proposed technique the
capability to thwart vector quantization attacks. In our proposed
technique , anyone can check the authenticity of a given video using
the public key. The experimental results show that the proposed
technique is reliable for detecting, localizing and recovering the
alterations.
Abstract: Business process automation is an important task in an
enterprise business environment software development. The
requirements of processing acceleration and automation level of
enterprises are inherently different from one organization to another.
We present a methodology and system for automation of business
process management system architecture by multi-agent collaboration
based on SOA. Design layer processes are modeled in semantic
markup language for web services application. At the core of our
system is considering certain types of human tasks to their further
automation across over multiple platform environments. An
improved abnormality processing with model for automation of
BPMS architecture by multi-agent collaboration based on SOA is
introduced. Validating system for efficiency of process automation,
an application for educational knowledge base instance would also be
described.
Abstract: This research is aimed to describe the application of robust regression and its advantages over the least square regression method in analyzing financial data. To do this, relationship between earning per share, book value of equity per share and share price as price model and earning per share, annual change of earning per share and return of stock as return model is discussed using both robust and least square regressions, and finally the outcomes are compared. Comparing the results from the robust regression and the least square regression shows that the former can provide the possibility of a better and more realistic analysis owing to eliminating or reducing the contribution of outliers and influential data. Therefore, robust regression is recommended for getting more precise results in financial data analysis.
Abstract: Workflow Management Systems (WfMS) alloworganizations to streamline and automate business processes and reengineer their structure. One important requirement for this type of system is the management and computation of the Quality of Service(QoS) of processes and workflows. Currently, a range of Web processes and workflow languages exist. Each language can be characterized by the set of patterns they support. Developing andimplementing a suitable and generic algorithm to compute the QoSof processes that have been designed using different languages is a difficult task. This is because some patterns are specific to particular process languages and new patterns may be introduced in future versions of a language. In this paper, we describe an adaptive algorithm implemented to cope with these two problems. The algorithm is called adaptive since it can be dynamically changed as the patterns of a process language also change.
Abstract: The paper proposes a methodology to process the signals coming from the Transcranial Magnetic Stimulation (TMS) in order to identify the pathology and evaluate the therapy to treat the patients affected by demency diseases. In particular, a fuzzy model is developed to identify the demency of the patients affected by Subcortical Ischemic Vascular Dementia and to measure the positive effect, if any, of a repetitive TMS on their motor performances. A tool is also presented to support the mentioned analysis.
Abstract: In the Equivalent Transformation (ET) computation
model, a program is constructed by the successive accumulation of
ET rules. A method by meta-computation by which a correct ET
rule is generated has been proposed. Although the method covers a
broad range in the generation of ET rules, all important ET rules
are not necessarily generated. Generation of more ET rules can be
achieved by supplementing generation methods which are specialized
for important ET rules. A Specialization-by-Equation (Speq) rule is
one of those important rules. A Speq rule describes a procedure in
which two variables included in an atom conjunction are equalized
due to predicate constraints. In this paper, we propose an algorithm
that systematically and recursively generate Speq rules and discuss
its effectiveness in the synthesis of ET programs. A Speq rule is
generated based on proof of a logical formula consisting of given
atom set and dis-equality. The proof is carried out by utilizing some
ET rules and the ultimately obtained rules in generating Speq rules.
Abstract: The link between Gröbner basis and linear algebra was
described by Lazard [4,5] where he realized the Gr¨obner basis
computation could be archived by applying Gaussian elimination over
Macaulay-s matrix .
In this paper, we indicate how same technique may be used to
SAGBI- Gröbner basis computations in invariant rings.
Abstract: Indian subcontinent has a plethora of traditional
medicine systems that provide promising solutions to lifestyle
disorders in an 'all natural way'. Spices and oilseeds hold
prominence in Indian cuisine hence the focus of the current study
was to evaluate the bioactive molecules from Linum usitatissinum
(LU), Lepidium sativum (LS), Nigella sativa (NS) and Guizotia
abyssinica (GA) seeds. The seeds were characterized for functional
lipids like omega-3 fatty acid, antioxidant capacity, phenolic
compounds, dietary fiber and anti-nutritional factors. Analysis of the
seeds revealed LU and LS to be a rich source of α-linolenic acid
(41.85 ± 0.33%, 26.71 ± 0.63%), an omega 3 fatty acid (using
GCMS). While studying antioxidant potential NS seeds demonstrated
highest antioxidant ability (61.68 ± 0.21 TEAC/ 100 gm DW) due to
the presence of phenolics and terpenes as assayed by the Mass
spectral analysis. When screened for anti-nutritional factor
cyanogenic glycoside, LS seeds showed content as high as 1674 ± 54
mg HCN / kg. GA is a probable good source of a stable vegetable oil
(SFA: PUFA 1:2.3). The seeds showed diversified bioactive profile
and hence further studies to use different bio molecules in tandem for
the development of a possible 'nutraceutical cocktail' have been
initiated..
Abstract: Several studies have been carried out, using various techniques, including neural networks, to discriminate vigilance states in humans from electroencephalographic (EEG) signals, but we are still far from results satisfactorily useable results. The work presented in this paper aims at improving this status with regards to 2 aspects. Firstly, we introduce an original procedure made of the association of two neural networks, a self organizing map (SOM) and a learning vector quantization (LVQ), that allows to automatically detect artefacted states and to separate the different levels of vigilance which is a major breakthrough in the field of vigilance. Lastly and more importantly, our study has been oriented toward real-worked situation and the resulting model can be easily implemented as a wearable device. It benefits from restricted computational and memory requirements and data access is very limited in time. Furthermore, some ongoing works demonstrate that this work should shortly results in the design and conception of a non invasive electronic wearable device.
Abstract: Many research works are carried out on the analysis of
traces in a digital learning environment. These studies produce large
volumes of usage tracks from the various actions performed by a
user. However, to exploit these data, compare and improve
performance, several issues are raised. To remedy this, several works
deal with this problem seen recently. This research studied a series of
questions about format and description of the data to be shared. Our
goal is to share thoughts on these issues by presenting our experience
in the analysis of trace-based log files, comparing several approaches
used in automatic classification applied to e-learning platforms.
Finally, the obtained results are discussed.
Abstract: The focus in this work is to assess which method
allows a better forecasting of malaria cases in Bujumbura ( Burundi)
when taking into account association between climatic factors and
the disease. For the period 1996-2007, real monthly data on both
malaria epidemiology and climate in Bujumbura are described and
analyzed. We propose a hierarchical approach to achieve our
objective. We first fit a Generalized Additive Model to malaria cases
to obtain an accurate predictor, which is then used to predict future
observations. Various well-known forecasting methods are compared
leading to different results. Based on in-sample mean average
percentage error (MAPE), the multiplicative exponential smoothing
state space model with multiplicative error and seasonality performed
better.
Abstract: One of the essential sectors of Myanmar economy is
agriculture which is sensitive to climate variation. The most
important climatic element which impacts on agriculture sector is
rainfall. Thus rainfall prediction becomes an important issue in
agriculture country. Multi variables polynomial regression (MPR)
provides an effective way to describe complex nonlinear input output
relationships so that an outcome variable can be predicted from the
other or others. In this paper, the modeling of monthly rainfall
prediction over Myanmar is described in detail by applying the
polynomial regression equation. The proposed model results are
compared to the results produced by multiple linear regression model
(MLR). Experiments indicate that the prediction model based on
MPR has higher accuracy than using MLR.
Abstract: This paper describes the evolution of strategies to
evaluate ePortfolios in an online Master-s of Education (M.Ed.)
degree in Instructional Technology. The ePortfolios are required as a
culminating activity for students in the program. By using Web 2.0
tools to develop the ePortfolios, students are able to showcase their
technical skills, integrate national standards, demonstrate their
professional understandings, and reflect on their individual learning.
Faculty have created assessment strategies to evaluate student
achievement of these skills. To further develop ePortfolios as a tool
promoting authentic learning, faculty are moving toward integrating
transparency as part of the evaluation process.
Abstract: This paper presents the development of a wavelet
based algorithm, for distinguishing between magnetizing inrush
currents and power system fault currents, which is quite adequate,
reliable, fast and computationally efficient tool. The proposed
technique consists of a preprocessing unit based on discrete wavelet
transform (DWT) in combination with an artificial neural network
(ANN) for detecting and classifying fault currents. The DWT acts as
an extractor of distinctive features in the input signals at the relay
location. This information is then fed into an ANN for classifying
fault and magnetizing inrush conditions. A 220/55/55 V, 50Hz
laboratory transformer connected to a 380 V power system were
simulated using ATP-EMTP. The DWT was implemented by using
Matlab and Coiflet mother wavelet was used to analyze primary
currents and generate training data. The simulated results presented
clearly show that the proposed technique can accurately discriminate
between magnetizing inrush and fault currents in transformer
protection.