Abstract: It has been always observed that the effectiveness of
MIS as a support tool for management decisions degenerate after
time of implementation, despite the substantial investments being
made. This is true for organizations at the initial stages of MIS
implementations, manual or computerized. A survey of a sample of
middle to top managers in business and government institutions was
made. A large ratio indicates that the MIS has lost its impact on the
day-to-day operations, and even the response lag time expands
sometimes indefinitely. The data indicates an infant mortality
phenomenon of the bathtub model. Reasons may be monotonous
nature of MIS delivery, irrelevance, irreverence, timeliness, and lack
of adequate detail. All those reasons collaborate to create a degree of
degeneracy. We investigate and model as a bathtub model the
phenomenon of MIS degeneracy that inflicts the MIS systems and
renders it ineffective. A degeneracy index is developed to identify
the status of the MIS system and possible remedies to prevent the
onset of total collapse of the system to the point of being useless.
Abstract: The goal of this work is to describe a new algorithm for finding the optimal variable order, number of nodes for any order and other ROBDD parameters, based on a tabular method. The tabular method makes use of a pre-built backend database table that stores the ROBDD size for selected combinations of min-terms. The user uses the backend table and the proposed algorithm to find the necessary ROBDD parameters, such as best variable order, number of nodes etc. Experimental results on benchmarks are given for this technique.
Abstract: There are little subjects in macroeconomics that are so
widely discussed, but at the same time controversial and without a
clear solution such as the choice of exchange rate regime. National
authorities need to take into consideration numerous fundamentals,
trying to fulfil goals of economic growth, low and stable inflation
and international stability. This paper focuses on the countries of ex-
Yugoslavia and their exchange rate history as independent states. We
follow the development of the regimes in 6 countries during the
transition through the financial crisis of the second part of the 2000s
to the prospects of their final goal: full membership in the European
Union. Main question is to what extent has the exchange regime
contributed to their economic success, considering other objective
factors.
Abstract: Morphological operators transform the original image
into another image through the interaction with the other image of
certain shape and size which is known as the structure element.
Mathematical morphology provides a systematic approach to analyze
the geometric characteristics of signals or images, and has been
applied widely too many applications such as edge detection,
objection segmentation, noise suppression and so on. Fuzzy
Mathematical Morphology aims to extend the binary morphological
operators to grey-level images. In order to define the basic
morphological operations such as fuzzy erosion, dilation, opening
and closing, a general method based upon fuzzy implication and
inclusion grade operators is introduced. The fuzzy morphological
operations extend the ordinary morphological operations by using
fuzzy sets where for fuzzy sets, the union operation is replaced by a
maximum operation, and the intersection operation is replaced by a
minimum operation.
In this work, it consists of two articles. In the first one, fuzzy set
theory, fuzzy Mathematical morphology which is based on fuzzy
logic and fuzzy set theory; fuzzy Mathematical operations and their
properties will be studied in details. As a second part, the application
of fuzziness in Mathematical morphology in practical work such as
image processing will be discussed with the illustration problems.
Abstract: This paper describes the designs of a first and second
generation autonomous gas monitoring system and the successful
field trial of the final system (2nd generation). Infrared sensing
technology is used to detect and measure the greenhouse gases
methane (CH4) and carbon dioxide (CO2) at point sources. The
ability to monitor real-time events is further enhanced through the
implementation of both GSM and Bluetooth technologies to
communicate these data in real-time. These systems are robust,
reliable and a necessary tool where the monitoring of gas events in
real-time are needed.
Abstract: The controllable electrical loss which consists of the
copper loss and iron loss can be minimized by the optimal control of
the armature current vector. The control algorithm of current vector
minimizing the electrical loss is proposed and the optimal current
vector can be decided according to the operating speed and the load
conditions. The proposed control algorithm is applied to the
experimental PM motor drive system and this paper presents a
modern approach of speed control for permanent magnet
synchronous motor (PMSM) applied for Electric Vehicle using a
nonlinear control. The regulation algorithms are based on the
feedback linearization technique. The direct component of the current
is controlled to be zero which insures the maximum torque operation.
The near unity power factor operation is also achieved. More over,
among EV-s motor electric propulsion features, the energy efficiency
is a basic characteristic that is influenced by vehicle dynamics and
system architecture. For this reason, the EV dynamics are taken into
account.
Abstract: This paper investigates experimentally and
analytically the torsion behavior of steel fibered high strength self
compacting concrete beams reinforced by GFRP bars. Steel fibered
high strength self compacting concrete (SFHSSCC) and GFRP bars
became in the recent decades a very important materials in the
structural engineering field. The use of GFRP bars to replace steel
bars has emerged as one of the many techniques put forward to
enhance the corrosion resistance of reinforced concrete structures.
High strength concrete and GFRP bars attract designers and
architects as it allows improving the durability as well as the esthetics
of a construction. One of the trends in SFHSSCC structures is to
provide their ductile behavior and additional goal is to limit
development and propagation of macro-cracks in the body of
SFHSSCC elements. SFHSSCC and GFRP bars are tough, improve
the workability, enhance the corrosion resistance of reinforced
concrete structures, and demonstrate high residual strengths after
appearance of the first crack. Experimental studies were carried out
to select effective fiber contents. Three types of volume fraction from
hooked shape steel fibers are used in this study, the hooked steel
fibers were evaluated in volume fractions ranging between 0.0%,
0.75% and 1.5%. The beams shape is chosen to create the required
forces (i.e. torsion and bending moments simultaneously) on the test
zone. A total of seven beams were tested, classified into three groups.
All beams, have 200cm length, cross section of 10×20cm,
longitudinal bottom reinforcement of 3
Abstract: This paper discusses a method for improving accuracy
of fuzzy-rule-based classifiers using particle swarm optimization
(PSO). Two different fuzzy classifiers are considered and optimized.
The first classifier is based on Mamdani fuzzy inference system
(M_PSO fuzzy classifier). The second classifier is based on Takagi-
Sugeno fuzzy inference system (TS_PSO fuzzy classifier). The
parameters of the proposed fuzzy classifiers including premise
(antecedent) parameters, consequent parameters and structure of
fuzzy rules are optimized using PSO. Experimental results show that
higher classification accuracy can be obtained with a lower number
of fuzzy rules by using the proposed PSO fuzzy classifiers. The
performances of M_PSO and TS_PSO fuzzy classifiers are compared
to other fuzzy based classifiers
Abstract: This paper presents the findings of two experiments that were performed on the Redundancy in Wireless Connection Model (RiWC) using the 802.11b standard. The experiments were simulated using OPNET 11.5 Modeler software. The first was aimed at finding the maximum number of simultaneous Voice over Internet Protocol (VoIP) users the model would support under the G.711 and G.729 codec standards when the packetization interval was 10 milliseconds (ms). The second experiment examined the model?s VoIP user capacity using the G.729 codec standard along with background traffic using the same packetization interval as in the first experiment. To determine the capacity of the model under various experiments, we checked three metrics: jitter, delay and data loss. When background traffic was added, we checked the response time in addition to the previous three metrics. The findings of the first experiment indicated that the maximum number of simultaneous VoIP users the model was able to support was 5, which is consistent with recent research findings. When using the G.729 codec, the model was able to support up to 16 VoIP users; similar experiments in current literature have indicated a maximum of 7 users. The finding of the second experiment demonstrated that the maximum number of VoIP users the model was able to support was 12, with the existence of background traffic.
Abstract: In this paper, a new robust audio fingerprinting
algorithm in MP3 compressed domain is proposed with high
robustness to time scale modification (TSM). Instead of simply
employing short-term information of the MP3 stream, the new
algorithm extracts the long-term features in MP3 compressed domain
by using the modulation frequency analysis. Our experiment has
demonstrated that the proposed method can achieve a hit rate of
above 95% in audio retrieval and resist the attack of 20% TSM. It has
lower bit error rate (BER) performance compared to the other
algorithms. The proposed algorithm can also be used in other
compressed domains, such as AAC.
Abstract: This study used positivist quantitative approach to examine the mathematical concepts acquisition of- KS4 (14-16) Special Education Needs (SENs) students within the school sector education in England. The research is based on a pilot study and the design is completely holistic in its approach with mixing methodologies. The study combines the qualitative and quantitative methods of approach in gathering formative data for the design process. Although, the approach could best be described as a mix method, fundamentally with a strong positivist paradigm, hence my earlier understanding of the differentiation of the students, student – teacher body and the various elements of indicators that is being measured which will require an attenuated description of individual research subjects. The design process involves four phases with five key stages which are; literature review and document analysis, the survey, interview, and observation; then finally the analysis of data set. The research identified the need for triangulation with Reid-s phases of data management providing scaffold for the study. The study clearly identified the ideological and philosophical aspects of educational research design for the study of mathematics by the special education needs (SENs) students in England using the virtual learning environment (VLE) platform.
Abstract: In this paper we develop and analyze the model for
the spread of Leptospirosis by age group in Thailand, between 1997
and 2010 by using mathematical modeling and computer simulation.
Leptospirosis is caused by pathogenic spirochetes of the genus
Leptospira. It is a zoonotic disease of global importance and an
emerging health problem in Thailand. In Thailand, leptospirosis is a
reportable disease, the top three age groups are 23.31% in 35-44
years olds group, 22.76% in 25-34 year olds group, 17.60% in 45-54
year olds group from reported leptospirosis between 1997 and 2010,
with a peak in 35-44 year olds group. Our paper, the Leptosipirosis
transmission by age group in Thailand is studied on the mathematical
model. Some analytical and simulation results are presented.
Abstract: Traditional object segmentation methods are time consuming and computationally difficult. In this paper, onedimensional object detection along the secant lines is applied. Statistical features of texture images are computed for the recognition process. Example matrices of these features and formulae for calculation of similarities between two feature patterns are expressed. And experiments are also carried out using these features.
Abstract: For the first time since 1940 and presentation of
theodorson-s theory, distribution of thrust, torque and efficiency
along the blade of a counter rotating propeller axial fan was studied
with a novel method in this research. A constant chord, constant
pitch symmetric fan was investigated with Reynolds Stress
Turbulence method in this project and H.E.S. method was utilized to
obtain distribution profiles from C.F.D. tests outcome. C.F.D. test
results were validated by estimation from Playlic-s analytical method.
Final results proved ability of H.E.S. method to obtain distribution
profiles from C.F.D test results and demonstrated interesting facts
about effects of solidity and differences between distributions in front
and rear section.
Abstract: Firms have invested heavily in knowledge
management (KM) with the aim to build a knowledge capability and
use it to achieve a competitive advantage. Research has shown,
however, that not all knowledge management projects succeed. Some
studies report that about 84% of knowledge management projects
fail. This paper has integrated studies on the impediments to
knowledge management into a theoretical framework. Based on this
framework, five cases documenting failed KM initiatives were
analysed. The analysis gave us a clear picture about why certain KM
projects fail. The high failure rate of KM can be explained by the
gaps that exist between users and management in terms of KM
perceptions and objectives
Abstract: This paper presented the technique of robot control by event-related potentials (ERPs) of brain waves. Based on the proposed technique, severe physical disabilities can free browse outside world. A specific component of ERPs, N2P3, was found and used to control the movement of robot and the view of camera on the designed brain-computer interface (BCI). Users only required watching the stimuli of attended button on the BCI, the evoked potentials of brain waves of the target button, N2P3, had the greatest amplitude among all control buttons. An experimental scene had been constructed that the robot required walking to a specific position and move the view of camera to see the instruction of the mission, and then completed the task. Twelve volunteers participated in this experiment, and experimental results showed that the correct rate of BCI control achieved 80% and the average of execution time was 353 seconds for completing the mission. Four main contributions included in this research: (1) find an efficient component of ERPs, N2P3, for BCI control, (2) embed robot's viewpoint image into user interface for robot control, (3) design an experimental scene and conduct the experiment, and (4) evaluate the performance of the proposed system for assessing the practicability.
Abstract: Gesture recognition is a challenging task for extracting
meaningful gesture from continuous hand motion. In this paper, we propose an automatic system that recognizes isolated gesture,
in addition meaningful gesture from continuous hand motion for Arabic numbers from 0 to 9 in real-time based on Hidden Markov Models (HMM). In order to handle isolated gesture, HMM using
Ergodic, Left-Right (LR) and Left-Right Banded (LRB) topologies is applied over the discrete vector feature that is extracted from stereo
color image sequences. These topologies are considered to different
number of states ranging from 3 to 10. A new system is developed to recognize the meaningful gesture based on zero-codeword detection
with static velocity motion for continuous gesture. Therefore, the
LRB topology in conjunction with Baum-Welch (BW) algorithm for
training and forward algorithm with Viterbi path for testing presents the best performance. Experimental results show that the proposed system can successfully recognize isolated and meaningful gesture and achieve average rate recognition 98.6% and 94.29% respectively.
Abstract: This paper presents the characterization and design of a capacitive pressure sensor with LC-based 0.35 µm CMOS readout circuit. SPICE is employed to evaluate the characteristics of the readout circuit and COMSOL multiphysics structural analysis is used to simulate the behavior of the pressure sensor. The readout circuit converts the capacitance variation of the pressure sensor into the frequency output. Simulation results show that the proposed pressure sensor has output frequency from 2.50 to 2.28 GHz in a pressure range from 0.1 to 2 MPa almost linearly. The sensitivity of the frequency shift with respect to the applied pressure load is 0.11 GHz/MPa.
Abstract: Meshless Finite Element Methods, namely element-free Galerkin and point-interpolation method were implemented and tested concerning their applicability to typical engineering problems like electrical fields and structural mechanics. A class-structure was developed which allows a consistent implementation of these methods together with classical FEM in a common framework. Strengths and weaknesses of the methods under investigation are discussed. As a result of this work joint usage of meshless methods together with classical Finite Elements are recommended.
Abstract: This paper proposes a visual cryptography by random
grids scheme with identifiable shares. The method encodes an image
O in two shares that exhibits the following features: (1) each generated
share has the same scale as O, (2) any share singly has noise-like
appearance that reveals no secret information on O, (3) the secrets can
be revealed by superimposing the two shares, (4) folding a share up
can disclose some identification patterns, and (5) both of the secret
information and the designated identification patterns are recognized
by naked eye without any computation. The property to show up
identification patterns on folded shares establishes a simple and
friendly interface for users to manage the numerous shares created by
VC schemes.