Abstract: Developing countries are facing a problem of slums and there appears to be no fool proof solution to eradicate them. For improving the quality of life there are three approaches of slum development and In-situ up-gradation approach is found to be the best one, while the relocation approach has proved to be failure. Factors responsible for failure of relocation projects are needed to be assessed, which is the basic aim of the paper. Factors responsible for failure of relocation projects are loss of livelihood, security of tenure and inefficiency of the Government. These factors are traced out & mapped from the examples of Western & Indian cities. National habitat, Resettlement policy emphasized relationship between shelter and work place. SRA has identified 55 slums for relocation due reservation of land uses, security of tenure and non- notified status of slums. The policy guidelines have been suggested for successful relocation projects. KeywordsLivelihood, Relocation, Slums, Urban poor.
Abstract: Increasing growth of information volume in the
internet causes an increasing need to develop new (semi)automatic
methods for retrieval of documents and ranking them according to
their relevance to the user query. In this paper, after a brief review
on ranking models, a new ontology based approach for ranking
HTML documents is proposed and evaluated in various
circumstances. Our approach is a combination of conceptual,
statistical and linguistic methods. This combination reserves the
precision of ranking without loosing the speed. Our approach
exploits natural language processing techniques to extract phrases
from documents and the query and doing stemming on words. Then
an ontology based conceptual method will be used to annotate
documents and expand the query. To expand a query the spread
activation algorithm is improved so that the expansion can be done
flexible and in various aspects. The annotated documents and the
expanded query will be processed to compute the relevance degree
exploiting statistical methods. The outstanding features of our
approach are (1) combining conceptual, statistical and linguistic
features of documents, (2) expanding the query with its related
concepts before comparing to documents, (3) extracting and using
both words and phrases to compute relevance degree, (4) improving
the spread activation algorithm to do the expansion based on
weighted combination of different conceptual relationships and (5)
allowing variable document vector dimensions. A ranking system
called ORank is developed to implement and test the proposed
model. The test results will be included at the end of the paper.
Abstract: The objective of the present study was to evaluate the
potential of hollow microneedles for enhancing the transdermal
delivery of Bovine Serum Albumin (MW~66,000 Da)-Fluorescein
Isothiocyanate (BSA-FITC) conjugate, a hydrophilic large molecular
compound. Moreover, the effect of different formulations was
evaluated. The series of binary mixtures composed of propylene
glycol (PG) and pH 7.4 phosphate buffer solution (PBS) was
prepared and used as a medium for BSA-FITC. The results showed
that there was no permeation of BSA-FITC solution across the
neonatal porcine skin without using hollow microneedles, whereas
the cumulative amount of BSA-FITC released at 8 h through the
neonatal porcine skin was about 60-70% when using hollow
microneedles. Furthermore, the results demonstrated that the higher
volume of PG in binary mixtures injected, the lower cumulative
amount of BSA-FITC released and release rate of BSA-FITC from
skin. These release profiles of BSA-FITC in binary mixtures were
expressed by Fick-s law of diffusion. These results suggest the
utilization of hollow microneedle to enhance transdermal delivery of
protein and provide useful information for designing an effective
hollow microneedle system.
Abstract: We propose that Virtual Learning Environments (VLEs) should be designed by taking into account the characteristics, the special needs and the specific operating rules of the academic institutions in which they are employed. In this context, we describe a VLE module that extends the support of the organization and delivery of course material by including administration activities related to the various stages of teaching. These include the co-ordination, collaboration and monitoring of the course material development process and institution-specific course material delivery modes. Our specialized module, which enhances VLE capabilities by Helping Educators and Learners through a Laboratory Assistance System, is willing to assist the Greek tertiary technological sector, which includes Technological Educational Institutes (T.E.I.).
Abstract: Supply chain networks are frequently hit by
unplanned events which lead to disruptions and cause operational and
financial consequences. It is neither possible to avoid disruption risk
entirely, nor are network members able to prepare for every possible
disruptive event. Therefore a continuity planning should be set up
which supports effective operational responses in supply chain
networks in times of emergencies. In this research network related
degrees of freedom which determine the options for responsive
actions are derived from interview data. The findings are further
embedded into a common risk management process. The paper
provides support for researchers and practitioners to identify the
network related options for responsive actions and to determine the
need for improving the reaction capabilities.
Abstract: Finite impulse response (FIR) filters have the advantage of linear phase, guaranteed stability, fewer finite precision errors, and efficient implementation. In contrast, they have a major disadvantage of high order need (more coefficients) than IIR counterpart with comparable performance. The high order demand imposes more hardware requirements, arithmetic operations, area usage, and power consumption when designing and fabricating the filter. Therefore, minimizing or reducing these parameters, is a major goal or target in digital filter design task. This paper presents an algorithm proposed for modifying values and the number of non-zero coefficients used to represent the FIR digital pulse shaping filter response. With this algorithm, the FIR filter frequency and phase response can be represented with a minimum number of non-zero coefficients. Therefore, reducing the arithmetic complexity needed to get the filter output. Consequently, the system characteristic i.e. power consumption, area usage, and processing time are also reduced. The proposed algorithm is more powerful when integrated with multiplierless algorithms such as distributed arithmetic (DA) in designing high order digital FIR filters. Here the DA usage eliminates the need for multipliers when implementing the multiply and accumulate unit (MAC) and the proposed algorithm will reduce the number of adders and addition operations needed through the minimization of the non-zero values coefficients to get the filter output.
Abstract: Using neural network we try to model the unknown function f for given input-output data pairs. The connection strength of each neuron is updated through learning. Repeated simulations of crisp neural network produce different values of weight factors that are directly affected by the change of different parameters. We propose the idea that for each neuron in the network, we can obtain quasi-fuzzy weight sets (QFWS) using repeated simulation of the crisp neural network. Such type of fuzzy weight functions may be applied where we have multivariate crisp input that needs to be adjusted after iterative learning, like claim amount distribution analysis. As real data is subjected to noise and uncertainty, therefore, QFWS may be helpful in the simplification of such complex problems. Secondly, these QFWS provide good initial solution for training of fuzzy neural networks with reduced computational complexity.
Abstract: Since Cloud environment has appeared as the most powerful
keyword in the computing industry, the growth in VDI (Virtual Desktop
Infrastructure) became remarkable in domestic market. In recent years, with the trend
that mobile devices such as smartphones and pads spread so rapidly, the strengths of
VDI that allows people to access and perform business on the move along with
companies' office needs expedite more rapid spread of VDI.
In this paper, mobile OTP (One-Time Password) authentication method is proposed
to secure mobile device portability through rapid and secure authentication using
mobile devices such as mobile phones or pads, which does not require additional
purchase or possession of OTP tokens of users. To facilitate diverse and wide use of
Services in the future, service should be continuous and stable, and above all, security
should be considered the most important to meet advanced portability and user
accessibility, the strengths of VDI.
Abstract: In image processing and visualization, comparing two
bitmapped images needs to be compared from their pixels by matching
pixel-by-pixel. Consequently, it takes a lot of computational time
while the comparison of two vector-based images is significantly
faster. Sometimes these raster graphics images can be approximately
converted into the vector-based images by various techniques. After
conversion, the problem of comparing two raster graphics images
can be reduced to the problem of comparing vector graphics images.
Hence, the problem of comparing pixel-by-pixel can be reduced to
the problem of polynomial comparisons. In computer aided geometric
design (CAGD), the vector graphics images are the composition of
curves and surfaces. Curves are defined by a sequence of control
points and their polynomials. In this paper, the control points will be
considerably used to compare curves. The same curves after relocated
or rotated are treated to be equivalent while two curves after different
scaled are considered to be similar curves. This paper proposed an
algorithm for comparing the polynomial curves by using the control
points for equivalence and similarity. In addition, the geometric
object-oriented database used to keep the curve information has also
been defined in XML format for further used in curve comparisons.
Abstract: In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.
Abstract: As days go by, we hear more and more about HIV,
Ebola, Bird Flu and other dreadful viruses which were unknown a
few decades ago. In both detecting and fighting viral diseases
ordinary methods have come across some basic and important
difficulties. Vaccination is by a sense introduction of the virus to the
immune system before the occurrence of the real case infection. It is
very successful against some viruses (e.g. Poliomyelitis), while
totally ineffective against some others (e.g. HIV or Hepatitis-C). On
the other hand, Anti-virus drugs are mostly some tools to control and
not to cure a viral disease. This could be a good motivation to try
alternative treatments. In this study, some key features of possible
physical-based alternative treatments for viral diseases are presented.
Electrification of body parts or fluids (especially blood) with micro
electric signals with adjusted current or frequency is also studied. The
main approach of this study is to find a suitable energy field, with
appropriate parameters that are able to kill or deactivate viruses. This
would be a lengthy, multi-disciplinary research which needs the
contribution of virology, physics, and signal processing experts. It
should be mentioned that all the claims made by alternative cures
researchers must be tested carefully and are not advisable at the time
being.
Abstract: Most CT reconstruction system x-ray computed
tomography (CT) is a well established visualization technique in
medicine and nondestructive testing. However, since CT scanning
requires sampling of radiographic projections from different viewing
angles, common CT systems with mechanically moving parts are too
slow for dynamic imaging, for instance of multiphase flows or live
animals. A large number of X-ray projections are needed to
reconstruct CT images, so the collection and calculation of the
projection data consume too much time and harmful for patient. For
the purpose of solving the problem, in this study, we proposed a
method for tomographic reconstruction of a sample from a limited
number of x-ray projections by using linear interpolation method. In
simulation, we presented reconstruction from an experimental x-ray
CT scan of a Aluminum phantom that follows to two steps: X-ray
projections will be interpolated using linear interpolation method and
using it for CT reconstruction based upon Ordered Subsets
Expectation Maximization (OSEM) method.
Abstract: This paper explores gender related barriers to interagency collaboration in statutory children safeguard partnerships against a theoretical framework that considers individuals, professions and organisations interacting as part of a complex adaptive system. We argue that gender-framed obstacles to effective communication between culturally discrepant agencies can ultimately impact on the effectiveness of policy delivery,. We focused our research on three partnership structures in Sefton Metropolitan Borough in order to observe how interactions occur, whether the agencies involved perceive their occupational environment as being gender affected and whether they believe this can hinder effective collaboration with other biased organisations. Our principal empirical findings indicate that there is a general awareness amongst professionals of the role that gender plays in each of the agencies reviewed, that gender may well constitute a barrier to effective communication, but there is a sense in which there is little scope for change in the short term. We aim to signal here, however, the need to change against the risk of service failure.
Abstract: Maintenance costs incurred on building differs. The
difference can be as results of the types, functions, age, building
health index, size, form height, location and complexity of the
building. These are contributing to the difficulty in maintenance
development of deterministic maintenance cost model. This paper is
concerns with reporting the preliminary findings on the creation of
building maintenance cost distributions for universities in Malaysia.
This study is triggered by the need to provide guides on maintenance
costs distributions for decision making. For this purpose, a survey
questionnaire was conducted to investigate the distribution of
maintenance costs in the universities. Altogether, responses were
received from twenty universities comprising both private and
publicly owned. The research found that engineering services,
roofing and finishes were the elements contributing the larger
segment of the maintenance costs. Furthermore, the study indicates
the significance of maintenance cost distribution as decision making
tool towards maintenance management.
Abstract: Ontology Matching is a task needed in various applica-tions, for example for comparison or merging purposes. In literature,many algorithms solving the matching problem can be found, butmost of them do not consider instances at all. Mappings are deter-mined by calculating the string-similarity of labels, by recognizinglinguistic word relations (synonyms, subsumptions etc.) or by ana-lyzing the (graph) structure. Due to the facts that instances are oftenmodeled within the ontology and that the set of instances describesthe meaning of the concepts better than their meta information,instances should definitely be incorporated into the matching process.In this paper several novel instance-based matching algorithms arepresented which enhance the quality of matching results obtainedwith common concept-based methods. Different kinds of formalismsare use to classify concepts on account of their instances and finallyto compare the concepts directly.KeywordsInstances, Ontology Matching, Semantic Web
Abstract: Snake bite cases in Malaysia most often involve the
species Naja-naja and Calloselasma rhodostoma. In keeping with the
need for a rapid snake venom detection kit in a clinical setting, plate
and dot-ELISA test for the venoms of Naja-naja sumatrana,
Calloselasma rhodostoma and the cobra venom fraction V antigen
was developed. Polyclonal antibodies were raised and further used to
prepare the reagents for the dot-ELISA test kit which was tested in
mice, rabbit and virtual human models. The newly developed dot-
ELISA kit was able to detect a minimum venom concentration of
244ng/ml with cross reactivity of one antibody type. The dot-ELISA
system was sensitive and specific for all three snake venom types in
all tested animal models. The lowest minimum venom concentration
detectable was in the rabbit model, 244ng/ml of the cobra venom
fraction V antigen. The highest minimum venom concentration was
in mice, 1953ng/ml against a multitude of venoms. The developed
dot-ELISA system for the detection of three snake venom types was
successful with a sensitivity of 95.8% and specificity of 97.9%.
Abstract: This paper simulates the ad-hoc mesh network in rural areas, where such networks receive great attention due to their cost, since installing the infrastructure for regular networks in these areas is not possible due to the high cost. The distance between the communicating nodes is the most obstacles that the ad-hoc mesh network will face. For example, in Terranet technology, two nodes can communicate if they are only one kilometer far from each other. However, if the distance between them is more than one kilometer, then each node in the ad-hoc mesh networks has to act as a router that forwards the data it receives to other nodes. In this paper, we try to find the critical number of nodes which makes the network fully connected in a particular area, and then propose a method to enhance the intermediate node to accept to be a router to forward the data from the sender to the receiver. Much work was done on technological changes on peer to peer networks, but the focus of this paper will be on another feature which is to find the minimum number of nodes needed for a particular area to be fully connected and then to enhance the users to switch on their phones and accept to work as a router for other nodes. Our method raises the successful calls to 81.5% out of 100% attempt calls.
Abstract: Soil stabilization has been widely used to improve
soil strength and durability or to prevent erosion and dust generation.
Generally to reduce problems of clayey soils in engineering work and
to stabilize these soils additional materials are used. The most
common materials are lime, fly ash and cement. Using this materials,
although improve soil property , but in some cases due to financial
problems and the need to use special equipment are limited .One of
the best methods for stabilization clayey soils is neutralization the
clay particles. For this purpose we can use ion exchange materials.
Ion exchange solution like CBR plus can be used for soil
stabilization. One of the most important things in using CBR plus is
determination the amount of this solution for various soils with
different properties. In this study a laboratory experiment is conduct
to evaluate the ion exchange capacity of three soils with various
plasticity index (PI) to determine amount or required CBR plus
solution for soil stabilization.
Abstract: In our modern world, more physical transactions are being substituted by electronic transactions (i.e. banking, shopping, and payments), many businesses and companies are performing most of their operations through the internet. Instead of having a physical commerce, internet visitors are now adapting to electronic commerce (e-Commerce). The ability of web users to reach products worldwide can be greatly benefited by creating friendly and personalized online business portals. Internet visitors will return to a particular website when they can find the information they need or want easily. Dealing with this human conceptualization brings the incorporation of Artificial/Computational Intelligence techniques in the creation of customized portals. From these techniques, Fuzzy-Set technologies can make many useful contributions to the development of such a human-centered endeavor as e-Commerce. The main objective of this paper is the implementation of a Paradigm for the Intelligent Design and Operation of Human-Computer interfaces. In particular, the paradigm is quite appropriate for the intelligent design and operation of software modules that display information (such Web Pages, graphic user interfaces GUIs, Multimedia modules) on a computer screen. The human conceptualization of the user personal information is analyzed throughout a Cascaded Fuzzy Inference (decision-making) System to generate the User Ascribe Qualities, which identify the user and that can be used to customize portals with proper Web links.
Abstract: The need in cognitive radio system for a simple, fast, and independent technique to sense the spectrum occupancy has led to the energy detection approach. Energy detector is known by its dependency on noise variation in the system which is one of its major drawbacks. In this paper, we are aiming to improve its performance by utilizing a weighted collaborative spectrum sensing, it is similar to the collaborative spectrum sensing methods introduced previously in the literature. These weighting methods give more improvement for collaborative spectrum sensing as compared to no weighting case. There is two method proposed in this paper: the first one depends on the channel status between each sensor and the primary user while the second depends on the value of the energy measured in each sensor.