Abstract: The studying of enzymatic esterification of carboxylic
acids and higher alcohols was performed by esterase Saccharomyces
cerevisiae in water-organic medium. Investigation of the enzyme
specificity to acetic substrates showed the best result with acetic acid
in esterification reactions with ethanol whereas within other
carboxylic acids the esterification decreased with acids: hexanoic >
pentanoic > butyric > decanoic. In relation to higher alcohols C3-C5,
esterification increased with alcohols propanol < butanol < amylol.
Also it was determined that esterase was more specific to alcohols
with branched chain such as isobutyl alcohol and isoamyl alcohol.
Data obtained may have important practical implications, for
example, for application of yeast esterase in producing various
volatile esters as well as in enzymatic transformation of volatile acids
and toxic fusel alcohols into volatile esters by providing the
production of the high quality alcoholic beverages with redused
content of higher alcohols as well as with improved degustational and
hygienic properties.
Abstract: In this paper, the Fuzzy Autocatalytic Set (FACS) is
composed into Omega Algebra by embedding the membership value
of fuzzy edge connectivity using the property of transitive affinity.
Then, the Omega Algebra of FACS is a transformation semigroup
which is a special class of semigroup is shown.
Abstract: Business Process Management (BPM) helps in optimizing the business processes inside an enterprise. But BPM architecture does not provide any help for extending the enterprise. Modern business environments and rapidly changing technologies are asking for brisk changes in the business processes. Service Oriented Architecture (SOA) can help in enabling the success of enterprise-wide BPM. SOA supports agility in software development that is directly related to achieve loose coupling of interacting software agents. Agility is a premium concern of the current software designing architectures. Together, BPM and SOA provide a perfect combination for enterprise computing. SOA provides the capabilities for services to be combined together and to support and create an agile, flexible enterprise. But there are still many questions to answer; BPM is better or SOA? and what is the future track of BPM and SOA? This paper tries to answer some of these important questions.
Abstract: In a representative democracy political parties
promote vital competition on different policy issues and play
essential roles by offering ideological alternatives. They also give
channels for citizens- participation in government decision-making
processes and they are significant conduits and interpreters of
information about government. This paper attempts to examine how
opposition political parties and rebel fronts emerged in Ethiopia, and
examines their present conditions. In this paper, selected case studies
of political parties and rebel fronts are included to highlight the status
and the role of opposition groups in the country in the three
successive administrations: Haile Selassie (1930-1974), Derg (1974-
1991), and EPRDF (1991-Present).
Abstract: This article discusses the problem of estimating the
orientation of inclined ground on which a human subject stands based
on information provided by the vestibular system consisting of the
otolith and semicircular canals. It is assumed that body segments are
not necessarily aligned and thus forming an open kinematic chain.
The semicircular canals analogues to a technical gyrometer provide a
measure of the angular velocity whereas the otolith analogues to a
technical accelerometer provide a measure of the translational
acceleration. Two solutions are proposed and discussed. The first is
based on a stand-alone Kalman filter that optimally fuses the two
measurements based on their dynamic characteristics and their noise
properties. In this case, no body dynamic model is needed. In the
second solution, a central extended disturbance observer that
incorporates a body dynamic model (internal model) is employed.
The merits of both solutions are discussed and demonstrated by
experimental and simulation results.
Abstract: Constant amplitude fatigue crack growth (FCG) tests
were performed on dissimilar metal welded plates of Type 316L
Stainless Steel (SS) and IS 2062 Grade A Carbon steel (CS). The
plates were welded by TIG welding using SS E309 as electrode. FCG
tests were carried on the Side Edge Notch Tension (SENT)
specimens of 5 mm thickness, with crack initiator (notch) at base
metal region (BM), weld metal region (WM) and heat affected zones
(HAZ). The tests were performed at a test frequency of 10 Hz and at
load ratios (R) of 0.1 & 0.6. FCG rate was found to increase with
stress ratio for weld metals and base metals, where as in case of
HAZ, FCG rates were almost equal at high ΔK. FCG rate of HAZ of
stainless steel was found to be lowest at low and high ΔK. At
intermediate ΔK, WM showed the lowest FCG rate. CS showed
higher crack growth rate at all ΔK. However, the scatter band of data
was found to be narrow. Fracture toughness (Kc) was found to vary
in different locations of weldments. Kc was found lowest for the
weldment and highest for HAZ of stainless steel. A novel method of
characterizing the FCG behavior using an Infrared thermography
(IRT) camera was attempted. By monitoring the temperature rise at
the fast moving crack tip region, the amount of plastic deformation
was estimated.
Abstract: In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections.
Abstract: Visual information is very important in human perception
of surrounding world. Video is one of the most common ways to
capture visual information. The video capability has many benefits
and can be used in various applications. For the most part, the
video information is used to bring entertainment and help to relax,
moreover, it can improve the quality of life of deaf people. Visual
information is crucial for hearing impaired people, it allows them to
communicate personally, using the sign language; some parts of the
person being spoken to, are more important than others (e.g. hands,
face). Therefore, the information about visually relevant parts of the
image, allows us to design objective metric for this specific case. In
this paper, we present an example of an objective metric based on
human visual attention and detection of salient object in the observed
scene.
Abstract: The back-propagation algorithm calculates the weight
changes of an artificial neural network, and a two-term algorithm
with a dynamically optimal learning rate and a momentum factor
is commonly used. Recently the addition of an extra term, called a
proportional factor (PF), to the two-term BP algorithm was proposed.
The third term increases the speed of the BP algorithm. However,
the PF term also reduces the convergence of the BP algorithm, and
optimization approaches for evaluating the learning parameters are
required to facilitate the application of the three terms BP algorithm.
This paper considers the optimization of the new back-propagation
algorithm by using derivative information. A family of approaches
exploiting the derivatives with respect to the learning rate, momentum
factor and proportional factor is presented. These autonomously
compute the derivatives in the weight space, by using information
gathered from the forward and backward procedures. The three-term
BP algorithm and the optimization approaches are evaluated using
the benchmark XOR problem.
Abstract: Innovations and innovative activity get the increasing
value for successful financial and economic activity of the countries
and regions. The level of innovative sphere development determines
place of a country or a region in world economy and forms a basis of
steady economic growth. This article is devoted to different aspects
of organization of the national economic safety in the conditions of
innovative development, its problems, risks and threats. Economy
can be considered as aspiring for transition to innovative way only
with finding of economic safety: financial independence, power
stability and technological progress. There are statistical indicators,
defining the level of economic security and factors, threatening
economic safety of the state. The research is based on the analysis of
factors and indicators in conditions of innovative development. The
paper is illustrated by the examples of possible estimated system of
the economic safety level.
Abstract: The decision of information technology (IT) outsourcing requires close attention to the evaluation of supplier selection process because the selection decision involves conflicting multiple criteria and is replete with complex decision making problems. Selecting the most appropriate suppliers is considered an important strategic decision that may impact the performance of outsourcing engagements. The objective of this paper is to aid decision makers to evaluate and assess possible IT outsourcing suppliers. An axiomatic design based fuzzy group decision making is adopted to evaluate supplier alternatives. Finally, a case study is given to demonstrate the potential of the methodology. KeywordsIT outsourcing, Supplier selection, Multi-criteria decision making, Axiomatic design, Fuzzy logic.
Abstract: Working memory (WM) can be defined as the system
which actively holds information in the mind to do tasks in spite of
the distraction. Contrary, short-term memory (STM) is a system that
represents the capacity for the active storing of information without
distraction. There has been accumulating evidence that these types of
memory are related to higher cognition (HC). The aim of this study
was to verify the relationship between HC and memory (visual STM
and WM, auditory STM and WM). 59 primary school children were
tested by intelligence test, mathematical tasks (HC) and memory
subtests. We have shown that visual but not auditory memory is a
significant predictor of higher cognition. The relevance of these
results are discussed.
Abstract: The efficiency of an image watermarking technique depends on the preservation of visually significant information. This is attained by embedding the watermark transparently with the maximum possible strength. The current paper presents an approach for still image digital watermarking in which the watermark embedding process employs the wavelet transform and incorporates Human Visual System (HVS) characteristics. The sensitivity of a human observer to contrast with respect to spatial frequency is described by the Contrast Sensitivity Function (CSF). The strength of the watermark within the decomposition subbands, which occupy an interval on the spatial frequencies, is adjusted according to this sensitivity. Moreover, the watermark embedding process is carried over the subband coefficients that lie on edges where distortions are less noticeable. The experimental evaluation of the proposed method shows very good results in terms of robustness and transparency.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: Currently, most of distance learning courses can only
deliver standard material to students. Students receive course content
passively which leads to the neglect of the goal of education – “to suit
the teaching to the ability of students". Providing appropriate course
content according to students- ability is the main goal of this paper.
Except offering a series of conventional learning services, abundant
information available, and instant message delivery, a complete online
learning environment should be able to distinguish between students-
ability and provide learning courses that best suit their ability.
However, if a distance learning site contains well-designed course
content and design but fails to provide adaptive courses, students will
gradually loss their interests and confidence in learning and result in
ineffective learning or discontinued learning. In this paper, an
intelligent tutoring system is proposed and it consists of several
modules working cooperatively in order to build an adaptive learning
environment for distance education. The operation of the system is
based on the result of Self-Organizing Map (SOM) to divide students
into different groups according to their learning ability and learning
interests and then provide them with suitable course content.
Accordingly, the problem of information overload and internet traffic
problem can be solved because the amount of traffic accessing the
same content is reduced.
Abstract: Motion detection is a basic operation in the selection of significant segments of the video signals. For an effective Human Computer Intelligent Interaction, the computer needs to recognize the motion and track the moving object. Here an efficient neural network system is proposed for motion detection from the static background. This method mainly consists of four parts like Frame Separation, Rough Motion Detection, Network Formation and Training, Object Tracking. This paper can be used to verify real time detections in such a way that it can be used in defense applications, bio-medical applications and robotics. This can also be used for obtaining detection information related to the size, location and direction of motion of moving objects for assessment purposes. The time taken for video tracking by this Neural Network is only few seconds.
Abstract: In this paper, an intelligent algorithm for optimal
document archiving is presented. It is kown that electronic archives
are very important for information system management. Minimizing
the size of the stored data in electronic archive is a main issue to
reduce the physical storage area. Here, the effect of different types of
Arabic fonts on electronic archives size is discussed. Simulation
results show that PDF is the best file format for storage of the Arabic
documents in electronic archive. Furthermore, fast information
detection in a given PDF file is introduced. Such approach uses fast
neural networks (FNNs) implemented in the frequency domain. The
operation of these networks relies on performing cross correlation in
the frequency domain rather than spatial one. It is proved
mathematically and practically that the number of computation steps
required for the presented FNNs is less than that needed by
conventional neural networks (CNNs). Simulation results using
MATLAB confirm the theoretical computations.
Abstract: The aim of this study was to examine and identify the
type of Iranian financial market in terms of being symmetrical or
asymmetrical and to measure relationship between type of market
and the market's indices. In this study, daily information on the
market-s Share Price Index, Industrial Index and Top Fifty Most
Active Companies during the years 1999-2010 has been used. In
addition, to determine type of the financial market, rate of return on
Security is taken into account. In this research, by using logistic
regression analysis methods, relationship of the market type with the
above mentioned indices have been examined. The results showed
that the type of the financial market has a positive significant
association with market share price index and Industrial Index. Index
of Top Fifty Most Active Companies is significantly associated with
type of financial market, however this relationship is inverse.
Abstract: This paper provides an introduction into the
evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different
phases of information processing in the work domain. It starts by
charting the past and present usage of computers in work
environments and shows current technological trends, which are likely to influence future business applications. The second part
starts by briefly describing, how the usage of computers changed business processes in the past, and presents first Ambient
Intelligence applications based on identification and localization
information, which are already used in the production and retail sector. Based on current systems and prototype applications, the
paper gives an outlook of how Ambient Intelligence technologies could change business processes in the future.
Abstract: This study aims to assess the environmental hazards
from radon exhalation rate in the soil samples in selected locations in
Iraqi Kurdistan, using passive (CR-39NTDs) and active (RAD7)
detecting method. Radon concentration, effective radium content and
radon exhalation rate were estimated in soil samples that collected at
the depth level of 30 cm inside 124 houses. The results show that the
emanation rate for radon gas was variation from location to other,
depending on the geological formation. Most health risks come from
emanation of radon and its daughter due to its contribution for indoor
radon, so the results showed that there is a linear relationship
between the ratio of soil and indoor radon concentration (CSoil Rn222/
Cindoor Rn222) and the effective radium content in soil samples. The
results show that radon concentration has high and low values in
Hajyawa city and Er. Tyrawa Qr, respectively. A comparison
between our results with that mentioned in international reports was
done.