Abstract: Flood zoning studies have become more efficient in
recent years because of the availability of advanced computational
facilities and use of Geographic Information Systems (GIS). In the
present study, flood inundated areas were mapped using GIS for the
Dikrong river basin of Arunachal Pradesh, India, corresponding to
different return periods (2, 5, 25, 50, and 100 years). Further, the developed inundation maps corresponding to 25, 50, and 100 year return period floods were compared to corresponding maps
developed by conventional methods as reported in the Brahmaputra Board Master Plan for Dikrong basin. It was found that, the average
deviation of modelled flood inundation areas from reported map
inundation areas is below 5% (4.52%). Therefore, it can be said that
the modelled flood inundation areas matched satisfactorily with
reported map inundation areas. Hence, GIS techniques were proved to be successful in extracting the flood inundation extent in a time and cost effective manner for the remotely located hilly basin of Dikrong, where conducting conventional surveys is very difficult.
Abstract: Performance appraisal of employee is important in
managing the human resource of an organization. With the change
towards knowledge-based capitalism, maintaining talented
knowledge workers is critical. However, management classification
of “outstanding", “poor" and “average" performance may not be an
easy decision. Besides that, superior might also tend to judge the
work performance of their subordinates informally and arbitrarily
especially without the existence of a system of appraisal. In this
paper, we propose a performance appraisal system using
multifactorial evaluation model in dealing with appraisal grades
which are often express vaguely in linguistic terms. The proposed
model is for evaluating staff performance based on specific
performance appraisal criteria. The project was collaboration with
one of the Information and Communication Technology company in
Malaysia with reference to its performance appraisal process.
Abstract: Recently, many web services to provide information for public transport are developed and released. They are optimized for mobile devices such a smartphone. We are also developing better path planning system for route buses and trains called “Bus-Net"[1]. However these systems only provide paths and related information before the user start moving. So we propose a context aware navigation to change the way to support public transport users. If we go to somewhere using many kinds of public transport, we have to know how to use them. In addition, public transport is dynamic system, and these have different characteristic by type. So we need information at real-time. Therefore we suggest the system that can support on user-s state. It has a variety of ways to help public transport users by each state, like turn-by-turn navigation. Context aware navigation will be able to reduce anxiety for using public transport.
Abstract: The right information at the right time influences the
enterprise and technical success. Sharing knowledge among members
of a big organization may be a complex activity. And as long as the
knowledge is not shared, can not be exploited by the organization.
There are some mechanisms which can originate knowledge sharing.
It is intended, in this paper, to trigger these mechanisms by using
semantic nets. Moreover, the intersection and overlapping of terms
and sub-terms, as well as their relationships will be described through
the mereology science for the whole knowledge sharing system. It is
proposed a knowledge system to supply to operators with the right
information about a specific process and possible risks, e.g. at the
assembly process, at the right time in an automated manufacturing
environment, such as at the automotive industry.
Abstract: The goal of data mining algorithms is to discover
useful information embedded in large databases. One of the most
important data mining problems is discovery of frequently occurring
patterns in sequential data. In a multidimensional sequence each
event depends on more than one dimension. The search space is quite
large and the serial algorithms are not scalable for very large
datasets. To address this, it is necessary to study scalable parallel
implementations of sequence mining algorithms.
In this paper, we present a model for multidimensional sequence
and describe a parallel algorithm based on data parallelism.
Simulation experiments show good load balancing and scalable and
acceptable speedup over different processors and problem sizes and
demonstrate that our approach can works efficiently in a real parallel
computing environment.
Abstract: This paper presents a new approach for intelligent agent communication based on ontology for agent community. DARPA agent markup language (DAML) is used to build the community ontology. This paper extends the agent management specification by the foundation for intelligent physical agents (FIPA) to develop an agent role called community facilitator (CF) that manages community directory and community ontology. CF helps build agent community. Precise description of agent service in this community can thus be achieved. This facilitates agent communication. Furthermore, through ontology update, agents with different ontology are capable of communicating with each other. An example of advanced traveler information system is included to illustrate practicality of this approach.
Abstract: Data Structures and Algorithms is a module in most
Computer Science or Information Technology curricula. It is one of
the modules most students identify as being difficult. This paper
demonstrates how programming a solution for Sudoku can make
abstract concepts more concrete. The paper relates concepts of a
typical Data Structures and Algorithms module to a step by step
solution for Sudoku in a human type as opposed to a computer
oriented solution.
Abstract: It is difficult to judge ripeness by outward
characteristics such as size or external color. In this paper a nondestructive
method was studied to determine watermelon (Crimson
Sweet) quality. Responses of samples to excitation vibrations were
detected using laser Doppler vibrometry (LDV) technology. Phase
shift between input and output vibrations were extracted overall
frequency range. First and second were derived using frequency
response spectrums. After nondestructive tests, watermelons were
sensory evaluated. So the samples were graded in a range of ripeness
based on overall acceptability (total desired traits consumers).
Regression models were developed to predict quality using obtained
results and sample mass. The determination coefficients of the
calibration and cross validation models were 0.89 and 0.71
respectively. This study demonstrated feasibility of information
which is derived vibration response curves for predicting fruit
quality. The vibration response of watermelon using the LDV method
is measured without direct contact; it is accurate and timely, which
could result in significant advantage for classifying watermelons
based on consumer opinions.
Abstract: The emergence of networked information and communication has transformed the accessibility and delivery of scholarly information and fundamentally impacted on the processes of research and scholarly communication. The purpose of this study is to investigate disciplinary differences in the use of networked information for research and scholarly communication at Sultan Qaboos University, Oman. This study has produced quantitative data about how and why academics within different disciplines utilize networked information that is made available either internally through the university library, or externally through networked services accessed by the Internet. The results indicate some significant differences between the attitudes and practice of academics in the science disciplines when compared to those from the social sciences and humanities. While respondents from science disciplines show overall longer and more frequent use of networked information, respondents from humanities and social sciences indicated more positive attitudes and a greater degree of satisfaction toward library networked services.
Abstract: This study examines the relevance of disclosure
practices in improving the accountability and transparency of
religious nonprofit organizations (RNPOs). The assessment of
disclosure is based on the annual returns of RNPOs for the financial
year 2010. In order to quantify the information disclosed in the
annual returns, partial disclosure indexes of basic information (BI)
disclosure index, financial information (FI) disclosure index and
governance information (GI) disclosure index have been built which
takes into account the content of information items in the annual
returns. The empirical evidence obtained revealed low disclosure
practices among RNPOs in the sample. The multiple regression
results showed that the organizational attribute of the board size
appeared to be the most significant predictor for both partial index on
the extent of BI disclosure index, and FI disclosure index. On the
other hand, the extent of financial information disclosure is related to
the amount of donation received by RNPOs. On GI disclosure index,
the existence of an external audit appeared to be significant variable.
This study has contributed to the academic literature in providing
empirical evidence of the disclosure practices among RNPOs.
Abstract: The error diffusion method generates worm artifacts,
and weakens the edge of the halftone image when the continuous gray
scale image is reproduced by a binary image. First, to enhance the
edges, we propose the edge-enhancing filter by considering the
quantization error information and gradient of the neighboring pixels.
Furthermore, to remove worm artifacts often appearing in a halftone
image, we add adaptively random noise into the weights of an error
filter.
Abstract: In this paper, we evaluate the performance of some wavelet based coding algorithms such as 3D QT-L, 3D SPIHT and JPEG2K. In the first step we achieve an objective comparison between three coders, namely 3D SPIHT, 3D QT-L and JPEG2K. For this purpose, eight MRI head scan test sets of 256 x 256x124 voxels have been used. Results show superior performance of 3D SPIHT algorithm, whereas 3D QT-L outperforms JPEG2K. The second step consists of evaluating the robustness of 3D SPIHT and JPEG2K coding algorithm over wireless transmission. Compressed dataset images are then transmitted over AWGN wireless channel or over Rayleigh wireless channel. Results show the superiority of JPEG2K over these two models. In fact, it has been deduced that JPEG2K is more robust regarding coding errors. Thus we may conclude the necessity of using corrector codes in order to protect the transmitted medical information.
Abstract: Hybrid knowledge model is suggested as an underlying
framework for product development management. It can support such
hybrid features as ontologies and rules. Effective collaboration in
product development environment depends on sharing and reasoning
product information as well as engineering knowledge. Many studies
have considered product information and engineering knowledge.
However, most previous research has focused either on building the
ontology of product information or rule-based systems of engineering
knowledge. This paper shows that F-logic based knowledge model can
support such desirable features in a hybrid way.
Abstract: Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.
Abstract: Image processing for capsule endoscopy requires large
memory and it takes hours for diagnosis since operation time is
normally more than 8 hours. A real-time analysis algorithm of capsule
images can be clinically very useful. It can differentiate abnormal
tissue from health structure and provide with correlation information
among the images. Bleeding is our interest in this regard and we
propose a method of detecting frames with potential bleeding in
real-time. Our detection algorithm is based on statistical analysis and
the shapes of bleeding spots. We tested our algorithm with 30 cases of
capsule endoscopy in the digestive track. Results were excellent where
a sensitivity of 99% and a specificity of 97% were achieved in
detecting the image frames with bleeding spots.
Abstract: The application of Neural Network for disease
diagnosis has made great progress and is widely used by physicians.
An Electrocardiogram carries vital information about heart activity and physicians use this signal for cardiac disease diagnosis which
was the great motivation towards our study. In our work, tachycardia
features obtained are used for the training and testing of a Neural
Network. In this study we are using Fuzzy Probabilistic Neural
Networks as an automatic technique for ECG signal analysis. As
every real signal recorded by the equipment can have different
artifacts, we needed to do some preprocessing steps before feeding it
to our system. Wavelet transform is used for extracting the
morphological parameters of the ECG signal. The outcome of the
approach for the variety of arrhythmias shows the represented
approach is superior than prior presented algorithms with an average
accuracy of about %95 for more than 7 tachy arrhythmias.
Abstract: Earlier studies in kinship networks have primarily
focused on observing the social relationships existing between family
relatives. In this study, we pre-identified hubs in the network to
investigate if they could play a catalyst role in the transfer of physical
information. We conducted a case study of a ceremony performed in
one of the families of a small Hindu community – the Uttar Rarhi
Kayasthas. Individuals (n = 168) who resided in 11 geographically
dispersed regions were contacted through our hub-based
representation. We found that using this representation, over 98% of
the individuals were successfully contacted within the stipulated
period. The network also demonstrated a small-world property, with
an average geodesic distance of 3.56.
Abstract: Grid computing is a high performance computing
environment to solve larger scale computational applications. Grid
computing contains resource management, job scheduling, security
problems, information management and so on. Job scheduling is a
fundamental and important issue in achieving high performance in
grid computing systems. However, it is a big challenge to design an
efficient scheduler and its implementation. In Grid Computing, there
is a need of further improvement in Job Scheduling algorithm to
schedule the light-weight or small jobs into a coarse-grained or
group of jobs, which will reduce the communication time,
processing time and enhance resource utilization. This Grouping
strategy considers the processing power, memory-size and
bandwidth requirements of each job to realize the real grid system.
The experimental results demonstrate that the proposed scheduling
algorithm efficiently reduces the processing time of jobs in
comparison to others.
Abstract: Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples- personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can arise through undisciplined use and/or misuse of social media. We specifically address identity theft, misrepresentation of information posted, cyber bullying, children and social networking, and social networking in the work place. Recommendations are provided for how to reduce the risk of being the victim of a crime or engaging in embarrassing behavior that could irrevocably harm one-s reputation either professionally or personally. We also discuss what responsibilities social networking companies have to protect their users and also what law enforcement and policy makers can do to help alleviate the problems.
Abstract: Microtomographic images and thin section (TS)
images were analyzed and compared against some parameters of
geological interest such as porosity and its distribution along the
samples. The results show that microtomography (CT) analysis,
although limited by its resolution, have some interesting information
about the distribution of porosity (homogeneous or not) and can also
quantify the connected and non-connected pores, i.e., total porosity.
TS have no limitations concerning resolution, but are limited by the
experimental data available in regards to a few glass sheets for
analysis and also can give only information about the connected
pores, i.e., effective porosity. Those two methods have their own
virtues and flaws but when paired together they are able to
complement one another, making for a more reliable and complete
analysis.