Abstract: A seismic isolation pad produced by utilizing the scrap
tire rubber which contains interleaved steel reinforcing cords has been
proposed. The steel cords are expected to function similar to the steel
plates used in conventional laminated rubber bearings. The scrap tire
rubber pad (STRP) isolator is intended to be used in low rise
residential buildings of highly seismic areas of the developing
countries. Experimental investigation was conducted on unbonded
STRP isolators, and test results provided useful information including
stiffness, damping values and an eventual instability of the isolation
unit. Finite element analysis (FE analysis) of STRP isolator was
carried out on properly bonded samples. These types of isolators
provide positive incremental force resisting capacity up to shear strain
level of 155%. This paper briefly discusses the force deformation
behavior of bonded STRP isolators including stability of the isolation
unit.
Abstract: In the current age, retrieval of relevant information
from massive amount of data is a challenging job. Over the years,
precise and relevant retrieval of information has attained high
significance. There is a growing need in the market to build systems,
which can retrieve multimedia information that precisely meets the
user's current needs. In this paper, we have introduced a framework
for refining query results before showing it to the user, using ambient
intelligence, user profile, group profile, user location, time, day, user
device type and extracted features. A prototypic tool was also
developed to demonstrate the efficiency of the proposed approach.
Abstract: Multicast transmissions allow an host (the source) to send only one flow bound for a group of hosts (the receivers). Any equipment eager to belong to the group may explicitly register itself to that group via its multicast router. This router will be given the responsibility to convey all information relating to the group to all registered hosts. However in an environment in which the final receiver or the source frequently moves, the multicast flows need particular treatment. This constitutes one of the multicast transmissions problems around which several proposals were made in the Mobile IPv6 case in general. In this article, we describe the problems involved in this IPv6 multicast mobility and the existing proposals for their resolution. Then architecture will be proposed aiming to satisfy and optimize these transmissions in the specific case of a mobile multicast receiver in NC-HMIPv6 environment.
Abstract: Knowledge sharing enables the information or
knowledge to be transmitted from one source to another. This paper
demonstrates the needs of having the online book catalogue which
can be used to facilitate disseminating information on textbook used
in the university. This project is aimed to give access to the students
and lecturers to the list of books in the bookstore and at the same
time to allow book reviewing without having to visit the bookstore
physically. Research is carried out according to the boundaries which
accounts to current process of new book purchasing, current system
used by the bookstore and current process the lecturers go through
for reviewing textbooks. The questionnaire is used to gather the
requirements and it is distributed to 100 students and 40 lecturers.
This project has enabled the improvement of a manual process to be
carried out automatically, through a web based platform. It is shown
based on the user acceptance survey carried out that target groups
found that this web service is feasible to be implemented in
Universiti Teknologi PETRONAS (UTP), and they have shown
positive signs of interest in utilizing it in the future.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: The world is moving rapidly toward the deployment
of information and communication systems. Nowadays, computing
systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in
development process of computing systems, specially in developing
systems such as banking, military and e-business systems. For
developing every system, a process model which includes a process,
methods and tools is chosen. The Rational Unified Process (RUP) is
one of the most popular and complete process models which is used
by developers in recent years. This process model should be extended to be used in developing secure software systems. In this
paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles,
and Artifacts to RUP in order to capture, document and model threats
and security requirements of system. These extensions introduce a
group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are
captured and modeled. These models are used in design, implementation and test activitie
Abstract: 20 years of dentistry was a period of transition from
communist to market economy but Romanian doctors have
insufficient management knowledge. Recently, the need for modern
management has increased due to technologies and superior materials
appearance, as patient-s demands.
Research goal is to increase efficiency by evaluating dental
medical office cost categories in real pricing procedures.
Empirical research is based on guided study that includes
information about the association between categories of cost
perception and therapeutic procedures commonly used in dental
offices.
Due to the obtained results to identify all the labours that make up
a settled procedure costs were determined for each procedure.
Financial evaluation software was created with the main functions:
introducing and maintaining patient records, treatment and
appointments made, procedures cost and monitoring office
productivity.
We believe that the study results can significantly improve the
financial management of dental offices, increasing the effectiveness
and quality of services.
Abstract: The implementation of electronic government started since the initiation of Multimedia Super Corridor (MSC) by the Malaysia government. The introduction of ICT in the public sector especially e-Government initiatives opens up a new book in the government administration throughout the world. The aim or this paper is to discuss the implementation of e-government in Malaysia, covering the result of public user self assessment on Malaysia's electronic government applications. E-services, e-procurement, Generic Office Environment (GOE), Human Resources Management Information System (HRMIS), Project Monitoring System (PMS), Electronic Labor Exchange (ELX) and e-syariah(religion) were the seven flagship application assessed. The study adopted a crosssectional survey research approach and information system literature were used. The analysis was done for 35 responden in pilot test and there was evidence from public user's perspective to suggest that the e-government applications were generally successful.
Abstract: The introduction of haptic elements in a graphic user interfaces are becoming more widespread. Since haptics are being introduced rapidly into computational tools, investigating how these models affect Human-Computer Interaction would help define how to integrate and model new modes of interaction. The interest of this paper is to discuss and investigate the issues surrounding Haptic and Graphic User Interface designs (GUI) as separate systems, as well as understand how these work in tandem. The development of these systems is explored from a psychological perspective, based on how usability is addressed through learning and affordances, defined by J.J. Gibson. Haptic design can be a powerful tool, aiding in intuitive learning. The problems discussed within the text is how can haptic interfaces be integrated within a GUI without the sense of frivolity. Juxtaposing haptics and Graphic user interfaces has issues of motivation; GUI tends to have a performatory process, while Haptic Interfaces use affordances to learn tool use. In a deeper view, it is noted that two modes of perception, foveal and ambient, dictate perception. These two modes were once thought to work in tandem, however it has been discovered that these processes work independently from each other. Foveal modes interpret orientation is space which provide for posture, locomotion, and motor skills with variations of the sensory information, which instructs perceptions of object-task performance. It is contended, here, that object-task performance is a key element in the use of Haptic Interfaces because exploratory learning uses affordances in order to use an object, without meditating an experience cognitively. It is a direct experience that, through iteration, can lead to skill-sets. It is also indicated that object-task performance will not work as efficiently without the use of exploratory or kinesthetic learning practices. Therefore, object-task performance is not as congruently explored in GUI than it is practiced in Haptic interfaces.
Abstract: On-line handwritten scripts are usually dealt with pen tip traces from pen-down to pen-up positions. Time evaluation of the pen coordinates is also considered along with trajectory information. However, the data obtained needs a lot of preprocessing including filtering, smoothing, slant removing and size normalization before recognition process. Instead of doing such lengthy preprocessing, this paper presents a simple approach to extract the useful character information. This work evaluates the use of the counter- propagation neural network (CPN) and presents feature extraction mechanism in full detail to work with on-line handwriting recognition. The obtained recognition rates were 60% to 94% using the CPN for different sets of character samples. This paper also describes a performance study in which a recognition mechanism with multiple thresholds is evaluated for counter-propagation architecture. The results indicate that the application of multiple thresholds has significant effect on recognition mechanism. The method is applicable for off-line character recognition as well. The technique is tested for upper-case English alphabets for a number of different styles from different peoples.
Abstract: An on-line condition monitoring method for transmission line is proposed using electrical circuit theory and IT technology in this paper. It is reasonable that the circuit parameters such as resistance (R), inductance (L), conductance (g) and capacitance (C) of a transmission line expose the electrical conditions and physical state of the line. Those parameters can be calculated from the linear equation composed of voltages and currents measured by synchro-phasor measurement technique at both end of the line. A set of linear voltage drop equations containing four terminal constants (A, B ,C ,D ) are mathematical models of the transmission line circuits. At least two sets of those linear equations are established from different operation condition of the line, they may mathematically yield those circuit parameters of the line. The conditions of line connectivity including state of connecting parts or contacting parts of the switching device may be monitored by resistance variations during operation. The insulation conditions of the line can be monitored by conductance (g) and capacitance(C) measurements. Together with other condition monitoring devices such as partial discharge, sensors and visual sensing device etc.,they may give useful information to monitor out any incipient symptoms of faults. The prototype of hardware system has been developed and tested through laboratory level simulated transmission lines. The test has shown enough evident to put the proposed method to practical uses.
Abstract: Nowadays, one of the most important problems of the
metropolises and the world large cities is the habitant traffic difficulty
and lack of sufficient parking site for the vehicles. Esfahan city as the
third metropolis of Iran has encountered with the vehicles parkingplace
problems in the most parts of fourteen regions of the city. The
non principled and non systematic dispersal and lack of parking sites
in the city has created an unfavorable status for its traffic and has
caused the air and sound pollutions increase; in addition, it wastes the
most portions of the citizenship and travelers' charge and time in
urban pathways and disturbs their mental and psychical calmness,
thus leads to their intensive dissatisfaction. In this study, by the usage
of AHP model in GIS environment, the effective criteria in selecting
the public parking sites have been combined with each other, and the
results of the created layers overlapping represent the parking
utilitarian vastness and widths. The achieved results of this research
indicate the pretty appropriate public parking sites selection in region
number 3 of Esfahan; but inconsequential dispersal and lack of these
parking sites in this region have caused abundant transportation
problems in Esfahan city.
Abstract: Nowadays predicting political risk level of country
has become a critical issue for investors who intend to achieve
accurate information concerning stability of the business
environments. Since, most of the times investors are layman and
nonprofessional IT personnel; this paper aims to propose a
framework named GECR in order to help nonexpert persons to
discover political risk stability across time based on the political
news and events.
To achieve this goal, the Bayesian Networks approach was
utilized for 186 political news of Pakistan as sample dataset.
Bayesian Networks as an artificial intelligence approach has been
employed in presented framework, since this is a powerful technique
that can be applied to model uncertain domains. The results showed
that our framework along with Bayesian Networks as decision
support tool, predicted the political risk level with a high degree of
accuracy.
Abstract: Needs of an efficient information retrieval in recent
years in increased more then ever because of the frequent use of
digital information in our life. We see a lot of work in the area of
textual information but in multimedia information, we cannot find
much progress. In text based information, new technology of data
mining and data marts are now in working that were started from the
basic concept of database some where in 1960.
In image search and especially in image identification,
computerized system at very initial stages. Even in the area of image
search we cannot see much progress as in the case of text based
search techniques. One main reason for this is the wide spread roots
of image search where many area like artificial intelligence,
statistics, image processing, pattern recognition play their role. Even
human psychology and perception and cultural diversity also have
their share for the design of a good and efficient image recognition
and retrieval system.
A new object based search technique is presented in this paper
where object in the image are identified on the basis of their
geometrical shapes and other features like color and texture where
object-co-relation augments this search process.
To be more focused on objects identification, simple images are
selected for the work to reduce the role of segmentation in overall
process however same technique can also be applied for other
images.
Abstract: Because of its global reach, reduction of time
restraints, and ability to reduce costs and increase sales, use of the
Internet, the World Wide Web (WWW), and related technologies
can be a competitive tool in the arsenal of small and medium-sized
enterprises (SMEs). Countries the world over are interested in the
successful adoption of the Internet by SMEs. Because a vast
majority of jobs come from that sector, greater financial success of
SMEs translates into greater job growth and, subsequently, higher
tax revenue to the government. This research investigated the level
of Internet usage for business solutions by small and medium
enterprises in Jordan. Through the survey of a random sample of
100 firms with less than 500 employees and from data obtained
from this survey that formed the basis for our study, we found that
a majority of respondents use the Internet in business activities ,
the adoption of the Internet as a business tool is limited to a
brochure where Web site which primarily provides one way. As
such, there wasn't interactive information about the company and
its products and services.
Abstract: In a competitive energy market, system reliability
should be maintained at all times. Power system operation being of
online in nature, the energy balance requirements must be satisfied to
ensure reliable operation the system. To achieve this, information
regarding the expected status of the system, the scheduled
transactions and the relevant inputs necessary to make either a
transaction contract or a transmission contract operational, have to be
made available in real time. The real time procedure proposed,
facilitates this. This paper proposes a quadratic curve learning
procedure, which enables a generator-s contribution to the retailer
demand, power loss of transaction in a line at the retail end and its
associated losses for an oncoming operating scenario to be predicted.
Matlab program was used to test in on a 24-bus IEE Reliability Test
System, and the results are found to be acceptable.
Abstract: Active research is underway on virtual touch screens
that complement the physical limitations of conventional touch
screens. This paper discusses a virtual touch screen that uses a
multi-layer perceptron to recognize and control three-dimensional
(3D) depth information from a time of flight (TOF) camera. This
system extracts an object-s area from the image input and compares it
with the trajectory of the object, which is learned in advance, to
recognize gestures. The system enables the maneuvering of content in
virtual space by utilizing human actions.
Abstract: This study proposes novel hybrid social network analysis and collaborative filtering approach to enhance the performance of recommender systems. The proposed model selects subgroups of users in Internet community through social network analysis (SNA), and then performs clustering analysis using the information about subgroups. Finally, it makes recommendations using cluster-indexing CF based on the clustering results. This study tries to use the cores in subgroups as an initial seed for a conventional clustering algorithm. This model chooses five cores which have the highest value of degree centrality from SNA, and then performs clustering analysis by using the cores as initial centroids (cluster centers). Then, the model amplifies the impact of friends in social network in the process of cluster-indexing CF.
Abstract: The leisure boatbuilding industry has tight profit margins that demand that boats are created to a high quality but with low cost. This requirement means reduced design times combined with increased use of design for production can lead to large benefits. The evolutionary nature of the boatbuilding industry can lead to a large usage of previous vessels in new designs. With the increase in automated tools for concurrent engineering within structural design it is important that these tools can reuse this information while subsequently feeding this to designers. The ability to accurately gather this materials and parts data is also a key component to these tools. This paper therefore aims to develop an architecture made up of neural networks and databases to feed information effectively to the designers based on previous design experience.
Abstract: The aim of this study is to compare the innovativeness, risk taking, and focusing on opportunity of the nurse managers and nurses. The data are collected from nurse managers and nurses in Ondokuz Mayıs University, Faculty of Medicine Hospital and Karadeniz Technical University, Faculty of Medicine Hospital. The study sample consisted of 151 participants, 76 nurse managers (50.3%) and 75 nurses (49.7%). All participants have been assessed by Participant Information Form and Corporate Entrepreneurship Scale. In data analysis, independent t-test has applied. The results show that there are significant differences between nurse managers and nurses on innovativeness (t = 2.42, p < 0.05), risk taking (t = 3.62, p < 0.01), and focusing on opportunity (t = 2.16, p < 0.05). Consequently, it can be said that nurse managers have more innovativeness than nurses and tend to take more risks and focus more on opportunities.