Abstract: This paper explores transformation of higher
education system in Kazakhstan since 1991. The research unravels
successful experience in the field and challenges. It covers issues of institutional change, faculty, research, university, funding, standards
and leadership. The paper offers recommendations in improving state of art in higher educational institutions of Kazakhstan based on
international approaches and local realities.
Abstract: Tourism researchers have recently focused on repeat visitation as a part of destination loyalty. Different models have also considered satisfaction as the main determinant of revisit intention, while findings in many studies show it as a continuous issue. This conceptual paper attempts at evaluating recent empirical studies on satisfaction and revisit intention. Based on limitations and gaps in recent studies, the current paper suggests a new model that would be more comprehensive than those in previous studies. The new model offers new relationships between antecedents (destination image, perceived value, specific novelty seeking, and distance to destination) and both of satisfaction and revisit intention. Revisit intention in turn is suggested to be measured in a temporal approach.
Abstract: The optimization and control problem for 4D trajectories
is a subject rarely addressed in literature. In the 4D navigation
problem we define waypoints, for each mission, where the arrival
time is specified in each of them. One way to design trajectories for
achieving this kind of mission is to use the trajectory optimization
concepts. To solve a trajectory optimization problem we can use
the indirect or direct methods. The indirect methods are based on
maximum principle of Pontryagin, on the other hand, in the direct
methods it is necessary to transform into a nonlinear programming
problem. We propose an approach based on direct methods with a
pseudospectral integration scheme built on Chebyshev polynomials.
Abstract: This paper aims to describe how student satisfaction is
measured for work-based learners as these are non-traditional
learners, conducting academic learning in the workplace, typically
their curricula have a high degree of negotiation, and whose
motivations are directly related to their employers- needs, as well as
their own career ambitions. We argue that while increasing WBL
participation, and use of SSD are both accepted as being of strategic
importance to the HE agenda, the use of WBL SSD is rarely
examined, and lessons can be learned from the comparison of SSD
from a range of WBL programmes, and increased visibility of this
type of data will provide insight into ways to improve and develop
this type of delivery. The key themes that emerged from the analysis
of the interview data were: learners profiles and needs, employers
drivers, academic staff drivers, organizational approach, tools for
collecting data and visibility of findings. The paper concludes with
observations on best practice in the collection, analysis and use of
WBL SSD, thus offering recommendations for both academic
managers and practitioners.
Abstract: An approach of design of stable of control systems with ultimately wide ranges of uncertainly disturbed parameters is offered. The method relies on using of nonlinear structurally stable functions from catastrophe theory as controllers. Theoretical part presents an analysis of designed nonlinear second-order control systems. As more important the integrators in series, canonical controllable form and Jordan forms are considered. The analysis resumes that due to added controllers systems become stable and insensitive to any disturbance of parameters. Experimental part presents MATLAB simulation of design of control systems of epidemic spread, aircrafts angular motion and submarine depth. The results of simulation confirm the efficiency of offered method of design. KeywordsCatastrophes, robust control, simulation, uncertain parameters.
Abstract: In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.
Abstract: This paper explores the social and political imperatives in the sphere of public policy relating to social justice. In India, the colonial legacy and post-colonial social and political pressures sustained the appropriation of 'caste' category in allocating public resources to the backward class of citizens. For several reasons, 'economic' category could not be placed in allocating resources. This paper examines the reasons behind the deliberative exercises and formulating policies and seeks an alternative framework in realizing social justice in terms of a unified category. This attempt can be viewed as a reconciliation of traditional and modern values for a viable alternative in public policy making.
Abstract: Segmentation of a color image composed of different
kinds of regions can be a hard problem, namely to compute for an
exact texture fields. The decision of the optimum number of
segmentation areas in an image when it contains similar and/or un
stationary texture fields. A novel neighborhood-based segmentation
approach is proposed. A genetic algorithm is used in the proposed
segment-pass optimization process. In this pass, an energy function,
which is defined based on Markov Random Fields, is minimized. In
this paper we use an adaptive threshold estimation method for image
thresholding in the wavelet domain based on the generalized
Gaussian distribution (GGD) modeling of sub band coefficients. This
method called Normal Shrink is computationally more efficient and
adaptive because the parameters required for estimating the threshold
depend on sub band data energy that used in the pre-stage of
segmentation. A quad tree is employed to implement the multi
resolution framework, which enables the use of different strategies at
different resolution levels, and hence, the computation can be
accelerated. The experimental results using the proposed
segmentation approach are very encouraging.
Abstract: The binary phase-only filter digital watermarking
embeds the phase information of the discrete Fourier transform of the
image into the corresponding magnitudes for better image authentication.
The paper proposed an approach of how to implement watermark
embedding by quantizing the magnitude, with discussing how to
regulate the quantization steps based on the frequencies of the magnitude
coefficients of the embedded watermark, and how to embed the
watermark at low frequency quantization. The theoretical analysis and
simulation results show that algorithm flexibility, security, watermark
imperceptibility and detection performance of the binary phase-only
filter digital watermarking can be effectively improved with quantization
based watermark embedding, and the robustness against JPEG
compression will also be increased to some extent.
Abstract: Small and Medium Sized Enterprises (SMEs) play an important role in many economies. In New Zealand, for example, 97% of all manufacturing companies employ less than 100 staff, and generate the predominant part of this industry sector-s economic output. Manufacturing SMEs as a group also have a significant impact on the environment. This situation is similar in many developed economies, including the European Union. Sustainable economic development therefore needs to strongly consider the role of manufacturing SMEs, who generally find it challenging to move towards more environmentally friendly business practices. This paper presents a systems thinking approach to modelling and understanding the factors which have an influence on the successful uptake of environmental practices in small and medium sized manufacturing companies. It presents a number of causal loop diagrams which have been developed based on primary action research, and a thorough understanding of the literature in this area. The systems thinking model provides the basis for further development of a strategic framework for the successful uptake of environmental innovation in manufacturing SMEs.
Abstract: In this paper we propose a new approach to constructing the Delaunay Triangulation and the optimum algorithm for the case of multidimensional spaces (d ≥ 2). Analysing the modern state, it is possible to draw a conclusion, that the ideas for the existing effective algorithms developed for the case of d ≥ 2 are not simple to generalize on a multidimensional case, without the loss of efficiency. We offer for the solving this problem an effective algorithm that satisfies all the given requirements. But theoretical complexity of the problem it is impossible to improve as the Worst - Case Optimality for algorithms of solving such a problem is proved.
Abstract: Modern spatial database management systems require a unique Spatial Access Method (SAM) in order solve complex spatial quires efficiently. In this case the spatial data structure takes a prominent place in the SAM. Inadequate data structure leads forming poor algorithmic choices and forging deficient understandings of algorithm behavior on the spatial database. A key step in developing a better semantic spatial object data structure is to quantify the performance effects of semantic and outlier detections that are not reflected in the previous tree structures (R-Tree and its variants). This paper explores a novel SSRO-Tree on SAM to the Topo-Semantic approach. The paper shows how to identify and handle the semantic spatial objects with outlier objects during page overflow/underflow, using gain/loss metrics. We introduce a new SSRO-Tree algorithm which facilitates the achievement of better performance in practice over algorithms that are superior in the R*-Tree and RO-Tree by considering selection queries.
Abstract: In this paper we present a novel approach for density estimation. The proposed approach is based on using the logistic regression model to get initial density estimation for the given empirical density. The empirical data does not exactly follow the logistic regression model, so, there will be a deviation between the empirical density and the density estimated using logistic regression model. This deviation may be positive and/or negative. In this paper we use a linear combination of Gaussian (LCG) with positive and negative components as a model for this deviation. Also, we will use the expectation maximization (EM) algorithm to estimate the parameters of LCG. Experiments on real images demonstrate the accuracy of our approach.
Abstract: This paper presents a software quality support tool, a
Java source code evaluator and a code profiler based on
computational intelligence techniques. It is Java prototype software
developed by AI Group [1] from the Research Laboratories at
Universidad de Palermo: an Intelligent Java Analyzer (in Spanish:
Analizador Java Inteligente, AJI). It represents a new approach to
evaluate and identify inaccurate source code usage and transitively,
the software product itself.
The aim of this project is to provide the software development
industry with a new tool to increase software quality by extending
the value of source code metrics through computational intelligence.
Abstract: Re-entrant scheduling is an important search problem
with many constraints in the flow shop. In the literature, a number of
approaches have been investigated from exact methods to
meta-heuristics. This paper presents a genetic algorithm that encodes
the problem as multi-level chromosomes to reflect the dependent
relationship of the re-entrant possibility and resource consumption.
The novel encoding way conserves the intact information of the data
and fastens the convergence to the near optimal solutions. To test the
effectiveness of the method, it has been applied to the
resource-constrained re-entrant flow shop scheduling problem.
Computational results show that the proposed GA performs better than
the simulated annealing algorithm in the measure of the makespan
Abstract: In this paper, based on almost periodic functional hull theory and M-matrix theory, some sufficient conditions are established for the existence and uniqueness of positive almost periodic solution for a class of BAM neural networks with time-varying delays. An example is given to illustrate the main results.
Abstract: Frauds in insurance industry are one of the major
sources of operational risk of insurance companies and constitute a
significant portion of their losses. Every reasonable company on the
market aims for improving their processes of uncovering frauds and
invests their resources to reduce them. This article is addressing fraud
management area from the view of extension of existing Business
Intelligence solution. We describe the frame of such solution and
would like to share with readers all benefits brought to insurance
companies by adopting this approach in their fight against insurance
frauds.
Abstract: Metal cutting is a severe plastic deformation process
involving large strains, high strain rates, and high temperatures.
Conventional analysis of the chip formation process is based on bulk
material deformation disregarding the inhomogeneous nature of the
material microstructure. A series of orthogonal cutting tests of AISI
1045 and 1144 steel were conducted which yielded similar process
characteristics and chip formations. With similar shear angles and cut
chip thicknesses, shear strains for both chips were found to range
from 2.0 up to 2.8. The manganese-sulfide (MnS) precipitate in the
1144 steel has a very distinct and uniform shape which allows for
comparison before and after chip formation. From close observations
of MnS precipitates in the cut chips it is shown that the conventional
approach underestimates plastic strains in metal cutting.
Experimental findings revealed local shear strains around a value of
6. These findings and their implications are presented and discussed.
Abstract: CO2 is the primary anthropogenic greenhouse gas,
accounting for 77% of the human contribution to the greenhouse
effect in 2004. In the recent years, global concentration of CO2 in the
atmosphere is increasing rapidly. CO2 emissions have an impact on
global climate change. Anthropogenic CO2 is emitted primarily from
fossil fuel combustion. Carbon capture and storage (CCS) is one
option for reducing CO2 emissions. There are three major approaches
for CCS: post-combustion capture, pre-combustion capture and
oxyfuel process. Post-combustion capture offers some advantages as
existing combustion technologies can still be used without radical
changes on them.
There are several post combustion gas separation and capture
technologies being investigated, namely; (a) absorption, (b)
cryogenic separation, (c) membrane separation (d) micro algal biofixation
and (e) adsorption. Apart from establishing new techniques,
the exploration of capture materials with high separation performance
and low capital cost are paramount importance. However, the
application of adsorption from either technology, require easily
regenerable and durable adsorbents with a high CO2 adsorption
capacity. It has recently been reported that the cost of the CO2
capture can be reduced by using this technology. In this paper, the
research progress (from experimental results) in adsorbents for CO2
adsorption, storage, and separations were reviewed and future
research directions were suggested as well.
Abstract: Software engineering education not only embraces
technical skills of software development but also necessitates
communication and interaction among learners. In this paper, it is
proposed to adapt the PBL methodology that is especially designed to
be integrated into software engineering classroom in order to promote
collaborative learning environment. This approach helps students
better understand the significance of social aspects and provides a
systematic framework to enhance teamwork skills. The adaptation of
PBL facilitates the transition to an innovative software development
environment where cooperative learning can be actualized.