Abstract: The growth and interconnection of power networks in many regions has invited complicated techniques for energy management services (EMS). State estimation techniques become a powerful tool in power system control centers, and that more information is required to achieve the objective of EMS. For the online state estimator, assuming the continuous time is equidistantly sampled with period Δt, processing events must be finished within this period. Advantage of Kalman Filtering (KF) algorithm in using system information to improve the estimation precision is utilized. Computational power is a major issue responsible for the achievement of the objective, i.e. estimators- solution at a small sampled period. This paper presents the optimum utilization of processors in a state estimator based on KF. The model used is presented using Petri net (PN) theory.
Abstract: Professional development is the focus of this study. It
reports on questionnaire data that examined the perceived
effectiveness of the Train the Trainer model of technology
professional development for elementary teachers. Eighty-three
selected teachers called Information Technology Coaches received
four half-day and one after-school in-service sessions. Subsequently,
coaches shared the information and skills acquired during training
with colleagues. Results indicated that participants felt comfortable
as Information Technology Coaches and felt well prepared because
of their technological professional development. Overall, participants
perceived the Train the Trainer model to be effective. The outcomes
of this study suggest that the use of the Train the Trainer model, a
known professional development model, can be an integral and
interdependent component of the newer more comprehensive
learning community professional development model.
Abstract: An effective method for the early detection of breast
cancer is the mammographic screening. One of the most important
signs of early breast cancer is the presence of microcalcifications. For
the detection of microcalcification in a mammography image, we
propose to conceive a multiagent system based on a dual irregular
pyramid.
An initial segmentation is obtained by an incremental approach;
the result represents level zero of the pyramid. The edge information
obtained by application of the Canny filter is taken into account to
affine the segmentation. The edge-agents and region-agents cooper
level by level of the pyramid by exploiting its various characteristics
to provide the segmentation process convergence.
Abstract: Logic based methods for learning from structured data
is limited w.r.t. handling large search spaces, preventing large-sized
substructures from being considered by the resulting classifiers. A
novel approach to learning from structured data is introduced that
employs a structure transformation method, called finger printing, for
addressing these limitations. The method, which generates features
corresponding to arbitrarily complex substructures, is implemented in
a system, called DIFFER. The method is demonstrated to perform
comparably to an existing state-of-art method on some benchmark
data sets without requiring restrictions on the search space.
Furthermore, learning from the union of features generated by finger
printing and the previous method outperforms learning from each
individual set of features on all benchmark data sets, demonstrating
the benefit of developing complementary, rather than competing,
methods for structure classification.
Abstract: Climate change and environmental pressures are
major international issues nowadays. It is time when governments,
businesses and consumers have to respond through more
environmentally friendly and aware practices, products and policies.
This is the prime time to develop alternative sustainable construction
materials, reduce greenhouse gas emissions, save energy, look to
renewable energy sources and recycled materials, and reduce waste.
The utilization of waste materials (slag, fly ash, glass beads, plastic
and so on) in concrete manufacturing is significant due to its
engineering, financial, environmental and ecological benefits. Thus,
utilization of waste materials in concrete production is very much
helpful to reach the goal of the sustainable construction. Therefore,
this study intends to use glass beads in concrete production.
The paper reports on the performance of 9 different concrete
mixes containing different ratios of glass crushed to 5 mm - 20 mm
maximum size and glass marble of 20 mm size as coarse aggregate.
Ordinary Portland cement type 1 and fine sand less than 0.5 mm were
used to produce standard concrete cylinders. Compressive strength
tests were carried out on concrete specimens at various ages. Test
results indicated that the mix having the balanced ratio of glass beads
and round marbles possess maximum compressive strength which is
3889 psi, as glass beads perform better in bond formation but have
lower strength, on the other hand marbles are strong in themselves
but not good in bonding. These mixes were prepared following a
specific W/C and aggregate ratio; more strength can be expected to
achieve from different W/C, aggregate ratios, adding admixtures like
strength increasing agents, ASR inhibitor agents etc.
Abstract: The urban transformation processes in its framework
and its general significance became a fundamental and vital subject
of consideration for both the developed and the developing societies.
It has become important to regulate the architectural systems adopted
by the city, to sustain the present development on one hand, and on
the other hand, to facilitate its future growth.
Thus, the study dealt with the phenomenon of urban
transformation of the Mediterranean cities, and the city of Alexandria
in particular, because of its significant historical and cultural legacy,
its historical architecture and its contemporary urbanization.
This article investigates the entirety of cities in the Mediterranean
region through the analysis of the relationship between inflation and
growth of these cities and the extent of the complexity of the city
barriers. We hope to analyze not only the internal transformations,
but the external relationships (both imperial and post-colonial) that
have shaped Alexandria city growth from the nineteenth century until
today.
Abstract: In this article, some methods are mentioned for developing the theatrical language by giving information of “theatrical language" since the arising of the language in obsolete terms, and today, and also by examining the problems. Being able to talk meaningfully in the theater stage is a skillful art. Maybe, to be able to convey the idea of the poet, his/her world outlook and his/her feelings from the bottom of the heart as such, also conveying the speech norms without breaking them to the ear of audience in a fascinating way in adverse of a repellent way is the most difficult one. Because of this, “the word is the mirror of the idea". The importance of the theatrical language should not be perceived as only a post, it is “as the yarn that the culture carpet is weaved from". Thereby, it is a tool which transposes our culture and our life style from generation to generation. At the time of creativeness, the “word" comes out from the poet, “the word and feeling" art comes out from the actor. If it was not so, the audience could read the texts of the work himself/herself instead of going to the theater in order to see the performance. The fundamental works by the Turkish, Kazakh and English scientists have been taken as a basis for the research done.
Abstract: In this paper we propose a new content-weighted
method for full reference (FR) video quality control using a region of
interest (ROI) and wherein two-component weighted metrics for Deaf
People Video Communication. In our approach, an image is
partitioned into region of interest and into region "dry-as-dust", then
region of interest is partitioned into two parts: edges and background
(smooth regions), while the another methods (metrics) combined and
weighted three or more parts as edges, edges errors, texture, smooth
regions, blur, block distance etc. as we proposed. Using another idea
that different image regions from deaf people video communication
have different perceptual significance relative to quality. Intensity
edges certainly contain considerable image information and are
perceptually significant.
Abstract: In this paper, numerical simulations are performed to investigate the effect of disturbance block on flow field of the classical square lid-driven cavity. Attentions are focused on vortex formation and studying the effect of block position on its structure. Corner vortices are different upon block position and new vortices are produced because of the block. Finite volume method is used to solve Navier-Stokes equations and PISO algorithm is employed for the linkage of velocity and pressure. Verification and grid independency of results are reported. Stream lines are sketched to visualize vortex structure in different block positions.
Abstract: The trend in the world of Information Technology
(IT) is getting increasingly large and difficult projects rather than
smaller and easier. However, the data on large-scale IT project
success rates provide cause for concern. This paper seeks to answer
why large-scale IT projects are different from and more difficult than
other typical engineering projects. Drawing on the industrial
experience, a compilation of the conditions that influence failure is
presented. With a view to improve success rates solutions are
suggested.
Abstract: The development of distributed systems has been affected by the need to accommodate an increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is emerging as an alternative to build a smart generation of highly distributed systems. In this work, we investigate the performance aspect of agent-based technologies for information retrieval. We present a comparative performance evaluation model of Mobile Agents versus Remote Method Invocation by means of an analytical approach. We demonstrate the effectiveness of mobile agents for dynamic code deployment and remote data processing by reducing total latency and at the same time producing minimum network traffic. We argue that exploiting agent-based technologies significantly enhances the performance of distributed systems in the domain of information retrieval.
Abstract: The purpose of this paper is to analyze determinants of
information security affecting adoption of the Web-based integrated
information systems (IIS). We introduced Web-based information
systems which are designed to formulate strategic plans for Peruvian
government. Theoretical model is proposed to test impact of
organizational factors (deterrent efforts and severity; preventive
efforts) and individual factors (information security threat; security
awareness) on intentions to proactively use the Web-based IIS .Our
empirical study results highlight that deterrent efforts and deterrent
severity have no significant influence on the proactive use intentions
of IIS, whereas, preventive efforts play an important role in proactive
use intentions of IIS. Thus, we suggest that organizations need to do
preventive efforts by introducing various information security
solutions, and try to improve information security awareness while
reducing the perceived information security threats.
Abstract: Address Matching is an important application of
Geographic Information System (GIS). Prior to Address Matching
working, obtaining X,Y coordinates is necessary, which process is
calling Address Geocoding. This study will illustrate the effective
address geocoding process of using household registry database, and
the check system for geocoded address.
Abstract: Various security APIs (Application Programming
Interfaces) are being used in a variety of application areas requiring
the information security function. However, these standards are not
compatible, and the developer must use those APIs selectively
depending on the application environment or the programming
language. To resolve this problem, we propose the standard draft of
the information security component, while SSL (Secure Sockets
Layer) using the confidentiality and integrity component interface has
been implemented to verify validity of the standard proposal. The
implemented SSL uses the lower-level SSL component when
establishing the RMI (Remote Method Invocation) communication
between components, as if the security algorithm had been
implemented by adding one more layer on the TCP/IP.
Abstract: There are various kinds of medical equipment which
requires relatively accurate positional adjustments for successful
treatment. However, patients tend to move without notice during a
certain span of operations. Therefore, it is common practice that
accompanying operators adjust the focus of the equipment. In this
paper, tracking controllers for medical equipment are suggested to
replace the operators. The tracking controllers use AHRS sensor
information to recognize the movements of patients. Sensor fusion is
applied to reducing the error magnitudes through linear Kalman filters.
The image processing of optical markers is included to adjust the
accumulation errors of gyroscope sensor data especially for yaw
angles.
The tracking controller reduces the positional errors between the
current focus of a device and the target position on the body of a
patient. Since the sensing frequencies of AHRS sensors are very high
compared to the physical movements, the control performance is
satisfactory. The typical applications are, for example, ESWT or
rTMS, which have the error ranges of a few centimeters.
Abstract: We present here the results for a comparative study of
some techniques, available in the literature, related to the relevance
feedback mechanism in the case of a short-term learning. Only one
method among those considered here is belonging to the data mining
field which is the K-nearest neighbors algorithm (KNN) while the
rest of the methods is related purely to the information retrieval field
and they fall under the purview of the following three major axes:
Shifting query, Feature Weighting and the optimization of the
parameters of similarity metric. As a contribution, and in addition to
the comparative purpose, we propose a new version of the KNN
algorithm referred to as an incremental KNN which is distinct from
the original version in the sense that besides the influence of the
seeds, the rate of the actual target image is influenced also by the
images already rated. The results presented here have been obtained
after experiments conducted on the Wang database for one iteration
and utilizing color moments on the RGB space. This compact
descriptor, Color Moments, is adequate for the efficiency purposes
needed in the case of interactive systems. The results obtained allow
us to claim that the proposed algorithm proves good results; it even
outperforms a wide range of techniques available in the literature.
Abstract: Recently, a great number of theoretical frameworks
have been proposed to develop the linkages between knowledge
management (KM) and organizational strategies. However, while
there has been much theorizing and case study in the area, validated
research models integrating KM and information technology
strategies for empirical testing of these theories have been scarce. In
this research, we try to develop a research model for explaining the
relationship between KM strategy and IT strategy and their effects on
performance. Finally, meaningful propositions and conclusions are
derived, and suggestions for future research are proposed and
discussed.
Abstract: The conjugate gradient optimization algorithm is combined with the modified back propagation algorithm to yield a computationally efficient algorithm for training multilayer perceptron (MLP) networks (CGFR/AG). The computational efficiency is enhanced by adaptively modifying initial search direction as described in the following steps: (1) Modification on standard back propagation algorithm by introducing a gain variation term in the activation function, (2) Calculation of the gradient descent of error with respect to the weights and gains values and (3) the determination of a new search direction by using information calculated in step (2). The performance of the proposed method is demonstrated by comparing accuracy and computation time with the conjugate gradient algorithm used in MATLAB neural network toolbox. The results show that the computational efficiency of the proposed method was better than the standard conjugate gradient algorithm.
Abstract: Software reuse can be considered as the most realistic
and promising way to improve software engineering productivity and
quality. Automated assistance for software reuse involves the
representation, classification, retrieval and adaptation of components.
The representation and retrieval of components are important to
software reuse in Component-Based on Software Development
(CBSD). However, current industrial component models mainly focus
on the implement techniques and ignore the semantic information
about component, so it is difficult to retrieve the components that
satisfy user-s requirements. This paper presents a method of business
component retrieval based on specification matching to solve the
software reuse of enterprise information system. First, a business
component model oriented reuse is proposed. In our model, the
business data type is represented as sign data type based on XML,
which can express the variable business data type that can describe the
variety of business operations. Based on this model, we propose
specification match relationships in two levels: business operation
level and business component level. In business operation level, we
use input business data types, output business data types and the
taxonomy of business operations evaluate the similarity between
business operations. In the business component level, we propose five
specification matches between business components. To retrieval
reusable business components, we propose the measure of similarity
degrees to calculate the similarities between business components.
Finally, a business component retrieval command like SQL is
proposed to help user to retrieve approximate business components
from component repository.
Abstract: Lacking an inherent “natural" dissimilarity measure
between objects in categorical dataset presents special difficulties in
clustering analysis. However, each categorical attributes from a given
dataset provides natural probability and information in the sense of
Shannon. In this paper, we proposed a novel method which
heuristically converts categorical attributes to numerical values by
exploiting such associated information. We conduct an experimental
study with real-life categorical dataset. The experiment demonstrates
the effectiveness of our approach.