Abstract: The shortest path question is in a graph theory model
question, and it is applied in many fields. The most short-path
question may divide into two kinds: Single sources most short-path,
all apexes to most short-path. This article mainly introduces the
problem of all apexes to most short-path, and gives a new parallel
algorithm of all apexes to most short-path according to the Dijkstra
algorithm. At last this paper realizes the parallel algorithms in the
technology of C # multithreading.
Abstract: Recommender systems are usually regarded as an
important marketing tool in the e-commerce. They use important
information about users to facilitate accurate recommendation. The
information includes user context such as location, time and interest
for personalization of mobile users. We can easily collect information
about location and time because mobile devices communicate with the
base station of the service provider. However, information about user
interest can-t be easily collected because user interest can not be
captured automatically without user-s approval process. User interest
usually represented as a need. In this study, we classify needs into two
types according to prior research. This study investigates the
usefulness of data mining techniques for classifying user need type for
recommendation systems. We employ several data mining techniques
including artificial neural networks, decision trees, case-based
reasoning, and multivariate discriminant analysis. Experimental
results show that CHAID algorithm outperforms other models for
classifying user need type. This study performs McNemar test to
examine the statistical significance of the differences of classification
results. The results of McNemar test also show that CHAID performs
better than the other models with statistical significance.
Abstract: The incessant discomfort for Voluntary Counselling and Testing (VCT) exhibited by students in some tertiary institutions in Kano State, Nigeria is capable of causing Psychological Resistance as well as jeopardizing the purpose of HIV intervention. This study investigated the Prevalence of Psychological Resistance to VCT of HIV/AIDS among students of tertiary institutions in the state. Two null hypotheses were postulated and tested. Cross- Sectional Survey Design was employed in which 1512 sample was selected from a student population of 104,841 following Stratified Random Sampling technique. A self-developed 20-item scale whose reliability coefficient is 0.83 was used for data collection. Data analyzed via Chi-square and t-test reveals a prevalence of 38% with males (Mean=0.34; SD=0.475) constituting 60% and females (Mean=0.45; SD=0.498) 40%. Also, the calculated chi-square and ttest were not significant at 0.05 as such the null hypotheses were upheld. Recommendation offered suggests the use of reinforcement and social support for students who patronize HIV/AIDS counselling.
Abstract: The city of Suceava, one of the most important
medieval capital of Moldova, owes its urban genesis to the power
center established in its territory at the turn of the thirteenth and
fourteenth centuries. Freed from the effective control exercised by
the Emir Nogai through Alanians, the local center of power evolved
as the main representative of the interests of indigenous people in
relation to the Hungarian Angevin dinasty and to their
representatives from Maramures. From this perspective, the political
and military role of the settlement of Suceava was archeologically
proved by the discovery of extensive fortifications, unrivaled in the
first half of the XIVth century-s Moldavia. At the end of that century,
voivod Peter I decides to move the capital of the state from Siret to
Suceava. That option stimulated the development of the settlement
on specific urban coordinates.
Abstract: As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.
Abstract: Let p be a prime number, Fp be a finite field and t ∈ F*p= Fp- {0}. In this paper we obtain some properties of ellipticcurves Ep,t: y2= y2= x3- t2x over Fp. In the first sectionwe give some notations and preliminaries from elliptic curves. In the second section we consider the rational points (x, y) on Ep,t. Wegive a formula for the number of rational points on Ep,t over Fnp for an integer n ≥ 1. We also give some formulas for the sum of x?andy?coordinates of the points (x, y) on Ep,t. In the third section weconsider the rank of Et: y2= x3- t2x and its 2-isogenous curve Et over Q. We proved that the rank of Etand Etis 2 over Q. In the last section we obtain some formulas for the sums Σt∈F?panp,t for an integer n ≥ 1, where ap,t denote the trace of Frobenius.
Abstract: Collateralized Debt Obligations are not as widely used
nowadays as they were before 2007 Subprime crisis. Nonetheless
there remains an enthralling challenge to optimize cash flows
associated with synthetic CDOs. A Gaussian-based model is used
here in which default correlation and unconditional probabilities of
default are highlighted. Then numerous simulations are performed
based on this model for different scenarios in order to evaluate the
associated cash flows given a specific number of defaults at different
periods of time. Cash flows are not solely calculated on a single
bought or sold tranche but rather on a combination of bought and
sold tranches. With some assumptions, the simplex algorithm gives
a way to find the maximum cash flow according to correlation of
defaults and maturities. The used Gaussian model is not realistic in
crisis situations. Besides present system does not handle buying or
selling a portion of a tranche but only the whole tranche. However the
work provides the investor with relevant elements on how to know
what and when to buy and sell.
Abstract: Computing and maintaining network structures for efficient
data aggregation incurs high overhead for dynamic events
where the set of nodes sensing an event changes with time. Moreover,
structured approaches are sensitive to the waiting time that is used
by nodes to wait for packets from their children before forwarding
the packet to the sink. An optimal routing and data aggregation
scheme for wireless sensor networks is proposed in this paper. We
propose Tree on DAG (ToD), a semistructured approach that uses
Dynamic Forwarding on an implicitly constructed structure composed
of multiple shortest path trees to support network scalability. The key
principle behind ToD is that adjacent nodes in a graph will have
low stretch in one of these trees in ToD, thus resulting in early
aggregation of packets. Based on simulations on a 2,000-node Mica2-
based network, we conclude that efficient aggregation in large-scale
networks can be achieved by our semistructured approach.
Abstract: This research examines possible effects of climatic
change focusing on global warming and its impacts on world
agricultural product markets, by using a world food model developed
to consider climate changes. GDP and population for each scenario
were constructed by IPCC and climate data for each scenario was
reported by the Hadley Center and are used in this research to consider
results in different contexts. Production and consumption of primary
agriculture crops of the world for each socio-economic scenario are
obtained and investigated by using the modified world food model.
Simulation results show that crop production in some countries or
regions will have different trends depending on the context. These
alternative contexts depend on the rate of GDP growth, population,
temperature, and rainfall. Results suggest that the development of
environment friendly technologies lead to more consumption of food
in many developing countries. Relationships among environmental
policy, clean energy development, and poverty elimination warrant
further investigation.
Abstract: A systematic and exhaustive method based on the group
structure of a unitary Lie algebra is proposed to generate an enormous
number of quantum codes. With respect to the algebraic structure,
the orthogonality condition, which is the central rule of generating
quantum codes, is proved to be fully equivalent to the distinguishability
of the elements in this structure. In addition, four types of
quantum codes are classified according to the relation of the codeword
operators and some initial quantum state. By linking the unitary Lie
algebra with the additive group, the classical correspondences of some
of these quantum codes can be rendered.
Abstract: The author present PID controller design for
following control of hard disk drive by characteristic ratio assignment
method. The study in this paper concerns design of a PID controller
which sufficiently robust to the disturbances and plant perturbations
on following control of hard disk drive. Characteristic Ratio
Assignment (CRA) is shown to be an efficient control technique to
serve this requirement. The controller design by CRA is based on the
choice of the coefficients of the characteristic polynomial of the
closed loop system according to the convenient performance criteria
such as equivalent time constant and ration of characteristic
coefficient. Hence, in this study, CRA method is applied in PID
controller design for following control of hard disk drive. Matlab
simulation results shown that CRA design is fairly stable and robust
whilst giving the convenience in controller-s parameters adjustment.
Abstract: ERP systems are the largest software applications adopted by universities, along with quite significant investments in their implementation. However, unlike other applications little research has been conducted regarding these systems in a university environment. This paper aims at providing a critical review of previous research in ERP system in higher education with a special focus on higher education in Australia. The research not only forms the basis of an evaluation of previous research and research needs, it also makes inroads in identifying the payoff of ERPs in the sector from different perspectives with particular reference to the user. The paper is divided into two parts, the first part focuses on ERP literature in higher education at large, while the second focuses on ERP literature in higher education in Australia.
Abstract: At present, web Service is the first choice to reuse the
legacy system for the implementation of SOA. According to the status
of the implementation of SOA and the status of the legacy systems, we propose four encapsulating strategies. Base on the strategies, we
proposal the service-oriented encapsulating framework, the legacy system can be encapsulated by the service-oriented encapsulating
layer in three aspects, communication protocols, data and program.
The reuse rate of the legacy systems can be increased by using this framework
Abstract: Field mapping activity for an active volcano mainly in
the Torrid Zone is usually hampered by several problems such as steep
terrain and bad atmosphere conditions. In this paper we present a
simple solution for such problem by a combination Synthetic Aperture
Radar (SAR) and geostatistical methods. By this combination, we
could reduce the speckle effect from the SAR data and then estimate
roughness distribution of the pyroclastic flow deposits. The main
purpose of this study is to detect spatial distribution of new pyroclastic
flow deposits termed as P-zone accurately using the β°data from two
RADARSAT-1 SAR level-0 data. Single scene of Hyperion data and
field observation were used for cross-validation of the SAR results.
Mt. Merapi in central Java, Indonesia, was chosen as a study site and
the eruptions in May-June 2006 were examined. The P-zones were
found in the western and southern flanks. The area size and the longest
flow distance were calculated as 2.3 km2 and 6.8 km, respectively. The
grain size variation of the P-zone was mapped in detail from fine to
coarse deposits regarding the C-band wavelength of 5.6 cm.
Abstract: Image data holds a large amount of different context
information. However, as of today, these resources remain largely
untouched. It is thus the aim of this paper to present a basic technical
framework which allows for a quick and easy exploitation of context
information from image data especially by non-expert users.
Furthermore, the proposed framework is discussed in detail
concerning important social and ethical issues which demand special
requirements in system design. Finally, a first sensor prototype is
presented which meets the identified requirements. Additionally,
necessary implications for the software and hardware design of the
system are discussed, rendering a sensor system which could be
regarded as a good, acceptable and justifiable technical and thereby
enabling the extraction of context information from image data.
Abstract: Process-oriented software development is a new
software development paradigm in which software design is modeled
by a business process which is in turn translated into a process
execution language for execution. The building blocks of this
paradigm are software units that are composed together to work
according to the flow of the business process. This new paradigm
still exhibits the characteristic of the applications built with the
traditional software component technology. This paper discusses an
approach to apply a traditional technique for software component
fabrication to the design of process-oriented software units, called
process components. These process components result from
decomposing a business process of a particular application domain
into subprocesses, and these process components can be reused to
design the business processes of other application domains. The
decomposition considers five managerial goals, namely cost
effectiveness, ease of assembly, customization, reusability, and
maintainability. The paper presents how to design or decompose
process components from a business process model and measure
some technical features of the design that would affect the
managerial goals. A comparison between the measurement values
from different designs can tell which process component design is
more appropriate for the managerial goals that have been set. The
proposed approach can be applied in Web Services environment
which accommodates process-oriented software development.
Abstract: A numerical analysis of wave and hydrodynamic models
is used to investigate the influence of WAve and Storm Surge
(WASS) in the regional and coastal zones. The numerical analyzed
system consists of the WAve Model Cycle 4 (WAMC4) and the
Princeton Ocean Model (POM) which used to solve the energy
balance and primitive equations respectively. The results of both
models presented the incorporated surface wave in the regional
zone affected the coastal storm surge zone. Specifically, the results
indicated that the WASS generally under the approximation is not
only the peak surge but also the coastal water level drop which
can also cause substantial impact on the coastal environment. The
wave–induced surface stress affected the storm surge can significantly
improve storm surge prediction. Finally, the calibration of wave
module according to the minimum error of the significant wave height
(Hs) is not necessarily result in the optimum wave module in the
WASS analyzed system for the WASS prediction.
Abstract: Residues are produced in all stages of human activities
in terms of composition and volume which vary according to
consumption practices and to production methods. Forms of
significant harm to the environment are associated to volume of
generated material as well as to improper disposal of solid wastes,
whose negative effects are noticed more frequently in the long term.
The solution to this problem constitutes a challenge to the
government, industry and society, because they involve economic,
social, environmental and, especially, awareness of the population in
general. The main concerns are focused on the impact it can have on
human health and on the environment (soil, water, air and sights).
The hazardous waste produced mainly by industry, are particularly
worrisome because, when improperly managed, they become a
serious threat to the environment. In view of this issue, this study
aimed to evaluate the management system of solid waste of a coprocessing
industrial waste company, to propose improvements to the
rejects generation management in a specific step of the Blending
production process.
Abstract: The development and extension of large cities induced
a need for shallow tunnel in soft ground of building areas. Estimation
of ground settlement caused by the tunnel excavation is important
engineering point. In this paper, prediction of surface subsidence
caused by tunneling in one section of seventh line of Tehran subway
is considered. On the basis of studied geotechnical conditions of the
region, tunnel with the length of 26.9km has been excavated applying
a mechanized method using an EPB-TBM with a diameter of 9.14m.
In this regard, settlement is estimated utilizing both analytical and
numerical finite element method. The numerical method shows that
the value of settlement in this section is 5cm. Besides, the analytical
consequences (Bobet and Loganathan-Polous) are 5.29 and 12.36cm,
respectively. According to results of this study, due tosaturation of
this section, there are good agreement between Bobet and numerical
methods. Therefore, tunneling processes in this section needs a
special consolidation measurement and support system before the
passage of tunnel boring machine.
Abstract: Coated tool inserts can be considered as the backbone
of machining processes due to their wear and heat resistance.
However, defects of coating can degrade the integrity of these inserts
and the number of these defects should be minimized or eliminated if
possible. Recently, the advancement of coating processes and
analytical tools open a new era for optimizing the coating tools.
First, an overview is given regarding coating technology for cutting
tool inserts. Testing techniques for coating layers properties, as well
as the various coating defects and their assessment are also surveyed.
Second, it is introduced an experimental approach to examine the
possible coating defects and flaws of worn multicoated carbide
inserts using two important techniques namely scanning electron
microscopy and atomic force microscopy. Finally, it is
recommended a simple procedure for investigating manufacturing
defects and flaws of worn inserts.