Abstract: Conflicts identification among non-functional requirements is often identified intuitively which impairs conflict analysis practices. This paper proposes a new model to identify conflicts among non-functional requirements. The proposed model uses the matrix mechanism to identify the quality based conflicts among non-functional requirements. The potential conflicts are identified through the mapping of low level conflicting quality attributes to low level functionalities using the matrices. The proposed model achieves the identification of conflicts among product and process requirements, identifies false conflicts, decreases the documentation overhead, and maintains transparency of identified conflicts. The attributes are not concomitantly taken into account by current models in practice.
Abstract: The objective of this research was to identify the
vegetation-soil relationships in Nodushan arid rangelands of Yazd. 5
sites were selected for measuring the cover of plant species and soil
attributes. Soil samples were taken in 0-10 and 10-80 cm layers. The
species studied were Salsola tomentosa, Salsola arbuscula, Peganum
harmala, Zygophylum eurypterum and Eurotia ceratoides. Canonical
correspondence analysis (CCA) was used to analyze the data. Based
on the CCA results, 74.9 % of vegetation-soil variation was explained
by axis 1-3. Axis 1, 2 and 3 accounted for 27.2%, 24.9 % and 22.8%
of variance respectively. Correlation between axis 1, 2, 3 and speciesedaphic
variables were 0.995, 0.989, 0.981 respectively. Soil texture,
lime, salinity and organic matter significantly influenced the
distribution of these plant species. Determination of soil-vegetation
relationships will be useful for managing and improving rangelands
in arid and semi arid environments.
Abstract: Knowledge bases are basic components of expert
systems or intelligent computational programs. Knowledge bases
provide knowledge, events that serve deduction activity,
computation and control. Therefore, researching and developing of
models for knowledge representation play an important role in
computer science, especially in Artificial Intelligence Science and
intelligent educational software. In this paper, the extensive
deduction computational model is proposed to design knowledge
bases whose attributes are able to be real values or functional values.
The system can also solve problems based on knowledge bases.
Moreover, the models and algorithms are applied to produce the
educational software for solving alternating current problems or
solving set of equations automatically.
Abstract: Evaluation of educational portals is an important
subject area that needs more attention from researchers. A university
that has an educational portal which is difficult to use and interact by
teachers or students or management staff can reduce the position and
reputation of the university. Therefore, it is important to have the
ability to make an evaluation of the quality of e-services the
university provide to improve them over time.
The present study evaluates the usability of the Information
Technology Faculty portal at University of Benghazi. Two evaluation
methods were used: a questionnaire-based method and an online
automated tool-based method. The first method was used to measure
the portal's external attributes of usability (Information, Content and
Organization of the portal, Navigation, Links and Accessibility,
Aesthetic and Visual Appeal, Performance and Effectiveness and
educational purpose) from users' perspectives, while the second
method was used to measure the portal's internal attributes of
usability (number and size of HTML files, number and size of images,
load time, HTML check errors, browsers compatibility problems,
number of bad and broken links), which cannot be perceived by the
users. The study showed that some of the usability aspects have been
found at the acceptable level of performance and quality, and some
others have been found otherwise. In general, it was concluded that
the usability of IT faculty educational portal generally acceptable.
Recommendations and suggestions to improve the weakness and
quality of the portal usability are presented in this study.
Abstract: National Biodiversity Database System (NBIDS) has
been developed for collecting Thai biodiversity data. The goal of this
project is to provide advanced tools for querying, analyzing,
modeling, and visualizing patterns of species distribution for
researchers and scientists. NBIDS data record two types of datasets:
biodiversity data and environmental data. Biodiversity data are
specie presence data and species status. The attributes of biodiversity
data can be further classified into two groups: universal and projectspecific
attributes. Universal attributes are attributes that are common
to all of the records, e.g. X/Y coordinates, year, and collector name.
Project-specific attributes are attributes that are unique to one or a
few projects, e.g., flowering stage. Environmental data include
atmospheric data, hydrology data, soil data, and land cover data
collecting by using GLOBE protocols. We have developed webbased
tools for data entry. Google Earth KML and ArcGIS were used
as tools for map visualization. webMathematica was used for simple
data visualization and also for advanced data analysis and
visualization, e.g., spatial interpolation, and statistical analysis.
NBIDS will be used by park rangers at Khao Nan National Park, and
researchers.
Abstract: In the research field of Rough Set, few papers concern the significance of attribute set. However, there is important relation between the significance of single attribute and that of attribute set, which should not be ignored. In this paper, we draw conclusions by case analysis that (1) the attribute set including single attributes with high significance is certainly significant, while, (2)the attribute set which consists of single attributes with low significance possibly has high significance. We validate the conclusions on discernibility matrix and the results demonstrate the contribution of our conclusions.
Abstract: In most rule-induction algorithms, the only operator used against nominal attributes is the equality operator =. In this paper, we first propose the use of the inequality operator, ≠, in addition to the equality operator, to increase the expressiveness of induced rules. Then, we present a new method, Binary Coding, which can be used along with an arbitrary rule-induction algorithm to make use of the inequality operator without any need to change the algorithm. Experimental results suggest that the Binary Coding method is promising enough for further investigation, especially in cases where the minimum number of rules is desirable.
Abstract: Keystroke authentication is a new access control system
to identify legitimate users via their typing behavior. In this paper,
machine learning techniques are adapted for keystroke authentication.
Seven learning methods are used to build models to differentiate user
keystroke patterns. The selected classification methods are Decision
Tree, Naive Bayesian, Instance Based Learning, Decision Table, One
Rule, Random Tree and K-star. Among these methods, three of them
are studied in more details. The results show that machine learning
is a feasible alternative for keystroke authentication. Compared to
the conventional Nearest Neighbour method in the recent research,
learning methods especially Decision Tree can be more accurate. In
addition, the experiment results reveal that 3-Grams is more accurate
than 2-Grams and 4-Grams for feature extraction. Also, combination
of attributes tend to result higher accuracy.
Abstract: Mixed model assembly lines (MMAL) are a type of
production line where a variety of product models similar in product
characteristics are assembled. The effective design of these lines
requires that schedule for assembling the different products is
determined. In this paper we tried to fit the sequencing problem with
the main characteristics of make to order (MTO) environment. The
problem solved in this paper is a multiple objective sequencing
problem in mixed model assembly lines sequencing using weighted
Sum Method (WSM) using GAMS software for small problem and
an effective GA for large scale problems because of the nature of
NP-hardness of our problem and vast time consume to find the
optimum solution in large problems. In this problem three practically
important objectives are minimizing: total utility work, keeping a
constant production rate variation, and minimizing earliness and
tardiness cost which consider the priority of each customer and
different due date which is a real situation in mixed model assembly
lines and it is the first time we consider different attribute to
prioritize the customers which help the company to reduce the cost of
earliness and tardiness. This mechanism is a way to apply an advance
available to promise (ATP) in mixed model assembly line sequencing
which is the main contribution of this paper.
Abstract: This paper describes the design and results of FROID,
an outbound intrusion detection system built with agent technology
and supported by an attacker-centric ontology. The prototype
features a misuse-based detection mechanism that identifies remote
attack tools in execution. Misuse signatures composed of attributes
selected through entropy analysis of outgoing traffic streams and
process runtime data are derived from execution variants of attack
programs. The core of the architecture is a mesh of self-contained
detection cells organized non-hierarchically that group agents in a
functional fashion. The experiments show performance gains when
the ontology is enabled as well as an increase in accuracy achieved
when correlation cells combine detection evidence received from
independent detection cells.
Abstract: Yogurts are prepared by fermenting milk with bacterial cultures consisting of a mixture of Streptococcus ssp. thermophilus and Lactobacillus delbrueckii ssp. bulgaricus. The main aim of this investigation was to develop a majority goat yogurt, with the addition of sheep milk in order to have a final product with good physicochemical quality properties and sensorial attributes. Four types of yogurts were prepared presenting the following proportion of goat and sheep milk respectively: C100 – 100%; C80 – 80%/20%; C60 – 60%/40%; C50 – 50%/50%. The goat milk was from the Serrana Jarmelista breed and the sheep milk from the Serra da Estrela breed. The inclusion of sheep milk improved attractiveness to consumers, and it also improved the nutritional value of the product, mainly the fatty acid and mineral contents. The C50 yogurt was preferred by 28% of the panellists, followed by the C100 with 16% and the commercial cow yogurt was 40% of preferences.
Abstract: This paper presents functionality of negotiation agent
on value-based design decision. The functionality is based on the
characteristics of the system and goal specification. A Prometheus
Design Tool model was used for developing the system. Group
functionality will be the attribute for negotiation agents, which
comprises a coordinator agent and decision- maker agent. The results
of the testing of the system to a building system selection on valuebased
decision environment are also presented.
Abstract: Microstructure, wetting behavior and interfacial
reactions between Sn–0.7Cu and Sn–0.3Ag–0.7Cu (SAC0307)
solders solidified on Ni coated Al substrates were compared and
investigated. Microstructure of Sn–0.7Cu alloy exhibited a eutectic
matrix composed of primary β-Sn dendrites with a fine dispersion of
Cu6Sn5 intermetallics whereas microstructure of SAC0307 alloy
exhibited coarser Cu6Sn5 and finer Ag3Sn precipitates of IMCs with
decreased tin dendrites. Contact angles ranging from 22° to 26° were
obtained for Sn–0.7Cu solder solidified on substrate surface whereas
for SAC0307 solder alloy contact angles were found to be in the
range of 20° to 22°. Sn–0.7Cu solder/substrate interfacial region
exhibited faceted (Cu, Ni)6Sn5 IMCs protruding into the solder matrix
and a small amount of (Cu, Ni)3Sn4 intermetallics at the interface.
SAC0307 solder/substrate interfacial region showed mainly (Cu,
Ni)3Sn4 intermetallics adjacent to the coating layer and (Cu,
Ni)6Sn5 IMCs in the solder matrix. The improvement in the
wettability of SAC0307 solder alloy on substrate surface is attributed
to the formation of cylindrical shape (Cu,Ni)6Sn5 and a layer of
(Cu, Ni)3Sn4 IMCs at the interface.
Abstract: The impact of OO design on software quality
characteristics such as defect density and rework by mean of
experimental validation. Encapsulation, inheritance, polymorphism,
reusability, Data hiding and message-passing are the major attribute
of an Object Oriented system. In order to evaluate the quality of an
Object oriented system the above said attributes can act as indicators.
The metrics are the well known quantifiable approach to express any
attribute. Hence, in this paper we tried to formulate a framework of
metrics representing the attributes of object oriented system.
Empirical Data is collected from three different projects based on
object oriented paradigms to calculate the metrics.
Abstract: Prospective readers can quickly determine whether a document is relevant to their information need if the significant phrases (or keyphrases) in this document are provided. Although keyphrases are useful, not many documents have keyphrases assigned to them, and manually assigning keyphrases to existing documents is costly. Therefore, there is a need for automatic keyphrase extraction. This paper introduces a new domain independent keyphrase extraction algorithm. The algorithm approaches the problem of keyphrase extraction as a classification task, and uses a combination of statistical and computational linguistics techniques, a new set of attributes, and a new machine learning method to distinguish keyphrases from non-keyphrases. The experiments indicate that this algorithm performs better than other keyphrase extraction tools and that it significantly outperforms Microsoft Word 2000-s AutoSummarize feature. The domain independence of this algorithm has also been confirmed in our experiments.
Abstract: This article describes the implementation of an intelligent agent that provides recommendations for educational resources in a virtual learning environment (VLE). It aims to support pending (undeveloped) student learning activities. It begins by analyzing the proposed VLE data model entities in the recommender process. The pending student activities are then identified, which constitutes the input information for the agent. By using the attribute-based recommender technique, the information can be processed and resource recommendations can be obtained. These serve as support for pending activity development in the course. To integrate this technique, we used an ontology. This served as support for the semantic annotation of attributes and recommended files recovery.
Abstract: Common acceptable cuisine usually discussed in the
multicultural/ethnic nation as it represents the process of sharing it
among the ethnic groups. The common acceptable cuisine is also
considered as a precursor in the process of constructing the national
food identity within ethnic groups in the multicultural countries. The
adaptation of certain ethnic cuisines through its types of food,
methods of cooking, ingredients and eating decorum by ethnic groups
is believed creating or enhancing the process of formation on
common acceptable cuisines in a multicultural country. Malaysia as
the multicultural country without doubt is continuing to experience
cross-culturing processes among the ethnic groups including cuisine.
This study empirically investigates the adaptation level of Malay,
Chinese and Indian chefs on each other ethnic cuisine attributes
toward the formation on common acceptable cuisines and national
food identity.
Abstract: 16-Mercaptohexadecanoic acid (MHDA) and tripeptide glutathione conjugated with gold nanoparticles (Au-NPs) are characterized by Fourier Transform InfaRared (FTIR) spectroscopy combined with Surface-enhanced Raman scattering (SERS) spectroscopy. Surface Plasmon Resonance (SPR) technique based on FTIR spectroscopy has become an important tool in biophysics, which is perspective for the study of organic compounds. FTIR-spectra of MHDA shows the line at 2500 cm-1 attributed to thiol group which is modified by presence of Au-NPs, suggesting the formation of bond between thiol group and gold. We also can observe the peaks originate from characteristic chemical group. A Raman spectrum of the same sample is also promising. Our preliminary experiments confirm that SERS-effect takes place for MHDA connected with Au-NPs and enable us to detected small number (less than 106 cm-2) of MHDA molecules. Combination of spectroscopy methods: FTIR and SERS – enable to study optical properties of Au- NPs and immobilized bio-molecules in context of a bio-nano-sensors.
Abstract: After the development of the Internet a suitable
discipline for trading goods electronically has been emerged.
However, this type of markets is not still mature enough in order to
become independent and get closer to seller/buyer-s needs.
Furthermore, the buyable and sellable goods in these markets still
don-t have essential standards for being well-defined. In this paper,
we will present a model for development of a market which can
contain goods with variable definitions and we will also investigate
its characteristics. Besides, by noticing the fact that people have
different discriminations, it-s figured out that the significance of each
attribute of a specific product may vary from different people-s view
points. Consequently we-ll present a model for weighting and
accordingly different people-s view points could be satisfied. These
two aspects will be discussed completely throughout this paper.
Abstract: In this paper, we design an integration security system
that provides authentication service, authorization service, and
management service of security data and a unified interface for the
management service. The interface is originated from XKMS protocol
and is used to manage security data such as XACML policies, SAML
assertions and other authentication security data including public keys.
The system includes security services such as authentication,
authorization and delegation of authentication by employing SAML
and XACML based on security data such as authentication data,
attributes information, assertions and polices managed with the
interface in the system. It also has SAML producer that issues
assertions related on the result of the authentication and the
authorization services.