Abstract: This paper presents a simplified version of Data Envelopment Analysis (DEA) - a conventional approach to evaluating the performance and ranking of competitive objects characterized by two groups of factors acting in opposite directions: inputs and outputs. DEA with a Perfect Object (DEA PO) augments the group of actual objects with a virtual Perfect Object - the one having greatest outputs and smallest inputs. It allows for obtaining an explicit analytical solution and making a step to an absolute efficiency. This paper develops this approach further and introduces a DEA model with Partially Perfect Objects. DEA PPO consecutively eliminates the smallest relative inputs or greatest relative outputs, and applies DEA PO to the reduced collections of indicators. The partial efficiency scores are combined to get the weighted efficiency score. The computational scheme remains simple, like that of DEA PO, but the advantage of the DEA PPO is taking into account all of the inputs and outputs for each actual object. Firm evaluation is considered as an example.
Abstract: This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu.
Abstract: Electrospinning is a broadly used technology to obtain
polymeric nanofibers ranging from several micrometers down to
several hundred nanometers for a wide range of applications. It offers
unique capabilities to produce nanofibers with controllable porous
structure. With smaller pores and higher surface area than regular
fibers, electrospun fibers have been successfully applied in various
fields, such as, nanocatalysis, tissue engineering scaffolds, protective
clothing, filtration, biomedical, pharmaceutical, optical electronics,
healthcare, biotechnology, defense and security, and environmental
engineering. In this study, polyurethane nanofibers were obtained
under different electrospinning parameters. Fiber morphology and
diameter distribution were investigated in order to understand them
as a function of process parameters.
Abstract: This paper introduces a temporal epistemic logic
CBCTL that updates agent-s belief states through communications
in them, based on computational tree logic (CTL). In practical
environments, communication channels between agents may not be
secure, and in bad cases agents might suffer blackouts. In this study,
we provide inform* protocol based on ACL of FIPA, and declare the
presence of secure channels between two agents, dependent on time.
Thus, the belief state of each agent is updated along with the progress
of time. We show a prover, that is a reasoning system for a given
formula in a given a situation of an agent ; if it is directly provable
or if it could be validated through the chains of communications, the
system returns the proof.
Abstract: Through the time, the higher education has changed
the learning system since mother tongue to bilingual, and in this new
century has been coming develop a multilingual education. All as
part of globalization process of the countries and the education.
Nevertheless, this change only has been effectively in countries of the
first world, the rest have been lagging. Therefore, these countries
require strengthen their higher education systems through models that
give way to multilingual and bilingual education. In this way, shows
a new model adapted from a systemic form to allow a higher
bilingual and multilingual education in Latin America. This
systematization aims to increase the skills and competencies
student’s, decrease the time learning of a second tongue, add to
multilingualism in the American Latin Universities, also, contribute
to position the region´s countries in a better global status, and
stimulate the development of new research in this area.
Abstract: Phishing scheme is a new emerged security issue of
E-Commerce Crime in globalization. In this paper, the legal scaffold
of Malaysia, United States and United Kingdom are analyzed and
followed by discussion on critical issues that rose due to phishing
activities. The result revealed that inadequacy of current legal
framework is the main challenge to govern this epidemic. However,
lack of awareness among consumers, crisis on merchant-s
responsibility and lack of intrusion reports and incentive arrangement
contributes to phishing proliferating. Prevention is always better than
curb. By the end of this paper, some best practices for consumers and
corporations are suggested.
Abstract: Abstract–Indoor air (VOCs) samples were collected
simultaneously from variety of indoors (e.g. living rooms, baby-s
rooms) and outdoor environments which were voluntarily selected
from the houses in which pregnant residents live throughout Ankara.
This is the first comprehensive study done in Turkey starting from
prenatal period and continued till the babies had one year old. VOCs
levels were measured over 76 homes. Air samples were collected in
Tenax TA sorbent filled tubes with active sampling method and
analyzed with Thermal Desorber and Gas Chromatography/Mass
spectrometry (TD-GC/MS). At the first sampling period in the baby-s
rooms maximum concentration of toluene was measured about
240.77μg.m-3 and in the living rooms maximum concentration of
naphthalene was 180.24μg.m-3. At the second sampling period in the
baby-s rooms maximum concentration of toluene was measured
about 144.97μg.m-3 and in the living rooms maximum concentration
of naphthalene was 247.89μg.m-3. Concentration of TVOCs in the
first period was generally higher than the second period.
Abstract: Under-representation of women in leadership positions" is still a general phenomenon in Germany despite the high number of implemented measures. The under-representation of female executives in the aviation sector is even worse. In this context our research hypothesis is that the representation and acceptance of women in management positions is determined by corporate culture.
Abstract: This paper describes the process used in the
automation of the Maritime UAV commands using the Kinect sensor.
The AR Drone is a Quadrocopter manufactured by Parrot [1] to be
controlled using the Apple operating systems such as iPhones and
Ipads. However, this project uses the Microsoft Kinect SDK and
Microsoft Visual Studio C# (C sharp) software, which are compatible
with Windows Operating System for the automation of the navigation
and control of the AR drone.
The navigation and control software for the Quadrocopter runs on
a windows 7 computer. The project is divided into two sections; the
Quadrocopter control system and the Kinect sensor control system.
The Kinect sensor is connected to the computer using a USB cable
from which commands can be sent to and from the Kinect sensors.
The AR drone has Wi-Fi capabilities from which it can be connected
to the computer to enable transfer of commands to and from the
Quadrocopter.
The project was implemented in C#, a programming language that
is commonly used in the automation systems. The language was
chosen because there are more libraries already established in C# for
both the AR drone and the Kinect sensor.
The study will contribute toward research in automation of
systems using the Quadrocopter and the Kinect sensor for navigation
involving a human operator in the loop. The prototype created has
numerous applications among which include the inspection of vessels
such as ship, airplanes and areas that are not accessible by human
operators.
Abstract: The paper analyzes the large power transformer unit regimes, indicating the criteria for the management of the voltage operating conditions, as well as the change in the operating conditions with the load connected to the secondary winding of the transformer unit. Further, the paper presents the software application for the evaluation of the transformer unit operation under different conditions. The software application was developed by means of virtual instrumentation.
Abstract: Acid rain occurs when sulphur dioxide (SO2) and
nitrogen oxides (Nox) gases react in the atmosphere with water,
oxygen, and other chemicals to form various acidic compounds. The
result is a mild solution of sulfuric acid and nitric acid. Soil has a
greater buffering capacity than aquatic systems. However excessive
amount of acids introduced by acid rains may disturb the entire soil
chemistry. Acidity and harmful action of toxic elements damage
vegetation while susceptible microbial species are eliminated. In
present study, the effects of simulated sulphuric acid and nitric acid
rains were investigated on crop Glycine max. The effect of acid rain
on change in soil fertility was detected in which pH of control sample
was 6.5 and pH of 1%H2SO4 and 1%HNO3 were 3.5. Nitrogen nitrate
in soil was high in 1% HNO3 treated soil & Control sample.
Ammonium nitrogen in soil was low in 1% HNO3 & H2SO4 treated
soil. Ammonium nitrogen was medium in control and other samples.
The effect of acid rain on seed germination on 3rd day of germination
control sample growth was 7 cm, 0.1% HNO3 was 8cm, and 0.001%
HNO3 & 0.001% H2SO4 was 6cm each. On 10th day fungal growth
was observed in 1% and 0.1%H2SO4 concentrations, when all plants
were dead. The effect of acid rain on crop productivity was
investigated on 3rd day roots were developed in plants. On12th day
Glycine max showed more growth in 0.1% HNO3, 0.001% HNO3 and
0.001% H2SO4 treated plants growth were same as compare to control
plants. On 20th day development of discoloration of plant pigments
were observed on acid treated plants leaves. On 38th day, 0.1, 0.001%
HNO3 and 0.1, 0.001% H2SO4 treated plants and control plants were
showing flower growth. On 42th day, acid treated Glycine max variety
and control plants were showed seeds on plants. In Glycine max
variety 0.1, 0.001% H2SO4, 0.1, 0.001% HNO3 treated plants were
dead on 46th day and fungal growth was observed. The toxicological
study was carried out on Glycine max plants exposed to 1% HNO3
cells were damaged more than 1% H2SO4. Leaf sections exposed to
0.001% HNO3 & H2SO4 showed less damaged of cells and
pigmentation observed in entire slide when compare with control
plant. The soil analysis was done to find microorganisms in HNO3 &
H2SO4 treated Glycine max and control plants. No microorganism
growth was observed in 1% HNO3 & H2SO4 but control plant showed
microbial growth.
Abstract: Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.
Abstract: In this article we explore the application of a formal
proof system to verification problems in cryptography. Cryptographic
properties concerning correctness or security of some cryptographic
algorithms are of great interest. Beside some basic lemmata, we
explore an implementation of a complex function that is used in
cryptography. More precisely, we describe formal properties of this
implementation that we computer prove. We describe formalized
probability distributions (σ-algebras, probability spaces and conditional
probabilities). These are given in the formal language of the
formal proof system Isabelle/HOL. Moreover, we computer prove
Bayes- Formula. Besides, we describe an application of the presented
formalized probability distributions to cryptography. Furthermore,
this article shows that computer proofs of complex cryptographic
functions are possible by presenting an implementation of the Miller-
Rabin primality test that admits formal verification. Our achievements
are a step towards computer verification of cryptographic primitives.
They describe a basis for computer verification in cryptography.
Computer verification can be applied to further problems in cryptographic
research, if the corresponding basic mathematical knowledge
is available in a database.
Abstract: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today's commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98% detection rate (DR) in comparison with
other existing methods.
Abstract: Prior to 1975, women in Laos suffered from having
reduced levels of power over decision-making in their families and in
their communities. This has had a negative impact on their ability to
develop their own identities. Their roles were identified as being
responsible for household activities and making preparations for their
marriage. Many women lost opportunities to get educated and access
the outdoor work that might have empowered them to improve their
situations. So far, no accurate figures of either emigrants or return
migrants have been compiled but it appears that most of them were
women, and it was women who most and more frequently remitted
money home. However, very few recent studies have addressed the
relationship between remittances and the roles of women in Laos.
This study, therefore, aims at redressing to some extent the
deficiencies in knowledge. Qualitative techniques were used to gather
data, including individual in-depth interviews and direct observation
in combination with the content analysis method. Forty women in
Vientiane Municipality and Savannakhet province were individually
interviewed. It was found that the monetary remittance was typically
used for family security and well-being; on fungible activities; on
economic and business activities; and on community development,
especially concerning hospitality and providing daily household
necessities. Remittances played important roles in improving many
respondents- livelihoods and positively changed their identities in
families and communities. Women became empowered as they were
able to start commercial businesses, rather than taking care of (just)
housework, children and elders. Interviews indicated that 92.5% of
the respondents their quality of lives improved, 90% felt happier in
their families and 82.5% felt conflicts in their families were reduced.
Abstract: Heat pipes are used to control the thermal problem for
electronic cooling. It is especially difficult to dissipate heat to a heat
sink in an environment in space compared to earth. For solving this
problem, in this study, the Poiseuille (Po) number, which is the main
measure of the performance of a heat pipe, is studied by CFD; then, the
heat pipe performance is verified with experimental results. A heat
pipe is then fabricated for a spatial environment, and an in-house code
is developed. Further, a heat pipe subsystem, which consists of a heat
pipe, MLI (Multi Layer Insulator), SSM (Second Surface Mirror), and
radiator, is tested and correlated with the TMM (Thermal
Mathematical Model) through a commercial code. The correlation
results satisfy the 3K requirement, and the generated thermal model is
verified for application to a spatial environment.
Abstract: More and more governments around the world are
introducing e-government as a means of reducing costs, improving
services, saving time and increasing effectiveness and efficiency in
the public sector Therefore e-government has been identified as one
of the top priorities for Saudi government and all its agencies.
However, the adoption of e-government is facing many challenges
and barriers such as technological, cultural, organizational, and social
issues which must be considered and treated carefully by any
government contemplating its adoption. This paper reports on a pilot
study amongst online (e-ready) citizens to identify the challenges and
barriers that affect the adoption of e-government services especially
from their perspective in Saudi society. Based on the analysis of data
collected from an online survey the researcher was able to identify
some of the important barriers and challenges from the e-ready
citizen perspective. As a result, this study has generated a list of
possible strategies to move towards successful adoption of egovernment
services in Saudi Arabia.
Abstract: In the area of Human Resource Management, the trend is towards online exchange of information about human resources. For example, online applications for employment become standard and job offerings are posted in many job portals. However, there are too many job portals to monitor all of them if someone is interested in a new job. We developed a prototype for integrating information of different job portals into one meta-search engine. First, existing job portals were investigated and XML schema documents were derived automated from these portals. Second, translation rules for transforming each schema to a central HR-XML-conform schema were determined. The HR-XML-schema is used to build a form for searching jobs. The data supplied by a user in this form is now translated into queries for the different job portals. Each result obtained by a job portal is sent to the meta-search engine that ranks the result of all received job offers according to user's preferences.
Abstract: This paper presents the optimum design for a double
stator, cup rotor machine; a novel type of BLDC PM Machine. The optimization approach is divided into two stages: the first stage is
calculating the machine configuration using Matlab, and the second stage is the optimization of the machine using Finite Element
Modeling (FEM). Under the design specifications, the machine
model will be selected from three pole numbers, namely, 8, 10 and 12 with an appropriate slot number. A double stator brushless DC
permanent magnet machine is designed to achieve low cogging torque; high electromagnetic torque and low ripple torque.
Abstract: Nowadays, with the emerging of the new applications
like robot control in image processing, artificial vision for visual
servoing is a rapidly growing discipline and Human-machine
interaction plays a significant role for controlling the robot. This
paper presents a new algorithm based on spatio-temporal volumes for
visual servoing aims to control robots. In this algorithm, after
applying necessary pre-processing on video frames, a spatio-temporal
volume is constructed for each gesture and feature vector is extracted.
These volumes are then analyzed for matching in two consecutive
stages. For hand gesture recognition and classification we tested
different classifiers including k-Nearest neighbor, learning vector
quantization and back propagation neural networks. We tested the
proposed algorithm with the collected data set and results showed the
correct gesture recognition rate of 99.58 percent. We also tested the
algorithm with noisy images and algorithm showed the correct
recognition rate of 97.92 percent in noisy images.