Abstract: Currently WWW is the first solution for scholars in
finding information. But, analyzing and interpreting this volume of
information will lead to researchers overload in pursuing their
research.
Trend detection in scientific publication retrieval systems helps
scholars to find relevant, new and popular special areas by
visualizing the trend of input topic.
However, there are few researches on trend detection in scientific
corpora while their proposed models do not appear to be suitable.
Previous works lack of an appropriate representation scheme for
research topics.
This paper describes a method that combines Semantic Web and
ontology to support advance search functions such as trend detection
in the context of scholarly Semantic Web system (SSWeb).
Abstract: The main objectives of this study are to inspect and
identify any damage of jaimusi highway prestressed concrete bridge
after repair and strengthening of damaged structural members and to
evaluate the performance of the bridge structural members by
adopting static load test. Inspection program after repair and
strengthening includes identifying and evaluating the structural
members of bridge such as T-shape cantilever structure, hanging
beams, corbels, external tendons, anchor beams, sticking steel plate,
and piers. The results of inspection show that the overall state of the
bridge structural member after repair and strengthening is good. The
results of rebound test of concrete strength show that the average
strength of concrete is 46.31Mpa. Whereas, the average value of
concrete strength of anchor beam is 49.82Mpa. According to the
results of static load test, the experimental values are less than
theoretical values of internal forces, deflection, and strain, indicating
that the stiffness of the experimental structure, overall deformation
and integrity satisfy the designed standard and the working
performance is good, and the undertaking capacity has a certain
surplus. There is not visible change in the length and width of cracks
and there are not new cracks under experimental load.
Abstract: This paper focuses on creating a component model of information system under uncertainty. The paper identifies problem in current approach of component modeling and proposes fuzzy tool, which will work with vague customer requirements and propose components of the resulting component model. The proposed tool is verified on specific information system and results are shown in paper. After finding suitable sub-components of the resulting component model, the component model is visualised by tool.
Abstract: Environment today is featured with aging population,
increasing prevalence of chronic disease and complex of medical
treatment. Safe use of pharmaceutics relied very much on the efforts
made by both the health- related organizations and as well as the
government agencies. As far as the specialization concern in providing
health services to the patients, the government actively issued and
implemented the divisions of medical treatment and pharmaceutical to
improve the quality of care and to reduce medication errors and ensure
public health. Pharmaceutical sub-sector policy has been implemented
for 13 years. This study attempts to explore the factors that affect the
patients- behavior intention of refilling a prescription from a NHIB
pharmacy. Samples were those patients refilling their prescriptions
with the case NHIB pharmacies. A self-administered questionnaire
was used to collect respondents- information while the patients or
family members visit the pharmacy for the refilling. 1,200
questionnaires were dispatched in 37 pharmacies that randomly
selected from Pingtung City, Dongkang, Chaozhou, Hengchun areas.
732 responses were gained with 604 valid samples for further analyses.
Results of data analyses indicated that respondents- attitude,
subjective norm, perceived behavior control and behavior intentions
toward refilling behavior varied from some demographic variables to
another. This research also suggested adding actual behavior, either by
a self-report or observed, into the research.
Abstract: Privacy issues commonly discussed among
researchers, practitioners, and end-users in pervasive healthcare.
Pervasive healthcare systems are applications that can support
patient-s need anytime and anywhere. However, pervasive healthcare
raises privacy concerns since it can lead to situations where patients
may not be aware that their private information is being shared and
becomes vulnerable to threat. We have systematically analyzed the
privacy issues and present a summary in tabular form to show the
relationship among the issues. The six issues identified are medical
information misuse, prescription leakage, medical information
eavesdropping, social implications for the patient, patient difficulties
in managing privacy settings, and lack of support in designing
privacy-sensitive applications. We narrow down the issues and chose
to focus on the issue of 'lack of support in designing privacysensitive
applications' by proposing a privacy-sensitive architecture
specifically designed for pervasive healthcare monitoring systems.
Abstract: Yam starch obtained from the water yam (munlued)
by the wet milling process was studied for some physicochemical
properties. Yam starch film was prepared by casting using glycerol as
a plasticizer. The effect of different glycerol (1.30, 1.65 and
2.00g/100g of filmogenic solution) and starch concentrations (3.30,
3.65 and 4.00g /100g of filmogenic solution) were evaluated on some
characteristics of the film. The temperature for obtaining the
gelatinized starch solution was 70-80°C and then dried at 45°C for 4
hours. The resulting starch from munlued granular morphology was
triangular and the average size of the granule was 26.68 μm. The
amylose content by colorimetric method was 26 % and the gelatinize
temperature was 70-80°C. The appearance of the film was smooth,
transparent, and glossy with average moisture content of 25.96% and
thickness of 0.01mm. Puncture deformation and flexibility increased
with glycerol content. The starch and glycerol concentration were a
significant factor of the yam starch film characteristics. Yam starch
film can be described as a biofilm providing many applications and
developments with the advantage of biodegradability.
Abstract: Managing the emergency situations at the Emergency
Staff requires a high co-operation between its members and their fast
decision making. For these purpose it is necessary to prepare Emergency Staff members adequately. The aim of this paper is to
describe the development of information support that focuses to
emergency staff processes and effective decisions. The information
support is based on the principles of process management, and
Process Framework for Emergency Management was used during the
development. The output is the information system that allows users
to simulate an emergency situation, including effective decision making. The system also evaluates the progress of the emergency
processes solving by quantitative and qualitative indicators. By using
the simulator, a higher quality education of specialists can be achieved. Therefore, negative impacts resulting from arising emergency situations can be directly reduced.
Abstract: Tacit knowledge has been one of the most discussed
and contradictory concepts in the field of knowledge management
since the mid 1990s. The concept is used relatively vaguely to refer
to any type of information that is difficult to articulate, which has led
to discussions about the original meaning of the concept (adopted
from Polanyi-s philosophy) and the nature of tacit knowing. It is
proposed that the subject should be approached from the perspective
of cognitive science in order to connect tacit knowledge to
empirically studied cognitive phenomena. Some of the most
important examples of tacit knowing presented by Polanyi are
analyzed in order to trace the cognitive mechanisms of tacit knowing
and to promote better understanding of the nature of tacit knowledge.
The cognitive approach to Polanyi-s theory reveals that the
tacit/explicit typology of knowledge often presented in the
knowledge management literature is not only artificial but totally
opposite approach compared to Polanyi-s thinking.
Abstract: Money laundering has been described by many as the lifeblood of crime and is a major threat to the economic and social well-being of societies. It has been recognized that the banking system has long been the central element of money laundering. This is in part due to the complexity and confidentiality of the banking system itself. It is generally accepted that effective anti-money laundering (AML) measures adopted by banks will make it tougher for criminals to get their "dirty money" into the financial system. In fact, for law enforcement agencies, banks are considered to be an important source of valuable information for the detection of money laundering. However, from the banks- perspective, the main reason for their existence is to make as much profits as possible. Hence their cultural and commercial interests are totally distinct from that of the law enforcement authorities. Undoubtedly, AML laws create a major dilemma for banks as they produce a significant shift in the way banks interact with their customers. Furthermore, the implementation of the laws not only creates significant compliance problems for banks, but also has the potential to adversely affect the operations of banks. As such, it is legitimate to ask whether these laws are effective in preventing money launderers from using banks, or whether they simply put an unreasonable burden on banks and their customers. This paper attempts to address these issues and analyze them against the background of the Malaysian AML laws. It must be said that effective coordination between AML regulator and the banking industry is vital to minimize problems faced by the banks and thereby to ensure effective implementation of the laws in combating money laundering.
Abstract: A series of microarray experiments produces observations
of differential expression for thousands of genes across multiple
conditions.
Principal component analysis(PCA) has been widely used in
multivariate data analysis to reduce the dimensionality of the data in
order to simplify subsequent analysis and allow for summarization of
the data in a parsimonious manner. PCA, which can be implemented
via a singular value decomposition(SVD), is useful for analysis of
microarray data.
For application of PCA using SVD we use the DNA microarray
data for the small round blue cell tumors(SRBCT) of childhood
by Khan et al.(2001). To decide the number of components which
account for sufficient amount of information we draw scree plot.
Biplot, a graphic display associated with PCA, reveals important
features that exhibit relationship between variables and also the
relationship of variables with observations.
Abstract: The National Agricultural Biotechnology Information
Center (NABIC) plays a leading role in the biotechnology information
database for agricultural plants in Korea. Since 2002, we have
concentrated on functional genomics of major crops, building an
integrated biotechnology database for agro-biotech information that
focuses on bioinformatics of major agricultural resources such as rice,
Chinese cabbage, and microorganisms. In the NABIC,
integration-based biotechnology database provides useful information
through a user-friendly web interface that allows analysis of genome
infrastructure, multiple plants, microbial resources, and living
modified organisms.
Abstract: Research in quantum computation is looking for the consequences of having information encoding, processing and communication exploit the laws of quantum physics, i.e. the laws which govern the ultimate knowledge that we have, today, of the foreign world of elementary particles, as described by quantum mechanics. This paper starts with a short survey of the principles which underlie quantum computing, and of some of the major breakthroughs brought by the first ten to fifteen years of research in this domain; quantum algorithms and quantum teleportation are very biefly presented. The next sections are devoted to one among the many directions of current research in the quantum computation paradigm, namely quantum programming languages and their semantics. A few other hot topics and open problems in quantum information processing and communication are mentionned in few words in the concluding remarks, the most difficult of them being the physical implementation of a quantum computer. The interested reader will find a list of useful references at the end of the paper.
Abstract: In this manuscript, a wavelet-based blind
watermarking scheme has been proposed as a means to provide
security to authenticity of a fingerprint. The information used for
identification or verification of a fingerprint mainly lies in its
minutiae. By robust watermarking of the minutiae in the fingerprint
image itself, the useful information can be extracted accurately even
if the fingerprint is severely degraded. The minutiae are converted in
a binary watermark and embedding these watermarks in the detail
regions increases the robustness of watermarking, at little to no
additional impact on image quality. It has been experimentally shown
that when the minutiae is embedded into wavelet detail coefficients
of a fingerprint image in spread spectrum fashion using a
pseudorandom sequence, the robustness is observed to have a
proportional response while perceptual invisibility has an inversely
proportional response to amplification factor “K". The DWT-based
technique has been found to be very robust against noises,
geometrical distortions filtering and JPEG compression attacks and is
also found to give remarkably better performance than DCT-based
technique in terms of correlation coefficient and number of erroneous
minutiae.
Abstract: There is a real threat on the VIPs personal pages on
the Social Network Sites (SNS). The real threats to these pages is
violation of privacy and theft of identity through creating fake pages
that exploit their names and pictures to attract the victims and spread
of lies. In this paper, we propose a new secure architecture that
improves the trusting and finds an effective solution to reduce fake
pages and possibility of recognizing VIP pages on SNS. The
proposed architecture works as a third party that is added to
Facebook to provide the trust service to personal pages for VIPs.
Through this mechanism, it works to ensure the real identity of the
applicant through the electronic authentication of personal
information by storing this information within content of their
website. As a result, the significance of the proposed architecture is
that it secures and provides trust to the VIPs personal pages.
Furthermore, it can help to discover fake page, protect the privacy,
reduce crimes of personality-theft, and increase the sense of trust and
satisfaction by friends and admirers in interacting with SNS.
Abstract: Space-time block code(STBC) has been studied to get
full diversity and full rate in multiple input multiple output(MIMO)
system. Achieving full rate is difficult in cooperative communications
due to the each user consumes the time slots for transmitting
information in cooperation phase. So combining MIMO systems
with cooperative communications has been researched for full diversity
and full rate. In orthogonal frequency division multiple access
(OFDMA) system, it is an alternative way that each user shares their
allocated subchannels instead of using the MIMO system to improve
the transmission rate. In this paper, a Decode-and-forward (DF)
based cooperative communication scheme is proposed. The proposed
scheme has improved transmission rate and reliability in multi-path
fading channel of the OFDMA up-link condition by modified STBC
structure and subchannel sharing.
Abstract: Latvia is the fourth in the world by means of broadband internet speed. The total number of internet users in Latvia exceeds 70% of its population. The number of active mailboxes of the local internet e-mail service Inbox.lv accounts for 68% of the population and 97.6% of the total number of internet users. The Latvian portal Draugiem.lv is a phenomenon of social media, because 58.4 % of the population and 83.5% of internet users use it. A majority of Latvian company profiles are available on social networks, the most popular being Twitter.com. These and other parameters prove the fact consumers and companies are actively using the Internet.
However, after the authors in a number of studies analyzed how enterprises are employing the e-environment, namely, e-environment tools, they arrived to the conclusions that are not as flattering as the aforementioned statistics. There is an obvious contradiction between the statistical data and the actual studies. As a result, the authors have posed a question: Why are entrepreneurs resistant to e-tools? In order to answer this question, the authors have addressed the Technology Acceptance Model (TAM). The authors analyzed each phase and determined several factors affecting the use of e-environment, reaching the main conclusion that entrepreneurs do not have a sufficient level of e-literacy (digital literacy).
The authors employ well-established quantitative and qualitative methods of research: grouping, analysis, statistic method, factor analysis in SPSS 20 environment etc.
The theoretical and methodological background of the research is formed by, scientific researches and publications, that from the mass media and professional literature, statistical information from legal institutions as well as information collected by the author during the survey.
Abstract: This research aims to create a model for analysis of student motivation behavior on e-Learning based on association rule mining techniques in case of the Information Technology for Communication and Learning Course at Suan Sunandha Rajabhat University. The model was created under association rules, one of the data mining techniques with minimum confidence. The results showed that the student motivation behavior model by using association rule technique can indicate the important variables that influence the student motivation behavior on e-Learning.
Abstract: In this paper, a novel contrast enhancement technique
for contrast enhancement of a low-contrast satellite image has been
proposed based on the singular value decomposition (SVD) and
discrete cosine transform (DCT). The singular value matrix
represents the intensity information of the given image and any
change on the singular values change the intensity of the input image.
The proposed technique converts the image into the SVD-DCT
domain and after normalizing the singular value matrix; the enhanced
image is reconstructed by using inverse DCT. The visual and
quantitative results suggest that the proposed SVD-DCT method
clearly shows the increased efficiency and flexibility of the proposed
method over the exiting methods such as Linear Contrast Stretching
technique, GHE technique, DWT-SVD technique, DWT technique,
Decorrelation Stretching technique, Gamma Correction method
based techniques.
Abstract: One of the difficulties of the vibration-based damage identification methods is the nonuniqueness of the results of damage identification. The different damage locations and severity may cause the identical response signal, which is even more severe for detection of the multiple damage. This paper proposes a new strategy for damage detection to avoid this nonuniqueness. This strategy firstly determines the approximates damage area based on the statistical pattern recognition method using the dynamic strain signal measured by the distributed fiber Bragg grating, and then accurately evaluates the damage information based on the Bayesian model updating method using the experimental modal data. The stochastic simulation method is then used to compute the high-dimensional integral in the Bayesian problem. Finally, an experiment of the plate structure, simulating one part of mechanical structure, is used to verify the effectiveness of this approach.
Abstract: In this paper, a new method of information fusion – DSmT (Dezert and Smarandache Theory) is introduced to apply to managing and dealing with the uncertain information from robot map building. Here we build grid map form sonar sensors and laser range finder (LRF). The uncertainty mainly comes from sonar sensors and LRF. Aiming to the uncertainty in static environment, we propose Classic DSm (DSmC) model for sonar sensors and laser range finder, and construct the general basic belief assignment function (gbbaf) respectively. Generally speaking, the evidence sources are unreliable in physical system, so we must consider the discounting theory before we apply DSmT. At last, Pioneer II mobile robot serves as a simulation experimental platform. We build 3D grid map of belief layout, then mainly compare the effect of building map using DSmT and DST. Through this simulation experiment, it proves that DSmT is very successful and valid, especially in dealing with highly conflicting information. In short, this study not only finds a new method for building map under static environment, but also supplies with a theory foundation for us to further apply Hybrid DSmT (DSmH) to dynamic unknown environment and multi-robots- building map together.