Abstract: This paper describes the challenges on the requirements engineering for developing an enterprise applications in higher
education environment. The development activities include software implementation, maintenance, and enhancement and support for online
transaction processing and overnight batch processing.
Generally, an enterprise application for higher education environment
may include Student Information System (SIS), HR/Payroll system,
Financial Systems etc. By the way, there are so many challenges in
requirement engineering phases in order to provide two distinctive
services that are production processing support and systems
development.
Abstract: The Informational Infrastructures of small and medium-sized manufacturing enterprises are relatively poor, there are serious shortages of capitals which can be invested in informatization construction, computer hardware and software resources, and human resources. To address the informatization issue in small and medium-sized manufacturing enterprises, and enable them to the application of advanced management thinking and enhance their competitiveness, the paper establish a manufacturing-oriented small and medium-sized enterprises informatization platform based on the ASP business intelligence technology, which effectively improves the scientificity of enterprises decision and management informatization.
Abstract: Among all geo-hydrological relationships, rainfallrunoff
relationship is of utmost importance in any hydrological
investigation and water resource planning. Spatial variation, lag time
involved in obtaining areal estimates for the basin as a whole can
affect the parameterization in design stage as well as in planning
stage. In conventional hydrological processing of data, spatial aspect
is either ignored or interpolated at sub-basin level. Temporal
variation when analysed for different stages can provide clues for its
spatial effectiveness. The interplay of space-time variation at pixel
level can provide better understanding of basin parameters.
Sustenance of design structures for different return periods and their
spatial auto-correlations should be studied at different geographical
scales for better management and planning of water resources.
In order to understand the relative effect of spatio-temporal
variation in hydrological data network, a detailed geo-hydrological
analysis of Betwa river catchment falling in Lower Yamuna Basin is
presented in this paper. Moreover, the exact estimates about the
availability of water in the Betwa river catchment, especially in the
wake of recent Betwa-Ken linkage project, need thorough scientific
investigation for better planning. Therefore, an attempt in this
direction is made here to analyse the existing hydrological and
meteorological data with the help of SPSS, GIS and MS-EXCEL
software. A comparison of spatial and temporal correlations at subcatchment
level in case of upper Betwa reaches has been made to
demonstrate the representativeness of rain gauges. First, flows at
different locations are used to derive correlation and regression
coefficients. Then, long-term normal water yield estimates based on
pixel-wise regression coefficients of rainfall-runoff relationship have
been mapped. The areal values obtained from these maps can
definitely improve upon estimates based on point-based
extrapolations or areal interpolations.
Abstract: Location-based services (LBS) exploit the known
location of a user to provide services dependent on their geographic
context and personalized needs [1].
The development and arrival of broadband mobile data networks
supported with mobile terminals equipped with new location
technologies like GPS have finally created opportunities for
implementation of LBS applications. But, from the other side,
collecting location information data in general raises privacy
concerns.
This paper presents results from two surveys of LBS acceptance in
Croatia. The first survey was administered on 181 students, and the
second extended survey involved pattern of 180 Croatian citizens.
We developed questionnaire which consists of descriptions of 15
different applications with scale which measures perceptions and
attitudes of users towards these applications.
We report the results to identify potential commercial applications
for LBS in B2C segment. Our findings suggest that some types of
applications like emergency&safety services and navigation have
significantly higher rate of acceptance than other types.
Abstract: The article examines an opportunity of corruption
restriction exercised by international business community in Russia.
Integration of Russian economy into the international business does
not reduce corruption inside the country. Foreign actors investing in
Russia under the condition of obtaining their required rates of returns
will be reluctant to harm their investments by involving into anticorruption
activities. Furthermore, many Russian firms- competitive
advantage could be directly related to their corruption connections. In
this case, foreign investments would only accentuate corrupt
companies- success by supporting them financially
Abstract: Methanol-to-olefins (MTO) coupled with
transformation of coal or natural gas to methanol gives an interesting
and promising way to produce ethylene and propylene. To investigate
solid concentration in gas-solid fluidized bed for methanol-to-olefins
process catalyzed by SAPO-34, a cold model experiment system is
established in this paper. The system comprises a gas distributor in a
300mm internal diameter and 5000mm height acrylic column, the
fiber optic probe system and series of cyclones. The experiments are
carried out at ambient conditions and under different superficial gas
velocity ranging from 0.3930m/s to 0.7860m/s and different initial bed
height ranging from 600mm to 1200mm. The effects of radial
distance, axial distance, superficial gas velocity, initial bed height on
solid concentration in the bed are discussed. The effects of distributor
shape and porosity on solid concentration are also discussed. The
time-averaged solid concentration profiles under different conditions
are obtained.
Abstract: In this paper we present modeling and simulation for
physical vapor deposition for metallic bipolar plates. In the models
we discuss the application of different models to simulate the
transport of chemical reactions of the gas species in the gas chamber.
The so called sputter process is an extremely sensitive process to
deposit thin layers to metallic plates. We have taken into account
lower order models to obtain first results with respect to the gas
fluxes and the kinetics in the chamber.
The model equations can be treated analytically in some
circumstances and complicated multi-dimensional models are solved
numerically with a software-package (UG unstructed grids, see [1]).
Because of multi-scaling and multi-physical behavior of the models,
we discuss adapted schemes to solve more accurate in the different
domains and scales. The results are discussed with physical
experiments to give a valid model for the assumed growth of thin
layers.
Abstract: In the normal operation conditions of a pico satellite,
conventional Unscented Kalman Filter (UKF) gives sufficiently good
estimation results. However, if the measurements are not reliable
because of any kind of malfunction in the estimation system, UKF
gives inaccurate results and diverges by time. This study, introduces
Robust Unscented Kalman Filter (RUKF) algorithms with the filter
gain correction for the case of measurement malfunctions. By the use
of defined variables named as measurement noise scale factor, the
faulty measurements are taken into the consideration with a small
weight and the estimations are corrected without affecting the
characteristic of the accurate ones. Two different RUKF algorithms,
one with single scale factor and one with multiple scale factors, are
proposed and applied for the attitude estimation process of a pico
satellite. The results of these algorithms are compared for different
types of measurement faults in different estimation scenarios and
recommendations about their applications are given.
Abstract: Bicycle usage for exercise, recreation, and commuting
to work in Australia shows that pedal cycling is the fourth most
popular activity with 10.6% increase in participants between 2001
and 2007. As with other means of transport, accident and injury
becomes common although mandatory bicycle helmet wearing has
been introduced. The research aims to develop a face surrogate made
of sandwich of rigid foam and rubber sheets to represent human
facial bone under blunt impact. The facial surrogate will serve as an
important test device for further development of facial-impact
protection for cyclist. A test procedure was developed to simulate the
energy of impact and record data to evaluate the effect of impact on
facial bones. Drop tests were performed to establish a suitable
combination of materials. It was found that the sandwich structure of
rigid extruded-polystyrene foam (density of 40 kg/m3 with a pattern
of 6-mm-holes), Neoprene rubber sponge, and Abrasaflex rubber
backing, had impact characteristics comparable to that of human
facial bone. In particular, the foam thickness of 30 mm and 25 mm
was found suitable to represent human zygoma (cheekbone) and
maxilla (upper-jaw bone), respectively.
Abstract: In this paper we analyze the application of a formal proof system to the discrete logarithm problem used in publickey cryptography. That means, we explore a computer verification of the ElGamal encryption scheme with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm is formally verified with computer support. Besides, we present a formalization of the DSA signature scheme in the Isabelle/HOL system. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic signature scheme.
Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.
Abstract: Self-organizing map (SOM) is a well known data
reduction technique used in data mining. It can reveal structure in
data sets through data visualization that is otherwise hard to detect
from raw data alone. However, interpretation through visual
inspection is prone to errors and can be very tedious. There are
several techniques for the automatic detection of clusters of code
vectors found by SOM, but they generally do not take into account
the distribution of code vectors; this may lead to unsatisfactory
clustering and poor definition of cluster boundaries, particularly
where the density of data points is low. In this paper, we propose the
use of an adaptive heuristic particle swarm optimization (PSO)
algorithm for finding cluster boundaries directly from the code
vectors obtained from SOM. The application of our method to
several standard data sets demonstrates its feasibility. PSO algorithm
utilizes a so-called U-matrix of SOM to determine cluster boundaries;
the results of this novel automatic method compare very favorably to
boundary detection through traditional algorithms namely k-means
and hierarchical based approach which are normally used to interpret
the output of SOM.
Abstract: Kernel function, which allows the formulation of nonlinear variants of any algorithm that can be cast in terms of dot products, makes the Support Vector Machines (SVM) have been successfully applied in many fields, e.g. classification and regression. The importance of kernel has motivated many studies on its composition. It-s well-known that reproducing kernel (R.K) is a useful kernel function which possesses many properties, e.g. positive definiteness, reproducing property and composing complex R.K by simple operation. There are two popular ways to compute the R.K with explicit form. One is to construct and solve a specific differential equation with boundary value whose handicap is incapable of obtaining a unified form of R.K. The other is using a piecewise integral of the Green function associated with a differential operator L. The latter benefits the computation of a R.K with a unified explicit form and theoretical analysis, whereas there are relatively later studies and fewer practical computations. In this paper, a new algorithm for computing a R.K is presented. It can obtain the unified explicit form of R.K in general reproducing kernel Hilbert space. It avoids constructing and solving the complex differential equations manually and benefits an automatic, flexible and rigorous computation for more general RKHS. In order to validate that the R.K computed by the algorithm can be used in SVM well, some illustrative examples and a comparison between R.K and Gaussian kernel (RBF) in support vector regression are presented. The result shows that the performance of R.K is close or slightly superior to that of RBF.
Abstract: Medical images require special safety and confidentiality because critical judgment is done on the information provided by medical images. Transmission of medical image via internet or mobile phones demands strong security and copyright protection in telemedicine applications. Here, highly secured and robust watermarking technique is proposed for transmission of image data via internet and mobile phones. The Region of Interest (ROI) and Non Region of Interest (RONI) of medical image are separated. Only RONI is used for watermark embedding. This technique results in exact recovery of watermark with standard medical database images of size 512x512, giving 'correlation factor' equals to 1. The correlation factor for different attacks like noise addition, filtering, rotation and compression ranges from 0.90 to 0.95. The PSNR with weighting factor 0.02 is up to 48.53 dBs. The presented scheme is non blind and embeds hospital logo of 64x64 size.
Abstract: R&D risk management has been suggested as one of
the management approaches for accomplishing the goals of public
R&D investment. The investment in basic science and core technology
development is the essential roles of government for securing the
social base needed for continuous economic growth. And, it is also an
important role of the science and technology policy sectors to generate
a positive environment in which the outcomes of public R&D can be
diffused in a stable fashion by controlling the uncertainties and risk
factors in advance that may arise during the application of such
achievements to society and industry. Various policies have already
been implemented to manage uncertainties and variables that may
have negative impact on accomplishing public R& investment goals.
But we may derive new policy measures for complementing the
existing policies and for exploring progress direction by analyzing
them in a policy package from the viewpoint of R&D risk
management.
Abstract: This paper argues that a product development exercise
involves in addition to the conventional stages, several decisions
regarding other aspects. These aspects should be addressed
simultaneously in order to develop a product that responds to the
customer needs and that helps realize objectives of the stakeholders
in terms of profitability, market share and the like. We present a
framework that encompasses these different development
dimensions. The framework shows that a product development
methodology such as the Quality Function Deployment (QFD) is the
basic tool which allows definition of the target specifications of a
new product. Creativity is the first dimension that enables the
development exercise to live and end successfully. A number of
group processes need to be followed by the development team in
order to ensure enough creativity and innovation. Secondly,
packaging is considered to be an important extension of the product.
Branding strategies, quality and standardization requirements,
identification technologies, design technologies, production
technologies and costing and pricing are also integral parts to the
development exercise. These dimensions constitute the proposed
framework. The paper also presents a mathematical model used to
calculate the design targets based on the target costing principle. The
framework is used to study a case of a new product development in
the telecommunications services sector.
Abstract: We provide a supervised speech-independent voice recognition technique in this paper. In the feature extraction stage we propose a mel-cepstral based approach. Our feature vector classification method uses a special nonlinear metric, derived from the Hausdorff distance for sets, and a minimum mean distance classifier.
Abstract: This research is to study the types of products and
services that employs 'ambient media and respective techniques in its
advertisement materials. Data collection has been done via analyses of a total of 62 advertisements that employed ambient media
approach in Thailand during the years 2004 to 2011. The 62 advertisement were qualifying advertisements of the Adman Awards
& Symposium under the category of Outdoor & Ambience. Analysis
results reveal that there is a total of 14 products and services that
chooses to utilize ambient media in its advertisement. Amongst all ambient media techniques, 'intrusion' uses the value of a medium in
its representation of content most often. Following intrusion is 'interaction', where consumers are invited to participate and interact
with the advertising materials. 'Illusion' ranks third in its ability to subject the viewers to distortions of reality that makes the division
between reality and fantasy less clear.
Abstract: The objective of this research is to investigate the
advantages of using large-diameter 0.7 inch prestressing strands in
pretention applications. The advantages of large-diameter strands are
mainly beneficial in the heavy construction applications. Bridges and
tunnels are subjected to a higher daily traffic with an exponential
increase in trucks ultimate weight, which raise the demand for higher
structural capacity of bridges and tunnels. In this research, precast
prestressed I-girders were considered as a case study. Flexure
capacities of girders fabricated using 0.7 inch strands and different
concrete strengths were calculated and compared to capacities of 0.6
inch strands girders fabricated using equivalent concrete strength.
The effect of bridge deck concrete strength on composite deck-girder
section capacity was investigated due to its possible effect on final
section capacity. Finally, a comparison was made to compare the
bridge cross-section of girders designed using regular 0.6 inch strands
and the large-diameter 0.7 inch. The research findings showed that
structural advantages of 0.7 inch strands allow for using fewer bridge
girders, reduced material quantity, and light-weight members. The
structural advantages of 0.7 inch strands are maximized when high
strength concrete (HSC) are used in girder fabrication, and concrete
of minimum 5ksi compressive strength is used in pouring bridge
decks. The use of 0.7 inch strands in bridge industry can partially
contribute to the improvement of bridge conditions, minimize
construction cost, and reduce the construction duration of the project.
Abstract: Median filters with larger windows offer greater smoothing and are more robust than the median filters of smaller windows. However, the larger median smoothers (the median filters with the larger windows) fail to track low order polynomial trends in the signals. Due to this, constant regions are produced at the signal corners, leading to the loss of fine details. In this paper, an algorithm, which combines the ability of the 3-point median smoother in preserving the low order polynomial trends and the superior noise filtering characteristics of the larger median smoother, is introduced. The proposed algorithm (called the combiner algorithm in this paper) is evaluated for its performance on a test image corrupted with different types of noise and the results obtained are included.