Abstract: In this paper, we propose a multi-agent intelligent
system that is used for monitoring the health conditions of elderly
people. Monitoring the health condition of elderly people is a
complex problem that involves different medical units and requires
continuous monitoring. Such expert system is highly needed in rural
areas because of inadequate number of available specialized
physicians or nurses. Such monitoring must have autonomous
interactions between these medical units in order to be effective. A
multi-agent system is formed by a community of agents that
exchange information and proactively help one another to achieve the
goal of elderly monitoring. The agents in the developed system are
equipped with intelligent decision maker that arms them with the
rule-based reasoning capability that can assist the physicians in
making decisions regarding the medical condition of elderly people.
Abstract: The mineral bioflotation represents a viable
alternative for the evaluation of new processes benefit alternative.
The adsorption bacteria on minerals surfaces will depend mainly on
the type of the microorganism as well as of the studied mineral
surface. In the current study, adhesion of S. carnosus on coal was
studied. Several methods were used as: DRX, Fourier Transform
Infra-Red (FTIR) adhesion isotherms and kinetic. The main goal is to
recovery of organic matter by the microflotation process on coal
particles with biological reagent (S. carnosus). Adhesion tests
revealed that adhesion took place after of 8 h at pH 9. The results
suggest that the adhesion of bacteria to solid substrates can be
considered an abiotic physicochemical process that is consequently
governed by bacterial surface properties such as their specific surface
area, hydrophobicity and surface functionalities. The greatest coal
fine flotability was of 75%, after 5 min of flotation.
Abstract: One of the major goals of Spoken Dialog Systems
(SDS) is to understand what the user utters.
In the SDS domain, the Spoken Language Understanding (SLU)
Module classifies user utterances by means of a pre-definite
conceptual knowledge. The SLU module is able to recognize only the
meaning previously included in its knowledge base. Due the vastity
of that knowledge, the information storing is a very expensive
process.
Updating and managing the knowledge base are time-consuming
and error-prone processes because of the rapidly growing number of
entities like proper nouns and domain-specific nouns. This paper
proposes a solution to the problem of Name Entity Recognition
(NER) applied to a SDS domain. The proposed solution attempts to
automatically recognize the meaning associated with an utterance by
using the PANKOW (Pattern based Annotation through Knowledge
On the Web) method at runtime.
The method being proposed extracts information from the Web to
increase the SLU knowledge module and reduces the development
effort. In particular, the Google Search Engine is used to extract
information from the Facebook social network.
Abstract: Web search engines are designed to retrieve and
extract the information in the web databases and to return dynamic
web pages. The Semantic Web is an extension of the current web in
which it includes semantic content in web pages. The main goal of
semantic web is to promote the quality of the current web by
changing its contents into machine understandable form. Therefore,
the milestone of semantic web is to have semantic level information
in the web. Nowadays, people use different keyword- based search
engines to find the relevant information they need from the web.
But many of the words are polysemous. When these words are
used to query a search engine, it displays the Search Result Records
(SRRs) with different meanings. The SRRs with similar meanings are
grouped together based on Word Sense Disambiguation (WSD). In
addition to that semantic annotation is also performed to improve the
efficiency of search result records. Semantic Annotation is the
process of adding the semantic metadata to web resources. Thus the
grouped SRRs are annotated and generate a summary which
describes the information in SRRs. But the automatic semantic
annotation is a significant challenge in the semantic web. Here
ontology and knowledge based representation are used to annotate
the web pages.
Abstract: The growth of wireless devices affects the availability
of limited frequencies or spectrum bands as it has been known that
spectrum bands are a natural resource that cannot be added.
Meanwhile, the licensed frequencies are idle most of the time.
Cognitive radio is one of the solutions to solve those problems.
Cognitive radio is a promising technology that allows the unlicensed
users known as secondary users (SUs) to access licensed bands
without making interference to licensed users or primary users (PUs).
As cloud computing has become popular in recent years, cognitive
radio networks (CRNs) can be integrated with cloud platform. One of
the important issues in CRNs is security. It becomes a problem since
CRNs use radio frequencies as a medium for transmitting and CRNs
share the same issues with wireless communication systems. Another
critical issue in CRNs is performance. Security has adverse effect to
performance and there are trade-offs between them. The goal of this
paper is to investigate the performance related to security trade-off in
CRNs with supporting cloud platforms. Furthermore, Queuing
Network Models with preemptive resume and preemptive repeat
identical priority are applied in this project to measure the impact of
security to performance in CRNs with or without cloud platform. The
generalized exponential (GE) type distribution is used to reflect the
bursty inter-arrival and service times at the servers. The results show
that the best performance is obtained when security is disabled and
cloud platform is enabled.
Abstract: It is known that residual welding deformations give
negative effect to processability and operational quality of welded
structures, complicating their assembly and reducing strength.
Therefore, selection of optimal technology, ensuring minimum
welding deformations, is one of the main goals in developing a
technology for manufacturing of welded structures.
Through years, JSC SSTC has been developing a theory for
estimation of welding deformations and practical activities for
reducing and compensating such deformations during welding
process. During long time a methodology was used, based on analytic
dependence. This methodology allowed defining volumetric changes
of metal due to welding heating and subsequent cooling. However,
dependences for definition of structures deformations, arising as a
result of volumetric changes of metal in the weld area, allowed
performing calculations only for simple structures, such as units, flat
sections and sections with small curvature. In case of complex 3D
structures, estimations on the base of analytic dependences gave
significant errors.
To eliminate this shortage, it was suggested to use finite elements
method for resolving of deformation problem. Here, one shall first
calculate volumes of longitudinal and transversal shortenings of
welding joints using method of analytic dependences and further,
with obtained shortenings, calculate forces, which action is
equivalent to the action of active welding stresses. Further, a finiteelements
model of the structure is developed and equivalent forces
are added to this model. Having results of calculations, an optimal
sequence of assembly and welding is selected and special measures to
reduce and compensate welding deformations are developed and
taken.
Abstract: This paper presents the application of finite dynamic
programming, specifically the "Markov Chain" model, as part of the
decision making process of a company in the cosmetics sector located
in the vicinity of Bogota DC. The objective of this process was to
decide whether the company should completely reconstruct its
wastewater treatment plant or instead optimize the plant through the
addition of equipment. The goal of both of these options was to make
the required improvements in order to comply with parameters
established by national legislation regarding the treatment of waste
before it is released into the environment. This technique will allow
the company to select the best option and implement a solution for
the processing of waste to minimize environmental damage and the
acquisition and implementation costs.
Abstract: Artificial Neural Networks (ANN) trained using backpropagation
(BP) algorithm are commonly used for modeling
material behavior associated with non-linear, complex or unknown
interactions among the material constituents. Despite multidisciplinary
applications of back-propagation neural networks
(BPNN), the BP algorithm possesses the inherent drawback of
getting trapped in local minima and slowly converging to a global
optimum. The paper present a hybrid artificial neural networks and
genetic algorithm approach for modeling slump of ready mix
concrete based on its design mix constituents. Genetic algorithms
(GA) global search is employed for evolving the initial weights and
biases for training of neural networks, which are further fine tuned
using the BP algorithm. The study showed that, hybrid ANN-GA
model provided consistent predictions in comparison to commonly
used BPNN model. In comparison to BPNN model, the hybrid ANNGA
model was able to reach the desired performance goal quickly.
Apart from the modeling slump of ready mix concrete, the synaptic
weights of neural networks were harnessed for analyzing the relative
importance of concrete design mix constituents on the slump value.
The sand and water constituents of the concrete design mix were
found to exhibit maximum importance on the concrete slump value.
Abstract: As Malaysia aims to be a developed country by year 2020; the construction industry has since been identified as a major catalyst for the country to attain the status. It is one of the sectors that contribute to most environmental pollutions. It is, therefore, important for the industry to implement sustainable construction practices to reduce the negative impacts that it has on the environment. However, most Malaysian developers have placed much focus on market demand and economic factors; neglecting the need for attention on environmental issues. The practice of sustainable construction is deemed to be an obstacle to achieve short-term economic goals due to the higher cost incurred in the operations. Hence, choices need to be made and a balance needs to be struck in weighing the long-term environmental benefits against immediate economic factors. This paper discusses the challenges faced by Malaysian developers in adopting sustainable practices in the construction industry and the cause of these challenges. It also looks into the achievements and breakthroughs that developers in Malaysia have achieved so far. The paper aims explores the long-term benefits of sustainable practices that would potentially raise awareness on the feasibility and economic potential of sustainable construction.
Abstract: The expanded Invasive Weed Optimization algorithm (exIWO) is an optimization metaheuristic modelled on the original IWO version created by the researchers from the University of Tehran. The authors of the present paper have extended the exIWO algorithm introducing a set of both deterministic and non-deterministic strategies of individuals’ selection. The goal of the project was to evaluate the exIWO by testing its usefulness for solving some test instances of the traveling salesman problem (TSP) taken from the TSPLIB collection which allows comparing the experimental results with optimal values.
Abstract: The society of 3rd Generation Partnership Project (3GPP) is completed developing Long Term Evolution Advanced (LTE-Advanced) systems as a standard 4G cellular system. This generation goals to produce conditions for a new radio-access technology geared to higher data rates, low latency, and better spectral efficiency. LTE-Advanced is an evolutionary step in the continuing development of LTE where the description in this article is based on LTE release 10. This paper provides a model of the traffic links of 4G system represented by LTE-Advanced system with the effect of the Transmission Control Protocols (TCP) and Stream Control Transmission Protocol (SCTP) in term of throughput and packet loss. Furthermore, the article presents the investigation and the analysis the behavior of SCTP and TCP variants over the 4G cellular systems. The traffic model and the scenario of the simulation developed using the network simulator NS-2 using different TCP source variants.
Abstract: Recently there has been a dramatic proliferation in
the number of social networking sites (SNSs) users; however, little
is published about what motivates college students to use SNSs in
education. The main goal of this research is to explore the college
students’ motives for using SNSs in education. A conceptual
framework has therefore been developed to identify the main
factors that influence/motivate students to use social networking
sites for learning purposes. To achieve the research objectives a
quantitative method was used to collect data. A questionnaire has
been distributed amongst college students. The results reveal that
social influence, perceived enjoyment, institute regulation,
perceived usefulness, ranking up-lift, attractiveness,
communication tools, free of charge, sharing material and course
nature all play an important role in the motivation of college
students to use SNSs for learning purposes.
Abstract: To measure or asses any government’s efficiency we need to measure the performance of this government in regards to the quality of the service it provides. Using a technological platform in service provision became a trend and a public demand. It is also a public need to make sure these services are aligned to values and to the whole government’s strategy, vision and goals as well. Providing services using technology tools and channels can enhance the internal business process and also help establish many essential values to government services like transparency and excellence, since in order to establish e-services many standards and policies must be put in place to enable the handing over of decision making to a mature system oriented mechanism. There was no doubt that the Sultanate of Oman wanted to enhance its services and move it towards automation and establishes a smart government as well as links its services to life events. Measuring government efficiency is very essential in achieving social security and economic growth, since it can provide a clear dashboard of all projects and improvements. Based on this data we can improve the strategies and align the country goals to them.
Abstract: Negotiation is a specific form of interaction based on communication in which the parties enter into deliberately, each with clear but different interests or goals and a mutual dependency towards a decision due to be taken at the end of the confrontation. Consequently, negotiation is a complex activity involving many different disciplines from the strategic aspects and the decision making process to the evaluation of alternatives or outcomes and the exchange of information. While gender differences can be considered as one of the most researched topic within negotiation studies, empirical works and theory present many conflicting evidences and results about the role of gender in the process or the outcome. Furthermore, little interest has been shown over gender differences in the definition of what is negotiation, its essence or fundamental elements. Or, as differences exist in practices, it might be essential to study if the starting point of these discrepancies does not come from different considerations about what is negotiation and what will encourage the participants in their strategic decisions. Some recent and promising experiments made with diverse groups show that male and female participants in a common and shared situation barely consider the same way the concepts of power, trust or stakes which are largely considered as the usual driving forces of any negotiation. Furthermore, results from Human Resource self-assessment tests display and confirm considerable differences between individuals regarding essential behavioral dimensions like capacity to improvise and to achieve, aptitude to conciliate or to compete and orientation towards power and group domination which are also part of negotiation skills. Our intention in this paper is to confront these dimensions with negotiation’s usual driving forces in order to build up new paths for further research.
Abstract: In the world of modern communications, visual identity has predominant influence on the overall success of tourist destinations, but despite of these, the problem of designing thriving tourist destination visual identity and their components are hardly addressed. This study highlights the importance of building and managing the visual identity of tourist destination, and based on the empirical study of well-known Mediterranean destination of Croatia analyses three main components of tourist destination visual identity; name, slogan, and logo. Moreover, the paper shows how respondents perceive each component of Croatia’s visual identity. According to study, logo is the most important, followed by the name and slogan. Research also reveals that Croatian economy lags behind developed countries in understanding the importance of visual identity, and its influence on marketing goal achievements.
Abstract: Keyboard is the most important equipment for computer tasks. However, improper design of keyboard would cause some symptoms like ulnar and/or radial deviations. The research goal of this study was to investigate the optimal size(s) of keycaps to increase efficiency. As shown in the questionnaire pre-study with 49 participants aged from 20 to 44, the most commonly used keyboards were 101-key standard keyboards. Most of the keycap sizes (W×L) were 1.3×1.5 cm and 1.5×1.5 cm. The fingertip breadths of most participants were 1.2 cm. Therefore, in the main study with 18 participants, a standard keyboard with each set of the 3-sized (1.2×1.4 cm, 1.3×1.5 cm, and 1.5×1.5 cm) keycaps were used to investigate their typing efficiency, respectively. The results revealed that the differences between the operating times for using 1.3×1.5 cm and 1.2×1.4 cm keycaps was insignificant while operating times for using 1.5×1.5cm keycaps were significantly longer than for using 1.2×1.4 cm or 1.3×1.5 cm, respectively. As for typing error rate, there was no significant difference.
Abstract: Interorganizational knowledge sharing is the major driving force to maximize the operational benefits across supply chain. Trust is considered as the key to facilitate knowledge sharing. This research proposes shared values and relational embeddedness as antecedents of interorganizational trust. Survey based on managers in major industrial parks in Taiwan confirm that trust is enforced when organizations develop shared values and formed social relational embeddedness. Trust leads to interorganizational knowledge sharing. This research has theoretical and practical implications.
Abstract: This research aims to create a knowledge-based system as a database for self-healthcare analysis, diagnosis of simple illnesses, and the use of Thai herbs instead of modern medicine by using principles of Thai traditional medication theory. These were disseminated by website network programs within Suan Sunandha Rajabhat University. The population used in this study was divided into two groups: the first group consisted of four experts of Thai traditional medication and the second group was 300 website users. The methods used for collecting data were paper questionnaires and poll questionnaires on the website. The statistics used for analyzing data was at an average level. The results were divided into three parts: the first part was the development of a knowledge-based system and the second part was applied programs on website. Both parts could be fulfilled and achieved according to the set goal. The third part was the evaluation of the study: The evaluation of the viewpoints of the experts towards website designs were evaluated at a good level of 4.20. The satisfaction evaluation of the users was found at a good level of average satisfactory level at 4.24. It was found that the young population of those under the age of 16 had less cares about their health than the population of other teenagers, working age adults and those of older age. The research findings should be extended in order to encourage the lifestyle modifications to people of all ages by using the self-healthcare principles.
Abstract: This paper provides an analysis of the insurance cycle in the Republic of Croatia and whether they are affected by catastrophic losses on a global level. In general, it is considered that insurance cycles are particularly pronounced in periods of financial crisis, but are also affected by the growing number of catastrophic losses. They cause the change of insurance cycle and premium growth and intensification and narrowing of the coverage conditions, so these variables move in the same direction and these phenomena point to a new cycle. The main goal of this paper is to determine the existence of insurance cycle in the Republic of Croatia and investigate whether catastrophic losses have an influence on insurance cycles.
Abstract: Recent growth in digital multimedia technologies has presented a lot of facilities in information transmission, reproduction and manipulation. Therefore, the concept of information security is one of the superior articles in the present day situation. The biometric information security is one of the information security mechanisms. It has the advantages as well as disadvantages. The biometric system is at risk to a range of attacks. These attacks are anticipated to bypass the security system or to suspend the normal functioning. Various hazards have been discovered while using biometric system. Proper use of steganography greatly reduces the risks in biometric systems from the hackers. Steganography is one of the fashionable information hiding technique. The goal of steganography is to hide information inside a cover medium like text, image, audio, video etc. through which it is not possible to detect the existence of the secret information. Here in this paper a new security concept has been established by making the system more secure with the help of steganography along with biometric security. Here the biometric information has been embedded to a skin tone portion of an image with the help of proposed steganographic technique.