Abstract: Recently, numerous documents including large
volumes of unstructured data and text have been created because of the
rapid increase in the use of social media and the Internet. Usually,
these documents are categorized for the convenience of users. Because
the accuracy of manual categorization is not guaranteed, and such
categorization requires a large amount of time and incurs huge costs.
Many studies on automatic categorization have been conducted to help
mitigate the limitations of manual categorization. Unfortunately, most
of these methods cannot be applied to categorize complex documents
with multiple topics because they work on the assumption that
individual documents can be categorized into single categories only.
Therefore, to overcome this limitation, some studies have attempted to
categorize each document into multiple categories. However, the
learning process employed in these studies involves training using a
multi-categorized document set. These methods therefore cannot be
applied to the multi-categorization of most documents unless
multi-categorized training sets using traditional multi-categorization
algorithms are provided. To overcome this limitation, in this study, we
review our novel methodology for extending the category of a
single-categorized document to multiple categorizes, and then
introduce a survey-based verification scenario for estimating the
accuracy of our automatic categorization methodology.
Abstract: Due to the fast and flawless technological innovation
there is a tremendous amount of data dumping all over the world in
every domain such as Pattern Recognition, Machine Learning, Spatial
Data Mining, Image Analysis, Fraudulent Analysis, World Wide
Web etc., This issue turns to be more essential for developing several
tools for data mining functionalities. The major aim of this paper is to
analyze various tools which are used to build a resourceful analytical
or descriptive model for handling large amount of information more
efficiently and user friendly. In this survey the diverse tools are
illustrated with their extensive technical paradigm, outstanding
graphical interface and inbuilt multipath algorithms in which it is
very useful for handling significant amount of data more indeed.
Abstract: Digital reference service is when a traditional library
reference service is provided electronically. In most cases users do
not get full satisfaction from using digital reference service due to
variety of reasons. This paper discusses the formal specification of
web services applications for digital reference services (WSDRS).
WSDRS is an informal model that claims to reduce the problems of
digital reference services in libraries. It uses web services technology
to provide efficient digital way of satisfying users’ need in the
reference section of libraries. Informal model is in natural language
which is inconsistent and ambiguous that may cause difficulties to the
developers of the system. In order to solve this problem we decided
to convert the informal specifications into formal specifications. This
is supposed to reduce the overall development time and cost. We use
Z language to develop the formal model and verify it with Z/EVES
theorem prover tool.
Abstract: This paper addresses the issue of resource allocation
in the emerging cognitive technology. Focusing the Quality of
Service (QoS) of Primary Users (PU), a novel method is proposed for
the resource allocation of Secondary Users (SU). In this paper, we
propose the unique Utility Function in the game theoretic model of
Cognitive Radio which can be maximized to increase the capacity of
the Cognitive Radio Network (CRN) and to minimize the
interference scenario. Utility function is formulated to cater the need
of PUs by observing Signal to Noise ratio. Existence of Nash
Equilibrium for the postulated game is established.
Abstract: This paper describes I²C Slave implementation using
I²C master obtained from the OpenCores website. This website
provides free Verilog and VHDL Codes to users. The design
implementation for the I²C slave is in Verilog Language and uses
EDA tools for ASIC design known as ModelSim from Mentor
Graphic. This tool is used for simulation and verification purposes.
Common application for this I²C Master-Slave integration is also
included. This paper also addresses the advantages and limitations of
the said design.
Abstract: This paper illustrates the background of various
concepts, approaches, terminologies used to describe the basic
framework of an Islamic Hotel Room design. This paper reviews the
theoretical views in establishing a suitable and optimum environment
for Muslim as well as non-Muslim guests in hotel rooms while
according to shariah. It involves a few research methodologies that
requires the researcher to study on a few characteristics needed to
create more efficient rooms in terms of social interaction, economic
growth and other tolerable elements. This paper intends on revealing
the elements that are vital and may contribute for hotels in achieving
a more conclusive research on space planning for hotel rooms
focusing on the shariah and Muslim guests. Malaysia is an Islamic
country and has billion of tourists coming over for business and
recreational purposes. Therefore, having a righteous environment that
best suit this target user is important in terms of generating the
economy as well as providing a better understanding to the
community on the benefits of applying these qualities in a
conventional resort design.
Abstract: Home Energy Management System (HEMS), which makes the residential consumers, contribute to the demand response is attracting attention in recent years. An aim of HEMS is to minimize their electricity cost by controlling the use of their appliances according to electricity price. The use of appliances in HEMS may be affected by some conditions such as external temperature and electricity price. Therefore, the user’s usage pattern of appliances should be modeled according to the external conditions, and the resultant usage pattern is related to the user’s comfortability on use of each appliances. This paper proposes a methodology to model the usage pattern based on the historical data with the copula function. Through copula function, the usage range of each appliance can be obtained and is able to satisfy the appropriate user’s comfort according to the external conditions for next day. Within the usage range, an optimal scheduling for appliances would be conducted so as to minimize an electricity cost with considering user’s comfort. Among the home appliance, electric heater (EH) is a representative appliance, which is affected by the external temperature. In this paper, an optimal scheduling algorithm for an electric heater (EH) is addressed based on the method of branch and bound. As a result, scenarios for the EH usage are obtained according to user’s comfort levels and then the residential consumer would select the best scenario. The case study shows the effects of the proposed algorithm compared with the traditional operation of the EH, and it represents impacts of the comfort level on the scheduling result.
Abstract: This paper contributes to the ongoing debate as to the relevance of translation studies to professional practitioners. It exposes the various misconceptions permeating the links between theory and practice in the translation landscape in the Arab World. It is a thesis of this paper that specialization in translation should be redefined; taking account of the fact, that specialized knowledge alone is neither crucial nor sufficient in technical translation. It should be tested against the readability of the translated text, the appropriateness of its style and the usability of its content by endusers to carry out their intended tasks. The paper also proposes a preliminary model to establish a working link between theory and practice from the perspective of professional trainers and practitioners, calling for the latter to participate in the production of knowledge in a systematic fashion. While this proposal is driven by a rather intuitive conviction, a research line is needed to specify the methodological moves to establish the mediation strategies that would relate the components in the model of knowledge transfer proposed in this paper.
Abstract: This paper explores and provides substantiated
evidence on the usage patterns of Information and Communication
Technologies (ICTs) by female users at Vhembe District in Limpopo-
Province, South Africa. The study presents a comprehensive picture
on the usage of ICTs from female users’ perspective. The
significance of this study stems from the need to assess the role,
relevance and usage patterns of ICTs such as smartphones,
computers, laptops, and iPods, the internet and social networking
sites among females following the developments of new media
technologies in society. The objective of the study is to investigate
the usability and accessibility of ICTs to empower female users in
South Africa. The study used quantitative and qualitative research
methods to determine the major ideas, perceptions and usage patterns
of ICTs by users. Data collection involved the use of structured selfadministered
questionnaire from two groups of respondents who
participated in this study. Thus, (n=50) female students at the
University of Venda provided their ideas and perceptions about the
usefulness and usage patterns of ICTs such as smartphones, the
Internet and computers at the university level, whereas, the second
group were (n=50) learners from Makhado Comprehensive School
who provided their perceptions and ideas about the use of ICTs at the
high school level. The researcher also noted that the findings of the
study were useful as a guideline and model for ICT intervention that
could work as an empowerment to women in South Africa. It was
observed that the central purpose of ICTs among female users was to
search for information regarding assignment writing, conducting
research, dating, exchanging ideas and networking with friends and
relatives. This was demonstrated by a high number of females who
used ICTs for e-learning (62%) and social purposes (85%).
Therefore, the study revealed that most females used ICTs for social
purposes and accessing the internet rather than for entertainment, a
gesture that provides an opportune space to empower rural women in
South Africa.
Abstract: This paper presents the interface ConductHome which
controls home automation systems with a Leap Motion using
“invariant gesture protocols”. This interface is meant to simplify the
interaction of the user with its environment. A hardware part allows
the Leap Motion to be carried around the house. A software part
interacts with the home automation box and displays the useful
information for the user. An objective of this work is the
development of a natural/invariant/simple gesture control interface to
help elder people/people with disabilities.
Abstract: The availability to deploy mobile applications for
health care is increasing daily thru different mobile app stores. But
within these capabilities the number of hacking attacks has also
increased, in particular into medical mobile applications. The security
vulnerabilities in medical mobile apps can be triggered by errors in
code, incorrect logic, poor design, among other parameters. This is
usually used by malicious attackers to steal or modify the users’
information. The aim of this research is to analyze the vulnerabilities
detected in mobile medical apps according to risk factor standards
defined by OWASP in 2014.
Abstract: In many countries, governments have been promoting the involvement of private sector entities to enter into long-term agreements for the development and delivery of large infrastructure projects, with a focus on overcoming the limitations upon public fund of the traditional approach. The involvement of private sector through public private partnerships (PPP) brings in new capital investments, value for money and additional risks to handle. Worldwide research studies have shown that an objective, systematic, reliable and useroriented risk assessment process and an optimal allocation mechanism among different stakeholders is crucial to the successful completion. In this framework, this paper, which is the first stage of a research study, aims to identify the main risks for the delivery of PPP projects. A review of cross-countries research projects and case studies was performed to map the key risks affecting PPP infrastructure delivery. The matrix of mapping offers a summary of the frequency of factors, clustered in eleven categories: construction, design, economic, legal, market, natural, operation, political, project finance, project selection and relationship. Results will highlight the most critical risk factors, and will hopefully assist the project managers in directing the managerial attention in the further stages of risk allocation.
Abstract: The web services applications for digital reference
service (WSDRS) of LIS model is an informal model that claims to
reduce the problems of digital reference services in libraries. It uses
web services technology to provide efficient way of satisfying users’
needs in the reference section of libraries. The formal WSDRS model
consists of the Z specifications of all the informal specifications of
the model. This paper discusses the formal validation of the Z
specifications of WSDRS model. The authors formally verify and
thus validate the properties of the model using Z/EVES theorem
prover.
Abstract: Web mining is to discover and extract useful
Information. Different users may have different search goals when
they search by giving queries and submitting it to a search engine.
The inference and analysis of user search goals can be very useful for
providing an experience result for a user search query. In this project,
we propose a novel approach to infer user search goals by analyzing
search web logs. First, we propose a novel approach to infer user
search goals by analyzing search engine query logs, the feedback
sessions are constructed from user click-through logs and it
efficiently reflect the information needed for users. Second we
propose a preprocessing technique to clean the unnecessary data’s
from web log file (feedback session). Third we propose a technique
to generate pseudo-documents to representation of feedback sessions
for clustering. Finally we implement k-medoids clustering algorithm
to discover different user search goals and to provide a more optimal
result for a search query based on feedback sessions for the user.
Abstract: Communicating users' needs, goals and problems help
designers and developers overcome challenges faced by end users.
Personas are used to represent end users’ needs. In our research,
creating personas allowed the following questions to be answered:
Who are the potential user groups? What do they want to achieve by
using the service? What are the problems that users face? What
should the service provide to them? To develop realistic personas, we
conducted a focus group discussion with undergraduate and graduate
students and also interviewed a university librarian. The personas
were created to help evaluating the Institutional Repository that is
based on the DSpace system. The profiles helped to communicate
users' needs, abilities, tasks, and problems, and the task scenarios
used in the heuristic evaluation were based on these personas. Four
personas resulted of a focus group discussion with undergraduate and
graduate students and from interviewing a university librarian. We
then used these personas to create focused task-scenarios for a
heuristic evaluation on the system interface to ensure that it met
users' needs, goals, problems and desires. In this paper, we present
the process that we used to create the personas that led to devise the
task scenarios used in the heuristic evaluation as a follow up study of
the DSpace university repository.
Abstract: The access to relevant information that is adapted to
user’s needs, preferences and environment is a challenge in many
applications running. That causes an appearance of context-aware
systems. To facilitate the development of this class of applications, it
is necessary that these applications share a common context
metamodel. In this article, we will present our context metamodel
that is defined using the OMG Meta Object facility (MOF).This
metamodel is based on the analysis and synthesis of context concepts
proposed in literature.
Abstract: A large amount of software products offer a wide
range and number of features. This is called featuritis or creeping
featurism and tends to rise with each release of the product. Feautiris
often adds unnecessary complexity to software, leading to longer
learning curves and overall confusing the users and degrading their
experience. We take a look to a new design approach tendency that
has been coming up, the so-called “What You Get is What You
Need” concept that argues that products should be very focused,
simple and with minimalistic interfaces in order to help users conduct
their tasks in distraction-free ambiences. This isn’t as simple to
implement as it might sound and the developers need to cut down
features. Our contribution illustrates and evaluates this design method
through a novel distraction-free diagramming tool named Delineato
Pro for Mac OS X in which the user is confronted with an empty
canvas when launching the software and where tools only show up
when really needed.
Abstract: In order to obtain efficient pollutants removal in
small-scale wastewater treatment plants, uniform water flow has to be
achieved. The experimental setup, designed for treating high-load
wastewater (leachate), consists of two aerobic biological reactors and
a lamellar settler. Both biological tanks were aerated by using three
different types of aeration systems - perforated pipes, membrane air
diffusers and tube ceramic diffusers. The possibility of homogenizing
the water mass with each of the air diffusion systems was evaluated
comparatively. The oxygen concentration was determined by optical
sensors with data logging. The experimental data was analyzed
comparatively for all three different air dispersion systems aiming to
identify the oxygen concentration variation during different
operational conditions. The Oxygenation Capacity was calculated for
each of the three systems and used as performance and selection
parameter. The global mass transfer coefficients were also evaluated
as important tools in designing the aeration system. Even though
using the tubular porous diffusers leads to higher oxygen
concentration compared to the perforated pipe system (which
provides medium-sized bubbles in the aqueous solution), it doesn’t
achieve the threshold limit of 80% oxygen saturation in less than 30
minutes. The study has shown that the optimal solution for the
studied configuration was the radial air diffusers which ensure an
oxygen saturation of 80% in 20 minutes. An increment of the values
was identified when the air flow was increased.
Abstract: This research presents the main ideas to implement an
intelligent system composed by communicating wireless sensors
measuring environmental data linked to drought indicators (such as
air temperature, soil moisture , etc...). On the other hand, the setting
up of a spatio temporal database communicating with a Web mapping
application for a monitoring in real time in activity 24:00 /day, 7
days/week is proposed to allow the screening of the drought
parameters time evolution and their extraction. Thus this system
helps detecting surfaces touched by the phenomenon of drought.
Spatio-temporal conceptual models seek to answer the users who
need to manage soil water content for irrigating or fertilizing or other
activities pursuing crop yield augmentation. Effectively, spatiotemporal
conceptual models enable users to obtain a diagram of
readable and easy data to apprehend. Based on socio-economic
information, it helps identifying people impacted by the phenomena
with the corresponding severity especially that this information is
accessible by farmers and stakeholders themselves. The study will be
applied in Siliana watershed Northern Tunisia.
Abstract: Feature selection has been used in many fields such as
classification, data mining and object recognition and proven to be
effective for removing irrelevant and redundant features from the
original dataset. In this paper, a new design of distributed intrusion
detection system using a combination feature selection model based
on bees and decision tree. Bees algorithm is used as the search
strategy to find the optimal subset of features, whereas decision tree
is used as a judgment for the selected features. Both the produced
features and the generated rules are used by Decision Making Mobile
Agent to decide whether there is an attack or not in the networks.
Decision Making Mobile Agent will migrate through the networks,
moving from node to another, if it found that there is an attack on one
of the nodes, it then alerts the user through User Interface Agent or
takes some action through Action Mobile Agent. The KDD Cup 99
dataset is used to test the effectiveness of the proposed system. The
results show that even if only four features are used, the proposed
system gives a better performance when it is compared with the
obtained results using all 41 features.