Abstract: In an era of knowledge explosion, the growth of data
increases rapidly day by day. Since data storage is a limited resource,
how to reduce the data space in the process becomes a challenge issue.
Data compression provides a good solution which can lower the
required space. Data mining has many useful applications in recent
years because it can help users discover interesting knowledge in large
databases. However, existing compression algorithms are not
appropriate for data mining. In [1, 2], two different approaches were
proposed to compress databases and then perform the data mining
process. However, they all lack the ability to decompress the data to
their original state and improve the data mining performance. In this
research a new approach called Mining Merged Transactions with the
Quantification Table (M2TQT) was proposed to solve these problems.
M2TQT uses the relationship of transactions to merge related
transactions and builds a quantification table to prune the candidate
itemsets which are impossible to become frequent in order to improve
the performance of mining association rules. The experiments show
that M2TQT performs better than existing approaches.
Abstract: Air conditioning is mainly to be used as human
comfort medium. It has been use more often in country in which the
daily temperatures are high. In scientific, air conditioning is defined
as a process of controlling the moisture, cooling, heating and cleaning
air. Without proper estimation of cooling load, big amount of waste
energy been used because of unsuitable of air conditioning system are
not considering to overcoming heat gains from surrounding. This is
due to the size of the room is too big and the air conditioning has to
use more energy to cool the room and the air conditioning is too
small for the room. The studies are basically to develop a program to
calculate cooling load. Through this study it is easy to calculate
cooling load estimation. Furthermore it-s help to compare the cooling
load estimation by hourly and yearly. Base on the last study that been
done, the developed software are not user-friendly. For individual
without proper knowledge of calculating cooling load estimation
might be problem. Easy excess and user-friendly should be the main
objective to design something. This program will allow cooling load
able be estimate by any users rather than estimation by using rule of
thumb. Several of limitation of case study is judged to sure it-s
meeting to Malaysia building specification. Finally validation is done
by comparison manual calculation and by developed program.
Abstract: Through the course of this paper we outline how
mobile Business Intelligence (m-BI) can help businesses to work
smarter and to improve their agility. When we analyze the industry
from the usage perspective or how interaction with the enterprise BI
system happens via mobile devices, we may easily understand that
there are two major types of mobile BI: passive and active. Active
mobile BI gives provisions for users to interact with the BI systems
on-the-fly. Active mobile business intelligence often works as a
combination of both “push and pull" techniques. Some mistakes were
done in the up-to-day progress of mobile technologies and mobile BI,
as well as some problems that still have to be resolved. We discussed
in the paper rather broadly.
Abstract: Intrusion detection is a mechanism used to protect a
system and analyse and predict the behaviours of system users. An
ideal intrusion detection system is hard to achieve due to
nonlinearity, and irrelevant or redundant features. This study
introduces a new anomaly-based intrusion detection model. The
suggested model is based on particle swarm optimisation and
nonlinear, multi-class and multi-kernel support vector machines.
Particle swarm optimisation is used for feature selection by applying
a new formula to update the position and the velocity of a particle;
the support vector machine is used as a classifier. The proposed
model is tested and compared with the other methods using the KDD
CUP 1999 dataset. The results indicate that this new method achieves
better accuracy rates than previous methods.
Abstract: User satisfaction is one of the most used success
indicators in the research of information system (IS). Literature
shows user expectations have great influence on user satisfaction.
Both expectation and satisfaction of users are important for Hospital
Information Systems (HIS). Education, IS experience, age, attitude
towards change, business title, sex and working unit of the hospital,
are examined as the potential determinant of the medical users’
expectations. Data about medical user expectations are collected by
the “Expectation Questionnaire” developed for this study.
Expectation data are used for calculating the Expectation Meeting
Ratio (EMR) with the evaluation framework also developed for this
study. The internal consistencies of the answers to the questionnaire
are measured by Cronbach´s Alpha coefficient. The multivariate
analysis of medical user’s EMRs of HIS is performed by forward
stepwise binary logistic regression analysis. Education and business
title is appeared to be the determinants of expectations from HIS.
Abstract: Many multimedia communication applications require a
source to transmit messages to multiple destinations subject to quality
of service (QoS) delay constraint. To support delay constrained
multicast communications, computer networks need to guarantee an
upper bound end-to-end delay from the source node to each of
the destination nodes. This is known as multicast delay problem.
On the other hand, if the same message fails to arrive at each
destination node at the same time, there may arise inconsistency and
unfairness problem among users. This is related to multicast delayvariation
problem. The problem to find a minimum cost multicast
tree with delay and delay-variation constraints has been proven to
be NP-Complete. In this paper, we propose an efficient heuristic
algorithm, namely, Economic Delay and Delay-Variation Bounded
Multicast (EDVBM) algorithm, based on a novel heuristic function,
to construct an economic delay and delay-variation bounded multicast
tree. A noteworthy feature of this algorithm is that it has very high
probability of finding the optimal solution in polynomial time with
low computational complexity.
Abstract: Cross layer optimization based on utility functions has
been recently studied extensively, meanwhile, numerous types of
utility functions have been examined in the corresponding literature.
However, a major drawback is that most utility functions take a fixed
mathematical form or are based on simple combining, which can
not fully exploit available information. In this paper, we formulate a
framework of cross layer optimization based on Adaptively Weighted
Utility Functions (AWUF) for fairness balancing in OFDMA networks.
Under this framework, a two-step allocation algorithm is
provided as a sub-optimal solution, whose control parameters can be
updated in real-time to accommodate instantaneous QoS constrains.
The simulation results show that the proposed algorithm achieves
high throughput while balancing the fairness among multiple users.
Abstract: To make use of the limited amounts of water in arid
region, the Iranians developed man-made underground water
channels called qanats (kanats) .In fact, qanats may be considered as
the first long-distance water transfer system. Qanats are an ancient
water transfer system found in arid regions wherein groundwater
from mountainous areas, aquifers and sometimes from rivers, was
brought to points of re-emergence such as an oasis, through one or
more underground tunnels. The tunnels, many of which were
kilometers in length, had designed for slopes to provide gravitational
flow. The tunnels allowed water to drain out to the surface by gravity
to supply water to lower and flatter agricultural land.
Qanats have been an ancient, sustainable system facilitating the
harvesting of water for centuries in Iran, and more than 35 additional
countries of the world such as India, Arabia, Egypt, North Africa,
Spain and even to New world.
There are about 22000 qanats in Iran with 274000 kilometers of
underground conduits all built by manual labor. The amount of
water of the usable qanats of Iran produce is altogether 750 to
1000 cubic meter per second. The longest chain of qanat is
situated in Gonabad region in Khorasan province. It is 70
kilometers long. Qanats are renewable water supply systems that
have sustained agricultural settlement on the Iranian plateau for
millennia. The great advantages of Qanats are no evaporation
during transit, little seepage , no raising of the water- table and no
pollution in the area surrounding the conduits. Qanat systems
have a profound influence on the lives of the water users in Iran, and
conform to Iran-s climate. Qanat allows those living in a desert
environment adjacent to a mountain watershed to create a large oasis
in an otherwise stark environment.
This paper explains qanats structure designs, their history,
objectives causing their creation, construction materials, locations
and their importance in different times, as well as their present
sustainable role in Iran.
Abstract: Recent communications environment significantly
expands the mobile environment. The popularization of smartphones
with various mobile services has emerged, and smartphone users are
rapidly increasing. Because of these symptoms, existing wired
environment in a variety of mobile traffic entering to mobile network
has threatened the stability of the mobile network. Unlike traditional
wired infrastructure, mobile networks has limited radio resources and
signaling procedures for complex radio resource management. So
these traffic is not a problem in wired networks but mobile networks, it
can be a threat. In this paper, we analyze the security threats in mobile
networks and provide direction to solve it.
Abstract: This manuscript presents a fast blind signature scheme
with extremely low computation for users. Only several modular additions
and multiplications are required for a user to obtain and verify
a signature in the proposed scheme. Comparing with the existing
ones in the literature, the scheme greatly reduces the computations
for users.
Abstract: While the explosive increase in information published
on the Web, researchers have to filter information when searching for
conference related information. To make it easier for users to search
related information, this paper uses Topic Maps and social information
to implement ontology since ontology can provide the formalisms and
knowledge structuring for comprehensive and transportable machine
understanding that digital information requires. Besides enhancing
information in Topic Maps, this paper proposes a method of
constructing research Topic Maps considering social information.
First, extract conference data from the web. Then extract conference
topics and the relationships between them through the proposed
method. Finally visualize it for users to search and browse. This paper
uses ontology, containing abundant of knowledge hierarchy structure,
to facilitate researchers getting useful search results. However, most
previous ontology construction methods didn-t take “people" into
account. So this paper also analyzes the social information which helps
researchers find the possibilities of cooperation/combination as well as
associations between research topics, and tries to offer better results.
Abstract: The recent trend has been using hybrid approach rather than using a single intelligent technique to solve the problems. In this paper, we describe and discuss a framework to develop enterprise solutions that are backed by intelligent techniques. The framework not only uses intelligent techniques themselves but it is a complete environment that includes various interfaces and components to develop the intelligent solutions. The framework is completely Web-based and uses XML extensively. It can work like shared plat-form to be accessed by multiple developers, users and decision makers.
Abstract: Home Automation is a field that, among other
subjects, is concerned with the comfort, security and energy
requirements of private homes. The configuration of automatic
functions in this type of houses is not always simple to its inhabitants
requiring the initial setup and regular adjustments. In this work, the
ubiquitous computing system vision is used, where the users- action
patterns are captured, recorded and used to create the contextawareness
that allows the self-configuration of the home automation
system. The system will try to free the users from setup adjustments
as the home tries to adapt to its inhabitants- real habits. In this paper
it is described a completely automated process to determine the light
state and act on them, taking in account the users- daily habits.
Artificial Neural Network (ANN) is used as a pattern recognition
method, classifying for each moment the light state. The work
presented uses data from a real house where a family is actually
living.
Abstract: There is limited evidence from various countries
about the possible impact of various criteria to be used to determine
the scope of the IFRS for SMEs issued in 2009 and, research is
needed in this area. We provide evidence from Romania, an
emerging economy member of the European Union. The aim of this
paper is to analyze in a local setting if size is a relevant factor for
deciding between local and global standards for SMEs. Our results
indicate that size is a moderate indicator of the existence of possible
users interested in financial statements and that there is a difference
between the scopes of the standard determined on various criteria..
Also, we suggest that the international exposure is quite reduced in
the case of SMEs, but is sufficient to suggest that at least some SMEs
would benefit from international comparability of financial
statements
Abstract: In recent years, real estate prediction or valuation has
been a topic of discussion in many developed countries. Improper
hype created by investors leads to fluctuating prices of real estate,
affecting many consumers to purchase their own homes. Therefore,
scholars from various countries have conducted research in real estate
valuation and prediction. With the back-propagation neural network
that has been popular in recent years and the orthogonal array in the
Taguchi method, this study aimed to find the optimal parameter
combination at different levels of orthogonal array after the system
presented different parameter combinations, so that the artificial
neural network obtained the most accurate results. The experimental
results also demonstrated that the method presented in the study had a
better result than traditional machine learning. Finally, it also showed
that the model proposed in this study had the optimal predictive effect,
and could significantly reduce the cost of time in simulation operation.
The best predictive results could be found with a fewer number of
experiments more efficiently. Thus users could predict a real estate
transaction price that is not far from the current actual prices.
Abstract: A combined three-microphone voice activity detector (VAD) and noise-canceling system is studied to enhance speech recognition in an automobile environment. A previous experiment clearly shows the ability of the composite system to cancel a single noise source outside of a defined zone. This paper investigates the performance of the composite system when there are frequently moving noise sources (noise sources are coming from different locations but are not always presented at the same time) e.g. there is other passenger speech or speech from a radio when a desired speech is presented. To work in a frequently moving noise sources environment, whilst a three-microphone voice activity detector (VAD) detects voice from a “VAD valid zone", the 3-microphone noise canceller uses a “noise canceller valid zone" defined in freespace around the users head. Therefore, a desired voice should be in the intersection of the noise canceller valid zone and VAD valid zone. Thus all noise is suppressed outside this intersection of area. Experiments are shown for a real environment e.g. all results were recorded in a car by omni-directional electret condenser microphones.
Abstract: In terms of total online audience, newspapers are the most successful form of online content to date. The online audience for newspapers continues to demand higher-quality services, including personalized news services. News providers should be able to offer suitable users appropriate content. In this paper, a news article recommender system is suggested based on a user-s preference when he or she visits an Internet news site and reads the published articles. This system helps raise the user-s satisfaction, increase customer loyalty toward the content provider.
Abstract: The menace of counterfeiting pharmaceuticals/drugs has become a major threat to consumers, healthcare providers, drug manufacturers and governments. It is a source of public health concern both in the developed and developing nations. Several solutions for detecting and authenticating counterfeit drugs have been adopted by different nations of the world. In this article, a dialogue system-based drug counterfeiting detection system was developed and the results of the user satisfaction and acceptability of the system are presented. The results show that the users were satisfied with the system and the system was widely accepted as a means of fighting counterfeited drugs.
Abstract: Monitored 3-Dimensional (3D) video experience can be utilized as “feedback information” to fine tune the service parameters for providing a better service to the demanding 3D service customers. The 3D video experience which includes both video quality and depth perception is influenced by several contextual and content related factors (e.g., ambient illumination condition, content characteristics, etc) due to the complex nature of the 3D video. Therefore, effective factors on this experience should be utilized while assessing it. In this paper, structural information of the depth map sequences of the 3D video is considered as content related factor effective on the depth perception assessment. Cartoon-like filter is utilized to abstract the significant depth levels in the depth map sequences to determine the structural information. Moreover, subjective experiments are conducted using 3D videos associated with cartoon-like depth map sequences to investigate the effectiveness of ambient illumination condition, which is a contextual factor, on depth perception. Using the knowledge gained through this study, 3D video experience metrics can be developed to deliver better service to the 3D video service users.
Abstract: Animated graph gives some good impressions in
presenting information. However, not many people are able to produce it because the process of generating an animated graph requires some technical skills. This work presents Content
Management System with Animated Graph (CMS-AG). It is a webbased system enabling users to produce an effective and interactive
graphical report in a short time period. It allows for three levels of user authentication, provides update profile, account management, template management, graph management, and track changes. The system development applies incremental development approach, object-oriented concepts and Web programming technologies. The design architecture promotes new technology of reporting. It also helps user cut off unnecessary expenses, save time and learn new things on different levels of users. In this paper, the developed system is described.