Abstract: This paper examines the system protection for cyber-physical
systems (CPS). CPS are particularly characterized by their
networking system components. This means they are able to adapt to
the needs of their users and its environment. With this ability, CPS
have new, specific requirements on the protection against anti-counterfeiting,
know-how loss and manipulation. They increase the
requirements on system protection because piracy attacks can be
more diverse, for example because of an increasing number of
interfaces or through the networking abilities. The new requirements
were identified and in a next step matched with existing protective
measures. Due to the found gap the development of new protection
measures has to be forced to close this gap. Moreover a comparison
of the effectiveness between selected measures was realized and the
first results are presented in this paper.
Abstract: This research study aims to present a retrospective
study about speech recognition systems and artificial intelligence.
Speech recognition has become one of the widely used technologies,
as it offers great opportunity to interact and communicate with
automated machines. Precisely, it can be affirmed that speech
recognition facilitates its users and helps them to perform their daily
routine tasks, in a more convenient and effective manner. This
research intends to present the illustration of recent technological
advancements, which are associated with artificial intelligence.
Recent researches have revealed the fact that speech recognition is
found to be the utmost issue, which affects the decoding of speech. In
order to overcome these issues, different statistical models were
developed by the researchers. Some of the most prominent statistical
models include acoustic model (AM), language model (LM), lexicon
model, and hidden Markov models (HMM). The research will help in
understanding all of these statistical models of speech recognition.
Researchers have also formulated different decoding methods, which
are being utilized for realistic decoding tasks and constrained
artificial languages. These decoding methods include pattern
recognition, acoustic phonetic, and artificial intelligence. It has been
recognized that artificial intelligence is the most efficient and reliable
methods, which are being used in speech recognition.
Abstract: Durian is the flagship fruit of Mindanao and there is
an abundance of several cultivars with many confusing identities/
names.
The project was conducted to develop procedure for reliable and
rapid detection and sorting of durian planting materials. Moreover, it
is also aimed to establish specific genetic or DNA markers for routine
testing and authentication of durian cultivars in question.
The project developed molecular procedures for routine testing.
SSR primers were also screened and identified for their utility in
discriminating durian cultivars collected.
Results of the study showed the following accomplishments:
1. Twenty (29) SSR primers were selected and identified based on
their ability to discriminate durian cultivars,
2. Optimized and established standard procedure for identification
and authentication of Durian cultivars
3. Genetic profile of durian is now available at Biotech Unit
Our results demonstrate the relevance of using molecular
techniques in evaluating and identifying durian clones. The most
polymorphic primers tested in this study could be useful tools for
detecting variation even at the early stage of the plant especially for
commercial purposes. The process developed combines the efficiency
of the microsatellites development process with the optimization of
non-radioactive detection process resulting in a user-friendly protocol
that can be performed in two (2) weeks and easily incorporated into
laboratories about to start microsatellite development projects. This
can be of great importance to extend microsatellite analyses to other
crop species where minimal genetic information is currently
available. With this, the University can now be a service laboratory
for routine testing and authentication of durian clones.
Abstract: With the flourishing development of online shopping,
an increasing number of customers see online shopping as an
entertaining experience. Because the online consumer has a double
identity as a shopper and an Internet user, online shopping should offer
hedonic values of shopping and Internet usage. The purpose of this
study is to investigate hedonic online shopping motivations from the
perspectives of traditional hedonic value and flow theory.
The study adopted a focus group interview method, including two
online and two offline interviews. Four focus groups of shoppers
consisted of online professionals, online college students, offline
professionals and offline college students. The results of the study
indicate that traditional hedonic values and dimensions of flow theory
exist in the online shopping environment. The study indicated that
online shoppers seem to appreciate being able to learn things and grow
to become competitive achievers online. Comparisons of online
hedonic motivations between groups are conducted. This study serves
as a basis for the future growth of Internet marketing.
Abstract: This paper deals with various questions related to
functionality and providing banking services in the European union
on the Internet. Due to the fact that we live in the information
technologies era, the Internet become a new space for doing
economic and business activities in all areas, and especially important
in banking. Accepting the busy tempo of life, in the past several years
electronic banking has become necessity and a must for most users of
banking services. On a sample of 300 web sites of the banks
operating in European Union (EU) we conduct the research on the
functionality of e-banking services offered through banks web sites
with the key objective to reveal to what extent the information
technologies are used in their business operations. Characteristics of
EU banks websites will be examined and compared to the basic
groups of business activities on the web. Also some
recommendations for the successful bank web sites will be provided.
Abstract: The growth in the volume of text data such as books
and articles in libraries for centuries has imposed to establish
effective mechanisms to locate them. Early techniques such as
abstraction, indexing and the use of classification categories have
marked the birth of a new field of research called "Information
Retrieval". Information Retrieval (IR) can be defined as the task of
defining models and systems whose purpose is to facilitate access to
a set of documents in electronic form (corpus) to allow a user to find
the relevant ones for him, that is to say, the contents which matches
with the information needs of the user. This paper presents a new
semantic indexing approach of a documentary corpus. The indexing
process starts first by a term weighting phase to determine the
importance of these terms in the documents. Then the use of a
thesaurus like Wordnet allows moving to the conceptual level.
Each candidate concept is evaluated by determining its level of
representation of the document, that is to say, the importance of the
concept in relation to other concepts of the document. Finally, the
semantic index is constructed by attaching to each concept of the
ontology, the documents of the corpus in which these concepts are
found.
Abstract: The development of adaptive user interfaces (UI)
presents for a long time an important research area in which
researcher attempt to call upon the full resources and skills of several
disciplines, The adaptive UI community holds a thorough knowledge
regarding the adaptation of UIs with users and with contexts of use.
Several solutions, models, formalisms, techniques and mechanisms
were proposed to develop adaptive UI. In this paper, we propose an
approach based on the fuzzy set theory for modeling the concept of
the appropriateness of different solutions of UI adaptation with
different situations for which interactive systems have to adapt their
UIs.
Abstract: With the growing of computer and network, digital
data can be spread to anywhere in the world quickly. In addition,
digital data can also be copied or tampered easily so that the security
issue becomes an important topic in the protection of digital data.
Digital watermark is a method to protect the ownership of digital data.
Embedding the watermark will influence the quality certainly. In this
paper, Vector Quantization (VQ) is used to embed the watermark into
the image to fulfill the goal of data hiding. This kind of watermarking
is invisible which means that the users will not conscious the existing
of embedded watermark even though the embedded image has tiny
difference compared to the original image. Meanwhile, VQ needs a lot
of computation burden so that we adopt a fast VQ encoding scheme by
partial distortion searching (PDS) and mean approximation scheme to
speed up the data hiding process.
The watermarks we hide to the image could be gray, bi-level and
color images. Texts are also can be regarded as watermark to embed.
In order to test the robustness of the system, we adopt Photoshop to
fulfill sharpen, cropping and altering to check if the extracted
watermark is still recognizable. Experimental results demonstrate that
the proposed system can resist the above three kinds of tampering in
general cases.
Abstract: Cloud computing is the innovative and leading
information technology model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources
that can be rapidly provisioned and released with minimal
management effort. In this paper, we aim at the development of
workflow management system for cloud computing platforms based
on our previous research on the dynamic allocation of the cloud
computing resources and its workflow process. We took advantage of
the HTML5 technology and developed web-based workflow interface.
In order to enable the combination of many tasks running on the cloud
platform in sequence, we designed a mechanism and developed an
execution engine for workflow management on clouds. We also
established a prediction model which was integrated with job queuing
system to estimate the waiting time and cost of the individual tasks on
different computing nodes, therefore helping users achieve maximum
performance at lowest payment. This proposed effort has the potential
to positively provide an efficient, resilience and elastic environment
for cloud computing platform. This development also helps boost user
productivity by promoting a flexible workflow interface that lets users
design and control their tasks' flow from anywhere.
Abstract: Icons, or pictorial and graphical objects, are
commonly used in human-computer interaction (HCI) fields as the
mediator in order to communicate information to users. Yet there has
been little studies focusing on a majority of the world’s population –
semi-literate communities – in terms of the fundamental knowhow
for designing icons for such population. In this study, two sets of
icons belonging in different icon taxonomy – abstract and concrete –
are designed for a mobile application for semi-literate agricultural
communities. In this paper, we propose a triadic relationship of an
icon, namely meaning, task and mental image, which inherits the
triadic relationship of a sign. User testing with the application and a
post-pilot questionnaire are conducted as the experimental approach
in two rural villages in India. Icons belonging to concrete taxonomy
perform better than abstract icons on the premise that the design of
the icon fulfills the underlying rules of the proposed triadic
relationship.
Abstract: Introduction: There are multiple social, individual and
cultural factors that influence an individual’s decision to adopt family
planning methods especially among non-users in patriarchal societies
like Pakistan. Non-users, if targeted efficiently, can contribute
significantly to country’s CPR. A research study showed that nonusers
if convinced to adopt lactational amenorrhea method can shift
to long term methods in future. Research shows that if non users are
targeted efficiently a 59% reduction in unintended pregnancies in
Saharan Africa and South-Central and South-East Asia is anticipated.
Methods: We did secondary data analysis on Pakistan
Demographic Heath Survey (2012-13) dataset. Use of contraception
(never-use/ever-use) was the outcome variable. At univariate level
Chi-square/Fisher Exact test was used to assess relationship of
baseline covariates with contraception use. Then variables to be
incorporated in the model were checked for multicollinearity,
confounding and interaction. Then binary logistic regression (with an
urban-rural stratification) was done to find relationship between
contraception use and baseline demographic and social variables.
Results: The multivariate analyses of the study showed that
younger women (≤ 29 years)were more prone to be never users as
compared to those who were >30 years and this trend was seen in
urban areas (AOR 1.92, CI 1.453-2.536) as well as rural areas (AOR
1.809, CI 1.421-2.303). While looking at regional variation, women
from urban Sindh (AOR 1.548, CI 1.142-2.099) and urban
Balochistan (AOR 2.403, CI 1.504-3.839) had more never users as
compared to other urban regions. Women in the rich wealth quintile
were more never users and this was seen both in urban and rural
localities (urban (AOR 1.106 CI .753-1.624); rural areas (AOR 1.162,
CI .887-1.524)) even though these were not statistically significant.
Women idealizing more children (>4) are more never users as
compared to those idealizing less children in both urban (AOR 1.854,
CI 1.275-2.697) and rural areas (AOR 2.101, CI 1.514-2.916).
Women who never lost a pregnancy were more inclined to be nonusers
in rural areas (AOR 1.394, CI 1.127-1.723) .Women familiar
with only traditional or no method had more never users in rural areas
(AOR 1.717, CI 1.127-1.723) but in urban areas it wasn’t significant.
Women unaware of Lady Health Worker’s presence in their area
were more never users especially in rural areas (AOR 1.276, CI
1.014-1.607). Women who did not visit any care provider were more
never users (urban (AOR 11.738, CI 9.112-15.121) rural areas (AOR
7.832, CI 6.243-9.826)).
Discussion/Conclusion: This study concluded that government,
policy makers and private sector family planning programs should
focus on the untapped pool of never users (younger women from underserved provinces, in higher wealth quintiles, who desire more
children.). We need to make sure to cover catchment areas where
there are less LHWs and less providers as ignorance to modern
methods and never been visited by an LHW are important
determinants of never use. This all is in sync with previous literate
from similar developing countries.
Abstract: Quality of Service (QoS) attributes as part of the
service description is an important factor for service attribute. It is not
easy to exactly quantify the weight of each QoS conditions since
human judgments based on their preference causes vagueness. As
web services selection requires optimization, evolutionary computing
based on heuristics to select an optimal solution is adopted. In this
work, the evolutionary computing technique Particle Swarm
Optimization (PSO) is used for selecting a suitable web services
based on the user’s weightage of each QoS values by optimizing the
QoS weight vector and thereby finding the best weight vectors for
best services that is being selected. Finally the results are compared
and analyzed using static inertia weight and deterministic inertia
weight of PSO.
Abstract: Organizational tendencies towards computer-based
information processing have been observed noticeably in the
third-world countries. Many enterprises are taking major initiatives
towards computerized working environment because of massive
benefits of computer-based information processing. However,
designing and developing information resource management software
for small and mid-size enterprises under budget costs and strict
deadline is always challenging for software engineers. Therefore, we
introduced an approach to design mid-size enterprise software by
using the Waterfall model, which is one of the SDLC (Software
Development Life Cycles), in a cost effective way. To fulfill research
objectives, in this study, we developed mid-sized enterprise software
named “BSK Management System” that assists enterprise software
clients with information resource management and perform complex
organizational tasks. Waterfall model phases have been applied to
ensure that all functions, user requirements, strategic goals, and
objectives are met. In addition, Rich Picture, Structured English, and
Data Dictionary have been implemented and investigated properly in
engineering manner. Furthermore, an assessment survey with 20
participants has been conducted to investigate the usability and
performance of the proposed software. The survey results indicated
that our system featured simple interfaces, easy operation and
maintenance, quick processing, and reliable and accurate transactions.
Abstract: The advent of social networking technologies has been
met with mixed reactions in academic and corporate circles around
the world. This study explored the influence of social network in
current era, the relation being maintained between the Social
networking site and its user by the extent of use, benefits and latest
technologies. The study followed a descriptive research design
wherein a questionnaire was used as the main research tool. The data
collected was analyzed using SPSS 16. Data was gathered from 1205
users and analyzed in accordance with the objectives of the study.
The analysis of the results seem to suggest that the majority of users
were mainly using Facebook, despite of concerns raised about the
disclosure of personal information on social network sites, users
continue to disclose huge quantity of personal information, they find
that reading privacy policy is time consuming and changes made can
result into improper settings.
Abstract: The exponential growth of social media arouses much
attention on public opinion information. The online forums, blogs,
micro blogs are proving to be extremely valuable resources and are
having bulk volume of information. However, most of the social
media data is unstructured and semi structured form. So that it is
more difficult to decipher automatically. Therefore, it is very much
essential to understand and analyze those data for making a right
decision. The online forums hotspot detection is a promising research
field in the web mining and it guides to motivate the user to take right
decision in right time. The proposed system consist of a novel
approach to detect a hotspot forum for any given time period. It uses
aging theory to find the hot terms and E-K-means for detecting the
hotspot forum. Experimental results demonstrate that the proposed
approach outperforms k-means for detecting the hotspot forums with
the improved accuracy.
Abstract: The paper presents a method for a simple and
immediate motion planning of a SCARA robot, whose end-effector
has to move along a given trajectory; the calculation procedure
requires the user to define in analytical form or by points the
trajectory to be followed and to assign the curvilinear abscissa as
function of the time. On the basis of the geometrical characteristics
of the robot, a specifically developed program determines the motion
laws of the actuators that enable the robot to generate the required
movement; this software can be used in all industrial applications for
which a SCARA robot has to be frequently reprogrammed, in order
to generate various types of trajectories with different motion times.
Abstract: Grid is an environment with millions of resources
which are dynamic and heterogeneous in nature. A computational
grid is one in which the resources are computing nodes and is meant
for applications that involves larger computations. A scheduling
algorithm is said to be efficient if and only if it performs better
resource allocation even in case of resource failure. Resource
allocation is a tedious issue since it has to consider several
requirements such as system load, processing cost and time, user’s
deadline and resource failure. This work attempts in designing a
resource allocation algorithm which is cost-effective and also targets
at load balancing, fault tolerance and user satisfaction by considering
the above requirements. The proposed Budget Constrained Load
Balancing Fault Tolerant algorithm with user satisfaction (BLBFT)
reduces the schedule makespan, schedule cost and task failure rate
and improves resource utilization. Evaluation of the proposed
BLBFT algorithm is done using Gridsim toolkit and the results are
compared with the algorithms which separately concentrates on all
these factors. The comparison results ensure that the proposed
algorithm works better than its counterparts.
Abstract: Typically, virtual communities exhibit the well-known
phenomenon of participation inequality, which means that only a
small percentage of users is responsible of the majority of
contributions. However, the sustainability of the community requires
that the group of active users must be continuously nurtured with new
users that gain expertise through a participation process. This paper
analyzes the time evolution of Open Source Software (OSS)
communities, considering users that join/abandon the community
over time and several topological properties of the network when
modeled as a social network. More specifically, the paper analyzes
the role of those users rejoining the community and their influence in
the global characteristics of the network.
Abstract: This study examined how individuals in their
respective teams contributed to innovation performance besides
defining the term of innovation in their own respective views. This
study also identified factors that motivated University staff to
contribute to the innovation products. In addition, it examined
whether there is a significant relationship between professional
training level and the length of service among university staff
towards innovation and to what extent do the two variables
contributed towards innovative products. The significance of this
study is that it revealed the strengths and weaknesses of the
university staff when contributing to innovation performance.
Stratified-random sampling was employed to determine the samples
representing the population of lecturers in the study, involving 123
lecturers in one of the local universities in Malaysia. The method
employed to analyze the data is through categorizing into themes for
the open-ended questions besides using descriptive and inferential
statistics for the quantitative data. This study revealed that two types
of definition for the term “innovation” exist among the university
staff, namely, creation of new product or new approach to do things
as well as value-added creative way to upgrade or improve existing
process and service to be more efficient. This study found that the
most prominent factor that propels them towards innovation is to
improve the product in order to benefit users, followed by selfsatisfaction
and recognition. This implies that the staff in the
organization viewed the creation of innovative products as a process
of growth to fulfill the needs of others and also to realize their
personal potential. This study also found that there was only a
significant relationship between the professional training level and
the length of service of 4 - 6 years among the university staff. The
rest of the groups based on the length of service showed that there
was no significant relationship with the professional training level
towards innovation. Moreover, results of the study on directional
measures depicted that the relationship for the length of service of 4-
6 years with professional training level among the university staff is
quite weak. This implies that good organization management lies on
the shoulders of the key leaders who enlighten the path to be
followed by the staff.
Abstract: The aim of this paper is to present the optimization
methodology developed in the frame of a Coastal Transport
Information System. The system will be used for the effective design
of coastal transportation lines and incorporates subsystems that
implement models, tools and techniques that may support the design
of improved networks. The role of the optimization and decision
subsystem is to provide the user with better and optimal scenarios
that will best fulfill any constrains, goals or requirements posed. The
complexity of the problem and the large number of parameters and
objectives involved led to the adoption of an evolutionary method
(Genetic Algorithms). The problem model and the subsystem
structure are presented in detail, and, its support for simulation is also
discussed.