Abstract: Taking into account the significance of measuring the
daily use of the study space in the libraries in order to develop and
reorganize the space for enhancing the efficiency of the study space,
the current study aimed to apply GIS in analyzing the study halls of
the Central Library and Document Center of Tehran University in
order to determine how study desks and chairs were used by the
students. The study used a combination of survey-descriptive and
system design method. In order to gather the required data, surveydescriptive
method was used. For implementing and entering data
into ArcGIS and analyzing the data and displaying the results on the
maps of the study halls of the library, system design method was
utilized. The design of the spatial database of the use of the study
halls was measured through the extent of occupancy of the space by
the library users and the maps of the study halls of the central library
of Tehran University as the case study. The results showed that
Abooreyhan hall had the highest rate of occupancy of the desks and
chairs compared to the other halls. The Hall of Science and
Technology, with an average occupancy rate of 0.39 for the tables
represented the lowest number of users and Rashid al-Dins hall, and
Science and Technology hall with an average occupancy rate (0.40)
had the lowest number of users for seats. In this study, the
comparison of the space occupied at different periods in the morning,
evenings, afternoons, and several months was performed through
GIS. This system analyzed the space relationships effectively and
efficiently. The output of this study would be used by administrators
and librarians to determine the exact extent of use of the equipment
of the study halls and librarians can use the output map to design the
space more efficiently at the library.
Abstract: In order to protect data privacy, image with sensitive or
private information needs to be encrypted before being outsourced to
the cloud. However, this causes difficulties in image retrieval and data
management. A secure image retrieval method based on orthogonal
decomposition is proposed in the paper. The image is divided into two
different components, for which encryption and feature extraction are
executed separately. As a result, cloud server can extract features from
an encrypted image directly and compare them with the features of the
queried images, so that the user can thus obtain the image. Different
from other methods, the proposed method has no special requirements
to encryption algorithms. Experimental results prove that the proposed
method can achieve better security and better retrieval precision.
Abstract: In this study, a computational fluid dynamics (CFD)
model has been developed for studying the effect of surface
roughness profile on the EHL problem. The cylinders contact
geometry, meshing and calculation of the conservation of mass and
momentum equations are carried out using the commercial software
packages ICEMCFD and ANSYS Fluent. The user defined functions
(UDFs) for density, viscosity and elastic deformation of the cylinders
as the functions of pressure and temperature are defined for the CFD
model. Three different surface roughness profiles are created and
incorporated into the CFD model. It is found that the developed CFD
model can predict the characteristics of fluid flow and heat transfer in
the EHL problem, including the main parameters such as pressure
distribution, minimal film thickness, viscosity, and density changes.
The results obtained show that the pressure profile at the center of the
contact area directly relates to the roughness amplitude. A rough
surface with kurtosis value of more than 3 has greater influence over
the fluctuated shape of pressure distribution than in other cases.
Abstract: These days customer satisfaction plays vital role in
any business. When customer searches for a product, significantly a
junk of irrelevant information is what is given, leading to customer
dissatisfaction. To provide exactly relevant information on the
searched product, we are proposing a model of KaaS (Knowledge as
a Service), which pre-processes the information using decision
making paradigm using Multi-agents.
Information obtained from various sources is taken to derive
knowledge and they are linked to Cloud to capture new idea. The
main focus of this work is to acquire relevant information
(knowledge) related to product, then convert this knowledge into a
service for customer satisfaction and deploy on cloud.
For achieving these objectives we are have opted to use multi
agents. They are communicating and interacting with each other,
manipulate information, provide knowledge, to take decisions. The
paper discusses about KaaS as an intelligent approach for Knowledge
acquisition.
Abstract: The aim of software maintenance is to maintain
the software system in accordance with advancement in software
and hardware technology. One of the early works on software
maintenance is to extract information at higher level of abstraction. In
this paper, we present the process of how to design an information
extraction tool for software maintenance. The tool can extract the
basic information from old programs such as about variables, based
classes, derived classes, objects of classes, and functions. The tool
have two main parts; the lexical analyzer module that can read the
input file character by character, and the searching module which
users can get the basic information from the existing programs. We
implemented this tool for a patterned sub-C++ language as an input
file.
Abstract: Cloud computing is a new technology in industry and
academia. The technology has grown and matured in last half decade
and proven their significant role in changing environment of IT
infrastructure where cloud services and resources are offered over the
network. Cloud technology enables users to use services and
resources without being concerned about the technical implications of
technology. There are substantial research work has been performed
for the usage of cloud computing in educational institutes and
majority of them provides cloud services over high-end blade servers
or other high-end CPUs. However, this paper proposes a new stack
called “CiCKAStack” which provide cloud services over unutilized
computing resources, named as commodity computers.
“CiCKAStack” provides IaaS and PaaS using underlying commodity
computers. This will not only increasing the utilization of existing
computing resources but also provide organize file system, on
demand computing resource and design and development
environment.
Abstract: This paper reports the worldwide status of building
information modeling (BIM) adoption from the perspectives of the
engagement level, the Hype Cycle model, the technology diffusion
model, and BIM services. An online survey was distributed, and 156
experts from six continents responded. Overall, North America was
the most advanced continent, followed by Oceania and Europe.
Countries in Asia perceived their phase mainly as slope of
enlightenment (mature) in the Hype Cycle model. In the technology
diffusion model, the main BIM-users worldwide were “early majority”
(third phase), but those in the Middle East/Africa and South America
were “early adopters” (second phase). In addition, the more advanced
the country, the more number of BIM services employed in general. In
summary, North America, Europe, Oceania, and Asia were advancing
rapidly toward the mature stage of BIM, whereas the Middle
East/Africa and South America were still in the early phase. The
simple indexes used in this study may be used to track the worldwide
status of BIM adoption in long-term surveys.
Abstract: Recently, the competition between websites becomes
intense. How to make users “adopt” their websites is an issue of urgent
importance for online communities companies. Social procedures
(such as social influence) can possibly explain how and why users’
technologies usage behaviors affect other people to use the
technologies. This study proposes two types of social influences on the
initial usage of Facebook Check In-friends and group members.
Besides, this study combines social influences theory and social
network theory to explore the factors influencing initial usage of
Facebook Check In. This study indicates that Facebook friends’
previous usage of Facebook Check In and Facebook group members’
previous usage of Facebook Check In will positively influence focal
actors’ Facebook Check In adoption intention, and network centrality
will moderate the relationships among Facebook friends’ previous
usage of Facebook Check In, Facebook group members’ previous
usage of Facebook Check In and focal actors’ Facebook Check In
adoption intention. The article concludes with contributions to
academic research and practice.
Abstract: The feedbacks obtained regarding the sense of
presence from pilot users operating a Mobile Robotic presence
(MRP) system to visit a simulated museum are reported in this paper.
The aim is to investigate how much the perception of system’s
usefulness and ease of use is affected by operators’ sense of social
telepresence (presence) in the remote location. Therefore, scenarios
of visiting a museum are simulated and the user operators are
supposed to perform some regular tasks inside the remote
environment including interaction with local users, navigation and
visiting the artworks. Participants were divided into two groups,
those who had previous experience of operation and interaction with
a MRP system and those who never had experience. Based on the
results, both groups provided different feedbacks. Moreover, there
was a significant association between user’s sense of presence and
their perception of system usefulness and ease of use.
Abstract: Electronic Word-Of-Mouth (eWOM) communities
represent today an important source of information in which more
and more customers base their purchasing decisions. They include
thousands of reviews concerning very different products and services
posted by many individuals geographically distributed all over the
world. Due to their massive audience, eWOM communities can help
users to find the product they are looking for even if they are less
popular or rare. This is known as the long tail effect, which leads to a
larger number of lower-selling niche products. This paper analyzes
the long tail effect in a well-known eWOM community and defines a
tool for finding niche products unavailable through conventional
channels.
Abstract: The present work describes the implementation of the
Enhanced Collaborative Optimization (ECO) multilevel architecture
with a gradient-based optimization algorithm with the aim of
performing a multidisciplinary design optimization of a generic
unmanned aerial vehicle with morphing technologies. The concepts
of weighting coefficient and dynamic compatibility parameter are
presented for the ECO architecture. A routine that calculates the
aircraft performance for the user defined mission profile and vehicle’s
performance requirements has been implemented using low fidelity
models for the aerodynamics, stability, propulsion, weight, balance
and flight performance. A benchmarking case study for evaluating
the advantage of using a variable span wing within the optimization
methodology developed is presented.
Abstract: In this paper we are presenting some spamming
techniques their behaviour and possible solutions. We have analyzed
how Spammers enters into online social networking sites (OSNSs) to
target them and diverse techniques used by them for this purpose.
Spamming is very common issue in present era of Internet
especially through Online Social Networking Sites (like Facebook,
Twitter, and Google+ etc.). Spam messages keep wasting Internet
bandwidth and the storage space of servers. On social networking
sites; spammers often disguise themselves by creating fake accounts
and hijacking user’s accounts for personal gains. They behave like
normal user and they continue to change their spamming strategy.
Following spamming techniques are discussed in this paper like
clickjacking, social engineered attacks, cross site scripting, URL
shortening, and drive by download. We have used elgg framework
for demonstration of some of spamming threats and respective
implementation of solutions.
Abstract: Robotic surgery is used to enhance minimally invasive
surgical procedure. It provides greater degree of freedom for surgical
tools but lacks of haptic feedback system to provide sense of touch to
the surgeon. Surgical robots work on master-slave operation, where
user is a master and robotic arms are the slaves. Current, surgical
robots provide precise control of the surgical tools, but heavily rely
on visual feedback, which sometimes cause damage to the inner
organs. The goal of this research was to design and develop a realtime
Simulink based robotic system to study force feedback
mechanism during instrument-object interaction. Setup includes three
VelmexXSlide assembly (XYZ Stage) for three dimensional
movement, an end effector assembly for forceps, electronic circuit for
four strain gages, two Novint Falcon 3D gaming controllers,
microcontroller board with linear actuators, MATLAB and Simulink
toolboxes. Strain gages were calibrated using Imada Digital Force
Gauge device and tested with a hard-core wire to measure
instrument-object interaction in the range of 0-35N. Designed
Simulink model successfully acquires 3D coordinates from two
Novint Falcon controllers and transfer coordinates to the XYZ stage
and forceps. Simulink model also reads strain gages signal through
10-bit analog to digital converter resolution of a microcontroller
assembly in real time, converts voltage into force and feedback the
output signals to the Novint Falcon controller for force feedback
mechanism. Experimental setup allows user to change forward
kinematics algorithms to achieve the best-desired movement of the
XYZ stage and forceps. This project combines haptic technology
with surgical robot to provide sense of touch to the user controlling
forceps through machine-computer interface.
Abstract: The detection of moving objects from a video image
sequences is very important for object tracking, activity recognition,
and behavior understanding in video surveillance.
The most used approach for moving objects detection / tracking is
background subtraction algorithms. Many approaches have been
suggested for background subtraction. But, these are illumination
change sensitive and the solutions proposed to bypass this problem
are time consuming.
In this paper, we propose a robust yet computationally efficient
background subtraction approach and, mainly, focus on the ability to
detect moving objects on dynamic scenes, for possible applications in
complex and restricted access areas monitoring, where moving and
motionless persons must be reliably detected. It consists of three
main phases, establishing illumination changes invariance,
background/foreground modeling and morphological analysis for
noise removing.
We handle illumination changes using Contrast Limited Histogram
Equalization (CLAHE), which limits the intensity of each pixel to
user determined maximum. Thus, it mitigates the degradation due to
scene illumination changes and improves the visibility of the video
signal. Initially, the background and foreground images are extracted
from the video sequence. Then, the background and foreground
images are separately enhanced by applying CLAHE.
In order to form multi-modal backgrounds we model each channel
of a pixel as a mixture of K Gaussians (K=5) using Gaussian Mixture
Model (GMM). Finally, we post process the resulting binary
foreground mask using morphological erosion and dilation
transformations to remove possible noise.
For experimental test, we used a standard dataset to challenge the
efficiency and accuracy of the proposed method on a diverse set of
dynamic scenes.
Abstract: Presently, it is necessary to ensure the sustainable
development of passenger and freight transport. Increasing
performance of road freight has had a negative impact to environment
and society. It is therefore necessary to increase the competitiveness
of intermodal transport, which is more environmentally friendly. The
study describes the effectiveness of logistical centers realization for
companies and society and research how the partial internalization of
external costs reflected in the efficient use of these centers and
increase the competitiveness of intermodal transport to road freight.
In our research, we use the method of comparative analysis and
market research to describe the advantages of logistic centers for their
users as well as for society as a whole. Method normal costing is used
for calculation infrastructure and total costs, method of conversion
costing for determine the external costs. We modelled total society
costs for road freight transport and inter modal transport chain (we
assumed that most of the traffic is carried by rail) with different
loading schemes for condition in the Slovak Republic. Our research
has shown that higher utilization of inter modal transport chain do
good not only for society, but for companies providing freight
services too. Increase in use of inter modal transport chain can bring
many benefits to society that do not bring direct immediate financial
return. They often bring the multiplier effects, such as greater use of
environmentally friendly transport mode and reduce the total society
costs.
Abstract: This paper describes the problem of building secure
computational services for encrypted information in the Cloud
Computing without decrypting the encrypted data; therefore, it meets
the yearning of computational encryption algorithmic aspiration
model that could enhance the security of big data for privacy,
confidentiality, availability of the users. The cryptographic model
applied for the computational process of the encrypted data is the
Fully Homomorphic Encryption Scheme. We contribute a theoretical
presentations in a high-level computational processes that are based
on number theory and algebra that can easily be integrated and
leveraged in the Cloud computing with detail theoretic mathematical
concepts to the fully homomorphic encryption models. This
contribution enhances the full implementation of big data analytics
based cryptographic security algorithm.
Abstract: The traditional Turkish houses becoming unusable are
a result of the deterioration of the balanced interaction between users
and house (human and house) continuing during the history.
Especially depending upon the change in social structure, the houses
becoming neglected do not meet the desires of the users and do not
have the meaning but the shelter are becoming unusable and are
being destroyed.
A conservation policy should be developed and renovations should
be made in order to pass the traditional houses carrying the quality of
a cultural and historical document presenting the social structure, the
lifestyle and the traditions of its own age to the next generations and
to keep them alive.
Abstract: Due to the rapid increase of Internet, web opinion
sources dynamically emerge which is useful for both potential
customers and product manufacturers for prediction and decision
purposes. These are the user generated contents written in natural
languages and are unstructured-free-texts scheme. Therefore, opinion
mining techniques become popular to automatically process customer
reviews for extracting product features and user opinions expressed
over them. Since customer reviews may contain both opinionated and
factual sentences, a supervised machine learning technique applies
for subjectivity classification to improve the mining performance. In
this paper, we dedicate our work is the task of opinion
summarization. Therefore, product feature and opinion extraction is
critical to opinion summarization, because its effectiveness
significantly affects the identification of semantic relationships. The
polarity and numeric score of all the features are determined by
Senti-WordNet Lexicon. The problem of opinion summarization
refers how to relate the opinion words with respect to a certain
feature. Probabilistic based model of supervised learning will
improve the result that is more flexible and effective.
Abstract: We propose a code acquisition scheme called improved
multiple-shift (IMS) for optical code division multiple access
systems, where the optical orthogonal code is used instead of the
pseudo noise code. Although the IMS algorithm has a similar process
to that of the conventional MS algorithm, it has a better code
acquisition performance than the conventional MS algorithm. We
analyze the code acquisition performance of the IMS algorithm and
compare the code acquisition performances of the MS and the IMS
algorithms in single-user and multi-user environments.
Abstract: Future mobile networks following 5th generation will
be characterized by one thousand times higher gains in capacity;
connections for at least one hundred billion devices; user experience
capable of extremely low latency and response times. To be close to
the capacity requirements and higher reliability, advanced
technologies have been studied, such as multiple connectivity, small
cell enhancement, heterogeneous networking, and advanced
interference and mobility management. This paper is focused on the
multiple connectivity in heterogeneous cellular networks. We
investigate the performance of coverage and user throughput in several
deployment scenarios. Using the stochastic geometry approach, the
SINR distributions and the coverage probabilities are derived in case
of dual connection. Also, to compare the user throughput enhancement
among the deployment scenarios, we calculate the spectral efficiency
and discuss our results.