Abstract: In this paper, the class of weakly left C-wrpp
semigroups which includes the class of weakly left C-rpp semigroups
as a subclass is introduced. To particularly show that the spined
product of a left C-wrpp semigroup and a right normal band which is a
weakly left C-wrpp semifroup by virtue of left C-full Ehremann cyber
groups recently obtained by authors Li-Shum, results obtained by
Tang and Du-Shum are extended and strengthened.
Abstract: This evaluation of land supply system performance in
China shall examine the combination of government functions and
national goals in order to perform a cost-benefit analysis of system
results. From the author's point of view, it is most productive to
evaluate land supply system performance at moments of system
transformation for the following reasons. The behavior and
input-output change of beneficial results at different times can be
observed when the system or policy changes and system performance
can be evaluated through a cost-benefit analysis during the process of
system transformation. Moreover, this evaluation method can avoid
the influence of land resource endowment. Different land resource
endowment methods and different economy development periods
result in different systems. This essay studies the contents, principles
and methods of land supply system performance evaluation. Taking
Beijing as an example, this essay optimizes and classifies the land
supply index, makes a quantitative evaluation of land supply system
performance through principal component analysis (PCA), and finally
analyzes the factors that influence land supply system performance at
times of system transformation.
Abstract: Corrosion of metallic water pipelines buried below
ground surface is a function of the nature of the surrounding soil and
groundwater. This gives the importance of knowing the physical and
chemical characteristics of the pipe-s surrounding environment. The
corrosion of externally – unprotected metallic water pipelines,
specially ductile iron pipes, in localities with aggressive soil
conditions is becoming a significant problem. Anticorrosive
protection for metallic water pipelines, their fittings and accessories
is very important, because they may be attached by corrosion with
time. The tendency of a metallic substrate to corrode is a function of
the surface characteristics of the metal and of the metal/protective
film interface, the physical, electrical and electrochemical properties
of the film, and the nature of the environment in which the pipelines
system is placed. In this work the authors have looked at corrosion
problems of water pipelines and their control. The corrosive
properties of groundwater and soil environments are reviewed, and
parameters affecting corrosion are discussed. The purpose of this
work is to provide guidelines for materials selection in water and soil
environments, and how the water pipelines can be protected against
metallic corrosion.
Abstract: Functional imaging procedures for the non-invasive assessment of tissue microcirculation are highly requested, but require a mathematical approach describing the trans- and intercapillary passage of tracer particles. Up to now, two theoretical, for the moment different concepts have been established for tracer kinetic modeling of contrast agent transport in tissues: pharmacokinetic compartment models, which are usually written as coupled differential equations, and the indicator dilution theory, which can be generalized in accordance with the theory of lineartime- invariant (LTI) systems by using a convolution approach. Based on mathematical considerations, it can be shown that also in the case of an open two-compartment model well-known from functional imaging, the concentration-time course in tissue is given by a convolution, which allows a separation of the arterial input function from a system function being the impulse response function, summarizing the available information on tissue microcirculation. Due to this reason, it is possible to integrate the open two-compartment model into the system-theoretic concept of indicator dilution theory (IDT) and thus results known from IDT remain valid for the compartment approach. According to the long number of applications of compartmental analysis, even for a more general context similar solutions of the so-called forward problem can already be found in the extensively available appropriate literature of the seventies and early eighties. Nevertheless, to this day, within the field of biomedical imaging – not from the mathematical point of view – there seems to be a trench between both approaches, which the author would like to get over by exemplary analysis of the well-known model.
Abstract: In this paper, we present a methodology for finding
authoritative researchers by analyzing academic Web sites. We show
a case study in which we concentrate on a set of Czech computer
science departments- Web sites. We analyze the relations between
them via hyperlinks and find the most important ones using several
common ranking algorithms. We then examine the contents of the
research papers present on these sites and determine the most
authoritative Czech authors.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: Measurement and the following evaluation of
performance represent important part of management. The paper
focuses on indicators as the basic elements of performance
measurement system. It emphasizes a necessity of searching
requirements for quality indicators so that they can become part of
the useful system. It introduces standpoints for a systematic dividing
of indicators so that they have as high as possible informative value
of background sources for searching, analysis, designing and using of
indicators. It draws attention to requirements for indicators' quality
and at the same it deals with some dangers decreasing indicator's
informative value. It submits a draft of questions that should be
answered at the construction of indicator. It is obvious that particular
indicators need to be defined exactly to stimulate the desired
behavior in order to attain expected results. In the enclosure a
concrete example of the defined indicator in the concrete conditions
of a small firm is given. The authors of the paper pay attention to the
fact that a quality indicator makes it possible to get to the basic
causes of the problem and include the established facts into the
company information system. At the same time they emphasize that
developing of a quality indicator is a prerequisite for the utilization
of the system of measurement in management.
Abstract: The modern queueing theory is one of the powerful
tools for a quantitative and qualitative analysis of communication systems, computer networks, transportation systems, and many other technical systems. The paper is designated to the analysis of queueing
systems, arising in the networks theory and communications theory
(called open queueing network). The authors of this research in the
sphere of queueing theory present the theorem about the law of the iterated logarithm (LIL) for the queue length of a customers in open
queueing network and its application to the mathematical model of
the open message switching system.
Abstract: This paper presents part of a research into the small
scale modelling of masonry. Small scale testing of masonry has been
carried out by many authors, but few have attempted a systematic
determination of the parameters that affect masonry at a small scale.
The effect of increasing mortar strength and different sand gradings
under compression were investigated. The results show masonry
strength at small scale is influenced by increasing mortar strength and
different sand gradings.
Abstract: Internet is largely composed of textual contents and a
huge volume of digital contents gets floated over the Internet daily.
The ease of information sharing and re-production has made it
difficult to preserve author-s copyright. Digital watermarking came
up as a solution for copyright protection of plain text problem after
1993. In this paper, we propose a zero text watermarking algorithm
based on occurrence frequency of non-vowel ASCII characters and
words for copyright protection of plain text. The embedding
algorithm makes use of frequency non-vowel ASCII characters and
words to generate a specialized author key. The extraction algorithm
uses this key to extract watermark, hence identify the original
copyright owner. Experimental results illustrate the effectiveness of
the proposed algorithm on text encountering meaning preserving
attacks performed by five independent attackers.
Abstract: Data Warehouses (DWs) are repositories which contain the unified history of an enterprise for decision support. The data must be Extracted from information sources, Transformed and integrated to be Loaded (ETL) into the DW, using ETL tools. These tools focus on data movement, where the models are only used as a means to this aim. Under a conceptual viewpoint, the authors want to innovate the ETL process in two ways: 1) to make clear compatibility between models in a declarative fashion, using correspondence assertions and 2) to identify the instances of different sources that represent the same entity in the real-world. This paper presents the overview of the proposed framework to model the ETL process, which is based on the use of a reference model and perspective schemata. This approach provides the designer with a better understanding of the semantic associated with the ETL process.
Abstract: Measurements of capacitance C and dissipation
factor tand of the stator insulation system provide useful information
about internal defects within the insulation. The index k is defined as
the proportionality constant between the changes at high voltage of
capacitance DC and of the dissipation factor Dtand . DC and
Dtand values were highly correlated when small flat defects were
within the insulation and that correlation was lost in the presence of
large narrow defects like electrical treeing. The discrimination
between small and large defects is made resorting to partial discharge
PD phase angle analysis. For the validation of the results, C and tand
measurements were carried out in a 15MVA 4160V steam turbine
turbogenerator placed in a sugar mill. In addition, laboratory test
results obtained by other authors were analyzed jointly. In such
laboratory tests, model coil bars subjected to thermal cycling resulted
highly degraded and DC and Dtand values were not correlated. Thus,
the index k could not be calculated.
Abstract: The article touches upon questions of information security in Russian Economy. It covers theoretical bases of information security and causes of its development. The theory is proved by the analysis of business activities and the main tendencies of information security development. Perm region has been chosen as the bases for the analysis, being the fastestdeveloping region that uses methods of information security in managing it economy. As a result of the study the authors of the given article have formulated their own vision of the problem of information security in various branches of economy and stated prospects of information security development and its growing role in Russian economy
Abstract: In this paper, we design an integration security system
that provides authentication service, authorization service, and
management service of security data and a unified interface for the
management service. The interface is originated from XKMS protocol
and is used to manage security data such as XACML policies, SAML
assertions and other authentication security data including public keys.
The system includes security services such as authentication,
authorization and delegation of authentication by employing SAML
and XACML based on security data such as authentication data,
attributes information, assertions and polices managed with the
interface in the system. It also has SAML producer that issues
assertions related on the result of the authentication and the
authorization services.
Abstract: This paper investigates the relationship between state and business in the context of structural and institutional transformations in Indonesia following the collapse of the New Order regime in 1998. Since 1998, Indonesia has embarked on a shift from an authoritarian to democratic polity and from a centralised to a decentralised system of governance, transforming the country into the third largest democracy and one of the most decentralised states in the world. This paper examines whether the transformation of the Indonesian state has altered the pattern of state and business relations with focus on clientism and corruption as the key dependent variable, and probes how/to what extent this has changed as a result of the transformation and the ensuring shifts in business and state relations. Based on interviews with key government and business actors as well as prominent scholars in Indonesia, it is found that since the demise of the New Order, business associations in Indonesia have become more independent of state control and more influential in public decision-making whereas the government has become more responsive of business concerns and more committed to combat corruption and clientism. However, these changes have not necessarily rendered business people completely leave individualclientelistic relationship with the government, and simply pursue wider sectoral and business-wide collectivism as an alternative way of channelling their aspirations, which is expected to help reduce corruption and clientism in Indonesia. This paper concludes that democratisation and a more open politics may have helped reduce corruption and clientism in Indonesia through changes in government. However, it is still difficult to imply that such political transformation has fostered business collective action and a broader, more encompassing pattern of business lobbying and activism, which is expected to help reduce corruption and clientism.
Abstract: The move towards internationalization of accounting encountered a great boost, when in 2002 EU delegated the IASB to provide the accounting standards to be applied inside its frontiers. Among the incentives of the standardization of accounting on the international level, is the reduction of the cost of capital. Romania made the move towards IFRS before EU, when the country was not yet a member of it. Even if this made Romania a special case, it was scarcely approached. The leak of real data is usually the reason for avoiding. The novelty of this paper is that it offers an insight from the reality of Romanian companies and their view regarding the IFRS. The paper is based on a survey that the authors made among the companies listed on the first two tiers of the Bucharest Stock Exchange (BSE), which are basically, the most important companies in the country.
Abstract: Protecting is the sources of drinking water is the first
barrier of contamination of drinking water. The Feitsui Reservoir
watershed of Taiwan supplies domestic water for around 5 million
people in the Taipei metropolitan area. Understanding the spatial
patterns of water quality trends in this watershed is an important
agenda for management authorities. This study examined 7 sites in the
watershed for water quality parameters regulated in the standard for
drinking water source. The non-parametric seasonal Mann-Kendall-s
test was used to determine significant trends for each parameter.
Significant trends of increasing pH occurred at the sampling station in
the uppermost stream watershed, and in total phosphorus at 4 sampling
stations in the middle and downstream watershed. Additionally, the
multi-scale land cover assessment and average land slope were used to
explore the influence on the water quality in the watershed. Regression
models for predicting water quality were also developed.
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.
Abstract: Recently, grid computing has been widely focused on
the science, industry, and business fields, which are required a vast
amount of computing. Grid computing is to provide the environment
that many nodes (i.e., many computers) are connected with each
other through a local/global network and it is available for many
users. In the environment, to achieve data processing among nodes
for any applications, each node executes mutual authentication by
using certificates which published from the Certificate Authority
(for short, CA). However, if a failure or fault has occurred in the
CA, any new certificates cannot be published from the CA. As
a result, a new node cannot participate in the gird environment.
In this paper, an off-the-shelf scheme for dependable grid systems
using virtualization techniques is proposed and its implementation is
verified. The proposed approach using the virtualization techniques
is to restart an application, e.g., the CA, if it has failed. The system
can tolerate a failure or fault if it has occurred in the CA. Since
the proposed scheme is implemented at the application level easily,
the cost of its implementation by the system builder hardly takes
compared it with other methods. Simulation results show that the
CA in the system can recover from its failure or fault.
Abstract: The protection of the contents of digital products is
referred to as content authentication. In some applications, to be able
to authenticate a digital product could be extremely essential. For
example, if a digital product is used as a piece of evidence in the
court, its integrity could mean life or death of the accused. Generally,
the problem of content authentication can be solved using semifragile
digital watermarking techniques. Recently many authors have
proposed Computer Generated Hologram Watermarking (CGHWatermarking)
techniques. Starting from these studies, in this paper
a semi-fragile Computer Generated Hologram coding technique is
proposed, which is able to detect malicious tampering while
tolerating some incidental distortions. The proposed technique uses
as watermark an encrypted image, and it is well suitable for digital
image authentication.