Abstract: The tagging data of (users, tags and resources) constitutes a folksonomy that is the user-driven and bottom-up approach to organizing and classifying information on the Web. Tagging data stored in the folksonomy include a lot of very useful information and knowledge. However, appropriate approach for analyzing tagging data and discovering hidden knowledge from them still remains one of the main problems on the folksonomy mining researches. In this paper, we have proposed a folksonomy data mining approach based on FCA for discovering hidden knowledge easily from folksonomy. Also we have demonstrated how our proposed approach can be applied in the collaborative tagging system through our experiment. Our proposed approach can be applied to some interesting areas such as social network analysis, semantic web mining and so on.
Abstract: The development of Web has affected different aspects of our lives, such as communication, sharing knowledge, searching for jobs, social activities, etc. The web portal as a gateway in the World Wide Web is a starting point for people who are connecting to the Internet. The web portal as the type of knowledge management system provides a rich space to share and search information as well as communication services like free email or content provision for the users. This research aims to discover the university needs to the web portal as a necessary tool for students in the universities to help them in getting the required information. A survey was conducted to gather students' requirements which can be incorporated in to portal to be developed.
Abstract: In this work, we present for the first time in our perception an efficient digital watermarking scheme for mpeg audio layer 3 files that operates directly in the compressed data domain, while manipulating the time and subband/channel domain. In addition, it does not need the original signal to detect the watermark. Our scheme was implemented taking special care for the efficient usage of the two limited resources of computer systems: time and space. It offers to the industrial user the capability of watermark embedding and detection in time immediately comparable to the real music time of the original audio file that depends on the mpeg compression, while the end user/audience does not face any artifacts or delays hearing the watermarked audio file. Furthermore, it overcomes the disadvantage of algorithms operating in the PCMData domain to be vulnerable to compression/recompression attacks, as it places the watermark in the scale factors domain and not in the digitized sound audio data. The strength of our scheme, that allows it to be used with success in both authentication and copyright protection, relies on the fact that it gives to the users the enhanced capability their ownership of the audio file not to be accomplished simply by detecting the bit pattern that comprises the watermark itself, but by showing that the legal owner knows a hard to compute property of the watermark.
Abstract: Statistics indicate that more than 1000 phishing attacks are launched every month. With 57 million people hit by the fraud so far in America alone, how do we combat phishing?This publication aims to discuss strategies in the war against Phishing. This study is an examination of the analysis and critique found in the ways adopted at various levels to counter the crescendo of phishing attacks and new techniques being adopted for the same. An analysis of the measures taken up by the varied popular Mail servers and popular browsers is done under this study. This work intends to increase the understanding and awareness of the internet user across the globe and even discusses plausible countermeasures at the users as well as the developers end. This conceptual paper will contribute to future research on similar topics.
Abstract: The purposes of this study were as follows to evaluate
the economic value of Phu Kradueng National Park by the travel cost
method (TCM) and the contingent valuation method (CVM) and to
estimate the demand for traveling and the willingness to pay. The
data for this study were collected by conducting two large scale
surveys on users and non-users. A total of 1,016 users and 1,034
non-users were interviewed. The data were analyzed using multiple
linear regression analysis, logistic regression model and the
consumer surplus (CS) was the integral of demand function for trips.
The survey found, were as follows:
1)Using the travel cost method which provides an estimate of direct
benefits to park users, we found that visitors- total willingness to pay
per visit was 2,284.57 bath, of which 958.29 bath was travel cost,
1,129.82 bath was expenditure for accommodation, food, and
services, and 166.66 bath was consumer surplus or the visitors -net
gain or satisfaction from the visit (the integral of demand function for
trips).
2) Thai visitors to Phu Kradueng National Park were further willing
to pay an average of 646.84 bath per head per year to ensure the
continued existence of Phu Kradueng National Park and to preserve
their option to use it in the future.
3) Thai non-visitors, on the other hand, are willing to pay an average
of 212.61 bath per head per year for the option and existence value
provided by the Park.
4) The total economic value of Phu Kradueng National Park to Thai
visitors and non-visitors taken together stands today at 9,249.55
million bath per year.
5) The users- average willingness to pay for access to Phu Kradueng
National Park rises
from 40 bath to 84.66 bath per head per trip for improved services
such as road improvement, increased cleanliness, and upgraded
information.
This paper was needed to investigate of the potential market
demand for bio prospecting in Phu Kradueng national Park and to
investigate how a larger share of the economic benefits of tourism
could be distributed income to the local residents.
Abstract: Groundwater resources in Arsanjan plain provide
water for agriculture, industry, and human consumption. Continued
agricultural development in this area needs to additional groundwater
resources for, particularly during of drought periods, and effects on
the quantity and quality of ground water available. The purpose of
this study is to evaluate water level changes in the aquifer of
Arsanjan plain in the Fars province in order to determine the areas of
greatest depletion and the causes of depletion. In this plain, farmers
and other users are pumping groundwater faster than its natural
replenishment rate, causing a continuous drop in groundwater tables
and depletion of this resource. In this research variation of
groundwater level, their effects and ways to help control groundwater
levels in aquifer of the Arsanjan plains were evaluated .Excessive
exploitation of groundwater in this aquifer caused the groundwater
levels fall too fast or to unacceptable levels. The average drawdown
of the groundwater level in this plain were 19.66 meters during
1996 to 2003.
Abstract: With the advent of DSL services, high data rates are now available over phone lines, yet higher rates are in demand. In this paper, we optimize the transmit filters that can be used over wireline channels. Results showing the bit error rates when optimized filters are used, and with a decision feedback equalizer (DFE) employed in the receiver, are given. We then show that significantly higher throughput can be achieved by modeling the channel as a multiple input multiple output (MIMO) channel. A receiver that employs a MIMO-DFE that deals jointly with several users is proposed and shown to provide significant improvement over the conventional DFE.
Abstract: Sustainable energy usage has been recognized as one
of the important measure to increase the competitiveness of the
nation globally. Many strong emphases were given in the Ninth
Malaysia Plan (RMK9) to improve energy efficient especially to
government buildings. With this in view, a project to investigate the
potential of energy saving in selected building in Universiti Tun
Hussein Onn Malaysia (UTHM) was carried out. In this project, a
case study involving electric energy consumption of the academic
staff office building was conducted. The scope of the study include to
identify energy consumption in a selected building, to study energy
saving opportunities, to analyse cost investment in term of economic
and to identify users attitude with respect to energy usage. The
MS1525:2001, Malaysian Standard -Code of practice on energy
efficiency and use of renewable energy for non-residential buildings
was used as reference. Several energy efficient measures were
considered and their merits and priority were compared. Improving
human behavior can reduce energy consumption by 6% while
technical measure can reduce energy consumption by 44%. Two
economic analysis evaluation methods were applied; they are the
payback period method and net present value method.
Abstract: Static analysis of source code is used for auditing web
applications to detect the vulnerabilities. In this paper, we propose a
new algorithm to analyze the PHP source code for detecting LFI and
RFI potential vulnerabilities. In our approach, we first define some
patterns for finding some functions which have potential to be abused
because of unhandled user inputs. More precisely, we use regular
expression as a fast and simple method to define some patterns for
detection of vulnerabilities. As inclusion functions could be also used
in a safe way, there could occur many false positives (FP). The first
cause of these FP-s could be that the function does not use a usersupplied
variable as an argument. So, we extract a list of usersupplied
variables to be used for detecting vulnerable lines of code.
On the other side, as vulnerability could spread among the variables
like by multi-level assignment, we also try to extract the hidden usersupplied
variables. We use the resulted list to decrease the false
positives of our method. Finally, as there exist some ways to prevent
the vulnerability of inclusion functions, we define also some patterns
to detect them and decrease our false positives.
Abstract: Increasing concerns over climate change have limited
the liberal usage of available energy technology options. India faces
a formidable challenge to meet its energy needs and provide adequate
energy of desired quality in various forms to users in sustainable
manner at reasonable costs. In this paper, work carried out with an
objective to study the role of various energy technology options
under different scenarios namely base line scenario, high nuclear
scenario, high renewable scenario, low growth and high growth rate
scenario. The study has been carried out using Model for Energy
Supply Strategy Alternatives and their General Environmental
Impacts (MESSAGE) model which evaluates the alternative energy
supply strategies with user defined constraints on fuel availability,
environmental regulations etc. The projected electricity demand, at
the end of study period i.e. 2035 is 500490 MWYr. The model
predicted the share of the demand by Thermal: 428170 MWYr,
Hydro: 40320 MWYr, Nuclear: 14000 MWYr, Wind: 18000 MWYr
in the base line scenario. Coal remains the dominant fuel for
production of electricity during the study period. However, the
import dependency of coal increased during the study period. In
baseline scenario the cumulative carbon dioxide emissions upto 2035
are about 11,000 million tones of CO2. In the scenario of high nuclear
capacity the carbon dioxide emissions reduced by 10 % when nuclear
energy share increased to 9 % compared to 3 % in baseline scenario.
Similarly aggressive use of renewables reduces 4 % of carbon
dioxide emissions.
Abstract: Nowadays, web-based technologies influence in
people-s daily life such as in education, business and others.
Therefore, many web developers are too eager to develop their web
applications with fully animation graphics and forgetting its
accessibility to its users. Their purpose is to make their web
applications look impressive. Thus, this paper would highlight on the
usability and accessibility of a voice recognition browser as a tool to
facilitate the visually impaired and blind learners in accessing virtual
learning environment. More specifically, the objectives of the study
are (i) to explore the challenges faced by the visually impaired
learners in accessing virtual learning environment (ii) to determine
the suitable guidelines for developing a voice recognition browser
that is accessible to the visually impaired. Furthermore, this study
was prepared based on an observation conducted with the Malaysian
visually impaired learners. Finally, the result of this study would
underline on the development of an accessible voice recognition
browser for the visually impaired.
Abstract: In the paper, the performance of quasi-synchronous
CDMA (QS-CDMA) system, which can allow an increased timing
error in synchronized access, is discussed. Average BER performance
of the system is analyzed in the condition of different access timing
error and different asynchronous users by simulation in AWGN
channel. The results show that QS-CDMA system is shown to have
great performance gain over the asynchronous system when access
timing error is within a few chips and asynchronous users is tolerable.
However, with access timing error increasing and asynchronous users
increasing, the performance of QS-CDMA will degrade. Also, we can
determine the number of tolerable asynchronous users for different
access timing error by simulation figures.
Abstract: Recommender systems are usually regarded as an
important marketing tool in the e-commerce. They use important
information about users to facilitate accurate recommendation. The
information includes user context such as location, time and interest
for personalization of mobile users. We can easily collect information
about location and time because mobile devices communicate with the
base station of the service provider. However, information about user
interest can-t be easily collected because user interest can not be
captured automatically without user-s approval process. User interest
usually represented as a need. In this study, we classify needs into two
types according to prior research. This study investigates the
usefulness of data mining techniques for classifying user need type for
recommendation systems. We employ several data mining techniques
including artificial neural networks, decision trees, case-based
reasoning, and multivariate discriminant analysis. Experimental
results show that CHAID algorithm outperforms other models for
classifying user need type. This study performs McNemar test to
examine the statistical significance of the differences of classification
results. The results of McNemar test also show that CHAID performs
better than the other models with statistical significance.
Abstract: As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.
Abstract: When designing information systems that deal with
large amount of domain knowledge, system designers need to consider
ambiguities of labeling termsin domain vocabulary for navigating
users in the information space. The goal of this study is to develop a
methodology for system designers to label navigation items, taking
account of ambiguities stems from synonyms or polysemes of labeling
terms. In this paper, we propose a method for concept labeling based
on mappings between domain ontology andthesaurus, and report
results of an empirical evaluation.
Abstract: Clustering techniques have been used by many intelligent software agents to group similar access patterns of the Web users into high level themes which express users intentions and interests. However, such techniques have been mostly focusing on one salient feature of the Web document visited by the user, namely the extracted keywords. The major aim of these techniques is to come up with an optimal threshold for the number of keywords needed to produce more focused themes. In this paper we focus on both keyword and similarity thresholds to generate themes with concentrated themes, and hence build a more sound model of the user behavior. The purpose of this paper is two fold: use distance based clustering methods to recognize overall themes from the Proxy log file, and suggest an efficient cut off levels for the keyword and similarity thresholds which tend to produce more optimal clusters with better focus and efficient size.
Abstract: A number of studies highlighted problems related to
ERP systems, yet, most of these studies focus on the problems during
the project and implementation stages but not during the postimplementation
use process. Problems encountered in the process of
using ERP would hinder the effective exploitation and the extended
and continued use of ERP systems and their value to organisations.
This paper investigates the different types of problems users
(operational, supervisory and managerial) faced in using ERP and
how 'feral system' is used as the coping mechanism. The paper
adopts a qualitative method and uses data collected from two cases
and 26 interviews, to inductively develop a casual network model of
ERP usage problem and its coping mechanism. This model classified
post ERP usage problems as data quality, system quality, interface
and infrastructure. The model is also categorised the different coping
mechanism through use of 'feral system' inclusive of feral
information system, feral data and feral use of technology.
Abstract: Image data holds a large amount of different context
information. However, as of today, these resources remain largely
untouched. It is thus the aim of this paper to present a basic technical
framework which allows for a quick and easy exploitation of context
information from image data especially by non-expert users.
Furthermore, the proposed framework is discussed in detail
concerning important social and ethical issues which demand special
requirements in system design. Finally, a first sensor prototype is
presented which meets the identified requirements. Additionally,
necessary implications for the software and hardware design of the
system are discussed, rendering a sensor system which could be
regarded as a good, acceptable and justifiable technical and thereby
enabling the extraction of context information from image data.
Abstract: The paper introduces and discusses definitions and concepts from the supplier relationship management area. This review has the goal to provide readers with the basic conditions to understand the market mechanisms and the technological developments of the SRM market. Further on, the work gives a picture of the actual business environment in which the SRM vendors are in, and the main trends in the field, based on the main SRM functionalities i.e. e-Procurement, e-Sourcing and Supplier Enablement, which indicates users and software providers the future technological developments and practises that will take place in this area in the next couple of years.
Abstract: This paper presents a design and prototype
implementation of new home automation system that uses WiFi
technology as a network infrastructure connecting its parts. The
proposed system consists of two main components; the first part is
the server (web server), which presents system core that manages,
controls, and monitors users- home. Users and system administrator
can locally (LAN) or remotely (internet) manage and control system
code. Second part is hardware interface module, which provides
appropriate interface to sensors and actuator of home automation
system. Unlike most of available home automation system in the
market the proposed system is scalable that one server can manage
many hardware interface modules as long as it exists on WiFi
network coverage. System supports a wide range of home
automation devices like power management components, and
security components. The proposed system is better from the
scalability and flexibility point of view than the commercially
available home automation systems.