Abstract: One of the biggest problems of SMEs is their tendencies to financial distress because of insufficient finance background. In this study, an Early Warning System (EWS) model based on data mining for financial risk detection is presented. CHAID algorithm has been used for development of the EWS. Developed EWS can be served like a tailor made financial advisor in decision making process of the firms with its automated nature to the ones who have inadequate financial background. Besides, an application of the model implemented which covered 7,853 SMEs based on Turkish Central Bank (TCB) 2007 data. By using EWS model, 31 risk profiles, 15 risk indicators, 2 early warning signals, and 4 financial road maps has been determined for financial risk mitigation.
Abstract: Cryo-electron microscopy (CEM) in combination with
single particle analysis (SPA) is a widely used technique for
elucidating structural details of macromolecular assemblies at closeto-
atomic resolutions. However, development of automated software
for SPA processing is still vital since thousands to millions of
individual particle images need to be processed. Here, we present our
workflow for automated particle picking. Our approach integrates
peak shape analysis to the classical correlation and an iterative
approach to separate macromolecules and background by
classification. This particle selection workflow furthermore provides
a robust means for SPA with little user interaction. Processing
simulated and experimental data assesses performance of the
presented tools.
Abstract: Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, objectbased watermarking schemes are needed for copyright protection. This paper proposes a novel blind object watermarking scheme for images and video using the in place lifting shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy image/video compression (e.g. JPEG, JPEG2000 and MPEG-4), scaling, adding noise, filtering, etc.
Abstract: Spam mails are unwanted mails sent to large number
of users. Spam mails not only consume the network resources, but
cause security threats as well. This paper proposes an efficient
technique to detect, and to prevent spam mail in the sender side rather
than the receiver side. This technique is based on a counter set on the
sender server. When a mail is transmitted to the server, the mail server
checks the number of the recipients based on its counter policy. The
counter policy performed by the mail server is based on some
pre-defined criteria. When the number of recipients exceeds the
counter policy, the mail server discontinues the rest of the process, and
sends a failure mail to sender of the mail; otherwise the mail is
transmitted through the network. By using this technique, the usage of
network resources such as bandwidth, and memory is preserved. The
simulation results in real network show that when the counter is set on
the sender side, the time required for spam mail detection is 100 times
faster than the time the counter is set on the receiver side, and the
network resources are preserved largely compared with other
anti-spam mail techniques in the receiver side.
Abstract: Mobile agents are a powerful approach to develop distributed systems since they migrate to hosts on which they have the resources to execute individual tasks. In a dynamic environment like a peer-to-peer network, Agents have to be generated frequently and dispatched to the network. Thus they will certainly consume a certain amount of bandwidth of each link in the network if there are too many agents migration through one or several links at the same time, they will introduce too much transferring overhead to the links eventually, these links will be busy and indirectly block the network traffic, therefore, there is a need of developing routing algorithms that consider about traffic load. In this paper we seek to create cooperation between a probabilistic manner according to the quality measure of the network traffic situation and the agent's migration decision making to the next hop based on decision tree learning algorithms.
Abstract: This paper presents an efficient VLSI architecture
design to achieve real time video processing using Full-Search Block
Matching (FSBM) algorithm. The design employs parallel bank
architecture with minimum latency, maximum throughput, and full
hardware utilization. We use nine parallel processors in our
architecture and each controlled by a state machine. State machine
control implementation makes the design very simple and cost
effective. The design is implemented using VHDL and the
programming techniques we incorporated makes the design
completely programmable in the sense that the search ranges and the
block sizes can be varied to suit any given requirements. The design
can operate at frequencies up to 36 MHz and it can function in QCIF
and CIF video resolution at 1.46 MHz and 5.86 MHz, respectively.
Abstract: The past decade has seen enormous growth in the amount of software produced. However, given the ever increasing complexity of the software being developed and the concomitant rise in the typical project size, managers are becoming increasingly aware of the importance of issues that influence the productivity levels of the project teams involved. By analyzing the latest release of ISBSG data repository, we report on the factors found to significantly influence the productivity among which average team size and language type are the two most essential ones. Building on this we present an original model for evaluating the potential productivity during the project planning stage.
Abstract: IPsec has now become a standard information security
technology throughout the Internet society. It provides a well-defined
architecture that takes into account confidentiality, authentication,
integrity, secure key exchange and protection mechanism against
replay attack also. For the connectionless security services on packet
basis, IETF IPsec Working Group has standardized two extension
headers (AH&ESP), key exchange and authentication protocols. It is
also working on lightweight key exchange protocol and MIB's for
security management. IPsec technology has been implemented on
various platforms in IPv4 and IPv6, gradually replacing old
application-specific security mechanisms. IPv4 and IPv6 are not
directly compatible, so programs and systems designed to one
standard can not communicate with those designed to the other. We
propose the design and implementation of controlled Internet security
system, which is IPsec-based Internet information security system in
IPv4/IPv6 network and also we show the data of performance
measurement. With the features like improved scalability and
routing, security, ease-of-configuration, and higher performance of
IPv6, the controlled Internet security system provides consistent
security policy and integrated security management on IPsec-based
Internet security system.
Abstract: Confucius was a fifth-century BCE Chinese thinker whose influence upon East Asian intellectual and social history is immeasurable. Better known is in China as “Master Kong”. As a culturally symbolic figure, he has been alternately idealized, deified, dismissed, vilified, and rehabilitated over the millennia by both Asian and non-Asian thinkers and regimes. Given his extraordinary impact on Chinese, Korean, Japanese, and Vietnamese thought, it is ironic that so little can be known about Confucius. The tradition that bears his name – “Confucianizm” (Chinese: Rujia) – ultimately traces itself to the sayings and biographical fragments recorded in the text known as the Analects (Chinese: Lunyu). In the Analects, two types of persons are opposed to one another – not in terms of basic potential, but in terms of developed potential. These are the junzi (literally, “lord’s son” or “gentleman”) and the xiaoren (“small person”). The junzi is the person who always manifests the quality of ren in his
person and the displays the quality of lee in his actions. In this article examines the category of the ideal man and the spiritual and moral values of the philosophy of Confucius. According to Confucius high-morality Jun-zi is characterized by two things: a sense of humanity and duty. This article provides an analysis of the ethical category for the ideal man.
Abstract: Nowadays, financial and economic crises are growing
more and reach more countries and sectors. These events have, as a
result, a considerable impact on the activities of the firms which think
unstable and in danger.
But besides this heavy uncertainty which weighs on the different
firms, the family firm, object of our research, is not only confronted
with these external difficulties but also with an internal challenge and
of size: that of transmission. Indeed, the transmission of an
organization from one generation to another can succeed as it can
fail; leaving considerable damage.
Our research registers as part of these problems since we tried to
understand relation between the behavior of two main actors of the
process of succession, predecessor and successor; and the success of
transmission.
Abstract: Recently, permeable breakwaters have been suggested to overcome the disadvantages of fully protection breakwaters. These protection structures have minor impacts on the coastal environment and neighboring beaches where they provide a more economical protection from waves and currents. For regular waves, a numerical model is used (FLOW-3D, VOF) to investigate the hydraulic performance of a permeable breakwater. The model of permeable breakwater consists of a pair of identical vertical slotted walls with an impermeable upper and lower part, where the draft is a decimal multiple of the total depth. The middle part is permeable with a porosity of 50%. The second barrier is located at distant of 0.5 and 1.5 of the water depth from the first one. The numerical model is validated by comparisons with previous laboratory data and semi-analytical results of the same model. A good agreement between the numerical results and both laboratory data and semi-analytical results has been shown and the results indicate the applicability of the numerical model to reproduce most of the important features of the interaction. Through the numerical investigation, the friction factor of the model is carefully discussed.
Abstract: An important structuring mechanism for knowledge bases is building clusters based on the content of their knowledge objects. The objects are clustered based on the principle of maximizing the intraclass similarity and minimizing the interclass similarity. Clustering can also facilitate taxonomy formation, that is, the organization of observations into a hierarchy of classes that group similar events together. Hierarchical representation allows us to easily manage the complexity of knowledge, to view the knowledge at different levels of details, and to focus our attention on the interesting aspects only. One of such efficient and easy to understand systems is Hierarchical Production rule (HPRs) system. A HPR, a standard production rule augmented with generality and specificity information, is of the following form Decision If < condition> Generality Specificity . HPRs systems are capable of handling taxonomical structures inherent in the knowledge about the real world. In this paper, a set of related HPRs is called a cluster and is represented by a HPR-tree. This paper discusses an algorithm based on cumulative learning scenario for dynamic structuring of clusters. The proposed scheme incrementally incorporates new knowledge into the set of clusters from the previous episodes and also maintains summary of clusters as Synopsis to be used in the future episodes. Examples are given to demonstrate the behaviour of the proposed scheme. The suggested incremental structuring of clusters would be useful in mining data streams.
Abstract: This paper presents a comparison between Spectrum-
Sliced Wavelength Division Multiplexing (SS-WDM) and Spectrum
Amplitude Coding Optical Code Division Multiple Access (SAC
Optical CDMA) systems for different light sources. The performance
of the system is shown in the simulated results of the bit error rate
(BER) and the eye diagram of both systems. The comparison results
indicate that the Multiple Access Interference (MAI) effects have a
significant impact on SS-WDM over SAC Optical CDMA systems.
Finally, in terms of spectral efficiency at constant BER of 10-12, SSWDM
offers higher spectral efficiency than optical CDMA since no
bandwidth expansion in needed.
Abstract: Antifungal activities of ether and methanolic extracts of volatiles oils of Nigella Sativa seeds were tested against pathogenic bacterias and fungies strains.The volatile oil were found to have significant antifungal and antibacterial activities compare to tetracycline, cefuroxime and ciprofloxacin positive controls.The ether and methanolic esxtracts were compared to each other for antifungal and antibacterial activities and ether extracts showed stonger activity than methanolic one.
Abstract: In order to evaluation the effects of natural, biological
and chemical fertilizers on grain yield and chickpea quality, field
experiments were carried out in 2007 and 2008 growing seasons. In
this research the effects of different organic, chemical and biological
fertilizers were investigated on grain yield and quality of chickpea.
Experimental units were arranged in split-split plots based on
randomized complete blocks with three replications. The highest
amounts of yield and yield components were obtained in G1×N5
interaction. Significant increasing of N, P, K, Fe and Mg content in
leaves and grains emphasized on superiority of mentioned treatment
because each one of these nutrients has an approved role in
chlorophyll synthesis and photosynthesis ability of the crop. The
combined application of compost, farmyard manure and chemical
phosphorus (N5) had the best grain quality due to high protein, starch
and total sugar contents, low crude fiber and reduced cooking time.
Abstract: Generally, in order to create 3D sound using binaural
systems, we use head related transfer functions (HRTF) including the
information of sounds which is arrived to our ears. But it can decline
some three-dimensional effects in the area of a cone of confusion
between front and back directions, because of the characteristics of
HRTF.
In this paper, we propose a new method to use psychoacoustics
theory that reduces the confusion of sound image localization. In the
method, HRTF spectrum characteristic is enhanced by using the
energy ratio of the bark band. Informal listening tests show that the
proposed method improves the front-back sound localization
characteristics much better than the conventional methods
Abstract: Chatter vibration has been a troublesome problem
for a machine tool toward the high precision and high speed machining.
Essentially, the machining performance is determined by the dynamic
characteristics of the machine tool structure and dynamics of cutting
process, which can further be identified in terms of the stability lobe
diagram. Therefore, realization on the machine tool dynamic behavior
can help to enhance the cutting stability. To assess the dynamic
characteristics and machining stability of a vertical milling system
under the influence of a linear guide, this study developed a finite
element model integrated the modeling of linear components with the
implementation of contact stiffness at the rolling interface. Both the
finite element simulations and experimental measurements reveal that
the linear guide with different preload greatly affects the vibration
behavior and milling stability of the vertical column spindle head
system, which also clearly indicate that the predictions of the
machining stability agree well with the cutting tests. It is believed that
the proposed model can be successfully applied to evaluate the
dynamics performance of machine tool systems of various
configurations.
Abstract: The African Diaspora in Singapore (and larger Asia)
is a topic that has received little scholarly attention and research. This
exploratory study will analyze the changing identity of Africans
throughout the process of cultural adaptation in Singapore. For the
focus of this study, “black Africans" will be defined as any black
Africans from sub-Saharan Africa who have lived in Singapore for at
least six months. The dialectic relationship between Singaporean
conceptions of black African identity and African self-consciousness
will be analyzed from the perspective of black Africans so as to
evaluate the impact of intercultural discourse on the evolution of the
African identity in Singapore.
Abstract: In recent years, response surface methodology (RSM) has
brought many attentions of many quality engineers in different
industries. Most of the published literature on robust design
methodology is basically concerned with optimization of a single
response or quality characteristic which is often most critical to
consumers. For most products, however, quality is multidimensional,
so it is common to observe multiple responses in an experimental
situation. Through this paper interested person will be familiarize
with this methodology via surveying of the most cited technical
papers.
It is believed that the proposed procedure in this study can resolve
a complex parameter design problem with more than two responses.
It can be applied to those areas where there are large data sets and a
number of responses are to be optimized simultaneously. In addition,
the proposed procedure is relatively simple and can be implemented
easily by using ready-made standard statistical packages.
Abstract: Digital Video Terrestrial Broadcasting (DVB-T)
allows combining broadcasting, telephone and data services in one
network. It has facilitated mobile TV broadcasting. Mobile TV
broadcasting is dominated by fragmentation of standards in use in
different continents. In Asia T-DMB and ISDB-T are used while
Europe uses mainly DVB-H and in USA it is MediaFLO. Issues of
royalty for developers of these different incompatible technologies,
investments made and differing local conditions shall make it
difficult to agree on a unified standard in a very near future. Despite
this shortcoming, mobile TV has shown very good market potential.
There are a number of challenges that still exist for regulators,
investors and technology developers but the future looks bright.
There is need for mobile telephone operators to cooperate with
content providers and those operating terrestrial digital broadcasting
infrastructure for mutual benefit.