Abstract: One very interesting field of research in Pattern Recognition that has gained much attention in recent times is Gesture Recognition. In this paper, we consider a form of dynamic hand gestures that are characterized by total movement of the hand (arm) in space. For these types of gestures, the shape of the hand (palm) during gesturing does not bear any significance. In our work, we propose a model-based method for tracking hand motion in space, thereby estimating the hand motion trajectory. We employ the dynamic time warping (DTW) algorithm for time alignment and normalization of spatio-temporal variations that exist among samples belonging to the same gesture class. During training, one template trajectory and one prototype feature vector are generated for every gesture class. Features used in our work include some static and dynamic motion trajectory features. Recognition is accomplished in two stages. In the first stage, all unlikely gesture classes are eliminated by comparing the input gesture trajectory to all the template trajectories. In the next stage, feature vector extracted from the input gesture is compared to all the class prototype feature vectors using a distance classifier. Experimental results demonstrate that our proposed trajectory estimator and classifier is suitable for Human Computer Interaction (HCI) platform.
Abstract: Classification is an interesting problem in functional
data analysis (FDA), because many science and application problems
end up with classification problems, such as recognition, prediction,
control, decision making, management, etc. As the high dimension
and high correlation in functional data (FD), it is a key problem to
extract features from FD whereas keeping its global characters, which
relates to the classification efficiency and precision to heavens. In this
paper, a novel automatic method which combined Genetic Algorithm
(GA) and classification algorithm to extract classification features is
proposed. In this method, the optimal features and classification model
are approached via evolutional study step by step. It is proved by
theory analysis and experiment test that this method has advantages in
improving classification efficiency, precision and robustness whereas
using less features and the dimension of extracted classification
features can be controlled.
Abstract: The worldwide prevalence of H3N2 influenza virus
and its increasing resistance to the existing drugs necessitates for the
development of an improved/better targeting anti-influenza drug.
H3N2 influenza neuraminidase is one of the two membrane-bound
proteins belonging to group-2 neuraminidases. It acts as key player
involved in viral pathogenicity and hence, is an important target of
anti-influenza drugs. Oseltamivir is one of the potent drugs targeting
this neuraminidase. In the present work, we have taken subtype N2
neuraminidase as the receptor and probable analogs of oseltamivir as
drug molecules to study the protein-drug interaction in anticipation of
finding efficient modified candidate compound. Oseltamivir analogs
were made by modifying the functional groups using Marvin Sketch
software and were docked using Schrodinger-s Glide. Oseltamivir
analog 10 was detected to have significant energy value (16% less
compared to Oseltamivir) and could be the probable lead molecule. It
infers that some of the modified compounds can interact in a novel
manner with increased hydrogen bonding at the active site of
neuraminidase and it might be better than the original drug. Further
work can be carried out such as enzymatic inhibition studies;
synthesis and crystallizing the drug-target complex to analyze the
interactions biologically.
Abstract: The Malaysia Highway Authority (MHA) was
established by the Government in 1980 for the purpose of designing,
constructing and maintaining toll highways in Malaysia that include
the North-South Expressway and the Penang Bridge, which were
procured using the publicly-funded traditional procurement. However
following a recession in the mid 80-s, the operations of these tolledhighways
had been privatized to ensure that their operational services
continue through private financing as a result of long-term
concession agreement concurred between the Malaysian Government
and private operators. The change in the contract strategy for
highway projects in Malaysia would have a great tendency to dictate
a significant risk exposure towards the key parties involved,
particularly the Malaysian Government as project principal, unless
operational risks are clearly identified and managed via appropriate
mitigation measures prior to a contract signing.
This research identifies potential operational risks that have a
possibility to occur in highway projects in Malaysia from the
perspective of public sector clients. Since this research focuses on the
operational risks for highway projects in Malaysia, the initial results
acquired from literature review on the operational risks of highway
projects in some Asian countries are then justified by a number of
key individuals from the MHA through interviews. As a result,
among key operational risks that have possibility to occur in the
highway projects in Malaysia include initial toll-tariff decided by the
Government, traffic congestion, change of road network and overloaded
freight transportation, which could cause damage to the road
surface and hence affecting the operation of a particular highway.
Abstract: The main purpose of this research was to study how to
communicate the identity of the Amphawa district, Samut Songkram
province for sustainable tourism. The qualitative data was collected
through studying related materials, exploring the area, in-depth
interviews with three groups of people: three directly responsible
officers who were key informants of the district, twenty foreign
tourists and five Thai tourist guides. A content analysis was used to
analyze the qualitative data. The two main findings of the study were
as follows:
1. The identity of the Amphawa District, Samut Songkram
province is the area controlled by Amphawa sub district (submunicipality).
The working unit which runs and looks after
Amphawa sub district administration is known as the Amphawa
mayor. This establishment was built to be a resort for normal
people and tourists visiting the Amphawa district near the
Maekong River consisting of rest accommodations. Along the
river there is a restaurant where food and drinks are served, rich
mangrove forests, a learning center, fireflies and cork trees. The
Amphawa district was built to honor and commemorate King
Rama II and is where the greatest number of fireflies and cork
trees can be seen in Thailand from May to October each year.
2. The communication of the identity of Amphawa District, Samut
Songkram Province which the researcher could find and design
to present in English materials can be summed up in 5 items: 1)
The history of the Amphawa District, Samut Songkram province
2) The history of King Rama II Memorial Park 3) The identity of
Amphawa Floating Market 4) The Learning center of
Ecosystem: Fireflies and Cork Trees 5) How to keep Amphawa
District, Samut Songkram Province for sustainable tourism.
Abstract: Transnational corporations (TNCs) are playing a major role in global R&D, not only through activities in their home countries but also increasingly abroad. However, the process of R&D offshoring is not yet discussed thoroughly. Based on in-depth case study on Agilent China Communications Operation, this paper presents a stage model for theorizing the R&D offshoring process. This stage model outlines 5 maturity levels of organization and the offshoring process: Subsidiary team, Mirror team, Independent team, Mirror sector and the Independent sector (from software engineering point of view, it is similar to the local team's capability level of maturity model). Moreover, the paper gives a detailed discussion on the relevant characteristics, as well as the ability/responsibility of transfer, priorities and the corresponding organization structure. It also gives the characteristics and key points of different level-s R&D offshoring implementation using actual team practice.
Abstract: Nowadays due to globalization of economy and
competition environment, innovation and technology plays key role
at creation of wealth and economic growth of countries. In fact
prompt growth of practical and technologic knowledge may results in
social benefits for countries when changes into effective innovation.
Considering the importance of innovation for the development of
countries, this study addresses the radical technological innovation
introduced by nanopapers at different stages of producing paper
including stock preparation, using authorized additives, fillers and
pigments, using retention, calender, stages of producing conductive
paper, porous nanopaper and Layer by layer self-assembly. Research
results show that in coming years the jungle related products will lose
considerable portion of their market share, unless embracing radical
innovation. Although incremental innovations can make this industry
still competitive in mid-term, but to have economic growth and
competitive advantage in long term, radical innovations are
necessary. Radical innovations can lead to new products and
materials which their applications in packaging industry can produce
value added. However application of nanotechnology in this industry
can be costly, it can be done in cooperation with other industries to
make the maximum use of nanotechnology possible. Therefore this
technology can be used in all the production process resulting in the
mass production of simple and flexible papers with low cost and
special properties such as facility at shape, form, easy transportation,
light weight, recovery and recycle marketing abilities, and sealing.
Improving the resistance of the packaging materials without reducing
the performance of packaging materials enhances the quality and the
value added of packaging. Improving the cellulose at nano scale can
have considerable electron optical and magnetic effects leading to
improvement in packaging and value added. Comparing to the
specifications of thermoplastic products and ordinary papers,
nanopapers show much better performance in terms of effective
mechanical indexes such as the modulus of elasticity, tensile strength,
and strain-stress. In densities lower than 640 kgm -3, due to the
network structure of nanofibers and the balanced and randomized
distribution of NFC in flat space, these specifications will even
improve more. For nanopapers, strains are 1,4Gpa, 84Mpa and 17%,
13,3 Gpa, 214Mpa and 10% respectively. In layer by layer self
assembly method (LbL) the tensile strength of nanopaper with Tio3
particles and Sio2 and halloysite clay nanotube are 30,4 ±7.6Nm/g
and 13,6 ±0.8Nm/g and 14±0.3,3Nm/g respectively that fall within
acceptable range of similar samples with virgin fiber. The usage of
improved brightness and porosity index in nanopapers can create
more competitive advantages at packaging industry.
Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: A numerical study on the influence of forward-facing
cavity length upon forward-facing cavity and opposing jet combined
thermal protection system (TPS) cooling efficiency under hypersonic
flow is conducted, by means of which the flow field parameters, heat
flux distribution along the outer body surface are obtained. The
numerical simulation results are validated by experiments and the
cooling effect of the combined TPS with different cavity length is
analyzed. The numerical results show that the combined configuration
dose well in cooling the nose of the hypersonic vehicle. The deeper the
cavity is, the weaker the heat flux is. The recirculation region plays a
key role for the reduction of the aerodynamic heating.
Abstract: Nowadays increasingly the population makes use of
Information Technology (IT). As such, in recent year the Portuguese
government increased its focus on using the IT for improving
people-s life and began to develop a set of measures to enable the
modernization of the Public Administration, and so reducing the gap
between Public Administration and citizens.Thus the Portuguese
Government launched the Simplex Program. However these
SIMPLEX eGov measures, which have been implemented over the
years, present a serious challenge: how to forecast its impact on
existing Information Systems Architecture (ISA). Thus, this research
is focus in addressing the problem of automating the evaluation of the
actual impact of implementation an eGovSimplification and
Modernization measures in the Information Systems Architecture. To
realize the evaluation we proposes a Framework, which is supported
by some key concepts as: Quality Factors, ISA modeling,
Multicriteria Approach, Polarity Profile and Quality Metrics
Abstract: Medical image registration is the key technology in image guided radiation therapy (IGRT) systems. On the basis of the previous work on our IGRT prototype with a biorthogonal x-ray imaging system, we described a method focused on the 2D/2D rigid-body registration using multiresolution pyramid based mutual information in this paper. Three key steps were involved in the method : firstly, four 2D images were obtained including two x-ray projection images and two digital reconstructed radiographies(DRRs ) as the input for the registration ; Secondly, each pair of the corresponding x-ray image and DRR image were matched using multiresolution pyramid based mutual information under the ITK registration framework ; Thirdly, we got the final couch offset through a coordinate transformation by calculating the translations acquired from the two pairs of the images. A simulation example of a parotid gland tumor case and a clinical example of an anthropomorphic head phantom were employed in the verification tests. In addition, the influence of different CT slice thickness were tested. The simulation results showed that the positioning errors were 0.068±0.070, 0.072±0.098, 0.154±0.176mm along three axes which were lateral, longitudinal and vertical. The clinical test indicated that the positioning errors of the planned isocenter were 0.066, 0.07, 2.06mm on average with a CT slice thickness of 2.5mm. It can be concluded that our method with its verified accuracy and robustness can be effectively used in IGRT systems for patient setup.
Abstract: This paper describes the authorization system
architecture for Pervasive Grid environment. It discusses the
characteristics of classical authorization system and requirements of
the authorization system in pervasive grid environment as well.
Based on our analysis of current systems and taking into account the
main requirements of such pervasive environment, we propose new
authorization system architecture as an extension of the existing grid
authorization mechanisms. This architecture not only supports user
attributes but also context attributes which act as a key concept for
context-awareness thought. The architecture allows authorization of
users dynamically when there are changes in the pervasive grid
environment. For this, we opt for hybrid authorization method that
integrates push and pull mechanisms to combine the existing grid
authorization attributes with dynamic context assertions. We will
investigate the proposed architecture using a real testing environment
that includes heterogeneous pervasive grid infrastructures mapped
over multiple virtual organizations. Various scenarios are described
in the last section of the article to strengthen the proposed mechanism
with different facilities for the authorization procedure.
Abstract: In Thailand, both the 1997 and the current 2007 Thai Constitutions have mentioned the establishment of independent organizations as a new mechanism to play a key role in proposing policy recommendations to national decision-makers in the interest of collective consumers. Over the last ten years, no independent organizations have yet been set up. Evidently, nobody could point out who should be key players in establishing provincial independent consumer bodies. The purpose of this study was to find definitive stakeholders in establishing and developing independent consumer bodies in a Thai context. This was a cross-sectional study between August and September 2007, using a postal questionnaire with telephone follow-up. The questionnaire was designed and used to obtain multiple stakeholder assessment of three key attributes (power, interest and influence). Study population was 153 stakeholders associated with policy decision-making, formulation and implementation processes of civil-based consumer protection in pilot provinces. The population covered key representatives from five sectors (academics, government officers, business traders, mass media and consumer networks) who participated in the deliberative forums at 10 provinces. A 49.7% response rate was achieved. Data were analyzed, comparing means of three stakeholder attributes and classification of stakeholder typology. The results showed that the provincial health officers were the definitive stakeholders as they had legal power, influence and interest in establishing and sustaining the independent consumer bodies. However, only a few key representatives of the provincial health officers expressed their own paradigm on the civil-based consumer protection. Most provincial health officers put their own standpoint of building civic participation at only a plan-implementation level. For effective policy implementation by the independent consumer bodies, the Thai government should provide budgetary support for the operation of the provincial health officers with their paradigm shift as well as their own clarified standpoint on corporate governance.
Abstract: Software project effort estimation is frequently seen
as complex and expensive for individual software engineers.
Software production is in a crisis. It suffers from excessive costs.
Software production is often out of control. It has been suggested that
software production is out of control because we do not measure.
You cannot control what you cannot measure. During last decade, a
number of researches on cost estimation have been conducted. The
metric-set selection has a vital role in software cost estimation
studies; its importance has been ignored especially in neural network
based studies. In this study we have explored the reasons of those
disappointing results and implemented different neural network
models using augmented new metrics. The results obtained are
compared with previous studies using traditional metrics. To be able
to make comparisons, two types of data have been used. The first
part of the data is taken from the Constructive Cost Model
(COCOMO'81) which is commonly used in previous studies and the
second part is collected according to new metrics in a leading
international company in Turkey. The accuracy of the selected
metrics and the data samples are verified using statistical techniques.
The model presented here is based on Multi-Layer Perceptron
(MLP). Another difficulty associated with the cost estimation studies
is the fact that the data collection requires time and care. To make a
more thorough use of the samples collected, k-fold, cross validation
method is also implemented. It is concluded that, as long as an
accurate and quantifiable set of metrics are defined and measured
correctly, neural networks can be applied in software cost estimation
studies with success
Abstract: There are various overlay structures that provide
efficient and scalable solutions for point and range query in a peer-topeer
network. Overlay structure based on m-Binary Search Tree
(BST) is one such popular technique. It deals with the division of the
tree into different key intervals and then assigning the key intervals to
a BST. The popularity of the BST makes this overlay structure
vulnerable to different kinds of attacks. Here we present four such
possible attacks namely index poisoning attack, eclipse attack,
pollution attack and syn flooding attack. The functionality of BST is
affected by these attacks. We also provide different security
techniques that can be applied against these attacks.
Abstract: An approach to develop the FPGA of a flexible key
RSA encryption engine that can be used as a standard device in the
secured communication system is presented. The VHDL modeling of
this RSA encryption engine has the unique characteristics of
supporting multiple key sizes, thus can easily be fit into the systems
that require different levels of security. A simple nested loop addition
and subtraction have been used in order to implement the RSA
operation. This has made the processing time faster and used
comparatively smaller amount of space in the FPGA. The hardware
design is targeted on Altera STRATIX II device and determined that
the flexible key RSA encryption engine can be best suited in the
device named EP2S30F484C3. The RSA encryption implementation
has made use of 13,779 units of logic elements and achieved a clock
frequency of 17.77MHz. It has been verified that this RSA
encryption engine can perform 32-bit, 256-bit and 1024-bit
encryption operation in less than 41.585us, 531.515us and 790.61us
respectively.
Abstract: The traditional public relations manager is usually responsible for maintaining and enhancing the reputation of the organization among key publics. While the principal focus of this effort is on support publics, it is quite clearly recognized that an organization's image has important effects on its own employees, its donors and volunteers, and its clients. The aim of paper is to define application`s aspects of public relations media and tools by nonprofit organizations in Albanian reality. Actually does used public relations media and tools, like written material, audiovisual material, organizational identity media, news, interviews and speeches, events, web sites by nonprofit organizations to attract donors? If, public relations media and tools are used, does exists a relation between public relation media and fundraising?
Abstract: This paper proposes a new approach for image encryption
using a combination of different permutation techniques.
The main idea behind the present work is that an image can be
viewed as an arrangement of bits, pixels and blocks. The intelligible
information present in an image is due to the correlations among the
bits, pixels and blocks in a given arrangement. This perceivable information
can be reduced by decreasing the correlation among the bits,
pixels and blocks using certain permutation techniques. This paper
presents an approach for a random combination of the aforementioned
permutations for image encryption. From the results, it is observed
that the permutation of bits is effective in significantly reducing the
correlation thereby decreasing the perceptual information, whereas
the permutation of pixels and blocks are good at producing higher
level security compared to bit permutation. A random combination
method employing all the three techniques thus is observed to be
useful for tactical security applications, where protection is needed
only against a casual observer.
Abstract: Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
Abstract: The task of strategic information technology
management is to focus on adapting technology to ensure
competitiveness. A key factor for success in this sector is awareness
and readiness to deploy new technologies and exploit the services
they offer. Recently, the need for more flexible and dynamic user
interfaces (UIs) has been recognized, especially in mobile
applications. An ongoing research project (MOP), initiated by TUT
in Finland, is looking at how mobile device UIs can be adapted for
different needs and contexts. It focuses on examining the possibilities
to develop adapter software for solving the challenges related to the
UI and its flexibility in mobile devices. This approach has great
potential for enhancing information transfer in mobile devices, and
consequently for improving information management. The
technology presented here could be one of the key emerging
technologies in the information technology sector in relation to
mobile devices and telecommunications.