Abstract: Every organization is continually subject to new damages and threats which can be resulted from their operations or their goal accomplishment. Methods of providing the security of space and applied tools have been widely changed with increasing application and development of information technology (IT). From this viewpoint, information security management systems were evolved to construct and prevent reiterating the experienced methods. In general, the correct response in information security management systems requires correct decision making, which in turn requires the comprehensive effort of managers and everyone involved in each plan or decision making. Obviously, all aspects of work or decision are not defined in all decision making conditions; therefore, the possible or certain risks should be considered when making decisions. This is the subject of risk management and it can influence the decisions. Investigation of different approaches in the field of risk management demonstrates their progress from quantitative to qualitative methods with a process approach.
Abstract: Knowledge sharing in general and the contextual
access to knowledge in particular, still represent a key challenge in
the knowledge management framework. Researchers on semantic
web and human machine interface study techniques to enhance this
access. For instance, in semantic web, the information retrieval is
based on domain ontology. In human machine interface, keeping
track of user's activity provides some elements of the context that can
guide the access to information. We suggest an approach based on
these two key guidelines, whilst avoiding some of their weaknesses.
The approach permits a representation of both the context and the
design rationale of a project for an efficient access to knowledge. In
fact, the method consists of an information retrieval environment
that, in the one hand, can infer knowledge, modeled as a semantic
network, and on the other hand, is based on the context and the
objectives of a specific activity (the design). The environment we
defined can also be used to gather similar project elements in order to
build classifications of tasks, problems, arguments, etc. produced in a
company. These classifications can show the evolution of design
strategies in the company.
Abstract: This article provides empirical evidence on the effect
of domestic and international factors on the U.S. current account
deficit. Linear dynamic regression and vector autoregression models
are employed to estimate the relationships during the period from 1986
to 2011. The findings of this study suggest that the current and lagged
private saving rate and foreign current account for East Asian
economies have played a vital role in affecting the U.S. current
account. Additionally, using Granger causality tests and variance
decompositions, the change of the productivity growth and foreign
domestic demand are determined to influence significantly the change
of the U.S. current account. To summarize, the empirical relationship
between the U.S. current account deficit and its determinants is
sensitive to alternative regression models and specifications.
Abstract: These days people love to travel around the world.
Regardless of their location and time, they especially Muslims still
need to perform their prayers. Normally for travelers, they need to
bring maps, compass and for Muslim, they even have to bring Qibla
pointer when they travel. It is slightly difficult to determine the Qibla
direction and to know the time for each prayer. As the technology
grows, many PDA equip with maps and GPS to locate their location.
In this paper we present a new electronic device called Mobile Qibla
and Prayer Time Finder to locate the Qibla direction and to
determine each prayer time based on the current user-s location using
PDA. This device use PIC microcontroller equipped with digital
compass where it will communicate with PDA using Bluetooth
technology and display the exact Qibla direction and prayer time
automatically at any place in the world. This device is reliable and
accurate in determining the Qibla direction and prayer time.
Abstract: The present study was designed to investigate the
cardio protective role of chronic oral administration of alcoholic
extract of Terminalia arjuna in in-vivo ischemic reperfusion injury
and the induction of HSP72. Rabbits, divided into three groups, and
were administered with the alcoholic extract of the bark powder of
Terminalia arjuna (TAAE) by oral gavage [6.75mg/kg: (T1) and
9.75mg/kg: (T2), 6 days /week for 12 weeks]. In open-chest
Ketamine pentobarbitone anaesthetized rabbits, the left anterior
descending coronary artery was occluded for 15 min of ischemia
followed by 60 min of reperfusion. In the vehicle-treated group,
ischemic-reperfusion injury (IRI) was evidenced by depression of
global hemodynamic function (MAP, HR, LVEDP, peak LV (+) & (-
) (dP/dt) along with depletion of HEP compounds. Oxidative stress
in IRI was evidenced by, raised levels of myocardial TBARS and
depletion of endogenous myocardial antioxidants GSH, SOD and
catalase. Western blot analysis showed a single band corresponding
to 72 kDa in homogenates of hearts from rabbits treated with both the
doses. In the alcoholic extract of the bark powder of Terminalia
arjuna treatment groups, both the doses had better recovery of
myocardial hemodynamic function, with significant reduction in
TBARS, and rise in SOD, GSH, catalase were observed. The results
of the present study suggest that the alcoholic extract of the bark
powder of Terminalia arjuna in rabbit induces myocardial HSP 72
and augments myocardial endogenous antioxidants, without causing
any cellular injury and offered better cardioprotection against
oxidative stress associated with myocardial IR injury.
Abstract: A key to success of high quality software development
is to define valid and feasible requirements specification. We have
proposed a method of model-driven requirements analysis using
Unified Modeling Language (UML). The main feature of our method
is to automatically generate a Web user interface mock-up from UML
requirements analysis model so that we can confirm validity of
input/output data for each page and page transition on the system by
directly operating the mock-up. This paper proposes a support method
to check the validity of a data life cycle by using a model checking tool
“UPPAAL" focusing on CRUD (Create, Read, Update and Delete).
Exhaustive checking improves the quality of requirements analysis
model which are validated by the customers through automatically
generated mock-up. The effectiveness of our method is discussed by a
case study of requirements modeling of two small projects which are a
library management system and a supportive sales system for text
books in a university.
Abstract: In ad hoc networks, the main issue about designing of protocols is quality of service, so that in wireless sensor networks the main constraint in designing protocols is limited energy of sensors. In fact, protocols which minimize the power consumption in sensors are more considered in wireless sensor networks. One approach of reducing energy consumption in wireless sensor networks is to reduce the number of packages that are transmitted in network. The technique of collecting data that combines related data and prevent transmission of additional packages in network can be effective in the reducing of transmitted packages- number. According to this fact that information processing consumes less power than information transmitting, Data Aggregation has great importance and because of this fact this technique is used in many protocols [5]. One of the Data Aggregation techniques is to use Data Aggregation tree. But finding one optimum Data Aggregation tree to collect data in networks with one sink is a NP-hard problem. In the Data Aggregation technique, related information packages are combined in intermediate nodes and form one package. So the number of packages which are transmitted in network reduces and therefore, less energy will be consumed that at last results in improvement of longevity of network. Heuristic methods are used in order to solve the NP-hard problem that one of these optimization methods is to solve Simulated Annealing problems. In this article, we will propose new method in order to build data collection tree in wireless sensor networks by using Simulated Annealing algorithm and we will evaluate its efficiency whit Genetic Algorithm.
Abstract: We investigated oxidative DNA damage caused by
radio frequency radiation using 8-oxo-7, 8-dihydro-2'-
deoxyguanosine (8-oxodG) generated in mice tissues after exposure
to 900 MHz mobile phone radio frequency in three independent
experiments. The RF was generated by a Global System for Mobile
Communication (GSM) signal generator. The radio frequency field
was adjusted to 25 V/m. The whole body specific absorption rate
(SAR) was 1.0 W/kg. Animals were exposed to this field for 30 min
daily for 30 days. 24 h post-exposure, blood serum, brain and spleen
were removed and DNA was isolated. Enzyme-linked
immunosorbent assay (ELISA) was used to measure 8-oxodG
concentration. All animals survived the whole experimental period.
The body weight of animals did not change significantly at the end of
the experiment. No statistically significant differences observed in
the levels of oxidative stress. Our results are not in favor of the
hypothesis that 900 MHz RF induces oxidative damage.
Abstract: Researchers have been applying tional intelligence (AI/CI) methods to computer games. In this research field, further researchesare required to compare AI/CI
methods with respect to each game application. In th
our experimental result on the comparison of three evolutionary algorithms – evolution strategy, genetic algorithm, and their hybrid
applied to evolving controller agents for the CIG 2007 Simulated Car Racing competition. Our experimental result shows that, premature
convergence of solutions was observed in the case of ES, and GA outperformed ES in the last half of generations. Besides, a hybrid
which uses GA first and ES next evolved the best solution among the whole solutions being generated. This result shows the ability of GA in
globally searching promising areas in the early stage and the ability of ES in locally searching the focused area (fine-tuning solutions).
Abstract: Image Compression using Artificial Neural Networks
is a topic where research is being carried out in various directions
towards achieving a generalized and economical network.
Feedforward Networks using Back propagation Algorithm adopting
the method of steepest descent for error minimization is popular and
widely adopted and is directly applied to image compression.
Various research works are directed towards achieving quick
convergence of the network without loss of quality of the restored
image. In general the images used for compression are of different
types like dark image, high intensity image etc. When these images
are compressed using Back-propagation Network, it takes longer
time to converge. The reason for this is, the given image may
contain a number of distinct gray levels with narrow difference with
their neighborhood pixels. If the gray levels of the pixels in an image
and their neighbors are mapped in such a way that the difference in
the gray levels of the neighbors with the pixel is minimum, then
compression ratio as well as the convergence of the network can be
improved. To achieve this, a Cumulative distribution function is
estimated for the image and it is used to map the image pixels. When
the mapped image pixels are used, the Back-propagation Neural
Network yields high compression ratio as well as it converges
quickly.
Abstract: This paper presents the region based segmentation method for ultrasound images using local statistics. In this segmentation approach the homogeneous regions depends on the image granularity features, where the interested structures with dimensions comparable to the speckle size are to be extracted. This method uses a look up table comprising of the local statistics of every pixel, which are consisting of the homogeneity and similarity bounds according to the kernel size. The shape and size of the growing regions depend on this look up table entries. The algorithms are implemented by using connected seeded region growing procedure where each pixel is taken as seed point. The region merging after the region growing also suppresses the high frequency artifacts. The updated merged regions produce the output in formed of segmented image. This algorithm produces the results that are less sensitive to the pixel location and it also allows a segmentation of the accurate homogeneous regions.
Abstract: It well recognized that one feature that makes a
successful company is its ability to successfully align its business goals with its information communication technologies platform.
Enterprise Resource Planning (ERP) systems contribute to achieve better performance by integrating various business functions and
providing support for information flows. However, the technological
systems complexity is known to prevent the business users to exploit in an efficient way the Enterprise Resource Planning Systems (ERP).
This paper aims to investigate the role of training in improving the
usage of ERP systems. To this end, we have designed an instrument
survey to employees of a Norwegian multinational global provider of
technology solutions. Based on the analysis of collected data, we have delineated a training model that could be high relevance for
both researchers and practitioners as a step towards a better
understanding of ERP system implementation.
Abstract: Urban disaster risks and vulnerabilities are great problems for Turkey. The annual loss of life and property through disaster in the world-s major metropolitan areas is increasing. Urban concentrations of the poor and less-informed in environmentally fragile locations suffer the impact of disaster disproportionately. Gecekondu (squatter) developments will compound the inherent risks associated with high-density environments, in appropriate technologies, and inadequate infrastructure. On the other hand, there are many geological disadvantages such as sitting on top of active tectonic plate boundaries, and why having avalanche, flood, and landslide and drought prone areas in Turkey. However, this natural formation is inevitable; the only way to survive in such a harsh geography is to be aware of importance of these natural events and to take political and physical measures. The main aim of this research is to bring up the magnitude of natural hazard risks in Izmir built-up zone, not being taken into consideration adequately. Because the dimensions of the peril are not taken seriously enough, the natural hazard risks, which are commonly well known, are not considered important or they are being forgotten after some time passes. Within this research, the magnitude of natural hazard risks for Izmir is being presented in the scope of concrete and local researches over Izmir risky areas.
Abstract: Transport and land use are two systems that are
mutually influenced. Their interaction is a complex process
associated with continuous feedback. The paper examines the
existing land use around an under construction metro station of the
new metro network of Thessaloniki, Greece, through the use of field
investigations, around the station-s predefined location. Moreover,
except from the analytical land use recording, a sampling
questionnaire survey is addressed to several selected enterprises of
the study area. The survey aims to specify the characteristics of the
enterprises, the trip patterns of their employees and clients, as well as
the stated preferences towards the changes the new metro station is
considered to bring to the area. The interpretation of the interrelationships
among selected data from the questionnaire survey takes
place using the method of Principal Components Analysis for
Categorical Data. The followed methodology and the survey-s results
contribute to the enrichment of the relevant bibliography concerning
the way the creation of a new metro station can have an impact on the
land use pattern of an area, by examining the situation before the
operation of the station.
Abstract: Inorganic nanoparticles filled polymer composites
have extended their multiple functionalities to various applications,
including mechanical reinforcement, gas barrier, dimensional
stability, heat distortion temperature, flame-retardant, and thermal
conductivity. Sodium stearate-modified calcium carbonate (CaCO3)
nanoparticles were prepared using surface modification method. The
results showed that sodium stearate attached to the surface of CaCO3
nanoparticles with the chemical bond. The effect of modified CaCO3
nanoparticles on thermal properties of polypropylene (PP) was
studied by means of differential scanning calorimetry (DSC) and
Thermogravimetric analysis (TGA). It was found that CaCO3
significantly affected the crystallization temperature and
crystallization degree of PP. Effect of the modified CaCO3 content on
mechanical properties of PP/CaCO3 nanocomposites was also
studied. The results showed that the modified CaCO3 can effectively
improve the mechanical properties of PP. In comparison with PP, the
impact strength of PP/CaCO3 nanocomposites increased by about
65% and the hardness increased by about 5%.
Abstract: Knowledge development in companies relies on
knowledge-intensive business processes, which are characterized by
a high complexity in their execution, weak structuring,
communication-oriented tasks and high decision autonomy, and often the need for creativity and innovation. A foundation of knowledge development is provided, which is based on a new conception of
knowledge and knowledge dynamics. This conception consists of a three-dimensional model of knowledge with types, kinds and qualities. Built on this knowledge conception, knowledge dynamics is
modeled with the help of general knowledge conversions between
knowledge assets. Here knowledge dynamics is understood to cover
all of acquisition, conversion, transfer, development and usage of
knowledge. Through this conception we gain a sound basis for
knowledge management and development in an enterprise. Especially
the type dimension of knowledge, which categorizes it according to
its internality and externality with respect to the human being, is crucial for enterprise knowledge management and development,
because knowledge should be made available by converting it to
more external types.
Built on this conception, a modeling approach for knowledgeintensive
business processes is introduced, be it human-driven,e-driven or task-driven processes. As an example for this approach, a model of the creative activity for the renewal planning of
a product is given.
Abstract: Let (U;D) be a Gr-covering approximation space
(U; C) with covering lower approximation operator D and covering
upper approximation operator D. For a subset X of U, this paper
investigates the following three conditions: (1) X is a definable subset
of (U;D); (2) X is an inner definable subset of (U;D); (3) X is an
outer definable subset of (U;D). It is proved that if one of the above
three conditions holds, then the others hold. These results give a
positive answer of an open problem for definable subsets of covering
approximation spaces.
Abstract: Concrete strength evaluated from compression tests
on cores is affected by several factors causing differences from the
in-situ strength at the location from which the core specimen was
extracted. Among the factors, there is the damage possibly occurring
during the drilling phase that generally leads to underestimate the
actual in-situ strength. In order to quantify this effect, in this study
two wide datasets have been examined, including: (i) about 500 core
specimens extracted from Reinforced Concrete existing structures,
and (ii) about 600 cube specimens taken during the construction of
new structures in the framework of routine acceptance control. The
two experimental datasets have been compared in terms of
compression strength and specific weight values, accounting for the
main factors affecting a concrete property, that is type and amount of
cement, aggregates' grading, type and maximum size of aggregates,
water/cement ratio, placing and curing modality, concrete age. The
results show that the magnitude of the strength reduction due to
drilling damage is strongly affected by the actual properties of
concrete, being inversely proportional to its strength. Therefore, the
application of a single value of the correction coefficient, as generally
suggested in the technical literature and in structural codes, appears
inappropriate. A set of values of the drilling damage coefficient is
suggested as a function of the strength obtained from compressive
tests on cores.
Abstract: Let X be a connected space, X be a space, let p : X -→ X be a continuous map and let (X, p) be a covering space of X. In the first section we give some preliminaries from covering spaces and their automorphism groups. In the second section we derive some algebraic properties of both universal and regular covering spaces (X, p) of X and also their automorphism groups A(X, p).
Abstract: The purpose of this study was to analyze the correlation
between permitted building areas and housing distribution ratios and
their fluctuation, and test a distribution model during 3 successive governments in 5 cities including Bucheon in reference to the time
series administrative data, and thereby, interpret the results of the analysis in association with the policies pursued by the successive
governments to examine the structural fluctuation of permitted building areas and housing distribution ratios.
In order to analyze the fluctuation of permitted building areas and
housing distribution ratios during 3 successive governments and
examine the cycles of the time series data, the spectral analysis was performed, and in order to analyze the correlation between permitted
building areas and housing distribution ratios, the tabulation was performed to describe the correlations statistically, and in order to
explain about differences of fluctuation distribution of permitted building areas and housing distribution ratios among 3 governments,
the goodness of fit test was conducted.