Abstract: This paper attempts to discuss the evolution of the
retrieval techniques focusing on development, challenges and trends
of the image retrieval. It highlights both the already addressed and
outstanding issues. The explosive growth of image data leads to the
need of research and development of Image Retrieval. However,
Image retrieval researches are moving from keyword, to low level
features and to semantic features. Drive towards semantic features is
due to the problem of the keywords which can be very subjective and
time consuming while low level features cannot always describe high
level concepts in the users- mind.
Abstract: In this article, a formal specification and verification of the Rabin public-key scheme in a formal proof system is presented. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. A major objective of this article is the presentation of the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Moreover, we explicate a (computer-proven) formalization of correctness as well as a computer verification of security properties using a straight-forward computation model in Isabelle/HOL. The analysis uses a given database to prove formal properties of our implemented functions with computer support. The main task in designing a practical formalization of correctness as well as efficient computer proofs of security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as efficient formal proofs. Consequently, we get reliable proofs with a minimal error rate augmenting the used database, what provides a formal basis for more computer proof constructions in this area.
Abstract: There has been a growing emphasis in
communication management from simple coordination of
promotional tools to a complex strategic process. This study will
examine the current marketing communications and engagement
strategies used in addressing the key stakeholders. In the case of
fertilizer industry in Malaysia, there has been little empirical
research on stakeholder communication when major challenges
facing the modern corporation is the need to communicate its
identity, its values and products in order to distinguish itself from
competitors. The study will employ both quantitative and qualitative
methods and the use of Structural Equation Modeling (SEM) to
establish a causal relationship amongst the key factors of stakeholder
communication strategies and increment in consumers-
choice/acceptance and impact on financial performance. One of the
major contributions is a conceptual framework for communication
strategies and engagement in increasing consumers- acceptance level
and the firm-s financial performance.
Abstract: Full - Scale Accelerated Loading System, one part of
“the Eleventh - Five - Year National Grand Technology Infrastructure
Program" is a facility to evaluate the performance and service life of
different kinds of pavements subjected to traffic loading under full -
controlled environment. While simulating the environments of frigid
zone and permafrost zone, the accurate control of air temperature, road
temperature and roadbed temperature are the key points and also
aporias for the designment. In this paper, numerical simulations are
used to determine the design parameters of the frozen soil simulation
system. At first, a brief introduction of the Full - Scale Accelerate
Loading System was given. Then, the temperature control method of
frozen soil simulation system was proposed. Finally, by using finite
element simulations, the optimal design of frozen soil simulation
system was obtained. This proposed design, which was obtained by
finite element simulations, provided significant referents to the
ultimate design of the environment simulation system.
Abstract: Data hiding into text documents itself involves pretty
complexities due to the nature of text documents. A robust text
watermarking scheme targeting an object based environment is
presented in this research. The heart of the proposed solution
describes the concept of watermarking an object based text document
where each and every text string is entertained as a separate object
having its own set of properties. Taking advantage of the z-ordering
of objects watermark is applied with the z-axis letting zero fidelity
disturbances to the text. Watermark sequence of bits generated
against user key is hashed with selected properties of given
document, to determine the bit sequence to embed. Bits are
embedded along z-axis and the document has no fidelity issues when
printed, scanned or photocopied.
Abstract: Ciprofloxacin (CIP) and Carbamazepine (CBZ), nonbiodegradable pharmaceutical residues, were become emerging pollutants in several aquatic environments. The objectives of this research were to study the possibility to recover these pharmaceuticals residues from pharmaceutical wastewater by increasing the selective adsorption on synthesized functionalized porous silicate, comparing with powdered activated carbon (PAC). Hexagonal mesoporous silicate (HMS), functionalized HMSs (3- aminopropyltriethoxy, 3- mercaptopropyltrimethoxy and noctyldimethyl) were synthesized and characterized physico-chemical characteristics. Obtained adsorption kinetics and isotherms showed that 3-mercaptopropyltrimethoxy functional groups grafted on HMS provided highest CIP and CBZ adsorption capacities; however, it was still lower than that of PAC. The kinetic results were compatible with pseudo-second order. The hydrophobicity and hydrogen bonding might play a key role on the adsorption. Furthermore, the capacities were affected by varying pH values due to the strength of hydrogen bonding between targeted compounds and adsorbents. Electrostatic interaction might not affect the adsorption capacities.
Abstract: In this paper, we introduce a novel platform
encryption method, which modify its keys and random number
generators step by step during encryption algorithms. According to
complexity of the proposed algorithm, it was safer than any other
method.
Abstract: A novel algorithm for construct a seamless video mosaic of the entire panorama continuously by automatically analyzing and managing feature points, including management of quantity and quality, from the sequence is presented. Since a video contains significant redundancy, so that not all consecutive video images are required to create a mosaic. Only some key images need to be selected. Meanwhile, feature-based methods for mosaicing rely on correction of feature points? correspondence deeply, and if the key images have large frame interval, the mosaic will often be interrupted by the scarcity of corresponding feature points. A unique character of the method is its ability to handle all the problems above in video mosaicing. Experiments have been performed under various conditions, the results show that our method could achieve fast and accurate video mosaic construction. Keywords?video mosaic, feature points management, homography estimation.
Abstract: Multi criteria decision analysis (MDCA) covers both
data and experience. It is very common to solve the problems with
many parameters and uncertainties. GIS supported solutions improve
and speed up the decision process. Weighted grading as a MDCA
method is employed for solving the geotechnical problems. In this
study, geotechnical parameters namely soil type; SPT (N) blow
number, shear wave velocity (Vs) and depth of underground water
level (DUWL) have been engaged in MDCA and GIS. In terms of
geotechnical aspects, the settlement suitability of the municipal area
was analyzed by the method. MDCA results were compatible with
the geotechnical observations and experience. The method can be
employed in geotechnical oriented microzoning studies if the criteria
are well evaluated.
Abstract: We propose a new perspective on speech
communication using blind source separation. The original speech is
mixed with key signals which consist of the mixing matrix, chaotic
signals and a random noise. However, parts of the keys (the mixing
matrix and the random noise) are not necessary in decryption. In
practice implement, one can encrypt the speech by changing the noise
signal every time. Hence, the present scheme obtains the advantages
of a One Time Pad encryption while avoiding its drawbacks in key
exchange. It is demonstrated that the proposed scheme is immune
against traditional attacks.
Abstract: In order to survive in a rapidly changing business environment, Malaysian business firms must improve their own business practices and procedures. This paper describes the impact of Critical Success Factors (CSFs) during the Enterprise Resource Planning (ERP) system implementations using the responses from 151 organizations that completed or are in the process of completing an ERP implementation and identifying the key benefits of ERP implementation in the firm. The importance of these factors was investigated within Malaysian companies using questionnaire survey method. Our results provide advice to management on how best to utilize their limited resources to choose those CSFs that are most likely to have an impact upon the implementation of the ERP system.
Abstract: This paper proposes a VPN Accelerator Board
(VPN-AB), a virtual private network (VPN) protocol designed for
trust channel security system (TCSS). TCSS supports safety
communication channel between security nodes in internet. It
furnishes authentication, confidentiality, integrity, and access control
to security node to transmit data packets with IPsec protocol. TCSS
consists of internet key exchange block, security association block,
and IPsec engine block. The internet key exchange block negotiates
crypto algorithm and key used in IPsec engine block. Security
Association blocks setting-up and manages security association
information. IPsec engine block treats IPsec packets and consists of
networking functions for communication. The IPsec engine block
should be embodied by H/W and in-line mode transaction for high
speed IPsec processing. Our VPN-AB is implemented with high speed
security processor that supports many cryptographic algorithms and
in-line mode. We evaluate a small TCSS communication environment,
and measure a performance of VPN-AB in the environment. The
experiment results show that VPN-AB gets a performance throughput
of maximum 15.645Gbps when we set the IPsec protocol with
3DES-HMAC-MD5 tunnel mode.
Abstract: One of the most important parts of a cement factory is
the cement rotary kiln which plays a key role in quality and quantity of produced cement. In this part, the physical exertion and bilateral
movement of air and materials, together with chemical reactions take
place. Thus, this system has immensely complex and nonlinear dynamic equations. These equations have not worked out yet. Only
in exceptional case; however, a large number of the involved parameter were crossed out and an approximation model was
presented instead. This issue caused many problems for designing a
cement rotary kiln controller. In this paper, we presented nonlinear predictor and simulator models for a real cement rotary kiln by using
nonlinear identification technique on the Locally Linear Neuro-
Fuzzy (LLNF) model. For the first time, a simulator model as well as
a predictor one with a precise fifteen minute prediction horizon for a
cement rotary kiln is presented. These models are trained by
LOLIMOT algorithm which is an incremental tree-structure
algorithm. At the end, the characteristics of these models are expressed. Furthermore, we presented the pros and cons of these
models. The data collected from White Saveh Cement Company is used for modeling.
Abstract: Clustering algorithms are attractive for the task of class identification in spatial databases. However, the application to large spatial databases rises the following requirements for clustering algorithms: minimal requirements of domain knowledge to determine the input parameters, discovery of clusters with arbitrary shape and good efficiency on large databases. The well-known clustering algorithms offer no solution to the combination of these requirements. In this paper, a density based clustering algorithm (DCBRD) is presented, relying on a knowledge acquired from the data by dividing the data space into overlapped regions. The proposed algorithm discovers arbitrary shaped clusters, requires no input parameters and uses the same definitions of DBSCAN algorithm. We performed an experimental evaluation of the effectiveness and efficiency of it, and compared this results with that of DBSCAN. The results of our experiments demonstrate that the proposed algorithm is significantly efficient in discovering clusters of arbitrary shape and size.
Abstract: Global competitiveness has recently become the
biggest concern of both manufacturing and service companies.
Electronic commerce, as a key technology enables the firms to reach
all the potential consumers from all over the world. In this study, we
have presented commonly used electronic payment systems, and then
we have shown the evaluation of these systems in respect to different
criteria. The payment systems which are included in this research are
the credit card, the virtual credit card, the electronic money, the
mobile payment, the credit transfer and the debit instruments. We
have realized a systematic comparison of these systems in respect to
three main criteria: Technical, economical and social. We have
conducted a fuzzy multi-criteria decision making procedure to deal
with the multi-attribute nature of the problem. The subjectiveness
and imprecision of the evaluation process are modeled using
triangular fuzzy numbers.
Abstract: Emerging adulthood, the new period which is
especially prevalent in the developed or industrialized countries
during ages 18 to 29, is a new conceptualization proposed by Arnett.
Intimacy is a superordinate concept which includes intimate
interaction and intimate relationship. This study includes two
proceses which are scale development and conduction of gender
differences about markers of starting romantic intimacy among
Turkish emerging adults. In first process, Markers of Starting
Romantic Intimacy Scale, with 17 items and 5 factors, was developed
using by 220 participants. In the second step, the scale was
administered to 318 Turkish male and female emerging adults
between ages 22 and 25. Results show that there is no significant
difference between gender and total score of the scale. With respect
to gender, there are significant differences between gender and in
four subscales which are self perception, affective and cognitive
intimacy, self knowledge and romantic verbalizations. Moreover,
there is no significant relationship between gender and behavioral
intimacy subscale.
Abstract: As a matter of the fact that online social networks like
Twitter, Facebook and MySpace have experienced an extensive
growth in recent years. Social media offers individuals with a tool for
communicating and interacting with one another. These social
networks enable people to stay in touch with other people and
express themselves. This process makes the users of online social
networks active creators of content rather than being only consumers
of traditional media. That’s why millions of people show strong
desire to learn the methods and tools of digital content production
and necessary communication skills. However, the booming interest
in communication and interaction through online social networks and
high level of eagerness to invent and implement the ways to
participate in content production raise some privacy and security
concerns.
This presentation aims to open the assumed revolutionary,
democratic and liberating nature of the online social media up for
discussion by reviewing some recent political developments in
Turkey. Firstly, the role of Internet and online social networks in
mobilizing collective movements through social interactions and
communications will be questioned. Secondly, some cases from Gezi
and Okmeydanı Protests and also December 17-25 period will be
presented in order to illustrate misinformation and manipulation in
social media and violation of individual privacy through online social
networks in order to damage social unity and stability contradictory
to democratic nature of online social networking.
Abstract: This article is dedicated to the question of regionalism
and regionalization in contemporary international relations, with a
specific focus on Central Asia. The article addresses the question of
whether or not Central Asia can be referred to as a true geopolitical
region. In addressing this question, the authors examine particular
factors that are essential for the formation of a region, including those
tied to the economy, energy, culture, and labor migration.
Abstract: Competitive relationships among Bradyrhizobium
japonicum USDA serogroup 123, 122 and 138 were screened versus
the standard commercial soybean variety Williams and two
introductions P1 377578 "671" in a field trial. Displacement of strain
123 by an effective strain should improved N2 fixation. Root nodules
were collected and strain occupancy percentage was determined
using strain specific fluorescent antibodies technique. As anticipated
the strain USDA 123 dominated 92% of nodules due to the high
affinity between the host and the symbiont. This dominance was
consistent and not changed materially either by inoculation practice
or by introducing new strainan. The interrelationship between the
genotype Williams and serogroup 122 & 138 was found very weak
although the cell density of the strain in the rhizosphere area was
equal. On the other hand, the nodule occupancy of genotypes 671 and
166 with rhizobia serogroup 123 was almost diminished to zero. .
The data further exhibited that the genotypes P1 671 and P1 166 have
high affinity to colonize with strains 122 and 138 whereas Williams
was highly promiscuous to strain 123.
Abstract: Product Data Management (PDM) systems for Computer
Aided Design (CAD) file management are widely established
in design processes. This management system is indispensable for
design collaboration or when design task distribution is present. It is
thus surprising that engineering design curricula has not paid much
attention in the education of PDM systems. This is also the case
for eduction of ecodesign and environmental evaluation of products.
With the rise of sustainability as a strategic aspect in companies,
environmental concerns are becoming a key issue in design. This
paper discusses the establishment of a PDM platform to be used
among technical and vocational schools in Austria. The PDM system
facilitates design collaboration among these schools. Further, it will
be discussed how the PDM system has been prepared in order to
facilitate environmental evaluation of parts, components and subassemblies
of a product. By integrating a Business Intelligence
solution, environmental Life Cycle Assessment and communication
of results is enabled.