Abstract: Mining sequential patterns from large customer transaction databases has been recognized as a key research topic in database systems. However, the previous works more focused on mining sequential patterns at a single concept level. In this study, we introduced concept hierarchies into this problem and present several algorithms for discovering multiple-level sequential patterns based on the hierarchies. An experiment was conducted to assess the performance of the proposed algorithms. The performances of the algorithms were measured by the relative time spent on completing the mining tasks on two different datasets. The experimental results showed that the performance depends on the characteristics of the datasets and the pre-defined threshold of minimal support for each level of the concept hierarchy. Based on the experimental results, some suggestions were also given for how to select appropriate algorithm for a certain datasets.
Abstract: Information sharing and exchange, rather than
information processing, is what characterizes information
technology in the 21st century. Ontologies, as shared common
understanding, gain increasing attention, as they appear as the
most promising solution to enable information sharing both at
a semantic level and in a machine-processable way. Domain
Ontology-based modeling has been exploited to provide
shareability and information exchange among diversified,
heterogeneous applications of enterprises.
Contextual ontologies are “an explicit specification of
contextual conceptualization". That is: ontology is
characterized by concepts that have multiple representations
and they may exist in several contexts. Hence, contextual
ontologies are a set of concepts and relationships, which are
seen from different perspectives. Contextualization is to allow
for ontologies to be partitioned according to their contexts.
The need for contextual ontologies in enterprise modeling
has become crucial due to the nature of today's competitive
market. Information resources in enterprise is distributed and
diversified and is in need to be shared and communicated
locally through the intranet and globally though the internet.
This paper discusses the roles that ontologies play in an
enterprise modeling, and how ontologies assist in building a
conceptual model in order to provide communicative and
interoperable information systems. The issue of enterprise
modeling based on contextual domain ontology is also
investigated, and a framework is proposed for an enterprise
model that consists of various applications.
Abstract: There have been different approaches to compute the
analytic instantaneous frequency with a variety of background reasoning
and applicability in practice, as well as restrictions. This paper presents an adaptive Fourier decomposition and (α-counting) based
instantaneous frequency computation approach. The adaptive Fourier
decomposition is a recently proposed new signal decomposition
approach. The instantaneous frequency can be computed through the so called mono-components decomposed by it. Due to the fast energy
convergency, the highest frequency of the signal will be discarded by the adaptive Fourier decomposition, which represents the noise of
the signal in most of the situation. A new instantaneous frequency
definition for a large class of so-called simple waves is also proposed
in this paper. Simple wave contains a wide range of signals for which
the concept instantaneous frequency has a perfect physical sense.
The α-counting instantaneous frequency can be used to compute the highest frequency for a signal. Combination of these two approaches one can obtain the IFs of the whole signal. An experiment is demonstrated the computation procedure with promising results.
Abstract: The group mutual exclusion (GME) problem is a
variant of the mutual exclusion problem. In the present paper a
token-based group mutual exclusion algorithm, capable of handling
transient faults, is proposed. The algorithm uses the concept of
dynamic request sets. A time out mechanism is used to detect the
token loss; also, a distributed scheme is used to regenerate the token.
The worst case message complexity of the algorithm is n+1. The
maximum concurrency and forum switch complexity of the
algorithm are n and min (n, m) respectively, where n is the number of
processes and m is the number of groups. The algorithm also satisfies
another desirable property called smooth admission. The scheme can
also be adapted to handle the extended group mutual exclusion
problem.
Abstract: This paper describes how the correct endian mode of
the TMS320C6713 DSK board can be identified. It also explains how
the TMS320C6713 DSK board can be used in the little endian and in
the big endian modes for assembly language programming in
particular and for signal processing in general. Similarly, it discusses
how crucially important it is for a user of the TMS320C6713 DSK
board to identify the mode of operation and then use it correctly
during the development stages of the assembly language
programming; otherwise, it will cause unnecessary confusion and
erroneous results as far as storing data into the memory and loading
data from the memory is concerned. Furthermore, it highlights and
strongly recommends to the users of the TMS320C6713 DSK board
to be aware of the availability and importance of various display
options in the Code Composer Studio (CCS) for correctly
interpreting and displaying the desired data in the memory. The
information presented in this paper will be of great importance and
interest to those practitioners and developers who wants to use the
TMS320C6713 DSK board for assembly language programming as
well as input-output signal processing manipulations. Finally,
examples that clearly illustrate the concept are presented.
Abstract: There are many debates now regarding undervalued
and overvalued currencies currently traded on the world financial
market. This paper contributes to these debates from a theoretical
point of view. We present the three most commonly used methods of
estimating the equilibrium real effective exchange rate (REER):
macroeconomic balance approach, external sustainability approach
and equilibrium real effective exchange rate approach in the reduced
form. Moreover, we discuss key concepts of the calculation of the
real exchange rate (RER) based on applied explanatory variables:
nominal exchange rates, terms of trade and tradable and non-tradable
goods. Last but not least, we discuss the three main driving forces
behind real exchange rates movements which include terms of trade,
relative productivity growth and the interest rate differential.
Abstract: For any country the project management has been a
vital part for its development. The highly competitive business world
has created tremendous pressure on the project managers to achieve
success. The pressure is derived from survival and profit building in
business organizations which compels the project managers to pursue
unethical practices. As a result unethical activities in business
projects can be found easily where situations or issues arise due to
dubious business practice, high corruption, or absolute violation of
the law. The recent spur on Commonwealth games to be organized in
New Delhi indicates towards the same. It has been seen that the
project managers mainly focus on cost, time, and quality rather than
social impact and long term effects of the project. Surprisingly the
literature as well as the practitioner-s perspective also does not
identify the role of ethics in project success. This paper identifies
ethics as the fourth most important dimension in the project based
organizations. The paper predicts that the approach of considering
ethics will result in sustainability of the project. It will increase
satisfaction and loyalty of the customers as well as create harmony,
trust, brotherhood, values and morality among the team members.
This paper is conceptual in nature as inadequate literature exists
linking the project success with an ethical approach.
Abstract: In the past many uneconomic solutions for limitation
and interruption of short-circuit currents in low power applications
have been introduced, especially polymer switch based on the
positive temperature coefficient of resistance (PCTR) concept.
However there are many limitations in the active material, which
consists of conductive fillers. This paper presents a significantly
improved and simplified approach that replaces the existing current
limiters with faster switching elements. Its elegance lies in the
remarkable simplicity and low-cost processes of producing the device
using polyaniline (PANI) doped with methane-sulfonic acid (MSA).
Samples characterized as lying in the metallic and critical regimes of
metal insulator transition have been studied by means of electrical
performance in the voltage range from 1V to 5 V under different
environmental conditions. Moisture presence is shown to increase the
resistivity and also improved its current limiting performance.
Additionally, the device has also been studied for electrical resistivity
in the temperature range 77 K-300 K. The temperature dependence of
the electrical conductivity gives evidence for a transport mechanism
based on variable range hopping in three dimensions.
Abstract: This paper discusses a curriculum approach that will
give emphasis on practical portions of teaching network security
subjects in information and communication technology courses. As
we are well aware, the need to use a practice and application oriented
approach in education is paramount. Research on active learning and
cooperative groups have shown that students grasps more and have
more tendency towards obtaining and realizing soft skills like
leadership, communication and team work as opposed to the more
traditional theory and exam based teaching and learning. While this
teaching and learning paradigm is relatively new in Malaysia, it has
been practiced widely in the West. This paper examines a certain
approach whereby students learning wireless security are divided into
and work in small and manageable groups where there will be 2
teams which consist of black hat and white hat teams. The former
will try to find and expose vulnerabilities in a wireless network while
the latter will try their best to prevent such attacks on their wireless
networks using hardware, software, design and enforcement of
security policy and etc. This paper will try to show that the approach
taken plus the use of relevant and up to date software and hardware
and with suitable environment setting will hopefully expose students
to a more fruitful outcome in terms of understanding of concepts,
theories and their motivation to learn.
Abstract: In this paper the concept of Q-fuzzification of ideals of Γ-semigroups has been introduced and some important properties have been investigated. A characterization of regular Γ-semigroup in terms of Q-fuzzy ideals has been obtained. Operator semigroups of a Γ-semigroup has been made to work by obtaining various relationships between Q-fuzzy ideals of a Γ-semigroup and that of its operator semigroups.
Abstract: The utility of expert system generators has been
widely recognized in many applications. Several generators based on
concept of the paradigm object, have been recently proposed. The
generator of oriented object expert system (GSEOO) offers
languages that are often complex and difficult to use. We propose in
this paper an extension of the expert system generator, JESS, which
permits a friendly use of this expert system. The new tool, called
VISUAL JESS, bring two main improvements to JESS. The first
improvement concerns the easiness of its utilization while giving
back transparency to the syntax and semantic aspects of the JESS
programming language. The second improvement permits an easy
access and modification of the JESS knowledge basis. The
implementation of VISUAL JESS is made so that it is extensible and
portable.
Abstract: In films, visual effects have played the role of
expressing realities more realistically or describing imaginations as if
they are real. Such images are immediated images representing
realism, and the logic of immediation for the reality of images has
been perceived dominant in visual effects. In order for immediation to
have an identity as immediation, there should be the opposite concept
hypermediation.
In the mid 2000s, hypermediated images were settled as a code of
mass culture in Asia. Thus, among Asian films highly popular in those
days, this study selected five displaying hypermediated images – 2 Korean, 2 Japanese, and 1 Thailand movies – and examined the
semiotic meanings of such images using Roland Barthes- directional and implicated meaning analysis and Metz-s paradigmatic analysis
method, focusing on how hypermediated images work in the general
context of the films, how they are associated with spaces, and what
meanings they try to carry.
Abstract: Feeder is one of the airships of the Multibody Advanced Airship for Transport (MAAT) system, under development within the EU FP7 project. MAAT is based on a modular concept composed of two different parts that have the possibility to join; respectively they are the so-called Cruiser and Feeder, designed on the lighter than air principle. Feeder, also named ATEN (Airship Transport Elevator Network), is the smaller one which joins the bigger one, Cruiser, also named PTAH (Photovoltaic modular Transport Airship for High altitude),envisaged to happen at 15km altitude. During the MAAT design phase, the aerodynamic studies of the both airships and their interactions are analyzed. The objective of these studies is to understand the aerodynamic behavior of all the preselected configurations, as an important element in the overall MAAT system design. The most of these configurations are only simulated by CFD, while the most feasible one is experimentally analyzed in order to validate and thrust the CFD predictions. This paper presents the numerical and experimental investigation of the Feeder “conical like" shape configuration. The experiments are focused on the aerodynamic force coefficients and the pressure distribution over the Feeder outer surface, while the numerical simulation cover also the analysis of the velocity and pressure distribution. Finally, the wind tunnel experiment is compared with its CFD model in order to validate such specific simulations with respective experiments and to better understand the difference between the wind tunnel and in-flight circumstances.
Abstract: In the present work, an attempt is made to understand
electromagnetic field confinement in a subwavelength waveguide
structure using concepts of quantum mechanics. Evanescent field in
the waveguide is looked as inability of the photon to get confined in
the waveguide core and uncertainty of position is assigned to it. The
momentum uncertainty is calculated from position uncertainty.
Schrödinger wave equation for the photon is written by incorporating
position-momentum uncertainty. The equation is solved and field
distribution in the waveguide is obtained. The field distribution and
power confinement is compared with conventional waveguide theory.
They were found in good agreement with each other.
Abstract: This paper describes a methodology for remote
performance monitoring of retail refrigeration systems. The proposed
framework starts with monitoring of the whole refrigeration circuit
which allows detecting deviations from expected behavior caused by
various faults and degradations. The subsequent diagnostics methods
drill down deeper in the equipment hierarchy to more specifically
determine root causes. An important feature of the proposed concept
is that it does not require any additional sensors, and thus, the
performance monitoring solution can be deployed at a low
installation cost. Moreover only a minimum of contextual
information is required, which also substantially reduces time and
cost of the deployment process.
Abstract: Sustainable development is one of the most debated
issues, recently. In terms of providing more livable Earth continuity,
while Production activities are going on, on the other hand protecting
the environment has importance. As a strategy for sustainable
development, eco-innovation is the application of innovations to
reduce environmental burdens. Endeavors to understand ecoinnovation
processes have been affected from environmental
economics and innovation economics from neoclassical economics,
and evolutionary economics other than neoclassical economics. In
the light of case study analyses, this study aims to display activities
in this field through case studies after explaining the theoretical
framework of eco-innovations. This study consists of five sections
including introduction and conclusion. In the second part of the study
identifications of the concepts related with eco-innovation are
described and eco-innovations are classified. Third section considers
neoclassical and evolutionary approaches from neoclassical
economics and evolutionary economics, respectively. Fourth section
gives the case studies of successful eco-innovations. Last section is
the conclusion part and offers suggestions for future eco-innovation
research according to the theoretical framework and the case studies.
Abstract: In this paper, the concepts of dichotomous logistic
regression (DLR) with leave-one-out (L-O-O) were discussed. To
illustrate this, the L-O-O was run to determine the importance of the
simulation conditions for robust test of spread procedures with good
Type I error rates. The resultant model was then evaluated. The
discussions included 1) assessment of the accuracy of the model, and
2) parameter estimates. These were presented and illustrated by
modeling the relationship between the dichotomous dependent
variable (Type I error rates) with a set of independent variables (the
simulation conditions). The base SAS software containing PROC
LOGISTIC and DATA step functions can be making used to do the
DLR analysis.
Abstract: This paper proposes the stochastic tabu search (STS)
for improving the measurement scheme for power system state
estimation. If the original measured scheme is not observable, the
additional measurements with minimum number of measurements are
added into the system by STS so that there is no critical measurement
pair. The random bit flipping and bit exchanging perturbations are
used for generating the neighborhood solutions in STS. The Pδ
observable concept is used to determine the network observability.
Test results of 10 bus, IEEE 14 and 30 bus systems are shown that
STS can improve the original measured scheme to be observable
without critical measurement pair. Moreover, the results of STS are
superior to deterministic tabu search (DTS) in terms of the best
solution hit.
Abstract: This paper examines the concept of simulation from
a modelling viewpoint. How can one Mealy machine simulate the other one? We create formalism for simulation of Mealy machines.
The injective s–morphism of the machine semigroups induces the simulation of machines [1]. We present the example of s–morphism
such that it is not a homomorphism of semigroups. The story for the
surjective s–morphisms is quite different. These are homomorphisms
of semigroups but there exists the surjective s–morphism such that it does not induce the simulation.
Abstract: The Economic factors are leading to the rise of
infrastructures provides software and computing facilities as a
service, known as cloud services or cloud computing. Cloud services
can provide efficiencies for application providers, both by limiting
up-front capital expenses, and by reducing the cost of ownership over
time. Such services are made available in a data center, using shared
commodity hardware for computation and storage. There is a varied
set of cloud services available today, including application services
(salesforce.com), storage services (Amazon S3), compute services
(Google App Engine, Amazon EC2) and data services (Amazon
SimpleDB, Microsoft SQL Server Data Services, Google-s Data
store). These services represent a variety of reformations of data
management architectures, and more are on the horizon.