Sunday, 31 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 29-281
Full Name: Maniam Kaliannan
Position: Senior Lecturer
Age: ON
Sex: Male
Address: Universiti Teknologi MARA
Country: MALAYSIA
Tel: 603 5544 4149
Tel prefix: 603
Fax: 603 55444131
E-mail address: maniam@salam.uitm.edu.my
Other E-mails: maniam_sai@yahoo.com
Title of the Paper: ICT in the Public Service Delivery - The Malaysian Perspective
Authors as they appear in the Paper: Maniam Kaliannan, Murali Raman, Magiswary Dorasamy
Email addresses of all the authors: maniam@salam.uitm.edu.my,murali.raman@mmu.edu.my,magiswary.dorasamy@mmu.edu.my
Number of paper pages: 14
Abstract: This paper examines the implementation of various e-Government projects in Malaysia since it was launched in 1996. The paper will discusses the challenges and issues related to these projects and suggest some recommendations as improvement tool to uplift the e-Government program to greater heights. Essentially our findings suggests that apart from technical considerations, the true value potential of ICT utilization in the context of public sector delivery in Malaysia is contingent upon several factor spanning across legislative, procedural, managerial and organizational imperatives.
Keywords: ICT, e-Government, MSC Malaysia
EXTENSION of the file: .doc
Special (Invited) Session: Use of ICT in the Public Service Delivery- The Malaysian Experience
Organizer of the Session: 620-116
How Did you learn about congress:
IP ADDRESS: 203.106.67.249

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON ELECTRONICS
Transactions ID Number: 29-279
Full Name: Yandra Rajasree
Position: Professor
Age: ON
Sex: Female
Address: HIG 315,Phase 1, BHEL Toenship, R.C.Puram,Hyderabad
Country: INDIA
Tel: 040 23027813
Tel prefix: 91
Fax: 91 040 23027813
E-mail address: rajasreey@yahoo.com
Other E-mails: ynmtitanium@yahoo.com
Title of the Paper: Methodical self checking and test infrastructure design for fault tolerance in digital circuits
Authors as they appear in the Paper: Rajasree Yandra , Y.Vishnu Priya , N.R.Alamelu
Email addresses of all the authors: rajasreey@yahoo.com, yandra_priya@gmail.com,nra@vinayakamissions.com
Number of paper pages: 10
Abstract: During the process of development of any system, system reliability is of utmost importance .Specially when designing a processor, it is desired that a processor function correctly even in the presence of faults .This concept is commonly referred to as fault tolerance. The fault tolerant microprocessor systems used in safety critical applications need to be thoroughly validated during the design stages. As feature size reduces in future, there is an increased probability of transient and intermittent faults. Transient faults can only detected by online detection or concurrent checking and not by testing . Because of continuously shrinking dimensions and voltage levels in near future transient faults will be a major source of errors. Therefore concurrent checking is becoming all the more important and necessary. Now these systems on chip integrated circuits contain both digital and analog cores. Test cost for such mixed signal SOC is much higher than the digital SO!
C that allows the analog and digital cores to be tested. The analog cores are wrapped such that the test can performed using a digital test access mechanism .In our method , an analog test infrastructure is used which consists of test wrappers and test access mechanism. Test wrappers isolate various modules from their surrounding circuitry during test .So the focus is on optimisation of a unified test access architecture that is used for digital and analogue cores. We wrap each analog core by a pair of digital to analog converter and analog to digital converter .They convert analog core to virtual digital core which allow the use of digital testers to test the analog cores. This reduces the need for expensive mixed signal tester so that there is a reduction in the overall cost. The work demonstrates an implementation of a design methodology for embedding fault tolerant capabilities into high level digital system design.
Keywords: Fault, multiplier, adder, wrapper, carry, ADC, synthesis, sampling
EXTENSION of the file: .doc
Special (Invited) Session: Self checking and fault tolerant digital design
Organizer of the Session: 612-197R
How Did you learn about congress: Dr.S.K.Srivatsa sksrivatsa@yahoo.com
IP ADDRESS: 115.241.48.209

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 32-523
Full Name: Surraya Khanum
Position: Student
Age: ON
Sex: Female
Address: h-no 174/b dehri hassanabad Rawalpindi
Country: PAKISTAN
Tel: 03325417194
Tel prefix: +92-51-5563207
Fax:
E-mail address: s_delhvi@yahoo.ca
Other E-mails: manilasani@yahoo.com
Title of the Paper: "Energy-Efficient Intrusion Detection System for Wireless Sensor Networks Based on MUSK Architecture"
Authors as they appear in the Paper: Surraya Khanum, Muhmmad Usman
Email addresses of all the authors: s_delhvi@yahoo.ca, manilasani@yahoo.com
Number of paper pages: 10
Abstract: Wireless Sensor Networks (WSN) are usually deployed in a hostile and uncontrollable environment so it is easily become vulnerable to different types of security threats. Abundance of security techniques have been proposed to make WSN secure like encryptions keys, VPN, firewalls but all of them are static in nature and not energy efficient. They provide security from the external attacks only. The system is security vulnerable if the node inside the network is under attack. Additionally due to sever resource constrain in WSN, it is not appropriate to use the above mentioned security mechanisms. There is a need for dynamic, real time and energy efficient security mechanism for WSN. Intrusion detection system (IDS) helps in detecting the intrusion in real time so that appropriate action can be taken timely. In this paper we have proposed energy efficient framework using IDS for WSN that not only minimizes the security control communication load over the network but al!
so eliminates the need for writing the signature manually.
Keywords: Wireless Sensor Networks, Intrusion Detection System, Energy-Efficient agent architecture, CH, BS
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 59.103.26.83

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS
Transactions ID Number: 29-278
Full Name: Davorin Kralj
Position: Ph.D. Candidate
Age: ON
Sex: Male
Address: Na gricu 47, SI - 2000 Maribor
Country: SLOVENIA
Tel: 00 386 41 705 173
Tel prefix: 00 386
Fax: 00 386 2 613 6090
E-mail address: davorin.kralj@amis.net
Other E-mails: davorin.kralj@fm-kp.si
Title of the Paper: Green Environmental Business
Authors as they appear in the Paper: Davorin Kralj
Email addresses of all the authors: davorin.kralj@amis.net
Number of paper pages: 10
Abstract: The process of market globalization has lead to many changes. Corporate responsibility now extends to encompass not only the needs of employees, but also the environment and society as a whole. The article focuses on green environmental business as a part of global marketing. Integrated marketing management integrates the requirements of sustainable green development and environmental excellence. The world is today facing unique environmental challenges. The idea that business has a responsibility other than producing goods and services is not new. Corporate responsibility now extends to encompass not only the needs of employees, but also the environment and society as a whole. As industry grows in strength and importance, it is also is being called upon to share the benefits of its growth with members of society. The article focuses on Sustainable Green Business as a way for sustainable development. PESTLE analysis is a useful tool for understanding the industry !
situation as a whole, and is often used in conjunction with a SWOT analysis to assess the situation of an individual business.
Keywords: business, environment, management, PESTLE analysis, sustainable development
EXTENSION of the file: .doc
Special (Invited) Session: Sustainable Green Business
Organizer of the Session: ID 612-338
How Did you learn about congress: anita.kovac@uni-mb.si
IP ADDRESS: 85.10.34.181

Saturday, 30 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 29-277
Full Name: Kapil Gwalani
Position: Student
Age: ON
Sex: Male
Address: 915, Laurel Avenue, Apt. W3E, Cookeville, TN.
Country: UNITED STATES
Tel:
Tel prefix:
Fax:
E-mail address: kagwalani21@tntech.edu
Other E-mails: OElkeelany@tntech.edu
Title of the Paper: Design and Evaluation of FPGA Based Hardware Accelerator for Elliptic Curve Cryptography Scalar Multiplication
Authors as they appear in the Paper: Kapil A. Gwalani, Omar Elkeelany
Email addresses of all the authors: Kagwalani21@tntech.edu , OElkeelany@tntech.edu
Number of paper pages: 10
Abstract: Abstract: Embedded systems find applications in fields such as defense, communications, industrial automation and many more. For majority of these applications, security is a vital issue. Over the last decade, security has become the primary concern when discussing e-commerce. The rapid development in the field of information technology has led to the increase in need of techniques capable of providing security. Cryptography plays an important role in providing data security. Until recently, symmetric key encryption schemes were used for a majority of these applications. Now however, asymmetric key encryption schemes such as Elliptic curve cryptography are gaining popularity as they require less computational power and memory and are still capable of providing equivalent security when compared to their counterparts. Elliptic curve cryptography was first introduced in 1985 and has always been around since. Scalar or point multiplication in elliptic curve cryptograph!
y has been a topic of research interest. Improving the performance of scalar multiplication can improve the overall performance of elliptic curve cryptography. One popular method to improve scalar multiplication is by means of hardware accelerators. The authors of this paper have implemented scalar multiplication, the most time consuming operation in elliptic curve cryptography using binary non-adjacent form algorithm. The results of the software implementation have been presented in section- 4. Methodology to improve the performance of the scalar multiplication by use of hardware accelerators has also been presented in this paper.
Keywords: Binary Non Adjacent Form, ECC, Prime Field, System on Progrmmable Chip
EXTENSION of the file: .pdf
Special (Invited) Session: Design and Evaluation of Hardware Accelerator for Elliptic Curve Cryptography Point Multiplication
Organizer of the Session: 612-411
How Did you learn about congress:
IP ADDRESS: 149.149.206.203

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS
Transactions ID Number: 29-276
Full Name: Jun Liu
Position: Assistant Professor
Age: ON
Sex: Male
Address: 900 Monarch Cir, Statesboro, GA 30458
Country: UNITED STATES
Tel: 912-4785085
Tel prefix:
Fax:
E-mail address: jliu@georgiasouthern.edu
Other E-mails: junliu2004@gmail.com
Title of the Paper: Nonlinear Forecasting Using Nonparametric Transfer Function Models
Authors as they appear in the Paper: Jun M. Liu
Email addresses of all the authors: jliu@georgiasouthern.edu
Number of paper pages: 10
Abstract: The focus of this paper is using nonparametric transfer function models in forecasting. Nonparametric smoothing methods are used to model the relationship between variables (the transfer function) and the noise is modeled as an Autoregressive Moving Average (ARMA) process. The transfer function is estimated jointly with the ARMA parameters. Nonparametric smoothing methods are flexible thus can be used to model highly nonlinear relationships between variables. In this paper polynomial splines are used to model the transfer function. Modeling noise term as an ARMA process removes the serial correlation so the transfer function can be estimated efficiently. As a result, the nonparametric transfer function model can generate accurate forecasts when the transfer function is highly nonlinear with unknown functional form. The proposed polynomial splines-based estimator is also highly computationally efficient. The performance of nonparametric transfer function models is d!
emonstrated in this paper by forecasting river flow based on temperature and precipitation. A comparison of the results show that the performance of this model is better than some widely accepted benchmark models.
Keywords: Nonparametric smoothing, Time series, Forecast
EXTENSION of the file: .pdf
Special (Invited) Session: Nonlinear Time Series Modeling Using Spline-based Nonparametric Models
Organizer of the Session: 612-463
How Did you learn about congress:
IP ADDRESS: 64.139.242.125

Friday, 29 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL
Transactions ID Number: 29-275
Full Name: John Watkins
Position: Associate Professor
Age: ON
Sex: Male
Address: Department of Electrical Engineering and Computer Science, Wichita State University, 1845 Fairmount, Wichita, KS 67260-0083
Country: UNITED STATES
Tel: 316-978-6336
Tel prefix: 1
Fax: 316-978-3984
E-mail address: j.watkins@ieee.org
Other E-mails: john.watkins@wichita.edu
Title of the Paper: Robust Performance Characterization of PID Controllers in the Frequency Domain
Authors as they appear in the Paper: Tooran Emami, John M. Watkins
Email addresses of all the authors: txemami@wichita.edu,j.watkins@ieee.org
Number of paper pages: 11
Abstract: In this paper a method is introduced for finding all proportional integral derivative (PID) controllers that satisfy a robust performance constraint for a given single-input-single-output transfer function of any order with time-delay. This problem can be solved by finding all achievable PID controllers that simultaneously stabilize the closed-loop characteristic polynomial and satisfy constraints defined by a set of related complex polynomials. A key advantage of this procedure is that it only depends on the frequency response of the system and does not require the plant transfer function coefficients. If the plant transfer function is given, the procedure is still appropriate. The ability to include the time-delay in the nominal model of the system will often allow for designs with reduced conservativeness in the plant uncertainty and an increase in size of the set of all PID controllers that robustly meet the performance requirements.
Keywords: Robust performance, Frequency response, PID controllers, Robust control, and Time-delay
EXTENSION of the file: .pdf
Special (Invited) Session: Robust Performance Characterization of PID Controllers in the Frequency Domain
Organizer of the Session: 612-304R
How Did you learn about congress: Rich O'Brien (riobrien@usna.edu), George Piper (piper@usna.edu), John Boye (jboye@unl.edu), Julie Hurtig (jhurtig@ieee.org)
IP ADDRESS: 156.26.43.36

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL
Transactions ID Number: 29-274
Full Name: John Watkins
Position: Associate Professor
Age: ON
Sex: Male
Address: Department of Electrical Engineering and Computer Science, Wichita State University, 1845 Fairmount, Wichita, KS 67260-0083
Country: UNITED STATES
Tel: 316-978-6336
Tel prefix: 1
Fax: 316-978-3984
E-mail address: j.watkins@ieee.org
Other E-mails: john.watkins@wichita.edu
Title of the Paper: A Unified Approach for Sensitivity Design of PID Controllers in the Frequency Domain
Authors as they appear in the Paper: Tooran Emami, John M. Watkins
Email addresses of all the authors: txemami@wichita.edu,j.watkins@ieee.org
Number of paper pages: 11
Abstract: In this paper a graphical technique is introduced for finding all continuous-time and discrete-time proportional integral derivative (PID) controllers that satisfy an H-infinity sensitivity constraint of an arbitrary order transfer function with time delay. These problems can be solved by finding all achievable PID controllers that simultaneously stabilize the closed-loop characteristic polynomial and satisfy constraints defined by a set of related complex polynomials. A key advantage of this procedure is that it only depends on the frequency response of the system. The delta operator is used to describe the controllers, because it not only possesses numerical properties superior to the discrete-time shift operator, but also converges to the continuous-time controller as the sampling period approaches zero. A unified approach allows us to use the same procedure for discrete-time and continuous-time H-infinity sensitivity design of PID controllers.
Keywords: Sensitivity design, Frequency response, Delta domain, PID controllers, and Time delay
EXTENSION of the file: .pdf
Special (Invited) Session: A Unified Approach for Sensitivity Design of PID Controllers in the Frequency Domain
Organizer of the Session: 612-324R
How Did you learn about congress: Rich O'Brien (riobrien@usna.edu), George Piper (piper@usna.edu), John Boye (jboye@unl.edu), Julie Hurtig (jhurtig@ieee.org)
IP ADDRESS: 156.26.43.36

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 29-273
Full Name: Yung-fa Huang
Position: Professor
Age: ON
Sex: Male
Address: 168, Jifong E. Rd., Wufong Township, Taichung County
Country: TAIWAN
Tel: 4-23323000 ext 7241
Tel prefix: 886-
Fax:
E-mail address: yfahuang@cyut.edu.tw
Other E-mails: d4622102@ms53.hinet.net
Title of the Paper: Equalization of Energy Consumption at Cluster Head for Prolonging Lifetime in Cluster-based Wireless Sensor Networks
Authors as they appear in the Paper: Yung-fa Huang, Neng-chung Wang, Chin-ling Chen, Jong-Shin Chen, Zong-min Guo
Email addresses of all the authors: yfahuang@cyut.edu.tw, ncwang@nuu.edu.tw, clc@cyut.edu.tw, jschen26@cyut.edu.tw, ckljdstar@gmail.com
Number of paper pages: 10
Abstract: In cluster-based wireless sensor networks (WSN), the most of energy is consumed in cluster head which performs data aggregations and relaying. The lifetime in cluster-based WSN is subjected by the lifetime of cluster heads. Therefore, in this paper, we equalize the energy consumption of the cluster heads to prolong the lifetime of WSN. After equalization, we obtain the length of sides of cluster area. Numerical results show that the length of far site cluster is shorter than the nearest cluster to perform equalization for all three routing schemes. Moreover, simulation results show that the three-hop scheme can obtain the most energy efficiency than other two schemes.
Keywords: Wireless sensor network, Clustering, energy efficiency, Cluster head, Energy consumption equalization, Network lifetime.
EXTENSION of the file: .pdf
Special (Invited) Session: Equalization of Energy Consumption for Prolonging Lifetime in Cluster-based Wireless Sensor Networks
Organizer of the Session: 613-172
How Did you learn about congress:
IP ADDRESS: 220.140.106.181

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS
Transactions ID Number: 29-272
Full Name: Catalin Popescu
Position: Associate Professor
Age: ON
Sex: Male
Address: B.dul Republicii, 116, Ploiesti
Country: ROMANIA
Tel: 0040721547571
Tel prefix:
Fax: 0040244575847
E-mail address: catalin_nicolae@yahoo.com
Other E-mails: cpopescu@upg-ploiesti.ro
Title of the Paper: A managerial approach regarding the Romanian municipal bonds market in regional context
Authors as they appear in the Paper: Mirela Matei, Catalin Popescu, Mariana Eftimie
Email addresses of all the authors: mirematei@yahoo.com, catalin_nicolae@yahoo.com, maryeftimie@yahoo.com
Number of paper pages: 10
Abstract: The universe of bonds is huge because the innovative process is very intense. For this reason, the issuers have multiple choices in order to finance their activity and the investors have many possibilities to buy different types of bonds. In Romania, the offer of bonds is limited, the public securities being the most important type of bonds listed on exchange. The municipal bonds are new instruments used by many Romanian local authorities in order to finance their development's activity. These securities are important not only for issuers, but also for local and foreign investors. Many of these securities are traded on the official Romanian stock market - the Bucharest Stock Exchange. For many years, the municipal bonds were the only securities traded on the bonds market of the Bucharest Stock Exchange. In time, even if the dimensions of this market have grown, the share has decreased because new bonds are listed on official stock exchange: corporate bonds and trea!
sury bonds.
Keywords: bond, securities, municipalities, loan, interest rate, capital market, maturity
EXTENSION of the file: .doc
Special (Invited) Session: Municipal bonds – an instrument of financial management used by the Romanian authorities
Organizer of the Session: 612-314
How Did you learn about congress:
IP ADDRESS: 86.106.63.70

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS
Transactions ID Number: 32-522
Full Name: Yi-Hui Chiang
Position: Ph.D. Candidate
Age: ON
Sex: Female
Address: Institute of Management of Technology,National Chiao Tung University
Country: TAIWAN
Tel:
Tel prefix:
Fax:
E-mail address: yihui.mt94g@nctu.edu.tw
Other E-mails: lianlon.wu@msa.hinet.net
Title of the Paper: Does the Outward FDI Policy Matter? By using a combined PLS Path and MCDM approach on Taiwan Case
Authors as they appear in the Paper: Yi-Hui Chiang, Chih-Young Hung
Email addresses of all the authors: yihui.mt94g@nctu.edu.tw,cyhung@cc.nutu.edu.tw
Number of paper pages: 12
Abstract: Various studies studied outward foreign direct investment (FDI) from the host country perspective but pay little attention on the parent country determinant. Does the outward FDI policy (investment upper limit regulation) matter? In this paper, we for the first time propose a combined partial least squares (PLS) path model and multiple criteria decision-making (MCDM) approach to study Taiwan¡¦s outward FDI to China. The main purpose of this study is to investigate the determinants on Taiwanese firms¡¦ decisions in making FDI into China. Using data of the optoelectronics firms between 1998 and 2007, the results of the proposed model both show that the outward FDI policy of the parent country is the key factor on Taiwan¡¦s outward FDI into China. Besides, it is also found that the macroeconomic environment of host country determinant has much stronger effects than does the parent country on Taiwan¡¦s outward FDI into China.
Keywords: Foreign direct investment (FDI), Partial least squares (PLS), Multiple criteria decision-making (MCDM), Parent country, upper Limit regulation
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 114.41.50.181

Thursday, 28 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON ADVANCES IN ENGINEERING EDUCATION
Transactions ID Number: 29-271
Full Name: Catalin Popescu
Position: Associate Professor
Age: ON
Sex: Male
Address: 116, B.dul Republicii, bl.210, ap.4, Ploiesti
Country: ROMANIA
Tel: 0040721547571
Tel prefix:
Fax: 0040244575847
E-mail address: catalin_nicolae@yahoo.com
Other E-mails: cpopescu@upg-ploiesti.ro
Title of the Paper: Educational managerial capital and the logic of decentralization: a statistically – based analysis
Authors as they appear in the Paper: Ioan Neacsu, Mihaela Suditu, Catalin Popescu
Email addresses of all the authors: neacsuioan2008@yahoo.ro, msuditu@upg-ploiesti.ro, catalin_nicolae@yahoo.com
Number of paper pages: 10
Abstract: The present study examines the confrontation between the rigor and the flexibility of the school manager when dealing with the needs of the actual troubled context, generated by issues like: hasty decentralization, the illusion of the social participation, economic and financial recession, poorly motivating wages. The answers offered by the authors aim at the stimulation of the field of managerial tactics centred/ based on the increase of the quality of the processes and curricula for the initial and continuous formation, of the decisional style, of the power of the professional action and display, based on competences, values and intelligent projects.
Keywords: Critical context, Efficient style, Professional motivation, Performing curricula, Statistically – based analysis
EXTENSION of the file: .doc
Special (Invited) Session: The schoolmaster of tomorrow in Romania: challenges, answers, expectations
Organizer of the Session: 612-198
How Did you learn about congress:
IP ADDRESS: 86.106.63.70

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON ENVIRONMENT AND DEVELOPMENT
Transactions ID Number: 32-521
Full Name: Bechan Sharma
Position: Professor
Age: ON
Sex: Male
Address: Department of Biochemistry, Faculty of Science, University of Allahabad, Allahabad-211002, India
Country: INDIA
Tel: +91-9415715639
Tel prefix:
Fax: +91-532-2461157
E-mail address: sharmabi@yahoo.com
Other E-mails: bechansharma@gmail.com
Title of the Paper: Water pollution with special reference to pesticides contamination in India
Authors as they appear in the Paper: ANJU AGRAWAL1, RAVI S. PANDEY2 and BECHAN SHARMA3#
Email addresses of all the authors: anjuaa@rediffmail.com, rspandey2004@yahoo.com, sharmabi@yahoo.com
Number of paper pages: 30
Abstract: Abstract:- The term pesticide covers a wide range of compounds including insecticides, fungicides, herbicides, rodenticides, molluscicides, nematocides, plant growth regulators and others. Pesticides are used to control weeds, pests and diseases in crops (including grassland). It is normal practice for several different pesticides to be applied to a single crop in any given growing season. Different farming practices require a range of pesticides. If the credits of pesticides include enhanced economic potential in terms of increased production of food and fiber, and amelioration of vector-borne diseases, then their debits have resulted in serious health implications to man and his environment. Despite ban on application, their continued and indiscriminate use is ever on rise. Pesticides are a serious hazard to living systems because of their fat solubility and rapid bioaccumulation in non-target organisms. At high dosages they not only kill insects and other invert!
ebrates, but birds, fish and mammals as well. At lower levels they inflict a range of serious sub lethal effects. The factors affecting water pollution with pesticides and their residues include drainage, rainfall, microbial activity, soil temperature, treatment surface, application rate as well as the solubility, mobility and half life of pesticides. In India organochlorine insecticides such as DDT and HCH constitute more than 70% of the pesticides used at present. Reports from Delhi, Bhopal and other cities and some rural areas have indicated presence of alarming level of pesticides in fresh water systems as well as bottled drinking mineral water samples .The effects of pesticides pollution in riverine systems and drinking water in India has been discussed in this review.
Keywords: pesticides, pollution, water, riverine systems, toxicity, management
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress: Central Library, University of Allahabad, Allahabad, India
IP ADDRESS: 200.143.208.14

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON ENVIRONMENT AND DEVELOPMENT
Transactions ID Number: 32-520
Full Name: Bechan Sharma
Position: Professor
Age: ON
Sex: Male
Address: Department of Biochemistry, Faculty of Science, University of Allahabad, Allahabad-211002, India
Country: INDIA
Tel: +91-9415715639
Tel prefix:
Fax: +91-532-2461157
E-mail address: sharmabi@yahoo.com
Other E-mails: bechansharma@gmail.com
Title of the Paper: Water pollution with special reference to pesticides contamination in India
Authors as they appear in the Paper: ANJU AGRAWAL1, RAVI S. PANDEY2 and BECHAN SHARMA3#
Email addresses of all the authors: anjuaa@rediffmail.com, rspandey2004@yahoo.com, sharmabi@yahoo.com
Number of paper pages: 30
Abstract: Abstract:- The term pesticide covers a wide range of compounds including insecticides, fungicides, herbicides, rodenticides, molluscicides, nematocides, plant growth regulators and others. Pesticides are used to control weeds, pests and diseases in crops (including grassland). It is normal practice for several different pesticides to be applied to a single crop in any given growing season. Different farming practices require a range of pesticides. If the credits of pesticides include enhanced economic potential in terms of increased production of food and fiber, and amelioration of vector-borne diseases, then their debits have resulted in serious health implications to man and his environment. Despite ban on application, their continued and indiscriminate use is ever on rise. Pesticides are a serious hazard to living systems because of their fat solubility and rapid bioaccumulation in non-target organisms. At high dosages they not only kill insects and other invert!
ebrates, but birds, fish and mammals as well. At lower levels they inflict a range of serious sub lethal effects. The factors affecting water pollution with pesticides and their residues include drainage, rainfall, microbial activity, soil temperature, treatment surface, application rate as well as the solubility, mobility and half life of pesticides. In India organochlorine insecticides such as DDT and HCH constitute more than 70% of the pesticides used at present. Reports from Delhi, Bhopal and other cities and some rural areas have indicated presence of alarming level of pesticides in fresh water systems as well as bottled drinking mineral water samples .The effects of pesticides pollution in riverine systems and drinking water in India has been discussed in this review.
Keywords: pesticides, pollution, water, riverine systems, toxicity, management
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress: Central Library, University of Allahabad, Allahabad, India
IP ADDRESS: 200.143.208.14

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS
Transactions ID Number: 29-270
Full Name: Hsi-Chin Hsin
Position: Professor
Age: ON
Sex: Male
Address: 1, Lien-Da, Miao-Li, 36003
Country: TAIWAN
Tel: +886-37-381100
Tel prefix:
Fax:
E-mail address: hsin@nuu.edu.tw
Other E-mails: hsichin@so-net.net.tw
Title of the Paper: Context-Based Rate Distortion Estimation and Its Application to Wavelet Image Coding
Authors as they appear in the Paper: Hsi-Chin Hsin, Tze-Yun Sung
Email addresses of all the authors: hsin@nuu.edu.tw,bobsung@chu.edu.tw
Number of paper pages: 10
Abstract: Embedded image coding in wavelet domain has drawn a lot of attention. Among noteworthy algorithms is the embedded block coding with optimized truncation (EBCOT) algorithm, which has been adopted by the JPEG2000 standard. EBCOT is a two-tier algorithm. Tier-1 is composed of bit-plane coding followed by entropy coding. Tier-2 performs the so-called post compression rate distortion optimization (PCRD), which requires a large memory space for storing all the code streams of code blocks; however, some code blocks of less importance might not be needed for the optimal decoded image at a bit rate. To avoid waste of computational power and memory space, a simple context based rate distortion estimation (CBRDE) is thus proposed to arrange the scanning order of code blocks in an adaptive manner. The CBRDE algorithm is based on the MQ table of JPEG2000, which is available at both encoder and decoder. As a result, there is no need to store and transmit the rate distortion info!
rmation of code blocks. Experimental results show that the rate distortion curves are almost convex; this demonstrates the potential of CBRDE for embedded wavelet image coding.
Keywords: Embedded image coding, Wavelet transform, JPEG2000; EBCOT; PCRD; CBRDE
EXTENSION of the file: .pdf
Special (Invited) Session: A Simple Rate Distortion Estimation for Embedded Block Coding
Organizer of the Session: 613-194
How Did you learn about congress: Ching-Chung Li (ccl@engr.pitt.edu),Mingui Sun(drsun@pitt.edu)
IP ADDRESS: 125.224.97.30

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 29-269
Full Name: Renata Myskova
Position: Associate Professor
Age: ON
Sex: Female
Address: University of Pardubice, Studentska 95, Pardubice
Country: CZECH REPUBLIC
Tel: +421466036512
Tel prefix:
Fax:
E-mail address: renata.myskova@upce.cz
Other E-mails: michal.kubenka@upce.cz
Title of the Paper: Company Information Systems Used in Decision-Making Processes of Financial Managers
Authors as they appear in the Paper: Renáta Myšková
Email addresses of all the authors: renata.myskova@upce.cz
Number of paper pages: 11
Abstract: Economists and IT experts share the opinion that IS/IT in a company should be in accordance with the company objectives and management strategies; they cannot be viewed separately. As far as the economic aspect is concerned, there exist certain criteria that could be considered social criteria because information system effectiveness, as well as the company effectiveness, depend on human factor. Reference literature identifies the work with information as a strategic factor of company's prosperity and competitiveness. An economic information system has recently been an inevitable prerequisite in a large or small enterprise. The requirements relating to such system can be characterized in the following way: competitive price, configurable and flexible system comprising all the basic and certain extra functions essential for information support to all the company operation. An integral part of the system is an information accounting system supporting financial accoun!
ting management. Accounting is the method in which financial information is gathered, processed, and summarized into financial statements and reports. Accounting records are important because the resulting financial statements and reports help plan and make decisions. These records may be used by company management and by third parties (bankers, investors, creditors, etc.). The accounting information system has to support managerial decisions and it has to work with external accounting modules and external database modules. Changing accounting software is a big undertaking. It may, and should, have an impact on almost everyone in the organization, on customers as well. Accounting Information Systems were scanned in the empirical research and financial managers assessed the situation in their company and their satisfaction with these systems.
Keywords: Economic information system, accounting information system, financial management
EXTENSION of the file: .doc
Special (Invited) Session: Satisfaction of Financial Managers with Accounting Information System
Organizer of the Session: 612-290.doc
How Did you learn about congress: Ilona Obrsalova ilona.obrsalova@upce.cz
IP ADDRESS: 195.113.124.6

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL
Transactions ID Number: 29-268
Full Name: Peyman Nazarian
Position: Researcher
Age: ON
Sex: Male
Address: No. 38 - Golestan 17 - Shahrak Ansarieh - Zanjan
Country: IRAN
Tel:
Tel prefix:
Fax:
E-mail address: pay_naz@yahoo.com
Other E-mails:
Title of the Paper: control of a radiative furnace under precise and uncertainty conditions
Authors as they appear in the Paper:
Email addresses of all the authors:
Number of paper pages: 10
Abstract: This paper discusses the control of a radiative furnace under precise and imprecise modeling. Regarding nonlinearity nature of the process, in the precise case, feedback linearization technique is applied to the furnace and under uncertainty conditions, sliding mode control is used. The conditions are completely practical and have gained from an industrial process.
Keywords: Feedback linearization – Radiation – Furnace – Uncertainty – Sliding mode control
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 213.217.44.166

Wednesday, 27 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS
Transactions ID Number: 29-267
Full Name: Catalin Popescu
Position: Associate Professor
Age: ON
Sex: Male
Address: 116 B.dul Republicii, bl.210, ap.4, Ploiesti
Country: ROMANIA
Tel: 0040721547571
Tel prefix:
Fax: 0040244575847
E-mail address: catalin_nicolae@yahoo.com
Other E-mails: cpopescu@upg-ploiesti.ro
Title of the Paper: Improvement's methodology, under uncertainty, of the management of a public transportation service
Authors as they appear in the Paper: Catalin Popescu, Tatiana Cucu, Luminita Ion, Yves Ducq, Augustin Mitu
Email addresses of all the authors: catalin_nicolae@yahoo.com, tatiana.cucu@eigsi.fr, luminita.ion@eigsi.fr, yves.ducq@ laps.u-bordeaux1.fr, augustin@amit.ro
Number of paper pages: 10
Abstract: To be attractive, a self-service public transportation (bicycles or cars) have to ensure to the subscribers a degree of availability without fault. Our work is focused in the development of a methodology to aid decision makers to ensure the balance between the stations, to test new locations for the car-sharing stations. This work proposes a hybrid method based on concepts resulting from fuzzy logic, optimization and the theory of the beliefs, making it possible to model the preferences of the subscribers and to determine the maximum utilization ratio of the stations. The manager of a car-sharing service can based on this step for better planning the activities of his team and to reduce the cost of unavailability and the exploitation. Performance indicators are defined for it and the optimization is based on the modelling of preferences of customers.
Keywords: car-sharing, grid GRAI, use rate of a service, customers' needs, fuzzy logic, uncertainty
EXTENSION of the file: .doc
Special (Invited) Session: Improvement of the management of a public transportation service
Organizer of the Session: 612-258
How Did you learn about congress:
IP ADDRESS: 86.106.63.70

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON MATHEMATICS
Transactions ID Number: 29-266
Full Name: Nikos Mastorakis
Position: Professor
Age: ON
Sex: Male
Address: WSEAS
Country: GREECE
Tel:
Tel prefix:
Fax:
E-mail address: mastor@wseas.org
Other E-mails:
Title of the Paper: Existence, Uniqueness and Finite Difference Solution for the Dirichlet problem of the Schrodinger-Maxwell equations
Authors as they appear in the Paper: Nikos E Mastorakis
Email addresses of all the authors: mastor@wseas.org
Number of paper pages: 10
Abstract: - In this paper, the existence, the Uniqueness and the Finite Difference Scheme for the Dirichlet problem of the Schrodinger-Maxwell equations is going to be presented.
Keywords: Schrodinger-Maxwell equations, Finite Difference, Finite Difference Schemes
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 79.131.22.186

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 32-519
Full Name: Chun-Cheng Lin
Position: Assistant Professor
Age: ON
Sex: Male
Address: No.35, Lane 215, Sec. 1, Jhongshan Rd., Taiping City, Taichung County 411
Country: TAIWAN
Tel: Tel:+886-4-2392-4505 ext 7238
Tel prefix:
Fax: Fax: :+886-4-2392-4419
E-mail address: cclin@ncut.edu.tw
Other E-mails:
Title of the Paper: texture defect detection system with image deflection compensation
Authors as they appear in the Paper: Chun-cheng Lin, Cheng-yu Yeh
Email addresses of all the authors: cclin@ncut.edu.tw, cy.yeh@ncut.edu.tw
Number of paper pages: 11
Abstract: The image textural analysis technology has been widely used in the design of automated defect detection system. Because the presence of defects may change image textural features, a reference image without defect can be used to compare with the test image to detect whether there is any defect. However, besides defect, the deflection of the input test image could also change textural features. When there is any angular difference between the reference image and the test image, their textural features would also be different, even if there is no defect in the test image. As a result, misjudgement of the defect detection system may occur. Most of previous studies focused on the development of texture analysis technology which could decrease the effect of test image deflection. This study aimed to estimate the deflection angle of test image through polar Fourier transform and phase correlation analysis, and rotate the reference image by the same angle to compensate the!
deflection of test image. After angles of reference image and test image became the same, the textural analysis based on the gray level co-occurrence matrix was applied to analyze and compare the textural features between the reference image and the test image. The results of actual texture defect detection demonstrated that, the angular difference between the reference image and the test image could be estimated correctly, the estimation error of which was only 0¢X to 0.5¢X. By compensating the deflection of test image, the accuracy of texture defect detection could be enhanced effectively.
Keywords: Texture defect detection, Image deflection compensation, Polar Fourier transform, Phase correlation analysis, Gray level co-occurrence matrix
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 114.43.197.74

Tuesday, 26 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON CIRCUITS AND SYSTEMS
Transactions ID Number: 32-518
Full Name: SIGE LIU
Position: Ph.D. Candidate
Age: ON
Sex: Female
Address: Dongchuang Road 800, Minhang District, Shanghai, P R China
Country: CHINA
Tel: 86-10-82812230
Tel prefix: 86-013466512927
Fax: 86-10-82812234
E-mail address: sgliu@epri.ac.cn
Other E-mails: lsgluke@126.com
Title of the Paper: A New Model for Multi-objective Load Curtailment Applied on Deregulated Environment
Authors as they appear in the Paper: SIGE LIU, XIAOXIN ZHOU, MINGTIAN FAN, HAOZHONG CHENG
Email addresses of all the authors: sgliu@epri.ac.cn, xxzhou@epri.ac.cn, mtfan@epri.ac.cn, zhengch@sjtu.edu.cn
Number of paper pages: 10
Abstract: Abstract: - In the deregulated environment, transmission congestion is one major problem that needs to be handled in power system operation. This paper aims to alleviate congestion using the multi-objective load curtailment (MOLC) approach. The proposed MOLC approach optimizes the two objectives simultaneous, namely the security margin and load curtailment cost. The security margin is measured by a presented voltage instability indictor (VSI). A fitting coefficient is adopted to combine the two conflicted objectives. The primal dual interior point method (PDIPM) is adopted to solve the proposed MOLC model. The effectiveness of both the improved PDIPM and the MOLC approach has been tested and proven on the modified IEEE 30-bus system and IEEE 118-bus system. The results obtained show that the proposed technique is able to improve system security while yielding lower cost of load curtailment.
Keywords: Key-Words: - Multi-objective load curtailment, voltage instability indicator, security margin, cost of load curtailment, fitting coefficient, primal dual interior point method
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress: Library of Shanghai Jiaotong University, Dongchuan Road 800, Minhang District, Shanghai, P R China, master@mail.lib.sjtu.edu.cn
IP ADDRESS: 219.239.6.18

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 32-517
Full Name: chien-hung pan
Position: Doctor (Researcher)
Age: ON
Sex: Male
Address: 1001 Ta-Hsueh Rd., Hsinchu city, Hsinchu 300, Taiwan.
Country: TAIWAN
Tel:
Tel prefix:
Fax:
E-mail address: pch.cm92g@nctu.edu.tw
Other E-mails:
Title of the Paper: A Simplistic MIMO Detection and Low-Complexity Selection Criterion Employed in Switching between Multiplexing and Diversity System
Authors as they appear in the Paper:
Email addresses of all the authors:
Number of paper pages: 14
Abstract: In multiple-input multiple-output (MIMO) transmission, spatial multiplexing (SM) and spatial diversity (SD) can achieve spectral efficiency and high reliability of the wireless communication link, respectively. To improve the diversity performance of SM, the transmitter switches between SM and SD transmission which are developed via a minimum square Euclidean distance selection criterion, where SD or SM is selected based on the instantaneous channel (H) state information. However, this selection criterion involves the exhaustive search of each codeword operating on the channel. In this paper, we propose 1) a simplistic MIMO detection, and 2) a low-complexity selection criterion in switching between SM and SD. For 1), at the receiver, only a QR-based detection is used to realize the SM and SD detection, respectively. To reduce the QR-decomposition (H = QR) processes for SM, the real and imaginary parts of the channel elements are rearranged to achieve a column-wise!
orthogonal structure. For SD, the maximum-likelihood decoding can be simplistic as the QR-based detection is error-propagation-free. For 2), to achieve low-complexity, for SM, we claim that the minimum diagonal entry of R operating on the minimum distance of each codeword difference is less than or equal to the minimum square Euclidean distance. For SD, we claim that a diagonal entry of R operating on the minimum distance of each codeword difference is equal to the minimum square Euclidean distance. Based on these two conditions, the proposed QR-based selection can realize the minimum square Euclidean distance selection. Simulation results show that the proposed scheme is capable of achieving optimum performance, but at a low-complexity level.
Keywords: Multiple-input multiple-output, switching, minimum Euclidean distance, QR-decomposition, Demmel condition number channel.
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 140.113.86.155

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SIGNAL PROCESSING
Transactions ID Number: 32-516
Full Name: chien-hung pan
Position: Doctor (Researcher)
Age: ON
Sex: Male
Address: 1001 Ta-Hsueh Rd., Hsinchu city, Hsinchu 300, Taiwan.
Country: TAIWAN
Tel:
Tel prefix:
Fax:
E-mail address: pch.cm92g@nctu.edu.tw
Other E-mails:
Title of the Paper: An Efficient QR-based Selection Criterion for Selecting an Optimal Precoding Matrix Employed in a Simplistic MIMO Detection
Authors as they appear in the Paper:
Email addresses of all the authors:
Number of paper pages: 12
Abstract: In multiple-input multiple-output (MIMO) channel (H) communication, when channel status information (CSI) is known to the receiver but not to the transmitter, the precoding technique can achieve a highly reliable communication link, when the receiver informs an optimal precoding matrix index to the transmitter based on current CSI. To select an optimal precoding matrix (F), the maximum capacity selection criterion and the maximum minimum singular value selection criterion are developed. However, with QR-decomposition detection (HF = QR) in the precoding system, these two selection criteria may involve high complexity and poor detection performance due to the full matrix multiplication and inaccurate detection of the first layer, respectively. In this paper, to simplify the QR-decomposition processes, the real and imaginary parts of channel elements are rearranged to achieve a column-wise orthogonal structure to reduce the repeated computation. In precoding systems,!
to achieve 1) low-complexity and 2) performance enhancement, the efficient QR-based selection (QR-selection) criterion is proposed to select an optimal precoding matrix by maximizing the absolute value of the lowest layer of the upper triangular matrix R. For low-complexity, to reduce the multiplication complexity of computing R, we prove that the absolute value of R is equal to the absolute value of ( ), where . Based on this equivalence, we can reduce the multiplication complexity because the number of multiplications for computing RF is less than the number of multiplications for computing HF. For performance enhancement, the proposed QR-selection criterion can effectively mitigate the impact of error-propagation because the probability of an early error in the sequence of decisions is lower. Simulation results show that the proposed scheme with a low-complexity level has a better performance than others, and that it can improve detection performance as the codebook!
size increases.
Keywords: Multiple-input multiple-output, precoding, QR-decomposition, capacity selection, minimum singular value selection, QR selection, column-wise orthogonal structure, codebook.
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 140.113.86.155

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 32-515
Full Name: chien-hung pan
Position: Doctor (Researcher)
Age: ON
Sex: Male
Address: 1001 Ta-Hsueh Rd., Hsinchu city, Hsinchu 300, Taiwan.
Country: THAILAND
Tel:
Tel prefix:
Fax:
E-mail address: pch.cm92g@nctu.edu.tw
Other E-mails:
Title of the Paper: Complexity Reduction by Using Triangular Matrix Multiplication in Computing Capacity for an Optimal Transmission
Authors as they appear in the Paper:
Email addresses of all the authors:
Number of paper pages: 11
Abstract: Multiple-input-multiple-output (MIMO) technique is often employed to increase capacity in comparing to systems with single antenna. However, the computational complexity in evaluating channel capacity or transmission rate (data rate) grows proportionally to the number of employed antennas at both ends of the wireless link. Recently, the QR decomposition (QRD) based detection schemes have emerged as a low-complexity solution. After conducting QRD on a full channel matrix that results in a triangular matrix, we claim that computational complexity can be simplified by the following ways. First, to simplify channel capacity calculation, we prove that eigenvalues of the full channel matrix multiplication equals eigenvalues of the triangular channel matrix multiplication. Second, to simply evaluate optimal transmission rate constrained constellation, we propose a simplistic multiplication of the resulted simple triangular matrix and a transmitted signal vector. Then, we!
also propose a modified mutual information calculation (MMIC) to reduce the multiplication complexity in combinational multiplication processes via the divided calculation. This divided calculation is employed in the parallel architecture for the field-programmable gate array (FPGA) implementation. By using the computer and FPGA implementation, simulation results show that the proposed QRD-based schemes are capable of achieving conventional performance, but at a low-complexity level.
Keywords: Multiple-input multiple-output, channel capacity, QR decomposition, eigenvalues, mutual information, field-programmable gate array.
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 140.113.86.155

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 32-514
Full Name: chien-hung pan
Position: Doctor (Researcher)
Age: ON
Sex: Male
Address: 1001 Ta-Hsueh Rd., Hsinchu city, Hsinchu 300, Taiwan.
Country: TAIWAN
Tel:
Tel prefix:
Fax:
E-mail address: pch.cm92g@nctu.edu.tw
Other E-mails:
Title of the Paper: An Efficient MIMO Detection Algorithm Employed in Imperfect Noise Estimation
Authors as they appear in the Paper:
Email addresses of all the authors:
Number of paper pages: 17
Abstract: An efficient multiple-input multiple-output (MIMO) detection (MD) algorithm includes novel, low-complexity, near-optimal and robust scheme is proposed in wireless communications when imperfect noise estimation is considered. By using MIMO technique, capacity increases proportionally as the number of antennas is increased, but the introduced inter-antenna interference (IAI) degrades system performance. To better mitigate IAI, we propose a two-stage procedure to achieve maximum likelihood (ML) performance while keeping at acceptable level of computational complexity. A novel two-stage procedure is proposed as follows that is suitable for either in an overdetermined or an underdetermined MIMO system. In an overdetermined system, interference cancellation is first processed at Stage-1 using sorted QR decomposition (SQRD) followed by Stage-2 that performs a genetic algorithm (GA). In terms of computational complexity, this procedure provides three significant advantages!
: 1) The SQRD scheme provides excellent interference cancellation so as to largely improve initial setting of GA. 2) By using QRD, fitness value evaluation of GA involves less complexity due to reducing the matrix multiplication. 3) In aspect of diversity knowledge, lately decoded sub-streams expect to have lower error probabilities by using SQRD. In this paper, each mutated gene is decoded from the various diversity gains, termed as a diversity mutation (DM) scheme. To achieve the fore-mentioned three significant advantages in an underdetermined system, on the other hand, we propose zero forcing (ZF) assisted SQRD GA-MD (ZF-SQRD GA-MD) to achieve ML performance. Beside, the proposed two-stage detection procedure is quite robust as it does not rely on noise information. Simulation results show that the proposed two-stage detection procedure can achieve a near-ML performance, but at a low-complexity level.
Keywords: multiple-input multiple-output, inter-antenna interference, maximum likelihood detector, sorted QR decomposition, genetic algorithm, underdetermined.
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 140.113.86.155

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON APPLIED AND THEORETICAL MECHANICS
Transactions ID Number: 32-513
Full Name: Manoj Sahni
Position: Lecturer
Age: ON
Sex: Male
Address: B-205, B-9/1B, Shramdeep Apartment, Sector 62, Noida-201307(U.P.)
Country: INDIA
Tel: +919971541700
Tel prefix: +91
Fax:
E-mail address: manoj_sahani117@rediffmail.com
Other E-mails: manoj.sahni@jiit.ac.in, ravindrakrchauhan@yahoo.co.in
Title of the Paper: Thermo Creep Transition of Transversely Isotropic Thick-walled Rotating Cylinder under Internal Pressure
Authors as they appear in the Paper: Sanjeev Sharma, Manoj Sahni , Ravindra Kumar
Email addresses of all the authors: sanjiit12@rediffmail.com, manoj_sahani117@rediffmail.com, ravindrakrchauhan@yahoo.co.in
Number of paper pages: 12
Abstract: Thermal creep stresses for a transversely isotropic thick-walled rotating cylinder under internal pressure have been obtained by using transition theory. Results obtained have been discussed numerically and depicted graphically. It is seen that without rotation and without thermal effects, circumferential stress is maximum at the internal surface for transversely isotropic/ isotropic circular cylinder under internal pressure for measure n = 1, 1/3 while for measure n = 1/7, the circumferential stress is maximum at external surface for transversely isotropic/ isotropic circular cylinder under internal pressure. With the increase in angular speed and introduction of thermal effects, the circumferential stress is going on increasing at internal surface for transversely isotropic/ isotropic circular cylinder under internal pressure. Also circumferential stress is maximum at the internal surface for transversely isotropic material as compared to isotropic material. Ther!
efore, rotating circular cylinder under internal pressure made of transversely isotropic material is on the safer side of the design as compared to rotating circular cylinder under internal pressure made of isotropic material.
Keywords: Creep, Transition, Transversely Isotropic, Rotating Cylinder, Stresses, Strain rates.
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 210.212.127.1

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 29-265
Full Name: Omar Shatnawi
Position: Assistant Professor
Age: ON
Sex: Male
Address: Al al-Bayt University
Country: JORDAN
Tel:
Tel prefix:
Fax:
E-mail address: dromali@lycos.com
Other E-mails:
Title of the Paper: Unified Framework for Developing Testing Effort Dependent Software Reliability Growth Models
Authors as they appear in the Paper: P.K. Kapur, Omar Shatnawi, Anu G. Aggarwal, Ravi Kumar
Email addresses of all the authors: dromali@lycos.com, pkkapur1@gmail.com
Number of paper pages: 11
Abstract: Several software reliability growth models (SRGMs) have been presented in the literature in the last three decades. These SRGMs take into account different testing environment depending on size and efficiency of testing team, type of components and faults, design of test cases, software architecture etc. The plethora of models makes the model selection an uphill task. Recently, some authors have tried to develop a unifying approach so as to capture different growth curves, thus easing the model selection process. The work in this area done so far relates the fault removal process to the testing/execution time and does not consider the consumption pattern of testing resources such as CPU time, manpower and number of executed test cases. More realistic modeling techniques can result if the reliability growth process is studied with respect to the amount of expended testing efforts. In this paper, we propose a unified framework for testing effort dependent software re!
liability growth models incorporating imperfect debugging and error generation. The proposed framework represents the realistic case of time delays between the different stages of fault removal process i.e Failure Observation/Fault Detection and Fault Removal/Correction processes. The Convolution of probability distribution functions have been used to characterize time differentiation between these two processes. Several existing and new effort dependent models have been derived by using different types of distribution functions. We have also provided data analysis based on the actual software failure data sets for some of the models discussed and proposed in the paper.
Keywords: Software reliability growth model, Testing effort function, Imperfect debugging, Error generation, Convolution, Probability distribution function.
EXTENSION of the file: .pdf
Special (Invited) Session: Mathematical Modelling In Software Reliability
Organizer of the Session: 612-407
How Did you learn about congress:
IP ADDRESS: 87.236.233.52

Monday, 25 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON MATHEMATICS
Transactions ID Number: 29-264
Full Name: Nikos Mastorakis
Position: Professor
Age: ON
Sex: Male
Address: WSEAS
Country: GREECE
Tel:
Tel prefix:
Fax:
E-mail address: mastor@wseas.org
Other E-mails:
Title of the Paper: Solution of the Schrodinger-Maxwell equations via Finite Elements and Genetic Algorithms with Nelder-Mead
Authors as they appear in the Paper: Nikos E. Mastorakis
Email addresses of all the authors: mastor@wseas.org
Number of paper pages: 10
Abstract: - In this paper the Numerical Solution of the system of PDEs of Schrodinger-Maxwell equations (with a general nonlinear term) via Finite Elements and Genetic Algorithms with Nelder-Mead is proposed. The method of Finite Elements and Genetic Algorithms with Nelder-Mead that has been proposed by the author recently is also used. (Recently, the existence of a nontrivial solution to the nonlinear Schrodinger-Maxwell equations in R3, assuming on the nonlinearity the general hypotheses introduced by Berestycki & Lions has been proved)
Keywords: Schrodinger-Maxwell equations, Finite Elements, Genetic Algorithms with Nelder-Mead,.
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 79.131.22.186

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON MATHEMATICS
Transactions ID Number: 29-263
Full Name: Nikos Mastorakis
Position: Professor
Age: ON
Sex: Male
Address: WSEAS
Country: GREECE
Tel:
Tel prefix:
Fax:
E-mail address: mastor@wseas.org
Other E-mails:
Title of the Paper: Solution of the Schrodinger-Maxwell equations via Finite Elements and Genetic Algorithms with Nelder-Mead
Authors as they appear in the Paper: Nikos E. Mastorakis
Email addresses of all the authors: mastor@wseas.org
Number of paper pages: 10
Abstract: - In this paper the Numerical Solution of the system of PDEs of Schrodinger-Maxwell equations (with a general nonlinear term) via Finite Elements and Genetic Algorithms with Nelder-Mead is proposed. The method of Finite Elements and Genetic Algorithms with Nelder-Mead that has been proposed by the author recently is also used. (Recently, the existence of a nontrivial solution to the nonlinear Schrodinger-Maxwell equations in R3, assuming on the nonlinearity the general hypotheses introduced by Berestycki & Lions has been proved)
Keywords: Schrodinger-Maxwell equations, Finite Elements, Genetic Algorithms with Nelder-Mead,.
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 79.131.22.186

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 32-512
Full Name: Ping Jack Soh
Position: Lecturer
Age: ON
Sex: Male
Address: School of Computer and Communication Engineering, Block A, Seberang Ramai School Complex, No 12 & 14, Jalan Satu, Tmn Seberang Ramai Ph III, 02000 Kuala Perlis, Perlis
Country: MALAYSIA
Tel: 019-5373362
Tel prefix: +006
Fax: 04-9798885
E-mail address: pjsoh@unimap.edu.my
Other E-mails: sohpingjack@gmail.com
Title of the Paper: Design and Analysis of A Novel Dielectric Loaded Helical Antenna
Authors as they appear in the Paper: Abdul Aziz Muhammad Ezanuddin,Ping Jack Soh,Abdullah Al-Hadi Azremi
Email addresses of all the authors: ejan9ronaldo@yahoo.com,pjsoh@unimap.edu.my,azremi@unimap.edu.my
Number of paper pages: 10
Abstract: Helical antennas have been a popular antenna configuration for various applications for its simple structure. This work describes the study on a novel, custom-shaped dielectric loaded helical antenna incorporated on an advanced material, which is Barium Strontium Titanate (BST). This material, which presents the researcher with an advantage in size reduction due to its high relative permittivity, is most suitably used when desiring a miniaturized antenna compared to its conventional design of the same type. In the process of designing, a parametric study was carried out by varying the antenna geometrical parameters and the dielectric loading using the transient solver. The detailed understanding of the sensitive parameters of the proposed antenna will allow for ease of design reuse. Finally, an extended exploration was also carried out in order to determine the design's suitability for operation with two of the WLAN Access Points (APs) already available in the mark!
et. Observation from this investigation found out that the three most sensitive parameters in the design are dielectric load's height, radius of ground plane and the helical height, with the dielectric load's height as the main design criteria. On the other hand, examination on the APs' integration found out that several factors influencing the radiation performance of the design are the material used, internal spacing available and overall shape of the APs. While both APs are proven to work with the designed antenna in the desired frequency range, a degradation of up to 1 dB in gain have been observed, when applying the antenna to the less suitable AP.
Keywords: Helical antenna, Dielectric resonator, Wireless local area network, Advanced material, Barium Strontium Titanate (BST)
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 210.187.51.53

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 32-511
Full Name: Chien-lung Hsu
Position: Associate Professor
Age: ON
Sex: Male
Address: Department of Information Management, Chang-Gung University, 259, Wen-Hwa 1st Road, Kwei-Shan, Tao-Yuan,Taiwan
Country: TAIWAN
Tel: +886-3-2118800-5827
Tel prefix:
Fax: +886-3-2118020
E-mail address: clhsu@mail.cgu.edu.tw
Other E-mails: journals.clhsu@gmail.com
Title of the Paper: A Supervising Authenticated Encryption Scheme for Multilevel Security
Authors as they appear in the Paper: Liang-Peng Chang, Tzong-Chen Wu, and Chien-Lung Hsu
Email addresses of all the authors:
Number of paper pages: 10
Abstract: Access to secret data should be managed to allow authorized people only. An authenticated encryption scheme can be used to protect valuable information or secret data for data confidentiality, authentication, non-repudiation, integrity. In this paper, the authors propose a new supervising authenticated encryption scheme for multilevel security which deals with the monitor and access control problems found in hierarchical organization, for protecting valuable authenticated encryption messages from being disclosed by malicious adversary. The proposed scheme provides two effective access control mechanisms, one is the partial access control and the other is the complete access control, which allow management superiors to monitor or access authenticated encryption messages received by inferiors within a hierarchical organization. Considering user privacy, the partial access control mechanism allows only a superior to access the ¡§intended¡¨ authenticated encrypted info!
rmation. In case of some special scenario (e.g., the monitored inferior is dead or dismissed), the complete access control mechanism allows the superior to access ¡§all¡¨ authenticated encrypted messages received by the monitored inferior.
Keywords: Multilevel security, Authenticated encryption, Access control, Monitor
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 163.25.117.54

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 29-262
Full Name: Hung-Jen Yang
Position: Professor
Age: ON
Sex: Male
Address: No. 116, Ho-Ping 1st Rd., Kaohsiung City,
Country: TAIWAN
Tel:
Tel prefix:
Fax:
E-mail address: hjyang@nknucc.nknu.edu.tw
Other E-mails: hungjen.yang@gmail.com
Title of the Paper: Assessing and Managing Mobile Technostress
Authors as they appear in the Paper: Jui-Chen Yu, Lung-Hsing Kuo, Li-Min Chen, Hung-Jen Yang, Hsieh-Hua Yang, Wen-Chen, Hu
Email addresses of all the authors: raisin@mail.nstm.gov.tw,admi@nknucc.nknu.edu.tw, chenlm02@yahoo.com.tw, hjyang@nknucc.nknu.edu.tw, yansnow@gmail.com, wenchen@cs.und.edu
Number of paper pages: 10
Abstract: From time to time, new technology brings people impacts. Mobile information system provides new way for manipulating information in both directions, sending out and bringing in. Anywhere and anytime are both the characteristics of mobile technology that people could get rid of. The purpose of this study was to explore mobile technostress and bring up the discussion of assessing and managing. A balance theory was concluded and how to cope with mobile technostress was also discussed.
Keywords: Mobile technostress, characteristics of mobile technology, balance scale
EXTENSION of the file: .doc
Special (Invited) Session: Assessing Mobile Technostress
Organizer of the Session: 613-423
How Did you learn about congress: Lung-Hsing Kuo, Hung-Jen Yang,Hsieh-Hua Yang, Jui-Chen Yu, Li-Min Chen
IP ADDRESS: 140.127.44.31

Saturday, 23 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 32-510
Full Name: Tont Gabriela
Position: Associate Professor
Age: ON
Sex: Female
Address: Oradea, Magheru st. Bl-M7, app.1
Country: ROMANIA
Tel: 0729-727839
Tel prefix: +40
Fax:
E-mail address: gtont@uoradea.ro
Other E-mails: gtont@rdslink.ro
Title of the Paper: Non-Stationary Stochastic Processes in Reliability Analysis of Complex Systems
Authors as they appear in the Paper: GABRIELA TONŢ, LUIGE VLĂDĂREANU, RADU ADRIAN MUNTEANU, DAN GEORGE TONŢ
Email addresses of all the authors: gtont@uoradea.ro, dtont@uoradea.ro, luigiv@arexim.ro, radu.a.munteanu@mas.utcluj.ro
Number of paper pages: 10
Abstract: Abstract: - Stationarity is an unrealistic prior assumption for the multi-state components of complex systems. The numerical characteristics of the nonstationary random responses of complex structure are developed in the paper considering the uncertainty and volatility of process transitions states. The appropriate functional levels of multi-state systems components are placed between the two extremes: defect (0%) and the nominal (100%) state, allowing any intermediate state transiting from the range of perfect functionality to complete failure. Time analysis interval of a multi-state system is characterized by intermediate states (states of partial success). The system availability parameters are also affected by the upstream, downstream processes involved in the operating regime. Considering system ageing effect, the paper proposes a stochastic model of assessing system probability of unidirectional or bidirectional transition states, applying the non-homogeneou!
s (non-stationary) Markov chain. The capability of time-dependent method to describe a multi-state system is based on a case study, assessing the operatial situation of studied system. The rationality and validity of the presented model are demonstrated via an engineering example, and the effect of randomness of the structural parameters is also examined.
Keywords: Key-Words: - nonstationarity, intermediate states, transition, multi-state systems, transition intensity matrix.
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 79.113.84.253

Friday, 22 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 29-260
Full Name: X. D. Zhuang
Position: Doctor (Researcher)
Age: ON
Sex: Male
Address: WSEAS Headquarters, Agiou Ioannou Theologou 17-23, 15773, Zografou, Athens
Country: GREECE
Tel:
Tel prefix:
Fax:
E-mail address: xdzhuang@gmail.com
Other E-mails: xzhuang@worldses.org
Title of the Paper: a magneto-statics inspired transform for structure representation and analysis of digital images
Authors as they appear in the Paper: Xiao-dong Zhuang, Nikos E. Mastorakis
Email addresses of all the authors: xdzhuang@gmail.com,mastor@wseas.org
Number of paper pages: 10
Abstract: Physical-field inspired methodology has become a new branch in image processing techniques. In this paper, a novel image transform is proposed imitating the source reverse of magneto-static field. The image is taken as a vertical magnetic field, and its curl is estimated as the virtual source of the field for image structure representation and analysis. The restoration from the virtual source to the image is also investigated, based on which a method of image estimation and restoration from its gradient field is proposed. The experimental results indicate that the proposed curl source reverse provides effective image structure representation, which can be exploited in further image processing tasks.
Keywords: image transform, curl source reverse, magneto-static, image structure, image restoration
EXTENSION of the file: .pdf
Special (Invited) Session: The Curl Source Reverse as a Magneto-statics Inspired Transform for Image Structure Representation
Organizer of the Session: 620-124
How Did you learn about congress:
IP ADDRESS: 61.162.21.109

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 29-261
Full Name: X. D. Zhuang
Position: Doctor (Researcher)
Age: ON
Sex: Male
Address: WSEAS Headquarters, Agiou Ioannou Theologou 17-23, 15773, Zografou, Athens
Country: GREECE
Tel:
Tel prefix:
Fax:
E-mail address: xdzhuang@gmail.com
Other E-mails: xzhuang@worldses.org
Title of the Paper: a magneto-statics inspired transform for structure representation and analysis of digital images
Authors as they appear in the Paper: Xiao-dong Zhuang, Nikos E. Mastorakis
Email addresses of all the authors: xdzhuang@gmail.com,mastor@wseas.org
Number of paper pages: 10
Abstract: Physical-field inspired methodology has become a new branch in image processing techniques. In this paper, a novel image transform is proposed imitating the source reverse of magneto-static field. The image is taken as a vertical magnetic field, and its curl is estimated as the virtual source of the field for image structure representation and analysis. The restoration from the virtual source to the image is also investigated, based on which a method of image estimation and restoration from its gradient field is proposed. The experimental results indicate that the proposed curl source reverse provides effective image structure representation, which can be exploited in further image processing tasks.
Keywords: image transform, curl source reverse, magneto-static, image structure, image restoration
EXTENSION of the file: .pdf
Special (Invited) Session: The Curl Source Reverse as a Magneto-statics Inspired Transform for Image Structure Representation
Organizer of the Session: 620-124
How Did you learn about congress:
IP ADDRESS: 61.162.21.109

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 29-259
Full Name: Carlos Aviles-Cruz
Position: Doctor (Researcher)
Age: ON
Sex: Male
Address: UAM-Azcapotzalco, Dpto. Electrónica, Av. San Pablo 180, Col. Reynosa, C.P. 02200, Mexico D.F.
Country: MEXICO
Tel: (+52)5553189550
Tel prefix:
Fax: (+52)5553189550
E-mail address: caviles@correo.azc.uam.mx
Other E-mails: montesalta@hotmail.com
Title of the Paper: Patter Recognition Applied to Mouse Pointer Controlled by Ocular Movements
Authors as they appear in the Paper: Job-Ramon De-La-O-CHavez, Carlos Aviles-Cruz
Email addresses of all the authors: yojobytu@hotmail.com, caviles@correo.azc.uam.mx
Number of paper pages: 10
Abstract: Researchers on Brain-Computer Interface (BCI) have tried to identify the origin of body movements in humans with limited success. This work looks at the problem using an ocular movement tracker based on ocular artifacts in ElectroEncephalo-Graph (EEG) readings, also called Electro-Oculo-Gram (EOG). The movements are reflected into the EEG signals, which are passed through a multiple classifier, composed of two statistical classic methods (KNN and Bayesian-Gauss) and a Neural Network. The voltage levels of EEG readings and their polarity provide the necessary information to track the focus of attention of the user in a computer screen. All of these artifacts have characteristic curves which can be classified. Focusing on the eye movements, we have developed an eye tracker to recover the point of attention of the user on a computer screen.
Keywords: BCI, EOG, Artifacts, KNN, Bayesian, Neural Network, Eye Movement Classification
EXTENSION of the file: .doc
Special (Invited) Session: Mouse Pointer Controlled by Ocular Movements
Organizer of the Session: 602-181
How Did you learn about congress:
IP ADDRESS: 148.206.74.235

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON MATHEMATICS
Transactions ID Number: 29-258
Full Name: ADNAN MAZMANOĞLU
Position: Professor
Age: ON
Sex: Male
Address: FACULTY OF SCIENCE AND ARTS MATHEMATICS DEPARTMENT APPLIED MATHEMATICS BRANCH MARMARA STATE UNIVERSITY GOZTEPE CAMPUS KADIKOY İSTANBUL
Country: TURKEY
Tel: 348 59 38 - 1131
Tel prefix: 0216
Fax:
E-mail address: amazman@marmara.edu.tr
Other E-mails:
Title of the Paper: NONLINEAR GROWTH MODELS BASED ON THE LIVE EYE LENS WEIGHT AND AGE MEASUREMENTS OF THE EUROPEAN RABBITS IN AUSTRALIA AND ALTERNATIVE MODELS IN MULTIVARIATE STATISTICS
Authors as they appear in the Paper: Adnan Mazmanoğlu Ali Reha Ünlü
Email addresses of all the authors: amazman@marmara.edu.tr,ali.reha.unlu@superonline.com
Number of paper pages: 17
Abstract: : Examining the special model Lens = ƒÑ exp{-ƒÒ / (Age + ƒ×)} which belongs to Dudzinski and Mykytowycz (1961), and was used in a study made by them to find the age of Oryctolagus Caniculus, which lives in Europe and is known as the European rabbit, with live eye lens weight, we showed that similar results can be obtained with the Gompertz and Logistic nonlinear regression models. We determined that the results given by the models are showing the goodness of fit, as a result of a statistical analysis. Furthermore we showed that adding various parameters to Dudzinski and Mykytowycz model will not change the results.
Keywords: nonlinear regression, logistic and gompertz model, gauss-newton iteration method, SPSS
EXTENSION of the file: .doc
Special (Invited) Session: NONLINEAR GROWTH MODELS BASED ON THE LIVE EYE LENS WEIGHT AND AGE MEASUREMENTS OF THE EUROPEAN RABBITS IN AUSTRALIA AND ALTERNATIVE MODELS IN MULTIVARIATE STATISTICS
Organizer of the Session: 614-235
How Did you learn about congress:
IP ADDRESS: 193.255.177.3

Thursday, 21 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 29-257
Full Name: Azlinah Mohamed
Position: Associate Professor
Age: ON
Sex: Female
Address: FTMSK, UiTM Shah Alam
Country: MALAYSIA
Tel: 603-55211242
Tel prefix:
Fax: 603-55435501
E-mail address: azlinah@tmsk.uitm.edu.my
Other E-mails:
Title of the Paper: Online Slant Signature Algorithm Analysis
Authors as they appear in the Paper: Azlinah Mohamed, Rohayu Yusof, Sofianita Mutalib, Shuzlina Abdul Rahman
Email addresses of all the authors: azlinah@tmsk.uitm.edu.my, sofi@tmsk.uitm.edu.my, shuzlina@tmsk.uitm.edu.my
Number of paper pages: 10
Abstract: A vector rule-based approach and analysis to on-line slant signature recognition algorithm is presented. Extracting features in signature is an intense area due to complex human behavior, which is developed through repetition. Features such as direction, slant, baseline, pressure, speed and numbers of pen ups and downs are some of the dynamic information signature that can be extracted from an online method. This paper presents the variables involve in designing the algorithm for extracting the slant feature. Signature Extraction Features System (SEFS) is used to extract the slant features in signature automatically for analysis purposes. The system uses both local and global slant characteristics in extracting the feature. Local slant is the longest slant among the detected slant while the global slant represents the highest quantity of classified slant whether the slant are leftward, upright or rightward. Development and analysis are reported on a database compr!
ises of 20 signatures from 20 subjects. The system is compared to human expert evaluation. The results demonstrate a competitive performance with 85% accuracy.
Keywords: Slant feature, Online signature, Signature recognition, Signature analysis, Dynamic signature
EXTENSION of the file: .doc
Special (Invited) Session: Slant Algorithm for Online Signature Recognition
Organizer of the Session: 699-175
How Did you learn about congress:
IP ADDRESS: 202.58.85.15

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 29-256
Full Name: Azlinah Mohamed
Position: Associate Professor
Age: ON
Sex: Female
Address: FTMSK, UiTM Shah Alam
Country: MALAYSIA
Tel: 603-55211242
Tel prefix:
Fax: 603-55435501
E-mail address: azlinah@tmsk.uitm.edu.my
Other E-mails:
Title of the Paper: Online Slant Signature Algorithm Analysis
Authors as they appear in the Paper: Azlinah Mohamed, Rohayu Yusof, Sofianita Mutalib, Shuzlina Abdul Rahman
Email addresses of all the authors: azlinah@tmsk.uitm.edu.my, sofi@tmsk.uitm.edu.my, shuzlina@tmsk.uitm.edu.my
Number of paper pages: 10
Abstract: A vector rule-based approach and analysis to on-line slant signature recognition algorithm is presented. Extracting features in signature is an intense area due to complex human behavior, which is developed through repetition. Features such as direction, slant, baseline, pressure, speed and numbers of pen ups and downs are some of the dynamic information signature that can be extracted from an online method. This paper presents the variables involve in designing the algorithm for extracting the slant feature. Signature Extraction Features System (SEFS) is used to extract the slant features in signature automatically for analysis purposes. The system uses both local and global slant characteristics in extracting the feature. Local slant is the longest slant among the detected slant while the global slant represents the highest quantity of classified slant whether the slant are leftward, upright or rightward. Development and analysis are reported on a database compr!
ises of 20 signatures from 20 subjects. The system is compared to human expert evaluation. The results demonstrate a competitive performance with 85% accuracy.
Keywords: Slant feature, Online signature, Signature recognition, Signature analysis, Dynamic signature
EXTENSION of the file: .doc
Special (Invited) Session: Slant Algorithm for Online Signature Recognition
Organizer of the Session: 699-175
How Did you learn about congress:
IP ADDRESS: 202.58.85.15

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 32-509
Full Name: Aos Zaidan
Position: Ph.D. Candidate
Age: ON
Sex: Male
Address: D-9-4, DELIMA, BT5, JALAN KLANG LAMA, 58200 KUALA LUMPUR,MALAYSIA
Country: MALAYSIA
Tel: +60172452457
Tel prefix:
Fax:
E-mail address: aws.alaa@yahoo.com
Other E-mails: aws_alaa_2008@yahoo.com
Title of the Paper: New Technique for Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm.
Authors as they appear in the Paper: Aws Alaa , Bilal Bahaa.
Email addresses of all the authors: aws.alaa@yahoo.com,bilal_bahaa@hotmail.com
Number of paper pages: 12
Abstract: ABSTRACT---Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It's a big security and privacy issue with the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Nowadays protection system classified with more specific as hiding information, encryption information, and combination between hiding and encryption to increase information security, the strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods!
to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this research becomes difficult. In this paper, a new system of information hiding is presented. The proposed system aim to hidden information (data file) in any execution file (EXE) and to detect the hidden file and we will see implementation of steganography system which embeds information in an execution file. (EXE) files have been investigated. The system tries to find a solution to the size of the cover file and making it undetectable by anti-virus software. The system includes two main functions; first is the hiding of the information in a Portable Executable File (EXE), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno fi!
le, extract the information, and decryption of the information). The s
ystem has achieved the main goals, such as make the relation of the size of the cover file and the size of information independent and the result file does not make any conflict with anti-virus software.
Keywords: Keywords: (Cryptography, Steganography, Portable Executable File, Statistical Technique, Advance Encryption Standared).
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress: university of malay , kula lumpur , awsalaa@perdana.um.edu.my
IP ADDRESS: 116.206.140.246

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 32-508
Full Name: Aos Zaidan
Position: Ph.D. Candidate
Age: ON
Sex: Male
Address: D-9-4, DELIMA, BT5, JALAN KLANG LAMA, 58200 KUALA LUMPUR,MALAYSIA
Country: MALAYSIA
Tel: +60172452457
Tel prefix:
Fax:
E-mail address: aws.alaa@yahoo.com
Other E-mails: aws_alaa_2008@yahoo.com
Title of the Paper: New Technique for Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm.
Authors as they appear in the Paper: Aws Alaa , Bilal Bahaa.
Email addresses of all the authors: aws.alaa@yahoo.com,bilal_bahaa@hotmail.com
Number of paper pages: 12
Abstract: ABSTRACT---Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It's a big security and privacy issue with the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Nowadays protection system classified with more specific as hiding information, encryption information, and combination between hiding and encryption to increase information security, the strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods!
to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this research becomes difficult. In this paper, a new system of information hiding is presented. The proposed system aim to hidden information (data file) in any execution file (EXE) and to detect the hidden file and we will see implementation of steganography system which embeds information in an execution file. (EXE) files have been investigated. The system tries to find a solution to the size of the cover file and making it undetectable by anti-virus software. The system includes two main functions; first is the hiding of the information in a Portable Executable File (EXE), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno fi!
le, extract the information, and decryption of the information). The s
ystem has achieved the main goals, such as make the relation of the size of the cover file and the size of information independent and the result file does not make any conflict with anti-virus software.
Keywords: Keywords: (Cryptography, Steganography, Portable Executable File, Statistical Technique, Advance Encryption Standared).
EXTENSION of the file: .pdf
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress: university of malay , kula lumpur , awsalaa@perdana.um.edu.my
IP ADDRESS: 116.206.140.246