Analysis of Multiple String Pattern Matching Algorithms
Authors :- Akinul Islam Jony
Keywords :- Algorithms, Multiple Pattern, String Matching, String Searching.
Published Online :- 30 September 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Multiple string pattern matching is a basic problem in computer science and is used to locate all the appearances of a finite set of patterns inside an input text. It is widely used in many applications for searching, matching, filtering, and detecting a set of pattern. In this paper, to illustrate and for the better understanding of this particular problem, the widely used multiple string patterns matching algorithms have been analyzed and discussed. A theoretical and experimental result along with the analysis and discussion of the algorithms is presented as well in this paper. An extensive reference list is also included at the end of the paper. [/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/09/IJACSIT-3402-AoMSPMA.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Aho, Alfred V. & Corasick, Margaret J. (1975). Efficient string matching: an aid to bibliographic search. Communications of the ACM, 18, 333-340.
[2] Commentz-Walter, Beate. (1979). A string matching algorithm fast on the average. Automata Languages and Programming, 6, 118-132.
[3] Wu, Sun & Manber, Udi. (1994). A fast algorithm for multi-pattern searching. Technical Report TR-94-17, University of Arizona.
[4] Boyer, R. S. & Moore, J. S. (1977). A fast string searching algorithm. Communications of the ACM, 20,762-772.
[5] Horspool, N. (1980). Practical fast searching in strings. Software: Practice and Experience, 10, 501-506.
[6] Baeza-Yates, R. A. (1989). ‘Improved string searching, Software – Practice and Experience, 19, 257-271.
[7] Knuth, Donald E., Morris, James H., Pratt, Vaughan R. (1974). Fast pattern matching in strings. Technical Report CS440, Computer Science Department, Stanford University, Stanford, California.
[8] Aho, A. V. (1990). Algorithms for finding patterns in strings. Handbook of Theoretical Computer Science In J. van Leeuwen (Ed.), (pp. 257-300). North-Holland, Amsterdam.
[9] Waston, B. W. (1994). The performance of single-keyword and multiple keyword pattern matching algorithms.
[10] Wu, S. & Manber, U. (1992). Agrep – a fast approximate pattern-matching tool. In Proceedings USENIX Winter 1992 Technical Conference, (pp. 153–162), San Francisco, CA.
[11] Fan, J.-J. & Su, K.-Y. (1993). An efficient algorithm for matching multiple patterns. IEEE Transactions on Knowledge and Data Engineering, 5(2), 339–351.
[12] Navarro, G. & Raffinot, M. (2002). Flexible Pattern Matching in Strings, Practical Online Search Algorithms for Texts and Biological Sequences. Cambridge University Press, Cambridge, UK.
[13] Allauzen, C. & Raffinot, M. (1999). Oracle des facteurs d’un ensemble de mots. Technical Report IGM 99-11, Institut Gaspard Monge, Universit´e de Marne-la-Vall´ee,France.
[14] Allauzen, C., Crochemore, M., Raffinot, M. (1999). Factor oracle: A new structure for pattern matching. In J. Pavelka, G. Tel, and M. Bartosek, (Ed.), Theory and Practice of Informatics (Brno,1999), volume 1725 of Lecture Notes in Computer Science, pp. 291–306. Springer-Verlag. In Proceedings of the 26th Seminar on Current Trends in Theory and Practice of Informatics, Milovy,
Czech Republic.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Nonlinearity Compensation for High Power Amplifiers Based on Look-Up Table Method for OFDM Transmitters
Authors :- Maryam Sajedin, Ayaz Ghorbani and Hamid Reza Amin Davar
Keywords :- About four key words or phrases in alphabetical order, separated by commas.
Published Online :- 28 November 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]The OFDM is generally known as an effective technique for high Bit-rate applications. In OFDM systems, the combination of different signals with different phase and amplitude give a large dynamic range that is used to be characterized by a high PAPR. To obtain maximum efficiency Power Amplifier should be driven near the saturation region, but since the OFDM signal has high PAPR, this power amplifier will cross over to the nonlinear region causing serious in band distortion, and operation in nonlinear mode reduces performances of the output signal. To compensate for this distortion, liberalizers are proposes to utilize a digital pre-distortion of baseband signals, which is efficient and illustrates a high performance for linearization of OFDM transmitters. This paper presents an adaptive digital pre-distortion techniques based on Look Up Table (LUT) method which will result in cancellation of nonlinear distortion appearing in power amplifier through Advanced Design System(ADS) software. It is shown that the new simplified structure exhibits fast convergence and LUT pre-distorter can effectively suppress the spectrum regrowth caused by the dynamic nonlinearity of power amplifier.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/11/Nonlinearity-Compensation-for-High-Power.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] F. H. Gregorio and T. I. Laakso.(2005). The performance of OFDM-SDMA systems with power amplifier nonlinearities. Proceedings of the 2005 finnish signal symposium , Kuopio ,Finland.
[2] M. Alard and R. Lassale .(1987) . Principles of modulation and channel coding for digital broadcasting for mobile recivers . EBU Tech.Rev.,no224 , 3-25
[3] L. J. Cimini . (1985). Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing. IEEE Trans, Commun , Com-33 , 665-667
[4] Vivek Ashok Bohara, See Ho Ting. (2008). Analysis of OFDM signals in nonlinear high power amplifier with memory .IEEE Communication in the ICC 2008 preceeding , 3653-3657
[5] Dytro Bonder, Djuradj Budmir and Boris Shelkovnikor. (2008) . Linearization of power amplifier by baseband digital predistortion for OFDM transmitter. INT.Crimean Conference Microwave & Telecommunication Technology , 270-272
[6] Jinho Jeong .(2012). New digital predistortion technique of RF power amplifier for wideband OFDM signal .IEICE Electronics Express ,Vol 9.No.5, 326-332
[7] Tushar Kanti and Monir Morshed.(2013). High power amplifier effects analysis for OFDM system. International Journal of Science , Engineering and Technology Research ,(IJSETR) ,Vol.2 , Issue 5 , 1119-1121
[8] Amanjot Singh ,Hardeep Kaur. (2012). nonlinearity analysis of power amplifier in OFDM system. International Journal of Computer Applications ,Vol .37 , 37-41
[9] Bo Ai , Member, IEEE , Zhi –Xing Yang , Chang – Yong Pan, Shi –Gang Tang and Tao –Tao Zhang . (2007). Analysis on LUT based predistortion method for HPA with memory .IEEE Transaction on Broadcasting , Vol.53 , No.1 , 127-129
[10] Dmytro Bondar, Djuradj Budimir and Boris shelkonvniko. (2008). Linearization of power amplifiers by basedband digital predistortion for OFDM transmitters. IEEE Microwave & Telecommunication Technology,270-271
[11] Gavin Hill. (2011). Peak power reduction in orthogonal frequency division multiplexing transmitters. Victoria University of Technology ,Thesis submitted in fulfilment of the requirement for the degree of doctor of philosophy .
[12] Stevens Creek Blvd., Santa Clara. (2011). Advanced Design System 2011.01 – Timed Components. Agilent Technologies.
[13] Sangeeta Bawa ,Maninder Pal ,Jyoti Gupta. (2013). Predistortion based linearization technique for power amplifiers of wideband communication systems. International Journal of Science & Engineering Reserch ,Vol4 ,Issue 5
[14] ]AIBO , YAG , ZHI –XING, PAN CHANG –YONG, ZHANG TAO –TAO , WANG YONG and GE JIAN HUA. (2006). Improve LUT Technique for HPA Nonlinear predistortion in OFDM System. Wireless personal Communication , No 38 , 495-507
[15] Amanjot Singh ,Hardeep Kaur. (2012). Non Linearity Analysis of High Power Amplifier in OFDM system. International Journal of Computer Aplication ,Vol 37, NO.2
[16] Won Gi Jeon ,Kyung Hi Chang and Yong Soo Cho. (1997). An Apaptive Data Predistortion for Compensation of Nonlinear Distortion in OFDM System. IEEE Transaction on communications , Vol 45 ,No .10.
[17] F. ZAVOSH, MTHOMAS, C. THRON, THALL, D. ARTUSI, D. ANDERSON, D. N. AND DAVID R. (1999). DIGITAL PREDISTORTION TECHNIQUES FOR RF POWER AMPLIFIERS WITH CDMA APPLICATIONS. TECHNICAL FEATURE, MICROWAVE JOURNAL.
[18] B. Abdulrahman, G.Baudoin. (2002). Applying Digital Predistortion To Power Amplifiers Used in Third Generation Systems. ESIEE, Signal Processing and Telecommunications Department. BP-99, 93162
[19] By Kelly M., Wan-Jong Kim, Shawn P. Stapleton, Simon Fraser University Jong Heon Kim, K. University . (2004). Linearizing Power Amplifiers Using Digital Predistortion, EDA Tools and Test Hardware. High Frequency Design, High Frequency Electronics. AMPLIFIER LINEARIZATION
[20] J. de Mingo and A. Valdovinos. (1997). Amplifier linearization using a new digital predistorter for digital mobile radio systems. IEEE 47th Vehicular Technology Conf., vol. 2, 671–75
[21] A. Mansell and A. Bateman. (1994). Practical implementation issues for adaptive predistortion transmitter linearization. IEE, London, U.K., WC2R 0BL.
[22] Kathleen J. M., Mohsen K., Fellow, IEEE, and Rajeev K. (2000). Look-Up Table Techniques for Adaptive Digital Predistortion: A Development and Comparison. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 49, NO. 5
[23] R Singla and SK Sharma. (2012). Low complexity look up table based adaptive digital predistorter with low memory requirements. nication and Networking , EURASIP Journal on Wireless Commu Singla and Sharma EURASIP Journal on Wireless Communications and Networking
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

E-Portfolio Assessment for Learning: Ten Years Later – an Experience from an Outcome-Based University
Authors :- Abdallah Tubaishat
Keywords :- E-portfolio, Assessments, Learning Curriculum, Evaluation, Student Perspectives, Outcome-Based Higher Education.
Published Online :- 20 December 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]An e-assessment tool, dubbed e-portfolio can be an innovative tool that provide students with flexible opportunities to demonstrate the acquisition of skills and abilities in an outcome-based institution. An E-portfolio Assessment Management System (EAMS) has been developed and used to create, reflect, revise, and structure students’ work via digital medium. The system is a web-based e-portfolios which was developed in-house. It is a repository management system that facilitates collecting, sharing, and presenting artifacts of student learning outcomes via a digital medium. The rationale of the EAMS is to allow students to present a collection of items that represent their accomplishments in courses towards the satisfaction of pre-determined courses learning outcomes using a pedagogical web-based environment model. The system was built around two defined set of learning outcomes: institutionally agreed upon set of learning outcomes, and learning objectives that are related to major requirements. The purpose of this research is analyze students’ perceptions of using EAMS to support their learning and assessment in an outcome-based institution after ten years of implementation. The participants were 217 students in IT college. The results showed that the students had positive opinions about using e-assessment tool: It enhanced their learning through reflection; assisted them monitor their academic progress towards achieving their degree programs; helped them identify strength and weaknesses by reflecting on their work; and made assessments of artifacts more effective and efficient, hence according to students, the evaluation of students’ e-portfolios is a better way to assess students’ knowledge than using tests or exams. In conclusions, the e-assessment system has a significant and positive influence on self-perceived learning performance where students are accountable for their learning. Furthermore, our evaluation uncovered organizational, learning, and technological issues involved in moving from traditional approach of teaching learning toward an integrated learning system approach.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2015/01/E-Portfolio-Assessment-for-Learning.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Wheeler, B. C.(2014), E-Portfolio Project, Open Source e-Portfolio Release, Andrew W. Mellon Foundation, Version 2.0, Retrieved from: http://juicy.mellon.org/RIT/MellonOSProjects/%20e-Portfolio/Portfolio_Proposal_Public.doc.
[2] Paulson, F. L., Paulson, P. R., & Meyer, C.(1991). What makes a portfolio a portfolio? Educational Leadership, 48(5), 60-63.
[3] Buzzetto-More, N. (2006). The e-Learning and business education paradigm: Enhancing education, assessment, and accountability. Proceedings of the Maryland Business Education Association Conference. Ocean City, MD.
[4] Love, D., McKean, G., Gathercoal, P. 2004). Portfolios to Webfolios and Beyond: Levels of Maturation, EDUCAUSE Quarterly, 27, 2, 24 – 37.
[5] Siemens, G., e-Portfolios (2004). eLearnSpace: Everything ELearning, Retrieved from: http://www.elearnspace.org/Articles/e-Portfolios.htm.
[6] Amaya, P., Agudo, J., Samches, H., Rico, M., Hernandez-Linare (2013). Educational e-portfolio Uses and Tools, Social and Behavioral Sciences, 93(2013) 1169 – 1173.
[7] Wright, B. (2004). An assessment planning primer: Getting started at your own institution. 13th Annual Northeast Regional Teaching Workshop, October 1.
[8] Millar, R., and Morgane, W. (2009). The Benefits of E-Portfolios for Students and Faculty in Their Own Words. AAC&U, pp. 8-12, Winter.
[9] Chambers, S. and Wickersham, L. (2007). The Electronic Portfolio Journey: A Year Later. Education Journal, Vol. 127, No. 3, pp. 351-360.
[10] Lorenzo, G., & Ittelson, J. (2014). An Overview of e-Portfolios. Retrieved from http://www.case.edu/artsci/cosi/cspl/documents/eportfolio-Educausedocument.pdf.
[11] Gulbahar & Tinmaz (2006). Implementing Project-Based Learning And E-Portfolio Assessment In an Undergraduate Course, Journal of Research on Technology in Education, Volume 38, Issue 3.
[12] Ritzhaupt, A., Singh, O., Seyferth, M., Dedrick, T. (2008). Development of the Electronic Portfolio Student Perspective Instrument: An ePortfolio integration initiative, Journal of Computing in Higher Education, Volume 19, Issue 2, pp 47-71, Spring.
[13] Moya, S, O’Malley, J. (2009). A Portfolio Assessment Model for ESL. The Journal of Educational Issues of Language Minority Students, Vol. 13, pp. 13-36.
[14] Zayed University. Retrieved from http://www.zu.ac.ae.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

How Programmer Plans Training ?
Authors :- Jakub Novotný and Martina Winklerová
Keywords :- Sport watch, heart rate, applications, Suunto Apps, sport training.
Published Online :- 20 December 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]The paper describes the newest trend of small downloadable applications for high-end GPS sport watches. Basics facts from history of sport watches with monitoring of heart rate and basic facts about use of heart rate in sport training are mentioned. The concept of applications is demonstrated on the code of three Suunto Apps created by the authors of this paper. First demonstrated app called MINIMUM HR LOCATOR finds minimum hearth rate during measurement. Second app called FIND MAXIMAL HR – ENDURANCE RUNNERS guides athletes through exercise to find maximal heart rate. Last demonstrated app called FARTLEK TRAINING guides athletes through fartlek training controlled by current heart rate. All three apps were tested on appropriate device and published in App zone on portal moverscount.com. The paper concludes that there are limitations in simplicity and small range of Suunto Apps scripting language and the solution is highly proprietary only for one product line of devices. But in good combination of programming and sport training knowledge it can result in very effective extension in functionality of the sport watches.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2015/01/how-programmer-plans-training.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Garmin Blog. Retrieved from: http://garmin.blogs.com/my_weblog/2014/09/-introducing-connect-iq-the-first-ever-open-platformfor-
garmin-wearables.html#.VFXvhfmG_1Y (quoted 26. 9. 2014).
[2] Baum, P., Abadie, F. Market Developments – Remote Patient Monitoring and Treatment, Telecare, Fitness/Wellness and mHealth. (p.35). Luxembourg: Publications Office of the European Union, 2013. ISBN 978-92-79-25708-7.
[3] Parker, S. History of Heart Rate Monitors. Retrieved from: http://www.articlesbase.com/healtharticles/history-of-heart-rate-monitors-253755.html (quoted 29.7.2014).
[4] Polar.com. Retrieved from: http://www.polar.com/en/about_polar/who_we_are/innovations (quoted 29.7.2014)
[5] Máček, M., Radvanský J. Fyziologie a klinické aspekty pohybové aktivity: Fyziologie tělesné zátěže. Praha: Galén, 2011. ISBN 9788072626953.
[6] Máček, M., Radvanský, J. Fyziologie a klinické aspekty pohybové aktivity: Mechanismy působení pohybové aktivity, její nedostatek, detrénink. Praha: Galén, 2011. ISBN 9788072626953.
[7] Benson, R., Connolly, D. Heart rate training. Champaign: Human Kinetics, 2011. ISBN 978-0-7360-8655-4
[8] Suunto Apps, Developer manual. Version February 2014. Retrieved from:
http://dcjitw11p57ya.cloudfront.net/downloads/SuuntoAppZoneDeveloperManual6206759C5CFCCF15E08641C96E125185.pdf
[9] Ambit Smart Application. Retrieved from: http://www.movescount.com/groups/group5505-Ambit_Smart_Applications (quoted 31.8.2014)
[10] Connect IQ. Retrieved from:http://developer.garmin.com/connect-iq/overview/ (quoted 4.10.2014)
[11] MINIMUM HR LOCATOR 2. Retrieved from:http://www.movescount.com/apps/app10043382-MINIMUM_HR_LOCATOR_2
[12] FIND MAXIMAL HR – ENDURANCE_RUNNERS. Retrieved from:
http://www.movescount.com/apps/app10041528-FIND_MAXIMAL_HR_-_ENDURANCE_RUNNERS
[13] FARTLEK TR. Retrieved from:http://www.movescount.com/apps/app10043525-FARTLEK_TR
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

E-Business Qualitative Criteria Application Model: Perspectives of Practical Implementation
Authors :- Tadas Limba and Gintarė Gulevičiūtė
Keywords :- E-business, E-business qualitative criteria, E-busines qualitative criteria creation, E-busines qualitative criteria application model.
Published Online :- 23 May 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Constantly changing business environment makes the traditional business switch to electronic. One of the main problems in the development and implementation of e-business is e-business qualitative criteria uncertainty. Quality is a very important objective for both – business and customers. But there are no e-business qualitative criteria centrally and systematically analysed and defined in the theory, the selection as well as the evaluation of these criteria are not clear. There is discussed and analyzed question of creating e-business qualitative criteria In this paper. The aim of the paper is to create e-business qualitative criteria, to analyze the possibilities of their application and propose e-business qualitative criteria application model. The objectives are – to analyze theoretical aspects of e-business qualitative criteria creation and application; carry out a qualitative survey of e-business experts and analyze it’s data; analyze e-business qualitative criteria application model implementation possibilities and perspectives. Theoretical aspects of e-business qualitative criteria include e-business qualitative criteria formation guidelines. There were defined 4 e-business qualitative criteria: matching the value curve; orientation to the customer; information and data quality; creativity. The paper relies on scientific literature analysis, the qualitative research method and the method of dynamic modeling are applied as well. Also, there is carried out the theoretical narrative, systematic, comparative analysis. After analyzing theoretical aspects of e-business qualitative criteria, conducting e-business experts qualitative opinion survey and proposing e-business qualitative criteria, there was created a model of their application. E-business qualitative criteria application model includes the input – start of e-business, answering to added value curve questions, customer satisfaction analysis, the information, data quality analysis, level of creativity. After analyzing business in accordance with all e-business qualitative criteria, it can be seen what needs to be improved, and the direction in which to do so, because the output (high-quality e-business) will be achieved only when e-business in great extent or completely satisfy these criteria.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/05/IJACSIT-3301_Limba_Guleviciute.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Aburukbaa R., Masaud-Wahaishiab A., Ghenniwaa H., Shen W. (2009). Privacy-based Computation Model in E-business. International Journal of Production Research, Vol. 47, No. 17, 4885–4906.
[2] Aytulun S. K., Guneri A. F. (2012). Business Process Modelling with Stochastic Networks. International Journal of Production Research, Vol. 46, No. 10, 2743–2764.
[3] Balaraman P., Kosalram K. (2012). E-Commerce Evaluation and E Business Trends. Information Engineering and Electronic Business, Vol. 5, 9-16.
[4] Baležentis A., Žalimaitė M. (2011). Expert Assessments for the Development of Innovations in the Analysis of Factors: Lithuanian Innovative Companies Assessment. Management theory and studies for rural business and infrastructure development, No. 3 (27), 23-31.
[5] Basha M. S. S., Dhavachelvan P. (2011). Survey on e-business Models. International Journal of Engineering Science and Technology, Vol. 3, No. 5, 3631 – 3639.
[6] Brown G. H. The E-Commerce Imperative, 2013. Retrieved from
http://info.cassidyturley.com/blog/bid/294841/E-Commerce-Imperative-2013
[7] Chen S. (2001). Strategic Management of e-business. Wiley Editorial.
[8] Ding M. (2008). Perfect 10 v. Amazon.com: a Step toward Copyright’s Tort Law Roots. Berkeley Technology Law Journal, Vol. 23:373, 373–403.
[9] Donici A. N., Maha A., Ignat I., Maha L. G. (2012). E-Commerce across United States of America:Amazon.com. Economy Transdisciplinarity Cognition, Vol. 15, Issue 1, 252 – 258.
[10] Enders A., Jelassi T. (2009). Leveraging Multichannel Retailing: The Experience of Tesco.com. MIS Quarterly Executive, Vol. 8, No. 2, 89-100.
[11] Harris L., Dennis Ch. (2008). Marketing the e-Business. Routledge.
[12] Hsiao L., Chen Y. (2012). Returns Policy and Quality Risk in E-Business. Production and Operations Management, Vol. 21, No. 3, 489–503.
[13] Iqbal M., Khan A. A., Naseer Q. (2013). A Legal Perspective of e-businesses and e-marketing for Small and Medium Enterprices. International Journal of Managing Information Technology, Vol.5,No.1, 1–11.
[14] Jelassi T., Enders A. (2005). Strategies for e-business. Creating Value through Electronic and Mobile Commerce. Concepts and cases. Pearson Education Limited.
[15] Jin Kim Y., Kishore R., Sanders G. L. (2005). From DQ to EQ: Understanding Data Quality in the Context of e-business Systems. Communications of ACM, Vol. 48, No. 10, 75-81.
[16] Keblis M. F., Chen M. (2006). Improving Customer Service Operations at Amazon.com. Interfaces, Vol. 36, No. 5, 433–445.
[17] Kim W. Ch., Mauborgne R. (1999). Creating New Market Space. Harward Business Review, January – February, 83 – 93.
[18] Koronios A., Xu H. (2004-2005). Understanding Information Quality in e-business. Journal of Computer Information Systems, P. 73–82.
[19] Laudon K. C., Laudon J. P. (2007). Essentials of Business Information Systems. Seventh edition. Pearson Education.
[20] Libby R., Blashfield R. (1978). Performance of a Composite as a Function of a Number of Judges. Organizational Behavior and Human Performance, Vol. 21, 121-129.
[21] Milchev G. (2012). A Methodology for Managing the Effectiveness of Enterprise E-business Systems. Journal of the University of Chemical Technology and Metallurgy, Vol. 47, No. 2, 217-222.
[22] Mohamad R., Ismail N. A. (2013). The Extent of E-Business Usage and Perceived Cumulative Benefits: A Survey on Small and Medium-Sized Enterprises. Information Management and Business Review, Vol. 5, No. 1, 13-19.
[23] Mohanty R. P., Seth D., Mukadam S. (2007). Quality Dimensions of E-Commerce and their Implications. Total Quality Management, Vol. 18, No. 3, 219–247.
[24] Mudambi S. M., Schuff D. (2010). What Makes a Helpful Online Review? A Study of Costumer reviews on Amazon.com. MIS Quarterly, Vol. 34, No. 1, 185-200.
[25] Podvezko V. (2005). Experts Estimate Compatibility. Technological and Economic Development, Vol. 11, No. 2, 101- 107.
[26] Shetty V., Sarojadevi H. (2012). E-Business Performance Issues, Quality Metrics and Development Frameworks. International Journal of Computer Applications, Vol. 55, No.7, 42–47.
[27] Sidekerskienė T. Models Based System and Process Management. Retrieved from
http://www.personalas.ktu.lt/~tatside/studijos/Simucio/TSidekerskiene_MPSPV_pataisytos.ppt
[28] Sun H. (2010). Transferring Attributes of E-Commerce Systems into Business Benefits: a Relashionship Quality Perspective. Journal of Electronic Commerce Research, Vol. 11, No 2, 92 – 109.
[29] Tidikis R. (2003). Social Science Research Methodology. Vilnius: Lithuanian Law University Publishing Center.
[30] Zilber S. N., de Araśjo J. B. (2012). Small Companies Innovations in Emerging Countries: EBusiness Adoption and its Business Model. Journal of Technology Management&Innovation, Vol. 7, No. 2, 102-116.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

A UML Profile for Use Cases Multi-interpretation
Authors :- Mira Abboud, Hala Naja, Mohamad Dbouk and Bilal El Haj Ali
Keywords :- UML Views, Separation of concern, Personalization of users’ requirements, multi-interpreted use cases.
Published Online :- 30 May 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Decomposition is a crucial activity adopted when analyzing and designing complex software intensive systems. It allows to describe a system as a set of less complex models dedicated to different system aspects. In this field, UML proposes 5 related Views that help to understand the architecture of the system. Each one focuses on a particular aspect of the system. In this paper, an additional decomposition capability based on actors is introduced. The proposed approach is illustrated by a case study.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/05/UML-profile-for-UC-multi-interpretation.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] OMG. Unified modeling language (omg uml) infrastructure. Specification Document formal/2010-05-03, May 2005. http://www.omg.org/spec/UML/2.3/Infrastructure.
[2] Jacobson, I. e. a. The Unified Software Development Process. Addison Wesley, 1999.
[3] Larman, C. Applying UML and patterns. Prentice Hall, 2005.
[4] Ossher, H. and al. Subject-oriented composition rules. In OOPSLAS’95, pages 235–250, 1995.
[5] Kiczales, G. and All. Aspect-oriented programming. In ECOOP’97. Springler-Verlag, LNCS 1241, 1997.
[6] Mili, H., Elkharraz, and A. Mcheick, H. Concerned about separation. In the 2004 International Workshop on Early aspects, AOSD’04, pages 211–221. Prentice-Hall, 2004.
[7] Gacemi, A., Seriai, A., and Mourad Chabane, O. Code generation from Architectural Multi-views Description. Journal of Object Technology, JOT, 4(3), 2005.
[8] Naja, H. La représentation multiple d’objets pour l’ingénierie. L’objet– logiciel, bases de donnèes,réseaux., 4(2), 1998.
[9] Naja, H. Multiview databases for building modelling. Automation In Construction., 8, 1999.
[10] Anwar, A., Ebersold, S., Coulette, B., Nassar, M., and Kriouile, A. A Rule-Driven Approach for composing Viewpoint-oriented Models. Journal of Object Technology, JOT, 9(2), 2010.
[11] Nassar, M., El Asri, B., Coulette, B., and Kriouille, A. Vers un profil uml pour la conception de composants multivues. 11(4), 2005.
[12] Majumdar, D. and Swapan, B. Aspect Oriented Requirement Engineering: A Theme Based Vector Orientation Model. Journal of Computer Science, InfoComp. http://www.infocomp. ETH Zurich, 2010.
[13] Mili, H. and al. View programming: Towards a framework for decentralized development and execution of oo programs. In Proc. of TOOLS USA’ 99, pages 211–221. Prentice Hall, 1999.
[14] Group, I.A.W. Ieee recommended practice for architectural description of software-intensive systems. Technical report, Institute of Electrical and Electronics Engineers, NY, USA (September 2000).
[15] Sowa, J., Zachman, J. Extending and formalizing the framework for information systems architecture. IBM systems journal 31(3), pages 590-616, 1992.
[16] Kruchten, P. The 4+1 view model of architecture. Software, IEEE 12(6) (1995) 42-50.
[17] Rozanski, N., Woods, E. Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives. Addison-Wesley (Oct 2011).
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

A Grid-enabled Application for the Simulation of Plant Tissue Culture Experiments
Authors :- Florence I. Akaneme, Collins N. Udanor, Jane Nwachukwu, Chibuike Ugwuoke, Carl .E.A Okezie and Benjamin Ogwo
Keywords :- Explants, In Vitro, Micropropagation, Plant Tissue Culture, Simulation.
Published Online :- 07 June 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Plant Tissue culture is a method for plant propagation under in vitro conditions. Different types and parts of plants (known as explants) may be cultivated in vitro. These may be organs (roots, stems, shoot tips, leaves and fruit); tissues; cells (suspension cultures) and special tissues and organs such as embryos, anthers, pollen and protoplasts. Plant tissue culture is a laborious and time-consuming technique. Potentially, modeling or computer simulation can provide a useful method for gaining insight into these complex processes by reducing the time needed to screen numerous hormonal combinations. We present a simulation application based on multiple regression models deployed on a grid computing infrastructure. The application simulates the plant tissue culture experiments and predicts the amount and combinations of auxins and cytokinins needed to yield optimal growth of propagules. The results obtained from the simulation showed over 67% prediction accuracy as compared to the laboratory experiments.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/06/Gridsim-Paper-2.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Wikipedia, (2013) “Grid Computing”, en.wikipedia.org/wiki/Grid_computing. accessed on 26th September, 2013
[2] Foster, I and Kesselman, C (1998) “The Grid: Blueprint for a New Computing Infrastructure”, Morgan Kaufmann Publishers, San Francisco, CA, USA, 677pp.
[3] Senin, R. Groppetti, A. Rossi and D. Wallace. Integrating Manufacturing Simulation Tools Using Distributed Object Technology. 4th IEEE/IFIP International Conference on Information Technology for Balanced Automation Systems in Production and Transportation, Berlin, September 2000.
[4] Suri, R and Tomsicek, M Rapid Modeling Tools for Manufacturing Simulation and Analysis. Proceedings of the 20th Conference on Winter Simulation, San Diego, 1988.
[5] Pierik, R. L. M (1997) In vitro culture of higher plants, Kluwer Academic Publishers, Dordrecht, 348pgs
[6] Afreen F. (2006) “Temporary immersion bioreactors” In: Gupta S. D. and Ibaraki, Y (eds.) Plant Tissue Culture Engineering, Springer, Netherlands, pp 187 – 201.
[7] Sluis, C. J. (2006) “Integrating automation techniques with commercial micropropagation” In: Gupta S. D. and Ibaraki, Y (eds.) Plant Tissue Culture Engineering, Springer, Netherlands, pp 231 – 251.
[8] Warren, G (1991) The regeneration of plants from cultured cells and tissues In: Stafford, A and Warren, G (eds.), Plant Cell and Tissue Culture, John Wiley and Sons, Chichester, pp. 82 – 100.
[9] George, E. G and Sherrington, P. D (1984) Plant propagation by tissue culture: Handbook and Directory of Commercial Operations, Exegetics Ltd, Basingstoke, 709pp.
[10] Sathyanarayanan, (2010) “Understanding Plant Tissue Culture”
www.2indya.com/2010/03/19/business-in-plant-tissue-culture/…/1/. Accessed on 10th October, 2010.
[11] Bhojwani, S. S and Razdan, M. K. (1983) Plant Tissue Culture: Theory and Practice, Developments in Crop Science (5), Elsevier Science Publishers, New York, 502pp.
[12] Murashige, T and Skoog, F (1962) A revised medium for rapid growth and bioassays with tobacco tissue cultures. Physiol Plant, 15: 473 – 497j
[13] Prasad, V. S. S and Gupta, S. D (2006) “Applications and potentials of artificial neural networks in plant tissue culture” In: Gupta S. D. and Ibaraki, Y (eds.) Plant Tissue Culture Engineering, Springer,
Netherlands, pp47 – 67.
[14] Schenck, R.U and Hildebrandt, A. C (1977) Medium and Techniques for Induction and Growth of Monocotyledonous and Dicotyledonous Plant Cell Cultures, Can. J. Bot, 50: 199 – 204.
[15] Arnold, S and Eriksson, T (1977) Induction of adventitious buds on embryos of Norway Spruce grown in vitro Physiologia plantarum, 44: 283 – 287.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Clustering Evolutionary Computation for Solving Travelling Salesman Problems
Authors :- Tanasanee Phienthrakul
Keywords :- Evolutionary Computation, Gaussian Mixer Models, K-means Clustering, Traveling Salesman Problems
Published Online :- 07 June 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]This paper proposes the methods for solving the traveling salesman problems using clustering techniques and evolutionary methods. Gaussian mixer model and K-means clustering are two clustering techniques that are considered in this paper. The traveling salesman problems are clustered in order to group the nearest nodes in the problems. Then, the evolutionary methods are applied to each cluster. The results of genetic algorithm and ant colony optimization are compared. In the last steps, a cluster connection method is proposed to find the optimal path between any two clusters. These methods are implemented and tested on the benchmark datasets. The results are compared in terms of the average minimum tour length and the average computational time. These results show that the clustering techniques are able to improve the efficiency of evolutionary methods on traveling salesman problems. Moreover, the proposed methods can be applied to other problems.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/06/IJACSIT-CameraReady.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Al-Dulaimi, B.F., & Ali, H.A. (2008). Enhanced traveling salesman problem solving by genetic algorithm technique (TSPGA). Proceedings of World Academy of Science: Engineering & Technology, 40, 296-302.
[2] Leung, K.S., Jin H.D., & Xu, Z.B. (2004). An expanding self-organizing neural network for the traveling salesman problem. Neurocomputing, 62, 267–292.
[3] Masutti, T.A.S., & de Castro, L.N. (2009). A self-organizing neural network using ideas from the immune system to solve the traveling salesman problem. Information Sciences, 179(10), 1454–1468.
[4] Lo, C.C., & Hsu, C.C. (1998). Annealing framework with learning memory. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 28(5), 648-661.
[5] Jayalakshmi, G.A., & Sathiamoorthy, S. (2001). A hybrid genetic algorithm – A new approach to solve traveling salesman problem. International Journal of Computational Engineering Science, 2(2), 339–355.
[6] Tsai, H.K., Yang, J.M., Tsai, Y.F., & Kao, C.Y. (2003). Heterogeneous election genetic algorithms for traveling salesman problems. Engineering Optimization, 35(3), 297–311.
[7] Dorigo, M., & Gambardella, L.M. (1997). Ant colony system: A cooperative learning approach to the traveling salesman problem. IEEE Transactions on Evolutionary Computation, 1(1), 53-66.
[8] Liu, J.L. (2005). Rank-based ant colony optimization applied to dynamic traveling salesman problems. Engineering Optimization, 37(8), 831–847.
[9] Puris, A., Bello, R., & Herrera, F. (2010). Analysis of the efficacy of a two-stage methodology for ant colony optimization: Case of study with TSP and QAP. Expert Systems with Applications, 37(7), 5443–5453.
[10] Yang, J., Wu, C., Lee, H.P., & Liang, Y. (2008). Solving traveling salesman problems using generalized chromosome genetic algorithm. Progress in Natural Science, 18(7), 887-892.
[11] Liu, F., & Zeng, G. (2009). Study of genetic algorithm with reinforcement learning to solve the TSP. Expert Systems with Applications, 36(3), 6995–7001.
[12] Albayrak M., & Allahverdi, N. (2011). Development a new mutation operator to solve the traveling salesman problem by aid of genetic algorithms. Expert Systems with Applications, 38(3), 1313-1320.
[13] Laporte, G., & Palekar U. (2002). Some applications of the clustered travelling salesman problem. The Journal of the Operational Research Society, 53(9), 972–976.
[14] Anily, S., Bramel, J., & Hertz, A. (1999). A 5/3-approximation algorithm for the clustered traveling salesman tour and path problems. Operations Research Letters, 24(1), 29-35.
[15] Guttmann-Beck, N., Hassin, R., Khuller, S., & Raghavachari B. (1998). Approximation algorithms with bounded performance guarantees for the clustered traveling salesman problem. Lecture Notes in Computer Science, 1530, 6-17.
[16] Ding, C., Cheng Y., & He, M. (2007). Two-level genetic algorithm for clustered traveling salesman problem with application in large-scale TSPs. Tsinghua Science & Technology, 12(4), 459-465.
[17] Tan, P., Steinbach, M., & Kumar, V. (2006). Introduction to data mining. Boston: Pearson Addison Wesley.
[18] Bramer, M. (2007). Principles of data mining. London: Springer-Verlag.
[19] Dempster, A.P., Laird, N.M., & Rubin, D.B. (1977). Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B, 39(1), 1-38.
[20] Das, S., Abraham, A., & Konar, A. (2009). Metaheuristic Clustering. Berlin: Springer.
[21] Goldberg, D.E. (1989). Genetic algorithms in search, optimization, and machine learning. New York: Addison Wesley.
[22] Jadaan, O.A., Rajamani, L. & Rao, C.R. (2005). Improved selection operator for GA. Journal of Theoretical and Applied Information Technology (JATIT), 2005-2008, 269-277.
[23] IRIDIA University Libre de Bruxelles. Publications of ACO algorithms [Online] 06 March 2012. Available from: URL: http://www.aco-metaheuristic.org/publications.html [Accessed 15 December2012].
[24] TSPLIB. University of Heidelberg. Available from: http://comopt.ifi.uni-heidelberg.de/software/TSPLIB95/ [Accessed: October 2012].
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

An Agent Driven M-learning Application
Authors :- Collins N. Udanor and O.U. Oparaku
Keywords :- Agent, JADE, IMLS, M-learning
Published Online :- 07 June 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]The future of the web is on mobile devices. Application users have migrated from the desktop to the web. Now the next stage of the Web will be building apps and mobile UIs on top of our collective data. On the part of developers, application development is moving from object-oriented development to agent-oriented programming. This paper presents a fusion of these two trends in computing. The need for ubiquitous access to information and communication, as well as the portability of devices has prompted a lot of research interests in mobile technologies. One of such recent interests is in the field of mobile learning (M-learning), an offshoot of the more established e-learning. This paper presents the development of a multi-agent driven m-learning application using the Java Agent Development Environment (JADE).[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/06/IJACSIT-Paper-Format.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Fabio Bellifemine, Giovanni Caire, Dominic Greenwood (2007). Developing Multi-Agent Systems with JADE. John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England.
[2] Collins N. Udanor (2011). An Agent-based Model of Intelligent M-learning System. International Journal of Science and Advanced Technology. Volume 1 Number 5. Pages 65-73.
[3] Pasi Silander , Anni Rytkönen (2007) An Intelligent Mobile Tutoring Tool Enabling Individualisation of Students’ Learning Processes. Häme Polytechnic University of Applied Sciences and University of Joensuu, Finland (pasi.silander@hamk.fi) Department of Computer Science, University of Helsinki,
Finland (anni.rytkonen@cs.helsinki.fi)
[4] Sabbir Ahmed Kazi (2005). VocaTest: An Intelligent Tutoring System for Vocabulary Learning using the “mLearning” Approach. Centre for Research in Pedagogy and Practice National Institute of Education. Available on: http://conference.nie.edu.sg/paper/Converted%20Pdf/ab00283.pdf. Viewed on
20th March, 2010.
[5] Kinshuk, Taiyu Lin (2004). Improving mobile learning environments by applying mobile agent technology. Massey University, Palmerstone North, New Zealand. Available on: http://www.col.org/pcf3/papers/pdfs/kinshuk_lin_2.pdf. viewed 12th March, 2010.
[6] Toshiba (2005). Multi-Agent Framework for 100% Pure Agent System .Corporate Research & Development Center TOSHIBA Corporation. Available on:
http://www.toshiba.co.jp/rdc/beegent/index.htm. Viewed on 21st April. 2010.
[7] Peter Berking, Jason Haag, Thomas Archibald, Marcus Birtwhistle (2012). Mobile Learning: Not Just Another Delivery Method. Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) 2012
[8] Galit Botzer, Michal Yerushalmy2007). Mobile Application for Mobile Learning. (IADIS International Conference on Cognition and Exploratory Learning in Digital Age (CELDA 2007)
[9] Catalin Boja, Lorena Batagan (2009). Software Characteristics of M-Learning Applications. WSEAS Transactions on Computers, Volume 8, Issue 5, Pages 767-777
[10] Govind Seshadri. Understanding JavaServer Pages Model 2 architecture exploring the MVC design pattern. See:http://www. JavaWorld.com, viewed on 18th June, 2012.
[11] Kassim, A. A., Kazi, S. A. and Ranganath, S (2004)., “A Webbased Intelligent Learning Environment for Digital Systems”. International Journal for Engineering Education, Vol 20, No 1, pp 13-23.
[12] Stuart J. Russell and Peter Norvig (2003). Artificial Intelligence: A Modern Approach. Second Edition, Pearson
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Evolution of Utilizing Multiple Similarity Criteria in Web Service Discovery
Authors :- Hassan Azizi Darounkolaei and Seyed Yaser Bozorgi Rad
Keywords :- Web Service Discovery, Hybrid Matchmaking Web Service, Semantic Web Service, Text Similarity Criteria, Asymmetric Similarity Criteria, Ordered Weighted Averaging.
Published Online :- 27 June 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]With the increasing use of web service in distributed platforms such as the Internet, the importance of the discovery process improvements has been added. Hybrid matchmaker methods and semantic web service, have tried to improve it further. Efficiency of matchmakers that have used text similarity criteria for the purpose has largely depends on the selection criteria. Given the importance of this topic, main idea is simultaneous use of several similarity criteria in process of web service discovery that for this purpose, a method of using multiple similarity criteria for calculating the similarity between the input/output parameters of the web service, offered. Thus, improvements resulting from the performance of any of various similarity criteria can be aggregated and better overall results for the entire set of queries, obtained. Also, according to some characteristics of web services, two asymmetric similarity criteria, introduced. And a new method for aggregating similarity of input and output parameters of web services, provided. The result of applying the proposed method shows the best performance in general, compared with the result of applying the similarity criteria separately. Also compared with two matchmakers raised in this context, the proposed method has shown better performance.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/06/Evolution-of-Utilizing-Multiple-Similarity-Criteria-in-Web-Service-Discovery.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Junghans M, Agarwal S, Studer R. (2010). “Towards practical semantic web service discovery”. In: Proceedings of The Semantic Web: Research and Applications, 7th Extended Semantic Web Conference, ESWC 2010, Heraklion, Greece, pp. 15-29.
[2] Torma S, Villstedt J, Lehtinen V, Oliver I, Luukkala V. (2008). “Semantic Web Services — A Survey”. Helsinki: Helsinki University of Technology, Laboratory of Software Technology.
[3] Liu W, Wong W. (2009). “Web service clustering using text mining techniques”. International Journal of Agent-Oriented Software Engineering, Vol. 3, No. 1, pp. 6-26.
[4] Skoutas D, Sacharidis D, Simitsis A, Sellis T. (2010). “Ranking and clustering web services using multicriteria dominance relationships”. IEEE Transactions on Services Computing,Vol. 3, No. 3, pp. 163-177.
[5] Erl T, Karmarkar A, Walmsley P, Haas H, Yalcinalp U, Liu C. (2008). “Web Service Contract Design and Versioning for SOA”. Boston: Prentice Hall.
[6] Yu L. (2007). “Introduction to the Semantic Web and Semantic Web Services”. Boca Raton, Florida: Chapman and Hall/CRC.
[7] W3C. (2004). “Web Services Architecture”. Retrieved 2011-12-22, from http://www.w3.org/TR/wsarch/
[8] Fielding R. (2000). “Architectural Styles and the Design of Network-based Software Architectures”. Doctor of Philosophy, University of California, Irvine.
[9] Pautasso C, Zimmermann O, Leymann F. (2008). “RESTful Web Services vs. Big Web Services: Making the Right Architectural Decision”. In: Proceeding of the 17th international conference on World Wide Web (2008), Beijing, China, pp. 805-814.
[10] Garofalakis J, Panagis Y, Sakkopoulos E, Tsakalidis A. (2006). “Contemporary web service discovery mechanisms”. Journal of Web Engineering, Vol. 5, No. 3, pp. 265-290.
[11] Klusch M, Fries B, Sycara K. (2009). “OWLS-MX: A hybrid Semantic Web service matchmaker for OWL-S services”. Web Semantics: Science, Services and Agents on the World Wide Web, Vol. 7, No. 2, pp. 121-133.
[12] Klusch M, Kapahnke P. (2012). “Adaptive signature-based semantic selection of services with OWLSMX3”. Multiagent and Grid Systems,Vol. 8, No. 1, pp. 69-82.
[13] Nayak R, Lee B. (2007). “Web service discovery with additional semantics and clustering”. In: Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, WI 2007, Silicon Valley, USA, pp. 555-558.
[14] Kapahnke P, Klusch M. (2012). “Adaptive Hybrid Selection of Semantic Services: The iSeM Matchmaker”. In: Semantic Web Services, pp. 63-82: Springer Berlin Heidelberg.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Multi-Aspect Tasks in Software Education: a Case of a Recursive Parser
Authors :- Evgeny Pyshkin
Keywords :- Computer Science Education, Software, Syntactic Analysis, Software Structure, Task-Oriented Study.
Published Online :- 27 June 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]In this paper the task of parsing arithmetic parenthesis-free expressions parsing is investigated with special emphasis on their using in software education. As a kind of authentic problem from the areas of text processing and data structures, the task of recursive descent parser construction illustrates basic concepts of syntactic analysis and code execution. It is complex enough for explanation of parsing methods; it may be considered as an example of software characterized by the complexity of its logical structure. At the same time this task is still manageable to meet the academic requirements. In this paper we show how to introduce a synterm concept and describe an approach to lexer construction. We highlight parser source code constructions implementing grammar rules in a way that programming control structures match syntax diagram structures. Graphic formalisms are used to represent the source code structure independently of both an implementation language and a software paradigm. A variant of an object-oriented solution can serve as an example of relatively complicated entity relationship structure what makes it suitable for classroom discussion.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/06/IJACSIT-2014-pyshkin.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Shneiderman, B. (1980). Software Psychology: Human Factors in Computer and Information Systems. Winthrop Publishers.
[2] Burks, A. W., Warren, D. W., Wright, J. B. (1954). An analysis of a logical machine using parenthesisfree notation. Mathematical Tables and Other Aids to Computation, 8(46), 53-57.
[3] Gries, D. (1971). Compiler Construction for Digital Computers. John Wiley & Sons, Inc., New York, NJ, USA.
[4] Dahl, E. W., Dijkstra, E., Hoare, C. A. R., editors. (1972). Structured Programming. Academic Press Ltd., London, UK.
[5] Foster, J. M. (1970). Automatic syntactic analysis. Computer monographs. Mac Donald New York, London.
[6] Weingarten, F. W. (1973). Translation of computer languages. Holden-Day computer and information sciences series. Holden-Day, San Francisco, London, Toronto.
[7] Ward, S. A. & Halstead Jr., R. H. (1990) Computation Structures. MIT electrical engineering and computer science series. MIT Press.
[8] Iwama, F., Nakamura, T., Takeuchi, H. (2012). Constructing parser for industrial software specifications containing formal and natural language description. In Proceedings of the 34th International Conference on Software Engineering (ICSE), June 2012, 1012-1021.
[9] Aho, A. V. & Ullman, J. D. (1972). The Theory of Parsing, Translation, and Compiling. Prentice-Hall, Inc., Upper Saddle River, NJ, USA.
[10] Sommerville, I. (2010). Software Engineering (9th ed.). Addison-Wesley, Harlow, England.
[11] Pyshkin, E. (2011). Teaching programming: What we miss in academia. In 7th Central and Eastern European Software Engineering Conference in Russia (CEE-SECR), pages 1-6. IEEE.
[12] Greibach, S. A. (1964). Formal parsing systems. Commun. ACM, 7(8):499-504.
[13] Milne, I. & Rowe, G. (2002). Difficulties in learning and teaching programming views of students and tutors. Education and Information Technologies, 7(1), 55-66.
[14] Urquiza-Fuentes, J., Manso, F., Velázquez-Iturbide, J. Á., Rubio-Sánchez, M. (2011). Improving compilers education through symbol tables animations. In Proceedings of the 16th Annual Joint Conference on Innovation and Technology in Computer Science Education, ITiCSE ‘11, 203-207, New York, NY, USA.
[15] Mahoney, M. & Pedersen, J. (2010). Teaching compiler code generation: Simpler is better. SIGCSE Bull., 41(4), 30-34.
[16] Wirth, N. (1978). Algorithms + Data Structures = Programs. Prentice Hall PTR, Upper Saddle River, NJ, USA.
[17] Aho, A. V., Hopcroft, J. E., Ullman, J. (1983). Data Structures and Algorithms (1st ed.). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.
[18] Lekarev, M. F. (1993). Das graphische Verfahren der Software-Entwicklung für logisch komplizierte Anwendungen. In Fachhoshschule Hamburg Tech. Bericht.
[19] Knuth, D. E. (1984). Literate programming. The Computer Journal, 27(2), 97-111.
[20] Shopyrin, D. (2006). Multimethods implementation in C++ using recursive deferred dispatching. IEEE Software, 23(3), 62-73.
[21] Muschevici, R., Potanin, A., Tempero, E., Noble, J. (2008). Multiple dispatch in practice. In Proceedings of the 23rd ACM SIGPLAN Conference on Object-oriented Programming Systems Languages and Applications, OOPSLA ‘08, 563-582, New York, NY, USA.
[22] Solodkyy, Yu., Dos Reis, G., Stroustrup, B. (2012). Open and efficient type switch for C++. SIGPLAN Not., 47(10), 963-982.
[23] Liberman, N., Beeri, C., Kolikant, Y. B-D. (2011). Difficulties in learning inheritance and polymorphism. Trans. Comput. Educ., 11(1):4:1-4:23.
[24] Zendler, A., McClung, O. W., Klaudt, D. (2012). Content and process concepts relevant to computer science education: A cross-cultural study. International Journal of Research Studies in Computing, 1(2).
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Structured Stream Data Mining Using SVM Method as Basic Classifier Authors Hadi
Authors :- Hadi Barani Baravati, Javad Hosseinkhani, Solmaz Keikhaee, Javid Hosseinkhani Naniz
Keywords :- Spam Detection, Email Classification, Support Vector Machine.
Published Online :- 07 June 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Recently, the huge number of email spams has caused serious problems in essential email communication. In this paper, we describe the results of an empirical study on one spam detection method namely Support Vector Machines (SVMs). To conduct the study, first the recieved emails would be pre proccessed then stream data in order to learning the classification would be given to the proposed data miner system. The number of training data set with window based solution will be selected with default , W=100 , the first 100 data would be used as trainig set. each receieved email input to SVM to be classified in to 2 predefined classes named: Non spam, and Spam. A program is written that 4 different kinds of time window in order to SVM training are selected (100,200,500 and all the preset data or open window). The evaluation criteria include accuracy rate, recall, and precision rate. The results indicate that the approach has its pros and cons.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/10/IJACSIT-Paper-Format-3.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Matsumoto, Ryota, Du Zhang, and Meiliu Lu. “Some empirical results on two spam detection methods.” Information Reuse and Integration, 2004. IRI 2004. Proceedings of the 2004 IEEE International Conference on. IEEE, 2004.
[2] T. Joachims, Learning To Classify Text Using Support Vector Machines, Kluwer Academic Publishers,2002.
[3] E. Osuna, R. Freund, and E Girosi, Improved Training Algorithm for Support Vector Machines, Roc. IEEE NNSP’97, pp.276-285, 1997.
[4] J. C. Platt, Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines, Advances in Kernel Method: Support Vector Learning, by Scholkopf, Burges, and Smola, MIT Press, pp. 185- 208,1998.
[5] V. Vapnik, Estimation of Dependencies Based on Empirical Data, Springer-Verlag, New York, 1982.
[6] Moradi Koupaie, Hossein, Suhaimi Ibrahim, and Javad Hosseinkhani. “Outlier Detection in Stream Data by Machine Learning and Feature Selection Methods.” International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol 2 (2014): 17-24.
[7] B. Mozafari, H. Thakkar, and C. Zaniolo. Verifying and mining frequent patterns from large windows over data streams. In ICDE, 2008.
[8] F. Chu and C. Zaniolo. Fast and light boosting for adaptive mining of data streams. In PAKDD, volume 3056, 2004.
[9] H. Wang and et al. Mining concept-drifting data streams using ensemble classifiers. In SIGKDD, 2003.
[10] George Forman. Tackling concept drift by temporal inductive transfer. In SIGIR, pages 252–259, 2006.
[11] Yan-Nei Law, Haixun Wang, and Carlo Zaniolo. Data models and query language for data streams. In VLDB, 2004.
[12] A. Arasu, S. Babu, and J.Widom. CQL: A language for continuous queries over streams and relations. In DBPL, 2003.
[13] D. Abadi et al. Aurora: A new model and architecture for data stream management. VLDB Journal, 2003.
[14] H. Thakkar, B. Mozafari, and C. Zaniolo. Designing an inductive data stream management system: the stream mill experiences. In Scalable Stream Processing Systems, 2008.
[15] Weka 3: data mining with open source machine learning software in java. http://www.cs.waikato.ac.nz.
[16] Z. Tang and et al. Building data mining solutions with OLE DB for DM and XML analysis. SIGMOD Record, 2005.
[17] Tomasz Imielinski and Heikki Mannila. A database perspective on knowledge discovery. Commun. ACM, 1996.
[18] Thakkar, Hetal, Barzan Mozafari, and Carlo Zaniolo. “A data stream mining system.” Data Mining Workshops, 2008. ICDMW’08. IEEE International Conference on. IEEE, 2008.
[19] Tseng, Chi-Yao, and Ming-Syan Chen. “Incremental SVM model for spam detection on dynamic email social networks.” Computational Science and Engineering, 2009. CSE’09. International Conference on. Vol. 4. IEEE, 2009.
[20] J. Hovold. Naive bayes spam filtering using wordposition- based attributes. Proc. of the 2nd Conference on Email and Anti-Spam (CEAS), 2005.
[21] V. Metsis, I. Androutsopoulos, and G. Paliouras. Spam filtering with naive bayes – which naive bayes Proc. of the 3rd Conference on Email and Anti-Spam (CEAS), 2006.
[22] E. Blanzieri and A. Bryl. Evaluation of the highest probability svm nearest neighbor classifier with variable relative error cost. Proc. of the 4th Conference on Email and Anti-Spam (CEAS), 2007.
[23] H. Drucker, D. Wu, and V. N. Vapnik. Support vector machines for spam categorization. Proc. of the IEEE Transactions on Neural Networks, pages 1048–1054, 1999.
[24] K. M. Schneider. Brightmail url filtering. Proc. of the MIT Spam Conference, 2004.
[25] M. Dredze, R. Gevaryahu, and A. Elias-Bachrach. Learning fast classifiers for image spam. Proc. Of the 4th Conference on Email and Anti-Spam (CEAS), 2007.
[26] R. Clayton. Email traffic: A quantitative snapshot. Proc. of the 4th Conference on Email and Anti-Spam (CEAS), 2007.
[27] P. O. Boykin and V. Roychowdhury. Leveraging social networks to fight spam. Proc. of the IEEE Computer, 2005.
[28] P.-A. Chirita, J. Diederich, and W. Nejdl. Mailrank: Using ranking for spam detection. Proc. of the 14th ACM International Conference on Information and Knowledge Management (CIKM), pages 373–380, 2005.
[29] B. Taylor. Sender reputation in a large webmail service. Proc. of the 3rd Conference on Email and Anti- Spam (CEAS), 2006.
[30] S. Hershkop and S. J. Stolfo. Combining email models for false positive reduction. Proc. of the 11thACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pages 98–107, 2005.
[31] T. R. Lynam and G. V. Cormack. On-line spam filter fusion. Proc. of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 123–130, 2006.
[32] R. Segal. Combining global and personal anti-spam filtering. Proc. of the 4th Conference on Email and Anti-Spam (CEAS), 2007.
[33] H.-Y. Lam and D.-Y. Yeung. A learning approach to spam detection based on social networks. Proc. Of the 4th Conference on Email and Anti-Spam (CEAS), 2007.
[34] L. H. Gomes, R. B. Almeida, L. M. A. Bettencourt, V. Almeida, and J. M. Almeida. Comparative graph theoretical characterization of networks of spam and legitimate email. Proc. of the 2nd Conference on Email and Anti-Spam (CEAS), 2005.
[35] J. Golbeck and J. Hendler. Reputation network analysis for email filtering. Proc. of the 1st Conference on Email and Anti-Spam (CEAS), 2004.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Models for Integrating Social Networking in Higher Education
Authors :- Andreas Veglis
Keywords :- Social networking, higher education, Facebook, twitter.
Published Online :- 21 July 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Today Information and Communications Technologies have been adopted in every level of education. Social networking services are one of the most widely used Web 2. Services. The aim of this paper is to study the use of social networking in higher education. Specifically it will investigate the advantages and the disadvantages of employing social networking in higher education. Furthermore the paper discusses methods for integrating social networking in higher education. The most prominent social networking services, namely, Facebook and Twitter are presented and discussed.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/07/paper_Veglis.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Hirtz, S. (2008). Education for a Digital World: Advice, Guidelines, and Effective Practice from Around the Globe. Commonwealth of Learning.
[2] Veglis, A. (2012). Using Web 2.0 tools in the Department of Journalism & Mass Media Communication – Educational practices and perspectives. presented in the Scientific Workshop on “Undergraduate education and educational practices in Aristotle University of Thessaloniki (in Greek), April.
[3] Delich, P., Kelly, K., & Mclntosh, D. (2008). Emerging Technologies in E-learning, Education for a Digital World. Commonwealth of Learning.
[4] Tavangarian D., Leypold M., Nölting K., & Röser M. (2004). Is e-learning the Solution for Individual Learning? Journal of e-learning.
[5] Usluel, Y.K., & Mazman, S.G. (2009). Adoption of Web 2.0 tools in distance education. Procedia Social and Behavioral Sciences 1, 818-823.
[6] Downes, S. (2005). E-Learning 2.0. eLearn Magazine, October. Retrieved from
http://elearnmag.acm.org/featured.cfm?aid=1104968.
[7] Blees, I., & Rittberger, M. (2009). Web 2.0 Learning Environment: Concept, Implementation, Evaluation. eLearning Papers. No 15, June.
[8] Boyd, D.M., & Ellison, N.B. (2008). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, Volume: 13, Issue: 1, 210-230.
[9] Observatory for digital Greece (2011). Internet use in Greece. Report.
[10] Bosch, T. (2009). Using online social networking for teaching and learning: Facebook use at the University of Cape Town. Communicatio: South African Journal for Communication Theory and Research, 35:2, 185-200.
[11] Franklin, T., & Van Harmelen, M. (2007). Web 2.0 for Content for Learning and Teaching in Higher Education, Fanklin Consulting and Mark van Hermelen
[12] Anderson P. (2007). What is Web 2.0? Ideas, technologies and implications for education. JISC Technology and Standards Watch. February.
[13] Bartolome, A. (2008). Web 2.0 and New Learning Paradigms. eLearning Papers No 8, June.
[14] Redecker, C., Alla-Mutka, K., Bacigalupo, M., Ferrari, A., & Punie, Y. (2009). Learning 2.0 The Impact of Web 2.0 Innovations on Education and Training in Europe. Final Report, Institute for Prospective Technological Studies. Retrieved from http://ftp.jrc.es/EURdoc/JRC55629.pdf
[15] Vance, A. (2012). Facebook: The Making of 1 Billion Users. Bloomberg Business week, October 04. Retrieved from http://www.businessweek.com/articles/2012-10-04/facebook-the-making-of-1-billionusers
[16] Susilo, A. (2008). Use of Facebook for Academic network learning in Universitas Terbuka-Indonesia. AAOU Journal, vol. 3, no 2, September, 99-114. Retrieved from http://lppm.ut.ac.id/htmpublikasi/03aauo32.pdf
[17] An, J., Cha, M., Gummadi, K., and Crowcroft, J. (2011). Media landscape in Twitter : A world of new conventions and political diversity. Artificial Intelligence, Volume: 6, Issue 1, 18-25.
[18] Saeed, N. & Sinnappan, S. (2011). Adoption of Twitter in higher education – a pilot study. In G. Williams, P. Statham, N. Brown & B. Cleland (Eds.), Changing Demands, Changing Directions. Proceedings ascilite Hobart 2011. (pp.1115-1120).
[19] Veglis, A. (2012). Journalism and Cross Media Publishing: The case of Greece. In E. Siapera & A. Veglis (Ed.), The Wiley-Blackwell Handbook of Online Journalism (pp. 209-230). Blackwell Publishing.
[20] Faculty-Focus. (2010). Twitter in higher education 2010: Usage habits and trends of today‘s college faculty. Annual Survey on the Popular Microblogging Technology. Retrieved from http://www.facultyfocus.com/free-reports/twitter-in-higher-education-2010-usage-habits-and-trends-oftodays-college-faculty/
[21] Thompson, J. (2007). Is education 1.0 ready for web 2.0 students? Innovate Journal of Online Education, Vol. 3, No. 4.
[22] Watson, W.R., Watson, S.L., (2007). An Argument for Clarity: What are Learning Management Systems, What are They Not, and What Should They Become? TechTrends, March/April, Vol. 51, No 2,pp. 28-34.
[23] Stutzman, F. (2008), The vibrancy of online social space, In B. Rigby (Ed.), Mobilizing generation 2.0: a practical guide to using web 2.0 technologies to recruit, engage & activate youth. New York, NY:
Jossey-Bass.
[24] Cohen, E. (2010). Is the LMS Dead?. Chief Learning Officer, October.
[25] Johnson, B. (2012). This why Google is losing the future. GIGAOM, March, 16th. Retrieved from http://gigaom.com/2012/03/16/this-is-why-google-is-losing-the-future/
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Wireless Sensor System According to the Concept of IoT -Internet of Things-
Authors :- Juan Felipe Corso Arias ,Yeison Julian Camargo Barajas and juan Leonardo Ramirez Lopez
Keywords :- IoT, Petri, PLC, SWI.
Published Online :- 26 August 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]This article presents the design of a wireless communication system, responding to the sensor concept applied to a scaled industrial process where temperature variables were used. The sensors are connected to the internet (IoT) to be monitored remotely from anywhere in the world. The sensor data is downloaded from the cloud using a graphical programming platform to control and communicate the system with a programmable logic controller (PLC), which performs the actions according to the temperature value (set point) of the sensors. The monitoring process was performed with a SCADA system and the modeling of the communication system was performed using the formalism of Petri nets, as a system that responds in terms of discrete events.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/08/Wireless-SensorNetworkIoT_CameraReady2.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] S. Cesar San Martin, F. Torres, R. Barrientos, and M. Sandoval, “Monitoreo y control de temperatura
de un estanque de agua entre chile y España usando redes de alta velocidad,” REVISTA FACULTAD DE INGENIERÍA, UTA (CHILE), vol. 11, no. 1, pp. 41–46, 2003.
[2] L. Hou and N. Bergmann, “Novel industrial wireless sensor networks for machine condition monitoring and fault diagnosis,” Instrumentation and Measurement, IEEE Transactions on, vol. 61, no. 10, pp. 2787–2798, 2012.
[3] Z. Ke, L. Yang, X. Wang-hui, and S. Heejong, “The application of a wireless sensor network design based on zigbee in petrochemical industry field,” in Intelligent Networks and Intelligent Systems, 2008. ICINIS ’08. First International Conference on, 2008, pp. 284–287.
[4] G. Cena, A. Valenzano, and S. Vitturi, “Wireless extensions of wired industrial communications networks,” in Industrial Informatics, 2007 5th IEEE International Conference on, vol. 1, 2007, pp. 273–278.
[5] K. Koumpis, L. Hanna, M. Andersson, and M. Johansson, “Wireless industrial control and monitoring beyond cable replacement,” in Proc.2nd PROFIBUS Int. Conf., Coombe Abbey, Warwickshire, UK, 2005.
[6] S. Trikaliotis and A. Gnad, “Mapping wirelesshart into profinet and profibus fieldbusses,” in Emerging Technologies Factory Automation, 2009. ETFA 2009. IEEE Conference on, 2009, pp. 1–4.
[7] Siemens, “Profinet the industrial Ethernet standard for automation,” 8th IEEE International Workshop on Factory Communication Systems COMMUNICATION in AUTOMATION, 2007. [Online]. Available: http://wfcs2010.loria.fr/files/Siemens.pdf
[8] D. Miorandi, E. Uhlemann, S. Vitturi, and A. Willig, “Guest editorial: Special section on wireless technologies in factory and industrial automation, part i,” Industrial Informatics, IEEE Transactions on, vol. 3, no. 2, pp. 95–98, 2007.
[9] J. Antony, B. Mahato, S. Sharma, and G. Chitranshi, “A web plc using distributed web servers for data acquisition and control: Wed based plc,” in Information Science and Applications (ICISA), 2011 International Conference on, 2011, pp. 1–4.
[10] J.-S. Lee and P.-L. Hsu, “An improved evaluation of ladder logic diagrams and petri nets for the sequence controller design in manufacturing systems,” The International Journal of Advanced Manufacturing Technology, vol. 24, no. 3-4, pp. 279–287, 2004. [Online]. Available: http://dx.doi.org/10.1007/
[11] R. Zurawski and M. Zhou, “Petri nets and industrial applications: A tutorial,” Industrial Electronics, IEEE Transactions on, vol. 41, no. 6, pp.567–583, 1994.
[12] L. Gomes, A. Costa, J. Barros, R. Pais, T. Rodrigues, and R. Ferreira, “Petri net based building automation and monitoring system,” in Industrial Informatics, 2007 5th IEEE International Conference on, vol. 1, 2007, pp. 57–62.
[13] X. Fu, Z. Ma, Z. Yu, and G. Fu, “On Wireless sensor networks formal modeling based on Petri nets,” in Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conf.
[14] J. CERVANTES, “Representacion y aprendizaje de conocimiento con redes de petri difusas,” 2005.
[15] Corso, F.; Camargo, Y.; Ramirez, L., “Wireless Sensor System According to the Concept of IoT – Internet of Things-,” Computational Science and Computational Intelligence (CSCI), 2014 International Conference on , vol.1, no., pp.52,58, 10-13 March 2014
[16] Woped at http://www.woped.org/
[17] L. Palopoli, R. Passerone, and T. Rizano, “Scalable offline optimization of industrial Wireless sensor networks,” Industrial Informatics, IEEE Transactions on, vol. 7, no. 2, pp. 328–339, 2011.
[18] V. Jacobson, “Pathchar: A Tool to Infer Characteristics of Internet Paths,” ftp://ftp.ee.lbl.gov/pathchar/,
[19] Smokeping at http://oss.oetiker.ch/smokeping/
[20] N. V. Mnisi, O. Oyedapo, and A. Kurien, “Active throughput estimation using rtt of differing icmp packet sizes,” in Broadband Communications, Information Technology Biomedical Applications, 2008 Third International Conference on, 2008, pp. 480–485.
[21] Mnisi, N. V.; Oyedapo, O.J.; Kurien, A, “Active Throughput Estimation Using RTT of Differing ICMP Packet Sizes,” Broadband Communications, Information Technology & Biomedical Applications, 2008 Third International Conference on , vol., no., pp.480,485, 23-26 Nov. 2008
[22] Y. Huang and G. Li, “Descriptive models for internet of things,” in Intelligent Control and Information Processing (ICICIP), 2010 International Conference on, 2010, pp. 483–486.
[23] Q. Zhu, R. Wang, Q. Chen, Y. Liu, and W. Qin, “Iot gateway: Bridgingwireless sensor networks into internet of things,” in Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conf.
[24] A. Williams. (2011, April) How the internet of things helps us understand radiation levels. [Online].
Available: http://readwrite.com/2011/04/01/ow-theinternet- of-things-help
[25] F. de la innovacion Bankinter, “El internet de las cosas.”
[26] C. Alcaraz, P. Najera, J. Lopez, and R. Roman, “Wireless sensor networks and the internet of things: Do we need a complete integration?” in 1st International workshop on the security of The internet of Things (SecIoT), 2010.
[27] A. Lakshmi, B. Sangeetha, A. Naveenkumar, B. Ganesh, and N. Bharathi, “Experimental validation of pid based cascade control system through scada-plc-opc interface,” in Computer Communication and Informatics (ICCCI), 2012 International Conference on, 2012, pp. 1–4.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Impact of Strategic Management Element in Enhancing Firm’s Sustainable Competitive Advantage. An Empirical Study of Nigeria’s Manufacturing Sector
Authors :- Yahaya Sani and Abdel-Hafiez Ali Hassaballah
Keywords :- Strategy, Competitive Advantage, Sustainable Competitive Advantage and Innovation.
Published Online :- 18 February 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]The purpose of this study is to investigate the impact of strategy implementation and control as independent variable in enhancing firm’s sustainable competitive advantage through innovation as the dependent variable in the Nigeria’s manufacturing sector. Data were collected through personal questionnaire from166 manufacturing firms in Nigeria who are members of manufacturing association of Nigeria within North West and North central zones with 70% response rate. The results indicate that there is positive and significant relationship between strategic management elements; implementation and control with sustainable competitive advantage; innovation. According to the result manufacturers in Nigeria fully agree that strategy control is essential when a unique strategy has been implemented so as to successfully enhance sustainable competitive advantage. This study adds Knowledge to the theory and practice of sustainable competitive advantage particularly in Nigeria’s manufacturing firms. Its theoretical and empirical significance adds more insight on the previous empirical studies in the field that is to say it gives guidelines to manufacturers in Nigeria on the impact of strategic management approaches on sustainable competitive advantage. For government and firms, the study provides avenue of enhancing sustainable competitive advantage in Nigeria and Africa as a whole since the phenomena is general.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2012/07/Impact-of-Strategic-Management-Element-in-Enhancing-Firm%E2%80%99s-Sustainable-Competitive-Advantage.-An-Empirical-Study-of-Nigeria%E2%80%99s-Manufacturing-Sector.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Ajayi, I. (1990). Nigeria: The Trapped Economy. Ibadan- Nigeria: Heinemann Educational Books Ltd.
[2] Alderson, W. (1965), Dynamic Marketing Behavior: A Functionalist Theory of Marketing. Homewood, IL: Richard D. Irwin, Inc.
[3] Aluko, M.A.O., Akinola, G.O. and Fatakun, S. (2004). “Globalization and the Manufacturing Sector: a Study of Some Selected Textiles Firms in Nigeria”. Journal of social science, Vol. 9 No. 2, pp 122-127.
[4] Amint, R. and Schoemaker, P. (1993), “Strategic assets and organizational rent”, Strategic Management Journal, 14:33-36
[5] Analoui, F. (1999), Effective Human resources development: a challenge for developing Countries Aldershot: Ashgate.
[6] Barney, J. B. (1991a), “Firm resources and sustained competitive advantage”, Journal of Management, 17: 99-120.
[7] Barney, J. B. (1994). Bringing managers back in: A resource-based analysis of the role of Managers in creating and sustaining competitive advantaged for firms in Does Management matters? On Competency and competitive advantage. The 1994 Crawford lectures: 1-36. Lund University, Institute of Economic Research.
[8] Barney, J. B.( 2001), “Is the resource-based view a useful perspective for strategic management research? Yes. Academy of management Review, 26: 41-56
[9] Burden, R. and Practor, T. (2000), “Creating Sustainable competitive advantage trough training”, Team performance management, vol.6, No. 5/6, pp.90-97
[10]Daily Trust (2010). Editorial. Vol. 18, No. 94, April 24, p 1.
[11] Dess. G. G. and Lumpkin, G. T. (2003), Strategic Management. McGraw – Hill Irwin New York.
[12]Fahy, J. (2000), “The resource-based view of the firm: some stumbling blocks on the road to Understanding sustainable competitive advantage”, Journal of European industrial training, pp.94-104
[13] Gupta, A, and McDaniel, J, (2002), “Creating competitive advantage by effectively managing Knowledge: A framework for knowledge management” Journal of knowledge Management practice,
[14] Hall, W. K. (1980), “Survival Strategies in a Hostile Environment.” Harvard Business Review 58 (September-October): 75-85.
[15] Henderson, B. (1983), “The Anatomy of Competition.” Journal of Marketing 47 (spring): 7-11.
[16] Hussam, A.A. and Raef, T. H. (2010), “Strategic planning-firm performance linkage: empirical investigation from an emergent market perspective”, Advance in competitiveness Research Annual, 2007.
[17] Helfat, C.E., Finkelstein, S., Mitchell, W., Peteraf, M.A., Singh, H., Teece, D. J., and Winter, S. G. (2007), Dynamic capabilities: Understanding strategic change in organizations. New York: John Wiley.
[18] Hoffmann, P. (2000) “An examination of the “Sustainable competitive Advantage Concept: Past, present and future” .http/nhoffmal@bcc.cba.ua.edu
[19] Jeroen, K., Spender, J. C., and Aard, G. (2010), “The Resource-Based View: A Review of Its Critiques” Journal of Management 36:349.
[20] Lahteenmaki, S., Storey, J, and Vanhala, S. (1998). “Human resources management and company performance: The use of measurement and influence of economic cycles” Human resources management journal, vol. 8, No. 2 pp.51-65
[21] Mabey, C., Salman, G. and Storey, J. (1998), Strategic human resource management, London: SAGE Publications
[22] Newbert, S.L. (2008) “Value, rareness, competitive advantage, and performance: A conceptual-level empirical investigation of the resource-based view of the firm” Strategic management Journal, 29(7),745-768.
[23] O’Shannassay, T (2008) “Sustainable competitive advantage or temporary competitive advantage: Improving understanding of an important strategy construct”, Journal of strategy and management vol.1 No.2. Pp.168-180.
[24] Pearce, J. A., and Robinson, R. B. (2003), Strategic Management: Formulation, Implementation, and Control. McGraw – Hill Irwin. New York.
[25] Pearce, J. A., and Robinson, R. B. (2007), Strategic Management: Formulation, Implementation, and Control. McGraw – Hill Irwin. New York.
[26] Sagagi, M.S. (2004). Globalization, International Competition and Corporate Strategy: An Analysis of Textile Industry in Northern Nigeria. A PhD. Thesis submitted to Usman Danfodio University, Sokoto-Nigeria (Unpublished).
[27] Sekaran, U. (2000). Research in methods for business: a skill-building approach. John Wiley & Sons
[28] Schemerhorne, J. F. (2001), Management. 6th Edition. John Wiley & Sons. New York.
[29] Snell, B. (2002), Management. 5th Edition. McGraw – Hill International edition.
[30] Tahir, K.B. (2010). Globalization and Nigeria’s economic development: Rethinking Nigeria’s trade and industrial policy. ABGA International conference Malaysia.
[31] Thompson, AA., Strickland, AJ., and Gomble, JE. (2005). Crafting and executing strategy: The for competitive advantage. 14th edition. Mc Grew – Hill international edition New York.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

A Co-modal Transport Information System in a Distributed Environment
Authors :- Zhanjun Wang, Khaled Mesghouni and Slim Hammadi
Keywords :- Assignment, co-modal transport, distributed network, EAs, optimization.
Published Online :- 19 February 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]This paper is aimed at presenting a transport information system that is dedicated to the co-modal transportation services. The problem is formulated with a three layers model and this work concentrates on the second layer — the assignment of the vehicles on each section of the itineraries. In terms of cost, travel time and other criteria, the optimization for choosing the best route for each request is implemented with Evolutionary Algorithms (EAs) and local search algorithm for the allocation of limited transportation resource. A special encoding method is developed to adapt the concerned problem and the operators for EAs are also detailed. With the aggregation approach, the fitness function is defined for EAs. According to the size of requests and the characteristics of the problem, an appropriate algorithm will be selected. With respect to users’ preferences and availability of vehicles, the simulation is provided in this contribution to illustrate the proposed method.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2012/07/A-Co-modal-Transport-Information-System-in-a-Distributed-Environment.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] European Commission. European transport policy for 2010: time to decide. White Paper.
[2] Florez-Mendez, R. A. (1999). Toward a Standardization of Multi-Agent System Frameworks. In ACM Crossroads Student Magazine, Canada.
[3] Green, S., Hurst L., Nangle, B., Cunningham, P., Somers, F., Evans, R. (1997). Software agents. A review, TSC-CS-1997-06, Trinity Collège Dublin, roadcom Eireann research Ltd.
[4] Kamoun, M. A., Uster, G., Hammadi, S. (2005). An agent-based cooperative information system for multi-modal travelers route computation. Systems, Man and Cybernetics, 2005 IEEE International Conference on, 21,162-67.
[5] Modesti, P., & Sciomachen, A. (1998). A utility measure for finding multi-objective shortest paths in urban multimodal transportation networks. European Journal of Operation Research, 111(3), 495-508.
[6] Wang, J., & Kaempke, T. (2004). Shortest route computation in distributed systems. Computers & Operations Research, 31(10), 1621-33.
[7] Wang, J., & Kaempke, T. (2006). The fastest itinerary in time-dependent decentralized travel information systems. Journal of Combinatorial Optimization, 12(3), 167-185.
[8] Sghaier, M. (2011). Combinaison des techniques d’optimisation et de l’intelligence artificielle distribuée pour la mise en place d’un système de covoiturage dynamique (Doctoral dissertation, Ecole Centrale de Lille). Retrieved from http://www.theses.fr/2011ECLI0021
[9] Ayed, H., Galvez-Fernandez, C., Habbas, Z., Khadraoui, D. (2011). Solving time-dependent multimodal transport problems using a transfer graph model. Computer & Industrial Engineering. 61(2), 391-401
[10] Jeribi, K., Zgaya, H., Zoghlami, N., Hammadi, S. (2011). Distributed architecture for a co-modal transport system. In Systems, Man, and Cybernetics, 2011 IEEE International Conference on 2797-2802.
[11] Jeribi, K., Mejri, H., Zgaya, H., Hammadi, S. (2011). Distributed graphs for solving co-modal transport problems. Intelligent Transportation Systems (ITSC), 14th International IEEE Conference on, 1150-55.
[12] Ishibuchi, H., & Murata T. (1998). A multi-objective genetic local search algorithm and its application to flowshop scheduling. IEEE Transactions on System, Man and Cybernetics, 28(3), 392-403.
[13] Ulungu, E.L., & Teghem, J. (1994). Multi-objective combinatorial optimization problem: a survey. Journal of multi-criteria Decision Analysis, 3, 83-101.
[14] Michalewicz, Z., & Schoenauer, M. (1996). Evolutionary algorithms for constrained parameter optimization problems. Evolutionary Computation, 4(1), 1-32.
[15] Whitley, D. (1994). A genetic algorithm tutorial. Statistics and Computing, 4, 65-85.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Online Brand Experience Creation Process Model: Theoretical Insights
Authors :- Tadas Limba, Mindaugas Kiskis and Virginija Jurkute
Keywords :- Online brand, brand experience, consumer experience, marketing mix, online brand experience building blocks.
Published Online :- 24 April 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Many brands are turning digital due to the changing market requirements and consumer demands. In order to digitize the brand, it is not enough just to move the brand to the electronic environment. Marketing plans and other brand activities shall be revised and adopted to the electronic environment. The focal point for the digital transformation of the brand is the online brand experience. It is increasingly recognized as a vital tool for the success of the brand. The impact of brand experience on the consumer trust and loyalty is empirically proven and explained in existing research, however the process of the online brand experience building is not well understood and in practice based on trial-and-error rather than research framework.This paper studies conceptual issues of the online brand building. Online brand experience concept is examined in order to set the framework for the online brand creation model. The study reveals that online brand experience may be based on the traditional brand experience models, that is – consumer’s perceptions and responses to brand evoked stimuli. This definition is assumed for further analysis of the online brand creation process. Comparative analysis of existing brand experience creation models allows identification of the main building blocks and creation steps for the online brand experience. The paper concludes that online brand experience creation is based on the adaptation of the traditional marketing models (“4P” marketing elements) to the specifics of the online environment and processes. The modified model nicknamed 3PoP is proposed. The 3PoP model embraces the 3 traditional P’s – product, place, people, filtered through the online process as the core of the online brand creation. The 3PoP model enables further research and management applications leading to the holistic online brand experience.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/04/IJACSIT-Paper-3220.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Aaker J. L. (1997). Dimension of Brand Personality. Journal of Marketing Research, Vol. 34 (August), 347–56.
[2] Atwal G., Williams A. (2009). Luxury brand marketing — The experience is everything! Journal of Brand Management, Vol. 16 No. 5/6, 338 – 346.
[3] Barwise P. (2003). Preface. In Clifton et all. 2003. Brands and Branding. The Economist. Retrieved from<http://appsler.com/186197664X.pdf#page=114>.
[4] Blackett T. (2003). What is a brand? In Clifton et all. 2003. Brands and Branding. The Economist. Retrieved from: <http://appsler.com/186197664X.pdf#page=114>.
[5] Brakus J. J., Schmitt B. H., and Zarantonello L. (2009). Brand Experience: What Is It? How Is It Measured? Does It Affect Loyalty? Journal of Marketing, Vol. 73, 52 – 68.
[6] Brodie R. J., Whittome J. R. M., Brush G. J. (2009). Investigating the service brand: A customer value perspective. Journal of Business Research, Vol. 62, 345 – 355.
[7] Brymer Ch. (2003). What makes brands great. In Clifton et all. 2003. Brands and Branding. The Economist. Retrieved from: <http://appsler.com/186197664X.pdf#page=114>.
[8] Carpenter P. (2000). EBrands: Building an Internet Business at Breakneck Speed. Harvard: Harvard Business School Press Books.
[9] Chaffey D., Mayer R., Johnston K., Ellis-Chadwick F. (2000). Internet Marketing. Harlow: FT Prentice Hall.
[10] Chaffey D., Ellis-Chadwick F., Mayer R., Johnston K. (2006). Internet Marketing: Strategy, Implementation and Practice, 3rd edition. Pearson Education Limited.
[11] Charlton Ch. (2013). Find success through great online brand experiences. Retrieved from: <http://www.equestriancreativenetwork.com/news-stories/find-success-through-great-online-brandexperiences-1206>.
[12] Christodoulides G., de Chernatony L. (2004). Dimensionalising on- and offline brands composite equity. Journal of Product & Brand Management, Vol. 13, No. 3, 168 – 179.
[13] Constantinides E . (2004). Influencing the online consumer’s behavior: The Web experience. Internet Research, Vol. 14, No. 2, 111 – 126.
[14] Davidaviciene V., Gatautis R., Paliulis N., Petrauskas R. (2009). Electronic business. Vilnius: VGTU.
[15] De Chernatony L. (2000). Succeeding with brands on the internet. Birmingham Business School Working Paper Series, p. 186 – 195. Retrieved from:
<http://www.brandchannel.com/images/papers/success.pdf>.
[16] De Chernatony L. (2001). A model for strategically building brands. Brand management, Vol. 9, No. 1, 32 – 44.
[17] De Chernatony L., Dall’Olmo Riley F. (1999). Experts’ Views about Defining Services Brands and the Principles of Services Branding. Journal of Business Research, Vol. 46, No. 2, 181 – 192.
[18] De Chernatony L., Horn S. (2003). The criteria for successful services brands. European Journal of Marketing, Vol. 37, No. 7/8: 1095 – 1118.
[19] Endelman D. C. (2010). Branding in the digital age: You’re Spending Your Money in All the Wrong Places.Harvard business review, December. Retrieved from:
<http://www.google.lt/url?sa=t&rct=j&q=edelman%2C%20d.c.%20branding%20in%20the%20digital%2 0age&source=web&cd=2&sqi=2&ved=0CCcQFjAB&url=http%3A%2F%2Fwww.edmarbulla.com.br%2F download%2Fartigos_de_marketing%2FBranding%2520in%2520the%2520Digital%2520Age.pdf&ei=6F xLUIz4NIzPsgaUx4HICQ&usg=AFQjCNEfw5UH2h1tl9URbFbugDjqG5Qn4w>.
[20] Ha H. Y, Perks H. (2005). Effects of consumer perceptions of brand experience on the web: Brand familiarity, satisfaction and brand trust. Journal of Consumer Behavior, Vol. 4, No. 6, 438 – 452.
[21] Hoffman D. L., Novak T., Peralta M. (1999). Building consumer trust in online environments: the case for information privacy. Communications of the ACM, Vol. 42, No. 4, 80 – 85.
[22] Ibeh K. I. N., Luo Y., Dinnie K. (2005). E-branding strategies of internet companies: some preliminary insights from the UK. Journal of Brand Management, Vol. 12, No. 5, 355 – 373.
[23] Iglesias O., Singh J. J. (2011). The role of brand experience and affective commitment in determining brand loyalty. Journal of Brand Management, Vol. 18, 570 – 582.
[24] Jack Morton Worldwide global brand experience agency(2011). “Best Experience Brands” a global study. Retrieved from: <http://www.krcresearch.com/pdfs/BestExperienceBrands.pdf>.
[25] Jevons C., Gabbott M., de Chernatony L. (2000). Internet noise and its effects on brand management. December 22. Retrieved from: <http://www.brandchannel.com/images/papers/noise_final.pdf>.
[26] Kahn B. (2011). A Framework for Understanding the Relationship between Advertising and Retailing.
In Future of Brand Building and Brand Experience: The Blurring Boundaries between Advertising and Retailing conference report prepared by Finnel S. Retrieved from:
<http://www.wharton.upenn.edu/bakerretail/files/baker-future-of-brand-building-conferencereport. pdf>.
[27] Kantor B. (2011). Making the Most of Social Networking and Online Media. In Future of Brand Building and Brand Experience: The Blurring Boundaries between Advertising and Retailing conference report prepared by Finnel S. Retrieved from: <http://www.wharton.upenn.edu/bakerretail/files/baker-future-of-brand-building-conferencereport.pdf>.
[28] Kapferer J. N. (2012). The new strategic brand management: advanced insights and strategic thinking, 5-th ed. London: Kogan Page.
[29] Kearney A. T. Global management consultancy and executive search firm(1999). Creating a High-Impact Digital Customer Experience. White paper. Retrieved from: <http://www.labeee.ufsc.br/~luis/egcec/artigos/atk-digital%20customer.pdf>.
[30] Klaus P., Maklan S. (2007). The role of brands in the service-dominated world. Brand management, Vol. 15, No. 2,115-122.
[31] Kotler P. (2002). Marketing Management, Millennium Edition. Pearson Custom Publishing. USA, Boston.
[32] Lee G. G., Lin H. F. (2005). Customer perceptions of e-service quality in online shopping. International Journal of Retail & Distribution Management, Vol. 33, No. 2, 161 – 176.
[33] McCarthy E. J. (1964).Basic marketing a managerial Approach. Irvin, Homewood, IL.
[34] Morrison M., Crane F. G. (2007). Building the service brand by creating and managing an emotional brand experience. Journal of Brand Management, Vol. 14 No. 5, 410 – 421.
[35] Najmaei A., Sadeghinejad Z. (2009). E-Buyology – a Step towards I-Branding: a Holistic Conceptual Paradigm. Creating Global Economies through Innovation and Knowledge Management: Theory & Practice, p. 834–843.
[36] Norton D. W. (2003). Toward meaningful brand experiences. Design Management Journal, Vol. 14, No. 1, 19 – 25.
[37] Pusch A. (2011). How to improve your brand experience online. Retrieved from: <http://www.utalkmarketing.com/Pages/Article.aspx?ArticleID=21024&Title=How_to_improve_your_br and_experience_online>.
[38] Ryan D., Jones C. (2009). Understanding Digital Marketing. Marketing Industry Network, Kogan Page, Glasgow.
[39] Sahin A., Zehirb C., Kitapçı H. (2011). The Effects of Brand Experiences, Trust and Satisfaction on Building Brand Loyalty. Procedia Social and Behavioral Sciences, Vol. 24, 1288 – 1301.
[40] Simmons J. (2007). “I-Branding”: developing the internet as a branding tool. Marketing Intelligence & Planning, Vol. 25, No. 6, 544 – 562.
[41] Sinha I. (2000). Cost Transparency: The Net’s Real Threat to Prices and Brands. Harvard Business Review. March–April. Retrieved from:
<http://faculty.msb.edu/homak/homahelpsite/webhelp/Cost_Transparency-_Nets_Real_Threat.pdf>.
[42] Smith S. (2003). Brand experience. In Clifton et all. 2003. Brands and Branding. The Economist. Retrieved from: <http://appsler.com/186197664X.pdf#page=114>.
[43] Smith S., Wheeler J. (2002). Managing the customer Experience: Turning customers into advocates. Executive summary. Managing the Customer Experience. FT Prentice Hall. Retrieved from: <http://www.smithcoconsultancy.com/wp-content/uploads/2008/07/mce-execsummary.pdf>
[44] Treiblmaier H. (2006). Determinants of Electronic Branding: An Exploratory Study. Innovative Marketing, Vol. 2: 89 – 98.
[45] Wallace E., Buil I., de Chernatony L. (2012). Facebook ‘friendship’ and brand advocacy. Journal of Brand Management, Vol. 20, No 2: 128 – 146.
[46] Wood E. H. (2009). Evaluating Event Marketing: Experience or Outcome? Journal of Promotion Management, Vol. 15: 247 – 268.
[47] Wood E. H., Masterman G. (2007). Event Marketing: Measuring an experience? 7th International Marketing Trends Congress – Jan 17th/19th Venice. Retrieved from: <http://www.escpeap. net/conferences/marketing/2008_cp/Materiali/Paper/Fr/Wood_Masterman.pdf>.
[48] Wright P., McCarthy J., Meekison L. (2004). Making sense of Experience. In Blythe et all. Funology, p. 43-53. Retrieved from:
<http://www.cos.ufrj.br/~jano/CSCW2008/Papers/Funology%20Introduction.pdf>.
[49] Zarantonello L., Schmitt B. H. (2010). Using the brand experience scale to profile consumers and predict consumer behaviour. Journal of Brand Management, Vol. 17, No. 7, 532 – 540.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Color Image Segmentation Using a Modified Fuzzy C-means Method and Data Fusion Techniques
Authors :- Rafika Harrabi and Ezzedine Ben Braiek
Keywords :- Segmentation, biomedical image, fuzzy c-means, fuzzy fusion, conflict, data fusion.
Published Online :- 24 April 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]In this paper, a new color image segmentation method based on modified Fuzzy c-means and data fusion techniques is presented. The proposed segmentation consists in combining many realizations of the same image, to gether, in order to increase the information quality and to get an optimal segmented image. In the first step, the membership degree of each pixel is determined by applying fuzzy c-means clustering to the information coming from the component images to be combined. The idea is to link at the image pixel level, the notion of measurement functions to that of membership functions in fuzzy logic. In the second step, the fuzzy combination theory is employed to merge the component images of the original image, in order to increase the quality of the information and to obtain an optimal segmented image. Segmentation results from the proposed method are validated and classification accuracy for the test date available is evaluated, and then a comparative study versus existing techniques is presented. Experimental segmentation results of color medical and textured images show the effectiveness of the proposed method.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/04/IJACSIT-Paper-Format-3214.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Kwon MJ, Han YJ, Shin IH, Park HW (2003). Hierarchical fuzzy segmentation of brain MR images. Int. J. Imag. Syst. Technol., 13(2)1, 15-125.
[2] Navon E, Miller O, Averbuch A (2005). Colour image segmentation based on adaptive local thresholds. Image Vision Comput. 23(1), 69-85.
[3] S. Ben Chaabane, M. Sayadi, F. Fnaiech, and E. Brassart (2009). Dempster-Shafer evidence theory for image segmentation: application in cells images. International Journal of Signal Processing, 5(1).
[4] S. Ben Chaabane, M. Sayadi, F. Fnaiech, and E. Brassart (2010). Colour Image Segmentation Using Homogeneity Method and Data Fusion Techniques. EURASIP Journal on Advances in Signal Processing.
[5] Meenavathi MB, Rajesh K (2008). Volterra Filter for Colour Image Segmentation. World Academy of Science. Eng. Technol., 35: 209-214.
[6] N. Ohta (1977). Correspondance between ceilab and cieluv color differences. 2(4), 178-182.
[7] G. Wyszecki and W. S. Stiles, “Color Science: Concepts and Methods, Quantitative Data and formulae”, John Wiley and Sons, second edition, 1982.
[8] F. Kurugollu, B. Sankur and A. E. Harmanci (2001). Color image segmentation using histogram multithresholding and fusion. 19(2001), 915-958.
[9] R. R. Yager (1999). Class of fuzzy measures generated from a Dempster-Shafer belief structure. International Journal of Intelligent Systems, 14(12), 1239–1247.
[10] J. C. Bezdek, “Pattern recognition with fuzzy objective function algorithms,” Plenum Press, New York, 1981.
[11] R. Duda and P. Hart, “Pattern Classification and Scene Analysis”, New York, Wiley, 1973.
[12] Liew AW, Leung SH, Lau WH (2000). Fuzzy image clustering incorporating spatial continuity. IEE Proc. Visual Image Signal Process, 147(2): 185-192.
[13] Ahmed MN, Yamany SM, Mohamed N, Farag AA, Moriarty T (2002). A modified fuzzy c-means algorithm for bias field estimation and segmentation of MRI data. IEEE Trans. Med. Imag. 21(3), 193-199.
[14] P. Vannoorenberghe, O. Colot and D. D. Brucq (1999). Colour image segmentation using Dempster-Shafer’s theory. Pro. ICIP’99. 300-304.
[15] Zhu YM, Dupuis O, Rombaut M (2002). Automatic determination of mass functions in Dempster-Shafer theory using fuzzy c-means and spatial neighborhood information for image segmentation. Opt. Eng. 41(4), 760-770.
[16] R. Bradley (2007). A unified Bayesian decision theory. Theory and Decision. 63(3), 233–263.
[17] Bloch and H. Maitre (1997). Fusion of image information under imprecision. in Aggregation and Fusion of Imperfect Information, B. Bouchon-Meunier, Ed., Series studies in fuzziness, Physical Verlag. 189–213.
[18] Lucas and B. N. Araabi (1999). Generalization of the Dempster-Shafer theory: a fuzzy-valued measure. IEEE Transactions on Fuzzy Systems. 7(3), 255–270.
[19] Dubois and H. Prade (2003). Possibility theory and its applications: a retrospective and prospective view. in Proceedings of the IEEE International Conference on Fuzzy Systems. 1(5).
[20] P. Dempster (1967). Upper and lower probabilities induced by multivalued mapping. Annals of Mathematical Statistics. 38, 325–339.
[21] S. deveughale, B. Dubuisson (1994). Adaptability and Possibilistic Combination: Application to Multicameras Vision. Traitement du Signal. 11(1994), 563-568.
[22] Grau, A. U. J. Mewes, M. Alcaniz, R. Kikinis, and S. K. Warfield (2004). Improved watershed transform for medical image segmentation using prior information,” IEEE Transactions on Medical Imaging. 23(4), 447–458.
[23] R. O. Duda, P. E. Hart, and D. G. Sork (2000). Pattern Classification, Wiley-Interscience, New York, NY, USA.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Model of Brand Building and Enhancement by Electronic Marketing Tools: Practical Implication
Authors :- Tadas Limba, Gintarė Gulevičiūtė and Virginija Jurkutė
Keywords :- constraint satisfaction problem, decision support system, fuzzy project scheduling, project portfolio, project variants
Published Online :- 24 April 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]The paper investigates the use of constraint programming techniques for planning and scheduling in the context of a multi-project environment. Duration and cost of a project activity is specified in the form of discrete α-cuts that enable the connection of distinct and imprecise data, and the implementation of a constraints satisfaction problem with the use of constraint programming. Moreover, the paper presents the impact of a number of α-cuts on project planning and scheduling. A comparison of various variants of project completion takes into account criteria such as time and cost of project and strategy for variable distribution. A declarative form of the description of the decision problem allows its implementation in constraint programming languages and facilitates the development of a decision support system. Optimistic, pessimistic, and several intermediate variants of project scheduling can significantly enhance project managers’ comprehension of time and cost variability and uncertainty.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/04/IJACSIT-3219_.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Laslo, Z. (2010). Project portfolio management: An integrated method for resource planning and scheduling to minimize planning/scheduling-dependent expenses. International Journal of Project
Management, 28, 609-618.
[2] Atkinson, R., Crawford, L., Ward, S. (2006). Fundamental uncertainties in projects and the scope of project management. International Journal of Project Management, 24, 687-698.
[3] Relich, M. (2012). An evaluation of project completion with application of fuzzy set theory. Management, 16(1), 216-229.
[4] Relich, M., Banaszak, Z. (2011). Reference model of project prototyping problem. Foundations of Management, 3(1), 33-46.
[5] Rowe, W. D. (1994). Understanding uncertainty. Risk Analysis, 14, 743-750.
[6] Hillson, D. (2004). Effective opportunity management for projects – exploiting positive risk. New York: Marcel Dekker.
[7] Olsson, R. (2007). In search of opportunity management: is the risk management process enough? International Journal of Project Management, 25, 745-752.
[8] Baloi, D. & Price, A. D. F. (2003). Modelling global risk factors affecting construction cost performance. International Journal of Project Management, 21, 261-269.
[9] Project Management Institute (2000). A guide to the project management book of knowledge (PMBOK). Newtown Square.
[10] Kastor, A. & Sirakoulis, K. (2009). The effectiveness of resource levelling tools for Resource Constraint Project Scheduling Problem. International Journal of Project Management, 27, 493-500.
[11] Zammori, F. A., Braglia, M., Frosolini, M. (2009). A fuzzy multi-criteria approach for critical path definition. International Journal of Project Management, 27, 278-291.
[12] Carr, V. & Tah, J. H. M. (2001). A fuzzy approach to construction project risk assessment and analysis: construction project risk management system. Advances in Engineering Software, 32, 847-857.
[13] Bonnal, P., Gaurc, K., Lacoste, G. (2004). Where do we stand with fuzzy project scheduling? Journal of Construction Engineering and Management, 130, 114-123.
[14] Fortin, J., Zielinski, P., Dubois, D., Fargier, F. (2010). Criticality analysis of activity networks under interval uncertainty. Journal of Scheduling, 13, 609-627.
[15] Maravas A. & Pantouvakis J. P. (2011). A fuzzy repetitive scheduling method for projects with repeating activities. Journal of Construction Engineering and Management, 137, 561-564.
[16] Shi, Q. & Blomquist, T. (2012). A new approach for project scheduling using fuzzy dependency structure matrix. International Journal of Project Management, 30, 503-510.
[17] Zwikael, O., Cohen, Y., Sadeh, A. (2006). Non-delay scheduling as a managerial approach for managing Project. International Journal of Project Management, 24, 330-336.
[18] Kim, J. Y., Kang, Ch. W., Hwang, I. K. (2012). A practical approach to project scheduling: considering the potential quality loss cost in the time-cost tradeoff problem. International Journal of Project Management, 30, 264-272.
[19] Long, L. D. & Ohsato, A. (2008). Fuzzy critical chain method for project scheduling under resource constraints and uncertainty. International Journal of Project Management, 26, 688-698.
[20] Banaszak Z., Zaremba M., Muszyński W. (2009). Constraint programming for project-driven manufacturing. Int. J. Production Economics, 120, 463-475.
[21] Relich, M. (2011). CP-based decision support for scheduling. Applied Computer Science, 7(1), 7-17.
[22] Relich, M. (2011). Project prototyping with application of CP-based approach. Management, 15(2), 364-377.
[23] Hofstedt, P. & Pepper, P. (2007). Integration of declarative and constraint programming. Theory And Practice of Logic Programming, 7, 93-121.
[24] Van Roy, P., Haridi, S. (2004). Concepts, techniques and models of computer programming. Massachusetts Institute of Technology.
[25] Rossi F., van Beek P., Walsh T. (2006). Handbook of Constraint Programming. Elsevier Science.
[26] Pesic M., & van der Aalst W. M. P. (2006). A declarative approach for flexible business processes management. In Business Process Management Workshops, Lecture Notes in Computer Science, Springer, 4103, 169-180.
[27] Relich, M. (2013). Fuzzy project scheduling using constraint programming. Applied Computer Science, 9(1), 3-16.
[28] Relich, M. (2014). A declarative approach to new product development in the automotive industry. In Environmental Issues in Automotive Industry (pp. 23-45), Springer Berlin Heidelberg.
[29] Sitek, P. & Wikarek, J. (2013). A hybrid method for modeling and solving constrained search problems. In Proceedings of the Federated Conference on Computer Science and Information Systems (pp. 385-392), Krakow, Poland.
[30] Sitek, P. & Wikarek, J. (2013). A hybrid approach to supply chain modeling and optimization. In Proceedings of the Federated Conference on Computer Science and Information Systems (pp. 1211-1218), Krakow, Poland.
[31] Relich, M. (2013). Knowledge acquisition for new product development with the use of an ERP database. In Proceedings of the Federated Conference on Computer Science and Information Systems (pp. 1285-1290), Krakow, Poland.
[32] Relich, M., Witkowski, K., Saniuk, S., Sujanova, J. (2014). Material demand forecasting: an ERP system perspective. Applied Mechanics and Materials, 527, 311-314.
[33] Maravas, A. & Pantouvakis, J. P. (2012). Project cash flow analysis in the presence of uncertainty in activity duration and cost. International Journal of Project Management, 30, 374-384.
[34] Barraza, G. A., Back, W. E., Mata, F. (2004). Probabilistic forecasting of project performance using stochastic S curves. Journal of Construction Engineering and Management, 130(1), 25-32.
[35] Yao, J. S., Chen, M. S., Lu, H. F. (2006). A fuzzy stochastic single-period model for cash management. European Journal of Operational Research, 170(1), 72-90.
[36] Cheng, M. Y. & Roy, A. F. V. (2011). Evolutionary fuzzy decision model for cash flow prediction using time dependent support vector machines. International Journal of Project Management, 29, 56-65.
[37] Mon, D. L., Cheng, C. H, Lu, H. C. (1995). Application of fuzzy distribution on project management. Fuzzy Set and Systems, 73(2), 227-234.
[38] Yaghootkar, K. & Gil, N. (2012). The effects of schedule-driven project management in multi-project environments. International Journal of Project Management, 30, 127-140.
[39] Relich, M. (2010). A decision support system for alternative project choice based on fuzzy neural networks. Management and Production Engineering Review, 1(4), 46-54.
[40] Relich, M. (2010). Assessment of task duration in investment projects. Management, 14(2), 136-147.
[41] Peric, M. & Djurkin, J. (2014). Systems thinking and alternative business model for responsible tourist destination. Kybernetes, 43(3/4), 480-496.
[42] Relich, M. (2006). Liquidity management in a small enterprise by the application of reverse approach. Management, 10(2), 129-137.
[43] Caganova, D., Cambal, M., Sujanova, J., Woolliscroft, P. (2012). The Multiculturality Aspects and Human Capital Management within Slovak Industrial Enterprises. In Proceedings of the 4th European Conferences on Intellectual Capital (pp. 106-117), Helsinki, Finland.
[44] Caganova, D., Cambal, M., Weidlichova Luptakova, S. (2010). Intercultural Management – Trend of Contemporary Globalized World. Electronics and Electrical Engineering, 6(102), 51-54.
[45] Kormancova, G. & Theodoulides, L. (2013). The intercultural dimensions of the cultures in transition process in Central and Eastern Europe. In Contemporary Challenges towards Management III (pp. 41-60), Uniwersytet Slaski w Katowicach.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

A Constraint Programming Approach for Scheduling in a Multi-Project Environment
Authors :- Marcin Relich
Keywords :- constraint satisfaction problem, decision support system, fuzzy project scheduling, project portfolio, project variants
Published Online :- 05 May 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]The paper investigates the use of constraint programming techniques for planning and scheduling in the context of a multi-project environment. Duration and cost of a project activity is specified in the form of discrete α-cuts that enable the connection of distinct and imprecise data, and the implementation of a constraints satisfaction problem with the use of constraint programming. Moreover, the paper presents the impact of a number of α-cuts on project planning and scheduling. A comparison of various variants of project completion takes into account criteria such as time and cost of project and strategy for variable distribution. A declarative form of the description of the decision problem allows its implementation in constraint programming languages and facilitates the development of a decision support system. Optimistic, pessimistic, and several intermediate variants of project scheduling can significantly enhance project managers’ comprehension of time and cost variability and uncertainty.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/05/IJACSIT-3217-1.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Laslo, Z. (2010). Project portfolio management: An integrated method for resource planning and scheduling to minimize planning/scheduling-dependent expenses. International Journal of Project
Management, 28, 609-618.
[2] Atkinson, R., Crawford, L., Ward, S. (2006). Fundamental uncertainties in projects and the scope of project management. International Journal of Project Management, 24, 687-698.
[3] Relich, M. (2012). An evaluation of project completion with application of fuzzy set theory. Management, 16(1), 216-229.
[4] Relich, M., Banaszak, Z. (2011). Reference model of project prototyping problem. Foundations of Management, 3(1), 33-46.
[5] Rowe, W. D. (1994). Understanding uncertainty. Risk Analysis, 14, 743-750.
[6] Hillson, D. (2004). Effective opportunity management for projects – exploiting positive risk. New York: Marcel Dekker.
[7] Olsson, R. (2007). In search of opportunity management: is the risk management process enough? International Journal of Project Management, 25, 745-752.
[8] Baloi, D. & Price, A. D. F. (2003). Modelling global risk factors affecting construction cost performance. International Journal of Project Management, 21, 261-269.
[9] Project Management Institute (2000). A guide to the project management book of knowledge (PMBOK). Newtown Square.
[10] Kastor, A. & Sirakoulis, K. (2009). The effectiveness of resource levelling tools for Resource Constraint Project Scheduling Problem. International Journal of Project Management, 27, 493-500.
[11] Zammori, F. A., Braglia, M., Frosolini, M. (2009). A fuzzy multi-criteria approach for critical path definition. International Journal of Project Management, 27, 278-291.
[12] Carr, V. & Tah, J. H. M. (2001). A fuzzy approach to construction project risk assessment and analysis: construction project risk management system. Advances in Engineering Software, 32, 847-857.
[13] Bonnal, P., Gaurc, K., Lacoste, G. (2004). Where do we stand with fuzzy project scheduling? Journal of Construction Engineering and Management, 130, 114-123.
[14] Fortin, J., Zielinski, P., Dubois, D., Fargier, F. (2010). Criticality analysis of activity networks under interval uncertainty. Journal of Scheduling, 13, 609-627.
[15] Maravas A. & Pantouvakis J. P. (2011). A fuzzy repetitive scheduling method for projects with repeating activities. Journal of Construction Engineering and Management, 137, 561-564.
[16] Shi, Q. & Blomquist, T. (2012). A new approach for project scheduling using fuzzy dependency structure matrix. International Journal of Project Management, 30, 503-510.
[17] Zwikael, O., Cohen, Y., Sadeh, A. (2006). Non-delay scheduling as a managerial approach for managing Project. International Journal of Project Management, 24, 330-336.
[18] Kim, J. Y., Kang, Ch. W., Hwang, I. K. (2012). A practical approach to project scheduling: considering the potential quality loss cost in the time-cost tradeoff problem. International Journal of Project Management, 30, 264-272.
[19] Long, L. D. & Ohsato, A. (2008). Fuzzy critical chain method for project scheduling under resource constraints and uncertainty. International Journal of Project Management, 26, 688-698.
[20] Banaszak Z., Zaremba M., Muszyński W. (2009). Constraint programming for project-driven manufacturing. Int. J. Production Economics, 120, 463-475.
[21] Relich, M. (2011). CP-based decision support for scheduling. Applied Computer Science, 7(1), 7-17.
[22] Relich, M. (2011). Project prototyping with application of CP-based approach. Management, 15(2), 364-377.
[23] Hofstedt, P. & Pepper, P. (2007). Integration of declarative and constraint programming. Theory And Practice of Logic Programming, 7, 93-121.
[24] Van Roy, P., Haridi, S. (2004). Concepts, techniques and models of computer programming. Massachusetts Institute of Technology.
[25] Rossi F., van Beek P., Walsh T. (2006). Handbook of Constraint Programming. Elsevier Science.
[26] Pesic M., & van der Aalst W. M. P. (2006). A declarative approach for flexible business processes management. In Business Process Management Workshops, Lecture Notes in Computer Science, Springer, 4103, 169-180.
[27] Relich, M. (2013). Fuzzy project scheduling using constraint programming. Applied Computer Science, 9(1), 3-16.
[28] Relich, M. (2014). A declarative approach to new product development in the automotive industry. In Environmental Issues in Automotive Industry (pp. 23-45), Springer Berlin Heidelberg.
[29] Sitek, P. & Wikarek, J. (2013). A hybrid method for modeling and solving constrained search problems.
In Proceedings of the Federated Conference on Computer Science and Information Systems (pp. 385-392), Krakow, Poland.
[30] Sitek, P. & Wikarek, J. (2013). A hybrid approach to supply chain modeling and optimization. In Proceedings of the Federated Conference on Computer Science and Information Systems (pp. 1211-1218), Krakow, Poland.
[31] Relich, M. (2013). Knowledge acquisition for new product development with the use of an ERP database. In Proceedings of the Federated Conference on Computer Science and Information Systems (pp. 1285-1290), Krakow, Poland.
[32] Relich, M., Witkowski, K., Saniuk, S., Sujanova, J. (2014). Material demand forecasting: an ERP system perspective. Applied Mechanics and Materials, 527, 311-314.
[33] Maravas, A. & Pantouvakis, J. P. (2012). Project cash flow analysis in the presence of uncertainty in activity duration and cost. International Journal of Project Management, 30, 374-384.
[34] Barraza, G. A., Back, W. E., Mata, F. (2004). Probabilistic forecasting of project performance using stochastic S curves. Journal of Construction Engineering and Management, 130(1), 25-32.
[35] Yao, J. S., Chen, M. S., Lu, H. F. (2006). A fuzzy stochastic single-period model for cash management. European Journal of Operational Research, 170(1), 72-90.
[36] Cheng, M. Y. & Roy, A. F. V. (2011). Evolutionary fuzzy decision model for cash flow prediction using time dependent support vector machines. International Journal of Project Management, 29, 56-65.
[37] Mon, D. L., Cheng, C. H, Lu, H. C. (1995). Application of fuzzy distribution on project management. Fuzzy Set and Systems, 73(2), 227-234.
[38] Yaghootkar, K. & Gil, N. (2012). The effects of schedule-driven project management in multi-project environments. International Journal of Project Management, 30, 127-140.
[39] Relich, M. (2010). A decision support system for alternative project choice based on fuzzy neural networks. Management and Production Engineering Review, 1(4), 46-54.
[40] Relich, M. (2010). Assessment of task duration in investment projects. Management, 14(2), 136-147.
[41] Peric, M. & Djurkin, J. (2014). Systems thinking and alternative business model for responsible tourist destination. Kybernetes, 43(3/4), 480-496.
[42] Relich, M. (2006). Liquidity management in a small enterprise by the application of reverse approach. Management, 10(2), 129-137.
[43] Caganova, D., Cambal, M., Sujanova, J., Woolliscroft, P. (2012). The Multiculturality Aspects and Human Capital Management within Slovak Industrial Enterprises. In Proceedings of the 4th European Conferences on Intellectual Capital (pp. 106-117), Helsinki, Finland.
[44] Caganova, D., Cambal, M., Weidlichova Luptakova, S. (2010). Intercultural Management – Trend of Contemporary Globalized World. Electronics and Electrical Engineering, 6(102), 51-54.
[45] Kormancova, G. & Theodoulides, L. (2013). The intercultural dimensions of the cultures in transition process in Central and Eastern Europe. In Contemporary Challenges towards Management III (pp. 41-60), Uniwersytet Slaski w Katowicach.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Anti-Crisis Management Tools for Capitalist Economy
Authors :- Alexander A. Antonov
Keywords :- Computer network, crisis-proof economy, economic reforms, super-intelligence, subconscious thinking.
Published Online :- 21 May 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]It is stated that the reason for ineffective economic crisis fighting is misunderstanding of processes prevailing in the economy, as well as lack of mathematical apparatus necessary for their description. This mathematical description was found using the analogy approach – it turned out that the electric circuit theory is the ‘white box’ for the ‘black box’ of economics. Mathematical description of processes in the electric circuit theory allowed describing mathematically the behaviour of the market participants and deriving the differential equation for the ‘goods-money-goods’ process. Its analysis enabled to reveal structural defects of the capitalist economy – its nonlinearity and destructive influence of the human factor. These defects cause economic crises due to instability of processes prevailing in the capitalist economy. Tools for management of the capitalist economy in the form of business-interfaces and new global computer network TV•net, which will provide for its crisis-proof development, are suggested.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/05/antonov_paper.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Bannock G. and Baxter R. (2009). The Palgrave Encyclopedia of World Economic History: Since 1750. Palgrave Macmillan, Basingstoke.
[2] Antonov A.A. (2013). Unpredictable discoveries. Lambert Academic Publishing. Saarbrücken.
[3] Neumann J. von and Morgenshtern O. (1947). The Theory of Games and Economic Behavior. (2nd ed.) Princeton University Press. Princeton.
[4] Bruno M. and Esterly W. (November 1994). Inflation Crises and Long-Run Growth. World Bank.
[5] Polterovych V.M. 2007. Elements of the reforms theory. Ekonomika Publishing. Moscow.
[6] Antonov А. А. (2013). Obsolete scientific dogmata hamper development of human civilization. European Journal of Academic Research. 1(1), 22-30.
[7] Antonov A.A. (2010). Differential equation for the ‘goods-money-goods’ process. European Journal of Scientific Research. 40(1), 27-42.
[8] Antonov A.A. (2010). Economic oscillating systems. American Journal of Scientific and Industrial Research. 1(2), 359-363.
[9] Antonov А.А. (2013). Сoncept of crisis-proof economy. European Journal of Academic Research. 1(1), 31-38.
[10]Antonov А.А. (2013). Fundamentals of crisis-proof economics. International Journal of Innovation and Applied Studies. 2(3), 196-215.
[11]Antonov A.A. (2013). Discovering of Adam Smith’s ‘Invisible Hand’. International Journal of Managment, IT and Engineering, 3(1), 1-10.
[12]Filipe J. and Adams G. (2005). The Estimation of the Cobb Douglas Function. Eastern Economic Journal, 31(3), 427-445.
[13]Smith Adam. (1776). An Inquiry into the Nature and the Causes of the Wealth of Nations. In Cannan E. (Ed.) 1977. University Of Chicago Press.
[14]Arrow K. J. (1963). Social Choice and Individual Values. (2nd ed.) Wiley: NY.
[15]Gibbard A. (1973). Manipulation of voting schemes: a general result. Econometrica, 41(4), 587-601.
[16]Bouchaud J.P. (30 October 2008). Economics needs a scientific revolution. Nature. 455, 1181
[17]Antonov А.А. (2012). New anti-crisis instruments for market economy. ARPN Journal of Science and Technology, 2(8), 738-744.
[18]Antonov A.A. (2011). Realization of Crisis-Free Economy. International Journal of Emerging Sciences, Special Issue: Selected Best Papers, 1(3), 387-399.
[19]Antonov А.А. (2009). Safe Global/Regional Informational Network. European Journal of Scientific Research, 28(1), 165-174.
[20]Antonov А.А. (2012). The new global information network free from the drawbacks of the Internet. ARPN Journal of Science and Technology, 2(10), 957-962.
[21]Antonov А. А. (2013). New Business-Oriented Global/Regional Information Network. International Journal of Business Information Systems, 12(3), 321-334.
[22]Antonov А.А. (2013). New Global Сomputer Network. International Journal of Managment, IT and Engineering, 3(1), 11-22.
[23]Antonov A. A. (2010), Human-computer super intelligence, American Journal of Scientific and Industrial Research, 1(2), 96-104.
[24]Antonov A.A. (2011). Human Super Intelligence. International Journal of Emerging Sciences, 1(2), 164-173.
[25]Antonov A.A. (2011). From artificial intelligence to human super-intelligence. International Journal of Computer Information Systems, 2(6), 1-6.
[26]Antonov А.А. (2011). Realisation of Human Super-Intelligence: Developmental Learning. WSEAS Transactions on Advances in Engineering Education, 8(4), 109-119.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Holistic Electronic Government Services Integration Model: from Theory to Practice
Authors :- Tadas Limba and Gintare Guleviciute
Keywords :- E-government, electronic government services, Stage model of electronic government services, “EDiamond” model of electronic government services, Holistic Electronic Government Services Integration Model, local authorities, public administration.
Published Online :- 08 January 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]The systematic, comparative analysis of the models of electronic government services carried out in the scientific work and the assessment of opportunities of their application in the self-government level makes the topic a novelty. With the help of the method of comparative analysis the models of electronic government services have been assessed and there has been distinguished the total of six. Two of them being the main common models of electronic government services have the features that enable the development of new models of electronic government services that are more targeted at changes taking place in public needs and inside organizational processes signifying the originality. The aim of this work is to develop a Holistic Electronic Government Services Integration Model which could ensure the efficient integration of electronic government services in the local self-government level. The scientific work analyzes the improvement opportunities of the models of electronic government services and their application alternatives in Lithuanian municipalities. In order to evaluate implementation of “Holistic Electronic Government Services Integration Model”, four empirical studies have been conducted, which show the possibility of this model application. The newly developed model of electronic government services that has been designed basing on the principle of integrating online expert consultation is primarily targeted at improvement of inside processes’ changes of an organization. Practicing the application of that model in the local self-government level starting with improvement of inside processes of an organization should help adapt more accurately and efficiently to the changing needs of the society while providing electronic government services, thus establishing a higher public value. The practical novelty of work is reflected not only through the integration opportunities’ assessment of the principle of online expert consultation services into the theoretical models of electronic government services that have already been developed by the scientists, but also on the basis of this principle there has been created a “Holistic Electronic Government Services Integration Model” in accordance with “E-Diamond” model basis and its practical application realization with the design of “The project of implementing the principle of online expert consultation on the model of electronic government services” for the future investigations.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2012/07/Holistic-Electronic-Government-Services-Integration-Model-from-Theory-to-Practice.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Ancarini, A. (2005). Towards quality e-service in the public sector: The evolution of web sites in the local public service sector, Managing Service Quality, Vol. 15, 6-23.
[2] Andersen, K.V.; Henriksen, H.Z. (2003). E-government maturity models: extension of the Layne and Lee model. Government information Quaterly. No. 26, 236–248.
[3] Andersen, K. V. (2004). E-government and public sector process rebuilding. Amsterdam: Kluwer.
[4] Becker, J., Algermissen, L., Niehaves, B. (2005). Processes in E-Government focus: A procedure model for process oriented reorganisation in public administration on the local level. Accepted to the First International Pragmatic Web Conference, September, 87–103.
[5] Becker, J., Algermissen, L., Niehaves, B. (2006). A procedure model for process oriented E-Government projects. Accepted to the First International Pragmatic Web Conference, September, 150–183.
[6] Bretschneider, S. (2003). Information technology, e-government, and institutional change. Public Administration Review, 63(6), 738–744.
[7] Buckley, J. (2003). E-service quality and the public sector, Managing Service Quality. Vol 13, 453-462.
[8] Burn, J., Robins, G. (2003). Moving towards e-government: A case study of organisational change processes. Logistics Information Management, 25–35.
[9] Coe, A., Paquet, G., Roy, J. (2001). E-Governance and Smart Communities – A Social Learning Challenge, Social Science Computer Review, 80-93.
[10] Davenport, T.H. (1999). Process Innovation: Reengineering Work through Information Technology, Boston, MA: Harvard Business School Press, 246-267.
[11] Domarkas, V., Lukoševičienė, V. (2006). Electronic government by the aspect of providing information for the society. Public policy and administration, No. 16, 73–86.
[12] Fountain, J. (2001). Building the virtual state: Information technology and institutional change. Washington, DC, Brookings Institution, 64-78.
[13] Goldkuhl, G. (2005). Socio-Instrumental Pragmatism: A Theoretical Synthesis for Pragmatic Conceptualisation in Information Systems, in Proceedings of the 3rd Intl Conf on Action in Language, Organisations and Information Systems, Limerick, 115-132.
[14] Goldkuhl, G., Cronholm, S., Sjostrom, J. (2004). User Interfaces as Organisational Action Media, in Proceedings of the 7th International Workshop on Organisational Semiotics (pp. 124-140). Portugal.
[15] Goldkuhl, G.; Persson, A. (2006). Characteristics of Public E-services: Investigating the “EDiamond” Model. Accepted to the First International Pragmatic Web Conference, September (pp.54-79). Stuttgart, Germany.
[16] Goldkuhl, G., Persson, A. (2006). From e-ladder to “E-Diamond” – re-conceptualising models for public e-services. Proceedings of the 14th European Conference on Information Systems (pp. 117-132). Göteborg.
[17] Gronlund, A. (2002). Electronic Government – Design, Applications and Management. Hershey etal.: Idea Group Publishing, 61- 77.
[18] Gugliota, A., Cabral, L., Doingue, J., Roberto, V., Rowlatt, M., Davies, R. (2005). A semantic web service-based architecture for the interoperability of e-government services, 133–145.
[19] Kraemer, K. L., King, J. L. (1996). Information technology and administrative reform: Will the time after e-government be different? Irvine, CA7 CRITO, University of California, 580-582.
[20] Layne, K.; Lee, J. (2001). Developing fully functional e-government: a four stage model. Government information Quarterly. No. 18, 122–136.
[21] Lenk, K., Traunmueller, R. (2001). Broadening the Concept of Electronic Government. In: Prins, J.E. J. (Ed.) Designing E-Government. Amsterdam: Kluwer, 63-74.
[22] Lind, M., Forsgren, O., Salomonson, N., Albinsson, L. (2004). The E-co model – citizens‘ driving eservices quality, 97–124.
[23] Limba, T. (2009) Electronic government services’ maturity models: their comparative analysis. Information Sciences, 30-40.
[24] Limba, T. (2009). Models of electronic government services: opportunities of their application in Lithuanian municipalities. (Doctoral disertation, Mykolas Romeris University)
[25] Limba, T. (2011). Comparative analysis of Stages models and “E-Diamond” model of electronic government services, the conceptual features of their improvement. Information Sciences, 8-23.
[26] Limba, T. (2011) Comparative aspects of Electronic government services’ maturity and “EDiamond” models. Social Technologies, 1(1), 35-45.
[27] Millard J. (2003). The (r)e-Balancing of Government. In e-Government: Public Administration for a New Century. UPGRADE. IV (2).
[28] Persson A., Goldkuhl G. (2005). Stage-models for public e-services – investigating conceptual foundations. 2nd Scandinavian Workshop on e-government, February, Copenhagen, 151–188.
[29] Rudzkienė, V. (2005) Social Statistics. Vilnius, MRU publishing center.
[30] Signore, O.; Chesi, F.; Pallotti, M. (2003). E-government: challenges and opportunities. CMG Italy – XIX Annual Conference, Florence, Italy, 231–265.
[31] Thom, N., Ritz A. (2004). Public management. Monography. Vilnius: LTU.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Detecting Suspicion Information on the Web using Crime Data Mining Techniques
Authors :- Javad Hosseinkhani, Mohammad Koochakzaei, Solmaz Keikhaee and Javid Hosseinkhani Naniz
Keywords :- Cyber Crime, Web Crime Mining, Crime Data Mining Techniques, Forensics Analysis, Web Mining
Published Online :- 24 June 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns and trends of web-oriented crimes. The purpose of this paper is to provide a review to mining useful information by means of Data Mining. The procedure of extracting knowledge and information from large set of data is data mining that applying artificial intelligence method to find unseen relationships of data. There is more study on data mining applications that attracted more researcher attention and one of the crucial field is criminology that applying in data mining which is utilized for identifying crime characteristics. Detecting and exploring crimes and investigating their relationship with criminals are involved in the analyzing crime process. Criminology is a suitable field for using data mining techniques that shows the high volume and the complexity of relationships between crime datasets. Therefore, for further analysis development, the identifying crime characteristic will be the first step and obtained knowledge from data mining approaches is a very useful tool to help and support police forces. This research aims to provide a review to extract useful information by means of Data Mining, in order to find crime hot spots out and predict crime trends for them using crime data mining techniques.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/10/Detecting-Suspicion-Information-on-the-Web-using-Crime-Data-Mining-Techniques.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Fayyad, U.M., and Uthurusamy, R. ( Aug. 2002). Evolving Data Mining into Solutions for Insights. Comm. ACM. 28-31.
[2] Hosseinkhani, J., Chuprat, S., and Taherdoost, H., (2012a). Criminal Network Mining by Web Structure and Content Mining. 11th WSEAS International Conference on Information Security and Privacy (ISP ’12), Prague, Czech Republic September 24-26.
[3] Hosseinkhani, J., Chuprat, S., Taherdoost, H., and Shahraki Moghaddam, Amin., (2012b). Propose a Framework for Criminal Mining by Web Structure and Content Mining. International Journal of Advanced Computer Science and Information Technology (IJACSIT), Helvetic Editions. 1(1). 1-13.
[4] Keyvanpour, M., Javideh, M., and Ebrahimi, M. (2011). Detecting and investigating crime by means of data mining: a general crime matching framework, Elsevier , Procedia Computer Science 3 (2011) 872–880.
[5] Hosseinkhani. J, Taherdoost. H, and Chuprat. S. (2013). Discovering Criminal Networks by Web Structure Mining. 7th International Conference on Computing and Convergence Technology. 3-5 December, Seoul, Korea (South).
[6] Kumar, M., Gupta, A., Saha, S. (2009). Approach to Adaptive User Interfaces using Interactive Media Systems. In: Proceedings of the 11th international conference on Intelligent user interfaces.
[7] Newsome, M., Pancake, C., Hanus, J. (1997). HyperSQL: web-based query interfaces for biological databases. In: Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[8] Che, D., Aberer, K., Chen, Y. (1999). The design of query interfaces to the GPCRDB biological database. In: Proceedings of User Interfaces to Data Intensive Systems.
[9] Baldi, P., Frasconi, P., and Smyth. P. (2008). Modeling the Internet and the Web: Probabilistic Methods and Algorithms. Wiley.
[10] Liu, Bing. (2007). Web data mining: exploring hyperlinks, contents, and usage data. Springer Verlag.
[11] Djeraba, C. O., Zaiane, R., and Simoff, S.( 2007). (eds.). Mining Multimedia and Complex Data. Springer.
[12] Perner, P. (2003). Data Mining on Multimedia Data, Springer.
[13] Duda, R. O., Hart, P. E. and Stork, D. G, (2001). Pattern Classification. John Wiley & Sons Inc., 2nd edition.
[14] Han, J. and Kamber, M. (2010). Data Mining: Concepts and Techniques, Morgan Kaufmann.
[15] Kargupta, H., Liu, K., and Ryan, J. (2003). “Privacy-Sensitive Distributed Data Mining from Multi-Party Data,” Proc. 1st NSF/NIJ Symp. Intelligence and Security Informatics, LNCS 2665, Springer-Verlag, pp. 336-342.
[16] Chau, M., Xu, J.J., and Chen, H. (2007). “Extracting Meaningful Entities from Police Narrative Reports”, Proc. Nat’l Conf. Digital Government Research, Digital Government Research Center, pp. 271-275.
[17] Gray, A., Sallis, P., & MacDonell, S. (1997). “Software Forensics: Extending Authorship Analysis Techniques to Computer Programs,” Proc. 3rd Biannual Conf. Int’l Assoc. Forensic Linguistics, Int’l Assoc. Forensic Linguistics, pp. 1-8.
[18] Jain, A.K., Murty, M.N., Flynn, P.J. (1999): Data clustering: a review. ACM Computing Surveys 31(3), 264–323.
[19] Agrawal, R., Imielinski, T., Swami, A.N (1993): Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data.
[20] Han, J., Kamber, M.(2009): Data mining: concepts and techniques. Morgan Kaufmann, San Francisco.
[21] Agrawal, R., Srikant, R. (1995): Mining sequentiel motifs. In: 11th Int’l Conf. on Data Engineering.
[22] Hauck, R.V. et al., (2002). “Using Coplink to Analyze Criminal-Justice Data” Computer, Mar, pp. 30-37.
[23] Senator, T. et al., (1995). “The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions”, AI Magazine, vol.16, no. 4, pp. 21-39.
[24] Lee, W., Stolfo, S.J., and Mok, W. (1999). “A Data Mining Framework for Building Intrusion Detection Models,” Proc. 1999 IEEE Symp. Security and Privacy, IEEE CS Press, pp. 120-132.
[25] Vel, O. de. et al., (2001). “Mining E-Mail Content for Author Identification Forensics,” SIGMOD Record, vol. 30, no. 4, pp. 55-64.
[26] Wang, G., Chen, H., and Atabakhsh, H. (2007). “Automatically Detecting Deceptive Criminal Identities,” Comm. ACM, Mar., pp. 70-76.
[27] Levenshtein, V.L. (1966). Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10, 707–710.
[28] Hosseinkhani, J., Ibrahim, S., Chuprat, S. and Hosseinkhani, N.J. Web Crime Mining by Means of Data Mining Techniques, Research Journal of Applied Sciences, Engineering & Technology (Print ISSN: 2040-7459 Online ISSN: 2040-7467), 2013.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Develop a New Method for People Identification Using Hand Appearance
Authors :- Mahdi Nasrollah Barati and Seyed Yaser Bozorgi Rad
Keywords :- Identification, contour extraction, Matching, Hand appearance.
Published Online :- 08 January 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]In this paper a new method for people identification using hand appearance is presented. In this method, the contour information is used for matching. For this purpose, after applying pre-processing algorithms and edge detection, contour extraction, and to help the offices of concentric, hand’s information including the number of pixels is limited to offices, will be extracted. By using extracted information, Matching will be done in the database identity and person will be identified. Benefits of the proposed method can be its lack of sensitivity to rotating and zooming the image pointed out. Practical results will show the accuracy of this method for identification. The proposed method can be used in other fields such as curve matching in addition to hand geometry identification.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2012/07/Develop-a-New-Method-for-People-Identification-Using-Hand-Appearance.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] W.W. Boles and B. Boashah, “A Human Identification Technique Using Images of the Iris and Wavelet Transform”, IEEE Trans. on Signal Processing, Vol.46, pp.1185-1188, 1998.
[2] A.Jain, Y.Chen and M.Demirkus, “Pores and Ridges: Fingerprint Matching Using Level 3 Features”, Proc. Of IEEE ICPR conference, pp. 477-480, 2006.
[3] A.M. Martínez, “Recognizing Imprecisely Localized, Partially Occluded, and Expression Variant Faces from a Single Sample per Class”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24 no.6, pp.748-763, June 2002 .
[4] M.Kondo and D.Muramatsu and M.Sasaki and T.Matsumoto , “Bayesian MCMC for Biometric Person Authentication Incorporating On-line Signature Trajectories”, International Conference in Biomechanics , 2007.
[5] L.N.Wong and P.Shi , “Peg-Free Hand Geometry Recognition Using Hierarchical Geometry and Shape Matching”, online: www.ee.ust.hk/~eeship/Papers/MVA02.pdf
[6] X.Wang, H.Gong, H.Zhang, B.Li and Z.Zhuang,”Palmprint Identification using Boosting Local Binary Pattern”, Proc. Of IEEE ICPR conference, pp.503-506, 2006.
[7] M.A.Khaiyat and F.Kamangar, “Planar Curve Representation and Matching,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 76019, May 1990.
[8] R.C.Gonzalez and R.E.Woods, Digital Image Processing Prentice Hall, 2nd edition, 2002.
[9] J.R.Parker, Algorithms for Image Processing and Computer Vision. Wiley Pap/Cdr edition 1996.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]

Model and Solve the Bi-Criteria Multi Source Flexible Multistage Logistics Network
Authors :- Seyed Yaser Bozorgi Rad, Mohammad Ishak Desa and Sara Delfan Azari
Keywords :- Bi-criteria multi source Flexible Multistage Logistics Network (fMLN), Genetic Algorithms, Multi–objective optimization, PARETO solution.
Published Online :- 08 February 2014

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View Full Abstract” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”]

[accordionitem]Flexible Multistage Logistics Network (fMLN) is an extension of the traditional multistage logistics network whereby a customer can procure goods directly from plants or distribution centers needless of retailers. This research intends to formulate the bi-criteria multi source single product fMLN model and discover methods to solve it. Here, total logistics cost and total product delivery time should be minimized simultaneously. By far, fMLN problems have been dealt with in single source form, meaning each customer could only be served by only one source. Because this issue is NP-hard, meta-heuristic techniques such as Genetic Algorithm (GA) have been used to solve the problem. However, under realistic settings, fMNL is multi-source, meaning each customer may be served by a number of facilities simultaneously. Because a multi-source fMNL problem is more complex than the single source in terms of both options as well as constraints, GA will also require enhancement. The proposed solution of this research is representing the chromosome in a new state, capable of improvising the constraints of the problem by a considerable ratio and with the defined crossover and mutation to solve the general bi-criteria multi-source fMNL. The obtained result using enhanced GA will show that it is dramatically improved comparing with using standard GA in order to having lower cost and time.[/accordionitem] [/cq_vc_accordion]

[download url=”http://elvedit.com/journals/IJACSIT/wp-content/uploads/2014/02/IJACSIT-3104.pdf”]

[cq_vc_accordion contentcolor=”#ffffff” accordiontitle=”View References” accordiontitlesize1=”1em” accordioncontentsize1=”1em” titlepadding1=”8px 0″ titlecolor=”#ffffff”][accordionitem][1] Alim, F., Ivanov, K. (2005). Heuristic Rules Embedded Genetic Algorithm to Solve In-Core Fuel Management Optimization Problem, GECCO’05, Washington, DC, USA.
[2] Altiparmak, F., Gen, M., Lin, L. & Karaoglan, I. (2007). A steady- state genetic algorithm for multiproduct supply chain network design, Computers and Industrial Engineering.
[3] Altiparmak, F., Gen, M., Lin, L. and Paksoy, T. (2006). A genetic algorithm approach for multiobjective optimization of supply chain networks. Computers & Industrial Engineering, 51(1), 197–216.
[4] Branke, J., Deb, K., Miettinen, K., and Roman, S. (2008). Multi objective Optimization: Interactive and Evolutionary Approaches, Springer-Verlag Berlin Heidelberg Printed in Germany
[5] Costa, A., Celano, G., Fichera, S. and Trovato, E. (2010). A new efficient encoding/decoding procedure for the design of a supply chain network with genetic algorithms, Computers & Industrial Engineering 59-986–999.
[6] Craenen, B.G.W., Eiben, A.E. Marchiori, E. (2002). Solving Constraint Satisfaction Problems with Heuristic-based Evolutionary Algorithms – ieeexplore.ieee.org.
[7] Gen, M. (2006). Evolutionary technique for logistics network design: state of the art survey. International intelligence logistics system conference.
[8] Gen, M. and Syarif, A. (2005). Hybrid genetic algorithm for multi-time period production / distribution planning, Computers & Industrial Engineering, 48(4), 799–809.
[9] Gen, M., & Cheng, R. (2000). Genetic algorithms and engineering optimization. New York: John Wiley and Sons.
[10] Gen, M., Altiparamk, F. and Lin, L. (2006). A genetic algorithm for two-stage transportation problem using priority-based encoding, OR Spectrum, 28(3), 337–354.
[11] Gen, M., Cheng, C. and Lin, L. (2008). Network Models and Optimization, Multiobjective Genetic Algorithm Approach, Springer-Verlag London Limited.
[12] Lee, J. E., Rhee, K. G. & Gen, M. (2007). Designing a reverse logistics network by priority based genetic algorithm, Proceeding of International Conference on Intelligent Manufacturing Logistics System, 158–163.
[13] Li, Y. Z., Gen, M. & Ida, K. (1998). Improved genetic algorithm for solving multi-objective solid transportation problem with fuzzy number, Japanese Journal of Fuzzy Theory and Systems, 4(3), 220–229.
[14] Lin, L., Gen, M. and Wang, X. (2007). A Hybrid Genetic Algorithm for Logistics Network Design with Flexible Multistage Model.
[15] Michalewicz, Z., Vignaux, G. A. & Hobbs, M. (1991). A non-standard genetic algorithm for the nonlinear transportation problem, ORSA Journal on Computing, 3(4), 307–316.
[16] Rajabalipour, H., Ishak Desa, M. and Wibowo, A. (2011). A flexible three-level logistic network design considering cost and time criteria with a multi-objective evolutionary algorithm, J Intell Manuf DOI
10.1007/s10845-011-0584-7.
[17] Sheta, A. and Turabieh, H. (2006). A Comparsion between Genetic Algorithms and Sequential Quadratic Programming in Solving Constrained Optimization Problems, AIML Journal, Volume (6).
[18] Syarif, A. & Gen, M. (2003). Double spanning tree-based genetic algorithm for two stage transportation problem, International Journal of Knowledge-Based Intelligent Engineering System, 7(4).
[19] Vignaux, G. A. & Michalewicz, Z. (1991). A genetic algorithm for the linear transportation problem, IEEE Transactions on Systems, Man, and Cybernetics, 21(2), 445–452.
[20] Yaohua, H., Hui, C.W. (2007). Genetic algorithm based on heuristic rules for high-constrained largesize single-stage multi-product scheduling with parallel units.
[21] Yeniay, O. (2005). Penallty function methods for constrained optimization with genetic algorithms , Mathematical and Computational Applications, Vol. 10, No. 1, pp. 45-56.
[/accordionitem][/cq_vc_accordion]
[easy-social-share template=”tiny-retina” columns=”5″]