In this paper, we consider a criminal investigation on the collective guilt of part members in a working group. Assuming that the statistics we used are reliable, we present the Page Rank Model based on mutual information. First, we use the average mutual information between non-suspicious topics and the suspicious topics to score the topics by degree of suspicion. Second, we build the correlation matrix based on the degree of suspicion and acquire the corresponding Markov state transition matrix. Then, we set the original value for all members of the working group based on the degree of suspicion. At the last, we calculate the suspected degree of each member in the working group. In the small 10-people case, we build the improved Page Rank model. By calculating the statistics of this case, we acquire a table which indicates the ranking of the suspected degree. In contrast with the results given in this issue, we find these two results basically match each other, indicating the model we have built is feasible. In the current case, firstly, we obtain a ranking list on 15 topics in order of suspicion via Page Rank Model based on mutual information. Secondly, we acquire the stable point of Markov state transition matrix using the Markov chain. Then, we build the connection matrix based on the degree of suspicion and acquire the corresponding Markov state transition matrix. Last, we calculate the degree of 83 candidates. From the result, we can see that those suspicious are on the top of the ranking list while those innocent people are at the bottom of the list, representing that the model we have built is feasible. When suspicious topics and conspirators changed, a relatively good result can also be obtained by this model. In the current case, we have the evidence to believe that Dolores and Jerome, who are the senior managers, have significant suspicion. It is recommended that future attention should be paid to them. The Page Rank Model, based on mutual information, takes full account of the information flow in message distribution network. This model can not only deal with the statistics used in conspiracy, but also be applied to detect the infected cells in a biological network. Finally, we present the advantages and disadvantages of this model and the direction of improvements.
El sacerdote jesuita Juan Masiá, experto en bioética, fue cesado recientemente de su puesto como director de la cátedra de Bioética de la Universidad Pontificia de Comillas debido a su último libro y entrevistas en los medios donde expresó posturas consideradas controvertidas. Masiá critica que bajo el papado de Juan Pablo II la Iglesia retrocedió ideológicamente en temas como la ciencia, el sexo y la moral, y mantiene que la Iglesia aún tiene tabúes sin sentido sobre estos temas. Argumenta que
The Q magazine has its selling line located above the masthead, while Kerrang magazine does not have a selling line. Both magazines use bright colors and eye-catching designs in their layouts. They also both feature large main images and colored mastheads.
The document analyzes and summarizes an advertisement for the perfume "So? Super star". It describes the advertisement's use of lighting, images, and placement of elements to draw attention to the main subject and create the impression of a celebrity. The target audience is identified as women who want to smell nice and receive compliments. The catchy slogan "Fragrance with a Celebs attitude" aims to be memorable and appeal to potential buyers.
Duplicate Code Detection using Control StatementsEditor IJCATR
Code clone detection is an important area of research as reusability is a key factor in software evolution. Duplicate code
degrades the design and structure of software and software qualities like readability, changeability, maintainability. Code clone
increases the maintenance cost as incorrect changes in copied code may lead to more errors. In this paper we address structural code
similarity detection and propose new methods to detect structural clones using structure of control statements. By structure we mean
order of control statements used in the source code. We have considered two orders of control structures: (i) Sequence of control
statements as it appears (ii) Execution flow of control statements.
The document provides 10 definitions of culture from various theorists. Broadly, the definitions characterize culture as a shared system of symbols, meanings, assumptions, and patterns of behavior that are learned and transmitted between individuals in a group to provide structure, predictability and a sense of identity. Culture is described as being everywhere yet invisible, providing norms and rules to guide how people perceive, think, feel and act within a society or organization.
In this paper, we consider a criminal investigation on the collective guilt of part members in a working group. Assuming that the statistics we used are reliable, we present the Page Rank Model based on mutual information. First, we use the average mutual information between non-suspicious topics and the suspicious topics to score the topics by degree of suspicion. Second, we build the correlation matrix based on the degree of suspicion and acquire the corresponding Markov state transition matrix. Then, we set the original value for all members of the working group based on the degree of suspicion. At the last, we calculate the suspected degree of each member in the working group. In the small 10-people case, we build the improved Page Rank model. By calculating the statistics of this case, we acquire a table which indicates the ranking of the suspected degree. In contrast with the results given in this issue, we find these two results basically match each other, indicating the model we have built is feasible. In the current case, firstly, we obtain a ranking list on 15 topics in order of suspicion via Page Rank Model based on mutual information. Secondly, we acquire the stable point of Markov state transition matrix using the Markov chain. Then, we build the connection matrix based on the degree of suspicion and acquire the corresponding Markov state transition matrix. Last, we calculate the degree of 83 candidates. From the result, we can see that those suspicious are on the top of the ranking list while those innocent people are at the bottom of the list, representing that the model we have built is feasible. When suspicious topics and conspirators changed, a relatively good result can also be obtained by this model. In the current case, we have the evidence to believe that Dolores and Jerome, who are the senior managers, have significant suspicion. It is recommended that future attention should be paid to them. The Page Rank Model, based on mutual information, takes full account of the information flow in message distribution network. This model can not only deal with the statistics used in conspiracy, but also be applied to detect the infected cells in a biological network. Finally, we present the advantages and disadvantages of this model and the direction of improvements.
El sacerdote jesuita Juan Masiá, experto en bioética, fue cesado recientemente de su puesto como director de la cátedra de Bioética de la Universidad Pontificia de Comillas debido a su último libro y entrevistas en los medios donde expresó posturas consideradas controvertidas. Masiá critica que bajo el papado de Juan Pablo II la Iglesia retrocedió ideológicamente en temas como la ciencia, el sexo y la moral, y mantiene que la Iglesia aún tiene tabúes sin sentido sobre estos temas. Argumenta que
The Q magazine has its selling line located above the masthead, while Kerrang magazine does not have a selling line. Both magazines use bright colors and eye-catching designs in their layouts. They also both feature large main images and colored mastheads.
The document analyzes and summarizes an advertisement for the perfume "So? Super star". It describes the advertisement's use of lighting, images, and placement of elements to draw attention to the main subject and create the impression of a celebrity. The target audience is identified as women who want to smell nice and receive compliments. The catchy slogan "Fragrance with a Celebs attitude" aims to be memorable and appeal to potential buyers.
Duplicate Code Detection using Control StatementsEditor IJCATR
Code clone detection is an important area of research as reusability is a key factor in software evolution. Duplicate code
degrades the design and structure of software and software qualities like readability, changeability, maintainability. Code clone
increases the maintenance cost as incorrect changes in copied code may lead to more errors. In this paper we address structural code
similarity detection and propose new methods to detect structural clones using structure of control statements. By structure we mean
order of control statements used in the source code. We have considered two orders of control structures: (i) Sequence of control
statements as it appears (ii) Execution flow of control statements.
The document provides 10 definitions of culture from various theorists. Broadly, the definitions characterize culture as a shared system of symbols, meanings, assumptions, and patterns of behavior that are learned and transmitted between individuals in a group to provide structure, predictability and a sense of identity. Culture is described as being everywhere yet invisible, providing norms and rules to guide how people perceive, think, feel and act within a society or organization.
e-Governance Implementation In Ebonyi State Nigeria: Challenges and ProspectsEditor IJCATR
The deployment of Information and Communication Technology (ICT) in different facets of the world’s economy has yielded very reasonable results. ICT has blured the barriers of hinderances in tourism, trade, healthcare, education and training. In governance and administration, ICT applications have enhanced the delivery of public services to citizens and clients not only by improving the process and management of government, but also by redefining the traditional concepts of citizenship. This paper examined the challenges facing the implementation of e-Governance in Ebonyi State – Nigeria and highlights the prospects. The research used a primary source of data by distributing, collecting and analysing a total of 500 questionnaires administered to respondents in the research area (Ebonyi State). The research found that the most difficult challenges facing the deployment of e-governance in Ebonyi State were lack of steady power supply, poor communication infrastructure and high cost of computer and internet equipments. The survey also revealed that the use of e-governance would bring improved efficiency in government operations without necessarily increasing the cost of state governance. e-Governance would strengthen democratic principles and ideologies which inturn brings good governance to the people.
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...Editor IJCATR
Being out of touch with a loved one is concerning and not hearing from someone you care about is terrifying. Several cases
of missing people have been reported for many years, where most of the searches turn out unsuccessful. In order to quickly reunite
families and friends with their missing loved ones, a solution for effectively searching for the missing people is presented. In
evaluation of this solution, an F1 score test was simulated using 20 scenarios, out of which an impressive score of 0.72 was attained.
The study concludes that we need to leverage on mobile based technology to device a more efficient method of finding missing
persons more easily and quickly.
A news clipping from Thai Rath on October 1, 2009 discusses natural disasters in Thailand, specifically landslides and storms. The clipping is from a Thai daily newspaper with a circulation of 1.2 million people located in Thailand. The source is listed as the newspaper's own reporting from Bangkok.
Bragged Regression Tree Algorithm for Dynamic Distribution and Scheduling of ...Editor IJCATR
In the past few years, Grid computing came up as next generation computing platform which is a combination of
heterogeneous computing resources combined by a network across dynamic and geographically separated organizations. So, it
provides the perfect computing environment to solve large-scale computational demands. As the Grid computing demands are still
increasing from day to day due to rise in large number of complex jobs worldwide. So, the jobs may take much longer time to
complete due to poor distribution of batches or groups of jobs to inappropriate CPU’s. Therefore there is need to develop an efficient
dynamic job scheduling algorithm that would assign jobs to appropriate CPU’s dynamically. The main problem which dealt in the
paper is, how to distribute the jobs when the payload, importance, urgency, flow time etc. dynamically keeps on changing as the grid
expands or is flooded with number of job requests from different machines within the grid.
In this paper, we present a scheduling strategy which takes the advantage of decision tree algorithm to take dynamic decision
based on the current scenarios and which automatically incorporates factor analysis for considering the distribution of jobs.
This paper presents embedding of data in an image using pixel-value differencing technique. This scheme is used to embed large amount of data by changing the difference between two pixels so that we are able to increase the embedding capacity. There is another technique that is pixel value shifting which also increase the embedding capacity but according to this scheme capacity will increase at edge areas of image.
Online Social Network (OSN) sites act as a medium to spread their own views, activities and their thoughts to some camaraderie. Contents of this network are spread over web, so it was hard to determine by a human decision. Currently, they do not provide any mechanism to ensure privacy concerns towards data associated with each user. Due to this problem, number of users lacks from their ownership control. In this paper, we proposed AC2P (Activity Control-Access Control Protocol) for information control on the web. Alternatively, Tag Refinement strategy determines illegal tagging over images and send notification about particular image spread within different communities/groups. These techniques reduce risk of information flow and avoid unwanted tagging toward images.
Project Scheduling: Survey and Research PotentialsEditor IJCATR
project scheduling is very critical topic in project management. Resource constrained project scheduling problem (RCPSP) consists of activities that must be scheduled based on dependencies relationships and priorities of activities. In the recent years there have been many survey papers around the area of project scheduling, as many researchers developed both exact and heuristic scheduling schemes. This paper give an over view around the resource constrained project scheduling problem (RCPSP).
Superconductivity and Spin Density Wave (SDW) in NaFe1-xCoxAsEditor IJCATR
A model is presented utilizing a Hamiltonian with equal spin singlet and triplet pairings based on quantum field theory and
green function formalism, to show the correlation between the superconducting and spin density wave (SDW) order parameters. The
model exhibits a distinct possibility of the coexistence of superconductivity and long-range magnetic phase, which are two usually
incompatible cooperative phenomena. The work is motivated by the recent experimental evidences on high-TC superconductivity in
the FeAs-based superconductors. The theoretical results are then applied to show the coexistence of superconductivity and spin density
wave (SDW) in NaFe1-xCoxAs.
El documento describe diferentes enfoques para celebrar la eucaristía de forma significativa y compartida. Propone celebrarla como una comida compartida, contando las experiencias del día, leyendo los evangelios y compartiendo el pan y el vino. También sugiere celebrarla en pequeñas comunidades, poniendo sobre la mesa la vida, la palabra y el pan para compartir, y recordando las palabras de Jesús de partir, repartir y compartir la vida. El objetivo es hacer presente a Jesús a través de la comunión y la fraternidad, no de forma ritual
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
This document presents a new routing protocol for mobile ad hoc networks that uses a hybrid of ant colony optimization and particle swarm optimization algorithms. It aims to improve quality of service for routing by using a clustering technique to eliminate multicast trees and assign cluster heads to be responsible for multicasting. The path selection is evaluated based on ant colony optimization to produce better results than other techniques. It is proposed that this approach will diminish overall energy consumption and complexity compared to previous algorithms. The document provides background on mobile ad hoc networks, routing protocols, and related work applying swarm intelligence and other approaches to improve QoS routing.
ADONIS Process Portal permite el acceso en línea a los procesos modelados en ADONIS de forma intuitiva y sin necesidad de entrar en la aplicación, ofreciendo una interfaz adaptada a diferentes perfiles de usuario y funcionalidades como la actualización en línea de procesos, workflow de versionamiento y control de indicadores.
Non-Blind Deblurring Using Partial Differential Equation MethodEditor IJCATR
This document presents a method for non-blind image deblurring using partial differential equations (PDEs). It introduces a PDE-based model to describe the blurring process caused by relative motion between the camera and object. The model is discretized using the Navier-Stokes equation, resulting in a PDE that can be used to deblur images. Algorithms are presented to deblur images blurred in the vertical and horizontal directions separately, as well as a combined algorithm to handle two-directional motion blur. Experimental results on blurred and noisy test images show the PDE method achieves better deblurring compared to other techniques like Wiener filtering, as measured by higher peak signal-to-noise ratio values
Data Mining plays an important role in extracting patterns and other information from data. The Apriori Algorithm has been the most popular techniques infinding frequent patterns. However, Apriori Algorithm scans the database many times leading to large I/O. This paper is proposed to overcome the limitaions of Apriori Algorithm while improving the overall speed of execution for all variations in ‘minimum support’. It is aimed to reduce the number of scans required to find frequent patters.
Creating a portfolio allows you to showcase your work and skills to others. It provides a way to display examples of your writing and projects beyond just discussing them. A portfolio helps demonstrate your abilities and experience through concrete work samples rather than just discussing your qualifications on paper.
e-Governance Implementation In Ebonyi State Nigeria: Challenges and ProspectsEditor IJCATR
The deployment of Information and Communication Technology (ICT) in different facets of the world’s economy has yielded very reasonable results. ICT has blured the barriers of hinderances in tourism, trade, healthcare, education and training. In governance and administration, ICT applications have enhanced the delivery of public services to citizens and clients not only by improving the process and management of government, but also by redefining the traditional concepts of citizenship. This paper examined the challenges facing the implementation of e-Governance in Ebonyi State – Nigeria and highlights the prospects. The research used a primary source of data by distributing, collecting and analysing a total of 500 questionnaires administered to respondents in the research area (Ebonyi State). The research found that the most difficult challenges facing the deployment of e-governance in Ebonyi State were lack of steady power supply, poor communication infrastructure and high cost of computer and internet equipments. The survey also revealed that the use of e-governance would bring improved efficiency in government operations without necessarily increasing the cost of state governance. e-Governance would strengthen democratic principles and ideologies which inturn brings good governance to the people.
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...Editor IJCATR
Being out of touch with a loved one is concerning and not hearing from someone you care about is terrifying. Several cases
of missing people have been reported for many years, where most of the searches turn out unsuccessful. In order to quickly reunite
families and friends with their missing loved ones, a solution for effectively searching for the missing people is presented. In
evaluation of this solution, an F1 score test was simulated using 20 scenarios, out of which an impressive score of 0.72 was attained.
The study concludes that we need to leverage on mobile based technology to device a more efficient method of finding missing
persons more easily and quickly.
A news clipping from Thai Rath on October 1, 2009 discusses natural disasters in Thailand, specifically landslides and storms. The clipping is from a Thai daily newspaper with a circulation of 1.2 million people located in Thailand. The source is listed as the newspaper's own reporting from Bangkok.
Bragged Regression Tree Algorithm for Dynamic Distribution and Scheduling of ...Editor IJCATR
In the past few years, Grid computing came up as next generation computing platform which is a combination of
heterogeneous computing resources combined by a network across dynamic and geographically separated organizations. So, it
provides the perfect computing environment to solve large-scale computational demands. As the Grid computing demands are still
increasing from day to day due to rise in large number of complex jobs worldwide. So, the jobs may take much longer time to
complete due to poor distribution of batches or groups of jobs to inappropriate CPU’s. Therefore there is need to develop an efficient
dynamic job scheduling algorithm that would assign jobs to appropriate CPU’s dynamically. The main problem which dealt in the
paper is, how to distribute the jobs when the payload, importance, urgency, flow time etc. dynamically keeps on changing as the grid
expands or is flooded with number of job requests from different machines within the grid.
In this paper, we present a scheduling strategy which takes the advantage of decision tree algorithm to take dynamic decision
based on the current scenarios and which automatically incorporates factor analysis for considering the distribution of jobs.
This paper presents embedding of data in an image using pixel-value differencing technique. This scheme is used to embed large amount of data by changing the difference between two pixels so that we are able to increase the embedding capacity. There is another technique that is pixel value shifting which also increase the embedding capacity but according to this scheme capacity will increase at edge areas of image.
Online Social Network (OSN) sites act as a medium to spread their own views, activities and their thoughts to some camaraderie. Contents of this network are spread over web, so it was hard to determine by a human decision. Currently, they do not provide any mechanism to ensure privacy concerns towards data associated with each user. Due to this problem, number of users lacks from their ownership control. In this paper, we proposed AC2P (Activity Control-Access Control Protocol) for information control on the web. Alternatively, Tag Refinement strategy determines illegal tagging over images and send notification about particular image spread within different communities/groups. These techniques reduce risk of information flow and avoid unwanted tagging toward images.
Project Scheduling: Survey and Research PotentialsEditor IJCATR
project scheduling is very critical topic in project management. Resource constrained project scheduling problem (RCPSP) consists of activities that must be scheduled based on dependencies relationships and priorities of activities. In the recent years there have been many survey papers around the area of project scheduling, as many researchers developed both exact and heuristic scheduling schemes. This paper give an over view around the resource constrained project scheduling problem (RCPSP).
Superconductivity and Spin Density Wave (SDW) in NaFe1-xCoxAsEditor IJCATR
A model is presented utilizing a Hamiltonian with equal spin singlet and triplet pairings based on quantum field theory and
green function formalism, to show the correlation between the superconducting and spin density wave (SDW) order parameters. The
model exhibits a distinct possibility of the coexistence of superconductivity and long-range magnetic phase, which are two usually
incompatible cooperative phenomena. The work is motivated by the recent experimental evidences on high-TC superconductivity in
the FeAs-based superconductors. The theoretical results are then applied to show the coexistence of superconductivity and spin density
wave (SDW) in NaFe1-xCoxAs.
El documento describe diferentes enfoques para celebrar la eucaristía de forma significativa y compartida. Propone celebrarla como una comida compartida, contando las experiencias del día, leyendo los evangelios y compartiendo el pan y el vino. También sugiere celebrarla en pequeñas comunidades, poniendo sobre la mesa la vida, la palabra y el pan para compartir, y recordando las palabras de Jesús de partir, repartir y compartir la vida. El objetivo es hacer presente a Jesús a través de la comunión y la fraternidad, no de forma ritual
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
This document presents a new routing protocol for mobile ad hoc networks that uses a hybrid of ant colony optimization and particle swarm optimization algorithms. It aims to improve quality of service for routing by using a clustering technique to eliminate multicast trees and assign cluster heads to be responsible for multicasting. The path selection is evaluated based on ant colony optimization to produce better results than other techniques. It is proposed that this approach will diminish overall energy consumption and complexity compared to previous algorithms. The document provides background on mobile ad hoc networks, routing protocols, and related work applying swarm intelligence and other approaches to improve QoS routing.
ADONIS Process Portal permite el acceso en línea a los procesos modelados en ADONIS de forma intuitiva y sin necesidad de entrar en la aplicación, ofreciendo una interfaz adaptada a diferentes perfiles de usuario y funcionalidades como la actualización en línea de procesos, workflow de versionamiento y control de indicadores.
Non-Blind Deblurring Using Partial Differential Equation MethodEditor IJCATR
This document presents a method for non-blind image deblurring using partial differential equations (PDEs). It introduces a PDE-based model to describe the blurring process caused by relative motion between the camera and object. The model is discretized using the Navier-Stokes equation, resulting in a PDE that can be used to deblur images. Algorithms are presented to deblur images blurred in the vertical and horizontal directions separately, as well as a combined algorithm to handle two-directional motion blur. Experimental results on blurred and noisy test images show the PDE method achieves better deblurring compared to other techniques like Wiener filtering, as measured by higher peak signal-to-noise ratio values
Data Mining plays an important role in extracting patterns and other information from data. The Apriori Algorithm has been the most popular techniques infinding frequent patterns. However, Apriori Algorithm scans the database many times leading to large I/O. This paper is proposed to overcome the limitaions of Apriori Algorithm while improving the overall speed of execution for all variations in ‘minimum support’. It is aimed to reduce the number of scans required to find frequent patters.
Creating a portfolio allows you to showcase your work and skills to others. It provides a way to display examples of your writing and projects beyond just discussing them. A portfolio helps demonstrate your abilities and experience through concrete work samples rather than just discussing your qualifications on paper.
This document summarizes the Creative Commons Sampling Plus 1.0 license. The key details are:
1) The work is licensed under the Creative Commons Sampling Plus 1.0 License which allows viewing or obtaining a copy of the license terms from the provided web address or mailing address.
2) The characters, places, events and other elements of this story may be used in derivative works, even commercially, according to the license terms.
3) The full text or pictures from the licensed work cannot be sold without permission. Any questions should be directed to the provided email address.