Abstract: In this paper, an alternating implicit block method for
solving two dimensional scalar wave equation is presented. The
new method consist of two stages for each time step implemented
in alternating directions which are very simple in computation. To
increase the speed of computation, a group of adjacent points is
computed simultaneously. It is shown that the presented method
increase the maximum time step size and more accurate than the
conventional finite difference time domain (FDTD) method and other
existing method of natural ordering.
Abstract: The burst of Web 2.0 technology and social
networking tools manifest different styles of learning and managing
knowledge among both knowledge workers and adult learners. In the
Western countries, open-learning concept has been made popular due
to the ease of use and the reach that the technology provides. In
Malaysia, there are still some gaps between the learners- acceptance
of technology and the full implementation of the technology in the
education system. There is a need to understand how adult learners,
who are knowledge workers, manage their personal knowledge via
social networking tools, especially in their learning process. Four
processes of personal knowledge management (PKM) and four
cognitive enablers are proposed supported by analysed data on adult
learners in a university. The model derived from these processes and
enablers is tested and presented, with recommendations on features to be included in adult learners- learning environment.
Abstract: This paper attempts to investigate the factors that influence hotel managers- attitudes towards sustainable tourism practices (STP) in Kuala Lumpur and the state of Selangor in Malaysia. The study distributes 104 questionnaires to hotels ranging from one star to five-star categories including budget hotels. Out of this figure, 60 copies of the questionnaires were returned and analyzed. The finding revealed that of all the seven factors investigated, only the variables measuring incentives and knowledge have significantly influenced sustainable tourism practices in the country. Therefore, government and other green bodies within the country should continue to provide hotels with incentives for sound technologies. Moreover, the government agencies should continue to educate hoteliers on the relevance of environmental protection for the successful implementation of sustainable tourism practices.
Abstract: Mobile Ad Hoc Networks (MANETs) are multi-hop
wireless networks in which all nodes cooperatively maintain network
connectivity. In such a multi-hop wireless network, every node may
be required to perform routing in order to achieve end-to-end
communication among nodes. These networks are energy constrained
as most ad hoc mobile nodes today operate with limited battery
power. Hence, it is important to minimize the energy consumption of
the entire network in order to maximize the lifetime of ad hoc
networks. In this paper, a mechanism involving the integration of
load balancing approach and transmission power control approach is
introduced to maximize the life-span of MANETs. The mechanism is
applied on Ad hoc On-demand Vector (AODV) protocol to make it
as energy aware AODV (EA_AODV). The simulation is carried out
using GloMoSim2.03 simulator. The results show that the proposed
mechanism reduces the average required transmission energy per
packet compared to the standard AODV.
Abstract: Amphawa is the most popular weekend destination for
both domestic and international tourists in Thailand. More than 112
homestays and resorts have been developed along the water
resources. This research aims to initiate appropriate environmental
management system for riverside tourist accommodations in
Amphawa by investigating current environmental characteristics.
Eighty-eight riverside tourist accommodations were survey from
specific questionnaire, GPS data were also gathered for spatial
analysis. The results revealed that the accommodations are welled
manage in regards to some environmental aspects. In order to reduce
economic costs, energy efficiency equipment is utilized. A substantial
number of tourist accommodations encouraged waste separation,
followed by transfer to local administration organization. Grease
traps also utilized in order to decrease chemical discharged, grease
and oil from canteen and restaurants on natural environment. The
most notable mitigation is to initiate environmental friendly cleansers
for tourist accommodation along the riverside in tourism destinations.
Abstract: Recently, analysis and designing of the structures
based on the Reliability theory have been the center of attention.
Reason of this attention is the existence of the natural and random
structural parameters such as the material specification, external
loads, geometric dimensions etc. By means of the Reliability theory,
uncertainties resulted from the statistical nature of the structural
parameters can be changed into the mathematical equations and the
safety and operational considerations can be considered in the
designing process. According to this theory, it is possible to study the
destruction probability of not only a specific element but also the
entire system. Therefore, after being assured of safety of every
element, their reciprocal effects on the safety of the entire system can
be investigated.
Abstract: The Marangoni convective instability in a horizontal
fluid layer with the insoluble surfactant and nondeformable free
surface is investigated. The surface tension at the free surface is
linearly dependent on the temperature and concentration gradients.
At the bottom surface, the temperature conditions of uniform
temperature and uniform heat flux are considered. By linear stability
theory, the exact analytical solutions for the steady Marangoni
convection are derived and the marginal curves are plotted. The
effects of surfactant or elasticity number, Lewis number and Biot
number on the marginal Marangoni instability are assessed. The
surfactant concentration gradients and the heat transfer mechanism at
the free surface have stabilizing effects while the Lewis number
destabilizes fluid system. The fluid system with uniform temperature
condition at the bottom boundary is more stable than the fluid layer
that is subjected to uniform heat flux at the bottom boundary.
Abstract: This paper presents an approach for the determination of the optimal cutting parameters (spindle speed, feed rate, depth of cut and engagement) leading to minimum surface roughness in face milling of high silicon stainless steel by coupling neural network (NN) and Electromagnetism-like Algorithm (EM). In this regard, the advantages of statistical experimental design technique, experimental measurements, artificial neural network, and Electromagnetism-like optimization method are exploited in an integrated manner. To this end, numerous experiments on this stainless steel were conducted to obtain surface roughness values. A predictive model for surface roughness is created by using a back propogation neural network, then the optimization problem was solved by using EM optimization. Additional experiments were performed to validate optimum surface roughness value predicted by EM algorithm. It is clearly seen that a good agreement is observed between the predicted values by EM coupled with feed forward neural network and experimental measurements. The obtained results show that the EM algorithm coupled with back propogation neural network is an efficient and accurate method in approaching the global minimum of surface roughness in face milling.
Abstract: The purpose of this paper is to analyze determinants of
information security affecting adoption of the Web-based integrated
information systems (IIS). We introduced Web-based information
systems which are designed to formulate strategic plans for Peruvian
government. Theoretical model is proposed to test impact of
organizational factors (deterrent efforts and severity; preventive
efforts) and individual factors (information security threat; security
awareness) on intentions to proactively use the Web-based IIS .Our
empirical study results highlight that deterrent efforts and deterrent
severity have no significant influence on the proactive use intentions
of IIS, whereas, preventive efforts play an important role in proactive
use intentions of IIS. Thus, we suggest that organizations need to do
preventive efforts by introducing various information security
solutions, and try to improve information security awareness while
reducing the perceived information security threats.
Abstract: Program slicing is the task of finding all statements in a program that directly or indirectly influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some point in a program is called a program slice. In several software engineering applications, such as program debugging and measuring program cohesion and parallelism, several slices are computed at different program points. In this paper, algorithms are introduced to compute all backward and forward static slices of a computer program by traversing the program representation graph once. The program representation graph used in this paper is called Program Dependence Graph (PDG). We have conducted an experimental comparison study using 25 software modules to show the effectiveness of the introduced algorithm for computing all backward static slices over single-point slicing approaches in computing the parallelism and functional cohesion of program modules. The effectiveness of the algorithm is measured in terms of time execution and number of traversed PDG edges. The comparison study results indicate that using the introduced algorithm considerably saves the slicing time and effort required to measure module parallelism and functional cohesion.
Abstract: Aggression is a behavior that cannot be approved by
the society. Vandalism which is aggression towards objects is an
action that tends to damage public or personal property. The
behaviors that are described as vandalism can often be observed in
the schools as well. According to Zwier and Vaughan (1)
previous research about the reasons of and precautionary measures
for vandalism in schools can be grouped in three tendency categories:
conservative, liberal and radical. In this context, the main aim of this
study is to discover which ideological tendency of the reasons of
school vandalism is adopted by the teachers and what are their
physical, environmental, school system and societal solutions for
vandalism. A total of 200 teachers participated in this study, and the
mean age was 34.20 years (SD = 6.54). The sample was made up of
109 females and 91 males. For the analysis of the data, SPSS 15.00,
frequency, percentage, and t-test were used. The research showed
that the teachers have tendencies in the order of conservative, liberal
and radical for the reasons of vandalism. The research also showed
that the teachers do not have any tendency for eliminating vandalism
physically and general solutions on the level of society; on the other
hand they mostly adopt a conservative tendency in terms of
precautions against vandalism in the school system. Second most,
they adopt the liberal tendency in terms of precautions against
vandalism in the school system. . It is observed that the findings of
this study are comparable to the existing literature on the subject.
Future studies should be conducted with multiple variants and
bigger sampling.
Abstract: We present here the results for a comparative study of
some techniques, available in the literature, related to the relevance
feedback mechanism in the case of a short-term learning. Only one
method among those considered here is belonging to the data mining
field which is the K-nearest neighbors algorithm (KNN) while the
rest of the methods is related purely to the information retrieval field
and they fall under the purview of the following three major axes:
Shifting query, Feature Weighting and the optimization of the
parameters of similarity metric. As a contribution, and in addition to
the comparative purpose, we propose a new version of the KNN
algorithm referred to as an incremental KNN which is distinct from
the original version in the sense that besides the influence of the
seeds, the rate of the actual target image is influenced also by the
images already rated. The results presented here have been obtained
after experiments conducted on the Wang database for one iteration
and utilizing color moments on the RGB space. This compact
descriptor, Color Moments, is adequate for the efficiency purposes
needed in the case of interactive systems. The results obtained allow
us to claim that the proposed algorithm proves good results; it even
outperforms a wide range of techniques available in the literature.
Abstract: We investigate the ZnO role in the inherent protection
of old manuscripts to protect them against environmental damaging
effect of ultraviolet radiation, pollutant gasses, mold and bacteria. In
this study a cellulosic nanocomposite of ZnO were used as protective
coating on the surface of paper fibers. This layered nanocomposite
can act as a consolidate materials too. Furthermore, to determine how
well paper works screen objects from the damaging effects, two
accelerated aging mechanisms due to light and heat are discussed.
Results show good stability of papers with nanocomposite coating.
Also, a good light stability was shown in the colored paper that
treated with this nanocomposite. Furthermore, to demonstrate the
degree of antifungal and antibacterial properties of coated papers,
papers was treated with four common molds and bacteria and the
good preventive effects of coated paper against molds and bacteria
are described.
Abstract: A Novel fuzzy neural network combining with support vector learning mechanism called support-vector-based fuzzy neural networks (SVBFNN) is proposed. The SVBFNN combine the capability of minimizing the empirical risk (training error) and expected risk (testing error) of support vector learning in high dimensional data spaces and the efficient human-like reasoning of FNN.
Abstract: In this paper we present an energy efficient match-line
(ML) sensing scheme for high-speed ternary content-addressable
memory (TCAM). The proposed scheme isolates the sensing unit of
the sense amplifier from the large and variable ML capacitance. It
employs feedback in the sense amplifier to successfully detect a
match while keeping the ML voltage swing low. This reduced voltage
swing results in large energy saving. Simulation performed using
130nm 1.2V CMOS logic shows at least 30% total energy saving in
our scheme compared to popular current race (CR) scheme for
similar search speed. In terms of speed, dynamic energy, peak power
consumption and transistor count our scheme also shows better
performance than mismatch-dependant (MD) power allocation
technique which also employs feedback in the sense amplifier.
Additionally, the implementation of our scheme is simpler than CR
or MD scheme because of absence of analog control voltage and
programmable delay circuit as have been used in those schemes.
Abstract: In this paper, half bridge DC-DC converters with
transformer isolation presented in the literature are analyzed for highcurrent
and low-voltage applications under the same operation
conditions, and compared in terms of losses and efficiency. The
conventional and improved half-bridge DC-DC converters are
simulated, and current and voltage waveforms are obtained for input
voltage Vdc=500V, output current IO=450A, output voltage VO=38V
and switching frequency fS=20kHz. IGBTs are used as power
semiconductor switches. The power losses of the semiconductor
devices are calculated from current and voltage waveforms. From
simulation results, it is seen that the capacitor switched half bridge
converter has the best efficiency value, and can be preferred at high
power and high frequency applications.
Abstract: The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been slow and needed this catalyst. This special case offered a window of opportunity for many “security conscious" regimes in cementing their legal-criminological and political security apparatus. At the international level, the 9/11 case led to the hasty adoption of Security Council resolution 1373 in 2001, which called upon states to adopt wide-ranging and comprehensive steps and strategies to combat international terrorism and to become parties to the relevant international conventions and protocols relating to terrorism. Since then, Kenya has responded with speed in devising social-legal-criminological-political actions.
Abstract: Mendelian Disease Genes represent a collection of single points of failure for the various systems they constitute. Such genes have been shown, on average, to encode longer proteins than 'non-disease' proteins. Existing models suggest that this results from the increased likeli-hood of longer genes undergoing mutations. Here, we show that in saturated mutagenesis experiments performed on model organisms, where the likelihood of each gene mutating is one, a similar relationship between length and the probability of a gene being lethal was observed. We thus suggest an extended model demonstrating that the likelihood of a mutated gene to produce a severe phenotype is length-dependent. Using the occurrence of conserved domains, we bring evidence that this dependency results from a correlation between protein length and the number of functions it performs. We propose that protein length thus serves as a proxy for protein cardinality in different networks required for the organism's survival and well-being. We use this example to argue that the collection of Mendelian Disease Genes can, and should, be used to study the rules governing systems vulnerability in living organisms.
Abstract: We depend upon explanation in order to “make sense"
out of our world. And, making sense is all the more important when
dealing with change. But, what happens if our explanations are
wrong? This question is examined with respect to two types of
explanatory model. Models based on labels and categories we shall
refer to as “representations." More complex models involving
stories, multiple algorithms, rules of thumb, questions, ambiguity we
shall refer to as “compressions." Both compressions and
representations are reductions. But representations are far more
reductive than compressions. Representations can be treated as a set
of defined meanings – coherence with regard to a representation is
the degree of fidelity between the item in question and the definition
of the representation, of the label. By contrast, compressions contain
enough degrees of freedom and ambiguity to allow us to make
internal predictions so that we may determine our potential actions in
the possibility space. Compressions are explanatory via mechanism.
Representations are explanatory via category. Managers are often
confusing their evocation of a representation (category inclusion) as
the creation of a context of compression (description of mechanism).
When this type of explanatory error occurs, more errors follow. In
the drive for efficiency such substitutions are all too often proclaimed
– at the manager-s peril..
Abstract: Due to the Rapid Urbanization in China, the influence of metropolises to surrounding areas grows by a tremendous speed in developed region. One of the most obvious influences is the expansion of the urban built-up areas which covers the land belongs to small towns. Around metropolitan fringe, the boundary between city and village becomes more and more obscure. So being the most sensitive area, the small towns on the fringe of metropolises have the special meaning on the research into the small towns- development. This paper chooses Sandun Town in Hangzhou of Zhejiang Province as an example, emphatically focus on aspects such as the central area proliferation, the industrial shift, the position effect, the subway effect and the commercial development, reviews a few problems of small towns in the future and the important problems in their planning by the analysis of the characteristics of the present conditions and the developing motive mechanism, so that guides small towns to develop properly by liking with these small towns and center metropolises.