Abstract: Tailor-welded Blanks (TWBs) are tailor made for
different complex component designs by welding multiple metal
sheets with different thicknesses, shapes, coatings or strengths prior
to forming. In this study the Hemispherical Die Stretching (HDS) test
(out-of-plane stretching) of TWBs were simulated via
ABAQUS/Explicit to obtain the Forming Limit Diagrams (FLDs) of
Stainless steel (AISI 304) laser welded blanks with different
thicknesses. Two criteria were used to detect the start of necking to
determine the FLD for TWBs and parent sheet metals. These two
criteria are the second derivatives of the major and thickness strains
that are given from the strain history of simulation. In the other word,
in these criteria necking starts when the second derivative of
thickness or major strain reaches its maximum. With having the time
of onset necking, one can measure the major and minor strains at the
critical area and determine the forming limit curve.
Abstract: An application framework provides a reusable
design and implementation for a family of software systems.
Frameworks are introduced to reduce the cost of a product line
(i.e., family of products that share the common features). Software
testing is a time consuming and costly ongoing activity during the
application software development process. Generating reusable test
cases for the framework applications at the framework
development stage, and providing and using the test cases to test
part of the framework application whenever the framework is used
reduces the application development time and cost considerably.
Framework Interface Classes (FICs) are classes introduced by
the framework hooks to be implemented at the application
development stage. They can have reusable test cases generated at
the framework development stage and provided with the
framework to test the implementations of the FICs at the
application development stage. In this paper, we conduct a case
study using thirteen applications developed using three
frameworks; one domain oriented and two application oriented.
The results show that, in general, the percentage of the number of
FICs in the applications developed using domain frameworks is, on
average, greater than the percentage of the number of FICs in the
applications developed using application frameworks.
Consequently, the reduction of the application unit testing time
using the reusable test cases generated for domain frameworks is,
in general, greater than the reduction of the application unit testing
time using the reusable test cases generated for application
frameworks.
Abstract: Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.
Abstract: Research in e-Business has been growing
tremendously covering all related aspects such as adoption issues, e-
Business models, strategies, etc. This research aims to explore the
potential of adopting e-Business for a micro size business operating
from home called home-based businesses (HBBs). In Malaysia, the
HBB industry started many years ago and were mostly monopolized
by women or housewives managed as a part-time job to support their
family economy. Today, things have changed. The availability of the
Internet technology and the emergence of e-Business concept
promote the evolution of HBBs, which have been adopted as another
alternative as a professional career for women without neglecting
their family needs especially the children. Although this study is
confined to a limited sample size and within geographical biasness,
the findings show that it concurs with previous large scale studies. In
this study, both qualitative and quantitative methods were used and
data were gathered using triangulation methods via interview, direct
observation, document analysis and survey questionnaires. This paper
discusses the literature review, research methods and findings
pertaining to e-Business adoption factors that influence the HBBs in
Malaysia.
Abstract: In order to consider the effects of the higher modes in
the pushover analysis, during the recent years several multi-modal
pushover procedures have been presented. In these methods the
response of the considered modes are combined by the square-rootof-
sum-of-squares (SRSS) rule while application of the elastic modal
combination rules in the inelastic phases is no longer valid. In this
research the feasibility of defining an efficient alternative
combination method is investigated. Two steel moment-frame
buildings denoted SAC-9 and SAC-20 under ten earthquake records
are considered. The nonlinear responses of the structures are
estimated by the directed algebraic combination of the weighted
responses of the separate modes. The weight of the each mode is
defined so that the resulted response of the combination has a
minimum error to the nonlinear time history analysis. The genetic
algorithm (GA) is used to minimize the error and optimize the weight
factors. The obtained optimal factors for each mode in different cases
are compared together to find unique appropriate weight factors for
each mode in all cases.
Abstract: For professions of high risk industries, simulation training has always been thought in terms of high degree of fidelity regarding the real operational situation. Due to the recent progress, this way of training is changing, modifying the human-computer and software interactions: the interactions between trainees during simulation training session tend to become virtual, transforming the social-based embodiness (the way subjects integrate social skills for interpersonal relationship with co-workers). On the basis of the analysis of eight different profession trainings, a categorization of interactions has help to produce an analytical tool, the social interactions table. This tool may be very valuable to point out the changes of social interactions when the training sessions are skipping from a high fidelity simulator to a virtual simulator. In this case, it helps the designers of professional training to analyze and to assess the consequences of the potential lack the social-based embodiness.
Abstract: This paper presents the results of thermo-mechanical
characterization of Glass/Epoxy composite specimens using Infrared
Thermography technique. The specimens used for the study were
fabricated in-house with three different lay-up sequences and tested
on a servo hydraulic machine under uni-axial loading. Infrared
Camera was used for on-line monitoring surface temperature changes
of composite specimens during tensile deformation.
Experimental results showed that thermomechanical
characteristics of each type of specimens were distinct. Temperature
was found to be decreasing linearly with increasing tensile stress in
the elastic region due to thermo-elastic effect. Yield point could be
observed by monitoring the change in temperature profile during
tensile testing and this value could be correlated with the results
obtained from stress-strain response. The extent of prior plastic
deformation in the post-yield region influenced the slopes of
temperature response during tensile loading. Partial unloading and
reloading of specimens post-yield results in change in slope in elastic
and plastic regions of composite specimens.
Abstract: In this paper, we propose a new robust and secure
system that is based on the combination between two different
transforms Discrete wavelet Transform (DWT) and Contourlet
Transform (CT). The combined transforms will compensate the
drawback of using each transform separately. The proposed
algorithm has been designed, implemented and tested successfully.
The experimental results showed that selecting the best sub-band for
embedding from both transforms will improve the imperceptibility
and robustness of the new combined algorithm. The evaluated
imperceptibility of the combined DWT-CT algorithm which gave a
PSNR value 88.11 and the combination DWT-CT algorithm
improves robustness since it produced better robust against Gaussian
noise attack. In addition to that, the implemented system shored a
successful extraction method to extract watermark efficiently.
Abstract: The purpose of this study was to find out the
effectiveness of neurological impress method and repeated reading
technique on reading fluency of children with learning disabilities.
Thirty primary four pupils in three public primary schools
participated in the study. There were two experimental groups and a
control. This research employed a 3 by 2 factorial matrix and the
participants were taught for one session. Two hypotheses were
formulated to guide the research. T-test was used to analyse the data
gathered, and data analysis revealed that pupils exposed to the two
treatment strategies had improvement in their reading fluency. It was
recommended that the two strategies used in the study can be used to
intervene in reading fluency problems in children with learning
disabilities.
Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: This paper describes a concept of stereotype student
model in adaptive knowledge acquisition e-learning system. Defined
knowledge stereotypes are based on student's proficiency level and
on Bloom's knowledge taxonomy. The teacher module is responsible
for the whole adaptivity process: the automatic generation of
courseware elements, their dynamic selection and sorting, as well as
their adaptive presentation using templates for statements and
questions. The adaptation of courseware is realized according to
student-s knowledge stereotype.
Abstract: We suggest a novel method to incorporate longterm
redundancy (LTR) in signal time domain compression
methods. The proposition is based on block-sorting and curve
simplification. The proposition is illustrated on the ECG
signal as a post-processor for the FAN method. Test
applications on the new so-obtained FAN+ method using the
MIT-BIH database show substantial improvement of the
compression ratio-distortion behavior for a higher quality
reconstructed signal.
Abstract: This paper describes the authorization system
architecture for Pervasive Grid environment. It discusses the
characteristics of classical authorization system and requirements of
the authorization system in pervasive grid environment as well.
Based on our analysis of current systems and taking into account the
main requirements of such pervasive environment, we propose new
authorization system architecture as an extension of the existing grid
authorization mechanisms. This architecture not only supports user
attributes but also context attributes which act as a key concept for
context-awareness thought. The architecture allows authorization of
users dynamically when there are changes in the pervasive grid
environment. For this, we opt for hybrid authorization method that
integrates push and pull mechanisms to combine the existing grid
authorization attributes with dynamic context assertions. We will
investigate the proposed architecture using a real testing environment
that includes heterogeneous pervasive grid infrastructures mapped
over multiple virtual organizations. Various scenarios are described
in the last section of the article to strengthen the proposed mechanism
with different facilities for the authorization procedure.
Abstract: A study was conducted in greenhouse environment to
determine the response of five tissue-cultured date palm cultivars, Al-
Ahamad, Nabusaif, Barhee, Khalas, and Kasab to irrigation water
salinity of 1.6, 5, 10, or 20 dS/ m. The salinity level of 1.6dS/m, was
used as a control. The effects of high salinity on plant survival were
manifested at 360 days after planting (DAP) onwards. Three
cultivars, Khalas, Kasab and Barhee were able to tolerate 10 dS/m
salinity level at 24 months after the start of study. Khalas tolerated
the highest salinity level of 20 dS/ m and 'Nabusaif' was found to be the
least tolerant cv. The average heights of palms and the number of
fronds were decreased with increasing salinity levels as time
progressed.
Abstract: In the world of Peer-to-Peer (P2P) networking
different protocols have been developed to make the resource sharing
or information retrieval more efficient. The SemPeer protocol is a
new layer on Gnutella that transforms the connections of the nodes
based on semantic information to make information retrieval more
efficient. However, this transformation causes high clustering in the
network that decreases the number of nodes reached, therefore the
probability of finding a document is also decreased. In this paper we
describe a mathematical model for the Gnutella and SemPeer
protocols that captures clustering-related issues, followed by a
proposition to modify the SemPeer protocol to achieve moderate
clustering. This modification is a sort of link management for the
individual nodes that allows the SemPeer protocol to be more
efficient, because the probability of a successful query in the P2P
network is reasonably increased. For the validation of the models, we
evaluated a series of simulations that supported our results.
Abstract: This paper considers various channels of gammaquantum
generation via an ultra-short high-power laser pulse
interaction with different targets.We analyse the possibilities to create
a pulsed gamma-radiation source using laser triggering of some
nuclear reactions and isomer targets. It is shown that sub-MeV
monochromatic short pulse of gamma-radiation can be obtained with
pulse energy of sub-mJ level from isomer target irradiated by intense
laser pulse. For nuclear reaction channel in light- atom materials, it is
shown that sub-PW laser pulse gives rise to formation about million
gamma-photons of multi-MeV energy.
Abstract: This paper proposes a solution to the motion planning
and control problem of a point-mass robot which is required to move
safely to a designated target in a priori known workspace cluttered
with fixed elliptical obstacles of arbitrary position and sizes. A
tailored and unique algorithm for target convergence and obstacle
avoidance is proposed that will work for any number of fixed
obstacles. The control laws proposed in this paper also ensures that
the equilibrium point of the given system is asymptotically stable.
Computer simulations with the proposed technique and applications
to a planar (RP) manipulator will be presented.
Abstract: Hyperglycemia-mediated accumulation of advanced glycation end-products (AGEs) play a pivotal role in the development of diabetic complications by inducing inflammation. In the present study, we evaluated the possible effects of water/ethanol (1/1, v/v) extracts (WEE) and its fractions from Canarium album Raeusch. (Chinese olive) which is a fruit used on AGEs-stimulated oxidative stress and inflammation in monocytes and vascular endothelial cells. Co-incubation of EA.hy926 endothelial cells with WEE and its fractions for 24h resulted in a significant decrease of monocyte–endothelial cell adhesion, the expression of ICAM-1, generation of intracellular ROS and depletion of GSH induced by AGEs. Chinese olive fruit extracts also reduced the expression of pro-inflammatory mediates, such as TNF-α, IL-1β and IL-6 in THP-1 cells. These findings suggested that Chinese olive fruit was able to protect vascular endothelium from dysfunction induced by AGEs.
Abstract: Different types of Islamic debts have been
increasingly utilized as preferred means of debt funding by
Malaysian private firms in recent years. This study examines the
impact of Islamic debts announcement on private firms- stock
returns. Our sample includes forty five listed companies on Bursa
Malaysia involved in issuing of Islamic debts during 2005 to 2008.
The abnormal returns and cumulative average abnormal returns are
calculated and tested using standard event study methodology. The
results show that a significant, negative abnormal return occurs one
day before announcement date. This negative abnormal return is
representing market participant-s adverse attitude toward Islamic
private debt announcement during the research period.
Abstract: Tracing and locating the geographical location of users (Geolocation) is used extensively in todays Internet. Whenever we, e.g., request a page from google we are - unless there was a specific configuration made - automatically forwarded to the page with the relevant language and amongst others, dependent on our location identified, specific commercials are presented. Especially within the area of Network Security, Geolocation has a significant impact. Because of the way the Internet works, attacks can be executed from almost everywhere. Therefore, for an attribution, knowledge of the origination of an attack - and thus Geolocation - is mandatory in order to be able to trace back an attacker. In addition, Geolocation can also be used very successfully to increase the security of a network during operation (i.e. before an intrusion actually has taken place). Similar to greylisting in emails, Geolocation allows to (i) correlate attacks detected with new connections and (ii) as a consequence to classify traffic a priori as more suspicious (thus particularly allowing to inspect this traffic in more detail). Although numerous techniques for Geolocation are existing, each strategy is subject to certain restrictions. Following the ideas of Endo et al., this publication tries to overcome these shortcomings with a combined solution of different methods to allow improved and optimized Geolocation. Thus, we present our architecture for improved Geolocation, by designing a new algorithm, which combines several Geolocation techniques to increase the accuracy.