Factors Affecting the Citizen’s Intention to Adopt E-government in Saudi Arabia

This paper discusses E-government, in particular the challenges that face its development and widespread adoption in Saudi Arabia. E-government can be defined based on an existing set of requirements. E-government has been implemented for a considerable time in developed countries. However, E-government services still face many challenges in their implementation and general adoption in Saudi Arabia. In addition, the literature review and the discussion identify the influential factors, such as quality of service, diffusion of innovation, computer and information literacy, culture, lack of awareness, technical infrastructure, website design, and security, that affect the citizens’ intention to adopt E-government services in Saudi Arabia. Consequently, these factors have been integrated in a new model that would influence citizen to adopt E- government services. Therefore, this research presents an integrated model for ascertaining the intention to adopt E-government services and thereby aiding governments in accessing what is required to increase adoption.

Grid Computing in Physics and Life Sciences

Certain sciences such as physics, chemistry or biology, have a strong computational aspect and use computing infrastructures to advance their scientific goals. Often, high performance and/or high throughput computing infrastructures such as clusters and computational Grids are applied to satisfy computational needs. In addition, these sciences are sometimes characterised by scientific collaborations requiring resource sharing which is typically provided by Grid approaches. In this article, I discuss Grid computing approaches in High Energy Physics as well as in bioinformatics and highlight some of my experience in both scientific domains.

Reformulations of Big Bang-Big Crunch Algorithm for Discrete Structural Design Optimization

In the present study the efficiency of Big Bang-Big Crunch (BB-BC) algorithm is investigated in discrete structural design optimization. It is shown that a standard version of the BB-BC algorithm is sometimes unable to produce reasonable solutions to problems from discrete structural design optimization. Two reformulations of the algorithm, which are referred to as modified BB-BC (MBB-BC) and exponential BB-BC (EBB-BC), are introduced to enhance the capability of the standard algorithm in locating good solutions for steel truss and frame type structures, respectively. The performances of the proposed algorithms are experimented and compared to its standard version as well as some other algorithms over several practical design examples. In these examples, steel structures are sized for minimum weight subject to stress, stability and displacement limitations according to the provisions of AISC-ASD.

Denial of Service (DOS) Attack and Its Possible Solutions in VANET

Vehicular Ad-hoc Network (VANET) is taking more attention in automotive industry due to the safety concern of human lives on roads. Security is one of the safety aspects in VANET. To be secure, network availability must be obtained at all times since availability of the network is critically needed when a node sends any life critical information to other nodes. However, it can be expected that security attacks are likely to increase in the coming future due to more and more wireless applications being developed and deployed onto the well-known expose nature of the wireless medium. In this respect, the network availability is exposed to many types of attacks. In this paper, Denial of Service (DOS) attack on network availability is presented and its severity level in VANET environment is elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.

Islam and Kazakh Society before Soviet Era

The article considers religious aspects of Kazakh society pre-Soviet times. Studying the mental, political and spiritual content of Islam, the reasons for its wide distribution among the ancestors of the Kazakhs is analyzed. Interested Russians since the accession of the Kazakh Khanate to the Russian Empire more than once pointed out that Islam is a synthesis of Islam and Shamanism. But shamanism is a generalization of the name of religion, which took place prior to Islam in the land of the Kazakh people. Here we can see the elements of Zoroastrianism, Tengrianism, etc. This shows that the ancestors of the Kazakhs - Turkic people - not renounced the ancient beliefs completely and leave some portion of these religions as an integral part of the worldview of the people, by the device. Therefore, the founder of the Turkic Sufi Yasaui still has a huge impact on the religiosity of the Kazakhs. He managed elements of the ancient religion, which formed the basis of the Kazakhs world, interpreted in the Muslim perspective. The Russian authorities tried to quell by Islamization Kazakh people. But it was Islam that has revived the national consciousness of the Kazakh people.

The Capacity of Government to Deliver Sustainable and Integrated Transport: The Case of Transit Oriented Development in Perth, Australia

There is a renewed interest in land use transport integration as a means of achieving sustainable accessibility. Such accessibility requires designing more than simply the transport network; it also requires attention to place (built form). Transitoriented development would appear to capture many of the criteria deemed important in land use transport integration. In Perth, Australia, there have been planning policies for the past 20 years requiring transit-oriented development around railway stations throughout the metropolitan area. While the policy intent, particularly at the State level, is clear the implementation of policy has been fairly ineffective. The first part of this paper provides an examination of state and local government planning and transport policies, evaluating them using a set of land use transport integration criteria considered all encompassing. This provides some insight into the extent of state and local government capacity to deliver land use transport integration. The second part of this paper examines the extent of implementation by examining existing and proposed land use around station precincts throughout metropolitan Perth. The findings of this research suggest that the capacity of state and local government to deliver land use transport integration is reasonable in a planning policy sense. Implementation, despite long policy lead times, has been lacking. It appears to be more effective where local planning controls have been suspended with new redevelopment authorities given powers to develop land around railway stations.

An Efficient Algorithm for Computing all Program Forward Static Slices

Program slicing is the task of finding all statements in a program that directly or indirectly influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some point in a program is called a program backward slice. In several software engineering applications, such as program debugging and measuring program cohesion and parallelism, several slices are computed at different program points. The existing algorithms for computing program slices are introduced to compute a slice at a program point. In these algorithms, the program, or the model that represents the program, is traversed completely or partially once. To compute more than one slice, the same algorithm is applied for every point of interest in the program. Thus, the same program, or program representation, is traversed several times. In this paper, an algorithm is introduced to compute all forward static slices of a computer program by traversing the program representation graph once. Therefore, the introduced algorithm is useful for software engineering applications that require computing program slices at different points of a program. The program representation graph used in this paper is called Program Dependence Graph (PDG).

Fluid Flow Analysis and Design of a Flow Distributor in a Domestic Gas Boiler Using a Commercial CFD Software

The aim of the study was to investigate the possible use of commercial Computational Fluid Dynamics (CFD) software in the design process of a domestic gas boiler. Because of the limited computational resources some simplifications had to be made in order to contribute to the design in a reasonable timescale. The porous media model was used in order to simulate the influence of the pressure drop characteristic of particular elements of a heat transfer system on the water-flow distribution in the system. Further, a combination of CFD analyses and spread sheet calculations was used in order to solve the flow distribution problem.

Multi-matrix Real-coded Genetic Algorithm for Minimising Total Costs in Logistics Chain Network

The importance of supply chain and logistics management has been widely recognised. Effective management of the supply chain can reduce costs and lead times and improve responsiveness to changing customer demands. This paper proposes a multi-matrix real-coded Generic Algorithm (MRGA) based optimisation tool that minimises total costs associated within supply chain logistics. According to finite capacity constraints of all parties within the chain, Genetic Algorithm (GA) often produces infeasible chromosomes during initialisation and evolution processes. In the proposed algorithm, chromosome initialisation procedure, crossover and mutation operations that always guarantee feasible solutions were embedded. The proposed algorithm was tested using three sizes of benchmarking dataset of logistic chain network, which are typical of those faced by most global manufacturing companies. A half fractional factorial design was carried out to investigate the influence of alternative crossover and mutation operators by varying GA parameters. The analysis of experimental results suggested that the quality of solutions obtained is sensitive to the ways in which the genetic parameters and operators are set.

Effectiveness of Cellular Phone with Active RFID Tag for Evacuation - The Case of Evacuation from the Underground Shopping Mall of Tenjin

The underground shopping mall has the constructional problem of the fire evacuation. Also, the people sometimes lose their direction and information of current time in the mall. If the emergencies such as terrorist explosions or gas explosions are happened, they have to go out soon. Under such circumstances, inside of the mall has high risk for life. In this research, the authors propose a way that he/she can go out from the underground shopping mall quickly. If the narrow exits are discovered by using active RFID (Radio Frequency Identification) tags and using cellular phones, they can evacuate as soon as possible. To verify this hypothesis, the authors design the model and carry out the agent-based simulation. They treat, as a case study, the Tenjin mall in Fukuoka Prefecture in Japan. The result of the simulation is that the case of the pedestrian with using active RFID tags and cellular phones reduced the amount of time to spend on the evacuation. Even if the diffusion of RFID tags and cellular phones was not perfect, they could show the effectiveness of reducing the time of evacuation.

A Force-directed Graph Drawing based on the Hierarchical Individual Timestep Method

In this paper, we propose a fast and efficient method for drawing very large-scale graph data. The conventional force-directed method proposed by Fruchterman and Rheingold (FR method) is well-known. It defines repulsive forces between every pair of nodes and attractive forces between connected nodes on a edge and calculates corresponding potential energy. An optimal layout is obtained by iteratively updating node positions to minimize the potential energy. Here, the positions of the nodes are updated every global timestep at the same time. In the proposed method, each node has its own individual time and time step, and nodes are updated at different frequencies depending on the local situation. The proposed method is inspired by the hierarchical individual time step method used for the high accuracy calculations for dense particle fields such as star clusters in astrophysical dynamics. Experiments show that the proposed method outperforms the original FR method in both speed and accuracy. We implement the proposed method on the MDGRAPE-3 PCI-X special purpose parallel computer and realize a speed enhancement of several hundred times.

The Key Challenges of the New Bank Regulations

The New Basel Capital Accord (Basel II) influences how financial institutions around the world, and especially European Union institutions, determine the amount of capital to reserve. However, as the recent global crisis has shown, the revision of Basel II is needed to reflect current trends, such as increased volatility and correlation, in the world financial markets. The overall objective of Basel II is to increase the safety and soundness of the international financial system. Basel II builds on three main pillars: Pillar I deals with the minimum capital requirements for credit, market and operational risk, Pillar II focuses on the supervisory review process and finally Pillar III promotes market discipline through enhanced disclosure requirements for banks. The aim of this paper is to provide the historical background, key features and impact of Basel II on financial markets. Moreover, we discuss new proposals for international bank regulation (sometimes referred to as Basel III) which include requirements for higher quality, constituency and transparency of banks' capital and risk management, regulation of OTC markets and introduction of new liquidity standards for internationally active banks.

The Modified Eigenface Method using Two Thresholds

A new approach is adopted in this paper based on Turk and Pentland-s eigenface method. It was found that the probability density function of the distance between the projection vector of the input face image and the average projection vector of the subject in the face database, follows Rayleigh distribution. In order to decrease the false acceptance rate and increase the recognition rate, the input face image has been recognized using two thresholds including the acceptance threshold and the rejection threshold. We also find out that the value of two thresholds will be close to each other as number of trials increases. During the training, in order to reduce the number of trials, the projection vectors for each subject has been averaged. The recognition experiments using the proposed algorithm show that the recognition rate achieves to 92.875% whilst the average number of judgment is only 2.56 times.

An Application of SMED Methodology

Single Minute Exchange of Dies (SMED) mainly focuses on recognition of internal and external activities. It is concerned particularly with transferring internal activities into external ones in as many numbers as possible, by also minimizing the internal ones. The validity of the method and procedures are verified by an application a Styrofoam manufacturing process where setup times are critical for time reduction. Significant time savings have been achieved with minimum investment. Further, the issues related with employer safety and ergonomics principles during die exchange are noted.

Texture Feature Extraction of Infrared River Ice Images using Second-Order Spatial Statistics

Ice cover County has a significant impact on rivers as it affects with the ice melting capacity which results in flooding, restrict navigation, modify the ecosystem and microclimate. River ices are made up of different ice types with varying ice thickness, so surveillance of river ice plays an important role. River ice types are captured using infrared imaging camera which captures the images even during the night times. In this paper the river ice infrared texture images are analysed using first-order statistical methods and secondorder statistical methods. The second order statistical methods considered are spatial gray level dependence method, gray level run length method and gray level difference method. The performance of the feature extraction methods are evaluated by using Probabilistic Neural Network classifier and it is found that the first-order statistical method and second-order statistical method yields low accuracy. So the features extracted from the first-order statistical method and second-order statistical method are combined and it is observed that the result of these combined features (First order statistical method + gray level run length method) provides higher accuracy when compared with the features from the first-order statistical method and second-order statistical method alone.

The Acaricidal and Repellent Effect of Cinnamon Essential Oil against House Dust Mite

The major source of allergy in home is the house dust mite (Dematophagoides farina, Dermatophagoides pteronyssinus) causing allergic symptom include atopic dermatitis, asthma, perennial rhinitis and even infant death syndrome. Control of this mite species is dependent on the use of chemical methods such as fumigation treatments with methylene bromide, spraying with organophosphates such as pirimiphos-methyl, or treatments with repellents such as DEET and benzyl benzoate. Although effective, their repeated use for decades has sometimes resulted in development of resistance and fostered environmental and human health concerns. Both decomposing animal parts and the protein that surrounds mite fecal pellets cause mite allergy. So it is more effective to repel than to kill them because allergen is not living house dust mite but dead body or fecal particles of house dust mite. It is important to find out natural repellent material against house dust mite to control them and reduce the allergic reactions. Plants may be an alternative source for dust mite control because they contain a range of bioactive chemicals. The research objectives of this paper were to verify the acaricidal and repellent effects of cinnamon essential oil and to find out it-s most effective concentrations. We could find that cinnamon bark essential oil was very effective material to control the house dust mite. Furthermore, it could reduce chemical resistance and danger for human health.

Static Recrystallization Behavior of Mg Alloy Single Crystals

Single crystals of Magnesium alloys such as pure Mg, Mg-1Zn-0.5Y, Mg-0.1Y, and Mg-0.1Ce alloys were successfully fabricated in this study by employing the modified Bridgman method. To determine the exact orientation of crystals, pole figure measurement using X-ray diffraction were carried out on each single crystal. Hardness and compression tests were conducted followed by subsequent recrysatllization annealing. Recrystallization kinetics of Mg alloy single crystals has been investigated. Fabricated single crystals were cut into rectangular shaped specimen and solution treated at 400oC for 24 hrs, and then deformed in compression mode by 30% reduction. Annealing treatment for recrystallization has been conducted on these cold-rolled plates at temperatures of 300oC for various times from 1 to 20 mins. The microstructure observation and hardness measurement conducted on the recrystallized specimens revealed that static recrystallization of ternary alloy single crystal was very slow, while recrystallization behavior of binary alloy single crystals appeared to be very fast.

An Efficient Spam Mail Detection by Counter Technique

Spam mails are unwanted mails sent to large number of users. Spam mails not only consume the network resources, but cause security threats as well. This paper proposes an efficient technique to detect, and to prevent spam mail in the sender side rather than the receiver side. This technique is based on a counter set on the sender server. When a mail is transmitted to the server, the mail server checks the number of the recipients based on its counter policy. The counter policy performed by the mail server is based on some pre-defined criteria. When the number of recipients exceeds the counter policy, the mail server discontinues the rest of the process, and sends a failure mail to sender of the mail; otherwise the mail is transmitted through the network. By using this technique, the usage of network resources such as bandwidth, and memory is preserved. The simulation results in real network show that when the counter is set on the sender side, the time required for spam mail detection is 100 times faster than the time the counter is set on the receiver side, and the network resources are preserved largely compared with other anti-spam mail techniques in the receiver side.

Pomelo Peel: Agricultural Waste for Biosorption of Cadmium Ions from Aqueous Solutions

The ability of pomelo peel, a natural biosorbent, to remove Cd(II) ions from aqueous solution by biosorption was investigated. The experiments were carried out by batch method at 25 °C. The influence of solution pH, initial cadmium ion concentrations and contact times were evaluated. Cadmium ion removal increased significantly as the pH of the solution increased from pH 1 to pH 5. At pH 5, the cadmium ion removal reached a maximum value. The equilibrium process was described well by the Langmuir isotherm model, with a maximum biosorption capacity of 21.83 mg/g. The biosorption was relatively quick, (approx. 20 min). Biosorption kinetics followed a pseudo-second-order model. The result showed that pomelo peel was effective as a biosorbent for removing cadmium ions from aqueous solution. It is a low cost material that shows potential to be applied in wastewater technology for remediation of heavy metal contamination.

A Rough Sets Approach for Relevant Internet/Web Online Searching

The internet is constantly expanding. Identifying web links of interest from web browsers requires users to visit each of the links listed, individually until a satisfactory link is found, therefore those users need to evaluate a considerable amount of links before finding their link of interest; this can be tedious and even unproductive. By incorporating web assistance, web users could be benefited from reduced time searching on relevant websites. In this paper, a rough set approach is presented, which facilitates classification of unlimited available e-vocabulary, to assist web users in reducing search times looking for relevant web sites. This approach includes two methods for identifying relevance data on web links based on the priority and percentage of relevance. As a result of these methods, a list of web sites is generated in priority sequence with an emphasis of the search criteria.