Abstract: Software maintenance is extremely important activity in software development life cycle. It involves a lot of human efforts, cost and time. Software maintenance may be further subdivided into different activities such as fault prediction, fault detection, fault prevention, fault correction etc. This topic has gained substantial attention due to sophisticated and complex applications, commercial hardware, clustered architecture and artificial intelligence. In this paper we surveyed the work done in the field of software maintenance. Software fault prediction has been studied in context of fault prone modules, self healing systems, developer information, maintenance models etc. Still a lot of things like modeling and weightage of impact of different kind of faults in the various types of software systems need to be explored in the field of fault severity.
Abstract: Three dimensional nanostructure materials have attracted the attention of many researches because the possibility to apply them for near future devices in sensors, catalysis and energy related. Tin dioxide is the most used material for gas sensing because its three-dimensional nanostructures and properties are related to the large surface exposed to gas adsorption. We propose the use of branch SnO2 nanowhiskers in interaction with ethanol. All Sn atoms are symmetric. The total energy, potential energy and Kinetic energy calculated for interaction between SnO2 and ethanol in different distances and temperatures. The calculations achieved by methods of Langevin Dynamic and Mont Carlo simulation. The total energy increased with addition ethanol molecules and temperature so interactions between them are endothermic.
Abstract: Minimum Quantity Lubrication (MQL) technique
obtained a significant attention in machining processes to reduce
environmental loads caused by usage of conventional cutting fluids.
Recently nanofluids are finding an extensive application in the field
of mechanical engineering because of their superior lubrication and
heat dissipation characteristics. This paper investigates the use of a
nanofluid under MQL mode to improve grinding characteristics of
Ti-6Al-4V alloy. Taguchi-s experimental design technique has been
used in the present investigation and a second order model has been
established to predict grinding forces and surface roughness.
Different concentrations of water based Al2O3 nanofluids were
applied in the grinding operation through MQL setup developed in
house and the results have been compared with those of conventional
coolant and pure water. Experimental results showed that grinding
forces reduced significantly when nano cutting fluid was used even at
low concentration of the nano particles and surface finish has been
found to improve with higher concentration of the nano particles.
Abstract: This paper discusses a new model of Islamic code of
ethics for directors. Several corporate scandals and local (example
Transmile and Megan Media) and overseas corporate (example
Parmalat and Enron) collapses show that the current corporate
governance and regulatory reform are unable to prevent these events
from recurring. Arguably, the code of ethics for directors is under
research and the current code of ethics only concentrates on binding
the work of the employee of the organization as a whole, without
specifically putting direct attention to the directors, the group of
people responsible for the performance of the company. This study
used a semi-structured interview survey of well-known Islamic
scholars such as the Mufti to develop the model. It is expected that
the outcome of the research is a comprehensive model of code of
ethics based on the Islamic principles that can be applied and used by
the company to construct a code of ethics for their directors.
Abstract: In the present paper, the three-dimensional
temperature field of tool is determined during the machining and
compared with experimental work on C45 workpiece using carbide
cutting tool inserts. During the metal cutting operations, high
temperature is generated in the tool cutting edge which influence on
the rate of tool wear. Temperature is most important characteristic of
machining processes; since many parameters such as cutting speed,
surface quality and cutting forces depend on the temperature and high
temperatures can cause high mechanical stresses which lead to early
tool wear and reduce tool life. Therefore, considerable attention is
paid to determine tool temperatures. The experiments are carried out
for dry and orthogonal machining condition. The results show that
the increase of tool temperature depends on depth of cut and
especially cutting speed in high range of cutting conditions.
Abstract: The values of managers and employees in organizations are phenomena that have captured the interest of researchers at large. Despite this attention, there continues to be a lack of agreement on what values are and how they influence individuals, or how they are constituted in individuals- mind. In this article content-based approach is presented as alternative reference frame for exploring values. In content-based approach human thinking in different contexts is set at the focal point. Differences in valuations can be explained through the information contents of mental representations. In addition to the information contents, attention is devoted to those cognitive processes through which mental representations of values are constructed. Such informational contents are in decisive role for understanding human behavior. By applying content-based analysis to an examination of values as mental representations, it is possible to reach a deeper to the motivational foundation of behaviors, such as decision making in organizational procedures, through understanding the structure and meanings of specific values at play.
Abstract: Recently, genetic algorithms (GA) and particle swarm optimization (PSO) technique have attracted considerable attention among various modern heuristic optimization techniques. Since the two approaches are supposed to find a solution to a given objective function but employ different strategies and computational effort, it is appropriate to compare their performance. This paper presents the application and performance comparison of PSO and GA optimization techniques, for Thyristor Controlled Series Compensator (TCSC)-based controller design. The design objective is to enhance the power system stability. The design problem of the FACTS-based controller is formulated as an optimization problem and both the PSO and GA optimization techniques are employed to search for optimal controller parameters. The performance of both optimization techniques in terms of computational time and convergence rate is compared. Further, the optimized controllers are tested on a weakly connected power system subjected to different disturbances, and their performance is compared with the conventional power system stabilizer (CPSS). The eigenvalue analysis and non-linear simulation results are presented and compared to show the effectiveness of both the techniques in designing a TCSC-based controller, to enhance power system stability.
Abstract: During last decades, developing multi-objective
evolutionary algorithms for optimization problems has found
considerable attention. Flexible job shop scheduling problem, as an
important scheduling optimization problem, has found this attention
too. However, most of the multi-objective algorithms that are
developed for this problem use nonprofessional approaches. In
another words, most of them combine their objectives and then solve
multi-objective problem through single objective approaches. Of
course, except some scarce researches that uses Pareto-based
algorithms. Therefore, in this paper, a new Pareto-based algorithm
called controlled elitism non-dominated sorting genetic algorithm
(CENSGA) is proposed for the multi-objective FJSP (MOFJSP). Our
considered objectives are makespan, critical machine work load, and
total work load of machines. The proposed algorithm is also
compared with one the best Pareto-based algorithms of the literature
on some multi-objective criteria, statistically.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.
Abstract: It is believed that major account on language diversity must be taken in learning, and especially in learning using ICT. This paper-s objective is to exhibit language and communication barriers in learning, to approach the topic from socioculture and cognitivist perspectives, and to give exploratory solutions of handling such barriers. The review is mainly conducted by approaching the journal Computers & Education, but also an initially broad search was conducted. The results show that not much attention is paid on language and communication barriers in an immediate relation to learning using ICT. The results shows, inter alia, that language and communication barriers are caused because of not enough account is taken on both the individual-s background and the technology.
Abstract: One very interesting field of research in Pattern Recognition that has gained much attention in recent times is Gesture Recognition. In this paper, we consider a form of dynamic hand gestures that are characterized by total movement of the hand (arm) in space. For these types of gestures, the shape of the hand (palm) during gesturing does not bear any significance. In our work, we propose a model-based method for tracking hand motion in space, thereby estimating the hand motion trajectory. We employ the dynamic time warping (DTW) algorithm for time alignment and normalization of spatio-temporal variations that exist among samples belonging to the same gesture class. During training, one template trajectory and one prototype feature vector are generated for every gesture class. Features used in our work include some static and dynamic motion trajectory features. Recognition is accomplished in two stages. In the first stage, all unlikely gesture classes are eliminated by comparing the input gesture trajectory to all the template trajectories. In the next stage, feature vector extracted from the input gesture is compared to all the class prototype feature vectors using a distance classifier. Experimental results demonstrate that our proposed trajectory estimator and classifier is suitable for Human Computer Interaction (HCI) platform.
Abstract: Background, measuring an individual-s Health
Literacy is gaining attention, yet no appropriate instrument is available
in Taiwan. Measurement tools that were developed and used in
western countries may not be appropriate for use in Taiwan due to a
different language system. Purpose of this research was to develop a
Health Literacy measurement instrument specific for Taiwan adults.
Methods, several experts of clinic physicians; healthcare
administrators and scholars identified 125 common used health related
Chinese phrases from major medical knowledge sources that easy
accessible to the public. A five-point Likert scale is used to measure
the understanding level of the target population. Such measurement is
then used to compare with the correctness of their answers to a health
knowledge test for validation. Samples, samples under study were
purposefully taken from four groups of people in the northern
Pingtung, OPD patients, university students, community residents,
and casual visitors to the central park. A set of health knowledge index
with 10 questions is used to screen those false responses. A sample
size of 686 valid cases out of 776 was then included to construct this
scale. An independent t-test was used to examine each individual
phrase. The phrases with the highest significance are then identified
and retained to compose this scale. Result, a Taiwan Health Literacy
Scale (THLS) was finalized with 66 health-related phrases under nine
divisions. Cronbach-s alpha of each division is at a satisfactory level
of 89% and above. Conclusions, factors significantly differentiate the
levels of health literacy are education, female gender, age, family
members of stroke victims, experience with patient care, and
healthcare professionals in the initial application in this study..
Abstract: The present disposal routes of sewage sludge represent a critical environmental issue in Egypt. Recently, there has been an increasing concern about sewage sludge management due to the environmental risks, which resulted from the fast expansion of wastewater treatment plants without equal attention in dealing with the produced sludge. This paper discusses the current situation of sewage sludge management in Egypt presenting a brief overview of the existing wastewater treatment plants, sludge production and characteristics as well as options of beneficial use and potential demand of sewage sludge under Egyptian conditions. The characteristics of sewage sludge are discussed considering the results of own sampling and analysis as well as previous studies. Furthermore, alternative treatment scenarios for sewage sludge, which have been recently developed in Egypt, are discussed and perspectives for a sustainable agricultural use are outlined.
Abstract: A vast array of biological materials, especially algae have received increasing attention for heavy metal removal. Algae have been proven to be cheaper, more effective for the removal of metallic elements in aqueous solutions. A fresh water algal strain was isolated from Zoo Lake, Johannesburg, South Africa and identified as Desmodesmus sp. This paper investigates the efficacy of Desmodesmus sp.in removing heavy metals contaminating the Wonderfonteinspruit Catchment Area (WCA) water bodies. The biosorption data fitted the pseudo-second order and Langmuir isotherm models. The Langmuir maximum uptakes gave the sequence: Mn2+>Ni2+>Fe2+. The best results for kinetic study was obtained in concentration 120 ppm for Fe3+ and Mn2+, whilst for Ni2+ was at 20 ppm, which is about the same concentrations found in contaminated water in the WCA (Fe3+115 ppm, Mn2+ 121 ppm and Ni2+ 26.5 ppm).
Abstract: This paper focuses attention on specific aspects of
entrepreneurial decisions relating to investment, both in the total
fixed investments and plant & machinery (separately). Demand and
financial factors, internal and external, are considered in the
investment analysis. Finally the influence of determinants of fixed
investment and investment plans are examined in Electric Power
industry in India.
Abstract: In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers- attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.-s scheme has some drawbacks: poor reparability problem, user impersonation attack, and sensor node impersonate attack.
Abstract: Opportunistic Data Forwarding (ODF) has drawn much attention in mobile adhoc networking research in recent years. The effectiveness of ODF in MANET depends on a suitable routing protocol which provides a powerful source routing services. PLSR is featured by source routing, loop free and small routing overhead. The update messages in PLSR are integrated into a tree structure and no need to time stamp routing updates which reduces the routing overhead.
Abstract: A two-dimensional numerical simulation of crossflow
around four cylinders in an in-line rectangular configuration is
studied by using the lattice Boltzmann method (LBM). Special
attention is paid to the effect of the spacing between the cylinders.
The Reynolds number ( Re ) is chosen to be e 100 R = and the
spacing ratio L / D is set at 0.5, 1.5, 2.5, 4.0, 5.0, 6.0, 7.0, 8.0, 9.0
and 10.0. Results show that, as in the case of four cylinders in an inline
rectangular configuration , flow fields show four different
features depending on the spacing (single square cylinder, stable
shielding flow, wiggling shielding flow and a vortex shedding flow)
are observed in this study. The effects of spacing ratio on physical
quantities such as mean drag coefficient, Strouhal number and rootmean-
square value of the drag and lift coefficients are also presented.
There is more than one shedding frequency at small spacing ratios.
The mean drag coefficients for downstream cylinders are less than
that of the single cylinder for all spacing ratios. The present results
using the LBM are compared with some existing experimental data
and numerical studies. The comparison shows that the LBM can
capture the characteristics of the bluff body flow reasonably well and
is a good tool for bluff body flow studies.
Abstract: With the necessity of increased processing capacity with less energy consumption; power aware multiprocessor system has gained more attention in the recent future. One of the additional challenges that is to be solved in a multi-processor system when compared to uni-processor system is job allocation. This paper presents a novel task dependent job allocation algorithm: Energy centric- Allocation (Ec-A) and Rate Monotonic (RM) scheduling to minimize energy consumption in a multiprocessor system. A simulation analysis is carried out to verify the performance increase with reduction in energy consumption and required number of processors in the system.
Abstract: Network security attacks are the violation of
information security policy that received much attention to the
computational intelligence society in the last decades. Data mining
has become a very useful technique for detecting network intrusions
by extracting useful knowledge from large number of network data
or logs. Naïve Bayesian classifier is one of the most popular data
mining algorithm for classification, which provides an optimal way
to predict the class of an unknown example. It has been tested that
one set of probability derived from data is not good enough to have
good classification rate. In this paper, we proposed a new learning
algorithm for mining network logs to detect network intrusions
through naïve Bayesian classifier, which first clusters the network
logs into several groups based on similarity of logs, and then
calculates the prior and conditional probabilities for each group of
logs. For classifying a new log, the algorithm checks in which cluster
the log belongs and then use that cluster-s probability set to classify
the new log. We tested the performance of our proposed algorithm by
employing KDD99 benchmark network intrusion detection dataset,
and the experimental results proved that it improves detection rates
as well as reduces false positives for different types of network
intrusions.