Abstract: Malaysia is aggressive in promoting the usage of ICT
to its mass population through the support by the government
policies and programs targeting the general population. However,
with the uneven distribution of the basic telecommunication
infrastructure between the urban and rural area, cost for being
“interconnected" that is considered high among the poorer rural
population and the lack of local contents that suit the rural population
needs or lifestyles, it is still a challenge for Malaysia to achieve its
Vision 2020 Agenda moving the nation towards an information
society by the year 2020. Among the existing programs that have
been carried out by the government to encourage the usage of ICT by
the rural population is “Kedaikom", a community telecenter with the
general aim is to engage the community to get exposed and to use the
ICT, encouraging the diffusion of the ICT technology to the rural
population. The research investigated by using a questionnaire
survey of how Kedaikom, as a community telecenter could play a
role in encouraging the rural or underserved community to use the
ICT. The result from the survey has proven that the community
telecenter could bridge the digital divide between the underserved
rural population and the well-accessed urban population in Malaysia.
More of the rural population, especially from the younger generation
and those with higher educational background are using the
community telecenter to be connected to the ICT.
Abstract: Lung cancer accounts for the most cancer related deaths for men as well as for women. The identification of cancer associated genes and the related pathways are essential to provide an important possibility in the prevention of many types of cancer. In this work two filter approaches, namely the information gain and the biomarker identifier (BMI) are used for the identification of different types of small-cell and non-small-cell lung cancer. A new method to determine the BMI thresholds is proposed to prioritize genes (i.e., primary, secondary and tertiary) using a k-means clustering approach. Sets of key genes were identified that can be found in several pathways. It turned out that the modified BMI is well suited for microarray data and therefore BMI is proposed as a powerful tool for the search for new and so far undiscovered genes related to cancer.
Abstract: Unlike this study focused extensively on trading
behavior of option market, those researches were just taken their
attention to model-driven option pricing. For example, Black-Scholes
(B-S) model is one of the most famous option pricing models.
However, the arguments of B-S model are previously mentioned by
some pricing models reviewing. This paper following suggests the
importance of the dynamic character for option pricing, which is also
the reason why using the genetic algorithm (GA). Because of its
natural selection and species evolution, this study proposed a hybrid
model, the Genetic-BS model which combining GA and B-S to
estimate the price more accurate. As for the final experiments, the
result shows that the output estimated price with lower MAE value
than the calculated price by either B-S model or its enhanced one,
Gram-Charlier garch (G-C garch) model. Finally, this work would
conclude that the Genetic-BS pricing model is exactly practical.
Abstract: One of object oriented software developing problem
is the difficulty of searching the appropriate and suitable objects for
starting the system. In this work, ontologies appear in the part of
supporting the object discovering in the initial of object oriented
software developing. There are many researches try to demonstrate
that there is a great potential between object model and ontologies.
Constructing ontology from object model is called ontology
engineering can be done; On the other hand, this research is aiming to
support the idea of building object model from ontology is also
promising and practical. Ontology classes are available online in any
specific areas, which can be searched by semantic search engine.
There are also many helping tools to do so; one of them which are
used in this research is Protégé ontology editor and Visual Paradigm.
To put them together give a great outcome. This research will be
shown how it works efficiently with the real case study by using
ontology classes in travel/tourism domain area. It needs to combine
classes, properties, and relationships from more than two ontologies
in order to generate the object model. In this paper presents a simple
methodology framework which explains the process of discovering
objects. The results show that this framework has great value while
there is possible for expansion. Reusing of existing ontologies offers
a much cheaper alternative than building new ones from scratch.
More ontologies are becoming available on the web, and online
ontologies libraries for storing and indexing ontologies are increasing
in number and demand. Semantic and Ontologies search engines have
also started to appear, to facilitate search and retrieval of online
ontologies.
Abstract: This paper at first presents approximate analytical
solutions for systems of fractional differential equations using the
differential transform method. The application of differential
transform method, developed for differential equations of integer
order, is extended to derive approximate analytical solutions of
systems of fractional differential equations. The solutions of our
model equations are calculated in the form of convergent series with
easily computable components. After that a drive-response
synchronization method with linear output error feedback is
presented for “generalized projective synchronization" for a class of
fractional-order chaotic systems via a scalar transmitted signal.
Genesio_Tesi and Duffing systems are used to illustrate the
effectiveness of the proposed synchronization method.
Abstract: The basis of examines is survey of 500 in the years
2002-2010, which was selected according to homogeneity of land
cover and where 1090 revenues were evaluated. For achieved yields
of winter wheat is obtained multicriterial regression function
depending on the major factors influencing the consumption of
nitrogen. The coefficient of discrimination of the established model is
0.722. The increase in efficiency of fertilization is involved in supply
of organic nutrients, tillage, soil pH, past weather, the humus content
in the subsoil and grain content to 0.001 mm. The decrease in
efficiency was mainly influenced by the total dose of mineral
nitrogen, although it was divided into multiple doses, the proportion
loamy particles up to 0.01 mm, rainy, or conversely dry weather
during the vegetation. The efficiency of nitrogen was found to be the
smallest on undeveloped soils and the highest on chernozem and
alluvial soils.
Abstract: Memristor is also known as the fourth fundamental
passive circuit element. When current flows in one direction through
the device, the electrical resistance increases and when current flows
in the opposite direction, the resistance decreases. When the current
is stopped, the component retains the last resistance that it had, and
when the flow of charge starts again, the resistance of the circuit will
be what it was when it was last active. It behaves as a nonlinear
resistor with memory. Recently memristors have generated wide
research interest and have found many applications. In this paper we
survey the various applications of memristors which include non
volatile memory, nanoelectronic memories, computer logic,
neuromorphic computer architectures low power remote sensing
applications, crossbar latches as transistor replacements, analog
computations and switches.
Abstract: It has been always observed that the effectiveness of
MIS as a support tool for management decisions degenerate after
time of implementation, despite the substantial investments being
made. This is true for organizations at the initial stages of MIS
implementations, manual or computerized. A survey of a sample of
middle to top managers in business and government institutions was
made. A large ratio indicates that the MIS has lost its impact on the
day-to-day operations, and even the response lag time expands
sometimes indefinitely. The data indicates an infant mortality
phenomenon of the bathtub model. Reasons may be monotonous
nature of MIS delivery, irrelevance, irreverence, timeliness, and lack
of adequate detail. All those reasons collaborate to create a degree of
degeneracy. We investigate and model as a bathtub model the
phenomenon of MIS degeneracy that inflicts the MIS systems and
renders it ineffective. A degeneracy index is developed to identify
the status of the MIS system and possible remedies to prevent the
onset of total collapse of the system to the point of being useless.
Abstract: Morphological operators transform the original image
into another image through the interaction with the other image of
certain shape and size which is known as the structure element.
Mathematical morphology provides a systematic approach to analyze
the geometric characteristics of signals or images, and has been
applied widely too many applications such as edge detection,
objection segmentation, noise suppression and so on. Fuzzy
Mathematical Morphology aims to extend the binary morphological
operators to grey-level images. In order to define the basic
morphological operations such as fuzzy erosion, dilation, opening
and closing, a general method based upon fuzzy implication and
inclusion grade operators is introduced. The fuzzy morphological
operations extend the ordinary morphological operations by using
fuzzy sets where for fuzzy sets, the union operation is replaced by a
maximum operation, and the intersection operation is replaced by a
minimum operation.
In this work, it consists of two articles. In the first one, fuzzy set
theory, fuzzy Mathematical morphology which is based on fuzzy
logic and fuzzy set theory; fuzzy Mathematical operations and their
properties will be studied in details. As a second part, the application
of fuzziness in Mathematical morphology in practical work such as
image processing will be discussed with the illustration problems.
Abstract: This paper describes the designs of a first and second
generation autonomous gas monitoring system and the successful
field trial of the final system (2nd generation). Infrared sensing
technology is used to detect and measure the greenhouse gases
methane (CH4) and carbon dioxide (CO2) at point sources. The
ability to monitor real-time events is further enhanced through the
implementation of both GSM and Bluetooth technologies to
communicate these data in real-time. These systems are robust,
reliable and a necessary tool where the monitoring of gas events in
real-time are needed.
Abstract: This paper proposes a visual cryptography by random
grids scheme with identifiable shares. The method encodes an image
O in two shares that exhibits the following features: (1) each generated
share has the same scale as O, (2) any share singly has noise-like
appearance that reveals no secret information on O, (3) the secrets can
be revealed by superimposing the two shares, (4) folding a share up
can disclose some identification patterns, and (5) both of the secret
information and the designated identification patterns are recognized
by naked eye without any computation. The property to show up
identification patterns on folded shares establishes a simple and
friendly interface for users to manage the numerous shares created by
VC schemes.
Abstract: The work reported in this paper proposes
Swarm-Array computing, a novel technique inspired by swarm
robotics, and built on the foundations of autonomic and parallel
computing. The approach aims to apply autonomic computing
constructs to parallel computing systems and in effect achieve the
self-ware objectives that describe self-managing systems. The
constitution of swarm-array computing comprising four constituents,
namely the computing system, the problem/task, the swarm and the
landscape is considered. Approaches that bind these constituents
together are proposed. Space applications employing FPGAs are
identified as a potential area for applying swarm-array computing for
building reliable systems. The feasibility of a proposed approach is
validated on the SeSAm multi-agent simulator and landscapes are
generated using the MATLAB toolkit.
Abstract: In this study, an experimental investigation was carried
out to fix CO2 into the electronic arc furnace (EAF) reducing slag from
stainless steelmaking process under wet grinding. The slag was ground
by the vibrating ball mill with the CO2 and pure water. The reaction
behavior was monitored with constant pressure method, and the
change of CO2 volume in the experimental system with grinding time
was measured. It was found that the CO2 absorption occurred as soon
as the grinding started. The CO2 absorption under wet grinding was
significantly larger than that under dry grinding. Generally, the
amount of CO2 absorption increased as the amount of water, the
amount of slag, the diameter of alumina ball and the initial pressure of
CO2 increased. However, the initial absorption rate was scarcely
influenced by the experimental conditions except for the initial CO2
pressure. According to this research, the CO2 reacted with the CaO
inside the slag to form CaCO3.
Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: A number of mass spectrometry applications are already available as web-based and windows-based systems to calculate isotope pattern and to display the mass spectrum based on the specific molecular formula besides providing necessary information. These applications were evaluated and compared with our new alternative application called Theoretical Isotope Generator (TIG) in terms of its functionality and features provided to prove this new application is working better and performing well. TIG provides extra features than others, complete with several functionality such as drawing, normalizing and zooming the generated graph that convey with the molecular information in a number of formats by providing the details of the calculation and molecules. Thus, any chemist, students, lecturers and researchers from anywhere could use TIG to gain related information on molecules and their relative intensity.
Abstract: A liquid curved jet has many applications in different
industrial and engineering processes, such as the prilling process
for generating small spherical pellets (fertilizer or magnesium). The
liquids used are usually molten and contain small quantities of
polymers and therefore can be modelled as non-Newtonian liquids. In
this paper, we model the viscoelastic liquid jet by using the Oldroyd-
B model. An asymptotic analysis has been used to simplify the
governing equations. Furthermore, the trajectory and a linear temporal
stability in the presence of gravity and rotation have been determined.
Abstract: This paper presents the elastic buckling of
homogeneous beams with a pair of piezoelectric layers surface
bonded on both sides of the beams. The displacement field of beam is
assumed based on the Engesser-Timoshenko beam theory.
Applying the Hamilton's principle, the equilibrium equation is
established. The influences of applied voltage, dimensionless
geometrical parameter and piezoelectric thickness on the critical
buckling load of beam are presented. To investigate the accuracy of
the present analysis, a compression study is carried out with a known
data.
Abstract: ORC (Organic Rankine Cycle) has potential of
reducing consumption of fossil fuels and has many favorable
characteristics to exploit low-temperature heat sources. In this work
thermodynamic performance of ORC with regeneration is
comparatively assessed for various working fluids. Special attention is
paid to the effects of system parameters such as the turbine inlet
pressure on the characteristics of the system such as net work
production, heat input, volumetric flow rate per 1 MW of net work and
quality of the working fluid at turbine exit as well as thermal
efficiency. Results show that for a given source the thermal efficiency
generally increases with increasing of the turbine inlet pressure
however has optimal condition for working fluids of low critical
pressure such as iso-pentane or n-pentane.
Abstract: The scale dependence of the strength of virtually homogeneous rock is usually considered to be insignificant but the spectrum of discontinuities plays a very important role for the strength of differently sized rock elements and also controls the rock creep strain. Large-scale load tests comprised recording of the creep strain rate that was found to be strongly retarded and negligible for stresses lower than about 1/3 of the failure load. For higher stresses creep took place according to a log time law representing secondary creep that ultimately changed to tertiary creep and failure.
Abstract: Artificial Intelligence (AI) methods are increasingly being used for problem solving. This paper concerns using AI-type learning machines for power quality problem, which is a problem of general interest to power system to provide quality power to all appliances. Electrical power of good quality is essential for proper operation of electronic equipments such as computers and PLCs. Malfunction of such equipment may lead to loss of production or disruption of critical services resulting in huge financial and other losses. It is therefore necessary that critical loads be supplied with electricity of acceptable quality. Recognition of the presence of any disturbance and classifying any existing disturbance into a particular type is the first step in combating the problem. In this work two classes of AI methods for Power quality data mining are studied: Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). We show that SVMs are superior to ANNs in two critical respects: SVMs train and run an order of magnitude faster; and SVMs give higher classification accuracy.