Abstract: For the past thirty years the Malaysian economy has been said to contribute well to the progress of the nations. However, the intensification of global economy activity and the extensive use of Information Communication Technologies (ICTs) in recent years are challenging government-s effort to further develop Malaysian society. The competition posed by the low wage economies such as China and Vietnam have made the government realise the importance of engaging in high-skill and high technology industries. It is hoped this will be the basis of attracting more foreign direct investment (FDI) in order to help the country to compete in globalised world. Using Vision 2020 as it targeted vision, the government has decided to engage in the use of ICTs and introduce many policies pertaining to it. Mainly based on the secondary analysis approach, the findings show that policy pertaining to ICTs in Malaysia contributes to economic growth, but the consequences of this have resulted in greater division within society. Although some of the divisions such as gender and ethnicity are narrowing down, the gap in important areas such as regions and class differences is becoming wider. The widespread use of ICTs might contribute to the further establishment of democracy in Malaysia, but the increasing number of foreign entities such as FDI and foreign workers, cultural hybridisation and to some extent cultural domination are contributing to neocolonialism in Malaysia. This has obvious consequences for the government-s effort to create a Malaysian national identity. An important finding of this work is that there are contradictions within ICT policy between the effort to develop the economy and society.
Abstract: We consider herein a concise view of discreet
programming models and methods. There has been conducted the
models and methods analysis. On the basis of discreet programming
models there has been elaborated and offered a new class of
problems, i.e. block-symmetry models and methods of applied tasks
statements and solutions.
Abstract: It is the living conditions in the cities that determine the future of our livelihood. “To change life, we must first change space"- Henri Lefebvre. Sustainable development is a utopian aspiration for South African cities (especially the case study of the Gauteng City Region), which are currently characterized by unplanned growth and increasing urban sprawl. While the reasons for poor environmental quality and living conditions are undoubtedly diverse and complex, having political, economical and social dimensions, it is argued that the prevailing approach to layout planning in South Africa is part of the problem. This article seeks a solution to the problem of sustainability, from a spatial planning perspective. The spatial planning tool, the urban development boundary, is introduced as the concept that will ensure empty talk being translated into a sustainable vision. The urban development boundary is a spatial planning tool that can be used and implemented to direct urban growth towards a more sustainable form. The urban development boundary aims to ensure planned urban areas, in contrast to the current unplanned areas characterized by urban sprawl and insufficient infrastructure. However, the success of the urban development boundary concept is subject to effective implementation measures, as well as adequate and efficient management. The concept of sustainable development can function as a driving force underlying societal change and transformation, but the interface between spatial planning and environmental management needs to be established (as this is the core aspects underlying sustainable development), and authorities needs to understand and implement this interface consecutively. This interface can, however, realize in terms of the objectives of the planning tool – the urban development boundary. The case study, the Gauteng City Region, is depicted as a site of economic growth and innovation, but there is a lack of good urban and regional governance, impacting on the design (layout) and function of urban areas and land use, as current authorities make uninformed decisions in terms of development applications, leading to unsustainable urban forms and unsustainable nodes. Place and space concepts are thus critical matters applicable to planning of the Gauteng City Region. The urban development boundary are thus explored as a planning tool to guide decision-making, and create a sustainable urban form, leading to better environmental and living conditions, and continuous sustainability.
Abstract: Regression testing is a maintenance activity applied to
modified software to provide confidence that the changed parts are
correct and that the unchanged parts have not been adversely affected
by the modifications. Regression test selection techniques reduce the
cost of regression testing, by selecting a subset of an existing test
suite to use in retesting modified programs. This paper presents the
first general regression-test-selection technique, which based on code
and allows selecting test cases for any programs written in any
programming language. Then it handles incomplete program. We
also describe RTSDiff, a regression-test-selection system that
implements the proposed technique. The results of the empirical
studied that performed in four programming languages java, C#, Cµ
and Visual basic show that the efficiency and effective in reducing
the size of test suit.
Abstract: In most cases, it is considerably difficult to directly measure structural vibration with a lot of sensors because of complex
geometry, time and equipment cost. For this reason, this paper deals
with the problem of locating sensors on a plate model by four advanced sensor placement optimization (S.P.O) techniques. It also
suggests the evaluation index representing the characteristic of orthogonal between each of natural modes. The index value provides the assistance to selecting of proper S.P.O technique and optimal
positions for monitoring of dynamic systems without the experiment.
Abstract: The introduction of mass-customization has enabled
new ways to treat patients within medicine. However, the
introduction of industrialized treatments has also meant new
obstacles. The purpose of this study was to introduce and
theoretically test a method for improving dental crown fit. The
optimization method allocates support points in order to check the
final variation for dental crowns. Three different types of geometries
were tested and compared. The three geometries were also divided
into three sub-geometries: Current method, Optimized method and
Feasible method. The Optimized method, using the whole surface for
support points, provided the best results. The results support the
objective of the study. It also seems that the support optimization
method can dramatically improve the robustness of dental crown
treatments.
Abstract: In this paper optimal capacitor placement problem has
been formulated in a restructured distribution network. In this
scenario the distribution network operator can consider reactive
energy also as a service that can be sold to transmission system. Thus
search for optimal location, size and number of capacitor banks with
the objective of loss reduction, maximum income from selling
reactive energy to transmission system and return on investment for
capacitors, has been performed. Results is influenced with economic
value of reactive energy, therefore problem has been solved for
various amounts of it. The implemented optimization technique is
genetic algorithm. For any value of reactive power economic value,
when reverse of investment index increase and change from zero or
negative values to positive values, the threshold value of selling
reactive power has been obtained. This increasing price of economic
parameter is reasonable until the network losses is less than loss
before compensation.
Abstract: A simple microstructure optical fiber design based on an octagonal cladding structure is presented for simultaneously controlling dispersion and leakage properties. The finite difference method with anisotropic perfectly matched boundary layer is used to investigate the guiding properties. It is demonstrated that octagonal photonic crystal fibers with four rings can assume negative ultra-flattened dispersion of -19 + 0.23 ps/nm/km in the wavelength range of 1.275 μm to 1.68 μm, nearly zero ultra-flattened dispersion of 0 ± 0.40 ps/nm/km in a 1.38 to 1.64 μm, and low confinement losses less than 10-3 dB/km in the entire band of interest.
Abstract: In this work we introduce an efficient method to limit
the impact of the hiding process on the quality of the cover speech.
Vector quantization of the speech spectral information reduces drastically
the number of the secret speech parameters to be embedded
in the cover signal. Compared to scalar hiding, vector quantization
hiding technique provides a stego signal that is indistinguishable from
the cover speech. The objective and subjective performance measures
reveal that the current hiding technique attracts no suspicion about the
presence of the secret message in the stego speech, while being able
to recover an intelligible copy of the secret message at the receiver
side.
Abstract: One of the most growing areas in the embedded community is multimedia devices. Multimedia devices incorporate a number of complicated functions for their operation, like motion estimation. A multitude of different implementations have been proposed to reduce motion estimation complexity, such as spiral search. We have studied the implementations of spiral search and identified areas of improvement. We propose a modified spiral search algorithm, with lower computational complexity compared to the original spiral search. We have implemented our algorithm on an embedded ARM based architecture, with custom memory hierarchy. The resulting system yields energy consumption reduction up to 64% and performance increase up to 77%, with a small penalty of 2.3 dB, in average, of video quality compared with the original spiral search algorithm.
Abstract: In a chirp spread spectrum (CSS) system, the overlap
technique is used for increasing bit rate. More overlaps can offer
higher data throughput; however, they may cause more intersymbol
interference (ISI) at the same time, resulting in serious bit error
rate (BER) performance degradation. In this paper, we perform the
BER analysis and derive a closed form BER expression for the
overlap-based CSS system. The derived BER expression includes
the number of overlaps as a parameter, and thus, would be very
useful in determining the number of overlaps for a specified BER.
The numerical results demonstrate that the BER derived in a closed
form closely agrees with the simulated BER.
Abstract: The charnockitic and associated granitic rocks of Akure area were studied for their field and petrographic relationship's. The outcrops locations were plotted in Surfer 8. The granitic rock exhibits a porphyritic texture and outcrops in the north-eastern side of the study area while the charnockitics outcrop in the central/western part. An essentially dark coloured and fine grained intrusive exhibiting xenoliths and xenocrysts (plagioclase phenocrysts) of the granite outcrops between the granitic and charnockitic rocks. Mineralogically, the central rock combines the content of the other two indicating that it is most likely a product of their hybridization. The charnockitic magma is believed to have intruded and assimilated the granite substantially thereby contaminating itself and consequently emplacing the hybrid. The presented model of emplacement elucidates the hybridization proposal. Conclusively, the charnockitics are believed to be (a) younger than the granite, (b) of Pan-African age and (c) of igneous origin.
Abstract: Neoclassical and functionalist explanations of self
organization in multiagent systems have been criticized on several accounts including unrealistic explication of overadapted agents and
failure to resolve problems of externality. The paper outlines a more
elaborate and dynamic model that is capable of resolving these dilemmas. An illustrative example where behavioral diversity is
cobred in a repeated nonzero sum task via evolutionary computing is
presented.
Abstract: This research focuses on micro-enterprise of
Malaysian Malays that are involved in very small-scaled business
activities. Among them include food stall and burger stall operators,
night market hawkers, grocery store operators as well as construction
and small service activities works. The study seeks to explore why
some micro-entrepreneurs still lag in entrepreneurship and what
needs to be rectified. This quantitative study is conducted on 173
Malay micro-enterprise owners (MEOs) and 58 Malay failed microenterprise
owners (FMEOs) involved in all range of businesses
throughout the state of Perak, Malaysia. The main aims are to
identify the gaps between the failed micro-enterprise owners
(FMEOs) and existing micro-enterprise owners (MEOs) and the
problems faced among FMEOs. The results reveal that the MEOs had
strong motivations and better marketing approaches as compared to
FMEOs. Furthermore, the FMEOs failed in the business ventures
mainly due to lack of management, sales and marketing skills and
poor competitive abilities to keep up with rivals.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: This paper describes a novel method for automatic
estimation of the contours of weld defect in radiography images.
Generally, the contour detection is the first operation which we apply
in the visual recognition system. Our approach can be described as a
region based maximum likelihood formulation of parametric
deformable contours. This formulation provides robustness against
the poor image quality, and allows simultaneous estimation of the
contour parameters together with other parameters of the model.
Implementation is performed by a deterministic iterative algorithm
with minimal user intervention. Results testify for the very good
performance of the approach especially in synthetic weld defect
images.
Abstract: Staphylococcus aureus, one of the microflora in a
human external auditory canal (EAC) is frequently exposed to highfrequency
electromagnetic field (HF-EMF) generated by mobile
phones. It is normally non-pathogenic but in certain circumstances, it
can cause infections. This study investigates the changes in the
physiology of S. aureus when exposed to HF-EMF of a mobile
phone. Exponentially grown S. aureus were exposed to two
conditions of EMF irradiation (standby-mode and on-call mode) at
four durations; 15, 30, 45 and 60 min. Changes in the viability and
biofilm production of the S. aureus were compared between the two
conditions of exposure. EMF from the standby-mode has enhanced
the growth of S. aureus but during on-call, the growth was
suppressed. No significant difference in the amount of biofilm
produced in both modes of exposure was observed. Thus, HF-EMF
of mobile phone affects the viability of S. aureus but not its ability to
produce biofilm.
Abstract: Micro power sources are required to be used in autonomous microelectromechanical system (MEMS). In this paper,
we designed and fabricated a three dimensional (3D) MEMS supercapacitor, which is consisting of conformal silicon
dioxide/titanium/polypyrrole (PPy) layers on silicon substrate. At first, ''through-structure'' was fabricated on the silicon substrate by high-aspect-ratio deep reactive ion etching (DRIE) method, which enlarges the available surface area significantly. Then the SiO2/Ti/PPy layers grew sequentially on the ³through-structure´. Finally, the supercapacitor was investigated by electrochemical methods.
Abstract: The effect of a time delay on the transmission on
dengue fever is studied. The time delay is due to the presence of an
incubation period for the dengue virus to develop in the mosquito
before the mosquito becomes infectious. The conditions for the
existence of a Hopf bifurcation to limit cycle behavior are
established. The conditions are different from the usual one and they
are based on whether a particular third degree polynomial has
positive real roots. A theorem for determining whether for a given
set of parameter values, a critical delay time exist is given. It is
found that for a set of realistic values of the parameters in the model,
a Hopf bifurcation can not occur. For a set of unrealistic values of
some of the parameters, it is shown that a Hopf bifurcation can occur.
Numerical solutions using this last set show the trajectory of two of
the variables making a transition from a spiraling orbit to a limit
cycle orbit.
Abstract: A Decision Support System/Expert System for stock
portfolio selection presented where at first step, both technical and
fundamental data used to estimate technical and fundamental return
and risk (1st phase); Then, the estimated values are aggregated with
the investor preferences (2nd phase) to produce convenient stock
portfolio.
In the 1st phase, there are two expert systems, each of which is
responsible for technical or fundamental estimation. In the technical
expert system, for each stock, twenty seven candidates are identified
and with using rough sets-based clustering method (RC) the effective
variables have been selected. Next, for each stock two fuzzy rulebases
are developed with fuzzy C-Mean method and Takai-Sugeno-
Kang (TSK) approach; one for return estimation and the other for
risk. Thereafter, the parameters of the rule-bases are tuned with backpropagation
method. In parallel, for fundamental expert systems,
fuzzy rule-bases have been identified in the form of “IF-THEN" rules
through brainstorming with the stock market experts and the input
data have been derived from financial statements; as a result two
fuzzy rule-bases have been generated for all the stocks, one for return
and the other for risk.
In the 2nd phase, user preferences represented by four criteria and
are obtained by questionnaire. Using an expert system, four estimated
values of return and risk have been aggregated with the respective
values of user preference. At last, a fuzzy rule base having four rules,
treats these values and produce a ranking score for each stock which
will lead to a satisfactory portfolio for the user.
The stocks of six manufacturing companies and the period of
2003-2006 selected for data gathering.