Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: Economic crime (i.e. corporate fraud) has a
significant impact on business. This study analyzes the fraud cases
reported by the Malaysian Securities Commission. Frauds involving
market manipulation and/or illegal share trading are the most
common types of fraud reported over the 6 years analyzed. The
highest number of frauds reported involved investment and fund
holding companies. Alarmingly the results indicate quite a high
number of frauds cases are committed by management. The higher
number of Chinese perpetrators may be due to fact that they are the
dominant group in Malaysian business. The result also shows that
more than half of companies involved with fraud are privately held
companies in the investment/fund/finance sector. The results of this
study highlight general characteristic of perpetrators (person and
company) that commit fraud which could help the regulators in their
monitoring and enforcement activities. To investors, this would help
in analyzing their business investment or portfolio risk.
Abstract: The objective of current issue was to develop a model
of testicular herpes simplex virus (HSV) type I infection for
assessment of viral effect on fertility. 56 male mice were inoculated
intraperitoneally with different concentrations of HSV on 8 day post
partum. It was revealed that the optimal dose was 100 plaque
forming units per mice as it provided testicular infection in 100% of
survivors. HSV proteins were detected both in somatic and germ
cells (spermatogonia, spermatocytes, spermatides). Although DNA
load in testis was descending from 3 to 28 days post infection only
12.5% of infected males had offspring after mating with uninfected
females comparing to 87.5% in control (p=0.012). These results are
the first direct evidence for HSV impact in male sterility. Prepuberal
mice appeared to be a suitable model for investigation of
pathogenesis of virus-associated fertility disorders.
Abstract: The fuzzy technique is an operator introduced in order
to simulate at a mathematical level the compensatory behavior in
process of decision making or subjective evaluation. The following
paper introduces such operators on hand of computer vision
application.
In this paper a novel method based on fuzzy logic reasoning
strategy is proposed for edge detection in digital images without
determining the threshold value. The proposed approach begins by
segmenting the images into regions using floating 3x3 binary matrix.
The edge pixels are mapped to a range of values distinct from each
other. The robustness of the proposed method results for different
captured images are compared to those obtained with the linear Sobel
operator. It is gave a permanent effect in the lines smoothness and
straightness for the straight lines and good roundness for the curved
lines. In the same time the corners get sharper and can be defined
easily.
Abstract: Contemporary science and technologies largely widen
the gap between the spiritual and rational of the society. Industrial
and technological breakthroughs might radically affect most
processes in the society, thus losing the cultural heritage. The
thinkers recognized the dangers of the decadence in the first place. In
the present article the ways of preserving cultural heritage have been
investigated. Memory has always been a necessary condition for selfidentification,
- continuity is based on this. The authors have
supported the hypothesis that continuity and ethnic memory are the
very mechanisms that preserve cultural heritage. Such problemformulating
will facilitate another, new look at the material, spiritual
and arts spheres of the cultural heritage of numerous ethnic groups.
The fundamental works by major European and Kazakh scientists
have been taken as a basis for the research done.
Abstract: Microorganisms isolated from water and soil of
Kazakhstan to identify potential high-effective producers of the
arachidonic acid, exhibiting a wide range of physiological activity
and having practical applications were screened. Based on the results
of two independent tests (the test on the sensitivity of the growth
processes of microorganisms to acetylsalicylic acid - an irreversible
inhibitor of PGH-synthase involved in the metabolism of arachidonic
acid and its derivatives, the test for inhibition of peroxidase activity
of membrane-bounding fraction of PGH - synthase by acetylsalicylic
acid) were selected microbial cultures which are potential highproducer
of arachidonic acid. They are characterized by a stable
strong growth in the laboratory conditions. Identification of
microorganism cultures based on morphological, physiological,
biochemical and molecular genetic characteristics was performed.
Abstract: Components of a software system may be related in a
wide variety of ways. These relationships need to be represented in
software architecture in order develop quality software. In practice, software architecture is immensely challenging, strikingly
multifaceted, extravagantly domain based, perpetually changing,
rarely cost-effective, and deceptively ambiguous. This paper analyses
relations among the major components of software systems and
argues for using several broad categories for software architecture for
assessment purposes: strongly adequate, weakly adequate and
functionally adequate software architectures among other categories.
These categories are intended for formative assessments of
architectural designs.
Abstract: Implementing Information Technology/ Information
System (IT/IS) is critical for every industry as its potential benefits
have been to motivate many industries including the Malaysian
construction industry to invest in it. To successfully implement IT/IS
has become the major concern for every organisation. Identifying the
critical success factors (CSFs) has become the main agenda for
researchers, academicians and practitioners due to the wide number
of failures reported. This research paper seeks to identify the CSFs
that influence the successful implementation of IT/IS in construction
industry in Malaysia. Limited factors relating to people issue will be
highlighted here to showcase some as it becomes one of the major
contributing factors to the failure. Three (3) organisations have
participated in this study. Semi-structured interviews are employed as
they offer sufficient flexibility to ensure that all relevant factors are
covered. Several key issues contributing to successful
implementations of IT/IS are identified. The results of this study
reveal that top management support, communication, user
involvement, IT staff roles and responsibility, training/skills, leader/
IT Leader, organisation culture, knowledge/ experience, motivation,
awareness, focus and ambition, satisfaction, teamwork/ collaboration,
willingness to change, attitude, commitment, management style,
interest in IT, employee behaviour towards collaborative
environment, trust, interpersonal relationship, personal characteristic
and competencies are significantly associated with the successful
implementations of IT/IS. It is anticipated that this study will create
awareness and contribute to a better understanding amongst
construction industry players and will assist them to successfully
implement IT/IS.
Abstract: International literature emphasizes on the concern regarding the phenomenon of aggression in hospital. This paper focuses on the reality of aggressive interactions reigning within an emergency triage involving three chaps of protagonists: the professionals, the patients and their carers. The data collection was made from a grid of observation, in which the various variables exposed in the literature were integrated. They observations took place around the clock, for three weeks, at the rate of one week a month. In this research 331 aggressive interactions have been listed and analyzed by means of the software SPSS. This research is one of the very few continuous observation surveys in the literature. It shows the various human factors at play in the emergence of aggressive interaction. The data may be used both for taking steps in primary prevention, thanks to the analysis of interaction modes, and in secondary prevention by integrating the useful results in situational prevention.
Abstract: Particle detection in very noisy and low contrast images
is an active field of research in image processing. In this article, a
method is proposed for the efficient detection and sizing of subsurface
spherical particles, which is used for the processing of softly fused
Au nanoparticles. Transmission Electron Microscopy is used for
imaging the nanoparticles, and the proposed algorithm has been
tested with the two-dimensional projected TEM images obtained.
Results are compared with the data obtained by transmission optical
spectroscopy, as well as with conventional circular object detection
algorithms.
Abstract: The aim of our work is to study phase composition,
particle size and magnetic response of Fe2O3/TiO2 nanocomposites
with respect to the final annealing temperature. Those nanomaterials
are considered as smart catalysts, separable from a liquid/gaseous
phase by applied magnetic field. The starting product was obtained
by an ecologically acceptable route, based on heterogeneous
precipitation of the TiO2 on modified g-Fe2O3 nanocrystals dispersed
in water. The precursor was subsequently annealed on air at
temperatures ranging from 200 oC to 900 oC. The samples were
investigated by synchrotron X-ray powder diffraction (S-PXRD),
magnetic measurements and Mössbauer spectroscopy. As evidenced
by S-PXRD and Mössbauer spectroscopy, increasing the annealing
temperature causes evolution of the phase composition from
anatase/maghemite to rutile/hematite, finally above 700 oC the
pseudobrookite (Fe2TiO5) also forms. The apparent particle size of
the various Fe2O3/TiO2 phases has been determined from the highquality
S-PXRD data by using two different approaches: the Rietveld
refinement and the Debye method. Magnetic response of the samples
is discussed in considering the phase composition and the particle
size.
Abstract: The most common result of analysis of highthroughput
data in molecular biology represents a global list of
genes, ranked accordingly to a certain score. The score can be a
measure of differential expression. Recent work proposed a new
method for selecting a number of genes in a ranked gene list from
microarray gene expression data such that this set forms the
Optimally Functionally Enriched Network (OFTEN), formed by
known physical interactions between genes or their products. Here
we present calculation results of relative connectivity of genes from
META-OFTEN network and tentative biological interpretation of the
most reproducible signal. The relative connectivity and
inbetweenness values of genes from META-OFTEN network were
estimated.
Abstract: The objectification of the Russian and Kazakh concepts, identify significant national identity, which reflects the cultural and social interpersonal are discussed in this article.
Abstract: In the first part of the research work, an electrolyzer (10.16 cm dia and 24.13 cm height) to produce hydrogen and oxygen was constructed for single slice O2/H2 fuel cell using cation exchange membrane. The electrolyzer performance was tested with 23% NaOH, 30% NaOH, 30% KOH and 35% KOH electrolyte solution with current input 4 amp and 2.84 V from the rectifier. Rates of volume of hydrogen produced were 0.159 cm3/sec, 0.155 cm3/sec, 0.169 cm3/sec and 0.163 cm3/sec respectively from 23% NaOH, 30% NaOH, 30% KOH and 35% KOH solution. Rates of volume of oxygen produced were 0.212 cm3/sec, 0.201 cm3/sec, 0.227 cm3/sec and 0.219 cm3/sec respectively from 23% NaOH, 30% NaOH, 30% KOH and 35% KOH solution (1.5 L). In spite of being tested the increased concentration of electrolyte solution, the gas rate does not change significantly. Therefore, inexpensive 23% NaOH electrolyte solution was chosen to use as the electrolyte in the electrolyzer. In the second part of the research work, graphite serpentine flow plates, fiberglass end plates, stainless steel screen electrodes, silicone rubbers were made to assemble the single slice O2/H2 polymer electrolyte membrane fuel cell (PEMFC).