Abstract: Computer programming is considered a very difficult
course by many computer science students. The reasons for the
difficulties include cognitive load involved in programming,
different learning styles of students, instructional methodology and
the choice of the programming languages. To reduce the difficulties
the following have been tried: pair programming, program
visualization, different learning styles etc. However, these efforts
have produced limited success. This paper reviews the problem and
proposes a framework to help students overcome the difficulties
involved.
Abstract: The fuzzy set theory has been applied in many fields,
such as operations research, control theory, and management
sciences, etc. In particular, an application of this theory in decision
making problems is linear programming problems with fuzzy
numbers. In this study, we present a new method for solving fuzzy
number linear programming problems, by use of linear ranking
function. In fact, our method is similar to simplex method that was
used for solving linear programming problems in crisp environment
before.
Abstract: The zero inflated models are usually used in modeling
count data with excess zeros where the existence of the excess zeros
could be structural zeros or zeros which occur by chance. These type
of data are commonly found in various disciplines such as finance,
insurance, biomedical, econometrical, ecology, and health sciences
which involve sex and health dental epidemiology. The most popular
zero inflated models used by many researchers are zero inflated
Poisson and zero inflated negative binomial models. In addition, zero
inflated generalized Poisson and zero inflated double Poisson models
are also discussed and found in some literature. Recently zero
inflated inverse trinomial model and zero inflated strict arcsine
models are advocated and proven to serve as alternative models in
modeling overdispersed count data caused by excessive zeros and
unobserved heterogeneity. The purpose of this paper is to review
some related literature and provide a variety of examples from
different disciplines in the application of zero inflated models.
Different model selection methods used in model comparison are
discussed.
Abstract: Facial expression analysis is rapidly becoming an
area of intense interest in computer science and human-computer
interaction design communities. The most expressive way humans
display emotions is through facial expressions. In this paper we
present a method to analyze facial expression from images by
applying Gabor wavelet transform (GWT) and Discrete Cosine
Transform (DCT) on face images. Radial Basis Function (RBF)
Network is used to classify the facial expressions. As a second stage,
the images are preprocessed to enhance the edge details and non
uniform down sampling is done to reduce the computational
complexity and processing time. Our method reliably works even
with faces, which carry heavy expressions.
Abstract: There are various approaches to implement quality
improvements. Organizations aim for a management standard which
is capable of providing customers with quality assurance on their
product/service via continuous process improvement. Carefully
planned steps are necessary to ensure the right quality improvement
methodology (QIM) and business operations are consistent, reliable
and truly meet the customers' needs. This paper traces the evolution
of QIM in Malaysia-s Information Technology (IT) industry in the
past, current and future; and highlights some of the thought of
researchers who contributed to the science and practice of quality,
and identifies leading methodologies in use today. Some of the
misconceptions and mistakes leading to quality system failures will
also be examined and discussed. This paper aims to provide a general
overview of different types of QIMs available for IT businesses in
maximizing business advantages, enhancing product quality,
improving process routines and increasing performance earnings.
Abstract: In today's day and age, one of the important topics in
information security is authentication. There are several alternatives
to text-based authentication of which includes Graphical Password
(GP) or Graphical User Authentication (GUA). These methods stems
from the fact that humans recognized and remembers images better
than alphanumerical text characters. This paper will focus on the
security aspect of GP algorithms and what most researchers have
been working on trying to define these security features and
attributes. The goal of this study is to develop a fuzzy decision model
that allows automatic selection of available GP algorithms by taking
into considerations the subjective judgments of the decision makers
who are more than 50 postgraduate students of computer science. The
approach that is being proposed is based on the Fuzzy Analytic
Hierarchy Process (FAHP) which determines the criteria weight as a
linear formula.
Abstract: The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred.
Abstract: In recent years, scanning probe atomic force
microscopy SPM AFM has gained acceptance over a wide spectrum
of research and science applications. Most fields focuses on physical,
chemical, biological while less attention is devoted to manufacturing
and machining aspects. The purpose of the current study is to assess
the possible implementation of the SPM AFM features and its
NanoScope software in general machining applications with special
attention to the tribological aspects of cutting tool. The surface
morphology of coated and uncoated as-received carbide inserts is
examined, analyzed, and characterized through the determination of
the appropriate scanning setting, the suitable data type imaging
techniques and the most representative data analysis parameters
using the MultiMode SPM AFM in contact mode. The NanoScope
operating software is used to capture realtime three data types
images: “Height", “Deflection" and “Friction". Three scan sizes are
independently performed: 2, 6, and 12 μm with a 2.5 μm vertical
range (Z). Offline mode analysis includes the determination of three
functional topographical parameters: surface “Roughness", power
spectral density “PSD" and “Section". The 12 μm scan size in
association with “Height" imaging is found efficient to capture every
tiny features and tribological aspects of the examined surface. Also,
“Friction" analysis is found to produce a comprehensive explanation
about the lateral characteristics of the scanned surface. Configuration
of many surface defects and drawbacks has been precisely detected
and analyzed.
Abstract: The objective of this paper is to use the Pfaffian
technique to construct different classes of exact Pfaffian solutions and
N-soliton solutions to some of the generalized integrable nonlinear
partial differential equations in (3+1) dimensions. In this paper, I will
show that the Pfaffian solutions to the nonlinear PDEs are nothing but
Pfaffian identities. Solitons are among the most beneficial solutions
for science and technology, from ocean waves to transmission of
information through optical fibers or energy transport along protein
molecules. The existence of multi-solitons, especially three-soliton
solutions, is essential for information technology: it makes possible
undisturbed simultaneous propagation of many pulses in both directions.
Abstract: This paper presents initiatives of Knowledge
Management (KM) applied to Forensic Sciences field, especially
developed at the Forensic Science Institute of the Brazilian Federal
Police. Successful projects, related to knowledge sharing, drugs
analysis and environmental crimes, are reported in the KM
perspective. The described results are related to: a) the importance of
having an information repository, like a digital library, in such a
multidisciplinary organization; b) the fight against drug dealing and
environmental crimes, enabling the possibility to map the evolution
of crimes, drug trafficking flows, and the advance of deforestation in
Amazon rain forest. Perspectives of new KM projects under
development and studies are also presented, tracing an evolution line
of the KM view at the Forensic Science Institute.
Abstract: The right information at the right time influences the
enterprise and technical success. Sharing knowledge among members
of a big organization may be a complex activity. And as long as the
knowledge is not shared, can not be exploited by the organization.
There are some mechanisms which can originate knowledge sharing.
It is intended, in this paper, to trigger these mechanisms by using
semantic nets. Moreover, the intersection and overlapping of terms
and sub-terms, as well as their relationships will be described through
the mereology science for the whole knowledge sharing system. It is
proposed a knowledge system to supply to operators with the right
information about a specific process and possible risks, e.g. at the
assembly process, at the right time in an automated manufacturing
environment, such as at the automotive industry.
Abstract: Lectins have a good scope in current clinical
microbiology research. In the present study evaluated the
antimicrobial activities of a D-galactose binding lectin (PnL) was
purified from the annelid, Perinereis nuntia (polychaeta) by affinity
chromatography. The molecular mass of the lectin was determined to
be 32 kDa as a single polypeptide by SDS-PAGE under both reducing
and non-reducing conditions. The hemagglutinating activity of the
PnL showed against trypsinized and glutaraldehyde-fixed human
erythrocytes was specifically inhibited by D-Gal, GalNAc,
Galβ1-4Glc and Galα1-6Glc. PnL was evaluated for in vitro
antibacterial screening studies against 11 gram-positive and
gram-negative microorganisms. From the screening results, it was
revealed that PnL exhibited significant antibacterial activity against
gram-positive bacteria. Bacillus megaterium showed the highest
growth inhibition by the lectin (250 μg/disc). However, PnL did not
inhibit the growth of gram-negative bacteria such as Vibrio cholerae
and Pseudomonas sp. PnL was also examined for in vitro antifungal
activity against six fungal phytopathogens. PnL (100 μg/mL) inhibited
the mycelial growth of Alternaria alternata (24.4%). These results
indicate that future findings of lectin applications obtained from
annelids may be of importance to life sciences.
Abstract: Data Structures and Algorithms is a module in most
Computer Science or Information Technology curricula. It is one of
the modules most students identify as being difficult. This paper
demonstrates how programming a solution for Sudoku can make
abstract concepts more concrete. The paper relates concepts of a
typical Data Structures and Algorithms module to a step by step
solution for Sudoku in a human type as opposed to a computer
oriented solution.
Abstract: The emergence of networked information and communication has transformed the accessibility and delivery of scholarly information and fundamentally impacted on the processes of research and scholarly communication. The purpose of this study is to investigate disciplinary differences in the use of networked information for research and scholarly communication at Sultan Qaboos University, Oman. This study has produced quantitative data about how and why academics within different disciplines utilize networked information that is made available either internally through the university library, or externally through networked services accessed by the Internet. The results indicate some significant differences between the attitudes and practice of academics in the science disciplines when compared to those from the social sciences and humanities. While respondents from science disciplines show overall longer and more frequent use of networked information, respondents from humanities and social sciences indicated more positive attitudes and a greater degree of satisfaction toward library networked services.
Abstract: As is known, one of the priority directions of research
works of natural sciences is introduction of applied section of
contemporary mathematics as approximate and numerical methods to
solving integral equation into practice. We fare with the solving of
integral equation while studying many phenomena of nature to whose
numerically solving by the methods of quadrature are mainly applied.
Taking into account some deficiency of methods of quadrature for
finding the solution of integral equation some sciences suggested of
the multistep methods with constant coefficients. Unlike these papers,
here we consider application of hybrid methods to the numerical
solution of Volterra integral equation. The efficiency of the suggested
method is proved and a concrete method with accuracy order p = 4
is constructed. This method in more precise than the corresponding
known methods.
Abstract: Students often adopt routine practicing as learning
strategy for mathematics. The reason is they are often bound and
trained to solving conventional-typed questions in Mathematics in
high school. This will be problematic if students further consolidate
this practice in university. Therefore, the Department of Mathematics
emphasized and integrated the Discovery-enriched approach in the
undergraduate curriculum. This paper presents the details of
implementing the Discovery-enriched Curriculum by providing
adequate platform for project-learning, expertise for guidance and
internship opportunities for students majoring in Mathematics. The
Department also provided project-learning opportunities to
mathematics courses targeted for students majoring in other science or
engineering disciplines. The outcome is promising: the research
ability and problem solving skills of students are enhanced.
Abstract: The purpose of the study reported here was designing Information Dissemination System (IDS) based E-learning in agricultural of Iran. A questionnaire was developed to designing Information Dissemination System. The questionnaire was distributed to 96 extension agents who work for Management of Extension and Farming System of Khuzestan province of Iran. Data collected were analyzed using the Statistical Package for the Social Sciences (SPSS). Appropriate statistical procedures for description (frequencies, percent, means, and standard deviations) were used. In this study there was a significant relationship between the age , IT skill and knowledge, years of extension work, the extend of information seeking motivation, level of job satisfaction and level of education with use of information technology by extension agent. According to extension agents five factors were ranked respectively as five top essential items to designing Information Dissemination System (IDS) based E-learning in agricultural of Iran. These factors include: 1) Establish communication between farmers, coordinators (extension agents), agricultural experts, research centers, and community by information technology. 2) The communication between all should be mutual. 3) The information must be based farmers need. 4) Internet used as a facility to transfer the advanced agricultural information to the farming community. 5) Farmers can be illiterate and speak a local and they are not expected to use the system directly. Knowledge produced by the agricultural scientist must be transformed in to computer understandable presentation. To designing Information Dissemination System, electronic communication, in the agricultural society and rural areas must be developed. This communication must be mutual between all factors.
Abstract: The Boundary Representation of a 3D manifold contains
FACES (connected subsets of a parametric surface S : R2 -!
R3). In many science and engineering applications it is cumbersome
and algebraically difficult to deal with the polynomial set and
constraints (LOOPs) representing the FACE. Because of this reason, a
Piecewise Linear (PL) approximation of the FACE is needed, which is
usually represented in terms of triangles (i.e. 2-simplices). Solving the
problem of FACE triangulation requires producing quality triangles
which are: (i) independent of the arguments of S, (ii) sensitive to the
local curvatures, and (iii) compliant with the boundaries of the FACE
and (iv) topologically compatible with the triangles of the neighboring
FACEs. In the existing literature there are no guarantees for the point
(iii). This article contributes to the topic of triangulations conforming
to the boundaries of the FACE by applying the concept of parameterindependent
Gabriel complex, which improves the correctness of the
triangulation regarding aspects (iii) and (iv). In addition, the article
applies the geometric concept of tangent ball to a surface at a point to
address points (i) and (ii). Additional research is needed in algorithms
that (i) take advantage of the concepts presented in the heuristic
algorithm proposed and (ii) can be proved correct.
Abstract: With the exponential growth of networked system and
application such as eCommerce, the demand for effective internet
security is increasing. Cryptology is the science and study of systems
for secret communication. It consists of two complementary fields of
study: cryptography and cryptanalysis. The application of genetic
algorithms in the cryptanalysis of knapsack ciphers is suggested by
Spillman [7]. In order to improve the efficiency of genetic algorithm
attack on knapsack cipher, the previously published attack was
enhanced and re-implemented with variation of initial assumptions
and results are compared with Spillman results. The experimental
result of research indicates that the efficiency of genetic algorithm
attack on knapsack cipher can be improved with variation of initial
assumption.
Abstract: The weight constrained shortest path problem
(WCSPP) is one of most several known basic problems in
combinatorial optimization. Because of its importance in many areas
of applications such as computer science, engineering and operations
research, many researchers have extensively studied the WCSPP.
This paper mainly concentrates on the reduction of total search space
for finding WCSP using some existing Genetic Algorithm (GA). For
this purpose, some controlled schemes of genetic operators are
adopted on list chromosome representation. This approach gives a
near optimum solution with smaller elapsed generation than classical
GA technique. From further analysis on the matter, a new
generalized schema theorem is also developed from the philosophy
of Holland-s theorem.