Abstract: Malaysia is aggressive in promoting the usage of ICT
to its mass population through the support by the government
policies and programs targeting the general population. However,
with the uneven distribution of the basic telecommunication
infrastructure between the urban and rural area, cost for being
“interconnected" that is considered high among the poorer rural
population and the lack of local contents that suit the rural population
needs or lifestyles, it is still a challenge for Malaysia to achieve its
Vision 2020 Agenda moving the nation towards an information
society by the year 2020. Among the existing programs that have
been carried out by the government to encourage the usage of ICT by
the rural population is “Kedaikom", a community telecenter with the
general aim is to engage the community to get exposed and to use the
ICT, encouraging the diffusion of the ICT technology to the rural
population. The research investigated by using a questionnaire
survey of how Kedaikom, as a community telecenter could play a
role in encouraging the rural or underserved community to use the
ICT. The result from the survey has proven that the community
telecenter could bridge the digital divide between the underserved
rural population and the well-accessed urban population in Malaysia.
More of the rural population, especially from the younger generation
and those with higher educational background are using the
community telecenter to be connected to the ICT.
Abstract: Lung cancer accounts for the most cancer related deaths for men as well as for women. The identification of cancer associated genes and the related pathways are essential to provide an important possibility in the prevention of many types of cancer. In this work two filter approaches, namely the information gain and the biomarker identifier (BMI) are used for the identification of different types of small-cell and non-small-cell lung cancer. A new method to determine the BMI thresholds is proposed to prioritize genes (i.e., primary, secondary and tertiary) using a k-means clustering approach. Sets of key genes were identified that can be found in several pathways. It turned out that the modified BMI is well suited for microarray data and therefore BMI is proposed as a powerful tool for the search for new and so far undiscovered genes related to cancer.
Abstract: Application of Geo-Informatic technology in land
tenure and land use on the economic crop area, to create sustainable
land, access to the area, and produce sustainable food for the demand
of its people in the community. The research objectives are to 1)
apply Geo-Informatic Technology on land ownership and agricultural
land use (cash crops) in the research area, 2) create GIS database on
land ownership and land use, 3) create database of an online Geoinformation
system on land tenure and land use. The results of this
study reveal that, first; the study area is on high slope, mountains and
valleys. The land is mainly in the forest zone which was included in
the Forest Act 1941 and National Conserved Forest 1964. Residents
gained the rights to exploit the land passed down from their
ancestors. The practice was recognized by communities. The land
was suitable for cultivating a wide variety of economic crops that was
the main income of the family. At present the local residents keep
expanding the land to grow cash crops. Second; creating a database
of the geographic information system consisted of the area range,
announcement from the Interior Ministry, interpretation of satellite
images, transportation routes, waterways, plots of land with a title
deed available at the provincial land office. Most pieces of land
without a title deed are located in the forest and national reserve
areas. Data were created from a field study and a land zone
determined by a GPS. Last; an online Geo-Informatic System can
show the information of land tenure and land use of each economic
crop. Satellite data with high resolution which could be updated and
checked on the online Geo-Informatic System simultaneously.
Abstract: It has been always observed that the effectiveness of
MIS as a support tool for management decisions degenerate after
time of implementation, despite the substantial investments being
made. This is true for organizations at the initial stages of MIS
implementations, manual or computerized. A survey of a sample of
middle to top managers in business and government institutions was
made. A large ratio indicates that the MIS has lost its impact on the
day-to-day operations, and even the response lag time expands
sometimes indefinitely. The data indicates an infant mortality
phenomenon of the bathtub model. Reasons may be monotonous
nature of MIS delivery, irrelevance, irreverence, timeliness, and lack
of adequate detail. All those reasons collaborate to create a degree of
degeneracy. We investigate and model as a bathtub model the
phenomenon of MIS degeneracy that inflicts the MIS systems and
renders it ineffective. A degeneracy index is developed to identify
the status of the MIS system and possible remedies to prevent the
onset of total collapse of the system to the point of being useless.
Abstract: In this paper, a new robust audio fingerprinting
algorithm in MP3 compressed domain is proposed with high
robustness to time scale modification (TSM). Instead of simply
employing short-term information of the MP3 stream, the new
algorithm extracts the long-term features in MP3 compressed domain
by using the modulation frequency analysis. Our experiment has
demonstrated that the proposed method can achieve a hit rate of
above 95% in audio retrieval and resist the attack of 20% TSM. It has
lower bit error rate (BER) performance compared to the other
algorithms. The proposed algorithm can also be used in other
compressed domains, such as AAC.
Abstract: This paper proposes a visual cryptography by random
grids scheme with identifiable shares. The method encodes an image
O in two shares that exhibits the following features: (1) each generated
share has the same scale as O, (2) any share singly has noise-like
appearance that reveals no secret information on O, (3) the secrets can
be revealed by superimposing the two shares, (4) folding a share up
can disclose some identification patterns, and (5) both of the secret
information and the designated identification patterns are recognized
by naked eye without any computation. The property to show up
identification patterns on folded shares establishes a simple and
friendly interface for users to manage the numerous shares created by
VC schemes.
Abstract: In this paper, we propose a method of alter duration in
frequency domain that control prosody in real time after pitch
alteration. If there has a method to alteration duration freely among
prosody information, that may used in several fields such as speech
impediment person's pronunciation proof reading or language study.
The pitch alteration method used control prosody altered by PSOLA
synthesis method which is in time domain processing method.
However, the duration of pitch alteration speech is changed by the
frequency domain. In this paper, we altered the duration with the
method of duration alteration by Fast Fourier Transformation in
frequency domain. Consequently, the intelligibility of the pitch and
duration are controlled has a slight decrease than the case when only
pitch is changed, but the proposed algorithm obtained the higher MOS
score about naturalness.
Abstract: Operational risk has become one of the most discussed topics in the financial industry in the recent years. The reasons for this attention can be attributed to higher investments in information systems and technology, the increasing wave of mergers and acquisitions and emergence of new financial instruments. In addition, the New Basel Capital Accord (known as Basel II) demands a capital requirement for operational risk and further motivates financial institutions to more precisely measure and manage this type of risk. The aim of this paper is to shed light on main characteristics of operational risk management and common applied methods: scenario analysis, key risk indicators, risk control self assessment and loss distribution approach.
Abstract: Rural areas of Tanzania are still disadvantaged in terms of diffusion of IP-based services; this is due to lack of Information and Communication Technology (ICT) infrastructures, especially lack of connectivity. One of the limitations for connectivity problems in rural areas of Tanzania is the high cost to establish infrastructures for IP-based services [1-2]. However the cost of connectivity varies from one technology to the other and at the same time, the cost is also different from one operator (service provider) to another within the country. This paper presents development of software system to calculate cost of connectivity to rural areas of Tanzania. The system is developed to make an easy access of connectivity cost from different technologies and different operators. The development of the calculator follows the V-model software development lifecycle. The calculator is used to evaluate the economic viability of different technologies considered as being potential candidates to provide rural connectivity. In this paper, the evaluation is based on the techno-economic analysis approach.
Abstract: As the electrical power industry is restructured, the electrical power exchange is becoming extended. One of the key information used to determine how much power can be transferred through the network is known as available transfer capability (ATC). To calculate ATC, traditional deterministic approach is based on the severest case, but the approach has the complexity of procedure. Therefore, novel approach for ATC calculation is proposed using cost-optimization method in this paper, and is compared with well-being method and risk-benefit method. This paper proposes the optimal transfer capability of HVDC system between mainland and a separated island in Korea through these three methods. These methods will consider production cost, wheeling charge through HVDC system and outage cost with one depth (N-1 contingency)
Abstract: The paper presents an applied study of a multivariate AR(p) process fitted to daily data from U.S. commodity futures markets with the use of Bayesian statistics. In the first part a detailed description of the methods used is given. In the second part two BVAR models are chosen one with assumption of lognormal, the second with normal distribution of prices conditioned on the parameters. For a comparison two simple benchmark models are chosen that are commonly used in todays Financial Mathematics. The article compares the quality of predictions of all the models, tries to find an adequate rate of forgetting of information and questions the validity of Efficient Market Hypothesis in the semi-strong form.
Abstract: In this paper we propose a blind algorithm for peakto- average power ratio (PAPR) reduction in OFDM systems, based on selected mapping (SLM) algorithm as a distortionless method. The main drawback of the conventional SLM technique is the need for transmission of several side information bits, for each data block, which results in loss in data rate transmission. In the proposed method some special number of carriers in the OFDM frame is reserved to be rotated with one of the possible phases according to the number of phase sequence blocks in SLM algorithm. Reserving some limited number of carriers wont effect the reduction in PAPR of OFDM signal. Simulation results show using ML criteria at the receiver will lead to the same system-performance as the conventional SLM algorithm, while there is no need to send any side information to the receiver.
Abstract: A number of mass spectrometry applications are already available as web-based and windows-based systems to calculate isotope pattern and to display the mass spectrum based on the specific molecular formula besides providing necessary information. These applications were evaluated and compared with our new alternative application called Theoretical Isotope Generator (TIG) in terms of its functionality and features provided to prove this new application is working better and performing well. TIG provides extra features than others, complete with several functionality such as drawing, normalizing and zooming the generated graph that convey with the molecular information in a number of formats by providing the details of the calculation and molecules. Thus, any chemist, students, lecturers and researchers from anywhere could use TIG to gain related information on molecules and their relative intensity.
Abstract: This hypothesis shows that the induction and the
remanent of magnetic properties govern the mechanism processes of
DNA replication and the shortening of the telomere.
The solenoid–like formation of each parental DNA strand, which
exists at the initial stage of the replication process, enables an electric
charge transformation through the strand to produce a magnetic field.
The magnetic field, in turn, induces the surrounding medium to form
a new (replicated) strand by a remanent magnetisation. Through the
remanent [residual] magnetisation process, the replicated strand
possesses a similar information pattern to that of the parental strand.
In the same process, the remanent amount of magnetisation forms the
medium in which it has less of both repetitive and pattern
magnetisation than that of the parental strand, therefore the replicated
strand shows a shortening in the length of its telomeres.
Abstract: This paper attempts to identify the significance of
Information and Communications Technology (ICT) and
competitiveness to the profit efficiency of commercial banks in
Malaysia. The profit efficiency of commercial banks in Malaysia, the
dependent variable, was estimated using the Stochastic Frontier
Approach (SFA) on a sample of unbalanced panel data, covering 23
commercial banks, between 1995 to 2007. Based on the empirical
results, ICT was not found to exert a significant impact on profit
efficiency, whereas competitiveness, non ICT stock expenditure and
ownership were significant contributors. On the other hand, the size
of banks was found to have significantly reduced profit efficiency,
opening up for various interpretations of the interrelated role of ICT
and competition.
Abstract: A study of various turbulent inflow generation methods
was performed to compare their relative effectiveness for LES
computations of turbulent boundary layers. This study confirmed
the quality of the turbulent information produced by the family of
recycling and rescaling methods which take information from within
the computational domain. Furthermore, more general inflow methods
also proved applicable to such simulations, with a precursor-like
inflow and a random inflow augmented with forcing planes showing
promising results.
Abstract: Wireless LAN (WLAN) access in public hotspot areas
becomes popular in the recent years. Since more and more multimedia
information is available in the Internet, there is an increasing demand
for accessing multimedia information through WLAN hotspots.
Currently, the bandwidth offered by an IEEE 802.11 WLAN cannot
afford many simultaneous real-time video accesses. A possible way to
increase the offered bandwidth in a hotspot is the use of multiple access
points (APs). However, a mobile station is usually connected to the
WLAN AP with the strongest received signal strength indicator (RSSI).
The total consumed bandwidth cannot be fairly allocated among those
APs. In this paper, we will propose an effective load-balancing scheme
via the support of the IAPP and SNMP in APs. The proposed scheme is
an open solution and doesn-t need any changes in both wireless stations
and APs. This makes load balancing possible in WLAN hotspots,
where a variety of heterogeneous mobile devices are employed.
Abstract: The majority of today's IR systems base the IR task on two main processes: indexing and searching. There exists a special group of dynamic IR systems where both processes (indexing and searching) happen simultaneously; such a system discards obsolete information, simultaneously dealing with the insertion of new in¬formation, while still answering user queries. In these dynamic, time critical text document databases, it is often important to modify index structures quickly, as documents arrive. This paper presents a method for dynamization which may be used for this task. Experimental results show that the dynamization process is possible and that it guarantees the response time for the query operation and index actualization.
Abstract: This paper studies, maps and explains the interactions between downloaders and uploaders pertaining to the Internet film piracy. This study also covers several motivational factors that influence users to upload or download movies, and thus to engage in film piracy over the Internet. The essay also proposes a model that describes user behavior including their relationships and influences. Moreover, proposed theoretical interactions and motivational factors are applied to the real world scenario, using examples of a data storage webpage server Ulozto.net and webpage Piratebay.org gathering information about downloadable BitTorrents. Moreover, the theory is further supported by description of behavior of real Internet uploaders.
Abstract: Modernizing legacy applications is the key issue facing IT managers today because there's enormous pressure on organizations to change the way they run their business to meet the new requirements. The importance of software maintenance and reengineering is forever increasing. Understanding the architecture of existing legacy applications is the most critical issue for maintenance and reengineering. The artifacts recovery can be facilitated with different recovery approaches, methods and tools. The existing methods provide static and dynamic set of techniques for extracting architectural information, but are not suitable for all users in different domains. This paper presents a simple and lightweight pattern extraction technique to extract different artifacts from legacy systems using regular expression pattern specifications with multiple language support. We used our custom-built tool DRT to recover artifacts from existing system at different levels of abstractions. In order to evaluate our approach a case study is conducted.