The Malacca Empire: Sayings of Prophet Muhammad in Sulalat Al-Salatin

In the fifteenth century, the Malacca Empire emerged as the centre of Islamic civilization in the Malay Archipelago. The history had been recorded in Sulalat Al-Salatin, an important literary source about the genealogy of all Kings in Malacca. The objective of this study was to analyze the understanding of sayings from Prophet Muhammad among Malays in Malacca during the fifteenth century through all of the hadith quoted in Sulalat Al-Salatin. This study used content analysis methodology to validate the sayings where all of them were critically analyzed and compared with the classical hadith sources from prominent Muslim scholars. As a result, only two out of the four quotations were considered as authentic sayings of Prophet Muhammad. This study also showed the importance of the palace as the centre of the Islamic education system and the role played by Muslim preachers from outside of Malacca to propagate Islam in Malacca.

Modernization, Malay Matrimonial Foodways and the Community Social Bonding

Solidarity and kinship has long been an intangible emblem to Malay community especially in the rural area. It is visibly seen through the dependability among each unit of the community either in religious and social events including the matrimonial or wedding. Nevertheless, the inevitable phenomenon, modernization legitimately alters every facets of human life not only the routines, traditions, rituals, norms but also to the daily activities and the specific occasion. Using triangulation approach of interview and self completed questionnaire this study empirically examine the level of alteration of Malays wedding foodways which relate to the preparation and consumption of it and its impact on the community social bonding. Some meaningful insights were obtained whereby modernization through technology (modern equipments) and social factors (education, migration, and high disposal income) significantly contribute to the alteration of wedding foodways from preparation up to consumption stages. The domino effect of this alteration consequently leads to the fragility of social kinship or somehow reduced cohesiveness and interaction among the individual of Malay society in the rural area.

Securing Justice: A Critical Analysis of Kenya-s Post 9/11 Security Apparatus

The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been slow and needed this catalyst. This special case offered a window of opportunity for many “security conscious" regimes in cementing their legal-criminological and political security apparatus. At the international level, the 9/11 case led to the hasty adoption of Security Council resolution 1373 in 2001, which called upon states to adopt wide-ranging and comprehensive steps and strategies to combat international terrorism and to become parties to the relevant international conventions and protocols relating to terrorism. Since then, Kenya has responded with speed in devising social-legal-criminological-political actions.

Instability of Soliton Solutions to the Schamel-nonlinear Schrödinger Equation

A variational method is used to obtain the growth rate of a transverse long-wavelength perturbation applied to the soliton solution of a nonlinear Schr¨odinger equation with a three-half order potential. We demonstrate numerically that this unstable perturbed soliton will eventually transform into a cylindrical soliton.

Representation of Coloured Petri Net in Abductive Logic Programming (CPN-LP) and Its Application in Modeling an Intelligent Agent

Coloured Petri net (CPN) has been widely adopted in various areas in Computer Science, including protocol specification, performance evaluation, distributed systems and coordination in multi-agent systems. It provides a graphical representation of a system and has a strong mathematical foundation for proving various properties. This paper proposes a novel representation of a coloured Petri net using an extension of logic programming called abductive logic programming (ALP), which is purely based on classical logic. Under such a representation, an implementation of a CPN could be directly obtained, in which every inference step could be treated as a kind of equivalence preserved transformation. We would describe how to implement a CPN under such a representation using common meta-programming techniques in Prolog. We call our framework CPN-LP and illustrate its applications in modeling an intelligent agent.

Study about the Development of Small Towns in the Metropolitan Fringe in Developed Area of China–A Case Study of Sandun Town in Hangzhou

Due to the Rapid Urbanization in China, the influence of metropolises to surrounding areas grows by a tremendous speed in developed region. One of the most obvious influences is the expansion of the urban built-up areas which covers the land belongs to small towns. Around metropolitan fringe, the boundary between city and village becomes more and more obscure. So being the most sensitive area, the small towns on the fringe of metropolises have the special meaning on the research into the small towns- development. This paper chooses Sandun Town in Hangzhou of Zhejiang Province as an example, emphatically focus on aspects such as the central area proliferation, the industrial shift, the position effect, the subway effect and the commercial development, reviews a few problems of small towns in the future and the important problems in their planning by the analysis of the characteristics of the present conditions and the developing motive mechanism, so that guides small towns to develop properly by liking with these small towns and center metropolises.

Weight Functions for Signal Reconstruction Based On Level Crossings

Although the level crossing concept has been the subject of intensive investigation over the last few years, certain problems of great interest remain unsolved. One of these concern is distribution of threshold levels. This paper presents a new threshold level allocation schemes for level crossing based on nonuniform sampling. Intuitively, it is more reasonable if the information rich regions of the signal are sampled finer and those with sparse information are sampled coarser. To achieve this objective, we propose non-linear quantization functions which dynamically assign the number of quantization levels depending on the importance of the given amplitude range. Two new approaches to determine the importance of the given amplitude segment are presented. The proposed methods are based on exponential and logarithmic functions. Various aspects of proposed techniques are discussed and experimentally validated. Its efficacy is investigated by comparison with uniform sampling.

A Parametric Study on Lateral Torsional Buckling of European IPN and IPE Cantilevers

IPN and IPE sections, which are commonly used European I shapes, are widely used in steel structures as cantilever beams to support overhangs. A considerable number of studies exist on calculating lateral torsional buckling load of I sections. However, most of them provide series solutions or complex closed-form equations. In this paper, a simple equation is presented to calculate lateral torsional buckling load of IPN and IPE section cantilever beams. First, differential equation of lateral torsional buckling is solved numerically for various loading cases. Then a parametric study is conducted on results to present an equation for lateral torsional buckling load of European IPN and IPE beams. Finally, results obtained by presented equation are compared to differential equation solutions and finite element model results. ABAQUS software is utilized to generate finite element models of beams. It is seen that the results obtained from presented equation coincide with differential equation solutions and ABAQUS software results. It can be suggested that presented formula can be safely used to calculate critical lateral torsional buckling load of European IPN and IPE section cantilevers.

Towards Clustering of Web-based Document Structures

Methods for organizing web data into groups in order to analyze web-based hypertext data and facilitate data availability are very important in terms of the number of documents available online. Thereby, the task of clustering web-based document structures has many applications, e.g., improving information retrieval on the web, better understanding of user navigation behavior, improving web users requests servicing, and increasing web information accessibility. In this paper we investigate a new approach for clustering web-based hypertexts on the basis of their graph structures. The hypertexts will be represented as so called generalized trees which are more general than usual directed rooted trees, e.g., DOM-Trees. As a important preprocessing step we measure the structural similarity between the generalized trees on the basis of a similarity measure d. Then, we apply agglomerative clustering to the obtained similarity matrix in order to create clusters of hypertext graph patterns representing navigation structures. In the present paper we will run our approach on a data set of hypertext structures and obtain good results in Web Structure Mining. Furthermore we outline the application of our approach in Web Usage Mining as future work.

Neuro-Hybrid Models for Automotive System Identification

In automotive systems almost all steps concerning the calibration of several control systems, e.g., low idle governor or boost pressure governor, are made with the vehicle because the timeto- production and cost requirements on the projects do not allow for the vehicle analysis necessary to build reliable models. Here is presented a procedure using parametric and NN (neural network) models that enables the generation of vehicle system models based on normal ECU engine control unit) vehicle measurements. These models are locally valid and permit pre and follow-up calibrations so that, only the final calibrations have to be done with the vehicle.

Post Mining- Discovering Valid Rules from Different Sized Data Sources

A big organization may have multiple branches spread across different locations. Processing of data from these branches becomes a huge task when innumerable transactions take place. Also, branches may be reluctant to forward their data for centralized processing but are ready to pass their association rules. Local mining may also generate a large amount of rules. Further, it is not practically possible for all local data sources to be of the same size. A model is proposed for discovering valid rules from different sized data sources where the valid rules are high weighted rules. These rules can be obtained from the high frequency rules generated from each of the data sources. A data source selection procedure is considered in order to efficiently synthesize rules. Support Equalization is another method proposed which focuses on eliminating low frequency rules at the local sites itself thus reducing the rules by a significant amount.

M-Learning Curriculum Design for Secondary School: A Needs Analysis

The learning society has currently transformed from 'wired society' to become 'mobile society' which is facilitated by wireless network. To suit to this new paradigm, m-learning was given birth and rapidly building its prospect to be included in the future curriculum. Research and studies on m-learning spruced up in numerous aspects but there is still scarcity in studies on curriculum design of m-learning. This study is a part of an ongoing bigger study probing into the m-learning curriculum for secondary schools. The paper reports on the first phase of the study which aims to probe into the needs of curriculum design for m-learning at the secondary school level and the researcher adopted the needs analysis method. Data accrued from responses on survey questionnaires based on Lickert-point scale were analyzed statistically. The findings from this preliminary study serve as a basis for m-learning curriculum development for secondary schools.

Member Investment Willingness in Agricultural Cooperatives in Shaanxi (China)

This study analyzes characteristics determining member’s willingness to invest in cooperatives using ordered logit model. The data were collected in a field survey among 122 cooperative members in north-central China. The descriptive analysis of survey evidence suggests that cooperatives in China generally having poor ability to deliver the processing services related to product package, grading, and storage, performing worse in profitability, inability of providing returns to capital and obtaining agricultural loan. The regression results demonstrate that members’ farm size, their satisfaction with cooperative price preferential services, attitudes toward cooperative operational scale and development potential have statistically significant impact on willingness to invest.

Effect of Derating Factors on Photovoltaics under Climatic Conditions of Istanbul

As known that efficiency of photovoltaic cells is not high as desired level. Efficiency of PVs could be improved by selecting convenient locations that have high solar irradiation, sunshine duration, mild temperature, low level air pollution and dust concentration. Additionally, some environmental parameters called derating factors effect to decrease PV efficiencies such as cloud, high temperature, aerosol optical depth, high dust concentration, shadow, snow, humidity etc. In this paper, all parameters that effect PV efficiency are considered in detail under climatic conditions of Istanbul. A 750 Wp PV system with measurement devices is constructed in Maslak campus of Istanbul Technical University.

Unconditionally Secure Quantum Payment System

A potentially serious problem with current payment systems is that their underlying hard problems from number theory may be solved by either a quantum computer or unanticipated future advances in algorithms and hardware. A new quantum payment system is proposed in this paper. The suggested system makes use of fundamental principles of quantum mechanics to ensure the unconditional security without prior arrangements between customers and vendors. More specifically, the new system uses Greenberger-Home-Zeilinger (GHZ) states and Quantum Key Distribution to authenticate the vendors and guarantee the transaction integrity.

Factors of Vocational Identity for Social Welfare University Students in Japan

The study aimed to verify a hypothesis that a sense of fulfillment in student life and perceived stress in training in the facilities could affect vocational identity among social welfare university students, in order to acquire implications for enhancing the vocational consciousness. A questionnaire survey was conducted with 388 third- and fourth-year students of training course for certified social workers in three universities in A prefecture in Japan. The questionnaire was returned by 338 students, and 288 responses (85.2%) were valid and used for the analysis. As a SEM result, the hypothesized model proved to be fit to the data. Path coefficient of sense of fulfillment of student life to vocational identity was statistically positive. Path coefficient of training stress to vocational identity was statistically negative.

Cytotaxonomy and Morphology of Chironomid Larvae (Diptera, Chironomidae) in Armenia

In the study of chironomids in Armenia several species of Orthocladiinae subfamily of Cricotopus genus, Diamesinae subfamily of Diamesa genus, and Chironominae subfamily of Chironomus genus, have been identified. In the Cricotopus genus two sibling species were found, not distinguishable by larval morphological features, but clearly distinct cytogenetically.

Multi-agent On-line Monitor for the Safety of Critical Systems

Operational safety of critical systems, such as nuclear power plants, industrial chemical processes and means of transportation, is a major concern for system engineers and operators. A means to assure that is on-line safety monitors that deliver three safety tasks; fault detection and diagnosis, alarm annunciation and fault controlling. While current monitors deliver these tasks, benefits and limitations in their approaches have at the same time been highlighted. Drawing from those benefits, this paper develops a distributed monitor based on semi-independent agents, i.e. a multiagent system, and monitoring knowledge derived from a safety assessment model of the monitored system. Agents are deployed hierarchically and provided with knowledge portions and collaboration protocols to reason and integrate over the operational conditions of the components of the monitored system. The monitor aims to address limitations arising from the large-scale, complicated behaviour and distributed nature of monitored systems and deliver the aforementioned three monitoring tasks effectively.

Flexible Manufacturing System

Flexible manufacturing system is a system that is able to respond to changed conditions. In general, this flexibility is divided into two key categories and several subcategories. The first category is the so called machine flexibility which enables to make various products by the given machinery. The second category is routing flexibility enabling to execute the same operation by various machines. Flexible manufacturing systems usually consist of three main parts: CNC machine tools, transport system and control system. A higher level of flexible manufacturing systems is represented by the so called intelligent manufacturing systems.

Trust Based Energy Aware Reliable Reactive Protocol in Mobile Ad Hoc Networks

Trust and Energy consumption is the most challenging issue in routing protocol design for Mobile ad hoc networks (MANETs), since mobile nodes are battery powered and nodes behaviour are unpredictable. Furthermore replacing and recharging batteries and making nodes co-operative is often impossible in critical environments like military applications. In this paper, we propose a trust based energy aware routing model in MANET. During route discovery, node with more trust and maximum energy capacity is selected as a router based on a parameter called 'Reliability'. Route request from the source is accepted by a node only if its reliability is high. Otherwise, the route request is discarded. This approach forms a reliable route from source to destination thus increasing network life time, improving energy utilization and decreasing number of packet loss during transmission.