Abstract: Random Access Memory (RAM) is an important
device in computer system. It can represent the snapshot on how the
computer has been used by the user. With the growth of its
importance, the computer memory has been an issue that has been
discussed in digital forensics. A number of tools have been developed
to retrieve the information from the memory. However, most of the
tools have their limitation in the ability of retrieving the important
information from the computer memory. Hence, this paper is aimed
to discuss the limitation and the setback for two main techniques such
as process signature search and process enumeration. Then, a new
hybrid approach will be presented to minimize the setback in both
individual techniques. This new approach combines both techniques
with the purpose to retrieve the information from the process block
and other objects in the computer memory. Nevertheless, the basic
theory in address translation for x86 platforms will be demonstrated
in this paper.
Abstract: Operational safety of critical systems, such as nuclear power plants, industrial chemical processes and means of transportation, is a major concern for system engineers and operators. A means to assure that is on-line safety monitors that deliver three safety tasks; fault detection and diagnosis, alarm annunciation and fault controlling. While current monitors deliver these tasks, benefits and limitations in their approaches have at the same time been highlighted. Drawing from those benefits, this paper develops a distributed monitor based on semi-independent agents, i.e. a multiagent system, and monitoring knowledge derived from a safety assessment model of the monitored system. Agents are deployed hierarchically and provided with knowledge portions and collaboration protocols to reason and integrate over the operational conditions of the components of the monitored system. The monitor aims to address limitations arising from the large-scale, complicated behaviour and distributed nature of monitored systems and deliver the aforementioned three monitoring tasks effectively.
Abstract: Most standard software development methodologies
are often not applied to software projects in many developing
countries of the world. The approach generally practice is close to
what eXtreme Programming (XP) is likely promoting, just keep
coding and testing as the requirement evolves. XP is an agile
software process development methodology that has inherent
capability for improving efficiency of Business Software
Development (BSD). XP can facilitate Business-to-Development
(B2D) relationship due to its customer-oriented advocate. From
practitioner point of view, we applied XP to BSD and result shows
that customer involvement has positive impact on productivity, but
can as well frustrate the success of the project. In an effort to
promote software engineering practice in developing countries of
Africa, we present the experiment performed, lessons learned,
problems encountered and solution adopted in applying XP
methodology to BSD.
Abstract: This paper presents a conceptual model of agreement
options on negotiation support for civil engineering decision. The
negotiation support facilitates the solving of group choice decision
making problems in civil engineering decision to reduce the impact
of mud volcano disaster in Sidoarjo, Indonesia. The approach based
on application of analytical hierarchy process (AHP) method for
multi criteria decision on three level of decision hierarchy.
Decisions for reducing impact is very complicated since many
parties involved in a critical time. Where a number of stakeholders
are involved in choosing a single alternative from a set of solution
alternatives, there are different concern caused by differing
stakeholder preferences, experiences, and background. Therefore, a
group choice decision support is required to enable each stakeholder
to evaluate and rank the solution alternatives before engaging into
negotiation with the other stakeholders. Such civil engineering
solutions as alternatives are referred to as agreement options that are
determined by identifying the possible stakeholder choice, followed
by determining the optimal solution for each group of stakeholder.
Determination of the optimal solution is based on a game theory
model of n-person general sum game with complete information that
involves forming coalitions among stakeholders.
Abstract: Trust and Energy consumption is the most challenging
issue in routing protocol design for Mobile ad hoc networks
(MANETs), since mobile nodes are battery powered and nodes
behaviour are unpredictable. Furthermore replacing and recharging
batteries and making nodes co-operative is often impossible in
critical environments like military applications. In this paper, we
propose a trust based energy aware routing model in MANET.
During route discovery, node with more trust and maximum energy
capacity is selected as a router based on a parameter called
'Reliability'. Route request from the source is accepted by a node
only if its reliability is high. Otherwise, the route request is
discarded. This approach forms a reliable route from source to
destination thus increasing network life time, improving energy
utilization and decreasing number of packet loss during transmission.
Abstract: A model-free robust control (MFRC) approach is proposed for position control of robot manipulators in the state space. The control approach is verified analytically to be robust subject to uncertainties including external disturbances, unmodeled dynamics, and parametric uncertainties. There is a high flexibility to work on different systems including actuators by the use of the proposed control approach. The proposed control approach can guarantee the robustness of control system. A PUMA 560 robot driven by geared permanent magnet dc motors is simulated. The simulation results show a satisfactory performance for control system under technical specifications. KeywordsModel-free, robust control, position control, PUMA 560.
Abstract: Manufacturing tolerancing is intended to determine
the intermediate geometrical and dimensional states of the part
during its manufacturing process. These manufacturing dimensions
also serve to satisfy not only the functional requirements given in
the definition drawing, but also the manufacturing constraints, for
example geometrical defects of the machine, vibration and the
wear of the cutting tool. In this paper, an experimental study on the
influence of the wear of the cutting tool (systematic dispersions) is
explored. This study was carried out on three stages .The first stage
allows machining without elimination of dispersions (random,
systematic) so the tolerances of manufacture according to total
dispersions. In the second stage, the results of the first stage are
filtered in such way to obtain the tolerances according to random
dispersions. Finally, from the two previous stages, the systematic
dispersions are generated. The objective of this study is to model
by the least squares method the error of manufacture based on
systematic dispersion. Finally, an approach of optimization of the
manufacturing tolerances was developed for machining on a CNC
machine tool
Abstract: The majority of micro-entrepreneurs in Malaysia
operate very small-scaled business activities such as food stalls,
burger stalls, night market hawkers, grocery stores, constructions,
rubber and oil palm small holders, and other agro-based services and
activities. Why are they venturing into entrepreneurship - is it for
survival, out of interest or due to encouragement and assistance from
the local government? And why is it that some micro-entrepreneurs
are lagging behind in entrepreneurship, and what do they need to
rectify this situation so that they are able to progress further?
Furthermore, what are the skills that the micro entrepreneurs should
developed to transform them into successful micro-enterprises and
become small and medium-sized enterprises (SME)? This paper
proposes a 7-Step approach that can serve as a basis for identification
of critical entrepreneurial success factors that enable policy makers,
practitioners, consultants, training managers and other agencies in
developing tools to assist micro business owners. This paper also
highlights the experience of one of the successful companies in
Malaysia that has transformed from micro-enterprise to become a
large organization in less than 10 years.
Abstract: Performance of a dual maximal ratio combining
receiver has been analyzed for M-ary coherent and non-coherent
modulations over correlated Nakagami-m fading channels with nonidentical
and arbitrary fading parameter. The classical probability
density function (PDF) based approach is used for analysis.
Expressions for outage probability and average symbol error
performance for M-ary coherent and non-coherent modulations have
been obtained. The obtained results are verified against the special
case published results and found to be matching. The effect of the
unequal fading parameters, branch correlation and unequal input
average SNR on the receiver performance has been studied.
Abstract: Recent widespread use of information and
communication technology has greatly changed information security
risks that businesses and institutions encounter. Along with this
situation, in order to ensure security and have confidence in electronic
trading, it has become important for organizations to take competent
information security measures to provide international confidence that
sensitive information is secure. Against this backdrop, the approach to
information security checking has come to an important issue, which
is believed to be common to all countries. The purpose of this paper is
to introduce the new system of information security checking program
in Korea and to propose synthetic information security
countermeasures under domestic circumstances in order to protect
physical equipment, security management and technology, and the
operation of security check for securing services on ISP(Internet
Service Provider), IDC(Internet Data Center), and
e-commerce(shopping malls, etc.)
Abstract: Model mapping and transformation are important processes in high level system abstractions, and form the cornerstone of model-driven architecture (MDA) techniques. Considerable research in this field has devoted attention to static system abstraction, despite the fact that most systems are dynamic with high frequency changes in behavior. In this paper we provide an overview of work that has been done with regard to behavior model mapping and transformation, based on: (1) the completeness of the platform independent model (PIM); (2) semantics of behavioral models; (3) languages supporting behavior model transformation processes; and (4) an evaluation of model composition to effect the best approach to describing large systems with high complexity.
Abstract: This paper presents a particle swarm optimization
(PSO) based approach for multiple object tracking based on histogram
matching. To start with, gray-level histograms are calculated to
establish a feature model for each of the target object. The difference
between the gray-level histogram corresponding to each particle in the
search space and the target object is used as the fitness value. Multiple
swarms are created depending on the number of the target objects
under tracking. Because of the efficiency and simplicity of the PSO
algorithm for global optimization, target objects can be tracked as
iterations continue. Experimental results confirm that the proposed
PSO algorithm can rapidly converge, allowing real-time tracking of
each target object. When the objects being tracked move outside the
tracking range, global search capability of the PSO resumes to re-trace
the target objects.
Abstract: Resource Discovery in Grids is critical for efficient
resource allocation and management. Heterogeneous nature and
dynamic availability of resources make resource discovery a
challenging task. As numbers of nodes are increasing from tens to
thousands, scalability is essentially desired. Peer-to-Peer (P2P)
techniques, on the other hand, provide effective implementation of
scalable services and applications. In this paper we propose a model
for resource discovery in Condor Middleware by using the four axis
framework defined in P2P approach. The proposed model enhances
Condor to incorporate functionality of a P2P system, thus aim to
make Condor more scalable, flexible, reliable and robust.
Abstract: This paper presents the use of a semi-classical signal
analysis method that has been developed recently for the analysis of
turbomachinery flow unsteadiness. We will focus on the correlation
between theSemi-Classical Signal Analysis parameters and some
physical parameters in relation with turbomachinery features. To
demonstrate the potential of the proposed approach, a static pressure
signal issued from a rotor/stator interaction of a centrifugal pump is
studied. Several configurations of the pump are compared.
Abstract: The one of best robust search technique on large scale
search area is heuristic and meta heuristic approaches. Especially in
issue that the exploitation of combinatorial status in the large scale
search area prevents the solution of the problem via classical
calculating methods, so such problems is NP-complete. in this
research, the problem of winner determination in combinatorial
auctions have been formulated and by assessing older heuristic
functions, we solve the problem by using of genetic algorithm and
would show that this new method would result in better performance
in comparison to other heuristic function such as simulated annealing
greedy approach.
Abstract: The proposed Multimedia Pronunciation Learning
Management System (MPLMS) in this study is a technology with
profound potential for inducing improvement in pronunciation
learning. The MPLMS optimizes the digitised phonetic symbols with
the integration of text, sound and mouth movement video. The
components are designed and developed in an online management
system which turns the web to a dynamic user-centric collection of
consistent and timely information for quality sustainable learning.
The aim of this study is to design and develop the MPLMS which
serves as an innovative tool to improve English pronunciation. This
paper discusses the iterative methodology and the three-phase Alessi
and Trollip model in the development of MPLMS. To align with the
flexibility of the development of educational software, the iterative
approach comprises plan, design, develop, evaluate and implement is
followed. To ensure the instructional appropriateness of MPLMS, the
instructional system design (ISD) model of Alessi and Trollip serves
as a platform to guide the important instructional factors and process.
It is expected that the results of future empirical research will support
the efficacy of MPLMS and its place as the premier pronunciation
learning system.
Abstract: In this paper, a new adaptive Fourier decomposition
(AFD) based time-frequency speech analysis approach is proposed.
Given the fact that the fundamental frequency of speech signals often
undergo fluctuation, the classical short-time Fourier transform (STFT)
based spectrogram analysis suffers from the difficulty of window size
selection. AFD is a newly developed signal decomposition theory. It is
designed to deal with time-varying non-stationary signals. Its
outstanding characteristic is to provide instantaneous frequency for
each decomposed component, so the time-frequency analysis becomes
easier. Experiments are conducted based on the sample sentence in
TIMIT Acoustic-Phonetic Continuous Speech Corpus. The results
show that the AFD based time-frequency distribution outperforms the
STFT based one.
Abstract: The business strategy of any company wanting to be
competitive on the market should be designed around the concept of
intangibles, with an increasingly decisive role in knowledge transfer
of the biggest corporations. Advancing the research in these areas,
this study integrates the two approaches, emphasizing the
relationships between the components of intellectual capital and
corporate social responsibility. The three dimensions of intellectual
capital in terms of sustainability requirements are debated. The paper
introduces the concept of sustainable intellectual capital and debates
it within an assessment model designed on the base of key
performance indicators. The results refer to the assessment of
possible ways for including the information on intellectual capital
and corporate responsibility within the corporate strategy. The
conclusions enhance the need for companies to be ready to support
the integration of this type of information the knowledge transfer
process, in order to develop competitive advantage on the market.
Abstract: Fault-proneness of a software module is the
probability that the module contains faults. To predict faultproneness
of modules different techniques have been proposed which
includes statistical methods, machine learning techniques, neural
network techniques and clustering techniques. The aim of proposed
study is to explore whether metrics available in the early lifecycle
(i.e. requirement metrics), metrics available in the late lifecycle (i.e.
code metrics) and metrics available in the early lifecycle (i.e.
requirement metrics) combined with metrics available in the late
lifecycle (i.e. code metrics) can be used to identify fault prone
modules using Genetic Algorithm technique. This approach has been
tested with real time defect C Programming language datasets of
NASA software projects. The results show that the fusion of
requirement and code metric is the best prediction model for
detecting the faults as compared with commonly used code based
model.
Abstract: Disposal of health-care waste (HCW) is considered as
an important environmental problem especially in large cities.
Multiple criteria decision making (MCDM) techniques are apt to deal
with quantitative and qualitative considerations of the health-care
waste management (HCWM) problems. This research proposes a
fuzzy multi-criteria group decision making approach with a multilevel
hierarchical structure including qualitative as well as
quantitative performance attributes for evaluating HCW disposal
alternatives for Istanbul. Using the entropy weighting method,
objective weights as well as subjective weights are taken into account
to determine the importance weighting of quantitative performance
attributes. The results obtained using the proposed methodology are
thoroughly analyzed.