Abstract: The focus of this paper is to highlight the design and
development of an educational game prototype as an evaluation
instrument for the Malaysia driving license static test. This
educational game brings gaming technology into the conventional
objective static test to make it more effective, real and interesting.
From the feeling of realistic, the future driver can learn something,
memorized and use it in the real life. The current online objective
static test only make the user memorized the answer without knowing
and understand the true purpose of the question. Therefore, in real
life, they will not behave as expected due to behavior and moral
lacking. This prototype has been developed inform of multiple-choice
questions integrated with 3D gaming environment to make it simulate
the real environment and scenarios. Based on the testing conducted,
the respondent agrees with the use of this game prototype it can
increase understanding and promote obligation towards traffic rules.
Abstract: With the development of technology, the growing
trend of fast and safe passenger transport, air pollution, traffic
congestion, increase in problems such as the increasing population
and the high cost of private vehicle usage made many cities around
the world with a population of more or less, start to build rail systems
as a means of urban transport in order to ensure the economic and
environmental sustainability and more efficient use of land in the
city. The implementation phase of rail systems costs much more than
other public transport systems. However, social and economic returns
in the long term made these systems the most popular investment tool
for planned and developing cities.
In our country, the purpose, goals and policies of transportation
plans are away from integrity, and the problems are not clearly
detected. Also, not defined and incomplete assessment of
transportation systems and insufficient financial analysis are the most
important cause of failure. Rail systems and other transportation
systems to be addressed as a whole is seen as the main factor in
increasing efficiency in applications that are not integrated yet in our
country to come to this point has led to the problem.
Abstract: There is a complex situation on the transport environment in the cities of the world. For the analysis and prevention of environmental problems an accurate calculation hazardous substances concentrations at each point of the investigated area is required. In the turbulent atmosphere of the city the wellknown methods of mathematical statistics for these tasks cannot be applied with a satisfactory level of accuracy. Therefore, to solve this class of problems apparatus of mathematical physics is more appropriate. In such models, because of the difficulty as a rule the influence of uneven land surface on streams of air masses in the turbulent atmosphere of the city are not taken into account. In this paper the influence of the surface roughness, which can be quite large, is mathematically shown. The analysis of this problem under certain conditions identified the possibility of areas appearing in the atmosphere with pressure tending to infinity, i.e. so-called "wall effect".
Abstract: This research paper presents a framework on how to
build up malware dataset.Many researchers took longer time to
clean the dataset from any noise or to transform the dataset into a
format that can be used straight away for testing. Therefore, this
research is proposing a framework to help researchers to speed up
the malware dataset cleaningprocesses which later can be used for
testing. It is believed, an efficient malware dataset cleaning
processes, can improved the quality of the data, thus help to improve
the accuracy and the efficiency of the subsequent analysis. Apart
from that, an in-depth understanding of the malware taxonomy is
also important prior and during the dataset cleaning processes. A
new Trojan classification has been proposed to complement this
framework.This experiment has been conducted in a controlled lab
environment and using the dataset from VxHeavens dataset. This
framework is built based on the integration of static and dynamic
analyses, incident response method and knowledge database
discovery (KDD) processes.This framework can be used as the basis
guideline for malware researchers in building malware dataset.
Abstract: There are many issues that affect modeling and designing real-time databases. One of those issues is maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes. The need to improve the scalability is another important issue. In this paper, we present a general framework to design a replicated real-time database for small to medium scale systems and maintain all timing constrains. In order to extend the idea for modeling a large scale database, we present a general outline that consider improving the scalability by using an existing static segmentation algorithm applied on the whole database, with the intent to lower the degree of replication, enables segments to have individual degrees of replication with the purpose of avoiding excessive resource usage, which all together contribute in solving the scalability problem for DRTDBS.
Abstract: The purpose of determining impact significance is to
place value on impacts. Environmental impact assessment review is a
process that judges whether impact significance is acceptable or not in
accordance with the scientific facts regarding environmental,
ecological and socio-economical impacts described in environmental
impact statements (EIS) or environmental impact assessment reports
(EIAR). The first aim of this paper is to summarize the criteria of
significance evaluation from the past review results and accordingly
utilize fuzzy logic to incorporate these criteria into scientific facts. The
second aim is to employ data mining technique to construct an EIS or
EIAR prediction model for reviewing results which can assist
developers to prepare and revise better environmental management
plans in advance. The validity of the previous prediction model
proposed by authors in 2009 is 92.7%. The enhanced validity in this
study can attain 100.0%.
Abstract: In this paper, a vision based system has been used for
controlling an industrial 3P Cartesian robot. The vision system will
recognize the target and control the robot by obtaining images from
environment and processing them. At the first stage, images from
environment are changed to a grayscale mode then it can diverse and
identify objects and noises by using a threshold objects which are
stored in different frames and then the main object will be
recognized. This will control the robot to achieve the target. A vision
system can be an appropriate tool for measuring errors of a robot in a
situation where the experimental test is conducted for a 3P robot.
Finally, the international standard ANSI/RIA R15.05-2 is used for
evaluating the path-related characteristics of the robot. To evaluate
the performance of the proposed method experimental test is carried
out.
Abstract: Sampling and analysis of leachate from Bhalaswa
landfill and groundwater samples from nearby locations, clearly
indicated the likely contamination of groundwater due to landfill
leachate. The results of simulation studies carried out for the
migration of Chloride from landfill shows that the simulation results
are in consonance with the observed concentration of Chloride in the
vicinity of landfill facility. The solid waste disposal system presently
being practiced in Delhi consists of mere dumping of wastes
generated, at three locations Bhalaswa, Ghazipur, and Okhla without
any regard to proper care for the protection of surrounding
environment. Bhalaswa landfill site in Delhi, which is being operated
as a dump site, is expected to become cause of serious groundwater
pollution in its vicinity. The leachate from Bhalaswa landfill was
found to be having a high concentration of chlorides, as well as DOC,
COD. The present study was undertaken to determine the likely
concentrations of principle contaminants in the groundwater over a
period of time due to the discharge of such contaminants from
landfill leachates to the underlying groundwater. The observed
concentration of chlorides in the groundwater within 75m of the
radius of landfill facility was found to be in consonance with the
simulated concentration of chloride in groundwater considering one
dimensional transport model, with finite mass of contaminant source.
Governing equation of contaminant transport involving advection and
diffusion-dispersion was solved in matlab7.0 using finite difference
method.
Abstract: In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.
Abstract: An increasingly dynamic and complex environment poses huge challenges to production enterprises, especially with regards to logistics. The Logistic Operating Curve Theory, developed at the Institute of Production Systems and Logistics (IFA) of the Leibniz University of Hanover, is a recognized approach to describing logistic interactions, nevertheless, it reaches its limits when it comes to the dynamic aspects. In order to facilitate a timely and optimal Logistic Positioning a method is developed for quickly and reliably identifying dynamic processing states.
Abstract: Increasing concerns over climate change have limited
the liberal usage of available energy technology options. India faces
a formidable challenge to meet its energy needs and provide adequate
energy of desired quality in various forms to users in sustainable
manner at reasonable costs. In this paper, work carried out with an
objective to study the role of various energy technology options
under different scenarios namely base line scenario, high nuclear
scenario, high renewable scenario, low growth and high growth rate
scenario. The study has been carried out using Model for Energy
Supply Strategy Alternatives and their General Environmental
Impacts (MESSAGE) model which evaluates the alternative energy
supply strategies with user defined constraints on fuel availability,
environmental regulations etc. The projected electricity demand, at
the end of study period i.e. 2035 is 500490 MWYr. The model
predicted the share of the demand by Thermal: 428170 MWYr,
Hydro: 40320 MWYr, Nuclear: 14000 MWYr, Wind: 18000 MWYr
in the base line scenario. Coal remains the dominant fuel for
production of electricity during the study period. However, the
import dependency of coal increased during the study period. In
baseline scenario the cumulative carbon dioxide emissions upto 2035
are about 11,000 million tones of CO2. In the scenario of high nuclear
capacity the carbon dioxide emissions reduced by 10 % when nuclear
energy share increased to 9 % compared to 3 % in baseline scenario.
Similarly aggressive use of renewables reduces 4 % of carbon
dioxide emissions.
Abstract: In the way of growing and developing firms especially
high-tech firms, on many occasions manager of firm is mainly involved in solving problems of his business and decision making about executive activities of the firm, while besides executive
measures, attention to planning of firm's success and growth way and
application of long experience and sagacity in designing business model are vital and necessary success in a business is achieved as a
result of different factors, one of the most important of them is designing and performing an optimal business model at the beginning
of the firm's work. This model is determining the limit of profitability
achieved by innovation and gained value added. Therefore, business
model is the process of connecting innovation environment and
technology with economic environment and business and is important
for succeeding modern businesses considering their traits.
Abstract: This study applied the Theory of Planned Behavior
model in predicting dietary behavior among Type 2 diabetics in a
Kenyan environment. The study was conducted for three months
within the diabetic clinic at Kisii Hospital in Nyanza Province in
Kenya and adopted sequential mixed methods design combing both
qualitative and quantitative phases. Qualitative data was analyzed
using grounded theory analysis method. Structural equation modeling
using maximum likelihood was used to analyze quantitative data.
The results based on the common fit indices revealed that the theory
of planned behavior fitted the data acceptably well among the Type 2
diabetes and within dietary behavior {χ2 = 223.3, df = 77, p = .02,
χ2/df = 2.9, n=237; TLI = .93; CFI =.91; RMSEA (90CI) = .090(.039,
.146)}. This implies that the Theory of Planned Behavior holds and
forms a framework for promoting dietary practice among Type 2
diabetics.
Abstract: Nowadays, web-based technologies influence in
people-s daily life such as in education, business and others.
Therefore, many web developers are too eager to develop their web
applications with fully animation graphics and forgetting its
accessibility to its users. Their purpose is to make their web
applications look impressive. Thus, this paper would highlight on the
usability and accessibility of a voice recognition browser as a tool to
facilitate the visually impaired and blind learners in accessing virtual
learning environment. More specifically, the objectives of the study
are (i) to explore the challenges faced by the visually impaired
learners in accessing virtual learning environment (ii) to determine
the suitable guidelines for developing a voice recognition browser
that is accessible to the visually impaired. Furthermore, this study
was prepared based on an observation conducted with the Malaysian
visually impaired learners. Finally, the result of this study would
underline on the development of an accessible voice recognition
browser for the visually impaired.
Abstract: Owing to the stringent environmental legislations,
CO2 capture and sequestration is one of the viable solutions to reduce
the CO2 emissions from various sources. In this context, Ionic liquids
(ILs) are being investigated as suitable absorption media for CO2
capture. Due to their non-evaporative, non-toxic, and non-corrosive
nature, these ILs have the potential to replace the existing solvents
like aqueous amine solutions for CO2 separation technologies. Thus,
the present work aims at studying the important aspects such as the
interactions of CO2 molecule with different anions (F-, Br-, Cl-, NO3
-,
BF4
-, PF6
-, Tf2N-, and CF3SO3
-) that are commonly used in ILs
through molecular modeling. In this, the minimum energy structures
have been obtained using Ab initio based calculations at MP2
(Moller-Plesset perturbation) level. Results revealed various degrees
of distortion of CO2 molecule (from its linearity) with the anions
studied, most likely due to the Lewis acid-base interactions between
CO2 and anion. Furthermore, binding energies for the anion-CO2
complexes were also calculated. The implication of anion-CO2
interactions to the solubility of CO2 in ionic liquids is also discussed.
Abstract: The purpose of this paper is to investigate the
durability of cement mortar in presence of Rice Husk Ash (RHA).
The strength and durability of mortar with different replacement
level (0%, 10%, 15%, 20%, 25% and 30%) of Ordinary Portland
Cement (OPC) by RHA is investigated here. RHA was
manufactured from an uncontrolled burning process. Test samples
were prepared with river sand of FM 2.73. Samples were kept in
controlled environment up to test time. The results show that
addition of RHA was shown better results for 20% replacement
level than OPC at 90 days. In durability test all samples passed for
20 cycles except 25% and 30% replacement level.
Abstract: At any point of time, a power system operating
condition should be stable, meeting various operational criteria and it
should also be secure in the event of any credible contingency. Present
day power systems are being operated closer to their stability limits
due to economic and environmental constraints. Maintaining a stable
and secure operation of a power system is therefore a very important
and challenging issue. Voltage instability has been given much
attention by power system researchers and planners in recent years,
and is being regarded as one of the major sources of power system
insecurity. Voltage instability phenomena are the ones in which the
receiving end voltage decreases well below its normal value and does
not come back even after setting restoring mechanisms such as VAR
compensators, or continues to oscillate for lack of damping against the
disturbances. Reactive power limit of power system is one of the major
causes of voltage instability. This paper investigates the effects of
coordinated series capacitors (SC) with static VAR compensators
(SVC) on steady-state voltage stability of a power system. Also, the
influence of the presence of series capacitor on static VAR
compensator controller parameters and ratings required to stabilize
load voltages at certain values are highlighted.
Abstract: Space Vector Pulse Width Modulation SVPWM is
one of the most used techniques to generate sinusoidal voltage and
current due to its facility and efficiency with low harmonics
distortion. This algorithm is specially used in power electronic
applications. This paper describes simulation algorithm of SVPWM
& SPWM using MatLab/simulink environment. It also implements a
closed loop three phases DC-AC converter controlling its outputs
voltages amplitude and frequency using MatLab. Also comparison
between SVPWM & SPWM results is given.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set of risks. This research aims to reinforce SC risk management by proposing an integrated approach. SC risks are identified and a risk index classification structure is created. Then we develop a SC risk assessment approach based on the analytic network process (ANP) and the VIKOR methods under the fuzzy environment where the vagueness and subjectivity are handled with linguistic terms parameterized by triangular fuzzy numbers. By using FANP, risks weights are calculated and then inserted to the FVIKOR to rank the SC members and find the most risky partner.