Determinants of Information Security Affecting Adoption of Web-based Integrated Information Systems

The purpose of this paper is to analyze determinants of information security affecting adoption of the Web-based integrated information systems (IIS). We introduced Web-based information systems which are designed to formulate strategic plans for Peruvian government. Theoretical model is proposed to test impact of organizational factors (deterrent efforts and severity; preventive efforts) and individual factors (information security threat; security awareness) on intentions to proactively use the Web-based IIS .Our empirical study results highlight that deterrent efforts and deterrent severity have no significant influence on the proactive use intentions of IIS, whereas, preventive efforts play an important role in proactive use intentions of IIS. Thus, we suggest that organizations need to do preventive efforts by introducing various information security solutions, and try to improve information security awareness while reducing the perceived information security threats.

The Using of Rasch-Model in Validating the Arabic Version of Multiple Intelligence Development Assessment Scale (MIDAS)

This article addresses the procedures to validate the Arabic version of Multiple Intelligence Development Assessment Scale (MIDAS). The content validity was examined based on the experts- judgments on the MIDAS-s items in the Arabic version. The content of eleven items in the Arabic version of MIDAS was modified to match the Arabic context. Then a translation from original English version of MIDAS into Arabic language was performed. The reliability of the Arabic MIDAS was calculated based on test and retest method and found to be 0.85 for the overall MIDAS and for the different subscales ranging between 0.78 - 0.87. The examination of construct validity for the overall Arabic MIDAS and its subscales was established by using Winsteps program version 6 based on Rasch model in order to fit the items into the Arabic context. The findings indicated that, the eight subscales in Arabic version of MIDAS scale have a unidimensionality, and the total number of kept items in the overall scale is 108 items.

Ideological Tendencies of the Teachers about the Causes of Vandalism in Schools and Solution Proposals

Aggression is a behavior that cannot be approved by the society. Vandalism which is aggression towards objects is an action that tends to damage public or personal property. The behaviors that are described as vandalism can often be observed in the schools as well. According to Zwier and Vaughan (1) previous research about the reasons of and precautionary measures for vandalism in schools can be grouped in three tendency categories: conservative, liberal and radical. In this context, the main aim of this study is to discover which ideological tendency of the reasons of school vandalism is adopted by the teachers and what are their physical, environmental, school system and societal solutions for vandalism. A total of 200 teachers participated in this study, and the mean age was 34.20 years (SD = 6.54). The sample was made up of 109 females and 91 males. For the analysis of the data, SPSS 15.00, frequency, percentage, and t-test were used. The research showed that the teachers have tendencies in the order of conservative, liberal and radical for the reasons of vandalism. The research also showed that the teachers do not have any tendency for eliminating vandalism physically and general solutions on the level of society; on the other hand they mostly adopt a conservative tendency in terms of precautions against vandalism in the school system. Second most, they adopt the liberal tendency in terms of precautions against vandalism in the school system. . It is observed that the findings of this study are comparable to the existing literature on the subject. Future studies should be conducted with multiple variants and bigger sampling.

Vision Based Robotic Interception in Industrial Manipulation Tasks

In this paper, a solution is presented for a robotic manipulation problem in industrial settings. The problem is sensing objects on a conveyor belt, identifying the target, planning and tracking an interception trajectory between end effector and the target. Such a problem could be formulated as combining object recognition, tracking and interception. For this purpose, we integrated a vision system to the manipulation system and employed tracking algorithms. The control approach is implemented on a real industrial manipulation setting, which consists of a conveyor belt, objects moving on it, a robotic manipulator, and a visual sensor above the conveyor. The trjectory for robotic interception at a rendezvous point on the conveyor belt is analytically calculated. Test results show that tracking the raget along this trajectory results in interception and grabbing of the target object.

The Relationship between Knowledge Management Strategy and Information Technology Strategy

Recently, a great number of theoretical frameworks have been proposed to develop the linkages between knowledge management (KM) and organizational strategies. However, while there has been much theorizing and case study in the area, validated research models integrating KM and information technology strategies for empirical testing of these theories have been scarce. In this research, we try to develop a research model for explaining the relationship between KM strategy and IT strategy and their effects on performance. Finally, meaningful propositions and conclusions are derived, and suggestions for future research are proposed and discussed.

Application of a New Hybrid Optimization Algorithm on Cluster Analysis

Clustering techniques have received attention in many areas including engineering, medicine, biology and data mining. The purpose of clustering is to group together data points, which are close to one another. The K-means algorithm is one of the most widely used techniques for clustering. However, K-means has two shortcomings: dependency on the initial state and convergence to local optima and global solutions of large problems cannot found with reasonable amount of computation effort. In order to overcome local optima problem lots of studies done in clustering. This paper is presented an efficient hybrid evolutionary optimization algorithm based on combining Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO), called PSO-ACO, for optimally clustering N object into K clusters. The new PSO-ACO algorithm is tested on several data sets, and its performance is compared with those of ACO, PSO and K-means clustering. The simulation results show that the proposed evolutionary optimization algorithm is robust and suitable for handing data clustering.

Determination of Sequential Best Replies in N-player Games by Genetic Algorithms

An iterative algorithm is proposed and tested in Cournot Game models, which is based on the convergence of sequential best responses and the utilization of a genetic algorithm for determining each player-s best response to a given strategy profile of its opponents. An extra outer loop is used, to address the problem of finite accuracy, which is inherent in genetic algorithms, since the set of feasible values in such an algorithm is finite. The algorithm is tested in five Cournot models, three of which have convergent best replies sequence, one with divergent sequential best replies and one with “local NE traps"[14], where classical local search algorithms fail to identify the Nash Equilibrium. After a series of simulations, we conclude that the algorithm proposed converges to the Nash Equilibrium, with any level of accuracy needed, in all but the case where the sequential best replies process diverges.

Effects of a Recreational Workout Program on Task-Analyzed Exercise Performance of Adults with Severe Cognitive Impairments

The purpose of this study was to investigate the effectiveness of a recreational workout program for adults with disabilities over two semesters. This investigation was an action study conducted in a naturalistic setting. Participants included equal numbers of adults with severe cognitive impairments (n = 35) and adults without disabilities (n = 35). Adults with disabilities severe cognitive impairments were trained 6 self-initiated workout activities over two semesters by adults without disabilities. The numbers of task-analyzed steps of each activity performed correctly by each participant at the first and last weeks of each semester were used for data analysis. Results of the paired t-tests indicate that across two semesters, significant differences between the first and last weeks were found on 4 out of the 6 task-analyzed workout activities at a statistical level of significance p < .05. The recreational workout program developed in this study was effective.

Applications of Conic Optimization and Quadratic Programming in the Investigation of Index Arbitrage in the Thai Derivatives and Equity Markets

This research seeks to investigate the frequency and profitability of index arbitrage opportunities involving the SET50 futures, SET50 component stocks, and the ThaiDEX SET50 ETF (ticker symbol: TDEX). In particular, the frequency and profit of arbitrage are measured in the following three arbitrage tests: (1) SET50 futures vs. ThaiDEX SET50 ETF, (2) SET50 futures vs. SET50 component stocks, and (3) ThaiDEX SET50 ETF vs. SET50 component stocks are investigated. For tests (2) and (3), the problems involve conic optimization and quadratic programming as subproblems. This research is first to apply conic optimization and quadratic programming techniques in the context of index arbitrage and is first to investigate such index arbitrage in the Thai equity and derivatives markets. Thus, the contribution of this study is twofold. First, its results would help understand the contribution of the derivatives securities to the efficiency of the Thai markets. Second, the methodology employed in this study can be applied to other geographical markets, with minor adjustments.

Support Vector Fuzzy Based Neural Networks For Exchange Rate Modeling

A Novel fuzzy neural network combining with support vector learning mechanism called support-vector-based fuzzy neural networks (SVBFNN) is proposed. The SVBFNN combine the capability of minimizing the empirical risk (training error) and expected risk (testing error) of support vector learning in high dimensional data spaces and the efficient human-like reasoning of FNN.

Central Pattern Generator Incorporating the Actuator Dynamics for a Hexapod Robot

We proposed the use of a Toda-Rayleigh ring as a central pattern generator (CPG) for controlling hexapodal robots. We show that the ring composed of six Toda-Rayleigh units coupled to the limb actuators reproduces the most common hexapodal gaits. We provide an electrical circuit implementation of the CPG and test our theoretical results obtaining fixed gaits. Then we propose a method of incorporation of the actuator (motor) dynamics in the CPG. With this approach we close the loop CPG – environment – CPG, thus obtaining a decentralized model for the leg control that does not require higher level intervention to the CPG during locomotion in a nonhomogeneous environments. The gaits generated by the novel CPG are not fixed, but adapt to the current robot bahvior.

Analysis of Polymer Surface Modifications due to Discharges Initiated by Water Droplets under High Electric Fields

This paper investigates the influence of various parameters on the behaviour of water droplets on polymeric surfaces under high electric fields. An inclined plane test was carried out to understand the droplet behaviour in strong electric field. Parameters such as water droplet conductivity, droplet volume, polymeric surface roughness and droplet positioning with respect to the electrodes were studied. The flashover voltage is affected by all aforementioned parameters. The droplet positioning is in some cases more vital than the droplet volume. Surface damages were analysed using Scanning Electron Microscopy (SEM) studies and by Energy dispersive X-ray Analysis (EDAX). It is observes that magnitude of discharge have direct influence on amount of surface da

A Unified Robust Algorithm for Detection of Human and Non-human Object in Intelligent Safety Application

This paper presents a general trainable framework for fast and robust upright human face and non-human object detection and verification in static images. To enhance the performance of the detection process, the technique we develop is based on the combination of fast neural network (FNN) and classical neural network (CNN). In FNN, a useful correlation is exploited to sustain high level of detection accuracy between input image and the weight of the hidden neurons. This is to enable the use of Fourier transform that significantly speed up the time detection. The combination of CNN is responsible to verify the face region. A bootstrap algorithm is used to collect non human object, which adds the false detection to the training process of the human and non-human object. Experimental results on test images with both simple and complex background demonstrate that the proposed method has obtained high detection rate and low false positive rate in detecting both human face and non-human object.

Comparison of the Effects of Three Different Types of Probiotics on the Sucrase Activities of the Small Intestine Mucosa of Broiler Chicks

An experiment was conducted to study the effects of different types of probiotic on Sucrase enzyme activity of the small intestine mucosa in male broilers. The experimental design was arranged as randomized completely blocks in 4 × 2 factorial arrangement of treatment. 180 male broilers of Ross 308 commercial hybrid were designated into 4 groups. Three replicates of 15 birds were assigned to each treatment. Control treatments (diet contained no probiotic) were fed according to the NRC as base diet and three treatment groups were fed from the same diet plus three different types of probiotics. Birds were slaughtered after 21 and 42 days and different segments of small intestine (at 1,10,30,50,70 and 90% of total length the small intestine) were taken from each replicates (N=2) Sucrase enzyme activities were measured and recorded. Obtained data were analyzed by Spss (P

Thematic Role Extraction Using Shallow Parsing

Extracting thematic (semantic) roles is one of the major steps in representing text meaning. It refers to finding the semantic relations between a predicate and syntactic constituents in a sentence. In this paper we present a rule-based approach to extract semantic roles from Persian sentences. The system exploits a twophase architecture to (1) identify the arguments and (2) label them for each predicate. For the first phase we developed a rule based shallow parser to chunk Persian sentences and for the second phase we developed a knowledge-based system to assign 16 selected thematic roles to the chunks. The experimental results of testing each phase are shown at the end of the paper.

Concurrent Testing of ADC for Embedded System

Compaction testing methods allow at-speed detecting of errors while possessing low cost of implementation. Owing to this distinctive feature, compaction methods have been widely used for built-in testing, as well as external testing. In the latter case, the bandwidth requirements to the automated test equipment employed are relaxed which reduces the overall cost of testing. Concurrent compaction testing methods use operational signals to detect misbehavior of the device under test and do not require input test stimuli. These methods have been employed for digital systems only. In the present work, we extend the use of compaction methods for concurrent testing of analog-to-digital converters. We estimate tolerance bounds for the result of compaction and evaluate the aliasing rate.

Recognition and Reconstruction of Partially Occluded Objects

A new automatic system for the recognition and re¬construction of resealed and/or rotated partially occluded objects is presented. The objects to be recognized are described by 2D views and each view is occluded by several half-planes. The whole object views and their visible parts (linear cuts) are then stored in a database. To establish if a region R of an input image represents an object possibly occluded, the system generates a set of linear cuts of R and compare them with the elements in the database. Each linear cut of R is associated to the most similar database linear cut. R is recognized as an instance of the object 0 if the majority of the linear cuts of R are associated to a linear cut of views of 0. In the case of recognition, the system reconstructs the occluded part of R and determines the scale factor and the orientation in the image plane of the recognized object view. The system has been tested on two different datasets of objects, showing good performance both in terms of recognition and reconstruction accuracy.

A Virtual Simulation Environment for a Design and Verification of a GPGPU

When a small H/W IP is designed, we can develop an appropriate verification environment by observing the simulated signal waves, or using the serial test vectors for the fixed output. In the case of design and verification of a massive parallel processor with multiple IPs, it-s difficult to make a verification system with existing common verification environment, and to verify each partial IP. A TestDrive verification environment can build easy and reliable verification system that can produce highly intuitive results by applying Modelsim and SystemVerilog-s DPI. It shows many advantages, for example a high-level design of a GPGPU processor design can be migrate to FPGA board immediately.

Fusing Local Binary Patterns with Wavelet Features for Ethnicity Identification

Ethnicity identification of face images is of interest in many areas of application, but existing methods are few and limited. This paper presents a fusion scheme that uses block-based uniform local binary patterns and Haar wavelet transform to combine local and global features. In particular, the LL subband coefficients of the whole face are fused with the histograms of uniform local binary patterns from block partitions of the face. We applied the principal component analysis on the fused features and managed to reduce the dimensionality of the feature space from 536 down to around 15 without sacrificing too much accuracy. We have conducted a number of preliminary experiments using a collection of 746 subject face images. The test results show good accuracy and demonstrate the potential of fusing global and local features. The fusion approach is robust, making it easy to further improve the identification at both feature and score levels.

Stress versus Strain Behavior of Geopolymer Cement under Triaxial Stress Conditions in Saline and Normal Water

Geopolymer cement was evaluated as wellbore sealing material for carbon dioxide geosequestration application. Curing of cement system in saline water and strength testing in triaxial stress state condition under lateral confinement is relevant to primary cementing in CO2 geosequestration wellbore in saline aquifer. Geopolymer cement was cured in saline water (both at ambient conditions for 28 days and heated (60°C) conditions for 12 hours) and tested for triaxial strength at different levels of lateral confinement. Normal water and few other curing techniques were also studied both for geopolymer and API ‘G’ cement. Results reported were compared to evaluate the suitability of saline water for curing of geopolymer cement. Unconfined compression test results showed higher strength for curing in saline water than normal water. Besides, testing strength under lateral confinement demonstrated the material failure behavior from brittle to plastic.