Abstract: Most known methods for measuring the structural similarity of document structures are based on, e.g., tag measures, path metrics and tree measures in terms of their DOM-Trees. Other methods measures the similarity in the framework of the well known vector space model. In contrast to these we present a new approach to measuring the structural similarity of web-based documents represented by so called generalized trees which are more general than DOM-Trees which represent only directed rooted trees.We will design a new similarity measure for graphs representing web-based hypertext structures. Our similarity measure is mainly based on a novel representation of a graph as strings of linear integers, whose components represent structural properties of the graph. The similarity of two graphs is then defined as the optimal alignment of the underlying property strings. In this paper we apply the well known technique of sequence alignments to solve a novel and challenging problem: Measuring the structural similarity of generalized trees. More precisely, we first transform our graphs considered as high dimensional objects in linear structures. Then we derive similarity values from the alignments of the property strings in order to measure the structural similarity of generalized trees. Hence, we transform a graph similarity problem to a string similarity problem. We demonstrate that our similarity measure captures important structural information by applying it to two different test sets consisting of graphs representing web-based documents.
Abstract: Malaysia has successfully applied economic planning
to guide the development of the country from an economy of
agriculture and mining to a largely industrialised one. Now, with its
sights set on attaining the economic level of a fully developed nation
by 2020, the planning system must be made even more efficient and
focused.
It must ensure that every investment made in the country, contribute
towards creating the desirable objective of a strong, modern,
internationally competitive, technologically advanced, post-industrial
economy. Cities in Malaysia must also be fully aware of the enormous
competition it faces in a region with rapidly expanding and
modernising economies, all contending for the same pool of potential
international investments.
Efficiency of urban governance is also fundamental issue in
development characterized by sustainability, subsidiarity, equity,
transparency and accountability, civic engagement and citizenship, and
security. As described above, city competitiveness is harnessed
through 'city marketing and city management'.
High technology and high skilled industries, together with finance,
transportation, tourism, business, information and professional
services shopping and other commercial activities, are the principal
components of the nation-s economy, which must be developed to a
level well beyond where it is now. In this respect, Kuala Lumpur being
the premier city must play the leading role.
Abstract: The national economy development affects the vehicle
ownership which ultimately increases fuel consumption. The rise of
the vehicle ownership is dominated by the increasing number of
motorcycles. This research aims to analyze and identify the
characteristics of fuel consumption, the city transportation system,
and to analyze the relationship and the effect of the city
transportation system on the fuel consumption. A multivariable
analysis is used in this study. The data analysis techniques include: a
Multivariate Multivariable Analysis by using the R software. More
than 84% of fuel on Java is consumed in metropolitan and large
cities. The city transportation system variables that strongly effect the
fuel consumption are population, public vehicles, private vehicles and
private bus. This method can be developed to control the fuel
consumption by considering the urban transport system and city
tipology. The effect can reducing subsidy on the fuel consumption,
increasing state economic.
Abstract: Ascorbic acid (AA), commonly known as vitamin C, is essential for normal functioning of the body and maintenance of metabolic integrity. Among its various roles are as an antioxidant, a cofactor in collagen formation and other reactions, as well as reducing physical stress and maintenance of the immune system. Recent collaborative research between the Australian Defence Science and Technology Organisation (DSTO) in Scottsdale, Tasmania and RMIT University has sought to overcome the problems arising from the inherent instability of ascorbic acid during processing and storage of foods. The recent work has demonstrated the potential of microencapsulation by spray drying as a means to enhance retention. The purpose of this current study has been focused upon the influence of spray drying conditions on the properties of encapsulated ascorbic acid. The process was carried out according to a central composite design. Independent variables were: inlet temperature (80-120° C) and feed flow rate (7-14 mL/minute). Process yield, ascorbic acid loss, moisture content, water activity and particle size distribution were analysed as responses. The results have demonstrated the potential of microencapsulation by spray drying as a means to enhance retention. Vitamin retention, moisture content, water activity and process yield were influenced positively by inlet air temperature and negatively by feed flow rate.
Abstract: Creative design requires new approaches to assessment
in vocational and technological education. To date, there has been little
discussion on instruments used to evaluate dies produced by students
in vocational and technological education. Developing a generic
instrument has been very difficult due to the diversity of creative
domains, the specificity of content, and the subjectivity involved in
judgment. This paper presents an instrument for measuring the
creativity in the design of products by expanding the Consensual
Assessment Technique (CAT). The content-based scale was evaluated
for content validity by 5 experts. The scale comprises 5 criteria:
originality; practicability; precision; aesthetics; and exchangeability.
Nine experts were invited to evaluate the dies produced by 38 college
students who enrolled in a Product Design and Development course.
To further explore the degree of rater agreement, inter-rater reliability
was calculated for each dimension using Kendall's coefficient of
concordance test. The inter-judge reliability scores achieved
significance, with coefficients ranging from 0.53 to 0.71.
Abstract: Debates on residential satisfaction topic have been
vigorously discussed in family house setting. Nonetheless, less or
lack of attention was given to survey on student residential
satisfaction in the campus house setting. This study, however, tried to
fill in the gap by focusing more on the relationship between students-
socio-economic backgrounds and student residential satisfaction with
their on-campus student housing facilities. Two-stage cluster
sampling method was employed to classify the respondents. Then,
self-administered questionnaires were distributed face-to-face to the
students. In general, it was confirmed that the students- socioeconomic
backgrounds have significantly influence the students-
satisfaction with their on-campus student housing facilities. The main
influential factors were revealed as the economic status, sense of
sharing, and the ethnicity of roommates. Likewise, this study could
also provide some useful feedback for the universities administration
in order to improve their student housing facilities.
Abstract: This paper presents a simple three phase power flow
method for solution of three-phase unbalanced radial distribution
system (RDN) with voltage dependent loads. It solves a simple
algebraic recursive expression of voltage magnitude, and all the data
are stored in vector form. The algorithm uses basic principles of
circuit theory and can be easily understood. Mutual coupling between
the phases has been included in the mathematical model. The
proposed algorithm has been tested with several unbalanced radial
distribution networks and the results are presented in the article. 8-
bus and IEEE 13 bus unbalanced radial distribution system results
are in agreements with the literature and show that the proposed
model is valid and reliable.
Abstract: Recent environmental turbulence including financial
crisis, intensified competitive forces, rapid technological change and
high market turbulence have dramatically changed the current
business climate. The managers firms have to plan and decide what
the best approaches that best fit their firms in order to pursue superior
performance. This research aims to examine the influence of strategic
reasoning and top level managers- individual characteristics on the
effectiveness of organizational improvisation and firm performance.
Given the lack of studies on these relationships in the previous
literature, there is significant contribution to the body of knowledge
as well as for managerial practices. 128 responses from top
management of technology-based companies in Malaysia were used
as a sample. Three hypotheses were examined and the findings
confirm that (a) there is no relationship between intuitive reasoning
and organizational improvisation but there is a link between rational
reasoning and organizational improvisation, (b) top level managers-
individual characteristics as a whole affect organizational
improvisation; and (c) organizational improvisation positively affects
firm performance. The theoretical and managerial implications were
discussed in the conclusions.
Abstract: In this paper a new robust digital image watermarking
algorithm based on the Complex Wavelet Transform is proposed. This
technique embeds different parts of a watermark into different blocks
of an image under the complex wavelet domain. To increase security
of the method, two chaotic maps are employed, one map is used to
determine the blocks of the host image for watermark embedding,
and another map is used to encrypt the watermark image. Simulation
results are presented to demonstrate the effectiveness of the proposed
algorithm.
Abstract: Email has become a fast and cheap means of online
communication. The main threat to email is Unsolicited Bulk Email
(UBE), commonly called spam email. The current work aims at
identification of unigrams in more than 2700 UBE that advertise
body-enhancement drugs. The identification is based on the
requirement that the unigram is neither present in dictionary, nor is a
slang term. The motives of the paper are many fold. This is an
attempt to analyze spamming behaviour and employment of wordmutation
technique. On the side-lines of the paper, we have
attempted to better understand the spam, the slang and their interplay.
The problem has been addressed by employing Tokenization
technique and Unigram BOW model. We found that the non-lexicon
words constitute nearly 66% of total number of lexis of corpus
whereas non-slang words constitute nearly 2.4% of non-lexicon
words. Further, non-lexicon non-slang unigrams composed of 2
lexicon words, form more than 71% of the total number of such
unigrams. To the best of our knowledge, this is the first attempt to
analyze usage of non-lexicon non-slang unigrams in any kind of
UBE.
Abstract: The main objective of this paper is to identify and
disseminate good practice in quality assurance and enhancement as
well as in teaching and learning at master level. This paper focuses
on the experience of the Erasmus Mundus Master program CIMET
(Color in Informatics and Media Technology). Amongst topics
covered, we discuss the adjustments necessary to a curriculum
designed for excellent international students and their preparation for
a global labor market.
Abstract: In this paper, we investigated the characteristic of a
clinical dataseton the feature selection and classification
measurements which deal with missing values problem.And also
posed the appropriated techniques to achieve the aim of the activity;
in this research aims to find features that have high effect to mortality
and mortality time frame. We quantify the complexity of a clinical
dataset. According to the complexity of the dataset, we proposed the
data mining processto cope their complexity; missing values, high
dimensionality, and the prediction problem by using the methods of
missing value replacement, feature selection, and classification.The
experimental results will extend to develop the prediction model for
cardiology.
Abstract: A novel behavioral detection framework is proposed
to detect zero day buffer overflow vulnerabilities (based on network
behavioral signatures) using zero-day exploits, instead of the
signature-based or anomaly-based detection solutions currently
available for IDPS techniques. At first we present the detection
model that uses shadow honeypot. Our system is used for the online
processing of network attacks and generating a behavior detection
profile. The detection profile represents the dataset of 112 types of
metrics describing the exact behavior of malware in the network. In
this paper we present the examples of generating behavioral
signatures for two attacks – a buffer overflow exploit on FTP server
and well known Conficker worm. We demonstrated the visualization
of important aspects by showing the differences between valid
behavior and the attacks. Based on these metrics we can detect
attacks with a very high probability of success, the process of
detection is however very expensive.
Abstract: We evaluate the average energy consumption per bit
in Optical Packet Switches equipped with BENES switching fabric
realized in Semiconductor Optical Amplifier (SOA) technology. We
also study the impact that the Amplifier Spontaneous Emission
(ASE) noise generated by a transmission system has on the power
consumption of the BENES switches due to the gain saturation of the
SOAs used to realize the switching fabric. As a matter of example for
32×32 switches supporting 64 wavelengths and offered traffic equal
to 0,8, the average energy consumption per bit is 2, 34 · 10-1 nJ/bit
and increases if ASE noise introduced by the transmission systems
is increased.
Abstract: Knowledge sharing culture contributes to a positive
working environment. Currently, there is no platform for the Faculty
of Industrial Information Technology (FIIT), Unisel academic staff to
share knowledge among them. As it is done manually, the sharing
process is through common meeting or by any offline discussions.
There is no repository for future retrieval. However, with open
source solution the development of knowledge based application may
reduce the cost tremendously. In this paper we discuss about the
domain on which this knowledge portal is being developed and also
the deployment of open source tools such as JOOMLA, PHP
programming language and MySQL. This knowledge portal is
evidence that open source tools also reliable in developing
knowledge based portal. These recommendations will be useful to
the open source community to produce more open source products in
future.
Abstract: Defect prevention is the most vital but habitually
neglected facet of software quality assurance in any project. If
functional at all stages of software development, it can condense the
time, overheads and wherewithal entailed to engineer a high quality
product. The key challenge of an IT industry is to engineer a
software product with minimum post deployment defects.
This effort is an analysis based on data obtained for five selected
projects from leading software companies of varying software
production competence. The main aim of this paper is to provide
information on various methods and practices supporting defect
detection and prevention leading to thriving software generation. The
defect prevention technique unearths 99% of defects. Inspection is
found to be an essential technique in generating ideal software
generation in factories through enhanced methodologies of abetted
and unaided inspection schedules. On an average 13 % to 15% of
inspection and 25% - 30% of testing out of whole project effort time
is required for 99% - 99.75% of defect elimination.
A comparison of the end results for the five selected projects
between the companies is also brought about throwing light on the
possibility of a particular company to position itself with an
appropriate complementary ratio of inspection testing.
Abstract: Particle damping is a technique to reduce the
structural vibrations by means of placing small metallic particles
inside a cavity that is attached to the structure at location of high
vibration amplitudes. In this paper, we have presented an analytical
model to simulate the particle damping of two dimensional transient
vibrations in structure operating under high centrifugal loads. The
simulation results show that this technique remains effective as long
as the ratio of the dynamic acceleration of the structure to the applied
centrifugal load is more than 0.1. Particle damping increases with the
increase of particle to structure mass ratio. However, unlike to the
case of particle damping in the absence of centrifugal loads where
the damping efficiency strongly depends upon the size of the cavity,
here this dependence becomes very weak. Despite the simplicity of
the model, the simulation results are considerably in good agreement
with the very scarce experimental data available in the literature for
particle damping under centrifugal loads.
Abstract: Fine-grained data replication over the Internet allows duplication of frequently accessed data objects, as opposed to entire sites, to certain locations so as to improve the performance of largescale content distribution systems. In a distributed system, agents representing their sites try to maximize their own benefit since they are driven by different goals such as to minimize their communication costs, latency, etc. In this paper, we will use game theoretical techniques and in particular auctions to identify a bidding mechanism that encapsulates the selfishness of the agents, while having a controlling hand over them. In essence, the proposed game theory based mechanism is the study of what happens when independent agents act selfishly and how to control them to maximize the overall performance. A bidding mechanism asks how one can design systems so that agents- selfish behavior results in the desired system-wide goals. Experimental results reveal that this mechanism provides excellent solution quality, while maintaining fast execution time. The comparisons are recorded against some well known techniques such as greedy, branch and bound, game theoretical auctions and genetic algorithms.
Abstract: The aim of this research was to calculate the
mechanical properties of Pd3Rh and PdRh3 ordered alloys. The
molecular dynamics (MD) simulation technique was used to obtain
temperature dependence of the energy, the Yong modulus, the shear
modulus, the bulk modulus, Poisson-s ratio and the elastic stiffness
constants at the isobaric-isothermal (NPT) ensemble in the range of
100-325 K. The interatomic potential energy and force on atoms were
calculated by Quantum Sutton-Chen (Q-SC) many body potential.
Our MD simulation results show the effect of temperature on the
cohesive energy and mechanical properties of Pd3Rh as well as
PdRh3 alloys. Our computed results show good agreement with the
experimental results where they have been available.
Abstract: Fault tolerance is critical in many of today's large computer systems. This paper focuses on improving fault tolerance through testing. Moreover, it concentrates on the memory faults: how to access the editable part of a process memory space and how this part is affected. A special Software Fault Injection Technique (SFIT) is proposed for this purpose. This is done by sequentially scanning the memory of the target process, and trying to edit maximum number of bytes inside that memory. The technique was implemented and tested on a group of programs in software packages such as jet-audio, Notepad, Microsoft Word, Microsoft Excel, and Microsoft Outlook. The results from the test sample process indicate that the size of the scanned area depends on several factors. These factors are: process size, process type, and virtual memory size of the machine under test. The results show that increasing the process size will increase the scanned memory space. They also show that input-output processes have more scanned area size than other processes. Increasing the virtual memory size will also affect the size of the scanned area but to a certain limit.