Abstract: Since 1992, year where Hugo de Garis has published
the first paper on Evolvable Hardware (EHW), a period of intense
creativity has followed. It has been actively researched, developed
and applied to various problems. Different approaches have been
proposed that created three main classifications: extrinsic, mixtrinsic
and intrinsic EHW. Each of these solutions has a real interest.
Nevertheless, although the extrinsic evolution generates some
excellent results, the intrinsic systems are not so advanced. This
paper suggests 3 possible solutions to implement the run-time
configuration intrinsic EHW system: FPGA-based Run-Time
Configuration system, JBits-based Run-Time Configuration system
and Multi-board functional-level Run-Time Configuration system.
The main characteristic of the proposed architectures is that they are
implemented on Field Programmable Gate Array. A comparison of
proposed solutions demonstrates that multi-board functional-level
run-time configuration is superior in terms of scalability, flexibility
and the implementation easiness.
Abstract: The purpose of this research is to study motivation
factors and also to study factors relation to job performance to
compare motivation factors under the personal factor classification
such as gender, age, income, educational level, marital status, and
working duration; and to study the relationship between Motivation
Factors and Job Performance with job satisfactions. The sample
groups utilized in this research were 400 Suan Sunandha Rajabhat
University employees. This research is a quantitative research using
questionnaires as research instrument. The statistics applied for data
analysis including percentage, mean, and standard deviation. In
addition, the difference analysis was conducted by t value computing,
one-way analysis of variance and Pearson’s correlation coefficient
computing. The findings of the study results were as follows the
findings showed that the aspects of job promotion and salary were at
the moderate levels. Additionally, the findings also showed that the
motivations that affected the revenue branch chiefs’ job performance
were job security, job accomplishment, policy and management, job
promotion, and interpersonal relation.
Abstract: Malaria is transmitted to the human by biting of
infected Anopheles mosquitoes. This disease is a serious, acute and
chronic relapsing infection to humans. Fever, nausea, vomiting, back
pain, increased sweating anemia and splenomegaly (enlargement of
the spleen) are the symptoms of the patients who infected with this
disease. It is caused by the multiplication of protozoa parasite of the
genus Plasmodium. Plasmodium falciparum, Plasmodium vivax,
Plasmodium malariae and Plasmodium ovale are the four types of
Plasmodium malaria. A mathematical model for the transmission of
Plasmodium Malaria is developed in which the human and vector
population are divided into two classes, the susceptible and the
infectious classes. In this paper, we formulate the dynamical model
of Plasmodium falciparum and Plasmodium vivax malaria. The
standard dynamical analysis is used for analyzing the behavior for
the transmission of this disease. The Threshold condition is found
and numerical results are shown to confirm the analytical results.
Abstract: The simulation of external aerodynamics is one of the most challenging and important automotive CFD applications. With the rapid developments of digital computers, CFD is used as a practical tool in modern fluid dynamics research. It integrates fluid mechanics disciplines, mathematics and computer science. In this study, two different types of simulations were made, one for the flow around a simplified high speed passenger car with a rear-spoiler and the other for the flow without a rear-spoiler. The standard k-ε model is selected to numerically simulate the external flow field of the simplified Camry model with or without a rear-spoiler. Through an analysis of the simulation results, a new rear spoiler is designed and it shows a mild reduction of the vehicle aerodynamics drag. This leads to less vehicle fuel consumption on the road.
Abstract: Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Abstract: Single nucleotide polymorphisms (SNPs) hold much promise as a basis for disease-gene association. However, research is limited by the cost of genotyping the tremendous number of SNPs. Therefore, it is important to identify a small subset of informative SNPs, the so-called tag SNPs. This subset consists of selected SNPs of the genotypes, and accurately represents the rest of the SNPs. Furthermore, an effective evaluation method is needed to evaluate prediction accuracy of a set of tag SNPs. In this paper, a genetic algorithm (GA) is applied to tag SNP problems, and the K-nearest neighbor (K-NN) serves as a prediction method of tag SNP selection. The experimental data used was taken from the HapMap project; it consists of genotype data rather than haplotype data. The proposed method consistently identified tag SNPs with considerably better prediction accuracy than methods from the literature. At the same time, the number of tag SNPs identified was smaller than the number of tag SNPs in the other methods. The run time of the proposed method was much shorter than the run time of the SVM/STSA method when the same accuracy was reached.
Abstract: Not many studies have been undertaken on shareholder activism in emerging economies, including Malaysia. Shareholder activism in emerging economies is on the rise. This paper seeks to comprehend the elements of this activism that are unique to Malaysia, specifically with respect to how the agency problem is controlled through shareholder activism in improving corporate governance practices within target companies. Through shareholder activism, shareholders make contact with a target company to voice their dissatisfaction, suggestions, or recommendations. This paper utilises agency theory to explain institutional shareholder activism. This theory has been extensively used within literature on corporate governance with regards to shareholder activism. The effectiveness of shareholder activism in improving corporate governance will be examined as well. This research provides a further understanding of shareholder activism in emerging economies, such as Malaysia; this research also has the potential to enhance shareholder activism and corporate governance practices in general.
Abstract: Understanding how precipitation inter-annually
changes and its implication in agricultural drought and production change in winter wheat (Triticum aestivum L.) growth season is critical for crop production in China. MODIS Temperature-Vegetation Dryness Index (TVDI) and daily mean precipitation time series for the main growth season(Feb. to May) of winter wheat from 2000 to 2010
were used to analyze the distribution of trends of precipitation,
agricultural drought and winter wheat yield change respectively, and
relationships between them in North China region(Huang-huai-hai
region, HHH region), China. The results indicated that the trend of
precipitation in HHH region past 11 years was increasing, which had
induced generally corresponding decreasing trend of agricultural
drought and increasing trend of wheat yield, while the trend of drought
was spatially diverse. The study could provide a basis for agricultural
drought research during winter wheat season in HHH region under the
ground of climate change.
Abstract: Acute disseminated encephalomyelitis (ADEM) has
been reported to develop after a hymenoptera sting, but its
pathogenesis is not known in detail. Myelin basic protein (MBP)-
specific T cells have been detected in the blood of patients with
ADEM, and a proportion of these patients develop multiple sclerosis
(MS). In an attempt to understand the mechanisms underlying
ADEM, molecular mimicry between hymenoptera venom peptides
and the human immunodominant MBP peptide was scrutinized,
based on the sequence and structural similarities, whether it was the
root of the disease. The results suggest that the three wasp venom
peptides have low sequence homology with the human
immunodominant MBP residues 85-99. Structural similarity analysis
among the three venom peptides and the MS-related HLA-DR2b
(DRA, DRB1*1501)-associated immunodominant MHC
binding/TCR contact residues 88-93, VVHFFK showed that
hyaluronidase residues 7-12, phospholipase A1 residues 98-103, and
antigen 5 residues 109-114 showed a high degree of similarity
83.3%, 100%, and 83.3% respectively. In conclusion, some wasp
venom peptides, particularly phospholipase A1, may potentially act
as the molecular motifs of the human 3HLA-DR2b-associated
immunodominant MBP88-93, and possibly present a mechanism for
induction of wasp sting-associated ADEM.
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: This paper proposes an auto-classification algorithm
of Web pages using Data mining techniques. We consider the
problem of discovering association rules between terms in a set of
Web pages belonging to a category in a search engine database, and
present an auto-classification algorithm for solving this problem that
are fundamentally based on Apriori algorithm. The proposed
technique has two phases. The first phase is a training phase where
human experts determines the categories of different Web pages, and
the supervised Data mining algorithm will combine these categories
with appropriate weighted index terms according to the highest
supported rules among the most frequent words. The second phase is
the categorization phase where a web crawler will crawl through the
World Wide Web to build a database categorized according to the
result of the data mining approach. This database contains URLs and
their categories.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP-hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we concentrate an algorithm that
finds a near-optimal solution fast and we named this algorithm as
optimized Delay Constrained Routing (ODCR), which uses an
adaptive path weight function together with an additional constraint
imposed on the path cost, to restrict search space and hence ODCR
finds near optimal solution in much quicker time.
Abstract: This research aimed to study employees- perceptions and expectations toward their organization-s corporate social responsibility (CSR), to study the differences between employees- personal factors and level of perceptions and expectations toward CSR, and to study the relationship between employees- perceptions and expectations toward CSR. Purposive sampling and questionnaire were applied to collect information from 400 private company employees in Bangkok metropolitan area. The results revealed that employees had “high" level of perceptions and expectations toward CSR, of which the highest level were given on the area of “corporate governance and transparency". It was found that there was different level of expectations of employees with different period of employment, position and employment (by listed and non-listed companies). Employees of different age and period of employment also had different level of expectations. Employees- perceptions were correlated with their expectations toward CSR.
Abstract: Skyline extraction in mountainous images can be used
for navigation of vehicles or UAV(unmanned air vehicles), but it is
very hard to extract skyline shape because of clutters like clouds, sea
lines and field borders in images. We developed the edge-based
skyline extraction algorithm using a proposed multistage edge filtering
(MEF) technique. In this method, characteristics of clutters in the
image are first defined and then the lines classified as clutters are
eliminated by stages using the proposed MEF technique. After this
processing, we select the last line using skyline measures among the
remained lines. This proposed algorithm is robust under severe
environments with clutters and has even good performance for
infrared sensor images with a low resolution. We tested this proposed
algorithm for images obtained in the field by an infrared camera and
confirmed that the proposed algorithm produced a better performance
and faster processing time than conventional algorithms.
Abstract: This paper sets forth the possibility and importance about applying Data Mining in Web logs mining and shows some problems in the conventional searching engines. Then it offers an improved algorithm based on the original AprioriAll algorithm which has been used in Web logs mining widely. The new algorithm adds the property of the User ID during the every step of producing the candidate set and every step of scanning the database by which to decide whether an item in the candidate set should be put into the large set which will be used to produce next candidate set. At the meantime, in order to reduce the number of the database scanning, the new algorithm, by using the property of the Apriori algorithm, limits the size of the candidate set in time whenever it is produced. Test results show the improved algorithm has a more lower complexity of time and space, better restrain noise and fit the capacity of memory.
Abstract: The latest Geographic Information System (GIS)
technology makes it possible to administer the spatial components of
daily “business object," in the corporate database, and apply suitable
geographic analysis efficiently in a desktop-focused application. We
can use wireless internet technology for transfer process in spatial
data from server to client or vice versa. However, the problem in
wireless Internet is system bottlenecks that can make the process of
transferring data not efficient. The reason is large amount of spatial
data. Optimization in the process of transferring and retrieving data,
however, is an essential issue that must be considered. Appropriate
decision to choose between R-tree and Quadtree spatial data indexing
method can optimize the process. With the rapid proliferation of
these databases in the past decade, extensive research has been
conducted on the design of efficient data structures to enable fast
spatial searching. Commercial database vendors like Oracle have also
started implementing these spatial indexing to cater to the large and
diverse GIS. This paper focuses on the decisions to choose R-tree
and quadtree spatial indexing using Oracle spatial database in mobile
GIS application. From our research condition, the result of using
Quadtree and R-tree spatial data indexing method in one single
spatial database can save the time until 42.5%.
Abstract: It has been shown that pH 7,3 and 37 0C are the optimal condition for the growth of E. coli “ASAP". The cells grow well on Glucose, Lactose, D-Mannitol, D-Sorbitol, (+)-Xylose, L- (+)-Arabinose and Dulcitol. No growth has been observed on Sucrose, Inositol, Phenylalanine, and Tryptophan. The strain is sensitive to a range of antibiotics. The present study has demonstrated that E. coli “ASAP" inhibit the growth of S. enterica ATCC #700931 in vitro. The studies on conjugating activity has revealed no conjugant of E. coli “ASAP" with plasmid strains E. coli G35#59 and S. enterica ATCC #700931. On the other hand, the conjugants with low frequencies were obtained from E. coli “ASAP" with E. coli G35#61, and E. coli “ASAP" with randomly chosen isolate from healthy human gut microflora: E. coli E6. The results of present study have demonstrated improvements in gut microflora condition of patients with different diseases after the administration of “ASAP"
Abstract: The focus of the study is to understand the factors of
curriculum innovation from the perspective of Language teacher
education. The overall aim of the study is to investigate Language
educators- perceptions of factors of curriculum innovation. In the
theoretical framework the main focus is on discussion about different
curriculum approaches for language teacher education and limiting
and facilitating factors of innovation. In order to achieve the aim of
the study, an observational research is employed. The empirical basis
of the study consists of questionnaire with sixty-three language
teachers from eight Romanian higher education institutions. The
findings reveal variation in Language teachers- conceptions of the
dominant factors of curricular innovation.
Abstract: The brain MR imaging-based clinical research and analysis system were specifically built and the development for a large-scale data was targeted. We used the general clinical data available for building large-scale data. Registration period for the selection of the lesion ROI and the region growing algorithm was used and the Mesh-warp algorithm for matching was implemented. The accuracy of the matching errors was modified individually. Also, the large ROI research data can accumulate by our developed compression method. In this way, the correctly decision criteria to the research result was suggested. The experimental groups were age, sex, MR type, patient ID and smoking which can easily be queries. The result data was visualized of the overlapped images by a color table. Its data was calculated by the statistical package. The evaluation for the utilization of this system in the chronic ischemic damage in the area has done from patients with the acute cerebral infarction. This is the cause of neurologic disability index location in the center portion of the lateral ventricle facing. The corona radiate was found in the position. Finally, the system reliability was measured both inter-user and intra-user registering correlation.
Abstract: The evolutionary design of electronic circuits, or
evolvable hardware, is a discipline that allows the user to
automatically obtain the desired circuit design. The circuit
configuration is under the control of evolutionary algorithms. Several
researchers have used evolvable hardware to design electrical
circuits. Every time that one particular algorithm is selected to carry
out the evolution, it is necessary that all its parameters, such as
mutation rate, population size, selection mechanisms etc. are tuned in
order to achieve the best results during the evolution process. This
paper investigates the abilities of evolution strategy to evolve digital
logic circuits based on programmable logic array structures when
different mutation rates are used. Several mutation rates (fixed and
variable) are analyzed and compared with each other to outline the
most appropriate choice to be used during the evolution of
combinational logic circuits. The experimental results outlined in this
paper are important as they could be used by every researcher who
might need to use the evolutionary algorithm to design digital logic
circuits.