Abstract: In this paper, applying frequency domain approach, a delayed predator-prey fishery model with prey reserve is investigated. By choosing the delay τ as a bifurcation parameter, It is found that Hopf bifurcation occurs as the bifurcation parameter τ passes a sequence of critical values. That is, a family of periodic solutions bifurcate from the equilibrium when the bifurcation parameter exceeds a critical value. The length of delay which preserves the stability of the positive equilibrium is calculated. Some numerical simulations are included to justify the theoretical analysis results. Finally, main conclusions are given.
Abstract: Our objectives were to evaluate the effects of sire
breed, type of protein supplement, level of supplementation and sex
on wool spinning fineness (SF), its correlations with other wool
characteristics and prediction accuracy in F1 Merino crossbred lambs.
Texel, Coopworth, White Suffolk, East Friesian and Dorset rams
were mated with 500 purebred Merino dams at a ratio of 1:100 in
separate paddocks within a single management system. The F1
progeny were raised on ryegrass pasture until weaning, before forty
lambs were randomly allocated to treatments in a 5 x 2 x 2 x 2
factorial experimental design representing 5 sire breeds, 2
supplementary feeds (canola or lupins), 2 levels of supplementation
(1% or 2% of liveweight) and sex (wethers or ewes). Lambs were
supplemented for six weeks after an initial three weeks of adjustment,
wool sampled at the commencement and conclusion of the feeding
trial and analyzed for SF, mean fibre diameter (FD), coefficient of
variation (CV), standard deviation, comfort factor (CF), fibre
curvature (CURV), and clean fleece yield. Data were analyzed using
mixed linear model procedures with sire fitted as a random effect,
and sire breed, sex, supplementary feed type, level of
supplementation and their second-order interactions as fixed effects.
Sire breed (P
Abstract: This study was a part of the three-year longitudinal
research on setting up an math learning model for the disadvantaged
students in Taiwan. A target 2nd grade class with 10 regular students
and 6 disadvantaged students at a disadvantaged area in Taipei
participated in this study. Two units of a market basal math textbook
concerning fractions, three-dimensional figures, weight and capacity
were adapted to enhance their math learning motivations, confidences
and effects. The findings were (1) curriculum adaptation was effective
on enhancing students- learning motivations, confidences and effects;
(2) story-type problems and illustrations decreased difficulties on
understanding math language for students from new immigrant
families and students with special needs; (3) “concrete –
semiconcrete – abstract" teaching strategies and hands-on activities
were essential to raise students learning interests and effects; and (4)
curriculum adaptation knowledge and skills needed to be included in
the pre- and in-service teacher training programs.
Abstract: The 4G front-end transceiver needs a high
performance which can be obtained mainly with an optimal
architecture and a multi-band Local Oscillator. In this study, we
proposed and presented a new architecture of multi-band frequency
synthesizer based on an Inverse Sine Phase Detector Phase Locked
Loop (ISPD PLL) without any filters and any controlled gain block
and associated with adapted multi band LC tuned VCO using a
several numeric controlled capacitive branches but not binary
weighted. The proposed architecture, based on 0.35μm CMOS
process technology, supporting Multi-band GSM/DCS/DECT/
UMTS/WiMax application and gives a good performances: a phase
noise @1MHz -127dBc and a Factor Of Merit (FOM) @ 1MHz -
186dB and a wide band frequency range (from 0.83GHz to 3.5GHz),
that make the proposed architecture amenable for monolithic
integration and 4G multi-band application.
Abstract: Knowledge management (KM) is generally
considered to be a positive process in an organisation, facilitating
opportunities to achieve competitive advantage via better quality
information handling, compilation of expert know-how and rapid
response to fluctuations in the business environment. The KM
paradigm as portrayed in the literature informs the processes that can
increase intangible assets so that corporate knowledge is preserved.
However, in some instances, knowledge management exists in a
universe of dynamic tension among the conflicting needs to respect
privacy and intellectual property (IP), to guard against data theft, to
protect national security and to stay within the laws. While the
Knowledge Management literature focuses on the bright side of the
paradigm, there is also a different side in which knowledge is
distorted, suppressed or misappropriated due to personal or
organisational motives (the paradox). This paper describes the ethical
paradoxes that occur within the taxonomy and deontology of
knowledge management and suggests that recognising both the
promises and pitfalls of KM requires wisdom.
Abstract: During the process of compaction in Hot-Mix Asphalt
(HMA) mixtures, the distance between aggregate particles decreases
as they come together and eliminate air-voids. By measuring the
inter-particle distances in a cut-section of a HMA sample the degree
of compaction can be estimated. For this, a calibration curve is
generated by computer simulation technique when the gradation and
asphalt content of the HMA mixture are known. A two-dimensional
cross section of HMA specimen was simulated using the mixture
design information (gradation, asphalt content and air-void content).
Nearest neighbor distance methods such as Delaunay triangulation
were used to study the changes in inter-particle distance and area
distribution during the process of compaction in HMA. Such
computer simulations would enable making several hundreds of
repetitions in a short period of time without the necessity to compact
and analyze laboratory specimens in order to obtain good statistics on
the parameters defined. The distributions for the statistical
parameters based on computer simulations showed similar trends as
those of laboratory specimens.
Abstract: The main objective of this paper is to provide an efficient tool for delineating brain tumors in three-dimensional magnetic resonance images. To achieve this goal, we use basically a level-sets approach to delineating three-dimensional brain tumors. Then we introduce a compression plan of 3D brain structures based for the meshes simplification, adapted for time to the specific needs of the telemedicine and to the capacities restricted by network communication. We present here the main stages of our system, and preliminary results which are very encouraging for clinical practice.
Abstract: The following study aims to outline, whether the
perceptions of entrepreneurs about their entrepreneurial activities and
the underlying meanings of their activities are universal or whether
they vary systematically across cultures. In contrast to previous
studies, the phenomenographical approach and the resulting findings
of this study provide new insights into what constitutes
entrepreneurship by drawing an inference from the perceptions of
entrepreneurs in the United States and in Germany. Culture is shown
to have an important impact on entrepreneurship, since the
underlying meanings of entrepreneurship vary significantly among
the two sample groups. Furthermore, the study sheds more light on
the culturally contingent 'why' of entrepreneurship by looking at the
internal motivations of individuals instead of exclusively focusing on
character traits or external influences of the respective economic
environments.
Abstract: Since its independence in 1962, Algeria has struggled
to establish an educational system tailored to the needs of the
population it may address. Considering the historical connection with
France, Algeria has always looked at the French language as a
cultural imperative until late in the seventies. After the Arabization
policy of 1971 and the socioeconomic changes taking place
worldwide, the use of English as a communicating vehicle started to
gain more space within globalized Algeria. Consequently, disparities
in the use of French started to fade away at the cross-roads leaving
more space to the teaching of English as a second foreign language.
Moreover, the introduction of the Bologna Process and the
European Credit Transfer System in Higher Education has
necessitated some innovations in the design and development of new
curricula adapted to the socioeconomic market. In this paper, I will
try to highlight the important historical dimensions Algeria has taken
towards the implementation of an English language methodology and
to the status it acquired from second foreign language, to first foreign
language to “the language of knowledge and sciences". I will also
propose new pedagogical perspectives for a better treatment of the
English language in order to encourage independent and autonomous
learning.
Abstract: Water Sensitive Urban Design (WSUD) features are
increasingly used to treat and manage polluted stormwater runoff in urbanised areas. It is important to monitor and evaluate the effectiveness of the infrastructure in achieving their intended performance targets after constructing and operating these features
overtime. The paper presents the various methods of analysis used to
assess the effectiveness of the in-situ WSUD features, such as: onsite visual inspections during operational and non operational periods, maintenance audits and periodic water quality testing. The results will contribute to a better understanding of the operational and
maintenance needs of in-situ WSUD features and assist in providing recommendations to better manage life cycle performance.
Abstract: In this work we propose a novel Steganographic
method for hiding information within the spatial domain of the gray
scale image. The proposed approach works by dividing the cover into
blocks of equal sizes and then embeds the message in the edge of the
block depending on the number of ones in left four bits of the pixel.
The proposed approach is tested on a database consists of 100
different images. Experimental results, compared with other
methods, showed that the proposed approach hide more large
information and gave a good visual quality stego-image that can be
seen by human eyes.
Abstract: Research in e-Business has been growing
tremendously covering all related aspects such as adoption issues, e-
Business models, strategies, etc. This research aims to explore the
potential of adopting e-Business for a micro size business operating
from home called home-based businesses (HBBs). In Malaysia, the
HBB industry started many years ago and were mostly monopolized
by women or housewives managed as a part-time job to support their
family economy. Today, things have changed. The availability of the
Internet technology and the emergence of e-Business concept
promote the evolution of HBBs, which have been adopted as another
alternative as a professional career for women without neglecting
their family needs especially the children. Although this study is
confined to a limited sample size and within geographical biasness,
the findings show that it concurs with previous large scale studies. In
this study, both qualitative and quantitative methods were used and
data were gathered using triangulation methods via interview, direct
observation, document analysis and survey questionnaires. This paper
discusses the literature review, research methods and findings
pertaining to e-Business adoption factors that influence the HBBs in
Malaysia.
Abstract: The emergence of the Internet has brewed the
revolution of information storage and retrieval. As most of the
data in the web is unstructured, and contains a mix of text,
video, audio etc, there is a need to mine information to cater to
the specific needs of the users without loss of important
hidden information. Thus developing user friendly and
automated tools for providing relevant information quickly
becomes a major challenge in web mining research. Most of
the existing web mining algorithms have concentrated on
finding frequent patterns while neglecting the less frequent
ones that are likely to contain outlying data such as noise,
irrelevant and redundant data. This paper mainly focuses on
Signed approach and full word matching on the organized
domain dictionary for mining web content outliers. This
Signed approach gives the relevant web documents as well as
outlying web documents. As the dictionary is organized based
on the number of characters in a word, searching and retrieval
of documents takes less time and less space.
Abstract: This paper is part of an ongoing research on the
development of systemic maintenance management model Malaysian
university buildings. In order to achieve this aim, there is a need to
develop a performance model against which services are measure.
Measuring performance is a significant part of maintenance
management service delivery. Maintenance organization needs to
know where they are in order to provide user-driven services and to
enhance productivity. The aim of this paper is to formulate a
template or model for university maintenance organization in
Malaysia. The model is based on literature review and survey
questionnaire and has been validated. Through grounded theory, this
paper developed a 8 points matrix for the university maintenance
organizations for measuring and improving their service delivery.
The potential of the model is guide and assists towards providing
value added service delivery through initiating maintenance
according to user value system rather than on the condition of the
building.
Abstract: The proliferation of user-generated content (UGC) results in huge opportunities to explore event patterns. However, existing event recommendation systems primarily focus on advanced information technology users. Little work has been done to address novice and low-literacy users. The next billion users providing and consuming UGC are likely to include communities from developing countries who are ready to use affordable technologies for subsistence goals. Therefore, we propose a design framework for providing event recommendations to address the needs of such users. Grounded in information integration theory (IIT), our framework advocates that effective event recommendation is supported by systems capable of (1) reliable information gathering through structured user input, (2) accurate sense making through spatial-temporal analytics, and (3) intuitive information dissemination through interactive visualization techniques. A mobile pest management application is developed as an instantiation of the design framework. Our preliminary study suggests a set of design principles for novice and low-literacy users.
Abstract: In this paper 2D Simulation of catalytic Fixed Bed Reactor in Fischer-Tropsch Synthesis of GTL technology has been performed utilizing computational fluid dynamics (CFD). Synthesis gas (a mixture of carbon monoxide and hydrogen) has been used as feedstock. The reactor was modeled and the model equations were solved employing finite volume method. The model was validated against the experimental data reported in literature. The comparison showed a good agreement between simulation results and the experimental data. In addition, the model was applied to predict the concentration contours of the reactants and products along the length of reactor.
Abstract: Prediction of highly non linear behavior of suspended
sediment flow in rivers has prime importance in the field of water
resources engineering. In this study the predictive performance of
two Artificial Neural Networks (ANNs) namely, the Radial Basis
Function (RBF) Network and the Multi Layer Feed Forward (MLFF)
Network have been compared. Time series data of daily suspended
sediment discharge and water discharge at Pari River was used for
training and testing the networks. A number of statistical parameters
i.e. root mean square error (RMSE), mean absolute error (MAE),
coefficient of efficiency (CE) and coefficient of determination (R2)
were used for performance evaluation of the models. Both the models
produced satisfactory results and showed a good agreement between
the predicted and observed data. The RBF network model provided
slightly better results than the MLFF network model in predicting
suspended sediment discharge.
Abstract: Dynamics of laser radiation – metal target interaction
in water at 1064 nm by applying Mach-Zehnder interference
technique was studied. The mechanism of generating the well
developed regime of evaporation of a metal surface and a spherical
shock wave in water is proposed. Critical intensities of the NIR for
the well developed evaporation of silver and gold targets were
determined. Dynamics of shock waves was investigated for earlier
(dozens) and later (hundreds) nanoseconds of time. Transparent
expanding plasma-vapor-compressed water object was visualized and
measured. The thickness of compressed layer of water and pressures
behind the front of a shock wave for later time delays were obtained
from the optical treatment of interferograms.
Abstract: The influence of eccentric discharge of stored solids in
squat silos has been highly valued by many researchers. However,
calculation method of lateral pressure under eccentric flowing still
needs to be deeply studied. In particular, the lateral pressure
distribution on vertical wall could not be accurately recognized
mainly because of its asymmetry. In order to build mechanical model
of lateral pressure, flow channel and flow pattern of stored solids in
squat silo are studied. In this passage, based on Janssen-s theory, the
method for calculating lateral static pressure in squat silos after
eccentric discharge is proposed. Calculative formulae are deduced for
each of three possible cases. This method is also focusing on
unsymmetrical distribution characteristic of silo wall normal
pressure. Finite element model is used to analysis and compare the
results of lateral pressure and the numerical results illustrate the
practicability of the theoretical method.
Abstract: Intrusion Detection System is significant in network
security. It detects and identifies intrusion behavior or intrusion
attempts in a computer system by monitoring and analyzing the
network packets in real time. In the recent year, intelligent algorithms
applied in the intrusion detection system (IDS) have been an
increasing concern with the rapid growth of the network security.
IDS data deals with a huge amount of data which contains irrelevant
and redundant features causing slow training and testing process,
higher resource consumption as well as poor detection rate. Since the
amount of audit data that an IDS needs to examine is very large even
for a small network, classification by hand is impossible. Hence, the
primary objective of this review is to review the techniques prior to
classification process suit to IDS data.