Abstract: Information is a critical asset and an important source for gaining competitive advantage in firms. The effective maintenance of IT becomes an important task. In order to better understand the determinants of IT effectiveness, this study employs the Industrial Organization (I/O) and Resource Based View (RBV) theories and investigates the industry effect and several major firmspecific factors in relation to their impact on firms- IT effectiveness. The data consist of a panel data of ten-year observations of firms whose IT excellence had been recognized by the CIO Magazine. The non-profit organizations were deliberately excluded, as explained later. The results showed that the effectiveness of IT management varied significantly across industries. Industry also moderated the effects of firm demographic factors such as size and age on IT effectiveness. Surprisingly, R & D investment intensity had negative correlation to IT effectiveness. For managers and practitioners, this study offers some insights for evaluation criteria and expectation for IT project success. Finally, the empirical results indicate that the sustainability of IT effectiveness appears to be short in duration.
Abstract: Nothing that an effective cure for infertility happens
when we can find a unique solution, a great deal of study has been
done in this field and this is a hot research subject for to days study.
So we could analyze the men-s seaman and find out about fertility
and infertility and from this find a true cure for this, since this will be
a non invasive and low risk procedure, it will be greatly welcomed.
In this research, the procedure has been based on few Algorithms
enhancement and segmentation of images which has been done on
the images taken from microscope in different fertility institution and
have obtained a suitable result from the computer images which in
turn help us to distinguish these sperms from fluids and its
surroundings.
Abstract: This paper presents the simulation results of electric field and potential distributions along surface of silicone rubber polymer insulators under clean and various contamination conditions with/without water droplets. Straight sheds insulator having leakage distance 290 mm was used in this study. Two type of contaminants, playwood dust and cement dust, have been studied the effect of contamination on the insulator surface. The objective of this work is to comparison the effect of contamination on potential and electric field distributions along the insulator surface when water droplets exist on the insulator surface. Finite element method (FEM) is adopted for this work. The simulation results show that contaminations have no effect on potential distribution along the insulator surface while electric field distributions are obviously depended on contamination conditions.
Abstract: The paper analyzes the large power transformer unit regimes, indicating the criteria for the management of the voltage operating conditions, as well as the change in the operating conditions with the load connected to the secondary winding of the transformer unit. Further, the paper presents the software application for the evaluation of the transformer unit operation under different conditions. The software application was developed by means of virtual instrumentation.
Abstract: Rapid economic development and population growth
in Malaysia had accelerated the generation of solid waste. This issue
gives pressure for effective management of municipal solid waste
(MSW) to take place in Malaysia due to the increased cost of landfill.
This paper discusses optimal planning of waste-to-energy (WTE)
using a combinatorial simulation and optimization model through
mixed integer linear programming (MILP) approach. The proposed
multi-period model is tested in Iskandar Malaysia (IM) as case study
for a period of 12 years (2011 -2025) to illustrate the economic
potential and tradeoffs involved in this study. In this paper, 3
scenarios have been used to demonstrate the applicability of the
model: (1) Incineration scenario (2) Landfill scenario (3) Optimal
scenario. The model revealed that the minimum cost of electricity
generation from 9,995,855 tonnes of MSW is estimated as USD
387million with a total electricity generation of 50MW /yr in the
optimal scenario.
Abstract: The present study aims to explore the role of parents'
ethnic socialization practices contributes to the ethnic identity
development, self-esteem and psychological adjustment of multi
ethnic children in Sabah, Malaysia. A total of 342 multi ethnic
children (age range = 10 years old to 14 years old; mean age = 12.65
years, SD = 0.88) and their parents participated in the present study.
The modified version of Multi group Ethnic Identity Measure
(MEIM), The Familial Ethnic Socialization Measure (FESM). The
Rosenberg Self-Esteem Scale (RSE) and Behavioral and Emotional
Rating Scale Edition 2 (BERS-2) were used in this study. The results
showed that: i) parents' ethnic socialization practice was a strong
predictor of ethnic identity development of multi ethnic children; ii)
parents' ethnic socialization practice also was a significant predictor
of self-esteem of multi ethnic children; iii) parents' ethnic
socialization practice was not a significant predictor of psychological
adjustment of multi ethnic children. The results of this study showed
the implications parents' ethnic socialization practices and ethnic
identity development in successful multi ethnic families.
Abstract: The rangelands, as one of the largest dynamic biomes
in the world, have very capabilities. Regulation of greenhouse gases
in the Earth's atmosphere, particularly carbon dioxide as the main
these gases, is one of these cases. The attention to rangeland, as
cheep and reachable resources to sequestrate the carbon dioxide,
increases after the Industrial Revolution. Rangelands comprise the
large parts of Iran as a steppic area. Rudshur (Saveh), as area index of
steppic area, was selected under three sites include long-term
exclosure, medium-term exclosure, and grazable area in order to the
capable of carbon dioxide’s sequestration of dominated species.
Canopy cover’s percentage of two dominated species (Artemisia
sieberi Besser & Stipa barbata Desf) was determined via establishing
of random 1 square meter plot. The sampling of above and below
ground biomass style was obtained by complete random. After
determination of ash percentage in the laboratory; conversion ratio of
plant biomass to organic carbon was calculated by ignition method.
Results of the paired t-test showed that the amount of carbon
sequestration in above ground and underground biomass of Artemisia
sieberi Besser & Stipa barbata Desf is different in three regions. It,
of course, hasn’t any difference between under and surface ground’s
biomass of Artemisia sieberi Besser in long-term exclosure. The
independent t-test results indicate differences between underground
biomass corresponding each other in the studied sites. Carbon
sequestration in the Stipa barbata Desf was totally more than
Artemisia sieberi Besser. Altogether, the average sequestration of the
long-term exclosure was 5.842gr/m², the medium-term exclosure was
4.115gr/m², and grazable area was 5.975gr/m² so that there isn’t
valuable statistical difference in term of total amount of carbon
sequestration to three sites.
Abstract: Acid rain occurs when sulphur dioxide (SO2) and
nitrogen oxides (Nox) gases react in the atmosphere with water,
oxygen, and other chemicals to form various acidic compounds. The
result is a mild solution of sulfuric acid and nitric acid. Soil has a
greater buffering capacity than aquatic systems. However excessive
amount of acids introduced by acid rains may disturb the entire soil
chemistry. Acidity and harmful action of toxic elements damage
vegetation while susceptible microbial species are eliminated. In
present study, the effects of simulated sulphuric acid and nitric acid
rains were investigated on crop Glycine max. The effect of acid rain
on change in soil fertility was detected in which pH of control sample
was 6.5 and pH of 1%H2SO4 and 1%HNO3 were 3.5. Nitrogen nitrate
in soil was high in 1% HNO3 treated soil & Control sample.
Ammonium nitrogen in soil was low in 1% HNO3 & H2SO4 treated
soil. Ammonium nitrogen was medium in control and other samples.
The effect of acid rain on seed germination on 3rd day of germination
control sample growth was 7 cm, 0.1% HNO3 was 8cm, and 0.001%
HNO3 & 0.001% H2SO4 was 6cm each. On 10th day fungal growth
was observed in 1% and 0.1%H2SO4 concentrations, when all plants
were dead. The effect of acid rain on crop productivity was
investigated on 3rd day roots were developed in plants. On12th day
Glycine max showed more growth in 0.1% HNO3, 0.001% HNO3 and
0.001% H2SO4 treated plants growth were same as compare to control
plants. On 20th day development of discoloration of plant pigments
were observed on acid treated plants leaves. On 38th day, 0.1, 0.001%
HNO3 and 0.1, 0.001% H2SO4 treated plants and control plants were
showing flower growth. On 42th day, acid treated Glycine max variety
and control plants were showed seeds on plants. In Glycine max
variety 0.1, 0.001% H2SO4, 0.1, 0.001% HNO3 treated plants were
dead on 46th day and fungal growth was observed. The toxicological
study was carried out on Glycine max plants exposed to 1% HNO3
cells were damaged more than 1% H2SO4. Leaf sections exposed to
0.001% HNO3 & H2SO4 showed less damaged of cells and
pigmentation observed in entire slide when compare with control
plant. The soil analysis was done to find microorganisms in HNO3 &
H2SO4 treated Glycine max and control plants. No microorganism
growth was observed in 1% HNO3 & H2SO4 but control plant showed
microbial growth.
Abstract: The development of Web has affected different aspects of our lives, such as communication, sharing knowledge, searching for jobs, social activities, etc. The web portal as a gateway in the World Wide Web is a starting point for people who are connecting to the Internet. The web portal as the type of knowledge management system provides a rich space to share and search information as well as communication services like free email or content provision for the users. This research aims to discover the university needs to the web portal as a necessary tool for students in the universities to help them in getting the required information. A survey was conducted to gather students' requirements which can be incorporated in to portal to be developed.
Abstract: Clinically, chickens showed progressively developed
clinical signs represented by sever cyanosis of the comb and wattles
with hemorrhage at the shanks, depression, and ruffling feathers with
loss of appetite and high daily mortalities. The ducks showed severe
neurological signs as torticollus, seizures and inability to stand with
mild signs of diarrhea and depression. Grossly, chickens showed
hemorrhages and congestion in most of the organs particularly lung,
liver, spleen, trachea and kidney. The examined ducks showed
multiple petechial hemorrhages, multifocal hemorrhagic necrosis in
the pancreas, pulmonary edema, congestion and hemorrhage in
meninges and congestion in the skeletal muscles. Histopathology
revealed severe congestion and hemorrhages in most of the organs
particularly lung, liver and kidney. Microscopic erosive tracheitis,
sever pulmonary congestion and perivascular oedema and lymphogranulocytic
pneumonia were constant. The liver showed hepatocyts
necrosis and lympho-granulocytic infiltration. The kidney showed
renal tubular necrosis and diffuse congestion. Multifocal, neuronal
necrosis, hemorrhages, multifocal glial nodules, lympho- histiocytic
perivascular cuffing, and occasional neuronophagia were observed in
the cerebrum. Other organs showed moderate changes.
Abstract: Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.
Abstract: Transportation is one of the main activities related to
creating value for the tourists. Transport management in tourism
mainly focuses on managing transfer points and vehicle capacity.
However, transport service level must also be ensured as it now
relates to tourist-s experiences. This paper emphasizes on the
responsiveness as one of key service performance measures. An
evaluation framework is developed and illustarted by using the case
of small bus service in Pattaya city. It can be seen as a great potential
for the city to utilize the small bus transportation in order to meet the
needs of more diverse group of passengers and to support the
expansion of tourist areas. The framework integrates with service
operations management, logistics, and tourism behavior perspectives.
The findings from the investigation of existing small bus service are
presented and preliminarily validate the usability of the framework.
Abstract: A neuron can emit spikes in an irregular time basis and by averaging over a certain time window one would ignore a lot of information. It is known that in the context of fast information processing there is no sufficient time to sample an average firing rate of the spiking neurons. The present work shows that the spiking neurons are capable of computing the radial basis functions by storing the relevant information in the neurons' delays. One of the fundamental findings of the this research also is that when using overlapping receptive fields to encode the data patterns it increases the network-s clustering capacity. The clustering algorithm that is discussed here is interesting from computer science and neuroscience point of view as well as from a perspective.
Abstract: We present a simulation and realization of a battery
charge regulator (BCR) in microsatellite earth observation. The tests
were performed on battery pack 12volt, capacity 24Ah and the solar array open circuit voltage of 100 volt and optimum power of about
250 watt. The battery charge is made by solar module. The principle is to adapt the output voltage of the solar module to the battery by
using the technique of pulse width modulation (PWM). Among the different techniques of charge battery, we opted for the technique of
the controller ON/OFF is a standard technique and simple, it-s easy to
be board executed validation will be made by simulation "Proteus Isis
Professional software ". The circuit and the program of this prototype
are based on the PIC16F877 microcontroller, a serial interface connecting a PC is also realized, to view and save data and graphics
in real time, for visualization of data and graphs we develop an interface tool “visual basic.net (VB)--.
Abstract: In this article we explore the application of a formal
proof system to verification problems in cryptography. Cryptographic
properties concerning correctness or security of some cryptographic
algorithms are of great interest. Beside some basic lemmata, we
explore an implementation of a complex function that is used in
cryptography. More precisely, we describe formal properties of this
implementation that we computer prove. We describe formalized
probability distributions (σ-algebras, probability spaces and conditional
probabilities). These are given in the formal language of the
formal proof system Isabelle/HOL. Moreover, we computer prove
Bayes- Formula. Besides, we describe an application of the presented
formalized probability distributions to cryptography. Furthermore,
this article shows that computer proofs of complex cryptographic
functions are possible by presenting an implementation of the Miller-
Rabin primality test that admits formal verification. Our achievements
are a step towards computer verification of cryptographic primitives.
They describe a basis for computer verification in cryptography.
Computer verification can be applied to further problems in cryptographic
research, if the corresponding basic mathematical knowledge
is available in a database.
Abstract: In this paper, we propose a robust scheme to work face alignment and recognition under various influences. For face representation, illumination influence and variable expressions are the important factors, especially the accuracy of facial localization and face recognition. In order to solve those of factors, we propose a robust approach to overcome these problems. This approach consists of two phases. One phase is preprocessed for face images by means of the proposed illumination normalization method. The location of facial features can fit more efficient and fast based on the proposed image blending. On the other hand, based on template matching, we further improve the active shape models (called as IASM) to locate the face shape more precise which can gain the recognized rate in the next phase. The other phase is to process feature extraction by using principal component analysis and face recognition by using support vector machine classifiers. The results show that this proposed method can obtain good facial localization and face recognition with varied illumination and local distortion.
Abstract: In this study, the locations and areas of commercial
accumulations were detected by using digital yellow page data. An
original buffering method that can accurately create polygons of
commercial accumulations is proposed in this paper.; by using this
method, distribution of commercial accumulations can be easily
created and monitored over a wide area. The locations, areas, and
time-series changes of commercial accumulations in the South Kanto
region can be monitored by integrating polygons of commercial
accumulations with the time-series data of digital yellow page data.
The circumstances of commercial accumulations were shown to vary
according to areas, that is, highly- urbanized regions such as the city
center of Tokyo and prefectural capitals, suburban areas near large
cities, and suburban and rural areas.
Abstract: Textures are replications, symmetries and
combinations of various basic patterns, usually with some random
variation one of the gray-level statistics. This article proposes a
new approach to Segment texture images. The proposed approach
proceeds in 2 stages. First, in this method, local texture information
of a pixel is obtained by fuzzy texture unit and global texture
information of an image is obtained by fuzzy texture spectrum.
The purpose of this paper is to demonstrate the usefulness of fuzzy
texture spectrum for texture Segmentation.
The 2nd Stage of the method is devoted to a decision process,
applying a global analysis followed by a fine segmentation,
which is only focused on ambiguous points. The above Proposed
approach was applied to brain image to identify the components
of brain in turn, used to locate the brain tumor and its Growth
rate.
Abstract: Star graphs are Cayley graphs of symmetric groups of permutations, with transpositions as the generating sets. A star graph is a preferred interconnection network topology to a hypercube for its ability to connect a greater number of nodes with lower degree. However, an attractive property of the hypercube is that it has a Hamiltonian decomposition, i.e. its edges can be partitioned into disjoint Hamiltonian cycles, and therefore a simple routing can be found in the case of an edge failure. The existence of Hamiltonian cycles in Cayley graphs has been known for some time. So far, there are no published results on the much stronger condition of the existence of Hamiltonian decompositions. In this paper, we give a construction of a Hamiltonian decomposition of the star graph 5-star of degree 4, by defining an automorphism for 5-star and a Hamiltonian cycle which is edge-disjoint with its image under the automorphism.
Abstract: This paper presents an algebraic approach to optimize
queries in domain-specific database management system
for protein structure data. The approach involves the introduction of
several protein structure specific algebraic operators to query the
complex data stored in an object-oriented database system. The
Protein Algebra provides an extensible set of high-level Genomic
Data Types and Protein Data Types along with a comprehensive
collection of appropriate genomic and protein functions. The paper
also presents a query translator that converts high-level query
specifications in algebra into low-level query specifications in
Protein-QL, a query language designed to query protein structure
data. The query transformation process uses a Protein Ontology that
serves the purpose of a dictionary.