Abstract: Design Patterns have gained more and more
acceptances since their emerging in software development world last
decade and become another de facto standard of essential knowledge
for Object-Oriented Programming developers nowadays.
Their target usage, from the beginning, was for regular computers,
so, minimizing power consumption had never been a concern.
However, in this decade, demands of more complicated software for
running on mobile devices has grown rapidly as the much higher
performance portable gadgets have been supplied to the market
continuously. To get along with time to market that is business
reason, the section of software development for power conscious,
battery, devices has shifted itself from using specific low-level
languages to higher level ones. Currently, complicated software
running on mobile devices are often developed by high level
languages those support OOP concepts. These cause the trend of
embracing Design Patterns to mobile world.
However, using Design Patterns directly in software development
for power conscious systems is not recommended because they were
not originally designed for such environment. This paper
demonstrates the adapted Design Pattern for power limitation system.
Because there are numerous original design patterns, it is not possible
to mention the whole at once. So, this paper focuses only in creating
Energy Conscious version of existing regular "Builder Pattern" to be
appropriated for developing low power consumption software.
Abstract: Both image steganography and image encryption have
advantages and disadvantages. Steganograhy allows us to hide a
desired image containing confidential information in a covered or
host image while image encryption is decomposing the desired image
to a non-readable, non-comprehended manner. The encryption
methods are usually much more robust than the steganographic ones.
However, they have a high visibility and would provoke the attackers
easily since it usually is obvious from an encrypted image that
something is hidden! The combination of steganography and
encryption will cover both of their weaknesses and therefore, it
increases the security. In this paper an image encryption method
based on sinc-convolution along with using an encryption key of 128
bit length is introduced. Then, the encrypted image is covered by a
host image using a modified version of JSteg steganography
algorithm. This method could be applied to almost all image formats
including TIF, BMP, GIF and JPEG. The experiment results show
that our method is able to hide a desired image with high security and
low visibility.
Abstract: Plant tissue culture is an important in vitro technology applied for agricultural and industrial production. A sterile condition of culture medium is one of the main aspects. The alternative technique for medium sterilization to replace autoclaving was carried out. For sterilization of plant tissue culture medium without autoclaving, ten commercial pure essential oils and 5 disinfectants were tested. Each essential oil or disinfectant was added to a 20-mL Murashige and Skoog (MS) medium before medium was solidified in a 120-mL container, kept for 2 weeks before evaluating sterile conditions. Treated media, supplemented with essential oils or disinfectants, were compared to control medium, autoclaved at 121 degree Celsius for 15 min. Sterile conditions of MS medium were found 100% from betel oil or clove oil (18 mL/20 mL medium), cinnamon oil (36 mL/20 mL medium), lavender oil or holy basil oil (108 mL/20 mL medium), and lemon oil or tea tree oil or turmeric oil (252 mL/20 mL medium), compared to 100% sterile condition from autoclaved medium. For disinfectants, 2% iodine + 2.4% potassium iodide, 2% merbromine solution, 10% povidone-iodine, 6% sodium hypochlorite or 0.1% thimerosal at 36 mL/20 mL medium provided 100% sterile conditions. Furthermore, growth of new shoots from chrysanthemum node explants on treated media (fresh weight, shoot length, root length and number of node) were also reported and discussed in the comparison of those on autoclaved medium.
Abstract: The increasing importance of FlexRay systems in
automotive domain inspires unceasingly relative researches. One
primary issue among researches is to verify the reliability of FlexRay
systems either from protocol aspect or from system design aspect.
However, research rarely discusses the effect of network topology on
the system reliability. In this paper, we will illustrate how to model
the reliability of FlexRay systems with various network topologies by
a well-known probabilistic reasoning technology, Bayesian Network.
In this illustration, we especially investigate the effectiveness of error
containment built in star topology and fault-tolerant midpoint
synchronization algorithm adopted in FlexRay communication
protocol. Through a FlexRay steer-by-wire case study, the influence
of different topologies on the failure probability of the FlexRay steerby-
wire system is demonstrated. The notable value of this research is
to show that the Bayesian Network inference is a powerful and
feasible method for the reliability assessment of FlexRay systems.
Abstract: In recent years, an increased competition and lower profit margins have necessitated a focus on improving the performance of the product development process, an area that traditionally have been excluded from detailed steering and evaluation. A systematic improvement requires a good understanding of the current performance, wherefore the interest for product development performance measurement has increased dramatically. This paper presents a case study that evaluates the performance of the product development performance measurement system used in a Swedish company that is a part of a global corporate group. The study is based on internal documentation and eighteen in-depth interviews with stakeholders involved in the product development process. The results from the case study includes a description of what metrics that are in use, how these are employed, and its affect on the quality of the performance measurement system. Especially, the importance of having a well-defined process proved to have a major impact on the quality of the performance measurement system in this particular case.
Abstract: The InAlGaN alloy has only recently began receiving
serious attention into its growth and application. High quality InGaN
films have led to the development of light emitting diodes (LEDs) and
blue laser diodes (LDs). The quaternary InAlGaN however, represents
a more versatile material since the bandgap and lattice constant can be
independently varied. We report an ultraviolet (UV) quaternary
InAlGaN multi-quantum wells (MQWs) LD study by using the
simulation program of Integrated System Engineering (ISE TCAD).
Advanced physical models of semiconductor properties were used in
order to obtain an optimized structure. The device performance which
is affected by piezoelectric and thermal effects was studied via
drift-diffusion model for carrier transport, optical gain and loss. The
optical performance of the UV LD with different numbers of quantum
wells was numerically investigated. The main peak of the emission
wavelength for double quantum wells (DQWs) was shifted from 358
to 355.8 nm when the forward current was increased. Preliminary
simulated results indicated that better output performance and lower
threshold current could be obtained when the quantum number is four,
with output power of 130 mW and threshold current of 140 mA.
Abstract: In the context of spectrum surveillance, a new method
to recover the code of spread spectrum signal is presented, while the
receiver has no knowledge of the transmitter-s spreading sequence. In
our previous paper, we used Genetic algorithm (GA), to recover
spreading code. Although genetic algorithms (GAs) are well known
for their robustness in solving complex optimization problems, but
nonetheless, by increasing the length of the code, we will often lead
to an unacceptable slow convergence speed. To solve this problem we
introduce Particle Swarm Optimization (PSO) into code estimation in
spread spectrum communication system. In searching process for
code estimation, the PSO algorithm has the merits of rapid
convergence to the global optimum, without being trapped in local
suboptimum, and good robustness to noise. In this paper we describe
how to implement PSO as a component of a searching algorithm in
code estimation. Swarm intelligence boasts a number of advantages
due to the use of mobile agents. Some of them are: Scalability, Fault
tolerance, Adaptation, Speed, Modularity, Autonomy, and
Parallelism. These properties make swarm intelligence very attractive
for spread spectrum code estimation. They also make swarm
intelligence suitable for a variety of other kinds of channels. Our
results compare between swarm-based algorithms and Genetic
algorithms, and also show PSO algorithm performance in code
estimation process.
Abstract: This paper contributes to the debate on the proximate
causes of climate change. Also, it discusses the impact of the global
temperature increases since the beginning of the twentieth century
and the effectiveness of climate change models in isolating the
primary cause (anthropogenic influences or natural variability in
temperature) of the observed temperature increases that occurred
within this period. The paper argues that if climate scientist and
policymakers ignore the anthropogenic influence (greenhouse gases)
on global warming on the pretense of lack of agreement among
various climate models and their inability to account for all the
necessary factors of global warming at all levels the current efforts of
greenhouse emissions control and global warming as a whole could
be exacerbated.
Abstract: The objective of the paper was to understand the use
of an important element of design, namely color in a Semiotic
system. Semiotics is the study of signs and sign processes, it is often
divided into three branches namely (i) Semantics that deals with the
relation between signs and the things to which they refer to mean, (ii)
Syntactics which addresses the relations among signs in formal
structures and (iii) Pragmatics that relates between signs and its
effects on they have on the people who use them to create a plan for
an object or a system referred to as design. Cubism with its versatility
was the key design tool prevalent across the 20th century. In order to
analyze the user's understanding of interaction and appreciation of
color through the movement of Cubism, an exercise was undertaken
in Dept. of Design, IIT Guwahati. This included tasks to design a
composition using color and sign process to the theme 'Between the
Lines' on a given tessellation where the users relate their work to the
world they live in, which in this case was the college campus of IIT
Guwahati. The findings demonstrate impact of the key design
element color on the principles of visual perception based on image
analysis of specific compositions.
Abstract: The pollutant removal efficiency of the Intermittently
Decanted Extended Aeration (IDEA) wastewater treatment system at
Curtin University Sarawak Campus, and conventional activated
sludge wastewater treatment system at a local resort, Resort A, is
monitored. The influent and effluent characteristics are tested during
wet and dry weather conditions, and peak and off peak periods. For
the wastewater treatment systems at Curtin Sarawak and Resort A,
during dry weather and peak season, it was found that the BOD5
concentration in the influent is 121.7mg/L and 80.0mg/L
respectively, and in the effluent, 18.7mg/L and and 18.0mg/L
respectively. Analysis of the performance of the IDEA treatment
system showed that the operational costs can be minimized by 3%, by
decreasing the number of operating cycles. As for the treatment
system in Resort A, by utilizing a smaller capacity air blower, a
saving of 12% could be made in the operational costs.
Abstract: Environmental studies have expanded dramatically all
over the world in the past few years. Nowadays businesses interact
with society and the environment in ways that put their mark on both
sides. Efforts improving human standard living, through the control
of nature and the development of new products, have also resulted in
contamination of the environment. Consequently companies play an
important role in environmental sustainability of a region or country.
Therefore we can say that a company's sustainable development is
strictly dependent on the environment. This article presents a fuzzy
model to evaluate a company's environmental impact. Article
illustrates an example of the automotive industry in order to prove the
usefulness of using such a model.
Abstract: The Partitioned Global Address Space (PGAS) programming
paradigm offers ease-of-use in expressing parallelism
through a global shared address space while emphasizing performance
by providing locality awareness through the partitioning of
this address space. Therefore, the interest in PGAS programming
languages is growing and many new languages have emerged and
are becoming ubiquitously available on nearly all modern parallel
architectures. Recently, new parallel machines with multiple cores
are designed for targeting high performance applications. Most of the
efforts have gone into benchmarking but there are a few examples of
real high performance applications running on multicore machines.
In this paper, we present and evaluate a parallelization technique
for implementing a local DNA sequence alignment algorithm using
a PGAS based language, UPC (Unified Parallel C) on a chip
multithreading architecture, the UltraSPARC T1.
Abstract: The purpose of this paper is to explore the role of
cognitive decision effort in recommendation system, combined with
indicators "information quality" and "service quality" from IS success
model to exam the awareness of the user for the "recommended system
performance". A total of 411 internet user answered a questionnaire
assessing their attention of use and satisfaction of recommendation
system in internet book store. Quantitative result indicates following
research results. First, information quality of recommended system
has obvious influence in consumer shopping decision-making process,
and the attitude to use the system. Second, in the process of consumer's
shopping decision-making, the recommendation system has no
significant influence for consumers to pay lower cognitive
decision-making effort. Third, e-commerce platform provides
recommendations and information is necessary, but the quality of
information on user needs must be considered, or they will be other
competitors offer homogeneous services replaced.
Abstract: This survey highlights a number of important issues
which relate to the needs to counseling for distance learners studying
at the School of Distance Education in University science Malaysia
(DEUSM) according to their gender. Data were obtained by selfreport
questionnaire that had been developed by the researchers in
counseling and educational psychology and interviews were take
place. 116 voluntary respondents complete the Questionnaire and
returned it back during new student-s registration week.64% of the
respondents were female and 52% were males that means
55%ofthem were females and 45% were males. The data was
analyzed to find out the frequencies of respondents agreements of the
items. The average of the female was 18 and the average of the male
was 19.6 by using t- test there is no significant values between the
genders. The findings show that respondents have needs for
counseling. (22) Significant needs for mails (DEUSM) the highest
was their families complain about the amount of time they spend at
work. (11) Significant needs for females the highest was they
convinced themselves that they only need 4 to 5 hours of sleep per
night.
Abstract: This paper presents an architecture to assist in the
development of tools to perform experimental analysis. Existing
implementations of tools based on this architecture are also described
in this paper. These tools are applied to the real world problem of
fault attack emulation and detection in cryptographic algorithms.
Abstract: Ti-6Al-4V alloy has demonstrated a high strength to
weight ratio as well as good properties at high temperature. The
successful application of the alloy in some important areas depends
on suitable joining techniques. Friction welding has many
advantageous features to be chosen for joining Titanium alloys. The
present work investigates the feasibility of producing similar metal
joints of this Titanium alloy by rotary friction welding method. The
joints are produced at three different speeds and the performances of
the welded joints are evaluated by conducting microstructure studies,
Vickers Hardness and tensile tests at the joints. It is found that the
weld joints produced are sound and the ductile fractures in the tensile
weld specimens occur at locations away from the welded joints. It is
also found that a rotational speed of 1500 RPM can produce a very
good weld, with other parameters kept constant.
Abstract: For a variety of safety and economic reasons, engineering undergraduates in Australia have experienced diminishing access to the real hardware that is typically the embodiment of their theoretical studies. This trend will delay the development of practical competence, decrease the ability to model and design, and suppress motivation. The author has attempted to address this concern by creating a software tool that contains both photographic images of real machinery, and sets of graphical modeling 'tools'. Academics from a range of disciplines can use the software to set tutorial tasks, and incorporate feedback comments for a range of student responses. An evaluation of the software demonstrated that students who had solved modeling problems with the aid of the electronic tutor performed significantly better in formal examinations with similar problems. The 2-D graphical diagnostic routines in the Tutor have the potential to be used in a wider range of problem-solving tasks.
Abstract: This paper presents the new results of energy plant –
rye and triticale at yellow ripeness and ripe, pre-treatment in high
pressure steam reactor and monosaccharide extraction. There were
investigated the influence of steam pressure (20 to 22 bar), retention
duration (180 to 240 s) and catalytic sulphuric acid concentration
strength (0 to 0.5 %) on the pre-treatment process, contents of
monosaccharides (glucose, arabinose, xylose, mannose) and
undesirable by-compounds (furfural and HMF) in the reactor. The
study has determined that the largest amount of monosaccharides
(37.2 % of glucose, 2.7 % of arabinose, 8.4 % of xylose, and 1.3 %
of mannose) was received in the rye at ripe, the samples of which
were mixed with 0.5 % concentration of catalytic sulphuric acid, and
hydrolysed in the reactor, where the pressure was 20 bar, whereas the
reaction time – 240 s.
Abstract: The consumption capability of people in China has
been a big issue to tourism business. Due to the increasing of China
tourists, Taiwan-s government rescinded the category of people in
China and opened up the non-stopped airline from China to Taiwan.
The “one-day traveling style between China and Taiwan" has formed,
hoping to bring business to Taiwan. Night market, which shows
foreigners the very local character of Taiwan, contains various
merchandise for consumers to purchase. With the increasing numbers
of non-stopped airline, visiting Taiwan-s night markets has also been
one of major activities to China-s tourists. The purpose of the present
study is to understand the consumer behavior of China tourists in
tourist night markets in Taipei and analyze that if their shopping
motives cause the different shopping behaviors and post-purchase
satisfaction and revisiting intention. The results reveled that for the
China tourists, the motives of significant influence to the shopping
behaviors. Also, the shopping behaviors significant influence to the
whole satisfaction and the whole satisfaction significant influence to
post-purchase behavior.
Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.