The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the level of certainty and entropy elements of emotions. The two main elements are the underlying factor of emotional reaction. These two elements are chosen to be discussed due to their active and direct involvement in physiological responses. We have linked the entropy and competency level with six primitive emotions. From our observation, we conclude two non-primitive emotions...
Clustering is in the eye of beholder. Researchers have proposed many principles and models whose corresponding optimization problem can only be approximately solved by even large number of algorithms. Each algorithm emphasizes how it is different from previous algorithms. In our experiment we are comparing hierarchical and partitional clustering in terms of efficiency, intra-cluster similarity, and...
Automated programming assessment is a method to evaluate and grade studentspsila programming exercises aided by the computer. This application is developed to assess student C programming exercises based on the pseudocodes. The purpose of developing this application is to find the percentage of the pseudocode similarity between studentpsilas answer and the instructorpsilas scheme. The method used...
Generating pairwise test set when the total number of variables is prime numbers has a remarkable property in that the test case generation process can be simplified by applying straightforward strategy that does not require any storage. This paper discusses the said algebraic strategy and compares the results with the well-known orthogonal array strategy. Additionally, this paper also demonstrates...
Network congestion control is a critical issue, especially in the growing size, demand, and speed (bandwidth) of the increasingly integrated services networks. Designing effective congestion control strategies for these networks is a challenge because of the complexity of the structure of the networks, nature of the services supported, and the variety of the dynamic parameters involved. Congestion...
Malaysia has a good dengue surveillance system but there have been insufficient findings on suitable model to predict future dengue outbreak. This study aims to design a neural network model (NNM) and nonlinear regression model (NLRM) using different architectures and parameters incorporating time series, location and rainfall data to define the best architecture for early prediction of dengue outbreak...
Information Technology is not widely accepted in the higher institutions in Nigeria, due to the numerous reasons. This paper tries to provide the strategies for which Information Technology can be widely accepted in Nigerian higher institutions. It also focuses on the advantages that the Nigeria higher institutions can yield from incorporating the IT into higher institutions. The paper also used the...
Supplier selection is the most critical and complicated step in the business processes. Procurement department often responsible for providing materials and services needed to companies by evaluating and selecting suppliers. This paper proposes linear weightage model to assist in the decision making activity and helps to select the best supplier among a number of potential suppliers. In this paper,...
ICT policies are the crucial constituent of successful ICT utilization in an organization but yet their implementation is a challenging concern. This paper elucidates the important elements on achieving successful implementation in addition with high priority policies respective to three academic activities from academicianpsilas viewpoint.
Energy planning and preparation is important to ensure stability in economy and security of a nation. It depends on the accurate prediction of future demand of energy. This paper presents prediction of oil demand as one of the energy sources used in Malaysia. Mathematical model is developed from historical data to approximate the function of oil consumption. The model is approximated through nonlinear...
Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend...
The paper discusses the utilization of wireless technologies at telecentres in bridging the digital and knowledge divide whereby the research employed quantitative and qualitative research methods to 100 respondents in Perak and Terengganu. The findings are discussed with reference to the take up rate and adoption patterns of wireless technology. The quantitative analysis indicates high use of wireless...
Software product quality should be evaluated using a defined quality model. The problem with earlier models was the lack of ability to account for dependency between the quality factors. In this paper, a case study on three different Web domains, i.e., academic, e-commerce and museum has been conducted to investigate the existence of interactions and dependencies between quality factors. The Pearson...
This paper discusses on the enhancement of the current Intrusion Detection System (IDS) based on Artificial Immune System called apoptosis. Nowadays network systems are required to be more secured since the virus is now growing stronger and more dangerous. Unfortunately, not all of the Intrusion Detection System (IDS) is effective enough to defend against viruses entering the network. In this paper,...
Customer satisfaction in the electronic commerce environment has been conceptualized in a variety of ways. Studies in this area remain broad and appear relatively fragmented. This in part sets the motivation for the research. The aim of this paper is to identify the antecedents of customer satisfaction in repurchase intention in the electronic commerce environment. Searches were performed for relevant...
Our previous researches have shown the extraordinary performance of quarter sweep iteration to speed-up the original method by four times. In this paper, an experimental study is conducted to show the efficiency of the red-black quarter-sweep iteration by using the Crank-Nicolson (CN) finite difference approximation scheme to obtain numerical solutions of the first order hyperbolic equation. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.