1,493 research outputs found

    Creativity and Entrepreneurial Tendencies Among Form Two Malaysian Students

    Get PDF
    The aim of this study is to design a reliable and valid instrument to assess entrepreneurial tendency and to investigate the relationship of entrepreneurial tendency and creative personality among form two Malaysian students. A sample of 174 form two students taking entrepreneurship as a subject were chosen randomly from the four zones in Malaysia. The validated Entrepreneurship Tendency Inventory (ETI) and a measure of creative personality characteristics, Khatena Torrance Creative Perception Inventory (KTCPI) were administered. Factor analysis revealed the existence of eight factors namely, self-employed, business confidence, business intention, business anxiety, people dependent, forced decision, low self-confidence and contingent decision with internal consistencies ranging from 0.80 (self-employed) to 0.23 (low self-confidence). Self-employed, business confidence, business intention and people dependent are found to relate positively to entrepreneurial tendency. Business Anxiety has a very low correlation with entrepreneurial tendency. Students who perceive themselves as creative based on past creative performances have high levels of initiative, place more importance on what close relatives think and prefer challenging tasks and tend to have higher entrepreneurial tendencies. Further replication of this study is recommended to confirm the reliability and validity of ETI and to further elucidate the relationship between entrepreneurial tendencies and creative personality characteristic

    Towards Personalized Prostate Cancer Therapy Using Delta-Reachability Analysis

    Full text link
    Recent clinical studies suggest that the efficacy of hormone therapy for prostate cancer depends on the characteristics of individual patients. In this paper, we develop a computational framework for identifying patient-specific androgen ablation therapy schedules for postponing the potential cancer relapse. We model the population dynamics of heterogeneous prostate cancer cells in response to androgen suppression as a nonlinear hybrid automaton. We estimate personalized kinetic parameters to characterize patients and employ δ\delta-reachability analysis to predict patient-specific therapeutic strategies. The results show that our methods are promising and may lead to a prognostic tool for personalized cancer therapy.Comment: HSCC 201

    Analogue mouse pointer control via an online steady state visual evoked potential (SSVEP) brain-computer interface

    Get PDF
    The steady state visual evoked protocol has recently become a popular paradigm in brain–computer interface (BCI) applications. Typically (regardless of function) these applications offer the user a binary selection of targets that perform correspondingly discrete actions. Such discrete control systems are appropriate for applications that are inherently isolated in nature, such as selecting numbers from a keypad to be dialled or letters from an alphabet to be spelled. However motivation exists for users to employ proportional control methods in intrinsically analogue tasks such as the movement of a mouse pointer. This paper introduces an online BCI in which control of a mouse pointer is directly proportional to a user's intent. Performance is measured over a series of pointer movement tasks and compared to the traditional discrete output approach. Analogue control allowed subjects to move the pointer faster to the cued target location compared to discrete output but suffers more undesired movements overall. Best performance is achieved when combining the threshold to movement of traditional discrete techniques with the range of movement offered by proportional control

    E-store management using bell-lapadula access control security model

    Get PDF
    Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access leve

    E-store management using bell-lapadula access control security model

    Get PDF
    Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access leve

    Improving the Feature Stability and Classification Performance of Bimodal Brain and Heart Biometrics

    Get PDF
    Electrical activities from brain (electroencephalogram, EEG) and heart (electrocardiogram, ECG) have been proposed as biometric modalities but the combined use of these signals appear not to have been studied thoroughly. Also, the feature stability of these signals has been a limiting factor for biometric usage. This paper presents results from a pilot study that reveal the combined use of brain and heart modalities provide improved classification performance and further-more, an improvement in the stability of the features over time through the use of binaural brain entrainment. The classification rate was increased, for the case of the neural network classifier from 92.4% to 95.1% and for the case of LDA, from 98.6% to 99.8%. The average standard deviation with binaural brain entrainment using all the inter-session features (from all the subjects) was 1.09, as compared to 1.26 without entrainment. This result suggests the improved stability of both the EEG and ECG features over time and hence resulting in higher classification performance. Overall, the results indicate that combining ECG and EEG gives improved classification performance and that through the use of binaural brain entrainment, both the ECG and EEG features are more stable over time

    Vortex Images and q-Elementary Functions

    Get PDF
    In the present paper problem of vortex images in annular domain between two coaxial cylinders is solved by the q-elementary functions. We show that all images are determined completely as poles of the q-logarithmic function, where dimensionless parameter q=r22/r12q = r^2_2/r^2_1 is given by square ratio of the cylinder radii. Resulting solution for the complex potential is represented in terms of the Jackson q-exponential function. By composing pairs of q-exponents to the first Jacobi theta function and conformal mapping to a rectangular domain we link our solution with result of Johnson and McDonald. We found that one vortex cannot remain at rest except at the geometric mean distance, but must orbit the cylinders with constant angular velocity related to q-harmonic series. Vortex images in two particular geometries in the qq \to \infty limit are studied.Comment: 17 page
    corecore