1,529 research outputs found

    Very Massive Stars and the Eddington Limit

    Get PDF
    We use contemporary evolutionary models for Very Massive Stars (VMS) to assess whether the Eddington limit constrains the upper stellar mass limit. We also consider the interplay between mass and age for the wind properties and spectral morphology of VMS, with reference to the recently modified classification scheme for O2-3.5If*/WN stars. Finally, the death of VMS in the local universe is considered in the context of pair instability supernovae.Comment: 6 pages, 4 figures, from "Four Decades of Massive Star Research" (Quebec, Jul 2011), ASP Conf Ser, in press (L. Drissen, C. Robert, N. St-Louis, A.F.J. Moffat, eds.

    Practical Training and the Audit Expectations Gap:The Case of Accounting Undergraduates of Universiti Utara Malaysia

    Get PDF
    The accounting profession has long faced the issue of an audit expectations gap; being the gap between the quality of the profession’s performance, its objectives and results, and that which the society expects. The profession believes that the gap could be reduced over time through education. Studies have been carried out overseas and in Malaysia to determine the effect of education in narrowing the audit expectations gap. Extending the knowledge acquired, this paper investigates whether academic internship programs could reduce the audit expectations gap in Malaysia. Using a pre-post method, the research instrument adapted from Ferguson et al. (2000) is administered to the Universiti Utara Malaysia’s accounting students at the beginning and end of their internship program. The results show there is a significant change in perceptions among students after the internship program. However, changes in perceptions do not warrant an internship program as a means of reducing the audit expectations gap as misperceptions are still found among respondents on issues of auditing after the completion of the internship program. Nevertheless, an internship program can still be used to complement audit education in a university as it is an ideal way to expose students to professional issues and enables them to have a better insight of the actual performance and duties of auditors

    A modified kohonen self-organizing map (KSOM) clustering for four categorical data

    Get PDF
    The Kohonen Self-Organizing Map (KSOM) is one of the Neural Network unsupervised learning algorithms. This algorithm is used in solving problems in various areas, especially in clustering complex data sets. Despite its advantages, the KSOM algorithm has a few drawbacks; such as overlapped cluster and non-linear separable problems. Therefore, this paper proposes a modified KSOM that inspired from pheromone approach in Ant Colony Optimization. The modification is focusing on the distance calculation amongst objects. The proposed algorithm has been tested on four real categorical data that are obtained from UCI machine learning repository; Iris, Seeds, Glass and Wisconsin Breast Cancer Database. From the results, it shows that the modified KSOM has produced accurate clustering result and all clusters can clearly be identified

    Traffic sign detection based on simple XOR and discriminative features

    Get PDF
    Traffic Sign Detection (TSD) is an important application in computer vision. It plays a crucial role in driver assistance systems, and provides drivers with safety and precaution information. In this paper, in addition to detecting Traffic Signs (TSs), the proposed technique also recognizes the shape of the TS. The proposed technique consist of two stages. The first stage is an image segmentation technique that is based on Learning Vector Quantization (LVQ), which divides the image into six different color regions. The second stage is based on discriminative features (area, color, and aspect ratio) and the exclusive OR logical operator (XOR). The output is the location and shape of the TS. The proposed technique is applied on the German Traffic Sign Detection Benchmark (GTSDB), and achieves overall detection and shape matching of around 97% and 100% respectively. The testing speed is around 0.8 seconds per image on a mainstream PC, and the technique is coded using the Matlab toolbox

    Modeling And Simulation Of Micro-Manipulator Robotic System For Neurosurgery.

    Get PDF
    This research focuses on modeling and control simulation of a micro-manipulator robotic system model for neurosurgery application

    Mapping Process of Digital Forensic Investigation Framework

    Get PDF
    Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic investigation to be performed successfully, there are a number of important steps that have to be taken into consideration. The aim of this paper is to produce the mapping process between the processes/activities and output for each phase in Digital Forensic Investigation Framework (DFIF). Existing digital forensic frameworks will be reviewed and then the mapping is constructed. The result from the mapping process will provide a new framework to optimize the whole investigation process

    Implementation of Identity Based Encryption in e-Voting System

    Get PDF
    This paper explains about the design and implementation of Identity Based Encryption (IBE) in web-based Voting application. IBE is a completely new approach to the problem of encryption which was found on the traditional Public Key Infrastructure. It can be used on any arbitrary string as a public key, enabling data to be protected without the need for certificates and reduction of infrastructure cost due to certificates database maintenance. Protection implemented in this application is a key server that controls the mapping of identities to decryption keys where the key is only one-time pad implementation. By using the IBE technique, authentication and security can be preserved in the web-based Voting application where it provides integrity, authenticity, anonymity and confidentiality in this application

    Intrusion Alert Correlation Technique Analysis for Heterogeneous Log

    Get PDF
    Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log resources as input and produce a high-level description of the malicious activity on the network. The objective of this study is to analyse the current alert correlation technique and identify the significant criteria in each technique that can improve the Intrusion Detection System(IDS) problem such as prone to alert flooding, contextual problem, false alert and scalability. The existing alert correlation techniques had been reviewed and analysed. From the analysis, six capability criteria have been identified to improve the current alert correlation technique. They are capability to do alert reduction, alert clustering,identify multistep attack, reduce false alert, detect known attack and detect unknown attack
    corecore