12 research outputs found

    Simulation of undular bores evolution with damping

    Get PDF
    Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent boundary layers in the fluid flow are considered. Solving the peKdV equation numerically using the method of lines shows that under the influence of damping, the lead-ing solitary wave of the undular bores will split from the nonlinear wavetrain, propagates and behaves like an isolated solitary wave. The amplitude of the leading wave will remain the same for some times before it starts to decay again at a larger time. In general the amplitude of the leading wave and the mean level across the undular bore decreases due to the effect of damping

    Mathematical Formulae Book

    Get PDF

    Real life working shift assignment problem

    Get PDF
    This study concerns about the working shift assignme\nt in an outlet of Supermarket X in Eastern Mall, Kuching. The working shift assignment needs to be solved at least once in every month. Current approval process of working shifts is too troublesome and time-consuming. Furthermore, the management staff cannot have an overview of manpower and working shift schedule. Thus, the aim of this study is to develop working shift assignment simulation and propose a working shift assignment solution. The main objective for this study is to fulfill manpower demand at minimum operation cost. Besides, the day off and meal break policy should be fulfilled accordingly. Demand based heuristic is proposed to assign working shift and the quality of the solution is evaluated by using the real data

    Voting behaviour in Singapore: A preliminary investigation from a multi-attribute attitudinal perspective

    Get PDF
    10.1007/BF01733770Asia Pacific Journal of Management62293-30

    Utilisation of website logo for phishing detection

    No full text
    Phishing is a security threat which combines social engineering and website spoofing techniques to deceive users into revealing confidential information. In this paper, we propose a phishing detection method to protect Internet users from the phishing attacks. In particular, given a website, our proposed method will be able to detect if it is a phishing website. We use a logo image to determine the identity consistency between the real and the portrayed identity of a website. Consistent identity indicates a legitimate website and inconsistent identity indicates a phishing website. The proposed method consists of two processes, namely logo extraction and identity verification. The first process will detect and extract the logo image from all the downloaded image resources of a webpage. In order to detect the right logo image, we utilise a machine learning technique. Based on the extracted logo image, the second process will employ the Google image search to retrieve the portrayed identity. Since the relationship between the logo and domain name is exclusive, it is reasonable to treat the domain name as the identity. Hence, a comparison between the domain name returned by Google with the one from the query website will enable us to differentiate a phishing from a legitimate website. The conducted experiments show reliable and promising results. This proves the effectiveness and feasibility of using a graphical element such as a logo to detect a phishing website

    Numerical Solution of the Gardner Equation

    No full text
    The Gardner equation is commonly used to describe wave propagation in weakly nonlinear dispersive medium. The Gardner equation has a higher order nonlinear term, which could make the numerical calculation inaccurate. In this paper, the Gardner equation is solved using two numerical methods, i.e., the method of lines and pseudospectral method. The efficiency and accuracy of both methods were studied. Our results show that both methods are accurate and efficient methods to solve the Gardner equation. By comparing the accuracy of both the methods, the method of lines performs better than pseudospectral method most of the time

    The utilization of Boari flap vesicocalycostomy for salvage repair of kidney transplant ureteric injury after robotic radical prostatectomy

    No full text
    10.1111/ajt.14579American Journal of Transplantation1841035-1036AJTM
    corecore