Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 47

Search results for: Zarina Abu Bakar

47 A Comparative Analysis of Financial Performance of Funded and Non-Funded Charity Organizations

Authors: Saunah Zainon, Ruhaya Atan, Yap Bee Wah, Zarina Abu Bakar

Abstract:

The primary objective of this study is to test whether there is any difference in performance between funded and nonfunded registered charity organizations. In this study, performance as the dependent variable is measured using total donations. Using a sample of 101 charity organizations registered with the Registry of Society, analysis of variance (ANOVA) results indicate that there is a difference in financial performance between funded and non-funded charity organizations. The study provides empirical evidence to resource providers and the policy makers in scrutinizing the decision to disburse their funds and resources to these charity organizations.

Keywords: charity organizations, donations, funded, non-funded

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1899
46 Transformation Building of Micro- Entrepreneurs: A Conceptual Model

Authors: Abu Bakar Sedek Abdul Jamak, Saridan Abu Bakar, Zulkipli Ghazali, Roselind Wan

Abstract:

The majority of micro-entrepreneurs in Malaysia operate very small-scaled business activities such as food stalls, burger stalls, night market hawkers, grocery stores, constructions, rubber and oil palm small holders, and other agro-based services and activities. Why are they venturing into entrepreneurship - is it for survival, out of interest or due to encouragement and assistance from the local government? And why is it that some micro-entrepreneurs are lagging behind in entrepreneurship, and what do they need to rectify this situation so that they are able to progress further? Furthermore, what are the skills that the micro entrepreneurs should developed to transform them into successful micro-enterprises and become small and medium-sized enterprises (SME)? This paper proposes a 7-Step approach that can serve as a basis for identification of critical entrepreneurial success factors that enable policy makers, practitioners, consultants, training managers and other agencies in developing tools to assist micro business owners. This paper also highlights the experience of one of the successful companies in Malaysia that has transformed from micro-enterprise to become a large organization in less than 10 years.

Keywords: Entrepreneurship, Micro-entrepreneurs, Transformation, Customers

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2051
45 Parallel Block Backward Differentiation Formulas For Solving Large Systems of Ordinary Differential Equations

Authors: Zarina Bibi, I., Khairil Iskandar, O.

Abstract:

In this paper, parallelism in the solution of Ordinary Differential Equations (ODEs) to increase the computational speed is studied. The focus is the development of parallel algorithm of the two point Block Backward Differentiation Formulas (PBBDF) that can take advantage of the parallel architecture in computer technology. Parallelism is obtained by using Message Passing Interface (MPI). Numerical results are given to validate the efficiency of the PBBDF implementation as compared to the sequential implementation.

Keywords: Ordinary differential equations, parallel.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1415
44 SURF Based Image Matching from Different Angle of Viewpoints using Rectification and Simplified Orientation Correction

Authors: K.M.Goh, M.M.Mokji, S.A.R. Abu-Bakar

Abstract:

Speeded-Up Robust Feature (SURF) is commonly used for feature matching in stereovision because of their robustness towards scale changes and rotational changes. However, SURF feature cannot cope with large viewpoint changes or skew distortion. This paper introduces a method which can help to improve the wide baseline-s matching performance in term of accuracy by rectifying the image using two vanishing points. Simplified orientation correction was used to remove the false matching..

Keywords: Affine, orientation, projective, SURF.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2041
43 Direct Block Backward Differentiation Formulas for Solving Second Order Ordinary Differential Equations

Authors: Zarina Bibi Ibrahim, Mohamed Suleiman, Khairil Iskandar Othman

Abstract:

In this paper, a direct method based on variable step size Block Backward Differentiation Formula which is referred as BBDF2 for solving second order Ordinary Differential Equations (ODEs) is developed. The advantages of the BBDF2 method over the corresponding sequential variable step variable order Backward Differentiation Formula (BDFVS) when used to solve the same problem as a first order system are pointed out. Numerical results are given to validate the method.

Keywords: Backward Differentiation Formula, block, secondorder.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1777
42 Big Data: Big Challenges to Privacy and Data Protection

Authors: Abu Bakar Munir, Siti Hajar Mohd Yasin, Firdaus Muhammad-Sukki

Abstract:

This paper seeks to analyse the benefits of big data and more importantly the challenges it pose to the subject of privacy and data protection. First, the nature of big data will be briefly deliberated before presenting the potential of big data in the present days. Afterwards, the issue of privacy and data protection is highlighted before discussing the challenges of implementing this issue in big data. In conclusion, the paper will put forward the debate on the adequacy of the existing legal framework in protecting personal data in the era of big data.

Keywords: Big data, data protection, information, privacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3348
41 Parallel Block Backward Differentiation Formulas for Solving Ordinary Differential Equations

Authors: Khairil Iskandar Othman, Zarina Bibi Ibrahim, Mohamed Suleiman

Abstract:

A parallel block method based on Backward Differentiation Formulas (BDF) is developed for the parallel solution of stiff Ordinary Differential Equations (ODEs). Most common methods for solving stiff systems of ODEs are based on implicit formulae and solved using Newton iteration which requires repeated solution of systems of linear equations with coefficient matrix, I - hβJ . Here, J is the Jacobian matrix of the problem. In this paper, the matrix operations is paralleled in order to reduce the cost of the iterations. Numerical results are given to compare the speedup and efficiency of parallel algorithm and that of sequential algorithm.

Keywords: Backward Differentiation Formula, block, ordinarydifferential equations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1782
40 Representing Data without Lost Compression Properties in Time Series: A Review

Authors: Nabilah Filzah Mohd Radzuan, Zalinda Othman, Azuraliza Abu Bakar, Abdul Razak Hamdan

Abstract:

Uncertain data is believed to be an important issue in building up a prediction model. The main objective in the time series uncertainty analysis is to formulate uncertain data in order to gain knowledge and fit low dimensional model prior to a prediction task. This paper discusses the performance of a number of techniques in dealing with uncertain data specifically those which solve uncertain data condition by minimizing the loss of compression properties.

Keywords: Compression properties, uncertainty, uncertain time series, mining technique, weather prediction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1393
39 Teachers- Perceptions on the Use of E-Books as Textbooks in the Classroom

Authors: Abd Mutalib Embong, Azelin M Noor, Razol Mahari M Ali, Zulqarnain Abu Bakar, Abdur- Rahman Mohamed Amin

Abstract:

At the time where electronic books, or e-Books, offer students a fun way of learning , teachers who are used to the paper text books may find it as a new challenge to use it as a part of learning process. Precisely, there are various types of e-Books available to suit students- knowledge, characteristics, abilities, and interests. The paper discusses teachers- perceptions on the use of ebooks as a paper text book in the classroom. A survey was conducted on 72 teachers who use e-books as textbooks. It was discovered that a majority of these teachers had good perceptions on the use of ebooks. However, they had little problems using the devices. It can be overcome with some strategies and a suggested framework.

Keywords: Classroom, E-books, perception, teacher.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5027
38 Boundary Segmentation of Microcalcification using Parametric Active Contours

Authors: Abdul Kadir Jumaat, Siti Salmah Yasiran, Wan Eny Zarina Wan Abd Rahman, Aminah Abdul Malek

Abstract:

A mammography image is composed of low contrast area where the breast tissues and the breast abnormalities such as microcalcification can hardly be differentiated by the medical practitioner. This paper presents the application of active contour models (Snakes) for the segmentation of microcalcification in mammography images. Comparison on the microcalcifiation areas segmented by the Balloon Snake, Gradient Vector Flow (GVF) Snake, and Distance Snake is done against the true value of the microcalcification area. The true area value is the average microcalcification area in the original mammography image traced by the expert radiologists. From fifty images tested, the result obtained shows that the accuracy of the Balloon Snake, GVF Snake, and Distance Snake in segmenting boundaries of microcalcification are 96.01%, 95.74%, and 95.70% accuracy respectively. This implies that the Balloon Snake is a better segmentation method to locate the exact boundary of a microcalcification region.

Keywords: Balloon Snake, GVF Snake, Distance Snake, Mammogram, Microcalcifications, Segmentation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1515
37 Viability of Eggshells Ash Affecting the Setting Time of Cement

Authors: Fazeera Ujin, Kamran Shavarebi Ali, Zarina Yasmin Hanur Harith

Abstract:

This research paper reports on the feasibility and viability of eggshells ash and its effects on the water content and setting time of cement. An experiment was carried out to determine the quantity of water required in order to follow standard cement paste of normal consistency in accordance with MS EN 196-3:2007. The eggshells ash passing the 90µm sieve was used in the investigation. Eggshells ash with percentage of 0%, 0.1%, 0.5%, 1.0%, 1.5% and 2.0% were constituted to replace the cement. Chemical properties of both eggshells ash and cement are compared. From the results obtained, both eggshells ash and cement have the same chemical composition and primary composition which is the calcium compounds. Results from the setting time show that by adding the eggshells ash to the cement, the setting time of the cement decreases. In short, the higher amount of eggshells ash, the faster the rate of setting and apply to all percentage of eggshells ash that were used in this investigation. Both initial and final setting times fulfill the setting time requirements by Malaysian Standard. Hence, it is suggested that eggshells ash can be used as an admixture in concrete mix.

Keywords: Construction Materials, Eggshells Ash, Solid Waste, Setting Time.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1857
36 Knowledge Management Model for Modern Retail Business: A Conceptual Framework

Authors: M. W. Yip, H. H. Ng, S. Din, N. Abu Bakar

Abstract:

This paper reviewed the relationships between the Knowledge Management (KM) activities and its perceived benefits in the knowledge based organisations. KM activities include: knowledge identification, knowledge acquisition, knowledge application, knowledge sharing, knowledge creation and knowledge preservation. And the perceived benefits of KM are fast customer responsiveness, operation excellence and high innovative intensity.  Based on the above review, a conceptual framework for KM implementation in retail business organisations has been proposed. Finally the paper forwarded some limitations of the framework and based on which, directions for future research had been suggested.

Keywords: Knowledge Management, Knowledge Management Activities, Retail Business, Knowledge Economy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4400
35 File Format of Flow Chart Simulation Software - CFlow

Authors: Syahanim Mohd Salleh, Zaihosnita Hood, Hairulliza Mohd Judi, Marini Abu Bakar

Abstract:

CFlow is a flow chart software, it contains facilities to draw and evaluate a flow chart. A flow chart evaluation applies a simulation method to enable presentation of work flow in a flow chart solution. Flow chart simulation of CFlow is executed by manipulating the CFlow data file which is saved in a graphical vector format. These text-based data are organised by using a data classification technic based on a Library classification-scheme. This paper describes the file format for flow chart simulation software of CFlow.

Keywords: CFlow, flow chart, file format.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2225
34 A Novel Hybrid Mobile Agent Based Distributed Intrusion Detection System

Authors: Amir Vahid Dastjerdi, Kamalrulnizam Abu Bakar

Abstract:

The first generation of Mobile Agents based Intrusion Detection System just had two components namely data collection and single centralized analyzer. The disadvantage of this type of intrusion detection is if connection to the analyzer fails, the entire system will become useless. In this work, we propose novel hybrid model for Mobile Agent based Distributed Intrusion Detection System to overcome the current problem. The proposed model has new features such as robustness, capability of detecting intrusion against the IDS itself and capability of updating itself to detect new pattern of intrusions. In addition, our proposed model is also capable of tackling some of the weaknesses of centralized Intrusion Detection System models.

Keywords: Distributed Intrusion Detection System, Mobile Agents, Network Security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1508
33 Comparative Study - Three Artificial Intelligence Techniques for Rain Domain in Precipitation Forecast

Authors: Nabilah Filzah Mohd Radzuan, Andi Putra, Zalinda Othman, Azuraliza Abu Bakar, Abdul Razak Hamdan

Abstract:

Precipitation forecast is important in avoid incident of natural disaster which can cause loss in involved area. This review paper involves three techniques from artificial intelligence namely logistic regression, decisions tree, and random forest which used in making precipitation forecast. These combination techniques through VAR model in finding advantages and strength for every technique in forecast process. Data contains variables from rain domain. Adaptation of artificial intelligence techniques involved on rain domain enables the process to be easier and systematic for precipitation forecast.

Keywords: Logistic regression, decisions tree, random forest, VAR model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1759
32 Investigating the Areas of Self-Reflection in Malaysian Students’ Personal Blogs: A Case Study

Authors: Chen May Oh, Nadzrah Abu Bakar

Abstract:

This case study investigates the areas of self-reflection through the written content of four university students’ blogs. The study was undertaken to explore the categories of self-reflection in relation to the use of blogs. Data collection methods included downloading students’ blog entries and recording individual interviews to further support the data. Data was analyzed using computer assisted qualitative data analysis software, Nvivo, to categories and code the data. The categories of self-reflection revealed in the findings showed that university students used blogs to reflect on (1) life in varsity, (2) emotions and feelings, (3) various relationships, (4) personal growth, (5) spirituality, (6) health conditions, (7) busyness with daily chores, (8) gifts for people and themselves and (9) personal interests. Overall, all four of the students had positive experiences and felt satisfied using blogs for self-reflection.

Keywords: Blogging, personal growth, self-reflection, university students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 990
31 Grading of Emulsified Agarwood Oil Using Gel Electrophoresis Technique

Authors: Y. T. Boon, M. N. Naim, R. Zakaria, N. F. Abu Bakar, N. Ahmad, I. W. Lenggoro

Abstract:

In this study, encapsulation of agarwood oil with non-ionic surfactant, Tween 80 was prepared at critical micelle concentration of 0.0167 % v/v to produce the most stable nano-emulsion in aqueous. The encapsulation has minimized the bioactive compounds degradation in various pH conditions thus prolong their shelf life and maintained its initial oil grade. The oil grading of the prepared samples were conducted using the gel electrophoresis instead of using common analytical industrial grading such as gas chromatography- mass spectrometry (GC- MS). The grading method was chosen due to their unique zeta potential value after the encapsulation process. This paper demonstrates the feasibility of applying the electrophoresis principles to separate the encapsulated agarwood oil or grading of the emulsified agarwood oil. The results indicated that the grading process are potential to be further investigate based on their droplet size and zeta potential value at various pH condition when the droplet were migrate through polyacrylamide gel.

Keywords: Electrophoretic mobility, essential oil, nanoemulsion, polyacrylamide gel electrophoresis, Tween 80, zeta potential.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1689
30 Designing a Motivated Tangible Multimedia System for Preschoolers

Authors: Kien Tsong Chau, Zarina Samsudin, Wan Ahmad Jaafar Wan Yahaya

Abstract:

The paper examined the capability of a prototype of a tangible multimedia system that was augmented with tangible objects in motivating young preschoolers in learning. Preschoolers’ learning behaviour is highly captivated and motivated by external physical stimuli. Hence, conventional multimedia which solely dependent on digital visual and auditory formats for knowledge delivery could potentially place them in inappropriate state of circumstances that are frustrating, boring, or worse, impede overall learning motivations. This paper begins by discussion with the objectives of the research, followed by research questions, hypotheses, ARCS model of motivation adopted in the process of macro-design, and the research instrumentation, Persuasive Multimedia Motivational Scale was deployed for measuring the level of motivation of subjects towards the experimental tangible multimedia. At the close, a succinct description of the findings of a relevant research is provided. In the research, a total of 248 preschoolers recruited from seven Malaysian kindergartens were examined. Analyses revealed that the tangible multimedia system improved preschoolers’ learning motivation significantly more than conventional multimedia. Overall, the findings led to the conclusion that the tangible multimedia system is a motivation conducive multimedia for preschoolers.

Keywords: Tangible multimedia, preschooler, motivation, multimedia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 827
29 A Review on Soft Computing Technique in Intrusion Detection System

Authors: Noor Suhana Sulaiman, Rohani Abu Bakar, Norrozila Sulaiman

Abstract:

Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data.

Keywords: Intrusion Detection System, security, soft computing, classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1642
28 Isolation and Characterization of Collagen from Chicken Feet

Authors: P. Hashim, M. S. Mohd Ridzwan, J. Bakar

Abstract:

Collagen was isolated from chicken feet by using papain and pepsin enzymes in acetic acid solution at 4°C for 24h with a yield of 18.16% and 22.94% by dry weight, respectively. Chemical composition and characteristics of chicken feet collagen such as amino acid composition, SDS-PAGE patterns, FTIR spectra and thermal properties were evaluated. The chicken feet collagen is rich in the amino acids glycine, glutamic acid, proline and hydroxyproline. Electrophoresis pattern demonstrated two distinct α-chains (α1 and α2) and β chain, indicating that type I collagen is a major component of chicken feet collagen. The thermal stability of collagen isolated by papain and pepsin revealed stable denaturation temperatures of 48.40 and 53.35°C, respectively. The FTIR spectra of both collagens were similar with amide regions in A, B, I, II and III. The study demonstrated that chicken feet collagen using papain isolation method is possible as commercial alternative ingredient. 

Keywords: Chicken feet, collagen, papain, pepsin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7191
27 Remote Sensing, GIS, and AHP for Assessing Physical Vulnerability to Tsunami Hazard

Authors: Abu Bakar Sambah, Fusanori Miura

Abstract:

Remote sensing image processing, spatial data analysis through GIS approach, and analytical hierarchy process were introduced in this study for assessing the vulnerability area and inundation area due to tsunami hazard in the area of Rikuzentakata, Iwate Prefecture, Japan. Appropriate input parameters were derived from GSI DEM data, ALOS AVNIR-2, and field data. We used the parameters of elevation, slope, shoreline distance, and vegetation density. Five classes of vulnerability were defined and weighted via pairwise comparison matrix. The assessment results described that 14.35km2 of the study area was under tsunami vulnerability zone. Inundation areas are those of high and slightly high vulnerability. The farthest area reached by a tsunami was about 7.50km from the shoreline and shows that rivers act as flooding strips that transport tsunami waves into the hinterland. This study can be used for determining a priority for land-use planning in the scope of tsunami hazard risk management.

Keywords: AHP, GIS, remote sensing, tsunami vulnerability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2968
26 Well-Being in Adolescence: Fitting Measurement Model

Authors: Azlina Abu Bakar, Abdul Fatah Wan Sidek

Abstract:

Well-being has been given special emphasis in quality of life. It involves living a meaningful, life satisfaction, stability and happiness in life. Well-being also concerns the satisfaction of physical, psychological, social needs and demands of an individual. The purpose of this study was to validate three-factor measurement model of well-being using structural equation modeling (SEM). The conceptions of well-being measured such dimensions as physical, psychological and social well-being. This study was done based on a total sample of 650 adolescents from east-coast of peninsular Malaysia. The Well-Being Scales which was adapted from [1] was used in this study. The items were hypothesized a priori to have nonzero loadings on all dimensions in the model. The findings of the SEM demonstrated that it is a good fitting model which the proposed model fits the driving theory; (x2df = 1.268; GFI = .994; CFI = .998; TLI= .996; p = .255; RMSEA = .021). Composite reliability (CR) was .93 and average variance extracted (AVE) was 58%. The model in this study fits with the sample of data and well-being is important to bring sustainable development to the mainstream.

Keywords: Adolescence, Structural Equation Modeling, Sustainable Development, Well-Being.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2783
25 Service-Oriented Enterprise Architecture (SoEA) Adoption and Maturity Measurement Model: A Systematic Literature Review

Authors: Nur Azaliah Abu Bakar, Harihodin Selamat, Mohd Nazri Kama

Abstract:

This article provides a systematic review of existing research related to the Service-oriented Enterprise Architecture (SoEA) adoption and maturity measurement model. The review’s main goals are to support research; to facilitate other researchers’ search for relevant studies; and to propose areas for future studies within this area. In addition, this article provides useful information on SoEA adoption issues and its related maturity model, based on research-based knowledge. The review results suggest that motives, critical success factors (CSFs), implementation status, and benefits are the most frequently studied areas, and that each of these areas would benefit from further exposure.

Keywords: Systematic Literature Review, Service-oriented Architecture, Adoption, Maturity Model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2690
24 Anomaly Based On Frequent-Outlier for Outbreak Detection in Public Health Surveillance

Authors: Zalizah Awang Long, Abdul Razak Hamdan, Azuraliza Abu Bakar

Abstract:

Public health surveillance system focuses on outbreak detection and data sources used. Variation or aberration in the frequency distribution of health data, compared to historical data is often used to detect outbreaks. It is important that new techniques be developed to improve the detection rate, thereby reducing wastage of resources in public health. Thus, the objective is to developed technique by applying frequent mining and outlier mining techniques in outbreak detection. 14 datasets from the UCI were tested on the proposed technique. The performance of the effectiveness for each technique was measured by t-test. The overall performance shows that DTK can be used to detect outlier within frequent dataset. In conclusion the outbreak detection technique using anomaly-based on frequent-outlier technique can be used to identify the outlier within frequent dataset.

Keywords: Outlier detection, frequent-outlier, outbreak, anomaly, surveillance, public health

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2025
23 Decision Tree for Competing Risks Survival Probability in Breast Cancer Study

Authors: N. A. Ibrahim, A. Kudus, I. Daud, M. R. Abu Bakar

Abstract:

Competing risks survival data that comprises of more than one type of event has been used in many applications, and one of these is in clinical study (e.g. in breast cancer study). The decision tree method can be extended to competing risks survival data by modifying the split function so as to accommodate two or more risks which might be dependent on each other. Recently, researchers have constructed some decision trees for recurrent survival time data using frailty and marginal modelling. We further extended the method for the case of competing risks. In this paper, we developed the decision tree method for competing risks survival time data based on proportional hazards for subdistribution of competing risks. In particular, we grow a tree by using deviance statistic. The application of breast cancer data is presented. Finally, to investigate the performance of the proposed method, simulation studies on identification of true group of observations were executed.

Keywords: Competing risks, Decision tree, Simulation, Subdistribution Proportional Hazard.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2130
22 3D CAD Models and its Feature Similarity

Authors: Elmi Abu Bakar, Tetsuo Miyake, Zhong Zhang, Takashi Imamura

Abstract:

Knowing the geometrical object pose of products in manufacturing line before robot manipulation is required and less time consuming for overall shape measurement. In order to perform it, the information of shape representation and matching of objects is become required. Objects are compared with its descriptor that conceptually subtracted from each other to form scalar metric. When the metric value is smaller, the object is considered closed to each other. Rotating the object from static pose in some direction introduce the change of value in scalar metric value of boundary information after feature extraction of related object. In this paper, a proposal method for indexing technique for retrieval of 3D geometrical models based on similarity between boundaries shapes in order to measure 3D CAD object pose using object shape feature matching for Computer Aided Testing (CAT) system in production line is proposed. In experimental results shows the effectiveness of proposed method.

Keywords: CAD, rendering, feature extraction, feature classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1720
21 Effects of Stiffness on Endothelial Cells Behavior

Authors: Forough Ataollahi, Belinda Pingguan-Murphy, Wan Abu Bakar Wan Abas, Noor Azuan Abu Osman

Abstract:

Endothelium proliferation is an important process in cardiovascular homeostasis and can be regulated by extracellular environment, as cells can actively sense mechanical environment. In this study, we evaluated endothelial cell proliferation on PDMS/alumina (Al2O3) composites and pure PDMS. The substrates were prepared from pure PDMS and its composites with 5% and 10% Al2O3 at curing temperature 50˚C for 4h and then characterized by mechanical, structural and morphological analyses. Higher stiffness was found in the composites compared to the pure PDMS substrate. Cell proliferation of the cultured bovine aortic endothelial cells on substrate materials were evaluated via Resazurin assay and 1, 1’-Dioctadecyl-1, 3, 3, 3’, 3’-Tetramethylindocarbocyanine Perchlorate-Acetylated LDL (Dil-Ac-LDL) cell staining, respectively. The results revealed that stiffer substrates promote more endothelial cells proliferation to the less stiff substrates. Therefore, this study firmly hypothesizes that the stiffness elevates endothelial cells proliferation.

Keywords: Bovine aortic endothelial cells, extra cellular matrix, proliferation, stiffness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2402
20 Induction of Apoptosis by Newcastle Disease Virus Strains AF220 and V4-UPM in Human Promyelocytic Leukemia (HL60) and Human T-Lymphoblastic Leukemia (CEM-SS) Cells

Authors: Siti Aishah Abu Bakar, Madihah Zawawi, Abdul Manaf Ali, Aini Ideris

Abstract:

Newcastle Disease Virus (NDV), an avian paramyxovirus, is a highly contagious, generalised virus disease of domestic poultry and wild birds characterized by gastro-intestinal, respiratory and nervous signs. In this study, it was shown that NDV strain AF2240 and V4-UPM are cytolytic to Human Promyelocytic Leukemia, HL60 and Human T-lymphoblastic Leukemia, CEM-SS cells. Results from MTT cytolytic assay showed that CD50 for NDV AF2240 against HL60 was 130 HAU and NDV V4-UPM against HL60 and CEM-SS were 110.6 and 150.9 HAU respectively. Besides, both strains were found to inhibit the proliferation of cells in a dose dependent manner. The mode of cell death either by apoptosis or necrosis was further analyzed using acridine orange and propidium iodide (AO/PI) staining. Our results showed that both NDV strains induced primarily apoptosis in treated cells at CD50 concentration. In conclusion, both NDV strains caused cytolytic effects primarily via apoptosis in leukemia cells.

Keywords: Apoptosis, Cytolytic, Leukaemia, Newcastle DiseaseVirus

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1707
19 Entrepreneurial Challenges Confronting Micro Enterprise of Malaysian Malays

Authors: Abu Bakar Sedek Abdul Jamak, Rohani Salleh, Subarna Sivapalan, Azrai Abdullah

Abstract:

This research focuses on micro-enterprise of Malaysian Malays that are involved in very small-scaled business activities. Among them include food stall and burger stall operators, night market hawkers, grocery store operators as well as construction and small service activities works. The study seeks to explore why some micro-entrepreneurs still lag in entrepreneurship and what needs to be rectified. This quantitative study is conducted on 173 Malay micro-enterprise owners (MEOs) and 58 Malay failed microenterprise owners (FMEOs) involved in all range of businesses throughout the state of Perak, Malaysia. The main aims are to identify the gaps between the failed micro-enterprise owners (FMEOs) and existing micro-enterprise owners (MEOs) and the problems faced among FMEOs. The results reveal that the MEOs had strong motivations and better marketing approaches as compared to FMEOs. Furthermore, the FMEOs failed in the business ventures mainly due to lack of management, sales and marketing skills and poor competitive abilities to keep up with rivals.

Keywords: Micro-enterprises, Malays, entrepreneurship, Malaysia

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3706
18 Numerical Study of Airfoils Aerodynamic Performance in Heavy Rain Environment

Authors: M. Ismail, Cao Yihua, Zhao Ming, Abu Bakar

Abstract:

Heavy rainfall greatly affects the aerodynamic performance of the aircraft. There are many accidents of aircraft caused by aerodynamic efficiency degradation by heavy rain. In this Paper we have studied the heavy rain effects on the aerodynamic efficiency of cambered NACA 64-210 and symmetric NACA 0012 airfoils. Our results show significant increase in drag and decrease in lift. We used preprocessing software gridgen for creation of geometry and mesh, used fluent as solver and techplot as postprocessor. Discrete phase modeling called DPM is used to model the rain particles using two phase flow approach. The rain particles are assumed to be inert. Both airfoils showed significant decrease in lift and increase in drag in simulated rain environment. The most significant difference between these two airfoils was the NACA 64-210 more sensitivity than NACA 0012 to liquid water content (LWC). We believe that the results showed in this paper will be useful for the designer of the commercial aircrafts and UAVs, and will be helpful for training of the pilots to control the airplanes in heavy rain.

Keywords: airfoil, discrete phase modeling, heavy rain, Reynolds

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1926