The poor performance of the agricultural sector as reflected in high prices of food stuffs as well as huge importation of food has been a major concern to many governments in Africa. Agriculture remains the backbone o...The poor performance of the agricultural sector as reflected in high prices of food stuffs as well as huge importation of food has been a major concern to many governments in Africa. Agriculture remains the backbone of Ghana's economy and women who constitute about 70% to 80% of farm labour face discrimination in terms of means of production such as land. The purpose of this study is to assess the impact of women's land rights on food production in the Brong-Ahafo region which is Ghana's food basket. Several land reforms have been instituted to ensure equitable access to land in order to enhance food production, yet the study reveals that many women have limited or no access to land and experience insecurity of tenure, which affects their farming methods, choice of crops grown, and production levels, consequently, resulting in low incomes and poverty. Relevant Primary Rate Access (RPRA) tools were used to gather data. The data were analyzed through descriptive statistics using Statistic Package for Social Science (SPSS) and Microsoft soRwares and presented into percentages, tabulation, and graphics. The research also revealed that the lack of awareness and education on land reforms and policies coupled with escalating land prices and complicated land transaction method are the major challenges to women's access and security over land. The study recommends the decentralization of the land title registration process, gender mainstreaming in the land title registration process, and intensification of advocacy on land rights, among others as crucial to improve women's access, control, and security over land for agricultural purposes展开更多
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are ...As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.展开更多
Mixed-weight least-squares (MWLS) predictive control algorithm, compared with quadratic programming (QP) method, has the advantages of reducing the computer burden, quick calculation speed and dealing with the case in...Mixed-weight least-squares (MWLS) predictive control algorithm, compared with quadratic programming (QP) method, has the advantages of reducing the computer burden, quick calculation speed and dealing with the case in which the optimization is infeasible. But it can only deal with soft constraints. In order to deal with hard constraints and guarantee feasibility, an improved algorithm is proposed by recalculating the setpoint according to the hard constraints before calculating the manipulated variable and MWLS algorithm is used to satisfy the requirement of soft constraints for the system with the input constraints and output constraints. The algorithm can not only guarantee stability of the system and zero steady state error, but also satisfy the hard constraints of input and output variables. The simulation results show the improved algorithm is feasible and effective.展开更多
Inconsistency of multi-perspective requirements specifications is a pervasive issue during the requirements process. However, managing inconsistency is not just a pure technical problem. It is always associated with a...Inconsistency of multi-perspective requirements specifications is a pervasive issue during the requirements process. However, managing inconsistency is not just a pure technical problem. It is always associated with a process of interactions and competitions among corresponding stakeholders. The main contribution of this paper is to present a negotiations approach to handling inconsistencies in multi-perspective software requirements. In particular, the priority of requirements relative to each perspective plays an important role in proceeding negotiation over resolving inconsistencies among different stakeholders. An algorithm of generating negotiation proposals and an approach to evaluating proposals are also presented in this paper, respectively.展开更多
文摘The poor performance of the agricultural sector as reflected in high prices of food stuffs as well as huge importation of food has been a major concern to many governments in Africa. Agriculture remains the backbone of Ghana's economy and women who constitute about 70% to 80% of farm labour face discrimination in terms of means of production such as land. The purpose of this study is to assess the impact of women's land rights on food production in the Brong-Ahafo region which is Ghana's food basket. Several land reforms have been instituted to ensure equitable access to land in order to enhance food production, yet the study reveals that many women have limited or no access to land and experience insecurity of tenure, which affects their farming methods, choice of crops grown, and production levels, consequently, resulting in low incomes and poverty. Relevant Primary Rate Access (RPRA) tools were used to gather data. The data were analyzed through descriptive statistics using Statistic Package for Social Science (SPSS) and Microsoft soRwares and presented into percentages, tabulation, and graphics. The research also revealed that the lack of awareness and education on land reforms and policies coupled with escalating land prices and complicated land transaction method are the major challenges to women's access and security over land. The study recommends the decentralization of the land title registration process, gender mainstreaming in the land title registration process, and intensification of advocacy on land rights, among others as crucial to improve women's access, control, and security over land for agricultural purposes
基金This work was supported by Deakin Cyber Security Research Cluster National Natural Science Foundation of China under Grant Nos. 61304067 and 61202211 +1 种基金 Guangxi Key Laboratory of Trusted Software No. kx201325 the Fundamental Research Funds for the Central Universities under Grant No 31541311314.
文摘As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.
基金National Key Basic Research and Development(No.2002CB312200)
文摘Mixed-weight least-squares (MWLS) predictive control algorithm, compared with quadratic programming (QP) method, has the advantages of reducing the computer burden, quick calculation speed and dealing with the case in which the optimization is infeasible. But it can only deal with soft constraints. In order to deal with hard constraints and guarantee feasibility, an improved algorithm is proposed by recalculating the setpoint according to the hard constraints before calculating the manipulated variable and MWLS algorithm is used to satisfy the requirement of soft constraints for the system with the input constraints and output constraints. The algorithm can not only guarantee stability of the system and zero steady state error, but also satisfy the hard constraints of input and output variables. The simulation results show the improved algorithm is feasible and effective.
基金This research is supported in part by the National Natural Science Foundation of China under Grant No.60703061the National Natural Science Fund for Distinguished Young Scholars of China under Grant No.60625204+3 种基金the National Key Research and Development Program of China under Grant No.2002CB312004the National 863 High-tech Project of China under Grant No.2006AA01Z155the Key Project of National Natural Science Foundation of China under Grant No.60496324the International Science Linkage Research Grant under the Australia-China Special Fund for Science and Technology
文摘Inconsistency of multi-perspective requirements specifications is a pervasive issue during the requirements process. However, managing inconsistency is not just a pure technical problem. It is always associated with a process of interactions and competitions among corresponding stakeholders. The main contribution of this paper is to present a negotiations approach to handling inconsistencies in multi-perspective software requirements. In particular, the priority of requirements relative to each perspective plays an important role in proceeding negotiation over resolving inconsistencies among different stakeholders. An algorithm of generating negotiation proposals and an approach to evaluating proposals are also presented in this paper, respectively.