Abstract: Ti6Al4V alloy is highly used in the automotive and
aerospace industry due to its good machining characteristics. Micro
EDM drilling is commonly used to drill micro hole on extremely hard
material with very high depth to diameter ratio. In this study, the
parameters of micro-electrical discharge machining (EDM) in drilling
of Ti6Al4V alloy is optimized for higher machining accuracy with
less hole-dilation and hole taper ratio. The micro-EDM machining
parameters includes, peak current and pulse on time. Fuzzy analysis
was developed to evaluate the machining accuracy. The analysis
shows that hole-dilation and hole-taper ratio are increased with the
increasing of peak current and pulse on time. However, the surface
quality deteriorates as the peak current and pulse on time increase.
The combination that gives the optimum result for hole dilation is
medium peak current and short pulse on time. Meanwhile, the
optimum result for hole taper ratio is low peak current and short pulse
on time.
Abstract: Blueberries are widely valued for their high content in
phenolic compounds with antioxidant activity, and hence beneficial
for the human health. In this way, a study was done to determine the
phenolic composition (total phenols, anthocyanins and tannins) and
antioxidant activity of blueberries from three cultivars (Duke,
Bluecrop, and Ozarkblue) grown in two different Portuguese farms.
Initially two successive extractions were done with methanol
followed by two extractions with aqueous acetone solutions. These
extracts obtained were then used to evaluate the amount of phenolic
compounds and the antioxidant activity. The total phenols were
observed to vary from 4.9 to 8.2 mg GAE/g fresh weight, with
anthocyanin’s contents in the range 1.5-2.8 mg EMv3G/g and tannins
contents in the range 1.5- 3.8 mg/g. The results for antioxidant
activity ranged from 9.3 to 23.2 molTE/g and from 24.7 to 53.4molTE/g, when measured, respectively, by DPPH and ABTS
methods. In conclusion it was observed that, in general, the cultivar
had a visible effect on the phenols present, and furthermore, the
geographical origin showed relevance either in the phenols contents
or the antioxidant activity.
Abstract: In this paper, groundwater seepage into Amirkabir
tunnel has been estimated using analytical and numerical methods for
14 different sections of the tunnel. Site Groundwater Rating (SGR)
method also has been performed for qualitative and quantitative
classification of the tunnel sections. The obtained results of above
mentioned methods were compared together. The study shows
reasonable accordance with results of the all methods unless for two
sections of tunnel. In these two sections there are some significant
discrepancies between numerical and analytical results mainly
originated from model geometry and high overburden. SGR and the
analytical and numerical calculations, confirm high concentration of
seepage inflow in fault zones. Maximum seepage flow into tunnel has
been estimated 0.425 lit/sec/m using analytical method and 0.628
lit/sec/m using numerical method occured in crashed zone. Based on
SGR method, six sections of 14 sections in Amirkabir tunnel axis are
found to be in "No Risk" class that is supported by the analytical and
numerical seepage value of less than 0.04 lit/sec/m.
Abstract: The implementation of e-assessment as tool to support
the process of teaching and learning in university has become a
popular technological means in universities. E-Assessment provides
many advantages to the users especially the flexibility in teaching and
learning. The e-assessment system has the capability to improve its
quality of delivering education. However, there still exists a
drawback in terms of security which limits the user acceptance of the
online learning system. Even though there are studies providing
solutions for identified security threats in e-learning usage, there is no
particular model which addresses the factors that influences the
acceptance of e-assessment system by lecturers from security
perspective. The aim of this study is to explore security aspects of eassessment
in regard to the acceptance of the technology. As a result
a conceptual model of secure acceptance of e-assessment is proposed.
Both human and security factors are considered in formulation of this
conceptual model. In order to increase understanding of critical issues
related to the subject of this study, interpretive approach involving
convergent mixed method research method is proposed to be used to
execute the research. This study will be useful in providing more
insightful understanding regarding the factors that influence the user
acceptance of e-assessment system from security perspective.
Abstract: Established objective and subjective preconditions for
entrepreneurship, forming the business organically related whole, are
the necessary condition of successful entrepreneurial activities.
Objective preconditions for entrepreneurship are developed by
market economy that should stimulate entrepreneurship by allowing
the use of economic opportunities for all those who want to do
business in respective field while providing guarantees to all owners
and creating a stable business environment for entrepreneurs.
Subjective preconditions of entrepreneurship are formed primarily by
personal characteristics of the entrepreneur. These are his properties,
abilities, skills, physiological and psychological preconditions which
may be inherited, inborn or sequentially developed and obtained
during his life on the basis of education and influences of
surrounding environment. The paper is dealing with issues of
objective and subjective preconditions for entrepreneurship and
provides their analysis in view of the current situation in Slovakia. It
presents risks of the business environment in Slovakia that the Slovak
managers considered the most significant in 2014 and defines the
dominant attributes of the entrepreneur in the current business
environment in Slovakia.
Abstract: This experimental study evaluates the effect of using
Cognitive-Behavioral Therapy (CBT) and Multidimensional Self-
Concept Model (MSCM) in a drug prevention programme to increase
resiliency and reduce aggression among at-risk youth in Malaysia. A
number of 60 (N=60) university students who were at-risk of taking
drugs were involved in this study. Participants were identified with
self-rating scales, Adolescent Resilience Attitude Scale (ARAS) and
Aggression Questionnaire. Based on the mean score of these
instruments, the participants were divided into the treatment group,
and the control group. Data were analyzed using t-test. The finding
showed that the mean score of resiliency was increased in the
treatment group compared to the control group. It also shows that the
mean score of aggression was reduced in the treatment group
compared to the control group. Drug Prevention Programme was
found to help in enhancing resiliency and reducing aggression among
participants in the treatment group compared to the controlled group.
Implications were given regarding the preventive actions on drug
abuse among youth in Malaysia.
Abstract: China is currently the world's largest producer and distributor of electric bicycle (e-bike). The increasing number of e-bikes on the road is accompanied by rising injuries and even deaths of e-bike drivers. Therefore, there is a growing need to improve the safety structure of e-bikes. This 3D frictionless contact analysis is a preliminary, but necessary work for further structural design improvement of an e-bike. The contact analysis between e-bike and the ground was carried out as follows: firstly, the Penalty method was illustrated and derived from the simplest spring-mass system. This is one of the most common methods to satisfy the frictionless contact case; secondly, ANSYS static analysis was carried out to verify finite element (FE) models with contact pair (without friction) between e-bike and the ground; finally, ANSYS transient analysis was used to obtain the data of the penetration p(u) of e-bike with respect to the ground. Results obtained from the simulation are as estimated by comparing with that from theoretical method. In the future, protective shell will be designed following the stability criteria and added to the frame of e-bike. Simulation of side falling of the improvedsafety structure of e-bike will be confirmed with experimental data.
Abstract: Risk analysis is considered as a fundamental aspect
relevant for ensuring the level of critical infrastructure protection,
where the critical infrastructure is seen as system, asset or its part
which is important for maintaining the vital societal functions. Article
actually discusses and analyzes the potential application of selected
tools of information support for the implementation and within the
framework of risk analysis and critical infrastructure protection. Use
of the information in relation to their risk analysis can be viewed as a
form of simplifying the analytical process. It is clear that these
instruments (information support) for these purposes are countless, so
they were selected representatives who have already been applied in
the selected area of critical infrastructure, or they can be used. All
presented fact were the basis for critical infrastructure resilience
evaluation methodology development.
Abstract: Employers occupational safety and health training
obligations are regulated in 89/391/EEC Framework Directive and
also in 6331 numbered Occupational Health and Safety Law in
Turkey.
The main objective of this research is to determine and evaluate
the employers’ occupational health and safety training obligations in
Framework Directive in comparison with the 6331 numbered
Occupational Health and Safety Law and to examine training
principles in Turkey. For this purpose, employers’ occupational
health and safety training obligations examined in Framework
Directive and Occupational Health and Safety Law. This study
carried out through comparative scanning model and literature model.
The research data were collected through European Agency and
ministry legislations.
As a result, employers’ occupational health and safety training
obligations in the 6331 numbered Occupational Health and Safety
Law are compatible with the 89/391/EEC numbered Framework
Directive and training principles are determined by in different ways
like the trained workers, training issues, training period, training time
and trainers. In this study, employers’ training obligations are
evaluated in detail.
Abstract: The aim of this work is to build a model based on
tissue characterization that is able to discriminate pathological and
non-pathological regions from three-phasic CT images. With our
research and based on a feature selection in different phases, we are
trying to design a neural network system with an optimal neuron
number in a hidden layer. Our approach consists of three steps:
feature selection, feature reduction, and classification. For each
region of interest (ROI), 6 distinct sets of texture features are
extracted such as: first order histogram parameters, absolute gradient,
run-length matrix, co-occurrence matrix, autoregressive model, and
wavelet, for a total of 270 texture features. When analyzing more
phases, we show that the injection of liquid cause changes to the high
relevant features in each region. Our results demonstrate that for
detecting HCC tumor phase 3 is the best one in most of the features
that we apply to the classification algorithm. The percentage of
detection between pathology and healthy classes, according to our
method, relates to first order histogram parameters with accuracy of
85% in phase 1, 95% in phase 2, and 95% in phase 3.
Abstract: Wind energy offers a significant advantage such as no
fuel costs and no emissions from generation. However, wind energy
sources are variable and non-dispatchable. The utility grid is able to
accommodate the variability of wind in smaller proportion along with
the daily load. However, at high penetration levels, the variability can
severely impact the utility reserve requirements and the cost
associated with it. In this paper the impact of wind energy is
evaluated in detail in formulating the total utility cost. The objective
is to minimize the overall cost of generation while ensuring the
proper management of the load. Overall cost includes the curtailment
cost, reserve cost and the reliability cost, as well as any other penalty
imposed by the regulatory authority. Different levels of wind
penetrations are explored and the cost impacts are evaluated. As the
penetration level increases significantly, the reliability becomes a
critical question to be answered. Here we increase the penetration
from the wind yet keep the reliability factor within the acceptable
limit provided by NERC. This paper uses an economic dispatch (ED)
model to incorporate wind generation into the power grid. Power
system costs are analyzed at various wind penetration levels using
Linear Programming. The goal of this study is show how the
increases in wind generation will affect power system economics.
Abstract: The wide use of the Internet-based applications bring many challenges to the researchers to guarantee the continuity of the connections needed by the mobile hosts and provide reliable Internet access for them. One of proposed solutions by Internet Engineering Task Force (IETF) is to connect the local, multi-hop, and infrastructure-less Mobile Ad hoc Network (MANET) with Internet structure. This connection is done through multi-interface devices known as Internet Gateways. Many issues are related to this connection like gateway discovery, handoff, address auto-configuration and selecting the optimum gateway when multiple gateways exist. Many studies were done proposing gateway selection schemes with a single selection criterion or weighted multiple criteria. In this research, a review of some of these schemes is done showing the differences, the features, the challenges and the drawbacks of each of them.
Abstract: The edges of low contrast images are not clearly
distinguishable to human eye. It is difficult to find the edges and
boundaries in it. The present work encompasses a new approach for
low contrast images. The Chebyshev polynomial based fractional
order filter has been used for filtering operation on an image. The
preprocessing has been performed by this filter on the input image.
Laplacian of Gaussian method has been applied on preprocessed
image for edge detection. The algorithm has been tested on two test
images.
Abstract: Standard processes, similar and limited production
lines, the production of high direct costs will be more accurate than
the use of parts of the traditional cost systems in the literature.
However, direct costs, overhead expenses, in turn, decrease the
burden of increasingly sophisticated production facilities, a situation
that led the researchers to look for the cost of traditional systems of
alternative techniques. Variety cost management approaches for
example Total quality management (TQM), just-in-time (JIT),
benchmarking, kaizen costing, targeting cost, life cycle costs (LLC),
activity-based costing (ABC) value engineering have been
introduced. Management and cost applications have changed over the
past decade and will continue to change. Modern cost systems can
provide relevant and accurate cost information. These methods
provide the decisions about customer, product and process
improvement. The aim of study is to describe and explain the
adoption and application of costing systems in SME. This purpose
reports on a survey conducted during 2014 small and medium sized
enterprises (SME) in Ankara. The survey results were evaluated
using SPSS18 package program.
Abstract: The English competence of Thai people was examined
in the context of knowledge of English in everyday life for Small and
Medium Entrepreneurs (SMEs), and also integrated with Second
language acquisition (SLA) students’ classroom. Second language
acquisition was applied to the results of the questionnaires and
interview forms. Levels of the need on English used for SME
entrepreneurs in Thailand, satisfaction on joining the street classroom
project were shown to be significantly high for some certain language
functions and satisfaction. Finding suggests that the language
functions on etiquette for professional use is essential and useful
because lesson learned can be used in the real situation for their
career. Implications for the climate of the street classroom are
discussed.
Abstract: Living today in turbulent business environment forces
companies to distinguish from each other, securing sustainable
competitive growth and competitive advantage. The best possible
solution is to invest (effort and financial resources) within
companies’ different practices of human resource management
(HRM), more specifically in employees’ knowledge, skills and
abilities. Applying this approach companies will create enviable level
of human capital securing its economic growth. Employees become
human capital for their employers at the moment when they
contribute with their own knowledge and abilities in creating material
and non-material value of the company. The main aim of this
research is to explore the relations between human capital
investments and business excellence of Croatian companies.
Furthermore, the differences in the level of human capital
investments with regard to several companies’ characteristics (e.g.
size of the company, ownership and type of the industry) are
investigated.
Abstract: Constructing a portfolio of investments is one of the
most significant financial decisions facing individuals and
institutions. In accordance with the modern portfolio theory
maximization of return at minimal risk should be the investment goal
of any successful investor. In addition, the costs incurred when
setting up a new portfolio or rebalancing an existing portfolio must
be included in any realistic analysis.
In this paper rebalancing an investment portfolio in the presence of
transaction costs on the Croatian capital market is analyzed. The
model applied in the paper is an extension of the standard portfolio
mean-variance optimization model in which transaction costs are
incurred to rebalance an investment portfolio. This model allows
different costs for different securities, and different costs for buying
and selling. In order to find efficient portfolio, using this model, first,
the solution of quadratic programming problem of similar size to the
Markowitz model, and then the solution of a linear programming
problem have to be found. Furthermore, in the paper the impact of
transaction costs on the efficient frontier is investigated. Moreover, it
is shown that global minimum variance portfolio on the efficient
frontier always has the same level of the risk regardless of the amount
of transaction costs. Although efficient frontier position depends of
both transaction costs amount and initial portfolio it can be concluded
that extreme right portfolio on the efficient frontier always contains
only one stock with the highest expected return and the highest risk.
Abstract: Development of a method to estimate gene functions is
an important task in bioinformatics. One of the approaches for the
annotation is the identification of the metabolic pathway that genes are
involved in. Since gene expression data reflect various intracellular
phenomena, those data are considered to be related with genes’
functions. However, it has been difficult to estimate the gene function
with high accuracy. It is considered that the low accuracy of the
estimation is caused by the difficulty of accurately measuring a gene
expression. Even though they are measured under the same condition,
the gene expressions will vary usually. In this study, we proposed a
feature extraction method focusing on the variability of gene
expressions to estimate the genes' metabolic pathway accurately. First,
we estimated the distribution of each gene expression from replicate
data. Next, we calculated the similarity between all gene pairs by KL
divergence, which is a method for calculating the similarity between
distributions. Finally, we utilized the similarity vectors as feature
vectors and trained the multiclass SVM for identifying the genes'
metabolic pathway. To evaluate our developed method, we applied the
method to budding yeast and trained the multiclass SVM for
identifying the seven metabolic pathways. As a result, the accuracy
that calculated by our developed method was higher than the one that
calculated from the raw gene expression data. Thus, our developed
method combined with KL divergence is useful for identifying the
genes' metabolic pathway.
Abstract: A Disaster Management System (DMS) is very important for countries with multiple disasters, such as Chile. In the world (also in Chile)different disasters (earthquakes, tsunamis, volcanic eruption, fire or other natural or man-made disasters) happen and have an effect on the population. It is also possible that two or more disasters occur at the same time. This meansthata multi-risk situation must be mastered. To handle such a situation a Decision Support System (DSS) based on multiagents is a suitable architecture. The most known DMSs are concernedwith only a singledisaster (sometimes thecombination of earthquake and tsunami) and often with a particular disaster. Nevertheless, a DSS helps for a better real-time response. Analyze the existing systems in the literature and expand them for multi-risk disasters to construct a well-organized system is the proposal of our work. The here shown work is an approach of a multi-risk system, which needs an architecture and well defined aims. In this moment our study is a kind of case study to analyze the way we have to follow to create our proposed system in the future.
Abstract: The performance and analysis of speech recognition
system is illustrated in this paper. An approach to recognize the
English word corresponding to digit (0-9) spoken by 2 different
speakers is captured in noise free environment. For feature extraction,
speech Mel frequency cepstral coefficients (MFCC) has been used
which gives a set of feature vectors from recorded speech samples.
Neural network model is used to enhance the recognition
performance. Feed forward neural network with back propagation
algorithm model is used. However other speech recognition
techniques such as HMM, DTW exist. All experiments are carried
out on Matlab.