Abstract: Public sector corruption has long-term and damaging
effects that are deep and broad. Addressing corruption relies on
understanding the drivers that precipitate acts of corruption and
developing educational programs that target areas of vulnerability.
This paper provides an innovative approach to explore the nature of
corruption by drawing on the perceptions and ideas of a group of
public servants who have been part of a corruption investigation. The
paper examines these reflections through the ideas of Pierre Bourdieu
and Alfred Schutz to point to some of the steps that can lead to
corrupt activity. The paper demonstrates that phenomenological
inquiry is useful in the exploration of corruption and, as a theoretical
framework, it highlights that corruption emerges through a
combination of conflict, doubt and uncertainty. The paper calls for
anti-corruption education programs to be attentive to way in which
these conditions can influence the steps into corruption.
Abstract: Magnetic and semiconductor nanomaterials exhibit
novel magnetic and optical properties owing to their unique size and
shape-dependent effects. With shrinking the size down to nanoscale
region, various anomalous properties that normally not present in bulk
start to dominate. Ability in harnessing of these anomalous properties
for the design of various advance electronic devices is strictly
dependent on synthetic strategies. Hence, current research has focused
on developing a rational synthetic control to produce high quality
nanocrystals by using organometallic approach to tune both size and
shape of the nanomaterials. In order to elucidate the growth
mechanism, transmission electron microscopy was employed as a
powerful tool in performing real time-resolved morphologies and
structural characterization of magnetic (Fe3O4) and semiconductor
(ZnO) nanocrystals. The current synthetic approach is found able to
produce nanostructures with well-defined shapes. We have found that
oleic acid is an effective capping ligand in preparing oxide-based
nanostructures without any agglomerations, even at high temperature.
The oleate-based precursors and capping ligands are fatty acid
compounds, which are respectively originated from natural palm oil
with low toxicity. In comparison with other synthetic approaches in
producing nanostructures, current synthetic method offers an effective
route to produce oxide-based nanomaterials with well-defined shapes
and good monodispersity. The nanocystals are well-separated with
each other without any stacking effect. In addition, the as-synthesized
nanopellets are stable in terms of chemically and physically if
compared to those nanomaterials that are previous reported. Further
development and extension of current synthetic strategy are being
pursued to combine both of these materials into nanocomposite form
that will be used as “smart magnetic nanophotocatalyst" for industry
waste water treatment.
Abstract: In this paper, quantitative evaluation of ultrasonic Cscan
images through estimation of their Fractal Dimension (FD) is
discussed. Necessary algorithm for evaluation of FD of any 2-D
digitized image is implemented by developing a computer code. For
the evaluation purpose several C-scan images of the Kevlar
composite impacted by high speed bullet and glass fibre composite
having flaw in the form of inclusion is used. This analysis
automatically differentiates a C-scan image showing distinct damage
zone, from an image that contains no such damage.
Abstract: In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. In this particular scheme, the color image is first transformed from RGB to YST color space, suitable for watermarking the color media. Each channel is divided into 4×4 non-overlapping blocks and its each 2×2 sub-block is selected. The embedding space is created by setting the two LSBs of selected sub-block to zero, which will hold the authentication and recovery information. For verification of work authentication and parity bits denoted by 'a' & 'p' are computed for each 2×2 subblock. For recovery, intensity mean of each 2×2 sub-block is computed and encoded upto six to eight bits depending upon the channel selection. The size of sub-block is important for correct localization and fast computation. For watermark distribution 2DTorus Automorphism is implemented using a private key to have a secure mapping of blocks. The perceptibility of watermarked image is quite reasonable both subjectively and objectively. Our scheme is oblivious, correctly localizes the tampering and able to recovery the original work with probability of near one.
Abstract: This paper proposes an Interactive Chinese Character
Learning System (ICCLS) based on pictorial evolution as an
edutainment concept in computer-based learning of language. The
advantage of the language origination itself is taken as a learning
platform due to the complexity in Chinese language as compared to
other types of languages. Users especially children enjoy more by
utilize this learning system because they are able to memories the
Chinese Character easily and understand more of the origin of the
Chinese character under pleasurable learning environment, compares
to traditional approach which children need to rote learning Chinese
Character under un-pleasurable environment. Skeletonization is used
as the representation of Chinese character and object with an animated
pictograph evolution to facilitate the learning of the language. Shortest
skeleton path matching technique is employed for fast and accurate
matching in our implementation. User is required to either write a
word or draw a simple 2D object in the input panel and the matched
word and object will be displayed as well as the pictograph evolution
to instill learning. The target of computer-based learning system is for
pre-school children between 4 to 6 years old to learn Chinese
characters in a flexible and entertaining manner besides utilizing
visual and mind mapping strategy as learning methodology.
Abstract: This paper looks into areas not covered by prominent
Agent-Oriented Software Engineering (AOSE) methodologies.
Extensive paper review led to the identification of two issues, first
most of these methodologies almost neglect semantic web and
ontology. Second, as expected, each one has its strength and
weakness and may focus on some phases of the development
lifecycle but not all of the phases. The work presented here builds
extensions to a highly regarded AOSE methodology (MaSE) in order
to cover the areas that this methodology does not concentrate on. The
extensions include introducing an ontology stage for semantic
representation and integrating early requirement specification from a
methodology which mainly focuses on that. The integration involved
developing transformation rules (with the necessary handling of nonmatching
notions) between the two sets of representations and
building the software which automates the transformation. The
application of this integration on a case study is also presented in the
paper. The main flow of MaSE stages was changed to smoothly
accommodate the new additions.
Abstract: The pollution of sediments sampled from the North
Port by polycyclic aromatic hydrocarbons (PAHs) was investigated.
Concentrations of PAHs estimated in the port sediments ranged from
199 to 2851.2 μg/kg dw. The highest concentration was found which
is closed to the Berth line, this locations affected by intensive
shipping activities and Land based runoff and they were dominated
by the high molecular weight PAHs (4–6- rings). Source
identification showed that PAHs originated mostly from the
pyrogenic source either from the combustion of fossil fuels, grass,
wood and coal (majority of the samples). Ecological Risk Assessment
on the port sediments presented that slightly adverse ecological
effects to biological community are expected to occur at the vicinity
of the stations 1 and 4. Thus PAHs are not considered as pollutants of
concern in the North Port.
Abstract: Genetic Folding (GF) a new class of EA named as is
introduced for the first time. It is based on chromosomes composed
of floating genes structurally organized in a parent form and
separated by dots. Although, the genotype/phenotype system of GF
generates a kernel expression, which is the objective function of
superior classifier. In this work the question of the satisfying
mapping-s rules in evolving populations is addressed by analyzing
populations undergoing either Mercer-s or none Mercer-s rule. The
results presented here show that populations undergoing Mercer-s
rules improve practically models selection of Support Vector
Machine (SVM). The experiment is trained multi-classification
problem and tested on nonlinear Ionosphere dataset. The target of this
paper is to answer the question of evolving Mercer-s rule in SVM
addressed using either genetic folding satisfied kernel-s rules or not
applied to complicated domains and problems.
Abstract: Sarkhoon gas plant, located in south of Iran, has been installed to removal H2S contained in a high pressure natural gas stream. The solvent used for the H2S removal from gaseous stream is 34% by weight (wt%) Di-ethanol amine (DEA) solutions. Due to increasing concentration of heat stable salt (HSS) in solvent, corrosivity of amine solution had been increased. Reports indicated that there was corrosion on the shell of regeneration column. Because source formation of HSS was unknown, we decided to control the amount of HSS at the limit less than 3% wt amine solvent. Therefore, two small columns were filled by strong anionic base and carbon active, and then polluted amine was passed through beds. Finally a temporary amine recovery package on industrial scale was made based on laboratory’s results. From economical point of view we could save $700000 beside corrosion occurrence of the stripping column has been vigorously decreased.
Abstract: Interactive CAD systems have to allocate and
deallocate memory frequently. Frequent memory allocation and
deallocation can play a significant role in degrading application
performance. An application may use memory in a very specific way
and pay a performance penalty for functionality it does not need. We
could counter that by developing specialized memory managers.
Abstract: The contribution deals with analysis of identity style
at adolescents (N=463) at the age from 16 to 19 (the average age is
17,7 years). We used the Identity Style Inventory by Berzonsky,
distinguishing three basic, measured identity styles: informational,
normative, diffuse-avoidant identity style and also commitment. The
informational identity style influencing on personal adaptability,
coping strategies, quality of life and the normative identity style, it
means the style in which an individual takes on models of authorities
at self-defining were found to have the highest representation in the
studied group of adolescents by higher scores at girls in comparison
with boys. The normative identity style positively correlates with the
informational identity style. The diffuse-avoidant identity style was
found to be positively associated with maladaptive decisional
strategies, neuroticism and depressive reactions. There is the style,
in which the individual shifts aside defining his personality. In our
research sample the lowest score represents it and negatively
correlates with commitment, it means with coping strategies, thrust in
oneself and the surrounding world. The age of adolescents did not
significantly differentiate representation of identity style. We were
finding the model, in which informational and normative identity
style had positive relationship and the informational and diffuseavoidant
style had negative relationship, which were determinated
with commitment. In the same time the commitment is influenced
with other outside factors.
Abstract: CIM is the standard formalism for modeling management
information developed by the Distributed Management Task
Force (DMTF) in the context of its WBEM proposal, designed to
provide a conceptual view of the managed environment. In this
paper, we propose the inclusion of formal knowledge representation
techniques, based on Description Logics (DLs) and the Web Ontology
Language (OWL), in CIM-based conceptual modeling, and then we
examine the benefits of such a decision. The proposal is specified as a
CIM metamodel level mapping to a highly expressive subset of DLs
capable of capturing all the semantics of the models. The paper shows
how the proposed mapping can be used for automatic reasoning
about the management information models, as a design aid, by means
of new-generation CASE tools, thanks to the use of state-of-the-art
automatic reasoning systems that support the proposed logic and use
algorithms that are sound and complete with respect to the semantics.
Such a CASE tool framework has been developed by the authors and
its architecture is also introduced. The proposed formalization is not
only useful at design time, but also at run time through the use of
rational autonomous agents, in response to a need recently recognized
by the DMTF.
Abstract: Square pipes (pipes with square cross sections) are
being used for various industrial objectives, such as machine
structure components and housing/building elements. The utilization
of them is extending rapidly and widely. Hence, the out-put of those
pipes is increasing and new application fields are continually
developing.
Due to various demands in recent time, the products have to
satisfy difficult specifications with high accuracy in dimensions. The
reshaping process design of pipes with square cross sections;
however, is performed by trial and error and based on expert-s
experience.
In this paper, a computer-aided simulation is developed based on
the 2-D elastic-plastic method with consideration of the shear
deformation to analyze the reshaping process. Effect of various
parameters such as diameter of the circular pipe and mechanical
properties of metal on product dimension and quality can be
evaluated by using this simulation. Moreover, design of reshaping
process include determination of shrinkage of cross section,
necessary number of stands, radius of rolls and height of pipe at each
stand, are investigated. Further, it is shown that there are good
agreements between the results of the design method and the
experimental results.
Abstract: Infrastructure investments are important in developing
countries, it will not only help to foster the economic growth of a
nation, but it will also act as a platform in which new forms of
partnership and collaboration can be developed mainly in East Asian
countries. Since the last two decades, many infrastructure projects
had been completed through build-operate-transfer (BOT) type of
procurement. The developments of BOT have attracted participation
of local and foreign private sector investor to secure funding and to
deliver projects on time, within the budget and to the required
specifications. Private sectors are preferred by the government in
East Asia to participate in BOT projects due to lack of public
funding. The finding has resulted that the private sector or promoter
of the BOT projects is exposed to multiple risks which have been
discussed in this paper. Effective risk management methods and
good managerial skills are required in ensuring the success of the
project. The review indicated that mitigation measures should be
employed by the promoter throughout the concession period and
support from the host government is also required in ensuring the
success of the BOT project.
Abstract: The issue of unintentional islanding in PV grid
interconnection still remains as a challenge in grid-connected
photovoltaic (PV) systems. This paper discusses the overview of
popularly used anti-islanding detection methods, practically applied
in PV grid-connected systems. Anti-islanding methods generally can
be classified into four major groups, which include passive methods,
active methods, hybrid methods and communication base methods.
Active methods have been the preferred detection technique over the
years due to very small non-detected zone (NDZ) in small scale
distribution generation. Passive method is comparatively simpler
than active method in terms of circuitry and operations. However, it
suffers from large NDZ that significantly reduces its performance.
Communication base methods inherit the advantages of active and
passive methods with reduced drawbacks. Hybrid method which
evolved from the combination of both active and passive methods
has been proven to achieve accurate anti-islanding detection by many
researchers. For each of the studied anti-islanding methods, the
operation analysis is described while the advantages and
disadvantages are compared and discussed. It is difficult to pinpoint a
generic method for a specific application, because most of the
methods discussed are governed by the nature of application and
system dependent elements. This study concludes that the setup and
operation cost is the vital factor for anti-islanding method selection in
order to achieve minimal compromising between cost and system
quality.
Abstract: Sharing the manufacturing facility through remote
operation and monitoring of a machining process is challenge for
effective use the production facility. Several automation tools in term
of hardware and software are necessary for successfully remote
operation of a machine. This paper presents a prototype of workpiece
holding attachment for remote operation of milling process by self
configuration the workpiece setup. The prototype is designed with
mechanism to reorient the work surface into machining spindle
direction with high positioning accuracy. Variety of parts geometry
is hold by attachment to perform single setup machining. Pin type
with array pattern additionally clamps the workpiece surface from
two opposite directions for increasing the machining rigidity.
Optimum pins configuration for conforming the workpiece geometry
with minimum deformation is determined through hybrid algorithms,
Genetic Algorithms (GA) and Particle Swarm Optimization (PSO).
Prototype with intelligent optimization technique enables to hold
several variety of workpiece geometry which is suitable for
machining low of repetitive production in remote operation.
Abstract: Electrospinning is a broadly used technology to obtain
polymeric nanofibers ranging from several micrometers down to
several hundred nanometers for a wide range of applications. It offers
unique capabilities to produce nanofibers with controllable porous
structure. With smaller pores and higher surface area than regular
fibers, electrospun fibers have been successfully applied in various
fields, such as, nanocatalysis, tissue engineering scaffolds, protective
clothing, filtration, biomedical, pharmaceutical, optical electronics,
healthcare, biotechnology, defense and security, and environmental
engineering. In this study, polyurethane nanofibers were obtained
under different electrospinning parameters. Fiber morphology and
diameter distribution were investigated in order to understand them
as a function of process parameters.
Abstract: In order to assess optical fiber reliability in different environmental and stress conditions series of testing are performed simulating overlapping of chemical and mechanical controlled varying factors. Each series of testing may be compared using statistical processing: i.e. Weibull plots. Due to the numerous data to treat, a software application has appeared useful to interpret selected series of experiments in function of envisaged factors. The current paper presents a software application used in the storage, modelling and interpretation of experimental data gathered from optical fibre testing. The present paper strictly deals with the software part of the project (regarding the modelling, storage and processing of user supplied data).
Abstract: Green Forestation Plan (GFP) was expected to promote the reforestation of plains totaling 60,000 has within the first 8 years. Annual subsidies were budgeted at $120,000 per ha, and $2.4 million for 20 years. In this research we have surveyed landlords- opinions toward the GFP in an attempt to understand landlords- incentives for participating in the GFP and their levels of concern and agreement toward the policy design. Based our analysis of landlords- opinions on the policy design, we expect to derive appropriate complementary measures, establish effective promotional schemes, and raise the policy effectiveness of the GFP. According to the results of this research, there was still a relatively high proportion of population who were not aware of GFP; more than 50% of landlords were neutral or willing to participate given high reforestation subsidies; approximately 30% of landlords were unwilling to participate. In terms of the designs of GFP, more than 50% of respondents were concerned and agreed with the policy design. In terms of the period of this policy, 52.7% of respondents indicated that it should be shortened to 15 years or lower. In terms of the amount of the subsidy, 41.7% of respondents showed that it should be raised to approximately $250,000/ha. In terms of land area restrictions, 88.0% of respondents believed that the minimum should be lowered to 0.4 ha. More than 70% of respondents owned less than 0.4 has of land, and since they do not own enough land to be eligible for the program, more than 80% of landlords wished to lower the minimum requirements of land area. In addition, 59.3% of respondents were reluctant to participate in reforestation because their lands were too small to be eligible; 15.0% of respondents were reluctant because the duration was too long. Responses to the question about “how the policy can be adjusted to provide incentives for landlords- participation" revealed that almost 40% of respondents desired higher subsidies. Some policy suggestions are provided as follows: (1) many landlords are still unaware of the GFP so the government should enhance the promotion of the policy; (2) many landlords are unwilling to participate in GFP mainly because they do not own enough lands to be eligible, hence the government should consider adjusting its requirements for minimum agricultural land area; (3) for subsequent promotions on GFP, the government may consider targeting on the landlords with high income and high level of education; (4) because the subsidy of this policy alone provides limited help to landlords, the government should help the landlords to explore other revenue possibilities from afforestation in addition to the existing subsidies and raise the participation incentives.
Abstract: Limited competition has been a serious concern in infrastructure procurement. Importantly, however, there are normally a number of potential bidders initially showing interest in proposed projects. This paper focuses on tackling the question why these initially interested bidders fade out. An empirical problem is that no bids of fading-out firms are observable. They could decide not to enter the process at the beginning of the tendering or may be technically disqualified at any point in the selection process. The paper applies the double selection model to procurement data from road development projects in developing countries and shows that competition ends up restricted, because bidders are self-selective and auctioneers also tend to limit participation depending on the size of contracts.Limited competition would likely lead to high infrastructure procurement costs, threatening fiscal sustainability and economic growth.