Abstract: This paper present the study carried out of accident
analysis, black spot study and to develop accident predictive models
based on the data collected at rural roadway, Federal Route 50 (F050)
Malaysia. The road accident trends and black spot ranking were
established on the F050. The development of the accident prediction
model will concentrate in Parit Raja area from KM 19 to KM 23.
Multiple non-linear regression method was used to relate the discrete
accident data with the road and traffic flow explanatory variable. The
dependent variable was modeled as the number of crashes namely
accident point weighting, however accident point weighting have
rarely been account in the road accident prediction Models. The result
show that, the existing number of major access points, without traffic
light, rise in speed, increasing number of Annual Average Daily
Traffic (AADT), growing number of motorcycle and motorcar and
reducing the time gap are the potential contributors of increment
accident rates on multiple rural roadway.
Abstract: Medical compression bandages are widely used in the
treatment of chronic venous disorder. In order to design effective
compression bandages, researchers have attempted to describe the
interface pressure applied by multi-layer bandages using mathematical
models. This paper reports on the work carried out to
compare and validate the mathematical models used to describe the
interface pressure applied by multi-layer bandages. Both analytical
and experimental results showed that using simple multiplication
of a number of bandage layers with the pressure applied by one
layer of bandage or ignoring the increase in the limb radius due to
former layers of bandage will result in overestimating the pressure.
Experimental results showed that the mathematical models, which
take into consideration the increase in the limb radius due to former
bandage layers, are more accurate than the one which does not.
Abstract: In Virtual organization, Knowledge Discovery (KD)
service contains distributed data resources and computing grid nodes.
Computational grid is integrated with data grid to form Knowledge
Grid, which implements Apriori algorithm for mining association
rule on grid network. This paper describes development of parallel
and distributed version of Apriori algorithm on Globus Toolkit using
Message Passing Interface extended with Grid Services (MPICHG2).
The creation of Knowledge Grid on top of data and
computational grid is to support decision making in real time
applications. In this paper, the case study describes design and
implementation of local and global mining of frequent item sets. The
experiments were conducted on different configurations of grid
network and computation time was recorded for each operation. We
analyzed our result with various grid configurations and it shows
speedup of computation time is almost superlinear.
Abstract: The Wind Turbine Modeling in Wind Energy Conversion System (WECS) using Doubly-Fed Induction Generator (DFIG) PI Controller based design is presented. To study about the variable wind speed. The PI controller performs responding to the dynamic performance. The objective is to study the characteristic of wind turbine and finding the optimum wind speed suitable for wind turbine performance. This system will allow the specification setting (2.5MW). The output active power also corresponding same the input is given. And the reactive power produced by the wind turbine is regulated at 0 Mvar. Variable wind speed is optimum for drive train performance at 12.5 m/s (at maximum power coefficient point) from the simulation of DFIG by Simulink is described.
Abstract: For scores of years now, several microfinance
organizations, non governmental organizations and other welfare
organizations have, with a view to aiding the progress of
communities rooted in poverty have been focusing on creating
microentrepreneurs, besides taking several other measures. In recent
times, business corporations have joined forces to combat poverty by
taking up microenterprise development. Hindustan Unilever Limited
(HUL), the Indian subsidiary of Unilever Limited exemplifies this
through its Project Shakti. The company through the Project creates
rural women entrepreneurs by making them direct to home sales
distributors of its products in villages that have thus far been ignored
by multinational corporations. The members participating in Project
Shakti are largely self help group members. The paper focuses on
assessing the impact made by the company on the members engaged
in Project Shakti. The analysis involves use of quantitative methods
to study the effect of Project Shakti on those self help group
members engaged in Project Shakti and those not engaged with
Project Shakti. Path analysis has been used to study the impact made
on those members engaged in Project Shakti. Significant differences
were observed on fronts of entrepreneurial development, economic
empowerment and social empowerment between members associated
with Project Shakti and those not associated with Project Shakti.
Path analysis demonstrated that involvement in Project Shakti led to
entrepreneurial development resulting in economic empowerment
that in turn led to social empowerment and that these three elements
independently induced a feeling of privilege in the women for being
associated with the Project.
Abstract: Hidden failure in a protection system has been
recognized as one of the main reasons which may cause to a power
system instability leading to a system cascading collapse. This paper
presents a computationally systematic approach used to obtain the
estimated average probability of a system cascading collapse by
considering the effect of probability hidden failure in a protection
system. The estimated average probability of a system cascading
collapse is then used to determine the severe loading condition
contributing to the higher risk of critical system cascading collapse.
This information is essential to the system utility since it will assist
the operator to determine the highest point of increased system
loading condition prior to the event of critical system cascading
collapse.
Abstract: This paper challenges the relevance of knowledgebased
management research by arguing that the majority of the
literature emphasizes information and knowledge provision instead of
their business usage. For this reason the related processes are
considered valuable and eligible as such, which has led to
overlapping nature of knowledge-based management disciplines. As
a solution, this paper turns the focus on the information usage. Value
of knowledge and respective management tasks are then defined by
the business need and the knowledge-user becomes the main actor.
The paper analyses the prevailing literature streams and recognizes
the need for a more focused and robust understanding of knowledgebased
value creation. The paper contributes by synthetizing the
existing literature and pinpointing the essence of knowledge-based
management disciplines.
Abstract: the elastic scattering of protons, deuterons and 3He on 6Li at different incident energies have been analyzed in the framework of the optical model using ECIS88 as well as SPI GENOA codes. The potential parameters were extracted in the phenomenological treatment of measured by us angular distributions and literature data. A good agreement between theoretical and experimental differential cross sections was obtained in whole angular range. Parameters for real part of potential have been also calculated microscopically with singleand double-folding model for the p and d, 3He scattering, respectively, using DFPOT code. For best agreement with experiment the normalization factor N for the potential depth is obtained in the range of 0.7-0.9.
Abstract: This paper proposes a novel multi-format stream grid
architecture for real-time image monitoring system. The system, based
on a three-tier architecture, includes stream receiving unit, stream
processor unit, and presentation unit. It is a distributed computing and
a loose coupling architecture. The benefit is the amount of required
servers can be adjusted depending on the loading of the image
monitoring system. The stream receive unit supports multi capture
source devices and multi-format stream compress encoder. Stream
processor unit includes three modules; they are stream clipping
module, image processing module and image management module.
Presentation unit can display image data on several different platforms.
We verified the proposed grid architecture with an actual test of image
monitoring. We used a fast image matching method with the
adjustable parameters for different monitoring situations. Background
subtraction method is also implemented in the system. Experimental
results showed that the proposed architecture is robust, adaptive, and
powerful in the image monitoring system.
Abstract: Within dental-guided surgery, there has been a lack
of analytical methods for optimizing the treatment of the
rehabilitation concepts regarding geometrical variation. The purpose
of this study is to find the source of the greatest geometrical variation
contributor and sensitivity contributor with the help of virtual
variation simulation of a dental drill- and implant-guided surgery
process using a methodical approach. It is believed that lower
geometrical variation will lead to better patient security and higher
quality of dental drill- and implant-guided surgeries. It was found
that the origin of the greatest contributor to the most variation, and
hence where the foci should be set, in order to minimize geometrical
variation was in the assembly category (surgery). This was also the
category that was the most sensitive for geometrical variation.
Abstract: This study was conducted to investigate the optimum
levels of glutamine (Gln) supplementation in broiler diets. A total of
32 one-day-old male chicks with initial body weight 41.5 g were
segregated into 4 groups (8 chicks per group) and subsequently
distributed to individual cages. Feed and water were provided ad
libitum for 21 days. Four dietary treatments were as follows: control
and supplemented Gln at 1, 2 and 3%, respectively. The results found
that the addition Gln had no negative effects on dry matter, organic
matter, ash digestibility or nitrogen retention. Birds fed with 1% Gln
had significantly higher villi wide and villi height : crypt depth ratio
in duodenum than the control chicks and 2 and 3% Gln chicks. It is
suggested that the addition of Gln at 1% indicated a beneficial effect
on improving small intestinal morphology, in addition Gln may
stimulate immune organ development of broiler chickens.
Abstract: This is a conceptual paper on the application of open
innovation in three case examples of Apple, Nintendo, and Nokia.
Utilizing key concepts from research into managerial and
organizational cognition, we describe how each company overcame
barriers to utilizing open innovation strategy in R&D and
commercialization projects. We identify three levels of barriers:
cognitive, behavioral, and institutional, and describe the companies
balanced between internal and external resources to launch products
that were instrumental in companies reinventing themselves in
mature markets.
Abstract: Short message integrated distributed monitoring systems (SM-DMS) are growing rapidly in wireless communication applications in various areas, such as electromagnetic field (EMF) management, wastewater monitoring, and air pollution supervision, etc. However, delay in short messages often makes the data embedded in SM-DMS transmit unreliably. Moreover, there are few regulations dealing with this problem in SMS transmission protocols. In this study, based on the analysis of the command and data requirements in the SM-DMS, we developed a processing model for the control center to solve the delay problem in data transmission. Three components of the model: the data transmission protocol, the receiving buffer pool method, and the timer mechanism were described in detail. Discussions on adjusting the threshold parameter in the timer mechanism were presented for the adaptive performance during the runtime of the SM-DMS. This model optimized the data transmission reliability in SM-DMS, and provided a supplement to the data transmission reliability protocols at the application level.
Abstract: To investigate the applicability of the EDR-2 film for
clinical radiation dosimetry, percentage depth-doses, profiles and
distributions in open and dynamically wedged fields were measured
using film and compared with data from a Treatment Planning
system.The validity of the EDR2 film to measure dose in a plane
parallel to the beam was tested by irradiating 10 cm×10 cm and 4
cm×4 cm fields from a Siemens, primus linac with a 6MV beam and
a source-to-surface distance of 100 cm. The film was placed
Horizontally between solid water phantom blocks and marked
with pin holes at a depth of 10 cm from the incident beam surface.
The film measurement results, in absolute dose, were compared with
ion chamber measurements using a Welhoffer scanning water tank
system and Treatment Planning system. Our results indicate a
maximum underestimate of calculated dose of 8 % with Treatment
Planning system.
Abstract: Self-organizing map (SOM) is a well known data reduction technique used in data mining. Data visualization can reveal structure in data sets that is otherwise hard to detect from raw data alone. However, interpretation through visual inspection is prone to errors and can be very tedious. There are several techniques for the automatic detection of clusters of code vectors found by SOMs, but they generally do not take into account the distribution of code vectors; this may lead to unsatisfactory clustering and poor definition of cluster boundaries, particularly where the density of data points is low. In this paper, we propose the use of a generic particle swarm optimization (PSO) algorithm for finding cluster boundaries directly from the code vectors obtained from SOMs. The application of our method to unlabeled call data for a mobile phone operator demonstrates its feasibility. PSO algorithm utilizes U-matrix of SOMs to determine cluster boundaries; the results of this novel automatic method correspond well to boundary detection through visual inspection of code vectors and k-means algorithm.
Abstract: This paper presents an efficient algorithm for
optimization of radial distribution systems by a network
reconfiguration to balance feeder loads and eliminate overload
conditions. The system load-balancing index is used to determine the
loading conditions of the system and maximum system loading
capacity. The index value has to be minimum in the optimal network
reconfiguration of load balancing. A method based on Tabu search
algorithm, The Tabu search algorithm is employed to search for the
optimal network reconfiguration. The basic idea behind the search is
a move from a current solution to its neighborhood by effectively
utilizing a memory to provide an efficient search for optimality. It
presents low computational effort and is able to find good quality
configurations. Simulation results for a radial 69-bus system with
distributed generations and capacitors placement. The study results
show that the optimal on/off patterns of the switches can be identified
to give the best network reconfiguration involving balancing of
feeder loads while respecting all the constraints.
Abstract: Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.
Abstract: Game theory could be used to analyze the conflicted
issues in the field of information hiding. In this paper, 2-phase game
can be used to build the embedder-attacker system to analyze the
limits of hiding capacity of embedding algorithms: the embedder
minimizes the expected damage and the attacker maximizes it. In the
system, the embedder first consumes its resource to build embedded
units (EU) and insert the secret information into EU. Then the attacker
distributes its resource evenly to the attacked EU. The expected
equilibrium damage, which is maximum damage in value from the
point of view of the attacker and minimum from the embedder against
the attacker, is evaluated by the case when the attacker attacks a
subset from all the EU. Furthermore, the optimal equilibrium capacity
of hiding information is calculated through the optimal number of EU
with the embedded secret information. Finally, illustrative examples
of the optimal equilibrium capacity are presented.
Abstract: This paper describes the pipeline architecture of
high-speed modified Booth multipliers. The proposed multiplier
circuits are based on the modified Booth algorithm and the pipeline
technique which are the most widely used to accelerate the
multiplication speed. In order to implement the optimally pipelined
multipliers, many kinds of experiments have been conducted. The
speed of the multipliers is greatly improved by properly deciding the
number of pipeline stages and the positions for the pipeline registers to
be inserted. We described the proposed modified Booth multiplier
circuits in Verilog HDL and synthesized the gate-level circuits using
0.13um standard cell library. The resultant multiplier circuits show
better performance than others. Since the proposed multipliers operate
at GHz ranges, they can be used in the systems requiring very high
performance.
Abstract: This paper aims to describe how student satisfaction is
measured for work-based learners as these are non-traditional
learners, conducting academic learning in the workplace, typically
their curricula have a high degree of negotiation, and whose
motivations are directly related to their employers- needs, as well as
their own career ambitions. We argue that while increasing WBL
participation, and use of SSD are both accepted as being of strategic
importance to the HE agenda, the use of WBL SSD is rarely
examined, and lessons can be learned from the comparison of SSD
from a range of WBL programmes, and increased visibility of this
type of data will provide insight into ways to improve and develop
this type of delivery. The key themes that emerged from the analysis
of the interview data were: learners profiles and needs, employers
drivers, academic staff drivers, organizational approach, tools for
collecting data and visibility of findings. The paper concludes with
observations on best practice in the collection, analysis and use of
WBL SSD, thus offering recommendations for both academic
managers and practitioners.