Abstract: A feeding trial was conducted to investigate the effect
of periodically use of garlic on performance and carcass
characteristics in broiler chickens. 240 1-day-old Ross broiler chicks
randomly allocated into the 10 dietary treatments (A, B, C, D, E, F,
G, H, I and J) for 6 wk. Treatment A or control group, received basal
diet (based on standards of Ross management guidelines) without
supplementation of garlic powder while B, C and D dietary
treatments were basal diet supplemented with 0.5, 1 and 3% garlic
powder, respectively for the whole time of experiment (6 weeks).
Birds in group E, F and G were fed control diet supplemented with
0.5, 1 and 3% garlic powder, respectively just in their starter diet (0-
21d). Birds in three other treatments (H, I and J) received control diet
for the first 21 days and 0.5, 1 and 3% of garlic powder was added to
their finisher diets, respectively. 1 and 3% supplemented groups in
finisher period had better performance as compared with other
groups. Since present study conducted in optimum and antiseptic
conditions, it seems that better or more responses could be expected
in performance if the raising conditions would not be healthy.
Abstract: Geographic Profiling has successfully assisted investigations for serial crimes. Considering the multi-cluster feature of serial criminal spots, we propose a Multi-point Centrography model as a natural extension of Single-point Centrography for geographic profiling. K-means clustering is first performed on the data samples and then Single-point Centrography is adopted to derive a probability distribution on each cluster. Finally, a weighted combinations of each distribution is formed to make next-crime spot prediction. Experimental study on real cases demonstrates the effectiveness of our proposed model.
Abstract: It is not a secret that, IT management has become
more and more and integrated part of almost all organizations. IT
managers posses an enormous amount of knowledge within both
organizational knowledge and general IT knowledge. This article
investigates how IT managers keep themselves updated on IT
knowledge in general and looks into how much time IT managers
spend on weekly basis searching the net for new or problem solving
IT knowledge. The theory used in this paper is used to investigate the
current role of IT managers and what issues they are facing.
Furthermore a research is conducted where 7 IT managers in medium
sized and large Danish companies are interviewed to add further
focus on the role of the IT manager and to focus on how they keep
themselves updated. Beside finding substantial need for more
research, IT managers – generalists or specialists – only have limited
knowledge resources at hand in updating their own knowledge –
leaving much initiative to vendors.
Abstract: Real options theory suggests that managerial flexibility embedded within irreversible investments can account for a significant value in project valuation. Although the argument has become the dominant focus of capital investment theory over decades, yet recent survey literature in capital budgeting indicates that corporate practitioners still do not explicitly apply real options in investment decisions. In this paper, we explore how real options decision criteria can be transformed into equivalent capital budgeting criteria under the consideration of uncertainty, assuming that underlying stochastic process follows a geometric Brownian motion (GBM), a mixed diffusion-jump (MX), or a mean-reverting process (MR). These equivalent valuation techniques can be readily decomposed into conventional investment rules and “option impacts", the latter of which describe the impacts on optimal investment rules with the option value considered. Based on numerical analysis and Monte Carlo simulation, three major findings are derived. First, it is shown that real options could be successfully integrated into the mindset of conventional capital budgeting. Second, the inclusion of option impacts tends to delay investment. It is indicated that the delay effect is the most significant under a GBM process and the least significant under a MR process. Third, it is optimal to adopt the new capital budgeting criteria in investment decision-making and adopting a suboptimal investment rule without considering real options could lead to a substantial loss in value.
Abstract: This paper proposes the authentication method using
ESA algorithm instead of using CAVE algorithm in the CDMA
mobile communication systems including IS-95 and CDMA2000 1x.
And, we analyze to apply ESA mechanism on behalf of CAVE
mechanism without the change of message format and air interface in
the existing CDMA systems. If ESA algorithm can be used as the
substitution of CAVE algorithm, security strength of authentication
algorithm is intensified without protocol change. An algorithm
replacement proposed in this paper is not to change an authentication
mechanism, but to configure input of ESA algorithm and to produce
output. Therefore, our proposal can be the compatible to the existing
systems.
Abstract: This paper presents an exploration into the structure of the corporate governance network and interlocking directorates in the Czech Republic. First a literature overview and a basic terminology of the network theory is presented. Further in the text, statistics and other calculations relevant to corporate governance networks are presented. For this purpose an empirical data set consisting of 2 906 joint stock companies in the Czech Republic was examined. Industries with the highest average number of interlocks per company were healthcare, and energy and utilities. There is no observable link between the financial performance of the company and the number of its interlocks. Also interlocks with financial companies are very rare.
Abstract: Eye localization is necessary for face recognition and
related application areas. Most of eye localization algorithms reported
so far still need to be improved about precision and computational
time for successful applications. In this paper, we propose an eye
location method based on multi-scale Gabor feature vectors, which is
more robust with respect to initial points. The eye localization based
on Gabor feature vectors first needs to constructs an Eye Model Bunch
for each eye (left or right eye) which consists of n Gabor jets and
average eye coordinates of each eyes obtained from n model face
images, and then tries to localize eyes in an incoming face image by
utilizing the fact that the true eye coordinates is most likely to be very
close to the position where the Gabor jet will have the best Gabor jet
similarity matching with a Gabor jet in the Eye Model Bunch. Similar
ideas have been already proposed in such as EBGM (Elastic Bunch
Graph Matching). However, the method used in EBGM is known to be
not robust with respect to initial values and may need extensive search
range for achieving the required performance, but extensive search
ranges will cause much more computational burden. In this paper, we
propose a multi-scale approach with a little increased computational
burden where one first tries to localize eyes based on Gabor feature
vectors in a coarse face image obtained from down sampling of the
original face image, and then localize eyes based on Gabor feature
vectors in the original resolution face image by using the eye
coordinates localized in the coarse scaled image as initial points.
Several experiments and comparisons with other eye localization
methods reported in the other papers show the efficiency of our
proposed method.
Abstract: Attempts to add fibre and polyphenols (PPs) into
popular beverages present challenges related to the properties of
finished products such as smoothies. Consumer acceptability,
viscosity and phenolic composition of smoothies containing high
levels of fruit fibre (2.5-7.5 g per 300 mL serve) and PPs (250-750
mg per 300 mL serve) were examined. The changes in total
extractable PP, vitamin C content, and colour of selected smoothies
over a storage stability trial (4°C, 14 days) were compared. A set of
acidic aqueous model beverages were prepared to further examine
the effect of two different heat treatments on the stability and
extractability of PPs. Results show that overall consumer
acceptability of high fibre and PP smoothies was low, with average
hedonic scores ranging from 3.9 to 6.4 (on a 1-9 scale). Flavour,
texture and overall acceptability decreased as fibre and polyphenol
contents increased, with fibre content exerting a stronger effect.
Higher fibre content resulted in greater viscosity, with an elevated PP
content increasing viscosity only slightly. The presence of fibre also
aided the stability and extractability of PPs after heating. A reduction
of extractable PPs, vitamin C content and colour intensity of
smoothies was observed after a 14-day storage period at 4°C. Two
heat treatments (75°C for 45 min or 85°C for 1 min) that are
normally used for beverage production, did not cause significant
reduction of total extracted PPs. It is clear that high levels of added
fibre and PPs greatly influence the consumer appeal of smoothies,
suggesting the need to develop novel formulation and processing
methods if a satisfactory functional beverage is to be developed
incorporating these ingredients.
Abstract: It is suggested to evaluate environmental performance
of energy sector using Data Envelopment Analysis with nondiscretionary
factors (DEA-ND) with relative indicators as inputs and
outputs. The latter allows for comparison of the objects essentially
different in size. Inclusion of non-discretionary factors serves
separation of the indicators that are beyond the control of the objects.
A virtual perfect object comprised of maximal outputs and minimal
inputs was added to the group of actual ones. In this setting, explicit
solution of the DEA-ND problem was obtained. Energy sector of the
United States was analyzed using suggested approach for the period
of 1980 – 2006 with expected values of economic indicators for 2030
used for forming the perfect object. It was obtained that
environmental performance has been increasing steadily for the
period from 7.7% through 50.0% but still remains well below the
prospected level
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: Nowadays Multilevel inverters are widely using in various applications. Modulation strategy at fundamental switching frequency like, SHEPWM is prominent technique to eliminate lower order of harmonics with less switching losses and better harmonic profile. The equations which are formed by SHE are highly nonlinear transcendental in nature, there may exist single, multiple or even no solutions for a particular MI. However, some loads such as electrical drives, it is required to operate in whole range of MI. In order to solve SHE equations for whole range of MI, intelligent techniques are well suited to solve equations so as to produce lest %THDV. Hence, this paper uses Continuous genetic algorithm for minimising harmonics. This paper also presents wavelet based analysis of harmonics. The developed algorithm is simulated and %THD from FFT analysis and Wavelet analysis are compared. MATLAB programming environment and SIMULINK models are used whenever necessary.
Abstract: Quantitative characterization of nonlinear directional
couplings between stochastic oscillators from data is considered. We
suggest coupling characteristics readily interpreted from a physical
viewpoint and their estimators. An expression for a statistical
significance level is derived analytically that allows reliable coupling
detection from a relatively short time series. Performance of the
technique is demonstrated in numerical experiments.
Abstract: This paper presents a new stable robust adaptive controller and observer design for a class of nonlinear systems that contain i. Coupling of unmeasured states and unknown parameters ii. Unknown dead zone at the system actuator. The system is firstly cast into a modified form in which the observer and parameter estimation become feasible. Then a stable robust adaptive controller, state observer, parameter update laws are derived that would provide global adaptive system stability and desirable performance. To validate the approach, simulation was performed to a single-link mechanical system with a dynamic friction model and unknown dead zone exists at the system actuation. Then a comparison is presented with the results when there is no dead zone at the system actuation.
Abstract: Educational games (EG) seem to have lots of potential due to digital games popularity and preferences of our younger generations of learners. However, most studies focus on game design and its effectiveness while little has been known about the factors that can affect users to accept or to reject EG for their learning. User acceptance research try to understand the determinants of information systems (IS) adoption among users by investigating both systems factors and users factors. Upon the lack of knowledge on acceptance factors for educational games, we seek to understand the issue. This study proposed a model of acceptance factors based on Unified Theory of Acceptance and Use of Technology (UTAUT). We use original model (performance expectancy, effort expectancy and social influence) together with two new determinants (learning opportunities and enjoyment). We will also investigate the effect of gender and gaming experience that moderate the proposed factors.
Abstract: Soil erosion is the most serious problem faced at
global and local level. So planning of soil conservation measures has
become prominent agenda in the view of water basin managers. To
plan for the soil conservation measures, the information on soil
erosion is essential. Universal Soil Loss Equation (USLE), Revised
Universal Soil Loss Equation 1 (RUSLE1or RUSLE) and Modified
Universal Soil Loss Equation (MUSLE), RUSLE 1.06, RUSLE1.06c,
RUSLE2 are most widely used conventional erosion estimation
methods. The essential drawbacks of USLE, RUSLE1 equations are
that they are based on average annual values of its parameters and so
their applicability to small temporal scale is questionable. Also these
equations do not estimate runoff generated soil erosion. So
applicability of these equations to estimate runoff generated soil
erosion is questionable. Data used in formation of USLE, RUSLE1
equations was plot data so its applicability at greater spatial scale
needs some scale correction factors to be induced. On the other hand
MUSLE is unsuitable for predicting sediment yield of small and large
events. Although the new revised forms of USLE like RUSLE 1.06,
RUSLE1.06c and RUSLE2 were land use independent and they have
almost cleared all the drawbacks in earlier versions like USLE and
RUSLE1, they are based on the regional data of specific area and
their applicability to other areas having different climate, soil, land
use is questionable. These conventional equations are applicable for
sheet and rill erosion and unable to predict gully erosion and spatial
pattern of rills. So the research was focused on development of nonconventional
(other than conventional) methods of soil erosion
estimation. When these non-conventional methods are combined with
GIS and RS, gives spatial distribution of soil erosion. In the present
paper the review of literature on non- conventional methods of soil
erosion estimation supported by GIS and RS is presented.
Abstract: In this paper the authors propose and verify an approach to control heat flow in machine tool components. Thermal deformations are a main aspect that affects the accuracy of machining. Due to goals of energy efficiency, thermal basic loads should be reduced. This leads to inhomogeneous and time variant temperature profiles. To counteract these negative consequences, material with high melting enthalpy is used as a method for thermal stabilization. The increased thermal capacity slows down the transient thermal behavior. To account for the delayed thermal equilibrium, a control mechanism for thermal flow is introduced. By varying a gap in a heat flow path the thermal resistance of an assembly can be controlled. This mechanism is evaluated in two experimental setups. First to validate the ability to control the thermal resistance and second to prove the possibility of a self-sufficient option based on the selfsensing abilities of thermal shape memory alloys.
Abstract: Analysis for the generalized thermoelastic Lamb
waves, which propagates in anisotropic thin plates in generalized
thermoelasticity, is presented employing normal mode expansion
method. The displacement and temperature fields are expressed by a
summation of the symmetric and antisymmetric thermoelastic modes
in the surface thermal stresses and thermal gradient free orthotropic
plate, therefore the theory is particularly appropriate for waveform
analyses of Lamb waves in thin anisotropic plates. The transient
waveforms excited by the thermoelastic expansion are analyzed for
an orthotropic thin plate. The obtained results show that the theory
provides a quantitative analysis to characterize anisotropic
thermoelastic stiffness properties of plates by wave detection. Finally
numerical calculations have been presented for a NaF crystal, and the
dispersion curves for the lowest modes of the symmetric and
antisymmetric vibrations are represented graphically at different
values of thermal relaxation time. However, the methods can be used
for other materials as well
Abstract: It is estimated that the total cost of abnormal
conditions to US process industries is around $20 billion dollars in
annual losses. The hydrotreatment (HDT) of diesel fuel in petroleum
refineries is a conversion process that leads to high profitable
economical returns. However, this is a difficult process to control
because it is operated continuously, with high hydrogen pressures
and it is also subject to disturbances in feed properties and catalyst
performance. So, the automatic detection of fault and diagnosis plays
an important role in this context. In this work, a hybrid approach
based on neural networks together with a pos-processing
classification algorithm is used to detect faults in a simulated HDT
unit. Nine classes (8 faults and the normal operation) were correctly
classified using the proposed approach in a maximum time of 5
minutes, based on on-line data process measurements.
Abstract: Optical burst switching(OBS) is considered as one of
preferable network technologies for the next generation Internet. The
Internet has two traffic classes, i.e. real-time bursts and reliable bursts.
It is an important subject for OBS to achieve cooperated operation of
real-time bursts and reliable bursts. In this paper, we proposes a new
effective traffic control method named Separate TB+LB (Token
Bucket + Leaky Bucket : TB+LB) method. The proposed method
presents a new Token Bucket scheme for real-time bursts called as
RBO-TB (Real-time Bursts Oriented Token Bucket). The method also
applies the LB method to reliable bursts for obtaining better
performance. This paper verifies the effectiveness of the Separate
TB+LB method through the performance evaluation.
Abstract: In the globalization context and competitiveness, the role of a university is further enhanced. University is no longer confined to traditional roles. Universities need to interact with others in order to be relevant and progressive. Symbiosis relationships between the university and industry are very significant because the relationship between those two can foster economic development of a nation. In a world of fast changing technology and competition, it is necessary for the university to collaborate with industry to combine efforts fostering the diffusion of knowledge, increasing research and development, patenting innovation and commercializing products. It has become increasingly accepted that the necessity of close university-industry interactions as a mean of national economic prosperity. Therefore, this paper is aim to examine the level of linkages in university-industry interactions to which promotes the regional economic growth and development. This paper will explore the formation of linkages between the Higher Education Institution (University Technology MARA) and industries located in the Klang Valley region of Malaysia. It will present the university-industry linkages with emphasis on the type of linkages existed, the benefits of having such linkages to promote regional economic development and finally the constraints that might impede the linkages and potentials to enhance the linkages towards economic growth and development.