Abstract: In Thailand, the practice of pre-hospital Emergency
Medical Service (EMS) in each area reveals the different growth
rates and effectiveness of the practices. Those can be found as the
diverse quality and quantity. To shorten the learning curve prior to
speed-up the practices in other areas, story telling and lessons learnt
from the effective practices are valued as meaningful knowledge. To
this paper, it was to ascertain the factors, lessons learnt and best
practices that have impact as contributing to the success of prehospital
EMS system. Those were formulized as model prior to
speedup the practice in other areas. To develop the model, Malcolm
Baldrige National Quality Award (MBNQA), which is widely
recognized as a framework for organizational quality assessment and
improvement, was chosen as the discussion framework. Remarkably,
this study was based on the consideration of knowledge capture;
however it was not to complete the loop of knowledge activities.
Nevertheless, it was to highlight the recognition of knowledge
capture, which is the initiation of knowledge management.
Abstract: The incessant discomfort for Voluntary Counselling and Testing (VCT) exhibited by students in some tertiary institutions in Kano State, Nigeria is capable of causing Psychological Resistance as well as jeopardizing the purpose of HIV intervention. This study investigated the Prevalence of Psychological Resistance to VCT of HIV/AIDS among students of tertiary institutions in the state. Two null hypotheses were postulated and tested. Cross- Sectional Survey Design was employed in which 1512 sample was selected from a student population of 104,841 following Stratified Random Sampling technique. A self-developed 20-item scale whose reliability coefficient is 0.83 was used for data collection. Data analyzed via Chi-square and t-test reveals a prevalence of 38% with males (Mean=0.34; SD=0.475) constituting 60% and females (Mean=0.45; SD=0.498) 40%. Also, the calculated chi-square and ttest were not significant at 0.05 as such the null hypotheses were upheld. Recommendation offered suggests the use of reinforcement and social support for students who patronize HIV/AIDS counselling.
Abstract: The bioassay-guided isolation and purification of an
ethyl acetate extract of Aspergillus terreus MC751 led to the
characterization of butyrolactone I as an antidiabetic and antioxidant.
The antidiabetic activity of butyrolactone I was evaluated by α-
glucosidase and α-amylase inhibition assays. Butyrolactone I
demonstrated significant concentration-dependent, mixed-type
inhibitory activity against yeast α-glucosidase with an IC50 of 54μM.
However, the compound exhibited less activity against rat intestinal
α-glucosidase and α-amylase. This is the first report on α-glucosidase
inhibitory activity of butyrolactone I. The antioxidative activity of
butyrolactone I was evaluated based on scavenging effects on 1,1-
diphenyl-2-picrylhydrazyl (DPPH) (IC50 =51 μM) and hydrogen
peroxide (IC50= 141 μM) radicals as well as a reducing power assay.
The results suggest that butyrolactone I is a promising antidiabetic as
well as antioxidant and should be considered for clinical trials.
Abstract: Void formation in underfill is considered as failure
in flip chip manufacturing process. Void formation possibly caused
by several factors such as poor soldering and flux residue during
die attach process, void entrapment due moisture contamination,
dispense pattern process and setting up the curing process. This
paper presents the comparison of single step and two steps curing
profile towards the void and black dots formation in underfill for
Hi-CTE Flip Chip Ceramic Ball Grid Array Package (FC-CBGA).
Statistic analysis was conducted to analyze how different factors
such as wafer lot, sawing technique, underfill fillet height and
curing profile recipe were affected the formation of voids and
black dots. A C-Mode Scanning Aqoustic Microscopy (C-SAM)
was used to scan the total count of voids and black dots. It was
shown that the 2 steps curing profile provided solution for void
elimination and black dots in underfill after curing process.
Abstract: In this paper a novel algorithm is proposed that integrates the process of fuzzy hierarchy generation and rule discovery for automated discovery of Production Rules with Fuzzy Hierarchy (PRFH) in large databases.A concept of frequency matrix (Freq) introduced to summarize large database that helps in minimizing the number of database accesses, identification and removal of irrelevant attribute values and weak classes during the fuzzy hierarchy generation.Experimental results have established the effectiveness of the proposed algorithm.
Abstract: The most widely used semiconductor memory types
are the Dynamic Random Access Memory (DRAM) and Static
Random Access memory (SRAM). Competition among memory
manufacturers drives the need to decrease power consumption and
reduce the probability of read failure. A technology that is relatively
new and has not been explored is the FinFET technology. In this
paper, a single cell Schmitt Trigger Based Static RAM using FinFET
technology is proposed and analyzed. The accuracy of the result is
validated by means of HSPICE simulations with 32nm FinFET
technology and the results are then compared with 6T SRAM using
the same technology.
Abstract: As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.
Abstract: These days we face with so many advertisements in
magazines, those mentioned coaching is pragmatic specialties which
help people make change in their lives. Up to know Specialty coaches
are not necessarily therapists, consultants or psychologist, thus they
may not know psychological theories. The International Coach
Federation identifies "facilitating learning and results" as one of its
four core coach competencies, without understanding learning
theories coaching practice hangs in theoretical abyss. Thus the aim of
this article is investigating learning theories within coaching process.
Therefore, I reviewed some cognitive and behavioral learning
theories and analyzed their contribution with coaching process which
has been introduced in mentor coaches and ICF certified coaches'
papers and books. The result demonstrated that coaching profession
is strongly grounded in learning theories, and it will be strengthened
by the validation of theories and evidence-based research as we move
forward. Thus, it needs more research in order to applying effective
theoretical frameworks.
Abstract: Existing experiences indicate that one of the most
prominent reasons that some ERP implementations fail is related to
selecting an improper ERP package. Among those important factors
resulting in inappropriate ERP selections, one is to ignore preliminary
activities that should be done before the evaluation of ERP packages.
Another factor yielding these unsuitable selections is that usually
organizations employ prolonged and costly selection processes in
such extent that sometimes the process would never be finalized
or sometimes the evaluation team might perform many key final
activities in an incomplete or inaccurate way due to exhaustion, lack
of interest or out-of-date data. In this paper, a systematic approach
that recommends some activities to be done before and after the
main selection phase is introduced for choosing an ERP package. On
the other hand, the proposed approach has utilized some ideas that
accelerates the selection process at the same time that reduces the
probability of an erroneous final selection.
Abstract: A new method for low complexity image coding is presented, that permits different settings and great scalability in the generation of the final bit stream. This coding presents a continuoustone still image compression system that groups loss and lossless compression making use of finite arithmetic reversible transforms. Both transformation in the space of color and wavelet transformation are reversible. The transformed coefficients are coded by means of a coding system in depending on a subdivision into smaller components (CFDS) similar to the bit importance codification. The subcomponents so obtained are reordered by means of a highly configure alignment system depending on the application that makes possible the re-configure of the elements of the image and obtaining different levels of importance from which the bit stream will be generated. The subcomponents of each level of importance are coded using a variable length entropy coding system (VBLm) that permits the generation of an embedded bit stream. This bit stream supposes itself a bit stream that codes a compressed still image. However, the use of a packing system on the bit stream after the VBLm allows the realization of a final highly scalable bit stream from a basic image level and one or several enhance levels.
Abstract: In this study, we examine multiple algebras and
algebraic structures derived from them and by stating a theory on
multiple algebras; we will show that the theory of multiple algebras
is a natural extension of the theory of universal algebras. Also, we
will treat equivalence relations on multiple algebras, for which the
quotient constructed modulo them is a universal algebra and will
study the basic relation and the fundamental algebra in question.
In this study, by stating the characteristic theorem of multiple
algebras, we show that the theory of multiple algebras is a natural
extension of the theory of universal algebras.
Abstract: We present a dextran modified silicon microring
resonator sensor for high density antibody immobilization. An array
of sensors consisting of three sensor rings and a reference ring was
fabricated and its surface sensitivity and the limit of detection were
obtained using polyelectrolyte multilayers. The mass sensitivity and
the limit of detection of the fabricated sensor ring are 0.35 nm/ng
mm-2 and 42.8 pg/mm2 in air, respectively. Dextran modified sensor
surface was successfully prepared by covalent grafting of oxidized
dextran on 3-aminopropyltriethoxysilane (APTES) modified silicon
sensor surface. The antibody immobilization on hydrogel dextran
matrix improves 40% compared to traditional antibody
immobilization method via APTES and glutaraldehyde linkage.
Abstract: This paper presents a vocoder to obtain high quality synthetic speech at 600 bps. To reduce the bit rate, the algorithm is based on a sinusoidally excited linear prediction model which extracts few coding parameters, and three consecutive frames are grouped into a superframe and jointly vector quantization is used to obtain high coding efficiency. The inter-frame redundancy is exploited with distinct quantization schemes for different unvoiced/voiced frame combinations in the superframe. Experimental results show that the quality of the proposed coder is better than that of 2.4kbps LPC10e and achieves approximately the same as that of 2.4kbps MELP and with high robustness.
Abstract: Clustering techniques have been used by many intelligent software agents to group similar access patterns of the Web users into high level themes which express users intentions and interests. However, such techniques have been mostly focusing on one salient feature of the Web document visited by the user, namely the extracted keywords. The major aim of these techniques is to come up with an optimal threshold for the number of keywords needed to produce more focused themes. In this paper we focus on both keyword and similarity thresholds to generate themes with concentrated themes, and hence build a more sound model of the user behavior. The purpose of this paper is two fold: use distance based clustering methods to recognize overall themes from the Proxy log file, and suggest an efficient cut off levels for the keyword and similarity thresholds which tend to produce more optimal clusters with better focus and efficient size.
Abstract: This work proposes an accurate crosstalk noise estimation method in the presence of multiple RLC lines for the use in design automation tools. This method correctly models the loading effects of non switching aggressors and aggressor tree branches using resistive shielding effect and realistic exponential input waveforms. Noise peak and width expressions have been derived. The results obtained are at good agreement with SPICE results. Results show that average error for noise peak is 4.7% and for the width is 6.15% while allowing a very fast analysis.
Abstract: With constraints on data availability and for study of power system stability it is adequate to model the synchronous generator with field circuit and one equivalent damper on q-axis known as the model 1.1. This paper presents a systematic procedure for modelling and simulation of a single-machine infinite-bus power system installed with a thyristor controlled series compensator (TCSC) where the synchronous generator is represented by model 1.1, so that impact of TCSC on power system stability can be more reasonably evaluated. The model of the example power system is developed using MATLAB/SIMULINK which can be can be used for teaching the power system stability phenomena, and also for research works especially to develop generator controllers using advanced technologies. Further, the parameters of the TCSC controller are optimized using genetic algorithm. The non-linear simulation results are presented to validate the effectiveness of the proposed approach.
Abstract: This paper presents the identification of the impact
force acting on a simply supported beam. The force identification is
an inverse problem in which the measured response of the structure is
used to determine the applied force. The identification problem is
formulated as an optimization problem and the genetic algorithm is
utilized to solve the optimization problem. The objective function is
calculated on the difference between analytical and measured
responses and the decision variables are the location and magnitude
of the applied force. The results from simulation show the
effectiveness of the approach and its robustness vs. the measurement
noise and sensor location.
Abstract: Despite the extensive use of eLearning systems, there
is no consensus on a standard framework for evaluating this kind of
quality system. Hence, there is only a minimum set of tools that can
supervise this judgment and gives information about the course
content value. This paper presents two kinds of quality set evaluation
indicators for eLearning courses based on the computational process
of three known metrics, the Euclidian, Hamming and Levenshtein
distances. The “distance" calculus is applied to standard evaluation
templates (i.e. the European Commission Programme procedures vs.
the AFNOR Z 76-001 Standard), determining a reference point in the
evaluation of the e-learning course quality vs. the optimal concept(s).
The case study, based on the results of project(s) developed in the
framework of the European Programme “Leonardo da Vinci", with
Romanian contractors, try to put into evidence the benefits of such a
method.
Abstract: Existing work in temporal logic on representing the
execution of infinitely many transactions, uses linear-time temporal
logic (LTL) and only models two-step transactions. In this paper,
we use the comparatively efficient branching-time computational tree
logic CTL and extend the transaction model to a class of multistep
transactions, by introducing distinguished propositional variables
to represent the read and write steps of n multi-step transactions
accessing m data items infinitely many times. We prove that the
well known correspondence between acyclicity of conflict graphs
and serializability for finite schedules, extends to infinite schedules.
Furthermore, in the case of transactions accessing the same set of
data items in (possibly) different orders, serializability corresponds
to the absence of cycles of length two. This result is used to give an
efficient encoding of the serializability condition into CTL.
Abstract: In this paper, we consider the global exponential stability of the equilibrium point of Hopfield neural networks with delays and impulsive perturbation. Some new exponential stability criteria of the system are derived by using the Lyapunov functional method and the linear matrix inequality approach for estimating the upper bound of the derivative of Lyapunov functional. Finally, we illustrate two numerical examples showing the effectiveness of our theoretical results.