Abstract: Viscous heating becomes significant in the high speed
resin coating process of glass fibers for optical fiber manufacturing.
This study focuses on the coating resin flows inside the capillary
coating die of optical fiber coating applicator and they are numerically
simulated to examine the effects of viscous heating and subsequent
temperature increase in coating resin. Resin flows are driven by fast
moving glass fiber and the pressurization at the coating die inlet, while
the temperature dependent viscosity of liquid coating resin plays an
important role in the resin flow. It is found that the severe viscous
heating near the coating die wall profoundly alters the radial velocity
profiles and that the increase of final coating thickness by die
pressurization is amplified if viscous heating is present.
Abstract: Pressure waves and Water Hammer occur in a
pumping system when valves are closed or opened suddenly or in
the case of sudden failure of pumps. Determination of maximum
water hammer is considered one of the most important technical
and economical items of which engineers and designers of
pumping stations and conveyance pipelines should take care.
Hammer Software is a recent application used to simulate water
hammer. The present study focuses on determining significance of
each input parameter of the application relative to the maximum
amount of water hammer estimated by the software. The study
determines estimated maximum water hammer variations due to
variations of input parameters including water temperature, pipe
type, thickness and diameter, electromotor rpm and power, and
moment of inertia of electromotor and pump. In our study,
Kuhrang Pumping Station was modeled using WaterGEMS
Software. The pumping station is characterized by total discharge
of 200 liters per second, dynamic height of 194 meters and 1.5
kilometers of steel conveyance pipeline and transports water to
Cheshme Morvarid for farmland irrigation. The model was run in
steady hydraulic condition and transferred to Hammer Software.
Then, the model was run in several unsteady hydraulic conditions
and sensitivity of maximum water hammer to each input parameter
was calculated. It is shown that parameters to which maximum
water hammer is most sensitive are moment of inertia of pump and
electromotor, diameter, type and thickness of pipe and water
temperature, respectively.
Abstract: This paper presents an analysis on the capacity and performance of MIMO-OFDM systems. The work is focused on the capacity of MIMO-OFDM systems over rician fading channel, in the case of the channel being known at the receiver only, which is more practical case of the channel. Simple expression for capacity is derived for the case of correlated rician fading. The performance of some MIMO-OFDM implementations with rician fading model is presented using an Alamouti coding scheme and Simulation results are obtained for both capacity and performance analysis.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.
Abstract: The following study aims to outline, whether the
perceptions of entrepreneurs about their entrepreneurial activities and
the underlying meanings of their activities are universal or whether
they vary systematically across cultures. In contrast to previous
studies, the phenomenographical approach and the resulting findings
of this study provide new insights into what constitutes
entrepreneurship by drawing an inference from the perceptions of
entrepreneurs in the United States and in Germany. Culture is shown
to have an important impact on entrepreneurship, since the
underlying meanings of entrepreneurship vary significantly among
the two sample groups. Furthermore, the study sheds more light on
the culturally contingent 'why' of entrepreneurship by looking at the
internal motivations of individuals instead of exclusively focusing on
character traits or external influences of the respective economic
environments.
Abstract: Today, people are more interested in the foods
beneficial on their health. However, there are still lacks of accurate
knowledge in the field of biological properties, functional properties,
including the application of legume in foods. This study focused on
antioxidant activity of soybean (SB) and fermented soybean (FSB)
crude extracts evaluating to have more information in fortification SB
and FSB crude extracts in food products and/or dietary supplement.
SB and FSB crude extracts were prepared by infusion with water and
ethanol. The antioxidant activity of crude extracts was studied with
DPPH and ABTS assay including commercial standard. From both
DPPH and ABTS assay, the antioxidant activity of SB and FSB water
crude extract showed higher antioxidant activity than ethanol crude
extract, and FSB crude extract showed higher antioxidant activity
than SB crude extract. In DPPH assay, BHT and vitamin C showed
IC50 values at 0.241, 0.039 mg/ml, in ABTS assay. In addition,
Trolox showed IC50 at 0.058 mg/ml respectively. FSB water crude
extract showed high antioxidant activity. Finally, the functional
properties study of both water and ethanol crude extracts should be
done for beneficial in application of these extracts in food products
and dietary supplement in the near future.
Abstract: This paper looks at transgender identities and the law in the context of marriage. It particularly focuses on the role of language and definition in classifying transgendered individuals into a legal category. Two lines of cases in transgender jurisprudence are examined. The former cases decided the definition of 'man' and 'woman' on the basis of biological criteria while the latter cases held that biological factors should not be the sole criterion for defining a man or a woman. Three categories were found to classify transgender people, namely male, female and "monstrous". Since transgender people challenge the core gender distinction that the law stresses, they are often regarded as problematic and monstrous which caused them to be subjected to severe legal consequences. This paper discusses these issues by analyzing and comparing different cases in transgender jurisprudence as well as examining how these issues play out in contemporary Hong Kong.
Abstract: In this paper we focus on event extraction from Tamil
news article. This system utilizes a scoring scheme for extracting and
grouping event-specific sentences. Using this scoring scheme eventspecific
clustering is performed for multiple documents. Events are
extracted from each document using a scoring scheme based on
feature score and condition score. Similarly event specific sentences
are clustered from multiple documents using this scoring scheme.
The proposed system builds the Event Template based on user
specified query. The templates are filled with event specific details
like person, location and timeline extracted from the formed clusters.
The proposed system applies these methodologies for Tamil news
articles that have been enconverted into UNL graphs using a Tamil to
UNL-enconverter. The main intention of this work is to generate an
event based template.
Abstract: The Malaysia Highway Authority (MHA) was
established by the Government in 1980 for the purpose of designing,
constructing and maintaining toll highways in Malaysia that include
the North-South Expressway and the Penang Bridge, which were
procured using the publicly-funded traditional procurement. However
following a recession in the mid 80-s, the operations of these tolledhighways
had been privatized to ensure that their operational services
continue through private financing as a result of long-term
concession agreement concurred between the Malaysian Government
and private operators. The change in the contract strategy for
highway projects in Malaysia would have a great tendency to dictate
a significant risk exposure towards the key parties involved,
particularly the Malaysian Government as project principal, unless
operational risks are clearly identified and managed via appropriate
mitigation measures prior to a contract signing.
This research identifies potential operational risks that have a
possibility to occur in highway projects in Malaysia from the
perspective of public sector clients. Since this research focuses on the
operational risks for highway projects in Malaysia, the initial results
acquired from literature review on the operational risks of highway
projects in some Asian countries are then justified by a number of
key individuals from the MHA through interviews. As a result,
among key operational risks that have possibility to occur in the
highway projects in Malaysia include initial toll-tariff decided by the
Government, traffic congestion, change of road network and overloaded
freight transportation, which could cause damage to the road
surface and hence affecting the operation of a particular highway.
Abstract: Polarization-interferometric nonlinear confocal
microscopy is proposed for measuring a nano-sized particle with
optical anisotropy. The anisotropy in the particle was
spectroscopically imaged through a three-dimensional distribution of
third-order nonlinear dielectric polarization photoinduced.
Abstract: The study attempted to identify the dominant
intelligences of athletes by comparing the developmental differences
of multiple intelligences between athletes and non-athletes. The
weekly specialized training hours and years of specialized training
was examined to see how it can predict the dominant intelligence with
the age factor controlled. There were 355 participants in the research
(202 athletes and 153 non-athletes). Collected data were analyzed with
one-way MANOVA and multiple hierarchical regression. The results
suggested the dominant intelligences of athletes were Interpersonal
Intelligence, Bodily-Kinesthetic Intelligence, and Intrapersonal
Intelligence. The weekly specialized training hours and years of
specialized training could effectively predict the Interpersonal
Intelligence, Bodily-Kinesthetic Intelligence, and Intrapersonal
Intelligence of athletes. The author suggested the future studies could
focus on the theory construction of weekly specialized training and
years of specialized training. Also, the studies on using “Bridge
strategy" by the athletes to guide disadvantage intelligences with
dominant intelligences are highly valued.
Abstract: The emergence of the Internet has brewed the
revolution of information storage and retrieval. As most of the
data in the web is unstructured, and contains a mix of text,
video, audio etc, there is a need to mine information to cater to
the specific needs of the users without loss of important
hidden information. Thus developing user friendly and
automated tools for providing relevant information quickly
becomes a major challenge in web mining research. Most of
the existing web mining algorithms have concentrated on
finding frequent patterns while neglecting the less frequent
ones that are likely to contain outlying data such as noise,
irrelevant and redundant data. This paper mainly focuses on
Signed approach and full word matching on the organized
domain dictionary for mining web content outliers. This
Signed approach gives the relevant web documents as well as
outlying web documents. As the dictionary is organized based
on the number of characters in a word, searching and retrieval
of documents takes less time and less space.
Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: The proliferation of user-generated content (UGC) results in huge opportunities to explore event patterns. However, existing event recommendation systems primarily focus on advanced information technology users. Little work has been done to address novice and low-literacy users. The next billion users providing and consuming UGC are likely to include communities from developing countries who are ready to use affordable technologies for subsistence goals. Therefore, we propose a design framework for providing event recommendations to address the needs of such users. Grounded in information integration theory (IIT), our framework advocates that effective event recommendation is supported by systems capable of (1) reliable information gathering through structured user input, (2) accurate sense making through spatial-temporal analytics, and (3) intuitive information dissemination through interactive visualization techniques. A mobile pest management application is developed as an instantiation of the design framework. Our preliminary study suggests a set of design principles for novice and low-literacy users.
Abstract: This paper focuses attention on specific aspects of
entrepreneurial decisions relating to investment, both in the total
fixed investments and plant & machinery (separately). Demand and
financial factors, internal and external, are considered in the
investment analysis. Finally the influence of determinants of fixed
investment and investment plans are examined in Electric Power
industry in India.
Abstract: Nowadays increasingly the population makes use of
Information Technology (IT). As such, in recent year the Portuguese
government increased its focus on using the IT for improving
people-s life and began to develop a set of measures to enable the
modernization of the Public Administration, and so reducing the gap
between Public Administration and citizens.Thus the Portuguese
Government launched the Simplex Program. However these
SIMPLEX eGov measures, which have been implemented over the
years, present a serious challenge: how to forecast its impact on
existing Information Systems Architecture (ISA). Thus, this research
is focus in addressing the problem of automating the evaluation of the
actual impact of implementation an eGovSimplification and
Modernization measures in the Information Systems Architecture. To
realize the evaluation we proposes a Framework, which is supported
by some key concepts as: Quality Factors, ISA modeling,
Multicriteria Approach, Polarity Profile and Quality Metrics
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.
Abstract: Medical image registration is the key technology in image guided radiation therapy (IGRT) systems. On the basis of the previous work on our IGRT prototype with a biorthogonal x-ray imaging system, we described a method focused on the 2D/2D rigid-body registration using multiresolution pyramid based mutual information in this paper. Three key steps were involved in the method : firstly, four 2D images were obtained including two x-ray projection images and two digital reconstructed radiographies(DRRs ) as the input for the registration ; Secondly, each pair of the corresponding x-ray image and DRR image were matched using multiresolution pyramid based mutual information under the ITK registration framework ; Thirdly, we got the final couch offset through a coordinate transformation by calculating the translations acquired from the two pairs of the images. A simulation example of a parotid gland tumor case and a clinical example of an anthropomorphic head phantom were employed in the verification tests. In addition, the influence of different CT slice thickness were tested. The simulation results showed that the positioning errors were 0.068±0.070, 0.072±0.098, 0.154±0.176mm along three axes which were lateral, longitudinal and vertical. The clinical test indicated that the positioning errors of the planned isocenter were 0.066, 0.07, 2.06mm on average with a CT slice thickness of 2.5mm. It can be concluded that our method with its verified accuracy and robustness can be effectively used in IGRT systems for patient setup.
Abstract: The development of information and communication
technology, the increased use of the internet, as well as the effects of
the recession within the last years, have lead to the increased use of
cloud computing based solutions, also called on-demand solutions.
These solutions offer a large number of benefits to organizations as
well as challenges and risks, mainly determined by data visualization
in different geographic locations on the internet. As far as the specific
risks of cloud environment are concerned, data security is still
considered a peak barrier in adopting cloud computing. The present
study offers an approach upon ensuring the security of cloud data,
oriented towards the whole data life cycle. The final part of the study
focuses on the assessment of data security in the cloud, this
representing the bases in determining the potential losses and the
premise for subsequent improvements and continuous learning.
Abstract: The paper focuses on the implementation phase of the
strategy of the European Union and the national strategy of the
Czech Republic to promote academic and research staff with the
potential to produce results that provide innovation useful for
economic growth. It deals with the use of financial resources of the
Operational Program Education for Competitiveness at the
University of West Bohemia in Pilsen. The author presents an
example of two strategic projects in the field of human resources –
Excellence in Human Resources as a Source of Competitiveness and
New Excellence of Human Resources. The subject of this paper is the
potential contribution of newly recruited postdoctoral within these
projects for the University of West Bohemia in Pilsen and its internal
environment.