Abstract: A comparative evaluation of acute toxicity of
synthesized nano silvers using two different procedures (biological
and chemical reduction methods) and silver ions on bacteria
Vibrio fischeri was investigated. The bacterial light inhibition test as
a toxicological endpoint was used by applying of a homemade
luminometer. To compare the toxicity effects as a quantitative
parameter, a nominal effective concentrations (EC) of chemicals and
a susceptibility constant (Z-value) of bacteria, after 5 min and 30 min
exposure times, were calculated. After 5 and 30 min contact times,
the EC50 values of two silver nanoparticles and the EC20 values were
about similar. It demonstrates that toxicity of silvers was independent
of their procedure. The EC values of nanoparticles were larger than
those of the silver ions. The susceptibilities(Z- Values) of V.fischeri
(L/mg) to the silver ions were greater than those of the nano silvers.
According to the EC and Z values, the toxicity of silvers decreased in
the following order: Silver ions >> silver nanoparticles from
chemical reduction method ~ silver nanoparticles from biological
method.
Abstract: In this paper, a novel method using Bees Algorithm is proposed to determine the optimal allocation of FACTS devices for maximizing the Available Transfer Capability (ATC) of power transactions between source and sink areas in the deregulated power system. The algorithm simultaneously searches the FACTS location, FACTS parameters and FACTS types. Two types of FACTS are simulated in this study namely Thyristor Controlled Series Compensator (TCSC) and Static Var Compensator (SVC). A Repeated Power Flow with FACTS devices including ATC is used to evaluate the feasible ATC value within real and reactive power generation limits, line thermal limits, voltage limits and FACTS operation limits. An IEEE30 bus system is used to demonstrate the effectiveness of the algorithm as an optimization tool to enhance ATC. A Genetic Algorithm technique is used for validation purposes. The results clearly indicate that the introduction of FACTS devices in a right combination of location and parameters could enhance ATC and Bees Algorithm can be efficiently used for this kind of nonlinear integer optimization.
Abstract: This study aims to analyze the effect of e-learning on
photonics technology and daily livings among college students. The
course contents of photonics technology and daily livings are first
drafted based on research discussions and expert interviews. Having
expert questionnaires with Delphi Technique for three times, the
knowledge units and items for the course of photonics technology and
daily livings are established. The e-learning materials and the drafts of
instructional strategies, academic achievement, and learning attitude
scales are then developed. With expert inspection, reliability and
validity test, and experimental instructions, the scales and the material
are further revised. Finally, the formal instructions are implemented to
test the effect of different instructional methods on the academic
achievement of photonics technology and daily livings among students
in universities of technology. The research results show that e-learning
could effectively promote academic achievement and learning
attitude, and the students with e-learning obviously outperform the
ones with trandition instructions.
Abstract: This paper considers the Zlin region in terms of the
demographic conditions of the region - in particular the residential
structure and the educational background of the inhabitants. The
paper also considers migration of the population within the Zlin
region. Migration is of importance in terms of conservation of the
working potential of the region.
Abstract: The paper presents new results of a recent industry
supported research and development study in which an efficient
framework for evaluating practical and meaningful power system
reliability and quality indices was applied. The system-wide
integrated performance indices are capable of addressing and
revealing areas of deficiencies and bottlenecks as well as
redundancies in the composite generation-transmission-demand
structure of large-scale power grids. The technique utilizes a linear
programming formulation, which simulates practical operating
actions and offers a general and comprehensive framework to assess
the harmony and compatibility of generation, transmission and
demand in a power system. Practical applications to a reduced
system model as well as a portion of the Saudi power grid are also
presented in the paper for demonstration purposes.
Abstract: This paper presents a new method which applies an
artificial bee colony algorithm (ABC) for capacitor placement in
distribution systems with an objective of improving the voltage profile
and reduction of power loss. The ABC algorithm is a new population
based meta heuristic approach inspired by intelligent foraging behavior
of honeybee swarm. The advantage of ABC algorithm is that
it does not require external parameters such as cross over rate and
mutation rate as in case of genetic algorithm and differential evolution
and it is hard to determine these parameters in prior. The other
advantage is that the global search ability in the algorithm is implemented
by introducing neighborhood source production mechanism
which is a similar to mutation process. To demonstrate the validity
of the proposed algorithm, computer simulations are carried out on
69-bus system and compared the results with the other approach
available in the literature. The proposed method has outperformed the
other methods in terms of the quality of solution and computational
efficiency.
Abstract: The lack of any centralized infrastructure in mobile ad
hoc networks (MANET) is one of the greatest security concerns in
the deployment of wireless networks. Thus communication in
MANET functions properly only if the participating nodes cooperate
in routing without any malicious intention. However, some of the
nodes may be malicious in their behavior, by indulging in flooding
attacks on their neighbors. Some others may act malicious by
launching active security attacks like denial of service. This paper
addresses few related works done on trust evaluation and
establishment in ad hoc networks. Related works on flooding attack
prevention are reviewed. A new trust approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate and prevent flooding attacks in an ad hoc environment.
The performance of the trust algorithm is tested in an ad hoc network
implementing the Ad hoc On-demand Distance Vector (AODV)
protocol.
Abstract: This study describes the relationship between motivation factors and academic performance among distance education students enrolled in a postgraduate nursing course. Students (n=96) participated in a survey that assesses student's motivational orientations from a cognitive perspective using a selfadministered questionnaire based on Pintrich-s Motivation Strategies for Learning Questionnaire (MLSQ). Results showed students- motivational factors are highest on task value (6.44, 0.71); followed by intrinsic goal orientation (6.20, 0.76), control beliefs (6.02, 0.89); extrinsic goal orientation (5.85, 1.13); self-efficacy for learning and performance (5.62, 0.84), and finally, test anxiety (4.21, 1.37). Weak positive correlations were found between academic performance and intrinsic goal orientation (r=0.13), extrinsic goal orientation (r=0.04), task value (r=0.09), control beliefs (r=0.02), and self-efficacy (r=0.05), while there was weak negative correlation with test anxiety (r=-0.04). Conclusions from the study indicate the need to focus on improving tasks and targeting intrinsic goal orientations of students to courses since these were positively correlated with academic performance and downplay the use of tests since these were negatively correlated with academic performance.
Abstract: This essay endeavors to read Ama Ata Aidoo-s Our Sister Killjoy with a postocolonially-inflected consciousness. It aims at demonstrating how her work could be read as a sophisticated postcolonial revision of the colonial travel narrative whereby the protagonist-s black-eyed squint operates as 'the all-seeing-eye' to subvert the historically unbroken legacy of the Orientalist ideology. It tries to demonstrate how Sissie assumes authority and voice in an act that destabilizes the traditionally established modes of western representation. It is also an investigation into how Aidoo-s text adopts processes which disengage the Eurocentric view produced by the discursive itineraries of western institutions through diverse acts of resistance and 'various strategies of subversion and appropriation'. Her counter discursive strategies of resistance are shaped up in various ways by a feminist consciousness that attempts to articulate a distinct African version of identity and preserve cultural distinctiveness.
Abstract: In this paper we propose new method for
simultaneous generating multiple quantiles corresponding to given
probability levels from data streams and massive data sets. This
method provides a basis for development of single-pass low-storage
quantile estimation algorithms, which differ in complexity, storage
requirement and accuracy. We demonstrate that such algorithms may
perform well even for heavy-tailed data.
Abstract: As far as the latest technological improvements are concerned, digital systems more become popular than the past. Despite this growing demand to the digital systems, content copy and attack against the digital cinema contents becomes a serious problem. To solve the above security problem, we propose “traceable watermarking using Hash functions for digital cinema system. Digital Cinema is a great application for traceable watermarking since it uses watermarking technology during content play as well as content transmission. The watermark is embedded into the randomly selected movie frames using CRC-32 techniques. CRC-32 is a Hash function. Using it, the embedding position is distributed by Hash Function so that any party cannot break off the watermarking or will not be able to change. Finally, our experimental results show that proposed DWT watermarking method using CRC-32 is much better than the convenient watermarking techniques in terms of robustness, image quality and its simple but unbreakable algorithm.
Abstract: Regular physical activity contributes positively to physiological and psychological health. This study aimed to identify exercise behavior changes, self efficacy and decisional balance in nursing and midwifery students. This was a cross-sectional study carried out in Iran.300undergraduate nursing and midwifery students participated in this study. Data were collected using a questionnaire including demographic information, exercise stages of change, exercise self efficacy and pros and cons exercise decisional balance. The analysis was performed using the SPSS.A p-value of less than 0.05 was considered as statistically significant.
Abstract: This paper presents an approach for the design of
fuzzy logic power system stabilizers using genetic algorithms. In the
proposed fuzzy expert system, speed deviation and its derivative
have been selected as fuzzy inputs. In this approach the parameters of
the fuzzy logic controllers have been tuned using genetic algorithm.
Incorporation of GA in the design of fuzzy logic power system
stabilizer will add an intelligent dimension to the stabilizer and
significantly reduces computational time in the design process. It is
shown in this paper that the system dynamic performance can be
improved significantly by incorporating a genetic-based searching
mechanism. To demonstrate the robustness of the genetic based
fuzzy logic power system stabilizer (GFLPSS), simulation studies on
multimachine system subjected to small perturbation and three-phase
fault have been carried out. Simulation results show the superiority
and robustness of GA based power system stabilizer as compare to
conventionally tuned controller to enhance system dynamic
performance over a wide range of operating conditions.
Abstract: As increasing importance of symbiosis and cooperation among mobile communication industries, the mobile ecosystem has been especially highlighted in academia and practice. The structure of mobile ecosystem is quite complex and the ecological role of actors is important to understand that structure. In this respect, this study aims to explore structure of mobile ecosystem in the case of Korea using inter-industry network analysis. Then, the ecological roles in mobile ecosystem are identified using centrality measures as a result of network analysis: degree of centrality, closeness, and betweenness. The result shows that the manufacturing and service industries are separate. Also, the ecological roles of some actors are identified based on the characteristics of ecological terms: keystone, niche, and dominator. Based on the result of this paper, we expect that the policy makers can formulate the future of mobile industry and healthier mobile ecosystem can be constructed.
Abstract: Routing in mobile ad hoc networks is a challenging task because nodes are free to move randomly. In DSR like all On- Demand routing algorithms, route discovery mechanism is associated with great delay. More Clearly in DSR routing protocol to send route reply packet, when current route breaks, destination seeks a new route. In this paper we try to change route selection mechanism proactively. We also define a link stability parameter in which a stability value is assigned to each link. Given this feature, destination node can estimate stability of routes and can select the best and more stable route. Therefore we can reduce the delay and jitter of sending data packets.
Abstract: Enterprises need a strategic plan to retain their skillful employees and provide their career management, sustain their existence, to have growth and leadership qualities, to reach the objectives to increase the value of the enterprise and to not to be affected from changing demographic structure. In the cases when the long term career expectations of skillful employees are in integrity with the enterprise’s interests, skill management process is directly related to the career management. With a long term plan, the enterprises should cover the labor force need that may arise in the future by using systematic career development programs and be prepared against developments for all times. Skill management is considered as a practice with which career mobility is planned for the skillful employee to be prepared for high level positions. Career planning is the planning of an employee’s progress or promotion within an organization for which he works by developing his knowledge, skills, abilities and motives. Career planning is considered as an individual’s planning his future and the position which he wants to have, the area which he want to work in, the objectives which he want to reach. With the aim of contributing the abovementioned discussion process, career management concept and its perception manner are examined in this study in a comparative manner.
Abstract: Availability of raw materials is important for
Indonesia as a furniture exporting country. Teak log as raw materials
is supplied to the furniture industry by Perum Perhutani (PP). PP
needs to involve carbon trading for nature conservation. PP also has
an obligation in the Corporate Social Responsibility program. PP and
furniture industry also must prosecute the regulations related to
ecological issues and labor rights. This study has the objective to
create the relationship model between supplier and manufacturer to
fulfill teak log demand that involving teak forest carbon
sequestration. A model is formulated as Goal Programming to get the
favorable solution for teak log procurement and support carbon
sequestration that considering economical, ecological, and social
aspects of both supplier and manufacturer. The results show that the
proposed model can be used to determine the teak log quantity
involving carbon trading to achieve the seven goals to be satisfied the
sustainability considerations.
Abstract: FlexRay, as a communication protocol for automotive
control systems, is developed to fulfill the increasing demand on the
electronic control units for implementing systems with higher safety
and more comfort. In this work, we study the impact of
radiation-induced soft errors on FlexRay-based steer-by-wire system.
We injected the soft errors into general purpose register set of FlexRay
nodes to identify the most critical registers, the failure modes of the
steer-by-wire system, and measure the probability distribution of
failure modes when an error occurs in the register file.
Abstract: The increase on the demand of IT resources diverts
the enterprises to use the cloud as a cheap and scalable solution.
Cloud computing promises achieved by using the virtual machine as a
basic unite of computation. However, the virtual machine pre-defined
settings might be not enough to handle jobs QoS requirements. This
paper addresses the problem of mapping jobs have critical start
deadlines to virtual machines that have predefined specifications.
These virtual machines hosted by physical machines and shared a
fixed amount of bandwidth. This paper proposed an algorithm that
uses the idle virtual machines bandwidth to increase the quote of other
virtual machines nominated as executors to urgent jobs. An algorithm
with empirical study have been given to evaluate the impact of the
proposed model on impatient jobs. The results show the importance
of dynamic bandwidth allocation in virtualized environment and its
affect on throughput metric.
Abstract: The 15-a-side Fiji rugby team trains well in preparations for any rugby competition but rarely performs to expectations. In order to help the Fiji local based rugby players to identify some key basic areas in improving their performance, a series of workshops were conducted to assess their nutritional status and dietary habits in relation to energy demand during rugby matches. The nutrition workshop included the administration of questionnaires to 19 local based rugby players, requesting the following information: usual food intakes, training camp food intakes, carbohydrate loading, pre-game meals and post-game meals. The study revealed that poor eating habits of the players resulted in the low carbohydrate intake, which may have contributed to increase levels of fatigue leading to loss of stamina even before the second half of the game. It appears that the diet of most 15-a-side players does not provide enough energy to enable them to last the full eightyminutes of the game.