Abstract: A lightpipe is an about 99 percent specular reflective
mirror pipe or duct that is used for the transmission of the daylight
from the outside into a building. The lightpipes are usually used in
the daylighting buildings, in the residential, industrial and
commercial sectors. This paper is about the performances of a
lightpipe installed in a laboratory (3 m x 2.6 m x 3 m) without
windows. The aim is to analyse the luminous intensity distribution
for several sky/sun conditions. The lightpipe was monitored during
the year 2006. The lightpipe is 1 m long and the diameter of the top
collector and of the internal diffuser device is 0.25 m. In the
laboratory there are seven illuminance sensors: one external is
located on the roof of the laboratory and six internal sensors are
connected to a data acquisition system. The internal sensors are
positioned under the internal diffusive device at an height of 0.85 m
from the floor to simulate a working plane. The numerical data are
obtained through a simulation software. This paper shows the
comparison between the experimental and numerical results
concerning the behavior of the lightpipe.
Abstract: The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
Abstract: This paper presents unified theory for local (Savitzky-
Golay) and global polynomial smoothing. The algebraic framework
can represent any polynomial approximation and is seamless from
low degree local, to high degree global approximations. The representation
of the smoothing operator as a projection onto orthonormal
basis functions enables the computation of: the covariance matrix
for noise propagation through the filter; the noise gain and; the
frequency response of the polynomial filters. A virtually perfect Gram
polynomial basis is synthesized, whereby polynomials of degree
d = 1000 can be synthesized without significant errors. The perfect
basis ensures that the filters are strictly polynomial preserving. Given
n points and a support length ls = 2m + 1 then the smoothing
operator is strictly linear phase for the points xi, i = m+1. . . n-m.
The method is demonstrated on geometric surfaces data lying on an
invariant 2D lattice.
Abstract: Service discovery is a very important component of Service Oriented Architectures (SOA). This paper presents two alternative approaches to customise the query results of private service registry such as Universal Description, Discovery and Integration (UDDI). The customisation is performed based on some pre-defined and/or real-time changing parameters. This work identifies the requirements, designs and additional mechanisms that must be applied to UDDI in order to support this customisation capability. We also detail the implements of the approaches and examine its performance and scalability. Based on our experimental results, we conclude that both approaches can be used to customise registry query results, but by storing personalization parameters in external resource will yield better performance and but less scalable when size of query results increases. We believe these approaches when combined with semantics enabled service registry will enhance the service discovery methods within a private UDDI registry environment.
Abstract: power-line networks are promise infrastructure for
broadband services provision to end users. However, the network
performance is affected by stochastic channel changing which is due
to load impedances, number of branches and branched line lengths. It
has been proposed that multi-carrier modulations techniques such as
orthogonal frequency division multiplexing (OFDM), Multi-Carrier
Spread Spectrum (MC-SS), wavelet OFDM can be used in such
environment. This paper investigates the performance of different
indoor topologies of power-line networks that uses MC-SS
modulation scheme.It is observed that when a branch is added in the
link between sending and receiving end of an indoor channel an
average of 2.5dB power loss is found. In additional, when the branch
is added at a node an average of 1dB power loss is found.
Additionally when the terminal impedances of the branch change
from line characteristic impedance to impedance either higher or
lower values the channel performances were tremendously improved.
For example changing terminal load from characteristic impedance
(85 .) to 5 . the signal to noise ratio (SNR) required to attain the
same performances were decreased from 37dB to 24dB respectively.
Also, changing the terminal load from channel characteristic
impedance (85 .) to very higher impedance (1600 .) the SNR
required to maintain the same performances were decreased from
37dB to 23dB. The result concludes that MC-SS performs better
compared with OFDM techniques in all aspects and especially when
the channel is terminated in either higher or lower impedances.
Abstract: This study focused on arsenate removal by nano
zero-valent iron (NZVI) in the gas-bubbled aqueous solution. It
appears that solution acidified by H2SO4 is far more favorable than by
CO2-bubbled acidification. In addition, as dissolved oxygen was
stripped out of solution by N2 gas bubbling, the arsenate removal
dropped significantly. To take advantages of common practice of
carbonation and oxic condition, pretreatment of CO2 and air bubbling
in sequence are recommended for a better removal of arsenate.
Abstract: This paper reports on a survey of state-of-the-art
application scenarios for smart office environments. Based on an
analysis of ongoing research activities and industry projects,
functionalities and services of future office systems are extracted. In
a second step, these results are used to identify the key characteristics
of emerging products.
Abstract: The theory of Groebner Bases, which has recently been
honored with the ACM Paris Kanellakis Theory and Practice Award,
has become a crucial building block to computer algebra, and is
widely used in science, engineering, and computer science. It is wellknown
that Groebner bases computation is EXP-SPACE in a general
polynomial ring setting.
However, for many important applications in computer science
such as satisfiability and automated verification of hardware and
software, computations are performed in a Boolean ring. In this paper,
we give an algorithm to show that Groebner bases computation is PSPACE
in Boolean rings. We also show that with this discovery,
the Groebner bases method can theoretically be as efficient as
other methods for automated verification of hardware and software.
Additionally, many useful and interesting properties of Groebner
bases including the ability to efficiently convert the bases for different
orders of variables making Groebner bases a promising method in
automated verification.
Abstract: In this paper, FinFET devices are analyzed with
emphasis on sub-threshold leakage current control. This is achieved
through proper biasing of the back gate, and through the use of
asymmetric work functions for the four terminal FinFET devices. We
are also examining different configurations of multiplexers and XOR
gates using transistors of symmetric and asymmetric work functions.
Based on extensive characterization data for MUX circuits, our
proposed configuration using symmetric devices lead to leakage
current and delay improvements of 65% and 47% respectively
compared to results in the literature. For XOR gates, a 90%
improvement in the average leakage current is achieved by using
asymmetric devices. All simulations are based on a 25nm FinFET
technology using the University of Florida UFDG model.
Abstract: In the past 20 years the economy of the Czech
Republic has experienced substantial changes. In the 1990s the
development was affected by the transformation which sought to
establish the right conditions for privatization and creation of
elementary market relations. In the last decade the characteristic
elements such as private ownership and corresponding institutional
framework have been strengthened. This development was marked by
the accession of the Czech Republic to the EU. The Czech Republic
is striving to reduce the difference between its level of economic
development and the quality of institutional framework in
comparison with other developed countries. The process of finding
the adequate solutions has been hampered by the negative impact of
the world financial crisis on the Czech Republic and the standard of
living of its inhabitants. This contribution seeks to address the
question of whether and to which extent the economic development
of the transitive Czech economy is affected by the change in
behaviour of households and their tendency to consumption, i.e. in
the sense of reduction or increase in demand for goods and services.
It aims to verify whether the increasing trend of household
indebtedness and decreasing trend of saving pose a significant risk in
the Czech Republic. At a general level the analysis aims to contribute
to finding an answer to the question of whether the debt increase of
Czech households is connected to the risk of "eating through" the
borrowed money and whether Czech households risk falling into a
debt trap. In addition to household indebtedness risks in the Czech
Republic the analysis will focus on identification of specifics of the
transformation phase of the Czech economy in comparison with the
EU countries, or selected OECD countries.
Abstract: The number of the companies accepting RFID in Korea
has been increased continuously due to the domestic development of
information technology. The acceptance of RFID by companies in
Korea enabled them to do business with many global enterprises in a
much more efficient and effective way. According to a survey[33,
p76], many companies in Korea have used RFID for inventory or
distribution manages. But, the use of RFID in the companies in Korea
is in the early stages and its potential value hasn-t fully been realized
yet. At this time, it would be very important to investigate the factors
that affect RFID acceptance. For this study, many previous studies
were referenced and some RFID experts were interviewed. Through
the pilot test, four factors were selected - Security Trust, Employee
Knowledge, Partner Influence, Service Provider Trust - affecting
RFID acceptance and an extended technology acceptance
model(e-TAM) was presented with those factors. The proposed model
was empirically tested using data collected from employees in
companies or public enterprises. In order to analyze some
relationships between exogenous variables and four variables in TAM,
structural equation modeling(SEM) was developed and SPSS12.0 and
AMOS 7.0 were used for analyses. The results are summarized as
follows: 1) security trust perceived by employees positively
influences on perceived usefulness and perceived ease of use; 2)
employee-s knowledge on RFID positively influences on only
perceived ease of use; 3) a partner-s influence for RFID acceptance
positively influences on only perceived usefulness; 4) service provider
trust very positively influences on perceived usefulness and perceived
ease of use 5) the relationships between TAM variables are the same as
the previous studies.
Abstract: This paper presents a cold chain monitoring system which focuses on assessment of quality and dynamic pricing information about food in cold chain. Cold chain is composed of many actors and stages; however it can be seen as a single entity since a breakdown in temperature control at any stage can impact the final quality of the product. In a cold chain, the shelf life, quality, and safety of perishable food throughout the supply chain is greatly impacted by environmental factors especially temperature. In this paper, a prototype application is implemented to retrieve timetemperature history, the current quality and the dynamic price setting according to changing quality impacted by temperature fluctuations in real-time.
Abstract: In this paper, a technique is proposed to implement
an artificial voltage-controlled capacitance or inductance which can
replace the well-known varactor diode in many applications. The
technique is based on injecting the current of a voltage-controlled
current source onto a fixed capacitor or inductor. Then, by controlling
the transconductance of the current source by an external bias voltage,
a voltage-controlled capacitive or inductive reactance is obtained.
The proposed voltage-controlled reactance devices can be designed
to work anywhere in the frequency spectrum. Practical circuits for the
proposed voltage-controlled reactances are suggested and simulated.
Abstract: Railway Stations are prone to emergency due to
various reasons and proper monitor of railway stations are of
immense importance from various angles. A Petri-net representation
of a web-service-based Emergency management system has been
proposed in this paper which will help in monitoring situation of
train, track, signal etc. and in case of any emergency, necessary
resources can be dispatched.
Abstract: This paper presents the doping profile measurement
and characterization technique for the pocket implanted nano scale
n-MOSFET. Scanning capacitance microscopy and atomic force
microscopy have been used to image the extent of lateral dopant
diffusion in MOS structures. The data are capacitance vs. voltage
measurements made on a nano scale device. The technique is nondestructive
when imaging uncleaved samples. Experimental data from
the published literature are presented here on actual, cleaved device
structures which clearly indicate the two-dimensional dopant profile
in terms of a spatially varying modulated capacitance signal. Firstorder
deconvolution indicates the technique has much promise for
the quantitative characterization of lateral dopant profiles. The pocket
profile is modeled assuming the linear pocket profiles at the source
and drain edges. From the model, the effective doping concentration
is found to use in modeling and simulation results of the various
parameters of the pocket implanted nano scale n-MOSFET. The
potential of the technique to characterize important device related
phenomena on a local scale is also discussed.
Abstract: We demonstrate the synthesis of intermediary views
within a sequence of color encoded, materials discriminating, X-ray
images that exhibit animated depth in a visual display. During the
image acquisition process, the requirement for a linear X-ray detector
array is replaced by synthetic image. Scale Invariant Feature
Transform, SIFT, in combination with material segmented morphing
is employed to produce synthetic imagery. A quantitative analysis of
the feature matching performance of the SIFT is presented along with
a comparative study of the synthetic imagery. We show that the total
number of matches produced by SIFT reduces as the angular
separation between the generating views increases. This effect is
accompanied by an increase in the total number of synthetic pixel
errors. The trends observed are obtained from 15 different luggage
items. This programme of research is in collaboration with the UK
Home Office and the US Dept. of Homeland Security.
Abstract: This paper presents a new method for estimating the mean curve of impulse voltage waveforms that are recorded during impulse tests. In practice, these waveforms are distorted by noise, oscillations and overshoot. The problem is formulated as an estimation problem. Estimation of the current signal parameters is achieved using a fast and accurate technique. The method is based on discrete dynamic filtering algorithm (DDF). The main advantage of the proposed technique is its ability in producing the estimates in a very short time and at a very high degree of accuracy. The algorithm uses sets of digital samples of the recorded impulse waveform. The proposed technique has been tested using simulated data of practical waveforms. Effects of number of samples and data window size are studied. Results are reported and discussed.
Abstract: This paper aims to study decomposition behavior in
pyrolytic environment of four lignocellulosic biomass (oil palm shell,
oil palm frond, rice husk and paddy straw), and two commercial
components of biomass (pure cellulose and lignin), performed in a
thermogravimetry analyzer (TGA). The unit which consists of a
microbalance and a furnace flowed with 100 cc (STP) min-1 Nitrogen,
N2 as inert. Heating rate was set at 20⁰C min-1 and temperature
started from 50 to 900⁰C. Hydrogen gas production during the
pyrolysis was observed using Agilent Gas Chromatography Analyzer
7890A. Oil palm shell, oil palm frond, paddy straw and rice husk
were found to be reactive enough in a pyrolytic environment of up to
900°C since pyrolysis of these biomass starts at temperature as low as
200°C and maximum value of weight loss is achieved at about
500°C. Since there was not much different in the cellulose,
hemicelluloses and lignin fractions between oil palm shell, oil palm
frond, paddy straw and rice husk, the T-50 and R-50 values obtained
are almost similar. H2 productions started rapidly at this temperature
as well due to the decompositions of biomass inside the TGA.
Biomass with more lignin content such as oil palm shell was found to
have longer duration of H2 production compared to materials of high
cellulose and hemicelluloses contents.
Abstract: Leave of absence is important in maintaining a good
status of human resource quality. Allowing the employees temporarily
free from the routine assignments can vitalize the workers- morality
and productivity. This is particularly critical to secure a satisfactory
service quality for healthcare professionals of which were typically
featured with labor intensive and complicated works to perform. As
one of the veteran hospitals that were found and operated by the
Veteran Department of Taiwan, the nursing staff of the case hospital
was squeezed to an extreme minimum level under the pressure of a
tight budgeting. Leave of absence on schedule became extremely
difficult, especially for the intensive care units (ICU), in which
required close monitoring over the cared patients, and that had more
easily driven the ICU nurses nervous. Even worse, the deferred leaves
were more than 10 days at any time in the ICU because of a fluctuating
occupancy. As a result, these had brought a bad setback to this
particular nursing team, and consequently defeated the job
performance and service quality. To solve this problem and
accordingly to strengthen their morality, a project team was organized
across different departments specific for this. Sufficient information
regarding jobs and positions requirements, labor resources, and actual
working hours in detail were collected and analyzed in the team
meetings. Several alternatives were finalized. These included job
rotating, job combination, leave on impromptu and cross-departmental
redeployment. Consequently, the deferred leave days sharply reduced
70% to a level of 3 or less days. This improvement had not only
provided good shelter for the ICU nurses that improved their job
performance and patient safety but also encouraged the nurses active
participating of a project and learned the skills of solving problems
with colleagues.
Abstract: A company CSR commitment, as stated in its Social
Report is, actually, perceived by its stakeholders?And in what
measure? Moreover, are stakeholders satisfied with the company
CSR efforts? Indeed, business returns from Corporate Social
Responsibility (CSR) practices, such as company reputation and
customer loyalty, depend heavily on how stakeholders perceive the
company social conduct. In this paper, we propose a methodology to
assess a company CSR commitment based on Global Reporting
Initiative (GRI) indicators, Content Analysis and a CSR positioning
matrix. We evaluate three aspects of CSR: the company commitment
disclosed through its Social Report; the company commitment
perceived by its stakeholders; the CSR commitment that stakeholders
require to the company. The positioning of the company under study
in the CSR matrix is based on the comparison among the three
commitment aspects (disclosed, perceived, required) and it allows
assessment and development of CSR strategies.