Abstract: This study reports results of a meta-analytic path analysis e-learning Acceptance Model with k = 27 studies, Databases searched included Information Sciences Institute (ISI) website. Variables recorded included perceived usefulness, perceived ease of use, attitude toward behavior, and behavioral intention to use e-learning. A correlation matrix of these variables was derived from meta-analytic data and then analyzed by using structural path analysis to test the fitness of the e-learning acceptance model to the observed aggregated data. Results showed the revised hypothesized model to be a reasonable, good fit to aggregated data. Furthermore, discussions and implications are given in this article.
Abstract: This paper investigates the problem of exponential stability for a class of uncertain discrete-time stochastic neural network with time-varying delays. By constructing a suitable Lyapunov-Krasovskii functional, combining the stochastic stability theory, the free-weighting matrix method, a delay-dependent exponential stability criteria is obtained in term of LMIs. Compared with some previous results, the new conditions obtain in this paper are less conservative. Finally, two numerical examples are exploited to show the usefulness of the results derived.
Abstract: Diagnostic goal of transformers in service is to detect the winding or the core in fault. Transformers are valuable equipment which makes a major contribution to the supply security of a power system. Consequently, it is of great importance to minimize the frequency and duration of unwanted outages of power transformers. So, Frequency Response Analysis (FRA) is found to be a useful tool for reliable detection of incipient mechanical fault in a transformer, by finding winding or core defects. The authors propose as first part of this article, the coupled circuits method, because, it gives most possible exhaustive modelling of transformers. And as second part of this work, the application of FRA in low frequency in order to improve and simplify the response reading. This study can be useful as a base data for the other transformers of the same categories intended for distribution grid.
Abstract: This work investigated the steady state and dynamic
simulation of a fixed bed industrial naphtha reforming reactors. The
performance of the reactor was investigated using a heterogeneous
model. For process simulation, the differential equations are solved
using the 4th order Runge-Kutta method .The models were validated
against measured process data of an existing naphtha reforming plant.
The results of simulation in terms of components yields and
temperature of the outlet were in good agreement with empirical data.
The simple model displays a useful tool for dynamic simulation,
optimization and control of naphtha reforming.
Abstract: Background, measuring an individual-s Health
Literacy is gaining attention, yet no appropriate instrument is available
in Taiwan. Measurement tools that were developed and used in
western countries may not be appropriate for use in Taiwan due to a
different language system. Purpose of this research was to develop a
Health Literacy measurement instrument specific for Taiwan adults.
Methods, several experts of clinic physicians; healthcare
administrators and scholars identified 125 common used health related
Chinese phrases from major medical knowledge sources that easy
accessible to the public. A five-point Likert scale is used to measure
the understanding level of the target population. Such measurement is
then used to compare with the correctness of their answers to a health
knowledge test for validation. Samples, samples under study were
purposefully taken from four groups of people in the northern
Pingtung, OPD patients, university students, community residents,
and casual visitors to the central park. A set of health knowledge index
with 10 questions is used to screen those false responses. A sample
size of 686 valid cases out of 776 was then included to construct this
scale. An independent t-test was used to examine each individual
phrase. The phrases with the highest significance are then identified
and retained to compose this scale. Result, a Taiwan Health Literacy
Scale (THLS) was finalized with 66 health-related phrases under nine
divisions. Cronbach-s alpha of each division is at a satisfactory level
of 89% and above. Conclusions, factors significantly differentiate the
levels of health literacy are education, female gender, age, family
members of stroke victims, experience with patient care, and
healthcare professionals in the initial application in this study..
Abstract: We investigated a modified thermal evaporation
method in the growth process of ZnO nanowires. ZnO nanowires
were fabricated on p-type silicon substrates without using a metal
catalyst. A simple horizontal double-tube system along with
chemical vapor diffusion of the precursor was used to grow the ZnO
nanowires. The substrates were placed in different temperature
zones, and ZnO nanowires with different diameters were obtained for
the different substrate temperatures. In addition to the nanowires,
ZnO microdiscs with different diameters were obtained on another
substrate, which was placed at a lower temperature than the other
substrates. The optical properties and crystalline quality of the ZnO
nanowires and microdiscs were characterized by room temperature
photoluminescence (PL) and Raman spectrometers. The PL and
Raman studies demonstrated that the ZnO nanowires and microdiscs
grown using such set-up had good crystallinity with excellent optical
properties. Rectifying behavior of ZnO/Si heterostructures was
characterized by a simple DC circuit.
Abstract: Oil debris signal generated from the inductive oil
debris monitor (ODM) is useful information for machine condition
monitoring but is often spoiled by background noise. To improve the
reliability in machine condition monitoring, the high-fidelity signal
has to be recovered from the noisy raw data. Considering that the noise
components with large amplitude often have higher frequency than
that of the oil debris signal, the integral transform is proposed to
enhance the detectability of the oil debris signal. To cancel out the
baseline wander resulting from the integral transform, the empirical
mode decomposition (EMD) method is employed to identify the trend
components. An optimal reconstruction strategy including both
de-trending and de-noising is presented to detect the oil debris signal
with less distortion. The proposed approach is applied to detect the oil
debris signal in the raw data collected from an experimental setup. The
result demonstrates that this approach is able to detect the weak oil
debris signal with acceptable distortion from noisy raw data.
Abstract: Investigating language acquisition is one of the most
challenging problems in the area of studying language. Syllable
learning as a level of language acquisition has a considerable
significance since it plays an important role in language acquisition.
Because of impossibility of studying language acquisition directly
with children, especially in its developmental phases, computer
models will be useful in examining language acquisition. In this
paper a computer model of early language learning for syllable
learning is proposed. It is guided by a conceptual model of syllable
learning which is named Directions Into Velocities of Articulators
model (DIVA). The computer model uses simple associational and
reinforcement learning rules within neural network architecture
which are inspired by neuroscience. Our simulation results verify the
ability of the proposed computer model in producing phonemes
during babbling and early speech. Also, it provides a framework for
examining the neural basis of language learning and communication
disorders.
Abstract: In this paper we introduce a new unit test technique
called déjà-vu object. Déjà-vu objects replace real objects used by
classes under test, allowing the execution of isolated unit tests. A
déjà-vu object is able to observe and record the behaviour of a real
object during real sessions, and to replace it during unit tests,
returning previously recorded results. Consequently déjà-vu object
technique can be useful when a bottom-up development and testing
strategy is adopted. In this case déjà-vu objects can increase test
portability and test source code readability. At the same time they
can reduce the time spent by programmers to develop test code and
the risk of incompatibility during the switching between déjà-vu and
production code.
Abstract: The evaluation of energy release rate and centre Crack
Opening Displacement (COD) for circumferential Through-Wall
Cracked (TWC) pipes is an important issue in the assessment of
critical crack length for unstable fracture. The ability to predict crack
growth continues to be an important component of research for
several structural materials. Crack growth predictions can aid the
understanding of the useful life of a structural component and the
determination of inspection intervals and criteria. In this context,
studies were carried out at CSIR-SERC on Nuclear Power Plant
(NPP) piping components subjected to monotonic as well as cyclic
loading to assess the damage for crack growth due to low-cycle
fatigue in circumferentially TWC pipes.
Abstract: Biclustering is a very useful data mining technique for
identifying patterns where different genes are co-related based on a
subset of conditions in gene expression analysis. Association rules
mining is an efficient approach to achieve biclustering as in
BIMODULE algorithm but it is sensitive to the value given to its
input parameters and the discretization procedure used in the
preprocessing step, also when noise is present, classical association
rules miners discover multiple small fragments of the true bicluster,
but miss the true bicluster itself. This paper formally presents a
generalized noise tolerant bicluster model, termed as μBicluster. An
iterative algorithm termed as BIDENS based on the proposed model
is introduced that can discover a set of k possibly overlapping
biclusters simultaneously. Our model uses a more flexible method to
partition the dimensions to preserve meaningful and significant
biclusters. The proposed algorithm allows discovering biclusters that
hard to be discovered by BIMODULE. Experimental study on yeast,
human gene expression data and several artificial datasets shows that
our algorithm offers substantial improvements over several
previously proposed biclustering algorithms.
Abstract: The effect of chemical treatment in CdCl2 on the
compositional changes and defect structures of potentially useful ZnS
solar cell thin films prepared by vacuum deposition method was
studied using the complementary Rutherford backscattering (RBS)
and Thermoluminesence (TL) techniques. A series of electron and
hole traps are found in the various as deposited samples studied.
After treatment, perturbation on the intensity is noted; mobile defect
states and charge conversion and/or transfer between defect states are
found.
Abstract: This paper discusses effects of adhesive thickness,
overlap length and material combinations on the single-lap
joints strength from the point of singular stress fields. A useful
method calculating the ratio of intensity of singular stress is
proposed using FEM for different adhesive thickness and
overlap length. It is found that the intensity of singular stress
increases with increasing adhesive thickness, and decreases
with increasing overlap length. The increment and decrement
are different depending on material combinations between
adhesive and adherent.
Abstract: Insulation used in transformer is mostly oil pressboard insulation. Insulation failure is one of the major causes of catastrophic failure of transformers. It is established that partial discharges (PD) cause insulation degradation and premature failure of insulation. Online monitoring of PDs can reduce the risk of catastrophic failure of transformers. There are different techniques of partial discharge measurement like, electrical, optical, acoustic, opto-acoustic and ultra high frequency (UHF). Being non invasive and non interference prone, acoustic emission technique is advantageous for online PD measurement. Acoustic detection of p.d. is based on the retrieval and analysis of mechanical or pressure signals produced by partial discharges. Partial discharges are classified according to the origin of discharges. Their effects on insulation deterioration are different for different types. This paper reports experimental results and analysis for classification of partial discharges using acoustic emission signal of laboratory simulated partial discharges in oil pressboard insulation system using three different electrode systems. Acoustic emission signal produced by PD are detected by sensors mounted on the experimental tank surface, stored on an oscilloscope and fed to computer for further analysis. The measured AE signals are analyzed using discrete wavelet transform analysis and wavelet packet analysis. Energy distribution in different frequency bands of discrete wavelet decomposed signal and wavelet packet decomposed signal is calculated. These analyses show a distinct feature useful for PD classification. Wavelet packet analysis can sort out any misclassification arising out of DWT in most cases.
Abstract: Noise causes significant sensibility changes on a human. This study investigated the effect of five different noises on electroencephalogram (EEG) and subjective evaluation. Six human subjects were exposed to classic piano, ocean wave, alarm in army, ambulance, mosquito noise and EEG data were collected during the experimental session. Alpha band activity in the mosquito noise was smaller than that in the classic piano. Alpha band activity decreased 43.4 ± 8.2 % in the mosquito noise. On the other hand, Beta band activity in the mosquito noise was greater than that in the classic piano. Beta band activity increased 60.1 ± 10.7 % in the mosquito noise. The advances from this study may aid the product design process with human sensibility engineering. This result may provide useful information in designing a human-oriented product to avoid the stress.
Abstract: The paper focuses on the implementation phase of the
strategy of the European Union and the national strategy of the
Czech Republic to promote academic and research staff with the
potential to produce results that provide innovation useful for
economic growth. It deals with the use of financial resources of the
Operational Program Education for Competitiveness at the
University of West Bohemia in Pilsen. The author presents an
example of two strategic projects in the field of human resources –
Excellence in Human Resources as a Source of Competitiveness and
New Excellence of Human Resources. The subject of this paper is the
potential contribution of newly recruited postdoctoral within these
projects for the University of West Bohemia in Pilsen and its internal
environment.
Abstract: The present study was designed to test the influence
of confirmed expectations, perceived usefulness and perceived
competence on e-learning satisfaction among university teachers. A
questionnaire was completed by 125 university teachers from 12
different universities in Norway. We found that 51% of the variance
in university teachers- satisfaction with e-learning could be explained
by the three proposed antecedents. Perceived usefulness seems to be
the most important predictor of teachers- satisfaction with e-learning.
Abstract: This paper proposes a new approach for image encryption
using a combination of different permutation techniques.
The main idea behind the present work is that an image can be
viewed as an arrangement of bits, pixels and blocks. The intelligible
information present in an image is due to the correlations among the
bits, pixels and blocks in a given arrangement. This perceivable information
can be reduced by decreasing the correlation among the bits,
pixels and blocks using certain permutation techniques. This paper
presents an approach for a random combination of the aforementioned
permutations for image encryption. From the results, it is observed
that the permutation of bits is effective in significantly reducing the
correlation thereby decreasing the perceptual information, whereas
the permutation of pixels and blocks are good at producing higher
level security compared to bit permutation. A random combination
method employing all the three techniques thus is observed to be
useful for tactical security applications, where protection is needed
only against a casual observer.
Abstract: Streamtube is used to visualize expansion, contraction
and various properties of the fluid flow. These are useful in fluid
mechanics, engineering and geophysics. The streamtube constructed
in this paper only reveals the flow expansion rate along streamline.
Based on the mass conservative streamline, we will show how to
construct the streamtube.
Abstract: Network security attacks are the violation of
information security policy that received much attention to the
computational intelligence society in the last decades. Data mining
has become a very useful technique for detecting network intrusions
by extracting useful knowledge from large number of network data
or logs. Naïve Bayesian classifier is one of the most popular data
mining algorithm for classification, which provides an optimal way
to predict the class of an unknown example. It has been tested that
one set of probability derived from data is not good enough to have
good classification rate. In this paper, we proposed a new learning
algorithm for mining network logs to detect network intrusions
through naïve Bayesian classifier, which first clusters the network
logs into several groups based on similarity of logs, and then
calculates the prior and conditional probabilities for each group of
logs. For classifying a new log, the algorithm checks in which cluster
the log belongs and then use that cluster-s probability set to classify
the new log. We tested the performance of our proposed algorithm by
employing KDD99 benchmark network intrusion detection dataset,
and the experimental results proved that it improves detection rates
as well as reduces false positives for different types of network
intrusions.