Abstract: n-CdO/p-Si heterojunction diode was fabricated using
sol-gel spin coating technique which is a low cost and easily scalable
method for preparing of semiconductor films. The structural and
morphological properties of CdO film were investigated. The X-ray
diffraction (XRD) spectra indicated that the film was of
polycrystalline nature. The scanning electron microscopy (SEM)
images indicate that the surface morphology CdO film consists of the
clusters formed with the coming together of the nanoparticles. The
electrical characterization of Au/n-CdO/p–Si/Al heterojunction diode
was investigated by current-voltage. The ideality factor of the diode
was found to be 3.02 for room temperature. The reverse current of
the diode strongly increased with illumination intensity of 100
mWcm-2 and the diode gave a maximum open circuit voltage Voc of
0.04 V and short-circuits current Isc of 9.92×10-9 A.
Abstract: It is not a secret that, IT management has become
more and more and integrated part of almost all organizations. IT
managers posses an enormous amount of knowledge within both
organizational knowledge and general IT knowledge. This article
investigates how IT managers keep themselves updated on IT
knowledge in general and looks into how much time IT managers
spend on weekly basis searching the net for new or problem solving
IT knowledge. The theory used in this paper is used to investigate the
current role of IT managers and what issues they are facing.
Furthermore a research is conducted where 7 IT managers in medium
sized and large Danish companies are interviewed to add further
focus on the role of the IT manager and to focus on how they keep
themselves updated. Beside finding substantial need for more
research, IT managers – generalists or specialists – only have limited
knowledge resources at hand in updating their own knowledge –
leaving much initiative to vendors.
Abstract: Real options theory suggests that managerial flexibility embedded within irreversible investments can account for a significant value in project valuation. Although the argument has become the dominant focus of capital investment theory over decades, yet recent survey literature in capital budgeting indicates that corporate practitioners still do not explicitly apply real options in investment decisions. In this paper, we explore how real options decision criteria can be transformed into equivalent capital budgeting criteria under the consideration of uncertainty, assuming that underlying stochastic process follows a geometric Brownian motion (GBM), a mixed diffusion-jump (MX), or a mean-reverting process (MR). These equivalent valuation techniques can be readily decomposed into conventional investment rules and “option impacts", the latter of which describe the impacts on optimal investment rules with the option value considered. Based on numerical analysis and Monte Carlo simulation, three major findings are derived. First, it is shown that real options could be successfully integrated into the mindset of conventional capital budgeting. Second, the inclusion of option impacts tends to delay investment. It is indicated that the delay effect is the most significant under a GBM process and the least significant under a MR process. Third, it is optimal to adopt the new capital budgeting criteria in investment decision-making and adopting a suboptimal investment rule without considering real options could lead to a substantial loss in value.
Abstract: The purpose of this study was to explore the
relationship between knowledge sharing and innovation capability,
by examining the influence of individual, organizational and
technological factors on knowledge sharing. The research is based
on a survey of 103 employees from different organizations in the
United Arab Emirates. The study is based on a model and a
questionnaire that was previously tested by Lin [1]. Thus, the study
aims at examining the validity of that model in UAE context. The
results of the research show varying degrees of correlation between
the different variables, with ICT use having the strongest relationship
with the innovation capabilities of organizations. The study also
revealed little evidence of knowledge collecting and knowledge
sharing among UAE employees.
Abstract: This paper presents an environmental and technoeconomic
evaluation of light duty vehicles in Iran. A comprehensive
well-to-wheel (WTW) analysis is applied to compare different
automotive fuel chains, conventional internal combustion engines and
innovative vehicle powertrains. The study examines the
competitiveness of 15 various pathways in terms of energy
efficiencies, GHG emissions, and levelized cost of different energy
carriers. The results indicate that electric vehicles including battery
electric vehicles (BEV), fuel cell vehicles (FCV) and plug-in hybrid
electric vehicles (PHEV) increase the WTW energy efficiency by
54%, 51% and 46%, respectively, compared to common internal
combustion engines powered by gasoline. On the other hand,
greenhouse gas (GHG) emissions per kilometer of FCV and BEV
would be 48% lower than that of gasoline engines. It is concluded
that BEV has the lowest total cost of energy consumption and
external cost of emission, followed by internal combustion engines
(ICE) fueled by CNG. Conventional internal combustion engines
fueled by gasoline, on the other hand, would have the highest costs.
Abstract: Radio frequency identification (RFID) applications have grown rapidly in many industries, especially in indoor location identification. The advantage of using received signal strength indicator (RSSI) values as an indoor location measurement method is a cost-effective approach without installing extra hardware. Because the accuracy of many positioning schemes using RSSI values is limited by interference factors and the environment, thus it is challenging to use RFID location techniques based on integrating positioning algorithm design. This study proposes the location estimation approach and analyzes a scheme relying on RSSI values to minimize location errors. In addition, this paper examines different factors that affect location accuracy by integrating the backpropagation neural network (BPN) with the LANDMARC algorithm in a training phase and an online phase. First, the training phase computes coordinates obtained from the LANDMARC algorithm, which uses RSSI values and the real coordinates of reference tags as training data for constructing an appropriate BPN architecture and training length. Second, in the online phase, the LANDMARC algorithm calculates the coordinates of tracking tags, which are then used as BPN inputs to obtain location estimates. The results show that the proposed scheme can estimate locations more accurately compared to LANDMARC without extra devices.
Abstract: World population growth drives food demand, promotes intensification of agriculture, development of new production technologies and varieties more suitable for regional nature conditions. Climate change can affect the length of growing period, biomass and carbon accumulation in winter wheat. The increasing mean air temperature resulting from climate change can reduce the length of growth period of cereals, and without adequate adjustments in growing technologies or varieties, can reduce biomass and carbon accumulation. Deeper understanding and effective measures for monitoring and management of cereal growth process are needed for adaptation to changing climate and technological conditions.
Abstract: Wikis are considered to be part of Web 2.0
technologies that potentially support collaborative learning and
writing. Wikis provide opportunities for multiple users to work on
the same document simultaneously. Most wikis have also a page for
written group discussion. Nevertheless, wikis may be used in
different ways depending on the pedagogy being used, and the
constraints imposed by the course design. This work explores
students- uses of wiki in teacher education. The analysis is based on a
taxonomy for classifying students- activities and actions carried out
on the wiki. The article also discusses the implications for using
wikis as collaborative writing tools in teacher education.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: Nowadays Multilevel inverters are widely using in various applications. Modulation strategy at fundamental switching frequency like, SHEPWM is prominent technique to eliminate lower order of harmonics with less switching losses and better harmonic profile. The equations which are formed by SHE are highly nonlinear transcendental in nature, there may exist single, multiple or even no solutions for a particular MI. However, some loads such as electrical drives, it is required to operate in whole range of MI. In order to solve SHE equations for whole range of MI, intelligent techniques are well suited to solve equations so as to produce lest %THDV. Hence, this paper uses Continuous genetic algorithm for minimising harmonics. This paper also presents wavelet based analysis of harmonics. The developed algorithm is simulated and %THD from FFT analysis and Wavelet analysis are compared. MATLAB programming environment and SIMULINK models are used whenever necessary.
Abstract: Quantitative characterization of nonlinear directional
couplings between stochastic oscillators from data is considered. We
suggest coupling characteristics readily interpreted from a physical
viewpoint and their estimators. An expression for a statistical
significance level is derived analytically that allows reliable coupling
detection from a relatively short time series. Performance of the
technique is demonstrated in numerical experiments.
Abstract: Identifying and classifying intersections according to
severity is very important for implementation of safety related
counter measures and effective models are needed to compare and
assess the severity. Highway safety organizations have considered
intersection safety among their priorities. In spite of significant
advances in highways safety, the large numbers of crashes with high
severities still occur in the highways. Investigation of influential
factors on crashes enables engineers to carry out calculations in order
to reduce crash severity. Previous studies lacked a model capable of
simultaneous illustration of the influence of human factors, road,
vehicle, weather conditions and traffic features including traffic
volume and flow speed on the crash severity. Thus, this paper is
aimed at developing the models to illustrate the simultaneous
influence of these variables on the crash severity in urban highways.
The models represented in this study have been developed using
binary Logit Models. SPSS software has been used to calibrate the
models. It must be mentioned that backward regression method in
SPSS was used to identify the significant variables in the model.
Consider to obtained results it can be concluded that the main
factor in increasing of crash severity in urban highways are driver
age, movement with reverse gear, technical defect of the vehicle,
vehicle collision with motorcycle and bicycle, bridge, frontal impact
collisions, frontal-lateral collisions and multi-vehicle crashes in
urban highways which always increase the crash severity in urban
highways.
Abstract: Educational games (EG) seem to have lots of potential due to digital games popularity and preferences of our younger generations of learners. However, most studies focus on game design and its effectiveness while little has been known about the factors that can affect users to accept or to reject EG for their learning. User acceptance research try to understand the determinants of information systems (IS) adoption among users by investigating both systems factors and users factors. Upon the lack of knowledge on acceptance factors for educational games, we seek to understand the issue. This study proposed a model of acceptance factors based on Unified Theory of Acceptance and Use of Technology (UTAUT). We use original model (performance expectancy, effort expectancy and social influence) together with two new determinants (learning opportunities and enjoyment). We will also investigate the effect of gender and gaming experience that moderate the proposed factors.
Abstract: Visualizing “Courses – Pre – Required -
Architecture" on the screen has proven to be useful and helpful for
university actors and specially for students. In fact, these students
can easily identify courses and their pre required, perceive the
courses to follow in the future, and then can choose rapidly the
appropriate course to register in. Given a set of courses and their prerequired,
we present an algorithm for visualization a graph entitled
“Courses-Pre-Required-Graph" that present courses and their prerequired
in order to help students to recognize, lonely, what courses
to take in the future and perceive the contain of all courses that they
will study. Our algorithm using “Force Directed Placement"
technique visualizes the “Courses-Pre-Required-Graph" in such way
that courses are easily identifiable. The time complexity of our
drawing algorithm is O (n2), where n is the number of courses in the
“Courses-Pre-Required-Graph".
Abstract: Analysis for the generalized thermoelastic Lamb
waves, which propagates in anisotropic thin plates in generalized
thermoelasticity, is presented employing normal mode expansion
method. The displacement and temperature fields are expressed by a
summation of the symmetric and antisymmetric thermoelastic modes
in the surface thermal stresses and thermal gradient free orthotropic
plate, therefore the theory is particularly appropriate for waveform
analyses of Lamb waves in thin anisotropic plates. The transient
waveforms excited by the thermoelastic expansion are analyzed for
an orthotropic thin plate. The obtained results show that the theory
provides a quantitative analysis to characterize anisotropic
thermoelastic stiffness properties of plates by wave detection. Finally
numerical calculations have been presented for a NaF crystal, and the
dispersion curves for the lowest modes of the symmetric and
antisymmetric vibrations are represented graphically at different
values of thermal relaxation time. However, the methods can be used
for other materials as well
Abstract: It is estimated that the total cost of abnormal
conditions to US process industries is around $20 billion dollars in
annual losses. The hydrotreatment (HDT) of diesel fuel in petroleum
refineries is a conversion process that leads to high profitable
economical returns. However, this is a difficult process to control
because it is operated continuously, with high hydrogen pressures
and it is also subject to disturbances in feed properties and catalyst
performance. So, the automatic detection of fault and diagnosis plays
an important role in this context. In this work, a hybrid approach
based on neural networks together with a pos-processing
classification algorithm is used to detect faults in a simulated HDT
unit. Nine classes (8 faults and the normal operation) were correctly
classified using the proposed approach in a maximum time of 5
minutes, based on on-line data process measurements.
Abstract: In this paper, we propose a high capacity image hiding
technology based on pixel prediction and the difference of modified histogram. This approach is used the pixel prediction and the
difference of modified histogram to calculate the best embedding point.
This approach can improve the predictive accuracy and increase the pixel difference to advance the hiding capacity. We also use the
histogram modification to prevent the overflow and underflow. Experimental results demonstrate that our proposed method within the
same average hiding capacity can still keep high quality of image and low distortion
Abstract: Optical burst switching(OBS) is considered as one of
preferable network technologies for the next generation Internet. The
Internet has two traffic classes, i.e. real-time bursts and reliable bursts.
It is an important subject for OBS to achieve cooperated operation of
real-time bursts and reliable bursts. In this paper, we proposes a new
effective traffic control method named Separate TB+LB (Token
Bucket + Leaky Bucket : TB+LB) method. The proposed method
presents a new Token Bucket scheme for real-time bursts called as
RBO-TB (Real-time Bursts Oriented Token Bucket). The method also
applies the LB method to reliable bursts for obtaining better
performance. This paper verifies the effectiveness of the Separate
TB+LB method through the performance evaluation.
Abstract: In the globalization context and competitiveness, the role of a university is further enhanced. University is no longer confined to traditional roles. Universities need to interact with others in order to be relevant and progressive. Symbiosis relationships between the university and industry are very significant because the relationship between those two can foster economic development of a nation. In a world of fast changing technology and competition, it is necessary for the university to collaborate with industry to combine efforts fostering the diffusion of knowledge, increasing research and development, patenting innovation and commercializing products. It has become increasingly accepted that the necessity of close university-industry interactions as a mean of national economic prosperity. Therefore, this paper is aim to examine the level of linkages in university-industry interactions to which promotes the regional economic growth and development. This paper will explore the formation of linkages between the Higher Education Institution (University Technology MARA) and industries located in the Klang Valley region of Malaysia. It will present the university-industry linkages with emphasis on the type of linkages existed, the benefits of having such linkages to promote regional economic development and finally the constraints that might impede the linkages and potentials to enhance the linkages towards economic growth and development.
Abstract: In this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image sequence while keeping its content visible. The proposed technique embeds the residuals of the right frames to the corresponding frames of the left sequence, halving the total capacity. The residual frames may result in after a disparity compensated procedure between the two video streams or by a joint motion and disparity compensation. The residuals are usually lossy compressed before embedding because of the limited embedding capacity of the left frames. The watermarked frames are visible at a high quality and at any instant the stereoscopic video may be recovered by an inverse process. In fact, the left frames may be exactly recovered whereas the right ones are slightly distorted as the residuals are not embedded intact. The employed embedding method reorders the left frame into an array of consecutive pixel pairs and embeds a number of bits according to their intensity difference. In this way, it hides a number of bits in intensity smooth areas and most of the data in textured areas where resulting distortions are less visible. The experimental evaluation demonstrates that the proposed scheme is quite effective.