Abstract: This paper argues that increased uncertainty, in certain
situations, may actually encourage investment. Since earlier studies
mostly base their arguments on the assumption of geometric Brownian
motion, the study extends the assumption to alternative stochastic
processes, such as mixed diffusion-jump, mean-reverting process, and
jump amplitude process. A general approach of Monte Carlo
simulation is developed to derive optimal investment trigger for the
situation that the closed-form solution could not be readily obtained
under the assumption of alternative process. The main finding is that
the overall effect of uncertainty on investment is interpreted by the
probability of investing, and the relationship appears to be an invested
U-shaped curve between uncertainty and investment. The implication
is that uncertainty does not always discourage investment even under
several sources of uncertainty. Furthermore, high-risk projects are not
always dominated by low-risk projects because the high-risk projects
may have a positive realization effect on encouraging investment.
Abstract: On-line (near infrared) spectroscopy is widely used to support the operation of complex process systems. Information extracted from spectral database can be used to estimate unmeasured product properties and monitor the operation of the process. These techniques are based on looking for similar spectra by nearest neighborhood algorithms and distance based searching methods. Search for nearest neighbors in the spectral space is an NP-hard problem, the computational complexity increases by the number of points in the discrete spectrum and the number of samples in the database. To reduce the calculation time some kind of indexing could be used. The main idea presented in this paper is to combine indexing and visualization techniques to reduce the computational requirement of estimation algorithms by providing a two dimensional indexing that can also be used to visualize the structure of the spectral database. This 2D visualization of spectral database does not only support application of distance and similarity based techniques but enables the utilization of advanced clustering and prediction algorithms based on the Delaunay tessellation of the mapped spectral space. This means the prediction has not to use the high dimension space but can be based on the mapped space too. The results illustrate that the proposed method is able to segment (cluster) spectral databases and detect outliers that are not suitable for instance based learning algorithms.
Abstract: Total liquid ventilation can support gas exchange in animal models of lung injury. Clinical application awaits further technical improvements and performance verification. Our aim was to develop a liquid ventilator, able to deliver accurate tidal volumes, and a computerized system for measuring lung mechanics. The computer-assisted, piston-driven respirator controlled ventilatory parameters that were displayed and modified on a real-time basis. Pressure and temperature transducers along with a lineal displacement controller provided the necessary signals to calculate lung mechanics. Ten newborn lambs (
Abstract: In this article, a formal specification and verification of the Rabin public-key scheme in a formal proof system is presented. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. A major objective of this article is the presentation of the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Moreover, we explicate a (computer-proven) formalization of correctness as well as a computer verification of security properties using a straight-forward computation model in Isabelle/HOL. The analysis uses a given database to prove formal properties of our implemented functions with computer support. The main task in designing a practical formalization of correctness as well as efficient computer proofs of security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as efficient formal proofs. Consequently, we get reliable proofs with a minimal error rate augmenting the used database, what provides a formal basis for more computer proof constructions in this area.
Abstract: There has been a growing emphasis in
communication management from simple coordination of
promotional tools to a complex strategic process. This study will
examine the current marketing communications and engagement
strategies used in addressing the key stakeholders. In the case of
fertilizer industry in Malaysia, there has been little empirical
research on stakeholder communication when major challenges
facing the modern corporation is the need to communicate its
identity, its values and products in order to distinguish itself from
competitors. The study will employ both quantitative and qualitative
methods and the use of Structural Equation Modeling (SEM) to
establish a causal relationship amongst the key factors of stakeholder
communication strategies and increment in consumers-
choice/acceptance and impact on financial performance. One of the
major contributions is a conceptual framework for communication
strategies and engagement in increasing consumers- acceptance level
and the firm-s financial performance.
Abstract: This paper presents an architecture of current filesystem
implementations as well as our new filesystem SpadFS and operating
system Spad with rewritten VFS layer targeted at high performance
I/O applications. The paper presents microbenchmarks and real-world
benchmarks of different filesystems on the same kernel as well as
benchmarks of the same filesystem on different kernels – enabling
the reader to make conclusion how much is the performance of
various tasks affected by operating system and how much by physical
layout of data on disk. The paper describes our novel features–most
notably continuous allocation of directories and cross-file readahead
– and shows their impact on performance.
Abstract: Although water only takes a little percentage in the total mass of soil, it indeed plays an important role to the strength of structure. Moisture transfer can be carried out by many different mechanisms which may involve heat and mass transfer, thermodynamic phase change, and the interplay of various forces such as viscous, buoyancy, and capillary forces. The continuum models are not well suited for describing those phenomena in which the connectivity of the pore space or the fracture network, or that of a fluid phase, plays a major role. However, Lattice Boltzmann methods (LBMs) are especially well suited to simulate flows around complex geometries. Lattice Boltzmann methods were initially invented for solving fluid flows. Recently, fluid with multicomponent and phase change is also included in the equations. By comparing the numerical result with experimental result, the Lattice Boltzmann methods with phase change will be optimized.
Abstract: The objective of the present study was to examine the
dose-response relationships between antioxidant parameters and liver
contaminant levels of Kazakhstan light crude oil (KLCO) in albino
rats. The animals were repeatedly exposed, by intraperitoneal
injection, to low dosages (0.5–1.5 ml/kg) of KLCO. Rats exposed to
these doses levels did not show any apparent symptoms of
intoxication. Serum aminotransferases increased significantly
(p
Abstract: Software maintenance, which involves making enhancements, modifications and corrections to existing software systems, consumes more than half of developer time. Specification comprehensibility plays an important role in software maintenance as it permits the understanding of the system properties more easily and quickly. The use of formal notation such as B increases a specification-s precision and consistency. However, the notation is regarded as being difficult to comprehend. Semi-formal notation such as the Unified Modelling Language (UML) is perceived as more accessible but it lacks formality. Perhaps by combining both notations could produce a specification that is not only accurate and consistent but also accessible to users. This paper presents an experiment conducted on a model that integrates the use of both UML and B notations, namely UML-B, versus a B model alone. The objective of the experiment was to evaluate the comprehensibility of a UML-B model compared to a traditional B model. The measurement used in the experiment focused on the efficiency in performing the comprehension tasks. The experiment employed a cross-over design and was conducted on forty-one subjects, including undergraduate and masters students. The results show that the notation used in the UML-B model is more comprehensible than the B model.
Abstract: In this paper we use the definition of CW basis of a free simplicial algebra. Using the free simplicial algebra, it is shown to construct free or totally free 2−crossed modules on suitable construction data with given a CW−basis of the free simplicial algebra. We give applications free crossed squares, free squared complexes and free 2−crossed complexes by using of 1(one) skeleton resolution of a step by step construction of the free simplicial algebra with a given CW−basis.
Abstract: The impact of a proposed pier on tidal current
alteration was evaluated. The proposed pier location was in Salad
Bay on Koa Kood Island, Trat province, Thailand, and was designed
to accommodate passenger ships with a draft of less than 2 m. The
study began with collecting necessary data, including bathymetric,
water elevation and tidal current characteristics. The impact was
assessed using a software package (MIKE21). Although the results
showed that the pier would affect the existing current pattern, the
change was determined to be insignificant, as the design of the piles
for the pier provided sufficient spacing to let the current flow as
freely as possible. Consequences of the altered current, such as
seabed erosion, water stagnation, sediment deposition and
navigational risk were assessed. Environmental mitigation measures
might be necessary if the impacts were considered unacceptable.
Abstract: This study was conducted to investigate the efficacy
of five herbicides on narrow leaved weeds and growth and yield of
wheat. An experiment was conducted at Agronomic Research
Farm, University of Agriculture Faisalabad. The experiment was
laid out in randomized complete block designee (RCBD) with three
replications. Treatments studied were clodinafop (Topic-15 WG) at
37 g a.i. ha-1, clodinafop (Topaz-15 WG) at 45 g a.i. ha-1,
fenoxaprop-p-ethyl (Puma Super-75 EW) at 45 g a.i. ha-1,
fenoxaprop-p-ethyl (Gramicide-6.9 EW) at 85 g a.i. ha-1,
fenoxaprop-p-ethyl (Chinlima-6.9 EW) at 85 g a.i. ha-1 and weedy
check. Plots treated with fenoxaprop-p-ethyl (Puma Super-75 EW)
at 45 g a.i. ha-1 produced relatively less weed biomass, more plant
height, number of spike bearing tillers, number of grains per spike,
1000-grain weight and grain yield (4.20 t ha-1).
Abstract: In inspection and workpiece localization, sampling point data is an important issue. Since the devices for sampling only sample discrete points, not the completely surface, sampling size and location of the points will be taken into consideration. In this paper a method is presented for determining the sampled points size and location for achieving efficient sampling. Firstly, uncertainty analysis of the localization parameters is investigated. A localization uncertainty model is developed to predict the uncertainty of the localization process. Using this model the minimum size of the sampled points is predicted. Secondly, based on the algebra theory an eigenvalue-optimal optimization is proposed. Then a freeform surface is used in the simulation. The proposed optimization is implemented. The simulation result shows its effectivity.
Abstract: An image texture analysis and target recognition approach of using an improved image texture feature coding method (TFCM) and Support Vector Machine (SVM) for target detection is presented. With our proposed target detection framework, targets of interest can be detected accurately. Cascade-Sliding-Window technique was also developed for automated target localization. Application to mammogram showed that over 88% of normal mammograms and 80% of abnormal mammograms can be correctly identified. The approach was also successfully applied to Synthetic Aperture Radar (SAR) and Ground Penetrating Radar (GPR) images for target detection.
Abstract: An international cooperation between educators in
Australia and the US has led to a reconceptualization of the teaching
of a library science course at Appalachian State University. The
pedagogy of Action Learning coupled with a 3D virtual learning
environment immerses students in a social constructivist learning
space that incorporates and supports interaction and reflection. The
intent of this study was to build a bridge between theory and practice
by providing students with a tool set that promoted personal and
social reflection, and created and scaffolded a community of practice.
Besides, action learning is an educational process whereby the fifty
graduate students experienced their own actions and experience to
improve performance.
Abstract: A complex valued neural network is a neural network, which consists of complex valued input and/or weights and/or thresholds and/or activation functions. Complex-valued neural networks have been widening the scope of applications not only in electronics and informatics, but also in social systems. One of the most important applications of the complex valued neural network is in image and vision processing. In Neural networks, radial basis functions are often used for interpolation in multidimensional space. A Radial Basis function is a function, which has built into it a distance criterion with respect to a centre. Radial basis functions have often been applied in the area of neural networks where they may be used as a replacement for the sigmoid hidden layer transfer characteristic in multi-layer perceptron. This paper aims to present exhaustive results of using RBF units in a complex-valued neural network model that uses the back-propagation algorithm (called 'Complex-BP') for learning. Our experiments results demonstrate the effectiveness of a Radial basis function in a complex valued neural network in image recognition over a real valued neural network. We have studied and stated various observations like effect of learning rates, ranges of the initial weights randomly selected, error functions used and number of iterations for the convergence of error on a neural network model with RBF units. Some inherent properties of this complex back propagation algorithm are also studied and discussed.
Abstract: This paper is taken into consideration the problem of cryptanalysis of stream ciphers. There is some attempts need to improve the existing attacks on stream cipher and to make an attempt to distinguish the portions of cipher text obtained by the encryption of plain text in which some parts of the text are random and the rest are non-random. This paper presents a tutorial introduction to symmetric cryptography. The basic information theoretic and computational properties of classic and modern cryptographic systems are presented, followed by an examination of the application of cryptography to the security of VoIP system in computer networks using LFSR algorithm. The implementation program will be developed Java 2. LFSR algorithm is appropriate for the encryption and decryption of online streaming data, e.g. VoIP (voice chatting over IP). This paper is implemented the encryption module of speech signals to cipher text and decryption module of cipher text to speech signals.
Abstract: The paper presents the case study of hazard
identification and sensitivity of potential resource of emergency
water supply as part of the application of methodology classifying
the resources of drinking water for emergency supply of population.
The case study has been carried out on a selected resource of
emergency water supply in one region of the Czech Republic. The
hazard identification and sensitivity of potential resource of
emergency water supply is based on a unique procedure and
developed general registers of selected types of hazards and
sensitivities. The registers have been developed with the help of the
“Fault Tree Analysis” method in combination with the “What if
method”. The identified hazards for the assessed resource include
hailstorms and torrential rains, drought, soil erosion, accidents of
farm machinery, and agricultural production. The developed registers
of hazards and vulnerabilities and a semi-quantitative assessment of
hazards for individual parts of hydrological structure and
technological elements of presented drilled wells are the basis for a
semi-quantitative risk assessment of potential resource of emergency
supply of population and the subsequent classification of such
resource within the system of crisis planning.
Abstract: The results obtained after incorporating the competence “creativity" to the subject Technical Drawing of the first course of the Degree in Forestry, Technical University of Madrid, are presented in this study.At first, learning activities which could serve two functions at the same time -developing students- creativity and developing other specific competences of the subject- were considered. Besides, changes in the assessment procedure were made and a method which analyzes two aspects of the assessment of the competence creativity was established. On the one hand, the products are evaluated by analyzing the outcomes obtained by students in the essays suggested and by establishing a parameter to assess the creativity expressed in those essays. On the other, an assessment of the student is directly carried out through a psychometric test which has been previously chosen by the team.Moreover, these results can be applied to similar or could be of general application.
Abstract: Genetic algorithms (GAs) have been widely used for
global optimization problems. The GA performance depends highly
on the choice of the search space for each parameter to be optimized.
Often, this choice is a problem-based experience. The search space
being a set of potential solutions may contain the global optimum
and/or other local optimums. A bad choice of this search space
results in poor solutions. In this paper, our approach consists in
extending the search space boundaries during the GA optimization,
only when it is required. This leads to more diversification of GA
population by new solutions that were not available with fixed search
space boundaries. So, these dynamic search spaces can improve the
GA optimization performances. The proposed approach is applied to
power system stabilizer optimization for multimachine power system
(16-generator and 68-bus). The obtained results are evaluated and
compared with those obtained by ordinary GAs. Eigenvalue analysis
and nonlinear system simulation results show the effectiveness of the
proposed approach to damp out the electromechanical oscillation and
enhance the global system stability.