Abstract: Technological innovation capability (TIC) is
defined as a comprehensive set of characteristics of a firm that
facilities and supports its technological innovation strategies.
An audit to evaluate the TICs of a firm may trigger
improvement in its future practices. Such an audit can be used
by the firm for self assessment or third-party independent
assessment to identify problems of its capability status. This
paper attempts to develop such an auditing framework that
can help to determine the subtle links between innovation
capabilities and business performance; and to enable the
auditor to determine whether good practice is in place. The
seven TICs in this study include learning, R&D, resources
allocation, manufacturing, marketing, organization and
strategic planning capabilities. Empirical data was acquired
through a survey study of 200 manufacturing firms in the
Hong Kong/Pearl River Delta (HK/PRD) region. Structural
equation modelling was employed to examine the
relationships among TICs and various performance indicators:
sales performance, innovation performance, product
performance, and sales growth. The results revealed that
different TICs have different impacts on different
performance measures. Organization capability was found to
have the most influential impact. Hong Kong manufacturers
are now facing the challenge of high-mix-low-volume
customer orders. In order to cope with this change, good
capability in organizing different activities among various
departments is critical to the success of a company.
Abstract: Combustion, emission and performance
characterization of a single cylinder diesel engine using methanol
diesel blends was carried out. The blends were 5% (v/v) methanol in
diesel (MD05) and 10% (v/v) methanol in diesel (MD10). The
problem of solubility of methanol and diesel was addressed by an
agitator placed inside the fuel tank to prevent phase separation. The
results indicated that total combustion duration was reduced by15.8%
for MD05 and 31.27% for MD10compared to the baseline data.
Ignition delay was increased with increasing methanol volume
fraction in the test fuel. Total cyclic heat release was reduced by
1.5% for MD05 and 6.7% for MD10 as compared to diesel baseline.
Emissions of carbon monoxide, hydrocarbons along with smoke were
reduced and that of nitrogen oxides were increased with rising
methanol contents in the test fuel. Full load brake thermal efficiency
was marginally reduced with increased methanol composition in the
blend.
Abstract: The current of professional bicycle pedal-s
manufacturing model mostly used casting, forging, die-casting
processing methods, so the paper used 7075 aluminum alloy which is
to produce the bicycle parts most commonly, and employs the
rigid-plastic finite element (FE) DEFORMTM 3D software to simulate
and to analyze the professional bicycle pedal design. First we use Solid
works 2010 3D graphics software to design the professional bicycle
pedal of the mold and appearance, then import finite element (FE)
DEFORMTM 3D software for analysis. The paper used rigid-plastic
model analytical methods, and assuming mode to be rigid body. A
series of simulation analyses in which the variables depend on
different temperature of forging billet, friction factors, forging speed,
mold temperature are reveal to effective stress, effective strain, damage
and die radial load distribution for forging bicycle pedal. The analysis
results hope to provide professional bicycle pedal forming mold
references to identified whether suit with the finite element results for
high-strength design suitability of aluminum alloy.
Abstract: This paper presents a new method which applies an
artificial bee colony algorithm (ABC) for capacitor placement in
distribution systems with an objective of improving the voltage profile
and reduction of power loss. The ABC algorithm is a new population
based meta heuristic approach inspired by intelligent foraging behavior
of honeybee swarm. The advantage of ABC algorithm is that
it does not require external parameters such as cross over rate and
mutation rate as in case of genetic algorithm and differential evolution
and it is hard to determine these parameters in prior. The other
advantage is that the global search ability in the algorithm is implemented
by introducing neighborhood source production mechanism
which is a similar to mutation process. To demonstrate the validity
of the proposed algorithm, computer simulations are carried out on
69-bus system and compared the results with the other approach
available in the literature. The proposed method has outperformed the
other methods in terms of the quality of solution and computational
efficiency.
Abstract: Experiments have been carried out at the Latvia
University of Agriculture Department of Food Technology. The aim
of this work was to assess the effect of sous vide packaging during
the storage time of salad with meat in mayonnaise at different storage
temperature. Samples were evaluated at 0, 1, 3, 7, 10, 15, 18, 25, 29,
42, and 52 storage days at the storage temperature of +4±0.5 ºC and
+10±0.5 ºC. Experimentally the quality of the salad with meat in
mayonnaise was characterized by measuring colour, pH and
microbiological properties. The sous vide packaging was effective in
protecting the product from physical, chemical, and microbial quality
degradation. The sous vide packaging significantly reduces microbial
growth at storage temperature of +4±0.5 ºC and +10±0.5 ºC.
Moreover, it is possible to extend the product shelf life to 52 days
even when stored at +10±0.5 ºC.
Abstract: Direct numerical simulation (DNS) is used to study the evolution of a boundary layer that was laminar initially followed by separation and then reattachment owing to generation of turbulence. This creates a closed region of recirculation, known as the laminar-separation bubble. The present simulation emulates the flow environment encountered in a modern LP turbine blade, where a laminar separation bubble may occur on the suction surface. The unsteady, incompressible three-dimensional (3-D) Navier-Stokes (NS) equations have been solved over a flat plate in the Cartesian coordinates. The adverse pressure gradient, which causes the flow to separate, is created by a boundary condition. The separated shear layer undergoes transition through appearance of ╬ø vortices, stretching of these create longitudinal streaks. Breakdown of the streaks into small and irregular structures makes the flow turbulent downstream.
Abstract: The lack of any centralized infrastructure in mobile ad
hoc networks (MANET) is one of the greatest security concerns in
the deployment of wireless networks. Thus communication in
MANET functions properly only if the participating nodes cooperate
in routing without any malicious intention. However, some of the
nodes may be malicious in their behavior, by indulging in flooding
attacks on their neighbors. Some others may act malicious by
launching active security attacks like denial of service. This paper
addresses few related works done on trust evaluation and
establishment in ad hoc networks. Related works on flooding attack
prevention are reviewed. A new trust approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate and prevent flooding attacks in an ad hoc environment.
The performance of the trust algorithm is tested in an ad hoc network
implementing the Ad hoc On-demand Distance Vector (AODV)
protocol.
Abstract: In this paper, multi-processors job shop scheduling problems are solved by a heuristic algorithm based on the hybrid of priority dispatching rules according to an ant colony optimization algorithm. The objective function is to minimize the makespan, i.e. total completion time, in which a simultanous presence of various kinds of ferons is allowed. By using the suitable hybrid of priority dispatching rules, the process of finding the best solution will be improved. Ant colony optimization algorithm, not only promote the ability of this proposed algorithm, but also decreases the total working time because of decreasing in setup times and modifying the working production line. Thus, the similar work has the same production lines. Other advantage of this algorithm is that the similar machines (not the same) can be considered. So, these machines are able to process a job with different processing and setup times. According to this capability and from this algorithm evaluation point of view, a number of test problems are solved and the associated results are analyzed. The results show a significant decrease in throughput time. It also shows that, this algorithm is able to recognize the bottleneck machine and to schedule jobs in an efficient way.
Abstract: In this paper we discuss on the security module for the
car appliances to prevent stealing and illegal use on other cars. We
proposed an open structure including authentication and encryption by
embed a security module in each to protect car appliances. Illegal
moving and use a car appliance with the security module without
permission will lead the appliance to useless. This paper also presents
the component identification and deal with relevant procedures. It is at
low cost to recover from destroys by the burglar. Expect this paper to
offer the new business opportunity to the automotive and technology
industry.
Abstract: We have developed an analytic model for the radial pn-junction in a nanowire (NW) core-shell structure utilizing as a new
building block in different semiconductor devices. The potential distribution through the p-n-junction is calculated and the analytical expressions are derived to compute the depletion region widths. We
show that the widths of space charge layers, surrounding the core, are
the functions of core radius, which is the manifestation of so called classical size effect. The relationship between the depletion layer width and the built-in potential in the asymptotes of infinitely large
core radius transforms to square-root dependence specific for conventional planar p-n-junctions. The explicit equation is derived to
compute the capacitance of radial p-n-junction. The current-voltage behavior is also carefully determined taking into account the “short
base" effects.
Abstract: The only relevant basis for the design of an educational application are objectives of learning for the content area. This study analyses the process in which the real – not only the formal – objectives could work as the starting point for the construction of an educational game. The application context is the education of perioperative nursing. The process is based on the panel discussions of nursing teachers. In the panels, the teachers elaborated the objectives. The transcribed discussions were analysed in terms of the conceptions of learning and teaching of perioperative nursing. The outcome of the study is first the elaborated objectives, which will be used in the implementation of an educational game for the needs of pre-, intra and post-operative nursing skills learning. Second, the study shows that different views of learning are necessary to be understood in order to design an appropriate educational application.
Abstract: We introduce a novel approach to measuring how
humans learn based on techniques from information theory and
apply it to the oriental game of Go. We show that the total amount
of information observable in human strategies, called the strategic
information, remains constant for populations of players of differing
skill levels for well studied patterns of play. This is despite the very
large amount of knowledge required to progress from the recreational
players at one end of our spectrum to the very best and most
experienced players in the world at the other and is in contrast to
the idea that having more knowledge might imply more 'certainty'
in what move to play next. We show this is true for very local
up to medium sized board patterns, across a variety of different
moves using 80,000 game records. Consequences for theoretical and
practical AI are outlined.
Abstract: The acoustic and articulatory properties of fricative speech sounds are being studied using magnetic resonance imaging (MRI) and acoustic recordings from a single subject. Area functions were derived from a complete set of axial and coronal MR slices using two different methods: the Mermelstein technique and the Blum transform. Area functions derived from the two techniques were shown to differ significantly in some cases. Such differences will lead to different acoustic predictions and it is important to know which is the more accurate. The vocal tract acoustic transfer function (VTTF) was derived from these area functions for each fricative and compared with measured speech signals for the same fricative and same subject. The VTTFs for /f/ in two vowel contexts and the corresponding acoustic spectra are derived here; the Blum transform appears to show a better match between prediction and measurement than the Mermelstein technique.
Abstract: Unsteady boundary layer flow of an incompressible
micropolar fluid over a stretching sheet when the sheet is stretched in
its own plane is studied in this paper. The stretching velocity is
assumed to vary linearly with the distance along the sheet. Two equal
and opposite forces are impulsively applied along the x-axis so that the
sheet is stretched, keeping the origin fixed in a micropolar fluid. The
transformed unsteady boundary layer equations are solved
numerically using the Keller-box method for the whole transient from
the initial state to final steady-state flow. Numerical results are
obtained for the velocity and microrotation distributions as well as the
skin friction coefficient for various values of the material parameter K.
It is found that there is a smooth transition from the small-time
solution to the large-time solution.
Abstract: This study describes the relationship between motivation factors and academic performance among distance education students enrolled in a postgraduate nursing course. Students (n=96) participated in a survey that assesses student's motivational orientations from a cognitive perspective using a selfadministered questionnaire based on Pintrich-s Motivation Strategies for Learning Questionnaire (MLSQ). Results showed students- motivational factors are highest on task value (6.44, 0.71); followed by intrinsic goal orientation (6.20, 0.76), control beliefs (6.02, 0.89); extrinsic goal orientation (5.85, 1.13); self-efficacy for learning and performance (5.62, 0.84), and finally, test anxiety (4.21, 1.37). Weak positive correlations were found between academic performance and intrinsic goal orientation (r=0.13), extrinsic goal orientation (r=0.04), task value (r=0.09), control beliefs (r=0.02), and self-efficacy (r=0.05), while there was weak negative correlation with test anxiety (r=-0.04). Conclusions from the study indicate the need to focus on improving tasks and targeting intrinsic goal orientations of students to courses since these were positively correlated with academic performance and downplay the use of tests since these were negatively correlated with academic performance.
Abstract: Many studies have shown that Artificial Neural
Networks (ANN) have been widely used for forecasting financial
markets, because of many financial and economic variables are nonlinear,
and an ANN can model flexible linear or non-linear
relationship among variables.
The purpose of the study was to employ an ANN models to
predict the direction of the Istanbul Stock Exchange National 100
Indices (ISE National-100).
As a result of this study, the model forecast the direction of the
ISE National-100 to an accuracy of 74, 51%.
Abstract: The effect of dry milling on the carbothermic
reduction of celestite was investigated. Mixtures of celestite
concentrate (98% SrSO4) and activated carbon (99% carbon) was
milled for 1 and 24 hours in a planetary ball mill. Un-milled and
milled mixtures and their products after carbothermic reduction were
studied by a combination of XRD and TGA/DTA experiments. The
thermogravimetric analyses and XRD results showed that by milling
celestite-carbon mixtures for one hour, the formation temperature of
strontium sulfide decreased from about 720°C (in un-milled sample)
to about 600°C, after 24 hours milling it decreased to 530°C. It was
concluded that milling induces increasingly thorough mixing of the
reactants to reduction occurring at lower temperatures
Abstract: Multi-Agent Systems (MAS) emerged in the pursuit to improve our standard of living, and hence can manifest complex human behaviors such as communication, decision making, negotiation and self-organization. The Social Network Services (SNSs) have attracted millions of users, many of whom have integrated these sites into their daily practices. The domains of MAS and SNS have lots of similarities such as architecture, features and functions. Exploring social network users- behavior through multiagent model is therefore our research focus, in order to generate more accurate and meaningful information to SNS users. An application of MAS is the e-Auction and e-Rental services of the Universiti Cyber AgenT(UniCAT), a Social Network for students in Universiti Tunku Abdul Rahman (UTAR), Kampar, Malaysia, built around the Belief- Desire-Intention (BDI) model. However, in spite of the various advantages of the BDI model, it has also been discovered to have some shortcomings. This paper therefore proposes a multi-agent framework utilizing a modified BDI model- Belief-Desire-Intention in Dynamic and Uncertain Situations (BDIDUS), using UniCAT system as a case study.
Abstract: Reliability Centered Maintenance(RCM) is one of
most widely used methods in the modern power system to schedule a
maintenance cycle and determine the priority of inspection. In order
to apply the RCM method to the Smart Grid, a precedence study for
the new structure of rearranged system should be performed due to
introduction of additional installation such as renewable and
sustainable energy resources, energy storage devices and advanced
metering infrastructure. This paper proposes a new method to
evaluate the priority of maintenance and inspection of the power
system facilities in the Smart Grid using the Risk Priority Number. In
order to calculate that risk index, it is required that the reliability
block diagram should be analyzed for the Smart Grid system. Finally,
the feasible technical method is discussed to estimate the risk
potential as part of the RCM procedure.
Abstract: Key management is a vital component in any modern security protocol. Due to scalability and practical implementation considerations automatic key management seems a natural choice in significantly large virtual private networks (VPNs). In this context IETF Internet Key Exchange (IKE) is the most promising protocol under permanent review. We have made a humble effort to pinpoint IKEv2 net gain over IKEv1 due to recent modifications in its original structure, along with a brief overview of salient improvements between the two versions. We have used US National Institute of Technology NIIST VPN simulator to get some comparisons of important performance metrics.