Abstract: Technical laboratories are typically considered as
highly hazardous places in the polytechnic institution when
addressing the problems of high incidences and fatality rates. In
conjunction with several topics covered in the technical curricular,
safety and health precaution should be highlighted in order to
connect to few key ideas of being safe. Therefore the assessment of
safety awareness in terms of safety and health about hazardous and
risks at laboratories is needed and has to be incorporated with
technical education and other training programmes. The purpose of
this study was to determine the efficacy of technical laboratory safety
in one of the polytechnics in northern region. The study examined
three related issues that were; the availability of safety material and
equipment, safety practice adopted by technical teachers and
administrator-s safety attitudes in enforcing safety to the students. A
model of efficacy technical laboratory was developed to test the
linear relationship between existing safety material and equipment,
teachers- safety practice and administrators- attitude in enforcing
safety and to identify which of technical laboratory safety issues was
the most pertinent factor to realize safety in technical laboratory.
This was done by analyzing survey-based data sets particularly those
obtained from samples of 210 students in the polytechnic. The
Pearson Correlation was used to measure the association between the
variables and to test the research hypotheses. The result of the study
has found that there was a significant correlation between existing
safety material and equipment, safety practice adopted by teacher
and administrator-s attitude. There was also a significant relationship
between technical laboratory safety and safety practice adopted by
teacher and between technical laboratory safety and administrator
attitude. Hence, safety practice adopted by teacher and administrator
attitude is vital in realizing technical laboratory safety.
Abstract: In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Abstract: In this paper, many techniques for blind identification of moving average (MA) process are presented. These methods utilize third- and fourth-order cumulants of the noisy observations of the system output. The system is driven by an independent and identically distributed (i.i.d) non-Gaussian sequence that is not observed. Two nonlinear optimization algorithms, namely the Gradient Descent and the Gauss-Newton algorithms are exposed. An algorithm based on the joint-diagonalization of the fourth-order cumulant matrices (FOSI) is also considered, as well as an improved version of the classical C(q, 0, k) algorithm based on the choice of the Best 1-D Slice of fourth-order cumulants. To illustrate the effectiveness of our methods, various simulation examples are presented.
Abstract: Using bottom-up image processing algorithms to predict human eye fixations and extract the relevant embedded information in images has been widely applied in the design of active machine vision systems. Scene text is an important feature to be extracted, especially in vision-based mobile robot navigation as many potential landmarks such as nameplates and information signs contain text. This paper proposes an edge-based text region extraction algorithm, which is robust with respect to font sizes, styles, color/intensity, orientations, and effects of illumination, reflections, shadows, perspective distortion, and the complexity of image backgrounds. Performance of the proposed algorithm is compared against a number of widely used text localization algorithms and the results show that this method can quickly and effectively localize and extract text regions from real scenes and can be used in mobile robot navigation under an indoor environment to detect text based landmarks.
Abstract: This paper reviews the optimization available
transmission capability (ATC) of power systems using a device of
FACTS named SSSC equipped with energy storage devices. So that,
emplacement and improvement of parameters of SSSC will be
illustrated. Thus, voltage magnitude constraints of network buses,
line transient stability constraints and voltage breakdown constraints
are considered. To help the calculations, a comprehensive program in
DELPHI is provided, which is able to simulate and trace the
parameters of SSSC has been installed on a specific line.
Furthermore, the provided program is able to compute ATC, TTC
and maximum value of their enhancement after using SSSC.
Abstract: This study adopts a qualitative approach, which
engages in the dialectical discussion on two levels of dyad opposite
views. The first level of the dyad opposite views is the Western
strategic perspective and the Eastern Tai-Chi thinking. The second
level of the dyad opposite views is resource-based view and resource
dependence theory. This study concludes the resource-oriented actions
for competitive advantage as the metaphor of Tai-Chi consisted of yin
and yang. This study argues that the focal firm should adopt bridging
strategy during the core competence development period because its
core competence development is likely to meet its competitor’s needs
of exploring strategy during the competitor’s external resource
development stage. In addition, the focal firm should adopt buffering
strategy during the external resource development period to prevent its
competitor’s the exploiting strategy from attack during the
competitor’s core competence development stage. Consequently, this
study takes a significant first step toward a novel contextualize
understanding of resource development based on strategic perspective
and Tai-Chi thinking providing more fully sustainable strategy for
competitive advantage.
Abstract: The main objective of this paper is a comparative
investigate in enhancement of damping power system oscillation via
coordinated design of the power system stabilizer (PSS) and static
synchronous series compensator (SSSC) and static synchronous
compensator (STATCOM). The design problem of FACTS-based
stabilizers is formulated as a GA based optimization problem. In this
paper eigenvalue analysis method is used on small signal stability of
single machine infinite bus (SMIB) system installed with SSSC and
STATCOM. The generator is equipped with a PSS. The proposed
stabilizers are tested on a weakly connected power system with
different disturbances and loading conditions. This aim is to enhance
both rotor angle and power system stability. The eigenvalue analysis
and non-linear simulation results are presented to show the effects of
these FACTS-based stabilizers and reveal that SSSC exhibits the best
effectiveness on damping power system oscillation.
Abstract: This paper proposes a modeling method of the laws controlling manufacturing systems with temporal and non temporal constraints. A methodology of robust control construction generating the margins of passive and active robustness is being elaborated. Indeed, two paramount models are presented in this paper. The first utilizes the P-time Petri Nets which is used to manage the flow type disturbances. The second, the quality model, exploits the Intervals Constrained Petri Nets (ICPN) tool which allows the system to preserve its quality specificities. The redundancy of the robustness of the elementary parameters between passive and active is also used. The final model built allows the correlation of temporal and non temporal criteria by putting two paramount models in interaction. To do so, a set of definitions and theorems are employed and affirmed by applicator examples.
Abstract: Research results and optimal parameters investigation
of laser cut and profiling of diamond and quartz substrates by
femtosecond laser pulses are presented. Profiles 10 μm in width, ~25
μm in depth and several millimeters long were made. Investigation of
boundaries quality has been carried out with the use of AFM
«Vecco». Possibility of technological formation of profiles and
micro-holes in diamond and quartz substrates with nanometer-scale
boundaries is shown. Experimental results of multilayer dielectric
cover treatment are also presented. Possibility of precise upper layer
(thickness of 70–140 nm) removal is demonstrated. Processes of thin
metal film (60 nm and 350 nm thick) treatment are considered.
Isolation tracks (conductance ~ 10-11 S) 1.6–2.5 μm in width in
conductive metal layers are formed.
Abstract: The National Blood Center, Thai Red Cross Society is
responsible for providing blood to hospitals all over the country.
When any hospital needs blood, it will have to send the vehicle to
pick up at the NBC. There are a lot of vehicles to pick up blood at the
NBC every day. Each vehicle is usually empty for inbound trip and a
little loaded for outbound. The NBC realized such waste or loss and
there have been the third party offered to distribute blood and charge
for fee. This paper proposes to apply the vehicle routing problem
(VRP) for estimating the fair price. The idea is tested with the real
data during seven-day period of 6 – 12 July 2010 to estimate the fair
price for transporting blood in Bangkok Metropolitan Region.
Abstract: We investigate the sufficient condition under which each positive b-weakly compact operator is Dunford-Pettis. We also investigate the necessary condition on which each positive b-weakly compact operator is Dunford-Pettis. Necessary condition on which each positive b-weakly compact operator is weakly compact is also considered. We give the operator that is semi-compact, but it is not bweakly. We present a necessary and sufficient condition under which each positive semi-compact operator is b-weakly compact.
Abstract: The running logs of a process hold valuable
information about its executed activity behavior and generated activity
logic structure. Theses informative logs can be extracted, analyzed and
utilized to improve the efficiencies of the process's execution and
conduction. One of the techniques used to accomplish the process
improvement is called as process mining. To mine similar processes is
such an improvement mission in process mining. Rather than directly
mining similar processes using a single comparing coefficient or a
complicate fitness function, this paper presents a simplified heuristic
process mining algorithm with two similarity comparisons that are
able to relatively conform the activity logic sequences (traces) of
mining processes with those of a normalized (regularized) one. The
relative process conformance is to find which of the mining processes
match the required activity sequences and relationships, further for
necessary and sufficient applications of the mined processes to process
improvements. One similarity presented is defined by the relationships
in terms of the number of similar activity sequences existing in
different processes; another similarity expresses the degree of the
similar (identical) activity sequences among the conforming processes.
Since these two similarities are with respect to certain typical behavior
(activity sequences) occurred in an entire process, the common
problems, such as the inappropriateness of an absolute comparison and
the incapability of an intrinsic information elicitation, which are often
appeared in other process conforming techniques, can be solved by the
relative process comparison presented in this paper. To demonstrate
the potentiality of the proposed algorithm, a numerical example is
illustrated.
Abstract: This paper presents the experimental results of silicone rubber housing material for 24kV lightning arrester under artificial accelerated ageing test based on IEC 61109 specifications. Specimens having inclined and alternated shed made of HTV silicone rubber with ATH content and having leakage distance 625 mm were tested continuously 1000 hrs in artificial salt fog chamber. After 1000 hrs of salt fog ageing test, obviously surface erosion was observed on trunk between the upper large shed and the lower small shed near the energized end. Decreasing in hydrophobicity and increasing in hardness were measured on tested specimen comparing with new specimen. Chemical analysis by ATR-FTIR confirmed the observation results.
Abstract: Thousands of masters athletes participate
quadrennially in the World Masters Games (WMG), yet this cohort
of athletes remains proportionately under-investigated. Due to a
growing global obesity pandemic in context of benefits of physical
activity across the lifespan, the BMI trends for this unique population
was of particular interest. The nexus between health, physical
activity and aging is complex and has raised much interest in recent
times due to the realization that a multifaceted approach is necessary
in order to counteract the obesity pandemic. By investigating age
based trends within a population adhering to competitive sport at
older ages, further insight might be gleaned to assist in understanding
one of many factors influencing this relationship.BMI was derived
using data gathered on a total of 6,071 masters athletes (51.9% male,
48.1% female) aged 25 to 91 years ( =51.5, s =±9.7), competing at
the Sydney World Masters Games (2009). Using linear and loess
regression it was demonstrated that the usual tendency for prevalence
of higher BMI increasing with age was reversed in the sample. This
trend in reversal was repeated for both male and female only sub-sets
of the sample participants, indicating the possibility of improved
prevalence of BMI with increasing age for both the sample as a
whole and these individual sub-groups.This evidence of improved
classification in one index of health (reduced BMI) for masters
athletes (when compared to the general population) implies there are
either improved levels of this index of health with aging due to
adherence to sport or possibly the reduced BMI is advantageous and
contributes to this cohort adhering (or being attracted) to masters
sport at older ages.
Abstract: This paper describes the development of an
autonomous robot for painting the interior walls of buildings. The
robot consists of a painting arm with an end effector roller that scans
the walls vertically and a mobile platform to give horizontal feed to
paint the whole area of the wall. The painting arm has a planar twolink
mechanism with two joints. Joints are driven from a stepping
motor through a ball screw-nut mechanism. Four ultrasonic sensors
are attached to the mobile platform and used to maintain a certain
distance from the facing wall and to avoid collision with side walls.
When settled on adjusted distance from the wall, the controller starts
the painting process autonomously. Simplicity, relatively low weight
and short painting time were considered in our design. Different
modules constituting the robot have been separately tested then
integrated. Experiments have shown successfulness of the robot in its
intended tasks.
Abstract: Outsourcing, a management practice strongly
consolidated within the area of Information Systems, is currently
going through a stage of unstoppable growth. This paper makes a
proposal about the main reasons which may lead firms to adopt
Information Systems Outsourcing. It will equally analyse the
potential risks that IS clients are likely to face. An additional
objective is to assess these reasons and risks in the case of large
Spanish firms, while simultaneously examining their evolution over
time.
Abstract: It is expected that ubiquitous era will come soon. A ubiquitous environment has features like peer-to-peer and nomadic environments. Such features can be represented by peer-to-peer systems and mobile ad-hoc networks (MANETs). The features of P2P systems and MANETs are similar, appealing for implementing P2P systems in MANET environment. It has been shown that, however, the performance of the P2P systems designed for wired networks do not perform satisfactorily in mobile ad-hoc environment. Subsequently, this paper proposes a method to improve P2P performance using cross-layer design and the goodness of a node as a peer. The proposed method uses routing metric as well as P2P metric to choose favorable peers to connect. It also utilizes proactive approach for distributing peer information. According to the simulation results, the proposed method provides higher query success rate, shorter query response time and less energy consumption by constructing an efficient overlay network.
Abstract: The mechanism behind the electromigration and
thermomigration failure in flip-chip solder joints with Cu-pillar bumps
was investigated in this paper through using finite element method.
Hot spot and the current crowding occurrs in the upper corner of
copper column instead of solders of the common solder ball. The
simulation results show that the change in thermal gradient is
noticeable, which might greatly affect the reliability of solder joints
with Cu-pillar bumps under current stressing. When the average
applied current density is increased from 1×104 A/cm2 to 3×104 A/cm2
in solders, the thermal gradient would increase from 74 K/cm to 901
K/cm at an ambient temperature of 25°C. The force from thermal
gradient of 901 K/cm can nearly induce thermomigration by itself.
With the increase in applied current, the thermal gradient is growing. It
is proposed that thermomigration likely causes a serious reliability
issue for Cu column based interconnects.
Abstract: This paper presents data annotation models at five levels of granularity (database, relation, column, tuple, and cell) of relational data to address the problem of unsuitability of most relational databases to express annotations. These models do not require any structural and schematic changes to the underlying database. These models are also flexible, extensible, customizable, database-neutral, and platform-independent. This paper also presents an SQL-like query language, named Annotation Query Language (AnQL), to query annotation documents. AnQL is simple to understand and exploits the already-existent wide knowledge and skill set of SQL.
Abstract: Mobile Ad Hoc network is an infrastructure less
network which operates with the coordination of each node. Each node
believes to help another node, by forwarding its data to/from another
node. Unlike a wired network, nodes in an ad hoc network are resource
(i.e. battery, bandwidth computational capability and so on)
constrained. Such dependability of one node to another and limited
resources of nodes can result in non cooperation by any node to
accumulate its resources. Such non cooperation is known as selfish
behavior.
This paper discusses the performance analysis of very well known
MANET single-path (i.e. AODV) and multi-path (i.e. AOMDV)
routing protocol, in the presence of selfish behaviors. Along with
existing selfish behaviors, a new variation is also studied. Extensive
simulations were carried out using ns-2 and the study concluded that
the multi-path protocol (i.e. AOMDV) with link disjoint configuration
outperforms the other two configurations.