452 research outputs found

    A hybrid performance evaluation system for notebook computer ODM companies

    Get PDF
    [[abstract]]The aim of the paper is to fulfill this need by building a conceptual framework for measuring the business performance of notebook computer ODM (Original Design Manufacturer) companies carried out to investigate how performance is understood and to identify the potential dimensions to improvement. In the process, a multiple criteria procedure is used to assess the performance in these companies. We explore the performance-evaluation systems by using fuzzy AHP and VIKOR techniques. The evidence from the investigation showed that supply chain capability and manufacturing capability are the top two indicators for the notebook computer ODM companies’ performance. Furthermore, it was found that Quanta and Compal have the relative high business performance among these companies. The research provides evidence which establishes whether benchmarking provides a real and lasting benefit to notebook computer ODM companies. A series of managerial implications are set forth and discussed.[[journaltype]]ćœ‹ć€–[[incitationindex]]SSCI[[booktype]]çŽ™æœŹ[[countrycodes]]NG

    Assessing Taiwan financial holding companies’ performance using window analysis and Malmquist productivity index

    Get PDF
    [[abstract]]Performance evaluation is the important approach for enterprises to give incentive and restraint to their operators and it is also an important channel for enterprise stakeholders to get the performance information. The purpose of this study is to analyze current evaluation system for Taiwan Financial Holding Companies. This research tries to measure the performance on thirteen financial holding companies in Taiwan for the period 2003 to 2009. The result presented the proposed method is practical and useful. Also the study result represented that the combined method had certain scientific and rationality. The evaluation model indicates that this method be more reasonable and easier to grasp than other methods. As a result, it is easier to popularize this evaluation method in enterprises. The study thus presents a complete assessment model that helps managers to identify items for improvement, while simultaneously promoting cost and time efficiencies in financial Holding Companies.[[journaltype]]ćœ‹ć€–[[incitationindex]]SSCI[[booktype]]é›»ć­ç‰ˆ[[countrycodes]]NG

    VLSI design concepts for iterative algorithms

    Get PDF
    Circuit design becomes more and more complicated, especially when the Very Large Scale Integration (VLSI) manufacturing technology node keeps shrinking down to nanoscale level. New challenges come up such as an increasing gap between the design productivity and the Moore’s Law. Leakage power becomes a major factor of the power consumption and traditional shared bus transmission is the critical bottleneck in the billion transistors Multi-Processor System–on–Chip (MPSoC) designs. These issues lead us to discuss the impact on the design of iterative algorithms. This thesis presents several strategies that satisfy various design con- straints, which can be used to explore superior solutions for the circuit design of iterative algorithms. Four selected examples of iterative al- gorithms are elaborated in this respect: hardware implementation of COordinate Rotation DIgital Computer (CORDIC) processor for sig- nal processing, configurable DCT and integer transformations based CORDIC algorithm for image/video compression, parallel Jacobi Eigen- value Decomposition (EVD) method with arbitrary iterations for com- munication, and acceleration of parallel Sparse Matrix–Vector Multipli- cation (SMVM) operations based Network–on–Chip (NoC) for solving systems of linear equations. These four applications of iterative meth- ods have been chosen since they cover a wide area of current signal processing tasks. Each method has its own unique design criteria when it comes to the direct implementation on the circuit level. Therefore, a balanced solution between various design tradeoffs is elaborated for each method. These tradeoffs are between throughput and power consumption, com- putational complexity and transformation accuracy, the number of in- ner/outer iterations and energy consumption, data structure and net- work topology. It is shown that all of these algorithms can be imple- mented on FPGA devices or as ASICs efficiently

    Path Planning on Quadric Surfaces and Its Application

    Get PDF
    In this chapter, recent near-shortest path-planning algorithms with O(nlog n) in the quadric plane based on the Delaunay triangulation, Ahuja-Dijkstra algorithm, and ridge points are reviewed. The shortest path planning in the general three-dimensional situation is an NP-hard problem. The optimal solution can be approached under the assumption that the number of Steiner points is infinite. The state-the-art method has at most 2.81% difference on the shortest path length, but the computation time is 4216 times faster. Compared to the other O(nlog n) time near-shortest path approach (Kanai and Suzuki, KS’s algorithm), the path length of the Delaunay triangulation method is 0.28% longer than the KS’s algorithm with three Steiner points, but the computation is about 31.71 times faster. This, however, has only a few path length differences, which promises a good result, but the best computing time. Notably, these methods based on Delaunay triangulation concept are ideal for being extended to solve the path-planning problem on the Quadric surface or even the cruise missile mission planning and Mars rover

    Patient-oriented simulation based on Monte Carlo algorithm by using MRI data

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Although Monte Carlo simulations of light propagation in full segmented three-dimensional MRI based anatomical models of the human head have been reported in many articles. To our knowledge, there is no patient-oriented simulation for individualized calibration with NIRS measurement. Thus, we offer an approach for brain modeling based on image segmentation process with <it>in vivo </it>MRI T1 three-dimensional image to investigate the individualized calibration for NIRS measurement with Monte Carlo simulation.</p> <p>Methods</p> <p>In this study, an individualized brain is modeled based on <it>in vivo </it>MRI 3D image as five layers structure. The behavior of photon migration was studied for this individualized brain detections based on three-dimensional time-resolved Monte Carlo algorithm. During the Monte Carlo iteration, all photon paths were traced with various source-detector separations for characterization of brain structure to provide helpful information for individualized design of NIRS system.</p> <p>Results</p> <p>Our results indicate that the patient-oriented simulation can provide significant characteristics on the optimal choice of source-detector separation within 3.3 cm of individualized design in this case. Significant distortions were observed around the cerebral cortex folding. The spatial sensitivity profile penetrated deeper to the brain in the case of expanded CSF. This finding suggests that the optical method may provide not only functional signal from brain activation but also structural information of brain atrophy with the expanded CSF layer. The proposed modeling method also provides multi-wavelength for NIRS simulation to approach the practical NIRS measurement.</p> <p>Conclusions</p> <p>In this study, the three-dimensional time-resolved brain modeling method approaches the realistic human brain that provides useful information for NIRS systematic design and calibration for individualized case with prior MRI data.</p

    Clinical meaning of age-related expression of fecal cytokeratin 19 in colorectal malignancy

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Colorectal cancer (CRC) is one of the leading causes of malignant death worldwide. Because young age of onset is often considered a poor prognostic factor for CRC, it is important to identify the poor outcomes of CRC in a younger population and to consider an aggressive approach by implementing early treatment. Our aim was to specifically quantify the fecal cytokeratin 19 (CK19) transcript from CRC patients and investigate its correlation with clinical stage, tumor malignancy, and age.</p> <p>Methods</p> <p>The quantitation of fecal CK19 transcript was determined by a quantitative real-time reverse transcription polymerase chain in 129 CRC patients (45 younger than 60 years at diagnosis) and 85 healthy controls. The levels of CK19 protein were examined both in colonic cell lines and tissues.</p> <p>Results</p> <p>The analysis of 45 younger CRC patients (age ≀ 60 years) revealed that patients at the M1 stage had significantly higher expression levels of fecal CK19 mRNA when compared with healthy controls (<it>p </it>< 0.001) and patients at the M0 stage (<it>p </it>= 0.004). Additionally, the degree of consistency between the mean level of fecal CK19 mRNA and the distant metastatic rate in each age interval was up to 89% (<it>p </it>= 0.042).</p> <p>Conclusion</p> <p>These results indicate that high levels of fecal CK19 mRNA represent a potential marker for colorectal malignancy and for aggressive treatment of younger CRC patients.</p

    Acquiring Authentic Data in Unattended Wireless Sensor Networks

    Get PDF
    An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods
    • 

    corecore