1,494 research outputs found

    Very Massive Stars and the Eddington Limit

    Get PDF
    We use contemporary evolutionary models for Very Massive Stars (VMS) to assess whether the Eddington limit constrains the upper stellar mass limit. We also consider the interplay between mass and age for the wind properties and spectral morphology of VMS, with reference to the recently modified classification scheme for O2-3.5If*/WN stars. Finally, the death of VMS in the local universe is considered in the context of pair instability supernovae.Comment: 6 pages, 4 figures, from "Four Decades of Massive Star Research" (Quebec, Jul 2011), ASP Conf Ser, in press (L. Drissen, C. Robert, N. St-Louis, A.F.J. Moffat, eds.

    Practical Training and the Audit Expectations Gap:The Case of Accounting Undergraduates of Universiti Utara Malaysia

    Get PDF
    The accounting profession has long faced the issue of an audit expectations gap; being the gap between the quality of the profession’s performance, its objectives and results, and that which the society expects. The profession believes that the gap could be reduced over time through education. Studies have been carried out overseas and in Malaysia to determine the effect of education in narrowing the audit expectations gap. Extending the knowledge acquired, this paper investigates whether academic internship programs could reduce the audit expectations gap in Malaysia. Using a pre-post method, the research instrument adapted from Ferguson et al. (2000) is administered to the Universiti Utara Malaysia’s accounting students at the beginning and end of their internship program. The results show there is a significant change in perceptions among students after the internship program. However, changes in perceptions do not warrant an internship program as a means of reducing the audit expectations gap as misperceptions are still found among respondents on issues of auditing after the completion of the internship program. Nevertheless, an internship program can still be used to complement audit education in a university as it is an ideal way to expose students to professional issues and enables them to have a better insight of the actual performance and duties of auditors

    A modified kohonen self-organizing map (KSOM) clustering for four categorical data

    Get PDF
    The Kohonen Self-Organizing Map (KSOM) is one of the Neural Network unsupervised learning algorithms. This algorithm is used in solving problems in various areas, especially in clustering complex data sets. Despite its advantages, the KSOM algorithm has a few drawbacks; such as overlapped cluster and non-linear separable problems. Therefore, this paper proposes a modified KSOM that inspired from pheromone approach in Ant Colony Optimization. The modification is focusing on the distance calculation amongst objects. The proposed algorithm has been tested on four real categorical data that are obtained from UCI machine learning repository; Iris, Seeds, Glass and Wisconsin Breast Cancer Database. From the results, it shows that the modified KSOM has produced accurate clustering result and all clusters can clearly be identified

    Traffic sign detection based on simple XOR and discriminative features

    Get PDF
    Traffic Sign Detection (TSD) is an important application in computer vision. It plays a crucial role in driver assistance systems, and provides drivers with safety and precaution information. In this paper, in addition to detecting Traffic Signs (TSs), the proposed technique also recognizes the shape of the TS. The proposed technique consist of two stages. The first stage is an image segmentation technique that is based on Learning Vector Quantization (LVQ), which divides the image into six different color regions. The second stage is based on discriminative features (area, color, and aspect ratio) and the exclusive OR logical operator (XOR). The output is the location and shape of the TS. The proposed technique is applied on the German Traffic Sign Detection Benchmark (GTSDB), and achieves overall detection and shape matching of around 97% and 100% respectively. The testing speed is around 0.8 seconds per image on a mainstream PC, and the technique is coded using the Matlab toolbox

    Modeling And Simulation Of Micro-Manipulator Robotic System For Neurosurgery.

    Get PDF
    This research focuses on modeling and control simulation of a micro-manipulator robotic system model for neurosurgery application

    Bauran Kebijakan Moneter dan Makroprudensial Bank Indonesia Semenjak Maret 2011 Hingga Maret 2012

    Full text link
    : Monetary Policy and Macroprudential of Bank Indonesia 2011-2012. Indonesia economic growth since February 2011 until the fourth quarter of 2011 was 6.5%. Throughout the year of 2011, CPI inflation has declined from 6.65 % in March to 4.15% in December. Investment increased in early 2012 in line with the development of infrastructure, reduction in the BI rate thus providing a favorable climate and positive perceptions for investors. In the first two quarters of 2011, export exceeded import, but in the fourth quarter of 2011, there was a deficit in the balance of payment as import increased. In early 2011, Indonesia foreign exchange reserve amounted to US 99.6billion,whichincreasedinAugusttoUS99.6 billion, which increased in August to US 124.6 billion. At the end of January 2012 the foreign exchange reserves increased by $US 112 billion. Performance of financial market and banking was fairly steady in February 2011 further demonstrated by the CAR above 8% and gross NPL below 8%, while credit growth of 24.6% of this state wake up to early 2012

    Mapping Process of Digital Forensic Investigation Framework

    Get PDF
    Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic investigation to be performed successfully, there are a number of important steps that have to be taken into consideration. The aim of this paper is to produce the mapping process between the processes/activities and output for each phase in Digital Forensic Investigation Framework (DFIF). Existing digital forensic frameworks will be reviewed and then the mapping is constructed. The result from the mapping process will provide a new framework to optimize the whole investigation process

    Implementation of Identity Based Encryption in e-Voting System

    Get PDF
    This paper explains about the design and implementation of Identity Based Encryption (IBE) in web-based Voting application. IBE is a completely new approach to the problem of encryption which was found on the traditional Public Key Infrastructure. It can be used on any arbitrary string as a public key, enabling data to be protected without the need for certificates and reduction of infrastructure cost due to certificates database maintenance. Protection implemented in this application is a key server that controls the mapping of identities to decryption keys where the key is only one-time pad implementation. By using the IBE technique, authentication and security can be preserved in the web-based Voting application where it provides integrity, authenticity, anonymity and confidentiality in this application
    corecore