1,494 research outputs found
Very Massive Stars and the Eddington Limit
We use contemporary evolutionary models for Very Massive Stars (VMS) to
assess whether the Eddington limit constrains the upper stellar mass limit. We
also consider the interplay between mass and age for the wind properties and
spectral morphology of VMS, with reference to the recently modified
classification scheme for O2-3.5If*/WN stars. Finally, the death of VMS in the
local universe is considered in the context of pair instability supernovae.Comment: 6 pages, 4 figures, from "Four Decades of Massive Star Research"
(Quebec, Jul 2011), ASP Conf Ser, in press (L. Drissen, C. Robert, N.
St-Louis, A.F.J. Moffat, eds.
Practical Training and the Audit Expectations Gap:The Case of Accounting Undergraduates of Universiti Utara Malaysia
The accounting profession has long faced the issue of an audit expectations gap; being the gap
between the quality of the profession’s performance, its objectives and results, and that which the
society expects. The profession believes that the gap could be reduced over time through
education. Studies have been carried out overseas and in Malaysia to determine the effect of
education in narrowing the audit expectations gap. Extending the knowledge acquired, this paper
investigates whether academic internship programs could reduce the audit expectations gap in
Malaysia. Using a pre-post method, the research instrument adapted from Ferguson et al. (2000)
is administered to the Universiti Utara Malaysia’s accounting students at the beginning and end
of their internship program. The results show there is a significant change in perceptions among
students after the internship program. However, changes in perceptions do not warrant an
internship program as a means of reducing the audit expectations gap as misperceptions are still
found among respondents on issues of auditing after the completion of the internship program.
Nevertheless, an internship program can still be used to complement audit education in a
university as it is an ideal way to expose students to professional issues and enables them to have
a better insight of the actual performance and duties of auditors
A modified kohonen self-organizing map (KSOM) clustering for four categorical data
The Kohonen Self-Organizing Map (KSOM) is one of the Neural Network unsupervised learning algorithms. This algorithm is used in solving problems in various areas, especially in clustering complex data sets. Despite its advantages, the KSOM algorithm has a few drawbacks; such as overlapped cluster and non-linear separable problems. Therefore, this paper proposes a modified KSOM that inspired from pheromone approach in Ant Colony Optimization. The modification is focusing on the distance calculation amongst objects. The proposed algorithm has been tested on four real categorical data that are obtained from UCI machine learning repository; Iris, Seeds, Glass and Wisconsin Breast Cancer Database. From the results, it shows that the modified KSOM has produced accurate clustering result and all clusters can clearly be identified
Traffic sign detection based on simple XOR and discriminative features
Traffic Sign Detection (TSD) is an important application in computer vision. It plays a crucial role in driver assistance systems, and provides drivers with safety and precaution information. In this paper, in addition to detecting Traffic Signs (TSs), the proposed technique also recognizes the shape of the TS. The proposed technique consist of two stages. The first stage is an image segmentation technique that is based on Learning Vector Quantization (LVQ), which divides the image into six different color regions. The second stage is based on discriminative features (area, color, and aspect ratio) and the exclusive OR logical operator (XOR). The output is the location and shape of the TS. The proposed technique is applied on the German Traffic Sign Detection Benchmark (GTSDB), and achieves overall detection and shape matching of around 97% and 100% respectively. The testing speed is around 0.8 seconds per image on a mainstream PC, and the technique is coded using the Matlab toolbox
Modeling And Simulation Of Micro-Manipulator Robotic System For Neurosurgery.
This research focuses on modeling and control simulation of a micro-manipulator robotic system model for neurosurgery application
Bauran Kebijakan Moneter dan Makroprudensial Bank Indonesia Semenjak Maret 2011 Hingga Maret 2012
: Monetary Policy and Macroprudential of Bank Indonesia 2011-2012. Indonesia economic growth since February 2011 until the fourth quarter of 2011 was 6.5%. Throughout the year of 2011, CPI inflation has declined from 6.65 % in March to 4.15% in December. Investment increased in early 2012 in line with the development of infrastructure, reduction in the BI rate thus providing a favorable climate and positive perceptions for investors. In the first two quarters of 2011, export exceeded import, but in the fourth quarter of 2011, there was a deficit in the balance of payment as import increased. In early 2011, Indonesia foreign exchange reserve amounted to US 124.6 billion. At the end of January 2012 the foreign exchange reserves increased by $US 112 billion. Performance of financial market and banking was fairly steady in February 2011 further demonstrated by the CAR above 8% and gross NPL below 8%, while credit growth of 24.6% of this state wake up to early 2012
Mapping Process of Digital Forensic Investigation Framework
Digital forensics is essential for the successful prosecution of
digital criminals which involve diverse digital devices such as
computer system devices, network devices, mobile devices and
storage devices. The digital forensic investigation must be
retrieved to obtain the evidence that will be accepted in the
court of law. Therefore, for digital forensic investigation to be
performed successfully, there are a number of important steps
that have to be taken into consideration. The aim of this paper
is to produce the mapping process between the
processes/activities and output for each phase in Digital
Forensic Investigation Framework (DFIF). Existing digital
forensic frameworks will be reviewed and then the mapping is
constructed. The result from the mapping process will provide a
new framework to optimize the whole investigation process
Implementation of Identity Based Encryption in e-Voting System
This paper explains about the design and
implementation of Identity Based Encryption (IBE) in
web-based Voting application. IBE is a completely
new approach to the problem of encryption which was
found on the traditional Public Key Infrastructure. It
can be used on any arbitrary string as a public key,
enabling data to be protected without the need for
certificates and reduction of infrastructure cost due to
certificates database maintenance. Protection
implemented in this application is a key server that
controls the mapping of identities to decryption keys
where the key is only one-time pad implementation. By
using the IBE technique, authentication and security
can be preserved in the web-based Voting application
where it provides integrity, authenticity, anonymity and
confidentiality in this application
- …