Abstract: Recently, Northeast Asia has become one of the three
largest trade areas, covering approximately 30% of the total trade
volume of the world. However, the distribution facilities are saturated
due to the increase in the transportation volume within the area and
with the European countries. In order to accommodate the increase of
the transportation volume, the transportation networking with the
major countries in Northeast Asia and Europe is absolutely necessary.
The Eurasian Logistics Network will develop into an international
passenger transportation network covering the Northeast Asian region
and an international freight transportation network connecting across
Eurasia Continent. This paper surveys the changes and trend of the
distribution network in the Eurasian Region according to the political,
economic and environmental changes of the region, analyses the
distribution network according to the changes in the transportation
policies of the related countries, and provides the direction of the
development of composite transportation on the basis of the present
conditions of transportation means. The transportation means optimal
for the efficiency of transportation system are suggested to be train
ferries, sea & rail or sea & rail & sea. It is suggested to develop
diversified composite transportation means and routes within the
boundary of international cooperation system.
Abstract: The notion of intuitionistic fuzzy sets was introduced
by Atanassov as a generalization of the notion of fuzzy sets. Y.B. Jun
and S.Z. Song introduced the notion of intuitionistic fuzzy points.
In this paper we find some relations between the intuitionistic fuzzy
ideals of a semigroup S and the set of all intuitionistic fuzzy points
of S.
Abstract: RFID tag is a small and inexpensive microchip which is
capable of transmitting unique identifier through wireless network in a
short distance. If a group of RFID tags can be scanned simultaneously
by one reader, RFID Group proof could be generated. Group proof can
be used in various applications, such as good management which is
usually achieved using barcode system. A lot of RFID group proof
schemes have been proposed by many researchers. In this paper, we
introduce some existing group proof schemes and then analyze their
vulnerabilities to the privacy. Moreover, we propose a new attack
model, which threats the privacy of user by tracking tags in a group.
Abstract: Stream Control Transmission Protocol (SCTP) has been
proposed to provide reliable transport of real-time communications.
Due to its attractive features, such as multi-streaming and multihoming,
the SCTP is often expected to be an alternative protocol
for TCP and UDP. In the original SCTP standard, the secondary path
is mainly regarded as a redundancy. Recently, most of researches
have focused on extending the SCTP to enable a host to send its
packets to a destination over multiple paths simultaneously. In order
to transfer packets concurrently over the multiple paths, the SCTP
should be well designed to avoid unnecessary fast retransmission
and the mis-estimation of congestion window size through the paths.
Therefore, we propose an Enhanced Cooperative ACK SCTP (ECASCTP)
to improve the path recovery efficiency of multi-homed host
which is under concurrent multiple transfer mode. We evaluated the
performance of our proposed scheme using ns-2 simulation in terms
of cwnd variation, path recovery time, and goodput. Our scheme
provides better performance in lossy and path asymmetric networks.
Abstract: Blind signatures enable users to obtain valid signatures for a message without revealing its content to the signer. This paper presents a new blind signature scheme, i.e. identity-based blind signature scheme with message recovery. Due to the message recovery property, the new scheme requires less bandwidth than the identitybased blind signatures with similar constructions. The scheme is based on modified Weil/Tate pairings over elliptic curves, and thus requires smaller key sizes for the same level of security compared to previous approaches not utilizing bilinear pairings. Security and efficiency analysis for the scheme is provided in this paper.
Abstract: This paper presents the result of three senior capstone
projects at the Department of Computer Engineering, Prince of
Songkla University, Thailand. These projects focus on developing an
examination management system for the Faculty of Engineering in
order to manage the examination both the examination room
assignments and the examination proctor assignments in each room.
The current version of the software is a web-based application. The
developed software allows the examination proctors to select their
scheduled time online while each subject is assigned to each available
examination room according to its type and the room capacity. The
developed system is evaluated using real data by prospective users of
the system. Several suggestions for further improvements are given
by the testers. Even though the features of the developed software are
not superior, the developing process can be a case study for a projectbased
teaching style. Furthermore, the process of developing this
software can show several issues in developing an educational
support application.
Abstract: Two novel hydrodesulfurization (HDS) catalysts:
FeN4/C and FeN2/C, were prepared using an impregnation-pyrolysis
method. The two materials were investigated as catalysts for
hydrodesulfurization (HDS) and hydrodearomitization (HDA) of
model compounds. The turnover frequency of the two FeN catalysts
is comparable to (FeN4/C) or even higher (FeN2/C) than that of
MoNi/Al2O3. The FeN4/C catalyst also exhibited catalytic activity
toward HDA.
Abstract: Region covariance (RC) descriptor is an effective
and efficient feature for visual tracking. Current RC-based tracking
algorithms use the whole RC matrix to track the target in video
directly. However, there exist some issues for these whole RCbased
algorithms. If some features are contaminated, the whole RC
will become unreliable, which results in lost object-tracking. In
addition, if some features are very discriminative to the
background, other features are still processed and thus reduce the
efficiency. In this paper a new robust tracking method is proposed,
in which the whole RC matrix is decomposed into several low rank
matrices. Those matrices are dynamically chosen and processed so
as to achieve a good tradeoff between discriminability and
complexity. Experimental results have shown that our method is
more robust to complex environment changes, especially either
when occlusion happens or when the background is similar to the
target compared to other RC-based methods.
Abstract: As the remedy used music becomes active and
meditation effect through the music is verified, people take a growing
interest about psychological balance or remedy given by music. From
traditional studies, it is verified that the music of which spectral
envelop varies approximately as 1/f (f is frequency) down to a
frequency of low frequency bandwidth gives psychological balance.
In this paper, we researched signal properties of music which gives
psychological balance. In order to find this, we derived the property
from voice. Music composed by voice shows large value in NCSD.
We confirmed the degree of deference between music by curvature of
normalized cumulative spectral distribution. In the music that gives
psychological balance, the curvature shows high value, otherwise, the
curvature shows low value.
Abstract: Firstly, research and development on RFID focuses on
manufacturing and retail sectors, because it can improve supply chain
efficiency. But, now a variety of field is considered the next research
area for Radio Frequency Identification (RFID). Although RFID is
infancy, RFID technology has great potential in power industry to
significantly reduce cost, and improve quality of power supply. To
complement the limitation of RFID, we adopt the WSN (Wireless
Sensor Network) technology. However, relevant experience is limited,
the challenge will be to derive requirement from business practice and
to determine whether it is possible or not. To explore this issue, we
conduct a case study on implementing power facility management
system using RFID/WSN in Korea Electric Power Corporation
(KEPCO). In this paper we describe requirement from power industry.
And we introduce design and implementation of the test bed.
Abstract: Since the pioneering work of Zadeh, fuzzy set theory has been applied to a myriad of areas. Song and Chissom introduced the concept of fuzzy time series and applied some methods to the enrollments of the University of Alabama. In recent years, a number of techniques have been proposed for forecasting based on fuzzy set theory methods. These methods have either used enrollment numbers or differences of enrollments as the universe of discourse. We propose using the year to year percentage change as the universe of discourse. In this communication, the approach of Jilani, Burney, and Ardil is modified by using the year to year percentage change as the universe of discourse. We use enrollment figures for the University of Alabama to illustrate our proposed method. The proposed method results in better forecasting accuracy than existing models.
Abstract: In this paper, we propose a novel metal oxide
semiconductor field effect transistor with L-shaped channel structure
(LMOS), and several type of L-shaped structures are also designed,
studied and compared with the conventional MOSFET device for the
same average gate length (Lavg). The proposed device electrical
characteristics are analyzed and evaluated by three dimension (3-D)
ISE-TCAD simulator. It can be confirmed that the LMOS devices
have higher on-state drain current and both lower drain-induced
barrier lowering (DIBL) and subthreshold swing (S.S.) than its
conventional counterpart has. In addition, the transconductance and
voltage gain properties of the LMOS are also improved.
Abstract: Ranong province has the best kaolin, and it is the most
useful of all the clay types used in ceramic making. Until recently,
there has been only one community business making ceramics in
Ranong province. And this business could not build the mix of body
and glaze from their raw material without assistance. Considering
these problems, this research is aimed to test the composition of
ceramic body and glaze which suit. Kaolin from Ranong is the raw
material which these search focuses on. All other raw materials use in
the investigation will come from southern Thailand, kaolin and
limestone from Ranong province, ball clay from Surat Thani
province, white sand from Songkhla province, and feldspar from
Nakhon Si Thammarat province. Results can be used to develop the
efficiency of industrial production which in return will enhance the
business process.
Abstract: The study of the Andaman Sea can be studied by
using the oceanic model; therefore the grid covering the study area
should be generated. This research aims to generate grid covering
the Andaman Sea, situated between longitudes 90◦E to 101◦E and
latitudes 1◦N to 18◦N. A horizontal grid is an orthogonal curvilinear
with 87 × 217 grid points. The methods used in this study are
cubic spline and bilinear interpolations. The boundary grid points
are generated by spline interpolation while the interior grid points
have to be specified by bilinear interpolation method. A vertical grid
is sigma coordinate with 15 layers of water column.
Abstract: Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. The proposed protocol in this paper makes use of bilinear pairings over elliptic curves, as well as the Diffie-Hellman key exchange protocol. Besides the security properties shared with previous authentication protocols, the proposed protocol provides the same level of security with smaller public key sizes.
Abstract: RFID (Radio Frequency IDentification) system has
been widely used in our life, such as transport systems, passports,
automotive, animal tracking, human implants, library, and so on.
However, the RFID authentication protocols between RF (Radio
Frequency) tags and the RF readers have been bring about various
privacy problems that anonymity of the tags, tracking, eavesdropping,
and so on. Many researchers have proposed the solution of the
problems. However, they still have the problem, such as location
privacy, mutual authentication. In this paper, we show the problems of
the previous protocols, and then we propose a more secure and
efficient RFID authentication protocol.
Abstract: The purpose of this study was to analyze the correlation
between permitted building areas and housing distribution ratios and
their fluctuation, and test a distribution model during 3 successive governments in 5 cities including Bucheon in reference to the time
series administrative data, and thereby, interpret the results of the analysis in association with the policies pursued by the successive
governments to examine the structural fluctuation of permitted building areas and housing distribution ratios.
In order to analyze the fluctuation of permitted building areas and
housing distribution ratios during 3 successive governments and
examine the cycles of the time series data, the spectral analysis was performed, and in order to analyze the correlation between permitted
building areas and housing distribution ratios, the tabulation was performed to describe the correlations statistically, and in order to
explain about differences of fluctuation distribution of permitted building areas and housing distribution ratios among 3 governments,
the goodness of fit test was conducted.
Abstract: This paper aims to develop an algorithm of finite
capacity material requirement planning (FCMRP) system for a multistage
assembly flow shop. The developed FCMRP system has two
main stages. The first stage is to allocate operations to the first and
second priority work centers and also determine the sequence of the
operations on each work center. The second stage is to determine the
optimal start time of each operation by using a linear programming
model. Real data from a factory is used to analyze and evaluate the
effectiveness of the proposed FCMRP system and also to guarantee a
practical solution to the user. There are five performance measures,
namely, the total tardiness, the number of tardy orders, the total
earliness, the number of early orders, and the average flow-time. The
proposed FCMRP system offers an adjustable solution which is a
compromised solution among the conflicting performance measures.
The user can adjust the weight of each performance measure to
obtain the desired performance. The result shows that the combination
of FCMRP NP3 and EDD outperforms other combinations
in term of overall performance index. The calculation time for the
proposed FCMRP system is about 10 minutes which is practical for
the planners of the factory.
Abstract: This paper describes a method to measure and
compensate a 4 axes ultra-precision machine tool that generates micro
patterns on the large surfaces. The grooving machine is usually used
for making a micro mold for many electrical parts such as a light guide
plate for LCD and fuel cells. The ultra precision machine tool has three
linear axes and one rotational table. Shaping is usually used to
generate micro patterns. In the case of 50 μm pitch and 25 μm height
pyramid pattern machining with a 90° wedge angle bite, one of linear
axis is used for long stroke motion for high cutting speed and other
linear axis are used for feeding. The triangular patterns can be
generated with many times of long stroke of one axis. Then 90°
rotation of work piece is needed to make pyramid patterns with
superposition of machined two triangular patterns.
To make a two dimensional positioning error, straightness of two
axes in out of plane, squareness between the each axis are important.
Positioning errors, straightness and squarness were measured by laser
interferometer system. Those were compensated and confirmed by
ISO230-6. One of difficult problem to measure the error motions is
squareness or parallelism of axis between the rotational table and
linear axis. It was investigated by simultaneous moving of rotary table
and XY axes. This compensation method is introduced in this paper.
Abstract: Corner detection and optical flow are common techniques for feature-based video stabilization. However, these algorithms are computationally expensive and should be performed at a reasonable rate. This paper presents an algorithm for discarding irrelevant feature points and maintaining them for future use so as to improve the computational cost. The algorithm starts by initializing a maintained set. The feature points in the maintained set are examined against its accuracy for modeling. Corner detection is required only when the feature points are insufficiently accurate for future modeling. Then, optical flows are computed from the maintained feature points toward the consecutive frame. After that, a motion model is estimated based on the simplified affine motion model and least square method, with outliers belonging to moving objects presented. Studentized residuals are used to eliminate such outliers. The model estimation and elimination processes repeat until no more outliers are identified. Finally, the entire algorithm repeats along the video sequence with the points remaining from the previous iteration used as the maintained set. As a practical application, an efficient video stabilization can be achieved by exploiting the computed motion models. Our study shows that the number of times corner detection needs to perform is greatly reduced, thus significantly improving the computational cost. Moreover, optical flow vectors are computed for only the maintained feature points, not for outliers, thus also reducing the computational cost. In addition, the feature points after reduction can sufficiently be used for background objects tracking as demonstrated in the simple video stabilizer based on our proposed algorithm.