Abstract: The purpose of this study was to explore the
demographic differences of international tourists according to three
main factors, including the value of time, shopping behavior and
shopping motivation. The Chatuchak Weekend Market is known as
one of the biggest weekend markets in the world. Too little academic
studies had been conducted in this area of weekend market, despite its
growth and continuous development. In general, both domestic
visitors and international tourists are attracted to the perception of
cheap and bargaining prices the weekend market. However, systematic
research study can provide reliable understanding of the perception of
the visitors.
This study focused on the group of international tourists who visited
the market and aimed to provide better insights based on the
differences in their demographic factors. Findings indicated that
several differences in value of time, shopping behavior, and shopping
motivation were identified by gender, income and age. Research
implications and directions for further studies were discussed.
Abstract: This paper proposes a resonant dc link in PWM ac
chopper. This can solve the spike problems and also reduce the
switching loss. The configuration and PWM pattern of the proposed
technique are presented. The simulation results are used to confirm
the theory.
Abstract: Nowadays for algae cell ultrasonication the
longitudinal ultrasonic piezosystems are used. In this paper a
possibility of creating unique ultrasonic piezoelectric system, which
would allow reducing energy losses and concentrating this energy to
a small closed volume are proposed. The current vibrating systems
whose ultrasonic energy is concentrated inside of hollow cylinder in
which water-algae mixture is flowing. Two, three or multiply
ultrasonic composite systems to concentrate total energy into a
hollow cylinder to creating strong algae cell ultrasonication are used.
The experiments and numerical FEM analysis results using diskshaped
transducer and the first biological test results on algae cell
disruption by ultrasonication are presented as well.
Abstract: The survey and classification of the different security
attacks in structured peer-to-peer (P2P) overlay networks can be
useful to computer system designers, programmers, administrators,
and users. In this paper, we attempt to provide a taxonomy of
structured P2P overlay networks security attacks. We have specially
focused on the way these attacks can arise at each level of the
network. Moreover, we observed that most of the existing systems
such as Content Addressable Network (CAN), Chord, Pastry,
Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability
which lead to disrupt and corrupt their functioning. We hope that our
survey constitutes a good help for who-s working on this area of
research.
Abstract: This paper deals with the experimental investigations
of the in-cylinder tumble flows in an unfired internal combustion
engine with a flat piston at the engine speeds ranging from 400 to
1000 rev/min., and also with the dome and dome-cavity pistons at an
engine speed of 1000 rev/min., using particle image velocimetry.
From the two-dimensional in-cylinder flow measurements, tumble
flow analysis is carried out in the combustion space on a vertical
plane passing through cylinder axis. To analyze the tumble flows,
ensemble average velocity vectors are used and to characterize it,
tumble ratio is estimated. From the results, generally, we have found
that tumble ratio varies mainly with crank angle position. Also, at the
end of compression stroke, average turbulent kinetic energy is more
at higher engine speeds. We have also found that, at 330 crank angle
position, flat piston shows an improvement of about 85 and 23% in
tumble ratio, and about 24 and 2.5% in average turbulent kinetic
energy compared to dome and dome-cavity pistons respectively
Abstract: An experiment was conducted under controlled
conditions to study the effect of water extract of leaves, shoots and
roots of either Sisymbrium irio L. =SISIR and/or Descurainia
sophia (L.) Schur =DESSO on the germination and primary growth
of wheat. A split-split plot experiment in CRD with three
replications was used. The main plots were the type of weed: i.e.
SISIR and DESSO and the sub-plots were type of organ: i.e. leaf,
stem and root and, the sub-sub plots were concentration of the
water extract of each organ of the weeds: i.e. 0, 2, 4 and 8 % w/v.
The plant materials were cut in 2-3 cm pieces and then were
ground in a blender. The crushed materials were weighed
according to experimental protocol and the final volume was
reached to 100 ml in distilled water in dark bottles. All bottles were
put on a shaker for 24 hours. The solutions were filtered by muslin
cloth. Whatman paper, 9 cm in diameter, were put in petri dishes
and twenty seeds of wheat were put on it and 5 ml distilled water
or water extract of weeds were added to each petri dish. All petri
dishes were put in constant temperature of 15 0C incubator.
The results showed that the SISIR water extract had a greater
inhibitory effects on germination and primary growth of wheat
than those of DESSO water extract. The water extracts of the
leaves of both weeds had the greatest inhibitory effects on
germination and primary growth of wheat, compared to those of
stems and roots. Increasing the concentration of water extract of
leaves, stems and roots of both weeds up to 8 % caused the greatest
inhibitory effects to wheat and reduced the germination rate and
primary growth of it linearly.
Abstract: The paper presents a set of guidelines for analysis of industrial embedded distributed systems and introduces a mathematical model derived from these guidelines. In this study, the author examines a set of modern communication technologies that are or possibly can be used to build communication links between the subsystems of a distributed embedded system. An investigation of these guidelines results in a algorithm for analysis of specific use cases of target technologies. A goal of the paper acts as an important base for ongoing research on comparison of communication technologies. The author describes the principles of the model and presents results of the test calculations. Practical implementation of target technologies and empirical experiment data are based on a practical experience during the design and test of specific distributed systems in Latvian market.
Abstract: A new blind symbol by symbol equalizer is proposed.
The operation of the proposed equalizer is based on the geometric
properties of the two dimensional data constellation. An unsupervised
clustering technique is used to locate the clusters formed by the
received data. The symmetric properties of the clusters labels are
subsequently utilized in order to label the clusters. Following this
step, the received data are compared to clusters and decisions are
made on a symbol by symbol basis, by assigning to each data
the label of the nearest cluster. The operation of the equalizer is
investigated both in linear and nonlinear channels. The performance
of the proposed equalizer is compared to the performance of a CMAbased
blind equalizer.
Abstract: Object-oriented simulation is considered one of the most sophisticated techniques that has been widely used in planning, designing, executing and maintaining construction projects. This technique enables the modeler to focus on objects which is extremely important for thorough understanding of a system. Thus, identifying an object is an essential point of building a successful simulation model. In a maintenance process an object is a maintenance work order (MWO). This study demonstrates a maintenance simulation model for the building maintenance division of Saudi Consolidated Electric Company (SCECO) in Dammam, Saudi Arabia. The model focused on both types of maintenance processes namely: (1) preventive maintenance (PM) and (2) corrective maintenance (CM). It is apparent from the findings that object-oriented simulation is a good diagnostic and experimental tool. This is because problems, limitations, bottlenecks and so forth are easily identified. These features are very difficult to obtain when using other tools.
Abstract: Each new semiconductor technology node
brings smaller transistors and wires. Although this makes
transistors faster, wires get slower. In nano-scale regime, the
standard copper (Cu) interconnect will become a major hurdle
for FPGA interconnect due to their high resistivity and
electromigration. This paper presents the comprehensive
evaluation of mixed CNT bundle interconnects and
investigates their prospects as energy efficient and high speed
interconnect for future FPGA routing architecture. All
HSPICE simulations are carried out at operating frequency of
1GHz and it is found that mixed CNT bundle implemented in
FPGAs as interconnect can potentially provide a substantial
delay and energy reduction over traditional interconnects at
32nm process technology.
Abstract: The aim of this paper is to introduce and study a new concept of strong double χ2 (M,A, Δ) of fuzzy numbers and also some properties of the resulting sequence spaces of fuzzy numbers were examined.
Abstract: In this study, cometabolic biodegradation of
chloroform was experimented with mixed cultures in the presence of
various organic solvents like methanol, ethanol, isopropanol, acetone,
acetonitrile and toluene as these are predominant discharges in
pharmaceutical industries. Toluene and acetone showed higher
specific chloroform degradation rate when compared to other
compounds. Cometabolic degradation of chloroform was further
confirmed by observation of free chloride ions in the medium. An
extended Haldane model, incorporating the inhibition due to
chloroform and the competitive inhibition between primary
substrates, was developed to predict the biodegradation of primary
substrates, cometabolic degradation of chloroform and the biomass
growth. The proposed model is based on the use of biokinetic
parameters obtained from single substrate degradation studies. The
model was able to satisfactorily predict the experimental results of
ternary and quaternary mixtures. The proposed model can be used for
predicting the performance of bioreactors treating discharges from
pharmaceutical industries.
Abstract: In this paper a real-time trajectory generation algorithm for computing 2-D optimal paths for autonomous aerial vehicles has been discussed. A dynamic programming approach is adopted to compute k-best paths by minimizing a cost function. Collision detection is implemented to detect intersection of the paths with obstacles. Our contribution is a novel approach to the problem of trajectory generation that is computationally efficient and offers considerable gain over existing techniques.
Abstract: In cryptography, confusion and diffusion are very
important to get confidentiality and privacy of message in block
ciphers and stream ciphers. There are two types of network to provide
confusion and diffusion properties of message in block ciphers. They
are Substitution- Permutation network (S-P network), and Feistel
network. NLFS (Non-Linear feedback stream cipher) is a fast and
secure stream cipher for software application. NLFS have two modes
basic mode that is synchronous mode and self synchronous mode.
Real random numbers are non-deterministic. R-box (random box)
based on the dynamic properties and it performs the stochastic
transformation of data that can be used effectively meet the
challenges of information is protected from international destructive
impacts. In this paper, a new implementation of stochastic
transformation will be proposed.
Abstract: A spatial analysis of a large 20th century urban settlement (town/city) easily presents the celebrated central Business District (CBD). Theories of Urban Land Economics have easily justified and attempted to explain the existence of such a district activity area within the cityscape. This work examines the gradual emergence and development of the CBD in Lafia Town, Nigeria over 20 years and the attended urban problems caused by its emergence. Personal knowledge and observation of land use change are the main sources of data for the work, with unstructured interview with residents. The result are that the absence of a co-ordinate land use plan for the town, multi-nuclei nature, and regional location of surrounding towns have affected the growth pattern, hence the CBD. Traffic congestion, dispersed CBD land uses are some of the urban planning problems. The work concludes by advocating for integrating CBD uses.
Abstract: The work presented in this study is related to an
energy system analysis based on passive cooling system for
dwellings. It consists to solar chimney energy performances
determination versus geometrical and environmental considerations
as the size and inlet width conditions of the chimney. Adrar site
located in the southern region of Algeria is chosen for this study
according to ambient temperature and solar irradiance technical data
availability. Obtained results are related to the glazing temperature
distributions, the chimney air flow and internal wall temperatures.
The air room change per hour (ACH) parameter, the outlet air
velocity and mass air flow rate are also determined. It is shown that
the chimney width has a significant effect on energy performances
compared to its entry size. A good agreement is observed between
these results and those obtained by others from the literature.
Abstract: The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting.
Abstract: We developed a new method based on quasimolecular
modeling to simulate the cavity flow in three cavity
shapes: rectangular, half-circular and bucket beer in cgs units. Each
quasi-molecule was a group of particles that interacted in a fashion
entirely analogous to classical Newtonian molecular interactions.
When a cavity flow was simulated, the instantaneous velocity vector
fields were obtained by using an inverse distance weighted
interpolation method. In all three cavity shapes, fluid motion was
rotated counter-clockwise. The velocity vector fields of the three
cavity shapes showed a primary vortex located near the upstream
corners at time t ~ 0.500 s, t ~ 0.450 s and t ~ 0.350 s, respectively.
The configurational kinetic energy of the cavities increased as time
increased until the kinetic energy reached a maximum at time t ~
0.02 s and, then, the kinetic energy decreased as time increased. The
rectangular cavity system showed the lowest kinetic energy, while
the half-circular cavity system showed the highest kinetic energy.
The kinetic energy of rectangular, beer bucket and half-circular
cavities fluctuated about stable average values 35.62 x 103, 38.04 x
103 and 40.80 x 103 ergs/particle, respectively. This indicated that the
half-circular shapes were the most suitable shape for a shrimp pond
because the water in shrimp pond flows best when we compared with
rectangular and beer bucket shape.
Abstract: For the past couple of decades Weak signal detection
is of crucial importance in various engineering and scientific
applications. It finds its application in areas like Wireless
communication, Radars, Aerospace engineering, Control systems and
many of those. Usually weak signal detection requires phase sensitive
detector and demodulation module to detect and analyze the signal.
This article gives you a preamble to intrusion detection system which
can effectively detect a weak signal from a multiplexed signal. By
carefully inspecting and analyzing the respective signal, this
system can successfully indicate any peripheral intrusion. Intrusion
detection system (IDS) is a comprehensive and easy approach
towards detecting and analyzing any signal that is weakened and
garbled due to low signal to noise ratio (SNR). This approach
finds significant importance in applications like peripheral security
systems.
Abstract: Due to the fact that in the new century customers tend
to express globally increasing demands, networks of interconnected
businesses have been established in societies and the management of
such networks seems to be a major key through gaining competitive
advantages. Supply chain management encompasses such managerial
activities. Within a supply chain, a critical role is played by quality.
QFD is a widely-utilized tool which serves the purpose of not only
bringing quality to the ultimate provision of products or service
packages required by the end customer or the retailer, but it can also
initiate us into a satisfactory relationship with our initial customer;
that is the wholesaler. However, the wholesalers- cooperation is
considerably based on the capabilities that are heavily dependent on
their locations and existing circumstances. Therefore, it is undeniable
that for all companies each wholesaler possesses a specific
importance ratio which can heavily influence the figures calculated in
the House of Quality in QFD. Moreover, due to the competitiveness
of the marketplace today, it-s been widely recognized that
consumers- expression of demands has been highly volatile in
periods of production. Apparently, such instability and proneness to
change has been very tangibly noticed and taking it into account
during the analysis of HOQ is widely influential and doubtlessly
required. For a more reliable outcome in such matters, this article
demonstrates the application viability of Analytic Network Process
for considering the wholesalers- reputation and simultaneously
introduces a mortality coefficient for the reliability and stability of
the consumers- expressed demands in course of time. Following to
this, the paper provides further elaboration on the relevant
contributory factors and approaches through the calculation of such
coefficients. In the end, the article concludes that an empirical
application is needed to achieve broader validity.