Abstract: The effects of irrigation with dairy factory wastewater
on soil properties were investigated at two sites that had received
irrigation for > 60 years. Two adjoining paired sites that had never
received DFE were also sampled as well as another seven fields from
a wider area around the factory. In comparison with paired sites that
had not received effluent, long-term wastewater irrigation resulted in
an increase in pH, EC, extractable P, exchangeable Na and K and
ESP. These changes were related to the use of phosphoric acid,
NaOH and KOH as cleaning agents in the factory. Soil organic C
content was unaffected by DFE irrigation but the size (microbial
biomass C and N) and activity (basal respiration) of the soil
microbial community were increased. These increases were
attributed to regular inputs of soluble C (e.g. lactose) present as milk
residues in the wastewater. Principal component analysis (PCA) of
the soils data from all 11sites confirmed that the main effects of DFE
irrigation were an increase in exchangeable Na, extractable P and
microbial biomass C, an accumulation of soluble salts and a liming
effect. PCA analysis of soil bacterial community structure, using
PCR-DGGE of 16S rDNA fragments, generally separated individual
sites from one another but did not group them according to irrigation
history. Thus, whilst the size and activity of the soil microbial
community were increased, the structure and diversity of the
bacterial community remained unaffected.
Abstract: We present an Electronic Nose (ENose), which is
aimed at identifying the presence of one out of two gases, possibly
detecting the presence of a mixture of the two. Estimation of the
concentrations of the components is also performed for a volatile
organic compound (VOC) constituted by methanol and acetone, for
the ranges 40-400 and 22-220 ppm (parts-per-million), respectively.
Our system contains 8 sensors, 5 of them being gas sensors (of the
class TGS from FIGARO USA, INC., whose sensing element is a tin
dioxide (SnO2) semiconductor), the remaining being a temperature
sensor (LM35 from National Semiconductor Corporation), a
humidity sensor (HIH–3610 from Honeywell), and a pressure sensor
(XFAM from Fujikura Ltd.).
Our integrated hardware–software system uses some machine
learning principles and least square regression principle to identify at
first a new gas sample, or a mixture, and then to estimate the
concentrations. In particular we adopt a training model using the
Support Vector Machine (SVM) approach with linear kernel to teach
the system how discriminate among different gases. Then we apply
another training model using the least square regression, to predict
the concentrations.
The experimental results demonstrate that the proposed
multiclassification and regression scheme is effective in the
identification of the tested VOCs of methanol and acetone with
96.61% correctness. The concentration prediction is obtained with
0.979 and 0.964 correlation coefficient for the predicted versus real
concentrations of methanol and acetone, respectively.
Abstract: The development incompatible with environment cannot be sustainable. Using renewable energy sources such as solar energy, geothermal energy and wind energy can make sustainable development in a region. Iran has a lot of renewable and nonrenewable energy resources. Since Iran has a special geographic position, it has lot of solar and wind energy resources. Both solar and wind energy are free, renewable and adaptable with environment. The study of 10 year wind data in Iranian South coastal and Islands synoptic stations shows that the production of wind power electricity and water pumping is possible in this region. In this research, we studied the local and temporal distribution of wind using three – hour statistics of windspeed in Iranian South coastal and Islands synoptic stations. This research shows that the production of wind power electricity is possible in this region all the year.
Abstract: The purpose of this paper is to analyze determinants of
information security affecting adoption of the Web-based integrated
information systems (IIS). We introduced Web-based information
systems which are designed to formulate strategic plans for Peruvian
government. Theoretical model is proposed to test impact of
organizational factors (deterrent efforts and severity; preventive
efforts) and individual factors (information security threat; security
awareness) on intentions to proactively use the Web-based IIS .Our
empirical study results highlight that deterrent efforts and deterrent
severity have no significant influence on the proactive use intentions
of IIS, whereas, preventive efforts play an important role in proactive
use intentions of IIS. Thus, we suggest that organizations need to do
preventive efforts by introducing various information security
solutions, and try to improve information security awareness while
reducing the perceived information security threats.
Abstract: In this paper the effects of top management commitment on knowledge management activities has been analyzed. This research has been conducted as a case study in an academic environment. The data collection was carried out in the form of semi-structured interview with an interview guide. This study shows the effects of knowledge management strategic plan developing in academia strategic plan on knowledge management success. This paper shows the importance top management commitment factors including strategic plan, communication, and training on knowledge management success in academia. In particular the most important role of Strategic planning in knowledge management success is clarified. This study explores one of the necessary organizational infrastructures of successful implementation of knowledge management. The idea of this research could be applied in the other context especially in the industrial organizations.
Abstract: The advent of modern technology shadows its impetus repercussions on successful Legacy systems making them obsolete with time. These systems have evolved the large organizations in major problems in terms of new business requirements, response time, financial depreciation and maintenance. Major difficulty is due to constant system evolution and incomplete, inconsistent and obsolete documents which a legacy system tends to have. The myriad dimensions of these systems can only be explored by incorporating reverse engineering, in this context, is the best method to extract useful artifacts and by exploring these artifacts for reengineering existing legacy systems to meet new requirements of organizations. A case study is conducted on six different type of software systems having source code in different programming languages using the architectural recovery framework.
Abstract: In this paper, a solution is presented for a robotic
manipulation problem in industrial settings. The problem is sensing
objects on a conveyor belt, identifying the target, planning and
tracking an interception trajectory between end effector and the
target. Such a problem could be formulated as combining object
recognition, tracking and interception. For this purpose, we integrated
a vision system to the manipulation system and employed tracking
algorithms. The control approach is implemented on a real industrial
manipulation setting, which consists of a conveyor belt, objects
moving on it, a robotic manipulator, and a visual sensor above the
conveyor. The trjectory for robotic interception at a rendezvous point
on the conveyor belt is analytically calculated. Test results show that
tracking the raget along this trajectory results in interception and
grabbing of the target object.
Abstract: Recently, a great number of theoretical frameworks
have been proposed to develop the linkages between knowledge
management (KM) and organizational strategies. However, while
there has been much theorizing and case study in the area, validated
research models integrating KM and information technology
strategies for empirical testing of these theories have been scarce. In
this research, we try to develop a research model for explaining the
relationship between KM strategy and IT strategy and their effects on
performance. Finally, meaningful propositions and conclusions are
derived, and suggestions for future research are proposed and
discussed.
Abstract: This paper presents the stabilization potential of Class
F pond ash (PA) from a coal fired thermal power station on tropical
peat soil. Peat or highly organic soils are well known for their high
compressibility, natural moisture content, low shear strength and
long-term settlement. This study investigates the effect of different
amount (i.e., 5, 10, 15 and 20%) of PA on peat soil, collected from
Sarawak, Malaysia, mainly compaction and unconfined compressive
strength (UCS) properties. The amounts of PA added to the peat soil
sample as percentage of the dry peat soil mass. With the increase in
PA content, the maximum dry density (MDD) of peat soil increases,
while the optimum moisture content (OMC) decreases. The UCS
value of the peat soils increases significantly with the increase of PA
content and also with curing periods. This improvement on
compressive strength of tropical peat soils indicates that PA has the
potential to be used as a stabilizer for tropical peat soil. Also, the use
of PA in soil stabilization helps in reducing the pond volume and
achieving environment friendly as well as a sustainable development
of natural resources.
Abstract: The paper is included within the framework of a
complex research program, which was initiated from the hypothesis
arguing on the existence of a correlation between pineal indolic and
peptide hormones and the somatic development rhythm, including
thus the epithalamium-epiphysis complex involvement. At birds,
pineal gland contains a circadian oscillator, playing a main role in the
temporal organization of the cerebral functions. The secretion of
pineal indolic hormones is characterized by a high endogenous
rhythmic alternation, modulated by the light/darkness (L/D)
succession and by temperature as well. The research has been carried
out using 100 chicken broilers - “Ross" commercial hybrid,
randomly allocated in two experimental batches: Lc batch, reared
under a 12L/12D lighting schedule and Lexp batch, which was photic
pinealectomised through continuous exposition to light (150 lux, 24
hours, 56 days). Chemical and physical features of the meat issued
from breast fillet and thighs muscles have been studied, determining
the dry matter, proteins, fat, collagen, salt content and pH value, as
well. Besides the variations of meat chemical composition in relation
with lighting schedule, other parameters have been studied: live
weight dynamics, feed intake and somatic development degree. The
achieved results became significant since chickens have 7 days of
age, some variations of the studied parameters being registered,
revealing that the pineal gland physiologic activity, in relation with
the lighting schedule, could be interpreted through the monitoring of
the somatic development technological parameters, usually studied
within the chicken broilers rearing aviculture practice.
Abstract: Mendelian Disease Genes represent a collection of single points of failure for the various systems they constitute. Such genes have been shown, on average, to encode longer proteins than 'non-disease' proteins. Existing models suggest that this results from the increased likeli-hood of longer genes undergoing mutations. Here, we show that in saturated mutagenesis experiments performed on model organisms, where the likelihood of each gene mutating is one, a similar relationship between length and the probability of a gene being lethal was observed. We thus suggest an extended model demonstrating that the likelihood of a mutated gene to produce a severe phenotype is length-dependent. Using the occurrence of conserved domains, we bring evidence that this dependency results from a correlation between protein length and the number of functions it performs. We propose that protein length thus serves as a proxy for protein cardinality in different networks required for the organism's survival and well-being. We use this example to argue that the collection of Mendelian Disease Genes can, and should, be used to study the rules governing systems vulnerability in living organisms.
Abstract: Compaction testing methods allow at-speed detecting
of errors while possessing low cost of implementation. Owing to this
distinctive feature, compaction methods have been widely used for
built-in testing, as well as external testing. In the latter case, the
bandwidth requirements to the automated test equipment employed
are relaxed which reduces the overall cost of testing. Concurrent
compaction testing methods use operational signals to detect
misbehavior of the device under test and do not require input test
stimuli. These methods have been employed for digital systems only.
In the present work, we extend the use of compaction methods for
concurrent testing of analog-to-digital converters. We estimate
tolerance bounds for the result of compaction and evaluate the
aliasing rate.
Abstract: Methods for organizing web data into groups in order
to analyze web-based hypertext data and facilitate data availability
are very important in terms of the number of documents available
online. Thereby, the task of clustering web-based document structures
has many applications, e.g., improving information retrieval on the
web, better understanding of user navigation behavior, improving web
users requests servicing, and increasing web information accessibility.
In this paper we investigate a new approach for clustering web-based
hypertexts on the basis of their graph structures. The hypertexts will
be represented as so called generalized trees which are more general
than usual directed rooted trees, e.g., DOM-Trees. As a important
preprocessing step we measure the structural similarity between the
generalized trees on the basis of a similarity measure d. Then,
we apply agglomerative clustering to the obtained similarity matrix
in order to create clusters of hypertext graph patterns representing
navigation structures. In the present paper we will run our approach
on a data set of hypertext structures and obtain good results in
Web Structure Mining. Furthermore we outline the application of
our approach in Web Usage Mining as future work.
Abstract: A big organization may have multiple branches spread across different locations. Processing of data from these branches becomes a huge task when innumerable transactions take place. Also, branches may be reluctant to forward their data for centralized processing but are ready to pass their association rules. Local mining may also generate a large amount of rules. Further, it is not practically possible for all local data sources to be of the same size. A model is proposed for discovering valid rules from different sized data sources where the valid rules are high weighted rules. These rules can be obtained from the high frequency rules generated from each of the data sources. A data source selection procedure is considered in order to efficiently synthesize rules. Support Equalization is another method proposed which focuses on eliminating low frequency rules at the local sites itself thus reducing the rules by a significant amount.
Abstract: Bursa, since the establishment of the Ottoman Empire,
being on the important trade roads and having a capital accumulation
as a result of silk production, was one of the first cities of
modernization activities applied. Bursa maintained its importance
even during the Republican Period and became one of the most
important cities of the country and today is the fourth biggest and the
industrialized city in Turkey. Social, political, economical and
cultural changes occured with the reforms starting with the 1839
Edict of Tanzimat that aimed at modernizing the society and the
government and centralizing the political power began in the
Ottoman Empire. After the Tanzimat Reforms transformation of the
city changed and planning processes began in Bursa according to the
vision of Governors. The theresholds of the city are very important
data for a sustainable planning for the city planners. Main aim of this
study is to investigate the changes and transformations of the city
according to the changes in the socio-economical and cultural
properties for the city planners.
Abstract: The iris recognition technology is the most accurate,
fast and less invasive one compared to other biometric techniques
using for example fingerprints, face, retina, hand geometry, voice or
signature patterns. The system developed in this study has the
potential to play a key role in areas of high-risk security and can
enable organizations with means allowing only to the authorized
personnel a fast and secure way to gain access to such areas. The
paper aim is to perform the iris region detection and iris inner and
outer boundaries localization. The system was implemented on
windows platform using Visual C# programming language. It is easy
and efficient tool for image processing to get great performance
accuracy. In particular, the system includes two main parts. The first
is to preprocess the iris images by using Canny edge detection
methods, segments the iris region from the rest of the image and
determine the location of the iris boundaries by applying Hough
transform. The proposed system tested on 756 iris images from 60
eyes of CASIA iris database images.
Abstract: A research study was conducted with an objective to propose a collaborative business strategy of a oil and gas trading company, representing PPT Energy Trading Co., Ltd., with its shareholder, especially electricity and power supply companies for LNG Form of Coal Bed Methane in B2B Transaction. Collaborative business strategy is a strategy to collaborate with other organizations due to have future benefits in both parties, or achieve the business objective through the collaboration of business, its strategy and partners. A structured interview was established to collect the required primary data from the company. Not only interview, but also company’s business plan and annual report were collected and analyzed for the company’s current condition. As the result, this research shows a recommendation to propose a new collaborative strategy with limiting its target market, diversifying product, conducting new business model, and considering other stakeholders.
Abstract: The majority of micro-entrepreneurs in Malaysia
operate very small-scaled business activities such as food stalls,
burger stalls, night market hawkers, grocery stores, constructions,
rubber and oil palm small holders, and other agro-based services and
activities. Why are they venturing into entrepreneurship - is it for
survival, out of interest or due to encouragement and assistance from
the local government? And why is it that some micro-entrepreneurs
are lagging behind in entrepreneurship, and what do they need to
rectify this situation so that they are able to progress further?
Furthermore, what are the skills that the micro entrepreneurs should
developed to transform them into successful micro-enterprises and
become small and medium-sized enterprises (SME)? This paper
proposes a 7-Step approach that can serve as a basis for identification
of critical entrepreneurial success factors that enable policy makers,
practitioners, consultants, training managers and other agencies in
developing tools to assist micro business owners. This paper also
highlights the experience of one of the successful companies in
Malaysia that has transformed from micro-enterprise to become a
large organization in less than 10 years.
Abstract: Recent widespread use of information and
communication technology has greatly changed information security
risks that businesses and institutions encounter. Along with this
situation, in order to ensure security and have confidence in electronic
trading, it has become important for organizations to take competent
information security measures to provide international confidence that
sensitive information is secure. Against this backdrop, the approach to
information security checking has come to an important issue, which
is believed to be common to all countries. The purpose of this paper is
to introduce the new system of information security checking program
in Korea and to propose synthetic information security
countermeasures under domestic circumstances in order to protect
physical equipment, security management and technology, and the
operation of security check for securing services on ISP(Internet
Service Provider), IDC(Internet Data Center), and
e-commerce(shopping malls, etc.)
Abstract: In this paper a novel method for finding the fault zone
on a Thyristor Controlled Series Capacitor (TCSC) incorporated
transmission line is presented. The method makes use of the Support
Vector Machine (SVM), used in the classification mode to
distinguish between the zones, before or after the TCSC. The use of
Discrete Wavelet Transform is made to prepare the features which
would be given as the input to the SVM. This method was tested on a
400 kV, 50 Hz, 300 Km transmission line and the results were highly
accurate.