Abstract: The main aim of the current study was to examine the
effect of emotional intelligence on retention. The study also aimed at
analyzing the role of job involvement, as a moderator, in the effect of
emotional intelligence on retention. Using data gathered from 241
employees working with hotels and tourism corporations listed in
Amman Stock Exchange in Jordan, emotional intelligence, job
involvement and retention were measured. Hierarchical regression
analyses were used to test the three main hypotheses. Results
indicated that retention was related to emotional intelligence.
Moreover, the study yielded support for the claim that job
involvement had a moderating effect on the relationship between
emotional intelligence and retention.
Abstract: Mobile IP has been developed to provide the
continuous information network access to mobile users. In IP-based
mobile networks, location management is an important component of
mobility management. This management enables the system to track
the location of mobile node between consecutive communications. It
includes two important tasks- location update and call delivery.
Location update is associated with signaling load. Frequent updates
lead to degradation in the overall performance of the network and the
underutilization of the resources. It is, therefore, required to devise
the mechanism to minimize the update rate. Mobile IPv6 (MIPv6)
and Hierarchical MIPv6 (HMIPv6) have been the potential
candidates for deployments in mobile IP networks for mobility
management. HMIPv6 through studies has been shown with better
performance as compared to MIPv6. It reduces the signaling
overhead traffic by making registration process local. In this paper,
we present performance analysis of MIPv6 and HMIPv6 using an
analytical model. Location update cost function is formulated based
on fluid flow mobility model. The impact of cell residence time, cell
residence probability and user-s mobility is investigated. Numerical
results are obtained and presented in graphical form. It is shown that
HMIPv6 outperforms MIPv6 for high mobility users only and for low
mobility users; performance of both the schemes is almost equivalent
to each other.
Abstract: A novel PDE solver using the multidimensional wave
digital filtering (MDWDF) technique to achieve the solution of a 2D
seismic wave system is presented. In essence, the continuous physical
system served by a linear Kirchhoff circuit is transformed to an
equivalent discrete dynamic system implemented by a MD wave
digital filtering (MDWDF) circuit. This amounts to numerically
approximating the differential equations used to describe elements of a
MD passive electronic circuit by a grid-based difference equations
implemented by the so-called state quantities within the passive
MDWDF circuit. So the digital model can track the wave field on a
dense 3D grid of points. Details about how to transform the continuous
system into a desired discrete passive system are addressed. In
addition, initial and boundary conditions are properly embedded into
the MDWDF circuit in terms of state quantities. Graphic results have
clearly demonstrated some physical effects of seismic wave (P-wave
and S–wave) propagation including radiation, reflection, and
refraction from and across the hard boundaries. Comparison between
the MDWDF technique and the finite difference time domain (FDTD)
approach is also made in terms of the computational efficiency.
Abstract: Bovine viral diarrhea virus (BVDV) can cause lifelong
persistent infection. One reason for the phenomena is attributed to
BVDV infection to placenta tissue. However the mechanisms that
BVDV invades into placenta tissue remain unclear. To clarify the
molecular mechanisms, we investigated the possible means that
BVDV entered into bovine trophoblast cells (TPC). Yeast two-hybrid
system was used to identify proteins extracted from TPC, which
interact with BVDV envelope glycoprotein E2. A PGbkt7-E2 yeast
expression vector and TPC cDNA library were constructed. Through
two rounds of screening, three positive clones were identified.
Sequencing analysis indicated that all the three positive clones
encoded the same protein clathrin. Physical interaction between
clathrin and BVDV E2 protein was further confirmed by
coimmunoprecipitation experiments. This result suggested that the
clathrin might play a critical role in the process of BVDV entry into
placenta tissue and might be a novel antiviral target for preventing
BVDV infection.
Abstract: The performance of adaptive beamforming degrades
substantially in the presence of steering vector mismatches. This
degradation is especially severe in the near-field, for the
3-dimensional source location is more difficult to estimate than the
2-dimensional direction of arrival in far-field cases. As a solution, a
novel approach of near-field robust adaptive beamforming (RABF) is
proposed in this paper. It is a natural extension of the traditional
far-field RABF and belongs to the class of diagonal loading
approaches, with the loading level determined based on worst-case
performance optimization. However, different from the methods
solving the optimal loading by iteration, it suggests here a simple
closed-form solution after some approximations, and consequently,
the optimal weight vector can be expressed in a closed form. Besides
simplicity and low computational cost, the proposed approach reveals
how different factors affect the optimal loading as well as the weight
vector. Its excellent performance in the near-field is confirmed via a
number of numerical examples.
Abstract: This paper is to investigate the impplementation of security
mechanism in object oriented database system. Formal methods
plays an essential role in computer security due to its powerful expressiveness
and concise syntax and semantics. In this paper, both issues
of specification and implementation in database security environment
will be considered; and the database security is achieved through
the development of an efficient implementation of the specification
without compromising its originality and expressiveness.
Abstract: In this paper zero-dissipative explicit Runge-Kutta
method is derived for solving second-order ordinary differential
equations with periodical solutions. The phase-lag and dissipation
properties for Runge-Kutta (RK) method are also discussed. The new
method has algebraic order three with dissipation of order infinity.
The numerical results for the new method are compared with existing
method when solving the second-order differential equations with
periodic solutions using constant step size.
Abstract: Despite the recent surge of research in control of
worm propagation, currently, there is no effective defense system
against such cyber attacks. We first design a distributed detection
architecture called Detection via Distributed Blackholes (DDBH).
Our novel detection mechanism could be implemented via virtual
honeypots or honeynets. Simulation results show that a worm can be
detected with virtual honeypots on only 3% of the nodes. Moreover,
the worm is detected when less than 1.5% of the nodes are infected.
We then develop two control strategies: (1) optimal dynamic trafficblocking,
for which we determine the condition that guarantees
minimum number of removed nodes when the worm is contained and
(2) predictive dynamic traffic-blocking–a realistic deployment of
the optimal strategy on scale-free graphs. The predictive dynamic
traffic-blocking, coupled with the DDBH, ensures that more than
40% of the network is unaffected by the propagation at the time
when the worm is contained.
Abstract: Let X be a connected space, X be a space, let p : X -→ X be a continuous map and let (X, p) be a covering space of X. In the first section we give some preliminaries from covering spaces and their automorphism groups. In the second section we derive some algebraic properties of both universal and regular covering spaces (X, p) of X and also their automorphism groups A(X, p).
Abstract: Secure electronic payment system is presented in this
paper. This electronic payment system is to be secure for clients such
as customers and shop owners. The security architecture of the
system is designed by RC5 encryption / decryption algorithm. This
eliminates the fraud that occurs today with stolen credit card
numbers. The symmetric key cryptosystem RC5 can protect
conventional transaction data such as account numbers, amount and
other information. This process can be done electronically using RC5
encryption / decryption program written by Microsoft Visual Basic
6.0. There is no danger of any data sent within the system being
intercepted, and replaced. The alternative is to use the existing
network, and to encrypt all data transmissions. The system with
encryption is acceptably secure, but that the level of encryption has
to be stepped up, as computing power increases. Results In order to
be secure the system the communication between modules is
encrypted using symmetric key cryptosystem RC5. The system will
use simple user name, password, user ID, user type and cipher
authentication mechanism for identification, when the user first
enters the system. It is the most common method of authentication in
most computer system.
Abstract: “Web of Trust" is one of the recognized goals for
Web 2.0. It aims to make it possible for the people to take
responsibility for what they publish on the web, including
organizations, businesses and individual users. These objectives,
among others, drive most of the technologies and protocols recently
standardized by the governing bodies. One of the great advantages of
Web infrastructure is decentralization of publication. The primary
motivation behind Web 2.0 is to assist the people to add contents for
Collective Intelligence (CI) while providing mechanisms to link
content with people for evaluations and accountability of
information. Such structure of contents will interconnect users and
contents so that users can use contents to find participants and vice
versa. This paper proposes conceptual information storage and
linking model, based on decentralized information structure, that
links contents and people together. The model uses FOAF, Atom,
RDF and RDFS and can be used as a blueprint to develop Web 2.0
applications for any e-domain. However, primary target for this
paper is online trust evaluation domain. The proposed model targets
to assist the individuals to establish “Web of Trust" in online trust
domain.
Abstract: Termination Mechanism is an indispensible part of the
emergency management mechanism. Despite of its importance in both
theory and practice, it is almost a brand new field for researching. The
concept of termination mechanism is proposed firstly in this paper,
and the design and implementation which are helpful to guarantee the
effect and integrity of emergency management are discussed secondly.
Starting with introduction of the problems caused by absent
termination and incorrect termination, the essence of termination
mechanism is analyzed, a model based on Optimal Stopping Theory is
constructed and the termination index is given. The model could be
applied to find the best termination time point.. Termination decision
should not only be concerned in termination stage, but also in the
whole emergency management process, which makes it a dynamic
decision making process. Besides, the main subjects and the procedure
of termination are illustrated after the termination time point is given.
Some future works are discussed lastly.
Abstract: “Garbage enzyme", a fermentation product of kitchen waste, water and brown sugar, is claimed in the media as a multipurpose solution for household and agricultural uses. This study assesses the effects of dilutions (5% to 75%) of garbage enzyme in reducing pollutants in domestic wastewater. The pH of the garbage enzyme was found to be 3.5, BOD concentration about 150 mg/L. Test results showed that the garbage enzyme raised the wastewater-s BOD in proportion to its dilution due to its high organic content. For mixtures with more than 10% garbage enzyme, its pH remained acidic after the 5-day digestion period. However, it seems that ammonia nitrogen and phosphorus could be removed by the addition of the garbage enzyme. The most economic solution for removal of ammonia nitrogen and phosphorus was found to be 9%. Further tests are required to understand the removal mechanisms of the ammonia nitrogen and phosphorus.
Abstract: Iron oxide nanoparticle was synthesized by reactive-precipitation method followed by high speed centrifuge and phase transfer in order to stabilized nanoparticles in the solvent. Particle size of SPIO was 8.2 nm by SEM, and the hydraulic radius was 17.5 nm by dynamic light scattering method. Coercivity and saturated magnetism were determined by VSM (vibrating sample magnetometer), coercivity of nanoparticle was lower than 10 Hc, and the saturated magnetism was higher than 65 emu/g. Stabilized SPIO was then transferred to aqueous phase by reacted with excess amount of poly (ethylene glycol) (PEG) silane. After filtration and dialysis, the SPIO T2 contrast agent was ready to use. The hydraulic radius of final product was about 70~100 nm, the relaxation rates R2 (1/T2) measured by magnetic resonance imaging (MRI) was larger than 200(sec-1).
Abstract: This paper introduces a tool that is being developed for the expression of information security policy controls that govern electronic healthcare records. By reference to published findings, the paper introduces the theory behind the use of knowledge management for automatic and consistent security policy assertion using the formalism called the Secutype; the development of the tool and functionality is discussed; some examples of Secutypes generated by the tool are provided; proposed integration with existing medical record systems is described. The paper is concluded with a section on further work and critique of the work achieved to date.
Abstract: Flows over a harmonically oscillating NACA 0012
airfoil are simulated here using a two-dimensional, unsteady,
incompressibleNavier-Stokes solver.Both pure-plunging and
pitching-plunging combined oscillations are considered at a Reynolds
number of 5000. Special attention is paid to the vortex shedding and
interaction mechanism of the motions. For all the simulations
presented here, the reduced frequency (k) is fixed at a value of 2.5
and plunging amplitude (h) is selected to be in the range of 0.2-0.5.
The simulation results show that the interaction mechanism between
the leading and trailing edge vortices has a decisive effect on the
values of the resulting thrust and propulsive efficiency.
Abstract: Sickness absence represents a major economic and
social issue. Analysis of sick leave data is a recurrent challenge to analysts because of the complexity of the data structure which is
often time dependent, highly skewed and clumped at zero. Ignoring these features to make statistical inference is likely to be inefficient
and misguided. Traditional approaches do not address these problems. In this study, we discuss model methodologies in terms of statistical techniques for addressing the difficulties with sick leave data. We also introduce and demonstrate a new method by performing a longitudinal assessment of long-term absenteeism using
a large registration dataset as a working example available from the Helsinki Health Study for municipal employees from Finland during the period of 1990-1999. We present a comparative study on model
selection and a critical analysis of the temporal trends, the occurrence
and degree of long-term sickness absences among municipal employees. The strengths of this working example include the large
sample size over a long follow-up period providing strong evidence in supporting of the new model. Our main goal is to propose a way to
select an appropriate model and to introduce a new methodology for analysing sickness absence data as well as to demonstrate model
applicability to complicated longitudinal data.
Abstract: This paper describes a computer-aided design for
design of the concave globoidal cam with cylindrical rollers and
swinging follower. Four models with different modeling methods are
made from the same input data. The input data are angular input and
output displacements of the cam and the follower and some other
geometrical parameters of the globoidal cam mechanism. The best
cam model is the cam which has no interference with the rollers
when their motions are simulated in assembly conditions. The
angular output displacement of the follower for the best cam is also
compared with that of in the input data to check errors. In this study,
Pro/ENGINEER® Wildfire 2.0 is used for modeling the cam,
simulating motions and checking interference and errors of the
system.
Abstract: A motion protection system is designed for a parallel
motion platform with subsided cabin. Due to its complex structure,
parallel mechanism is easy to encounter interference problems
including link length limits, joints limits and self-collision. Thus a
virtual spring algorithm in operational space is developed for the
motion protection system to avoid potential damages caused by
interference. Simulation results show that the proposed motion
protection system can effectively eliminate interference problems and
ensure safety of the whole motion platform.
Abstract: The purposes of this research are to study and develop
the algorithm of Thai spoonerism words by semi-automatic computer
programs, that is to say, in part of data input, syllables are already
separated and in part of spoonerism, the developed algorithm is
utilized, which can establish rules and mechanisms in Thai
spoonerism words for bi-syllables by utilizing analysis in elements of
the syllables, namely cluster consonant, vowel, intonation mark and
final consonant. From the study, it is found that bi-syllable Thai
spoonerism has 1 case of spoonerism mechanism, namely
transposition in value of vowel, intonation mark and consonant of
both 2 syllables but keeping consonant value and cluster word (if
any).
From the study, the rules and mechanisms in Thai spoonerism
word were applied to develop as Thai spoonerism word software,
utilizing PHP program. the software was brought to conduct a
performance test on software execution; it is found that the program
performs bi-syllable Thai spoonerism correctly or 99% of all words
used in the test and found faults on the program at 1% as the words
obtained from spoonerism may not be spelling in conformity with
Thai grammar and the answer in Thai spoonerism could be more than
1 answer.