Abstract: In this study which has been conducted in Akçasu
Forest Range District of Devrek Forest Directorate; 3 methods (weed
control with labourer power, cover removal with Hitachi F20
Excavator, and weed control with agricultural equipment mounted on
a Ferguson 240S agriculture tractor) were utilized in weed control
efforts in regeneration of degraded oriental beech forests have been
compared. In this respect, 3 methods have been compared by
determining certain work hours and standard durations of unit areas
(1 hectare). For this purpose, evaluating the tasks made with human
and machine force from the aspects of duration, productivity and
costs, it has been aimed to determine the most productive method in
accordance with the actual ecological conditions of research field.
Within the scope of the study, the time studies have been conducted
for 3 methods used in weed control efforts. While carrying out those
studies, the performed implementations have been evaluated by
dividing them into business stages. Also, the actual data have been
used while calculating the cost accounts. In those calculations, the
latest formulas and equations which are also used in developed
countries have been utilized. The variance of analysis (ANOVA) was
used in order to determine whether there is any statistically
significant difference among obtained results, and the Duncan test
was used for grouping if there is significant difference. According to
the measurements and findings carried out within the scope of this
study, it has been found during living cover removal efforts in
regeneration efforts in demolished oriental beech forests that the
removal of weed layer in 1 hectare of field has taken 920 hours with
labourer force, 15.1 hours with excavator and 60 hours with an
equipment mounted on a tractor. On the other hand, it has been
determined that the cost of removal of living cover in unit area (1
hectare) was 3220.00 TL for labourer power, 1250 TL for excavator
and 1825 TL for equipment mounted on a tractor.
According to the obtained results, it has been found that the
utilization of excavator in weed control effort in regeneration of
degraded oriental beech regions under actual ecological conditions of
research field has been found to be more productive from both of
aspects of duration and costs. These determinations carried out
should be repeated in weed control efforts in degraded forest fields
with different ecological conditions, it is compulsory for finding the
most efficient weed control method. These findings will light the way
of technical staff of forestry directorate in determination of the most
effective and economic weed control method. Thus, the more actual
data will be used while preparing the weed control budgets, and there
will be significant contributions to national economy. Also the results of this and similar studies are very important for developing the policies for our forestry in short and long term.
Abstract: e-Service has moved from the usual manual and
traditional way of rendering services to electronic service provision
for the public and there are several reasons for implementing these
services, Airline ticketing have gone from its manual traditional way
to an intelligent web-driven service of purchasing. Many companies
have seen their profits doubled through the use of online services in
their operation and a typical example is Hewlett Packard (HP) which
is rapidly transforming their after sales business into a profit
generating e-service business unit.
This paper will examine the various challenges confronting e-
Service adoption and implementation in Nigeria and also analyse
lessons learnt from e-Service adoption and implementation in Asia to
see how it could be useful in Nigeria which is a lower middle income
country. From the analysis of the online survey data, it has been
identified that the public in Nigeria are much aware of e-Services but
successful adoption and implementation have been the problems
faced.
Abstract: Nowadays social media information, such as news,
links, images, or VDOs, is shared extensively. However, the
effectiveness of disseminating information through social media
lacks in quality: less fact checking, more biases, and several rumors.
Many researchers have investigated about credibility on Twitter, but
there is no the research report about credibility information on
Facebook. This paper proposes features for measuring credibility on
Facebook information. We developed the system for credibility on
Facebook. First, we have developed FB credibility evaluator for
measuring credibility of each post by manual human’s labelling. We
then collected the training data for creating a model using Support
Vector Machine (SVM). Secondly, we developed a chrome extension
of FB credibility for Facebook users to evaluate the credibility of
each post. Based on the usage analysis of our FB credibility chrome
extension, about 81% of users’ responses agree with suggested
credibility automatically computed by the proposed system.
Abstract: The recommended limit for cadmium concentration in
potable water is less than 0.005 mg/L. A continuous biosorption
process using indigenous red seaweed, Gracilaria corticata, was
performed to remove cadmium from the potable water. The process
was conducted under fixed conditions and the breakthrough curves
were achieved for three consecutive sorption-desorption cycles. A
modeling based on Artificial Neural Network (ANN) was employed
to fit the experimental breakthrough data. In addition, a simplified
semi empirical model, Thomas, was employed for this purpose. It
was found that ANN well described the experimental data (R2>0.99)
while the Thomas prediction were a bit less successful with R2>0.97.
The adjusted design parameters using the nonlinear form of Thomas
model was in a good agreement with the experimentally obtained
ones. The results approve the capability of ANN to predict the
cadmium concentration in potable water.
Abstract: The paper examines the interaction between the
environmental taxation, size of government spending on
environmental protection and greenhouse gas emissions and gross
inland energy consumption. The aim is to analyze the effects of
environmental taxation and government spending on environmental
protection as an environmental policy instruments on greenhouse gas
emissions and gross inland energy consumption in the EU15. The
empirical study is performed using a VAR approach with the
application of aggregated data of EU15 over the period 1995 to 2012.
The results provide the evidence that the reactions of greenhouse gas
emission and gross inland energy consumption to the shocks of
environmental policy instruments are strong, mainly in the short term
and decay to zero after about 8 years. Further, the reactions of the
environmental policy instruments to the shocks of greenhouse gas
emission and gross inland energy consumption are also strong in the
short term, however with the deferred effects. In addition, the results
show that government spending on environmental protection together
with gross inland energy consumption has stronger effect on
greenhouse gas emissions than environmental taxes in EU15 over the
examined period.
Abstract: Background: Taiwan now is an aging society. Research
on the elderly should not be confined to caring for seniors, but should
also be focused on ways to improve health and the quality of life.
Senior citizens who participate in volunteer services could become
less lonely, have new growth opportunities, and regain a sense of
accomplishment. Thus, the question of how to get the elderly to
participate in volunteer service is worth exploring. Objective: Apply
the Transtheoretical Model to understand stages of change in regular
volunteer service and voluntary service behaviour among the seniors.
Methods: 1525 adults over the age of 65 from the Renai district of
Keelung City were interviewed. The research tool was a
self-constructed questionnaire, and individual interviews were
conducted to collect data. Then the data was processed and analyzed
using the IBM SPSS Statistics 20 (Windows version) statistical
software program. Results: In the past six months, research subjects
averaged 9.92 days of volunteer services. A majority of these elderly
individuals had no intention to change their regular volunteer services.
We discovered that during the maintenance stage, the self-efficacy for
volunteer services was higher than during all other stages, but
self-perceived barriers were less during the preparation stage and
action stage. Self-perceived benefits were found to have an important
predictive power for those with regular volunteer service behaviors in
the previous stage, and self-efficacy was found to have an important
predictive power for those with regular volunteer service behaviors in
later stages. Conclusions/Implications for Practice: The research
results support the conclusion that community nursing staff should
group elders based on their regular volunteer services change stages
and design appropriate behavioral change strategies.
Abstract: Science and technology has a major impact on many
societal domains such as communication, medicine, food,
transportation, etc. However, this dominance of modern technology
can have a negative unintended impact on indigenous systems, and in
particular on indigenous foods. This problem serves as a motivation
to this study whose aim is to examine the perceptions of learners on
the usefulness of Information and Communication Technologies
(ICTs) for learning about indigenous foods. This aim will be
subdivided into two types of research objectives. The design and
identification of theories and models will be achieved using literature
content analysis. The objective on the empirical testing of such
theories and models will be achieved through the survey of
Hospitality studies learners from different schools in the iLembe and
Umgungundlovu Districts of the South African Kwazulu-Natal
province. SPSS is used to quantitatively analyze the data collected by
the questionnaire of this survey using descriptive statistics and
Pearson correlations after the assessment of the validity and the
reliability of the data. The main hypothesis behind this study is that
there is a connection between the demographics of learners, their
perceptions on the usefulness of ICTs for learning about indigenous
foods, and the following personality and eLearning related theories
constructs: Computer self-efficacy, Trust in ICT systems, and
Conscientiousness; as suggested by existing studies on learning
theories. This hypothesis was fully confirmed by the survey
conducted by this study except for the demographic factors where
gender and age were not found to be determinant factors of learners’
perceptions on the usefulness of ICTs for learning about indigenous
foods.
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: Container handling problems at container terminals
are NP-hard problems. This paper presents an approach using
discrete-event simulation modeling to optimize solution for storage
space allocation problem, taking into account all various interrelated
container terminal handling activities. The proposed approach is
applied on a real case study data of container terminal at Alexandria
port. The computational results show the effectiveness of the
proposed model for optimization of storage space allocation in
container terminal where 54% reduction in containers handling time
in port is achieved.
Abstract: The exact theoretical expression describing the
probability distribution of nonlinear sea-surface elevations derived
from the second-order narrowband model has a cumbersome form
that requires numerical computations, not well-disposed to theoretical
or practical applications. Here, the same narrowband model is reexamined
to develop a simpler closed-form approximation suitable
for theoretical and practical applications. The salient features of the
approximate form are explored, and its relative validity is verified
with comparisons to other readily available approximations, and
oceanic data.
Abstract: The globalization of markets, the need to develop
competitive advantages and core competencies, among other things,
lead organizations to increasingly cross borders to operate in other
countries. The expatriation of professionals who go to work in
another country besides their own becomes increasingly common. In
order to generate data about this issue, research was conducted
concerning the perception of expatriate employees concerning
expatriation success. The research method used was case study
through a qualitative approach. This research was done through
interviews with five India expatriates and five China expatriates,
interview with expatriate department heads and analysis of company
documents. It was found that there are differences between the
organizational perception and perception of expatriates of what
constitutes mission success. The paper also provides suggestions for
further research and suggestions for future expatriates.
Abstract: The use of eXtensible Markup Language (XML) in
web, business and scientific databases lead to the development of
methods, techniques and systems to manage and analyze XML data.
Semi-structured documents suffer due to its heterogeneity and
dimensionality. XML structure and content mining represent
convergence for research in semi-structured data and text mining. As
the information available on the internet grows drastically, extracting
knowledge from XML documents becomes a harder task. Certainly,
documents are often so large that the data set returned as answer to a
query may also be very big to convey the required information. To
improve the query answering, a Semantic Tree Based Association
Rule (STAR) mining method is proposed. This method provides
intentional information by considering the structure, content and the
semantics of the content. The method is applied on Reuter’s dataset
and the results show that the proposed method outperforms well.
Abstract: The IEEE 802.22 working group aims to drive the
Digital Video Broadcasting-Terrestrial (DVB-T) bands for data
communication to the rural area without interfering the TV broadcast.
In this paper, we arrive at a closed-form expression for average
detection probability of Fusion center (FC) with multiple antenna
over the κ − μ fading channel model. We consider a centralized
cooperative multiple antenna network for reporting. The DVB-T
samples forwarded by the secondary user (SU) were combined using
Maximum ratio combiner at FC, an energy detection is performed
to make the decision. The fading effects of the channel degrades
the detection probability of the FC, a generalized independent and
identically distributed (IID) κ − μ and an additive white Gaussian
noise (AWGN) channel is considered for reporting and sensing
respectively. The proposed system performance is verified through
simulation results.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: The tomato is a very important crop, whose
cultivation in the Mediterranean basin is severely affected by the
phytoparasitic weed Phelipanche ramosa. The semiarid regions of
the world are considered the main areas where this parasitic weed is
established causing heavy infestation as it is able to produce high
numbers of seeds (up to 500,000 per plant), which remain viable for
extended period (more than 20 years). In this paper the results
obtained from eleven treatments in order to control this parasitic
weed including chemical, agronomic, biological and biotechnological
methods compared with the untreated test under two plowing depths
(30 and 50 cm) are reported. The split-plot design with 3 replicates
was adopted. In 2014 a trial was performed in Foggia province
(southern Italy) on processing tomato (cv Docet) grown in the field
infested by Phelipanche ramosa. Tomato seedlings were transplant
on May 5, on a clay-loam soil. During the growing cycle of the
tomato crop, at 56-78 and 92 days after transplantation, the number
of parasitic shoots emerged in each plot was detected. At tomato
harvesting, on August 18, the major quantity-quality yield parameters
were determined (marketable yield, mean weight, dry matter, pH,
soluble solids and color of fruits). All data were subjected to analysis
of variance (ANOVA) and the means were compared by Tukey's test.
Each treatment studied did not provide complete control against
Phelipanche ramosa. However, among the different methods tested,
some of them which Fusarium, gliphosate, radicon biostimulant and
Red Setter tomato cv (improved genotypes obtained by Tilling
technology) under deeper plowing (50 cm depth) proved to mitigate
the virulence of the Phelipanche ramose attacks. It is assumed that
these effects can be improved combining some of these treatments
each other, especially for a gradual and continuing reduction of the
“seed bank” of the parasite in the soil.
Abstract: The paper describes a Chinese shadow play animation
system based on Kinect. Users, without any professional training, can
personally manipulate the shadow characters to finish a shadow play
performance by their body actions and get a shadow play video
through giving the record command to our system if they want. In our
system, Kinect is responsible for capturing human movement and
voice commands data. Gesture recognition module is used to control
the change of the shadow play scenes. After packaging the data from
Kinect and the recognition result from gesture recognition module,
VRPN transmits them to the server-side. At last, the server-side uses
the information to control the motion of shadow characters and video
recording. This system not only achieves human-computer interaction,
but also realizes the interaction between people. It brings an
entertaining experience to users and easy to operate for all ages. Even
more important is that the application background of Chinese shadow
play embodies the protection of the art of shadow play animation.
Abstract: Near infrared (NIR) spectroscopy has always been of
great interest in the food and agriculture industries. The development
of prediction models has facilitated the estimation process in recent
years. In this study, 110 crude palm oil (CPO) samples were used to
build a free fatty acid (FFA) prediction model. 60% of the collected
data were used for training purposes and the remaining 40% used for
testing. The visible peaks on the NIR spectrum were at 1725 nm and
1760 nm, indicating the existence of the first overtone of C-H bands.
Principal component regression (PCR) was applied to the data in
order to build this mathematical prediction model. The optimal
number of principal components was 10. The results showed
R2=0.7147 for the training set and R2=0.6404 for the testing set.
Abstract: The final step to complete the “Analytical Systems
Engineering Process” is the “Allocated Architecture” in which all
Functional Requirements (FRs) of an engineering system must be
allocated into their corresponding Physical Components (PCs). At
this step, any design for developing the system’s allocated
architecture in which no clear pattern of assigning the exclusive
“responsibility” of each PC for fulfilling the allocated FR(s) can be
found is considered a poor design that may cause difficulties in
determining the specific PC(s) which has (have) failed to satisfy a
given FR successfully. The present study utilizes the Axiomatic
Design method principles to mathematically address this problem and
establishes an “Axiomatic Model” as a solution for reaching good
alternatives for developing the allocated architecture. This study
proposes a “loss Function”, as a quantitative criterion to monetarily
compare non-ideal designs for developing the allocated architecture
and choose the one which imposes relatively lower cost to the
system’s stakeholders. For the case-study, we use the existing design
of U. S. electricity marketing subsystem, based on data provided by
the U.S. Energy Information Administration (EIA). The result for
2012 shows the symptoms of a poor design and ineffectiveness due to
coupling among the FRs of this subsystem.
Abstract: Self-compacting concrete (SCC) developed in Japan
in the late 80s has enabled the construction industry to reduce
demand on the resources, improve the work condition and also
reduce the impact of environment by elimination of the need for
compaction. Fuzzy logic (FL) approaches has recently been used to
model some of the human activities in many areas of civil
engineering applications. Especially from these systems in the model
experimental studies, very good results have been obtained. In the
present study, a model for predicting compressive strength of SCC
containing various proportions of fly ash, as partial replacement of
cement has been developed by using Fuzzy Inference System (FIS).
For the purpose of building this model, a database of experimental
data were gathered from the literature and used for training and
testing the model. The used data as the inputs of fuzzy logic models
are arranged in a format of five parameters that cover the total binder
content, fly ash replacement percentage, water content,
superplasticizer and age of specimens. The training and testing results
in the fuzzy logic model have shown a strong potential for predicting
the compressive strength of SCC containing fly ash in the considered
range.
Abstract: Safety is one of the most important considerations
when buying a new car. While active safety aims at avoiding
accidents, passive safety systems such as airbags and seat belts
protect the occupant in case of an accident. In addition to legal
regulations, organizations like Euro NCAP provide consumers with
an independent assessment of the safety performance of cars and
drive the development of safety systems in automobile industry.
Those ratings are mainly based on injury assessment reference values
derived from physical parameters measured in dummies during a car
crash test.
The components and sub-systems of a safety system are designed
to achieve the required restraint performance. Sled tests and other
types of tests are then carried out by car makers and their suppliers
to confirm the protection level of the safety system. A Knowledge
Discovery in Databases (KDD) process is proposed in order to
minimize the number of tests. The KDD process is based on the
data emerging from sled tests according to Euro NCAP specifications.
About 30 parameters of the passive safety systems from different data
sources (crash data, dummy protocol) are first analysed together with
experts opinions. A procedure is proposed to manage missing data
and validated on real data sets. Finally, a procedure is developed to
estimate a set of rough initial parameters of the passive system before
testing aiming at reducing the number of tests.