Abstract: The main purpose of this paper is to determine the
applicability of the constitutional social rights in the so-called
horizontal relations, i.e. the relations between private entities.
Nowadays the constitutional rights are more and more often violated
by private entities and not only by the state. The private entities
interfere with the privacy of individuals, limit their freedom of
expression or disturb their peaceful gatherings. International
corporations subordinate individuals in a way which may limit their
constitutional rights. These new realities determine the new role of
the constitution in protecting human rights.
The paper will aim at answering two important questions. Firstly,
are the private entities obliged to respect the constitutional social
rights of other private entities and can they be liable for violation of
these rights? Secondly, how the constitutional social rights can
receive horizontal effect? Answers to these questions will have a
significant meaning for the popularisation of the practice of applying
the Constitution among the citizens as well as for the courts which
settle disputes between them.
Abstract: The decision-making process is theoretically clearly
defined. Generally, it includes the problem identification and
analysis, data gathering, goals and criteria setting, alternatives
development and optimal alternative choice and its implementation.
In practice however, various modifications of the theoretical
decision-making process can occur. The managers can consider some
of the phases to be too complicated or unfeasible and thus they do not
carry them out and conversely some of the steps can be
overestimated.
The aim of the paper is to reveal and characterize the perception of
the individual phases of decision-making process by the managers.
The research is concerned with managers in the military environment
– commanders. Quantitative survey is focused cross-sectionally in the
individual levels of management of the Ministry of Defence of the
Czech Republic. On the total number of 135 respondents the analysis
focuses on which of the decision-making process phases are
problematic or not carried out in practice and which are again
perceived to be the easiest. Then it is examined the reasons of the
findings.
Abstract: The research studies the behaviors based on
sufficiency economy philosophy at individual and community
levelsas well as the satisfaction of the urban community leaders by
collecting data with purposive sampling technique. For in-depth
interviews with 26 urban community leaders, the result shows that
the urban community leaders have good knowledge and
understanding about sufficiency economy philosophy. Especially in
terms of money spending, they must consider the need for living and
be economical. The activities in the community or society should not
take advantage of the others as well as colleagues. At present, most of
the urban community leaders live in sufficient way. They often spend
time with public service, but many families are dealing with debt.
Many communities have some political conflict and high family
allowances because of living in the urban communities with rapid
social and economic changes. However, there are many communities
that leaders have applied their wisdom in development for their
people by gathering and grouping the professionals to form activities
such as making chilli sauce, textile organization, making artificial
flowers to worship the sanctity. The most prominent group is the foot
massage business in Wat Pracha Rabue Tham. This professional
group is supported continuously by the government. One of the
factors in terms of satisfaction used for evaluating community leaders
is the customary administration in brotherly, interdependent way
rather than using the absolute power or controlling power, but using
the roles of leader to perform the activities with their people intently,
determinedly and having public mind for people.
Abstract: Traditional Wireless Sensor Networks (WSNs) generally use static sinks to collect data from the sensor nodes via multiple forwarding. Therefore, network suffers with some problems like long message relay time, bottle neck problem which reduces the performance of the network.
Many approaches have been proposed to prevent this problem with the help of mobile sink to collect the data from the sensor nodes, but these approaches still suffer from the buffer overflow problem due to limited memory size of sensor nodes. This paper proposes an energy efficient scheme for data gathering which overcomes the buffer overflow problem. The proposed scheme creates virtual grid structure of heterogeneous nodes. Scheme has been designed for sensor nodes having variable sensing rate. Every node finds out its buffer overflow time and on the basis of this cluster heads are elected. A controlled traversing approach is used by the proposed scheme in order to transmit data to sink. The effectiveness of the proposed scheme is verified by simulation.
Abstract: Mosaic refers to a technique that makes image by gathering lots of small materials in various colors. This paper presents an automatic algorithm that makes the photo-mosaic image using photos. The algorithm is composed of 4 steps: partition and feature extraction, block matching, redundancy removal and color adjustment. The input image is partitioned in the small block to extract feature. Each block is matched to find similar photo in database by comparing similarity with Euclidean difference between blocks. The intensity of the block is adjusted to enhance the similarity of image by replacing the value of light and darkness with that of relevant block. Further, the quality of image is improved by minimizing the redundancy of tiles in the adjacent blocks. Experimental results support that the proposed algorithm is excellent in quantitative analysis and qualitative analysis.
Abstract: Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.
Abstract: Usability is an important software quality that is often neglected at the design stage. Although methods exist to incorporate elements of usability engineering, there is a need for more balanced usability focused methods that can enhance the experience of software usability for users. In this regard, the potential for Usage-Centred Design is explored with respect to requirements gathering and is shown to lead to high software usability besides other benefits. It achieves this through its focus on usage, defining essential use cases, by conducting task modeling, encouraging user collaboration, refining requirements, and so on. The requirements gathering process in UgCD is described in detail.
Abstract: In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.
Abstract: Automated intelligent, clinical decision support systems generally promote to help or to assist physicians and patients regarding to prevention of diseases or treatment of illnesses using computer represented knowledge and information. In this paper, assessment factors affecting the proper design of clinical decision support system were investigated. The required procedure steps for gathering the data from clinical trial and extracting the information from large volume of healthcare repositories were listed, which are necessary for validation and verification of evidence-based implementation of clinical decision support system. The goal of this paper is to extract useful evaluation factors affecting the quality of the clinical decision support system in the design, development, and implementation of a computer-based decision support system.
Abstract: In an emergency, combining Wireless Sensor Network's data with the knowledge gathered from various other information sources and navigation algorithms, could help safely guide people to a building exit while avoiding the risky areas. This paper presents an emergency response and navigation support architecture for data gathering, knowledge manipulation, and navigational support in an emergency situation. At normal state, the system monitors the environment. When an emergency event detects, the system sends messages to first responders and immediately identifies the risky areas from safe areas to establishing escape paths. The main functionalities of the system include, gathering data from a wireless sensor network which is deployed in a multi-story indoor environment, processing it with information available in a knowledge base, and sharing the decisions made, with first responders and people in the building. The proposed architecture will act to reduce risk of losing human lives by evacuating people much faster with least congestion in an emergency environment.
Abstract: To achieve competitive advantage nowadays, most of
the industrial companies are considering that success is sustained to
great product development. That is to manage the product throughout
its entire lifetime ranging from design, manufacture, operation and
destruction. Achieving this goal requires a tight collaboration
between partners from a wide variety of domains, resulting in various
product data types and formats, as well as different software tools. So
far, the lack of a meaningful unified representation for product data
semantics has slowed down efficient product development. This
paper proposes an ontology based approach to enable such semantic
interoperability. Generic and extendible product ontology is
described, gathering main concepts pertaining to the mechanical field
and the relations that hold among them. The ontology is not
exhaustive; nevertheless, it shows that such a unified representation
is possible and easily exploitable. This is illustrated thru a case study
with an example product and some semantic requests to which the
ontology responds quite easily. The study proves the efficiency of
ontologies as a support to product data exchange and information
sharing, especially in product development environments where
collaboration is not just a choice but a mandatory prerequisite.
Abstract: Wireless Sensor Networks consist of inexpensive, low power sensor nodes deployed to monitor the environment and collect
data. Gathering information in an energy efficient manner is a critical aspect to prolong the network lifetime. Clustering algorithms have an advantage of enhancing the network lifetime. Current clustering algorithms usually focus on global re-clustering and local re-clustering separately. This paper, proposed a combination of those two reclustering methods to reduce the energy consumption of the network. Furthermore, the proposed algorithm can apply to homogeneous as well as heterogeneous wireless sensor networks. In addition, the cluster head rotation happens, only when its energy drops below a dynamic threshold value computed by the algorithm. The simulation result shows that the proposed algorithm prolong the network lifetime compared to existing algorithms.
Abstract: This article deals with the popularity of candidates for the president of the United States of America. The popularity is assessed according to public comments on the Web 2.0. Social networking, blogging and online forums (collectively Web 2.0) are for common Internet users the easiest way to share their personal opinions, thoughts, and ideas with the entire world. However, the web content diversity, variety of technologies and website structure differences, all of these make the Web 2.0 a network of heterogeneous data, where things are difficult to find for common users. The introductory part of the article describes methodology for gathering and processing data from Web 2.0. The next part of the article is focused on the evaluation and content analysis of obtained information, which write about presidential candidates.
Abstract: In this paper the application of rule mining in order to
review the effective factors on supplier selection is reviewed in the
following three sections 1) criteria selecting and information
gathering 2) performing association rule mining 3) validation and
constituting rule base. Afterwards a few of applications of rule base
is explained. Then, a numerical example is presented and analyzed
by Clementine software. Some of extracted rules as well as the
results are presented at the end.
Abstract: Wireless Sensor Network is Multi hop Self-configuring
Wireless Network consisting of sensor nodes. The deployment of
wireless sensor networks in many application areas, e.g., aggregation
services, requires self-organization of the network nodes into clusters.
Efficient way to enhance the lifetime of the system is to partition the
network into distinct clusters with a high energy node as cluster head.
The different methods of node clustering techniques have appeared in
the literature, and roughly fall into two families; those based on the
construction of a dominating set and those which are based solely on
energy considerations. Energy optimized cluster formation for a set
of randomly scattered wireless sensors is presented. Sensors within a
cluster are expected to be communicating with cluster head only. The
energy constraint and limited computing resources of the sensor nodes
present the major challenges in gathering the data. In this paper we
propose a framework to study how partially correlated data affect the
performance of clustering algorithms. The total energy consumption
and network lifetime can be analyzed by combining random geometry
techniques and rate distortion theory. We also present the relation
between compression distortion and data correlation.
Abstract: One of the important applications of gas turbines is
their utilization for heat recovery steam generator in combine-cycle technology. Exhaust flow and energy are two key parameters for
determining heat recovery steam generator performance which are mainly determined by the main gas turbine components performance
data. For this reason a method was developed for determining the
exhaust energy in the new edition of ASME PTC22. The result of this investigation shows that the method of standard has considerable
error. Therefore in this paper a new method is presented for modifying of the performance calculation. The modified method is
based on exhaust gas constituent analysis and combustion calculations. The case study presented here by two kind of General
Electric gas turbine design data for validation of methodologies. The
result shows that the modified method is more precise than the ASME PTC22 method. The exhaust flow calculation deviation from
design data is 1.5-2 % by ASME PTC22 method so that the deviation regarding with modified method is 0.3-0.5%. Based on precision of
analyzer instruments, the method can be suitable alternative for gas
turbine standard performance test. In advance two methods are
proposed based on known and unknown fuel in modified method procedure. The result of this paper shows that the difference between
the two methods is below than %0.02. In according to reasonable esult of the second procedure (unknown fuel composition), the
method can be applied to performance evaluation of gas turbine, so that the measuring cost and data gathering should be reduced.
Abstract: In this paper, we investigate multihop polling and data gathering schemes in layered sensor networks in order to extend the life time of the networks. A network consists of three layers. The lowest layer contains sensors. The middle layer contains so called super nodes with higher computational power, energy supply and longer transmission range than sensor nodes. The top layer contains a sink node. A node in each layer controls a number of nodes in lower layer by polling mechanism to gather data. We will present four types of data gathering schemes: intermediate nodes do not queue data packet, queue single packet, queue multiple packets and aggregate data, to see which data gathering scheme is more energy efficient for multihop polling in layered sensor networks.
Abstract: The proliferation of user-generated content (UGC) results in huge opportunities to explore event patterns. However, existing event recommendation systems primarily focus on advanced information technology users. Little work has been done to address novice and low-literacy users. The next billion users providing and consuming UGC are likely to include communities from developing countries who are ready to use affordable technologies for subsistence goals. Therefore, we propose a design framework for providing event recommendations to address the needs of such users. Grounded in information integration theory (IIT), our framework advocates that effective event recommendation is supported by systems capable of (1) reliable information gathering through structured user input, (2) accurate sense making through spatial-temporal analytics, and (3) intuitive information dissemination through interactive visualization techniques. A mobile pest management application is developed as an instantiation of the design framework. Our preliminary study suggests a set of design principles for novice and low-literacy users.
Abstract: The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports. It is advisable to note that this article was elaborated within the framework of the research projects on honeyspots within the LABTIC (Laboratory of Information Technologies and Communication).
Abstract: The purpose of this research was to study the
motivation factors to influence the decision to choose Thai Fabric. A
multiple-stage sample was utilized to collect 400 samples from
working women who had diverse occupations all over Thailand. This
research was a quantitative analysis and questionnaire was used a tool
to collect data. Descriptive statistics used in this research included
percentage, average, and standard deviation and inferential statistics
included hypothesis testing of one way ANOVA.
The research findings revealed that demographic factors and social
factors had an influence to the positive idea of wearing Thai fabric (F
= 5.377, P value < 0.05). The respondents who had the age over 41
years old had a better positive idea of wearing Thai fabric than other
groups. Moreover, the findings revealed that age had influenced the
positive idea of wearing Thai fabric (F = 3.918, P value < 0.05). The
respondents who had the age over 41 years old also had stronger
believe that wearing Thai fabric to work and social gatherings are
socially acceptable than other groups.