Abstract: Regarding the multi-media property of internet and the facilities that can be provided for the users, the purpose of this paper is to investigate the users- behavioral patterns and the impact of internet on taboos of marriage. For this purpose a survey technique on the sample size amounted 403 students of governmental guidance schools of city of Mashhad in country of Iran were considered. The results showed, the process of using various internet environments depends on the degree of the users- familiarity with these sites. In order to clarify the effects of the Internet on the taboos of marriage, the non – internet parameters also considered to be controlled. The ttest held among the internet users and non-users, indicated that internet users possess lower taboos of marriage. Extraction of the effects of internet via considering the effects of non-internet parameters, indicate that addiction to the internet, creating a cordial atmosphere, emotional communication, and message attractive factors have significant effects on the family's traditional values.
Abstract: In Secondary Surveillance Radar (SSR) systems, it is
more difficult to locate and recognise aircrafts in the neighbourhood of civil airports since aerial traffic becomes greater. Here, we propose to apply a recent Blind Source Separation (BSS) algorithm based
on Time-Frequency Analysis, in order to separate messages sent by different aircrafts and falling in the same radar beam in reception. The above source separation method involves joint-diagonalization
of a set of smoothed version of spatial Wigner-Ville distributions.
The technique makes use of the difference in the t-f signatures of the nonstationary sources to be separated. Consequently, as the SSR sources emit different messages at different frequencies, the above fitted to this new application. We applied the technique in simulation to separate SSR replies. Results are provided at the end
of the paper.
Abstract: For collecting data from all sensor nodes, some
changes in Dynamic Source Routing (DSR) protocol is proposed. At
each hop level, route-ranking technique is used for distributing
packets to different selected routes dynamically. For calculating rank
of a route, different parameters like: delay, residual energy and
probability of packet loss are used. A hybrid topology of
DMPR(Disjoint Multi Path Routing) and MMPR(Meshed Multi Path
Routing) is formed, where braided topology is used in different
faulty zones of network. For reducing energy consumption, variant
transmission ranges is used instead of fixed transmission range. For
reducing number of packet drop, a fuzzy logic inference scheme is
used to insert different types of delays dynamically. A rule based
system infers membership function strength which is used to
calculate the final delay amount to be inserted into each of the node
at different clusters.
In braided path, a proposed 'Dual Line ACK Link'scheme is
proposed for sending ACK signal from a damaged node or link to a
parent node to ensure that any error in link or any node-failure
message may not be lost anyway. This paper tries to design the
theoretical aspects of a model which may be applied for collecting
data from any large hanging iron structure with the help of wireless
sensor network. But analyzing these data is the subject of material
science and civil structural construction technology, that part is out
of scope of this paper.
Abstract: It-s difficult for China-s current land transfer
institutions limited to county-wide to solve the contradiction between
urban-rural development and construction land shortage. On the basis of analyzing China-s construction land transfer system, and evaluation
toward Transfer of development rights (TDR) practices in Anhui and
Chongqing, the passage proposes: (1) we should establish a multi-level
land indicators trade market under the guidance of regional spatial
objectives, and allow land transfer paid across cities and counties
within a specific area following the regulation of both government and
market; (2) it would be better to combine organically the policy ntentions of land plan, regional plan, urban plan and economic plan, and link them with land indicators transfer to promote a wider range of
urban-rural balance and regional coordination.
Abstract: Design Patterns have gained more and more
acceptances since their emerging in software development world last
decade and become another de facto standard of essential knowledge
for Object-Oriented Programming developers nowadays.
Their target usage, from the beginning, was for regular computers,
so, minimizing power consumption had never been a concern.
However, in this decade, demands of more complicated software for
running on mobile devices has grown rapidly as the much higher
performance portable gadgets have been supplied to the market
continuously. To get along with time to market that is business
reason, the section of software development for power conscious,
battery, devices has shifted itself from using specific low-level
languages to higher level ones. Currently, complicated software
running on mobile devices are often developed by high level
languages those support OOP concepts. These cause the trend of
embracing Design Patterns to mobile world.
However, using Design Patterns directly in software development
for power conscious systems is not recommended because they were
not originally designed for such environment. This paper
demonstrates the adapted Design Pattern for power limitation system.
Because there are numerous original design patterns, it is not possible
to mention the whole at once. So, this paper focuses only in creating
Energy Conscious version of existing regular "Builder Pattern" to be
appropriated for developing low power consumption software.
Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.
Abstract: This paper addresses a current problem that occurs among Thai internet service providers with regard to bandwidth network quality management. The IPSTAR department of Telecom Organization of Thailand public company (TOT); the largest internet service provider in Thailand, is the case study to analyze the problem that exists. The Internet bandwidth network quality management (iBWQM) framework is mainly applied to the problem that has been found. Bandwidth management policy (BMP) and quality of service (QoS) are two antecedents of iBWQM. This paper investigates internet user behavior, marketing demand and network operation views in order to determine bandwidth management policy (e.g. quota management, scheduling and malicious management). The congestion of bandwidth is also analyzed to enhance quality of service (QoS). Moreover, the iBWQM framework is able to improve the quality of service and increase bandwidth utilization, minimize complaint rate concerns to slow speed, and provide network planning guidelines through Thai Internet services providers.
Abstract: This research assesses the value of the brand personality and its influence on consumer-s decision making, through relational variables, after receiving a text message ad. An empirical study, in which 380 participants have received an SMS ad, confirms that brand personality does actually influence the brand trust as well as the attachment and commitment. The levels of sensitivity and involvement have an impact on the brand personality and the related variables to it.
Abstract: This paper reports on a survey of state-of-the-art
application scenarios for smart office environments. Based on an
analysis of ongoing research activities and industry projects,
functionalities and services of future office systems are extracted. In
a second step, these results are used to identify the key characteristics
of emerging products.
Abstract: There are two major variants of the Simplex
Algorithm: the revised method and the standard, or tableau method.
Today, all serious implementations are based on the revised method
because it is more efficient for sparse linear programming problems.
Moreover, there are a number of applications that lead to dense linear
problems so our aim in this paper is to present some computational
results on parallel implementation of dense Simplex Method. Our
implementation is implemented on a SMP cluster using C
programming language and the Message Passing Interface MPI.
Preliminary computational results on randomly generated dense
linear programs support our results.
Abstract: In this report we present a rule-based approach to
detect anomalous telephone calls. The method described here uses
subscriber usage CDR (call detail record) data sampled over two
observation periods: study period and test period. The study period
contains call records of customers- non-anomalous behaviour.
Customers are first grouped according to their similar usage
behaviour (like, average number of local calls per week, etc). For
customers in each group, we develop a probabilistic model to describe
their usage. Next, we use maximum likelihood estimation (MLE) to
estimate the parameters of the calling behaviour. Then we determine
thresholds by calculating acceptable change within a group. MLE is
used on the data in the test period to estimate the parameters of the
calling behaviour. These parameters are compared against thresholds.
Any deviation beyond the threshold is used to raise an alarm. This
method has the advantage of identifying local anomalies as compared
to techniques which identify global anomalies. The method is tested
for 90 days of study data and 10 days of test data of telecom
customers. For medium to large deviations in the data in test window,
the method is able to identify 90% of anomalous usage with less than
1% false alarm rate.
Abstract: The present study attempted to improve the Mercury
(Hg) sorption capacity of kanuma volcanic ash soil (KVAS) by
impregnating the cupper (Cu). Impregnation was executed by 1 and
5% Cu powder and sorption characterization of optimum Hg
removing Cu impregnated KVAS was performed under different
operational conditions, contact time, solution pH, sorbent dosage and
Hg concentration using the batch operation studies. The 1% Cu
impregnated KVAS pronounced optimum improvement (79%) in
removing Hg from water compare to control. The present
investigation determined the equilibrium state of maximum Hg
adsorption at 6 h contact period. The adsorption revealed a pH
dependent response and pH 3.5 showed maximum sorption capacity
of Hg. Freundlich isotherm model is well fitted with the experimental
data than that of Langmuir isotherm. It can be concluded that the Cu
impregnation improves the Hg sorption capacity of KVAS and 1%
Cu impregnated KVAS could be employed as cost-effective
adsorbent media for treating Hg contaminated water.
Abstract: In this work we introduce an efficient method to limit
the impact of the hiding process on the quality of the cover speech.
Vector quantization of the speech spectral information reduces drastically
the number of the secret speech parameters to be embedded
in the cover signal. Compared to scalar hiding, vector quantization
hiding technique provides a stego signal that is indistinguishable from
the cover speech. The objective and subjective performance measures
reveal that the current hiding technique attracts no suspicion about the
presence of the secret message in the stego speech, while being able
to recover an intelligible copy of the secret message at the receiver
side.
Abstract: In the meat processing industry the substitution of
meat with non-meat ingredients is considered an important strategy
for reducing overall production costs. The main purpose of the
current research was to evaluate differences in physical-chemical
composition of cooked sausage with different legumes additions.
Peas (Pisum sativum), beans (Phaseolus vulgaris) and lentil (Lens
culinaris) were used in preparation of sausages. The legumes at
proportion of 20% of the total weight of meat were added in
sausages. The whole ingredients were mixed, filled into casing,
compressed, cooked and cooled. After storage the samples were
sensory evaluated. The sensory evaluation was carried out using the
nine point hedonic scale and line scale. Sausages without legumes
flour was used as control sample. The main conclusion of the current
research the legumes flour can be successfully used for cooked
sausages production.
Abstract: Content-Based Image Retrieval has been a major area
of research in recent years. Efficient image retrieval with high
precision would require an approach which combines usage of both
the color and texture features of the image. In this paper we propose
a method for enhancing the capabilities of texture based feature
extraction and further demonstrate the use of these enhanced texture
features in Texture-Based Color Image Retrieval.
Abstract: The paper shows how the CASMAS modeling language,
and its associated pervasive computing architecture, can be
used to facilitate continuity of care by providing members of patientcentered
communities of care with a support to cooperation and
knowledge sharing through the usage of electronic documents and
digital devices. We consider a scenario of clearly fragmented care to
show how proper mechanisms can be defined to facilitate a better
integration of practices and information across heterogeneous care
networks. The scenario is declined in terms of architectural components
and cooperation-oriented mechanisms that make the support
reactive to the evolution of the context where these communities
operate.
Abstract: Phytases (myo-inositol hexakisphosphate
phosphohydrolases; EC 3.1.3.8) catalyze the hydrolysis of phytic acid
(myoinositol hexakisphosphate) to the mono-, di-, tri-, tetra-, and
pentaphosphates of myo-inositol and inorganic phosphate.
Therrmophilic bacteria isolated from water sampled from hot spring.
About 120 isolates of bacteria were successfully isolated form hot
spring water sample and tested for extracellular phytase producing.
After 5 passages of the screening on the PSM media, 4 isolates were
found stable in producing phytase enzyme. The 16s RDNA
sequencing for identification of bacteria using molecular technique
revealed that all isolates those positive in phytase producing are
belong to Geobacillus spp. And Anoxybacillus spp. Anoxybacillus
rupiensis UniSZA-7 were identified for their carbon source utilization
using Phenotype Microarray Plate of Biolog and found they utilize
several kind of carbon source provided.
Abstract: Learning is the acquisition of new mental schemata, knowledge, abilities and skills which can be used to solve problems potentially more successfully. The learning process is optimum when it is assisted and personalized. Learning is not a single activity, but should involve many possible activities to make learning become meaningful. Many e-learning applications provide facilities to support teaching and learning activities. One way to identify whether the e-learning system is being used by the learners is through the number of hits that can be obtained from the e-learning system's log data. However, we cannot rely solely to the number of hits in order to determine whether learning had occurred meaningfully. This is due to the fact that meaningful learning should engage five characteristics namely active, constructive, intentional, authentic and cooperative. This paper aims to analyze the e-learning activities that is meaningful to learning. By focusing on the meaningful learning characteristics, we match it to the corresponding Moodle e-learning activities. This analysis discovers the activities that have high impact to meaningful learning, as well as activities that are less meaningful. The high impact activities is given high weights since it become important to meaningful learning, while the low impact has less weight and said to be supportive e-learning activities. The result of this analysis helps us categorize which e-learning activities that are meaningful to learning and guide us to measure the effectiveness of e-learning usage.
Abstract: Augmented Reality (AR) shows great promises for
its usage as a tool for simulation and verification of design proposal
of new technological systems. Main advantage of augmented reality
application usage is possibility of creation and simulation of new
technological unit before its realization. This may contribute to
increasing of safety and ergonomics and decreasing of economical
aspects of new proposed unit. Virtual model of proposed workcell
could reveal hidden errors which elimination in later stage of new
workcell creation should cause great difficulties. Paper describes
process of such virtual model creation and possibilities of its
simulation and verification by augmented reality tools.
Abstract: This paper studied the synthesis of monoacylglycerol (monolaurin) by glycerolysis of coconut oil and crude glycerol, catalyzed by Carica papaya lipase. Coconut oil obtained from cold pressed extraction method and crude glycerol obtained from the biodiesel plant in Department of Chemistry, Uttaradit Rajabhat University, Thailand which used oils were used as raw materials for biodiesel production through transesterification process catalyzed by sodium hydroxide. The influences of the following variables were studied: (i) type of organic solvent, (ii) molar ratio of substrate, (iii) reaction temperature, (iv) reaction time, (v) lipase dosage, and (vi) initial water activity of enzyme. High yields in monoacylglycerol (58.35%) were obtained with molar ratio of glycerol to oil at 8:1 in ethanol, temperature was controlled at 45oC for 36 hours, the amount of enzyme used was 20 wt% of oil and initial water activity of enzyme at 0.53.