Abstract: The purpose of this research is to study motivation
factors and also to study factors relation to job performance to
compare motivation factors under the personal factor classification
such as gender, age, income, educational level, marital status, and
working duration; and to study the relationship between Motivation
Factors and Job Performance with job satisfactions. The sample
groups utilized in this research were 400 Suan Sunandha Rajabhat
University employees. This research is a quantitative research using
questionnaires as research instrument. The statistics applied for data
analysis including percentage, mean, and standard deviation. In
addition, the difference analysis was conducted by t value computing,
one-way analysis of variance and Pearson’s correlation coefficient
computing. The findings of the study results were as follows the
findings showed that the aspects of job promotion and salary were at
the moderate levels. Additionally, the findings also showed that the
motivations that affected the revenue branch chiefs’ job performance
were job security, job accomplishment, policy and management, job
promotion, and interpersonal relation.
Abstract: Repeated observation of a given area over time yields
potential for many forms of change detection analysis. These
repeated observations are confounded in terms of radiometric
consistency due to changes in sensor calibration over time,
differences in illumination, observation angles and variation in
atmospheric effects.
This paper demonstrates applicability of an empirical relative
radiometric normalization method to a set of multitemporal cloudy
images acquired by Resourcesat1 LISS III sensor. Objective of this
study is to detect and remove cloud cover and normalize an image
radiometrically. Cloud detection is achieved by using Average
Brightness Threshold (ABT) algorithm. The detected cloud is
removed and replaced with data from another images of the same
area. After cloud removal, the proposed normalization method is
applied to reduce the radiometric influence caused by non surface
factors. This process identifies landscape elements whose reflectance
values are nearly constant over time, i.e. the subset of non-changing
pixels are identified using frequency based correlation technique. The
quality of radiometric normalization is statistically assessed by R2
value and mean square error (MSE) between each pair of analogous
band.
Abstract: The simulation of external aerodynamics is one of the most challenging and important automotive CFD applications. With the rapid developments of digital computers, CFD is used as a practical tool in modern fluid dynamics research. It integrates fluid mechanics disciplines, mathematics and computer science. In this study, two different types of simulations were made, one for the flow around a simplified high speed passenger car with a rear-spoiler and the other for the flow without a rear-spoiler. The standard k-ε model is selected to numerically simulate the external flow field of the simplified Camry model with or without a rear-spoiler. Through an analysis of the simulation results, a new rear spoiler is designed and it shows a mild reduction of the vehicle aerodynamics drag. This leads to less vehicle fuel consumption on the road.
Abstract: The process of wafer fabrication is arguably the most
technologically complex and capital intensive stage in semiconductor
manufacturing. This large-scale discrete-event process is highly reentrant,
and involves hundreds of machines, restrictions, and
processing steps. Therefore, production control of wafer fabrication
facilities (fab), specifically scheduling, is one of the most challenging
problems that this industry faces. Dispatching rules have been
extensively applied to the scheduling problems in semiconductor
manufacturing. Moreover, lot release policies are commonly used in
this manufacturing setting to further improve the performance of such
systems and reduce its inherent variability. In this work, simulation is
used in the scheduling of re-entrant flow shop manufacturing systems
with an application in semiconductor wafer fabrication; where, a
simulation model has been developed for the Intel Five-Machine Six
Step Mini-Fab using the ExtendTM simulation environment. The
Mini-Fab has been selected as it captures the challenges involved in
scheduling the highly re-entrant semiconductor manufacturing lines.
A number of scenarios have been developed and have been used to
evaluate the effect of different dispatching rules and lot release
policies on the selected performance measures. Results of simulation
showed that the performance of the Mini-Fab can be drastically
improved using a combination of dispatching rules and lot release
policy.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: The aim of this study was to assess the effect of LAB
isolated from Iranian native olives on the opportunistic skin
pathogens, Pseudomonas aeruginosa and Staphylococcus aureus.
Lactic Acid Bacteria were isolated from the brine of each sample in
the prior of time. The samples were spread on MRS agar for isolation
of lactobacillus and for lactococcus. 28 strains of labs were isolated.
The labs were centrifuged, the supernatant was strewed and pellet
was used to inoculation in wells or at blank disks. 20μl of each pellet
was inoculated to blank disks and 40μl of each pellet was inoculated
to each well. The result of disk and well diffusion agar against these
pathogens were confirmed each other. The size of inhibition zone
was different according to the type of bacteria, the method and the
concentrations of labs.
Abstract: There are reports of gas and oil wells fire due to different accidents. Many different methods are used for fire fighting in gas and oil industry. Traditional fire extinguishing techniques are mostly faced with many problems and are usually time consuming and needs lots of equipments. Besides, they cause damages to facilities, and create health and environmental problems. This article proposes innovative approach in fire extinguishing techniques in oil and gas industry, especially applicable for burning oil wells located offshore. Fire extinguishment employing a turbojet is a novel approach which can help to extinguishment the fire in short period of time. Divergent and convergent turbojets modeled in laboratory scale along with a high pressure flame were used. Different experiments were conducted to determine the relationship between output discharges of trumpet and oil wells. The results were corrected and the relationship between dimensionless parameters of flame and fire extinguishment distances and also the output discharge of turbojet and oil wells in specified distances are demonstrated by specific curves.
Abstract: In this paper we propose a new approach for flexible document categorization according to the document type or genre instead of topic. Our approach implements two homogenous classifiers: contextual classifier and logical classifier. The contextual classifier is based on the document URL, whereas, the logical classifier use the logical structure of the document to perform the categorization. The final categorization is obtained by combining contextual and logical categorizations. In our approach, each document is assigned to all predefined categories with different membership degrees. Our experiments demonstrate that our approach is best than other genre categorization approaches.
Abstract: This paper proposes a method that discovers sequential patterns corresponding to user-s interests from sequential data. This method expresses the interests as constraint patterns. The constraint patterns can define relationships among attributes of the items composing the data. The method recursively decomposes the constraint patterns into constraint subpatterns. The method evaluates the constraint subpatterns in order to efficiently discover sequential patterns satisfying the constraint patterns. Also, this paper applies the method to the sequential data composed of stock price indexes and verifies its effectiveness through comparing it with a method without using the constraint patterns.
Abstract: Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Abstract: The problem of controlling a two link robotic manipulator, consisting of a rotating and a prismatic links, is addressed. The actuations of both links are assumed to have unknown dead zone nonlinearities and friction torques modeled by LuGre friction model. Because of the existence of the unknown dead zone and friction torque at the actuations, unknown parameters and unmeasured states would appear to be part of the overall system dynamics that need for estimation. Unmeasured states observer, unknown parameters estimators, and robust adaptive control laws have been derived such that closed loop global stability is achieved. Simulation results have been performed to show the efficacy of the suggested approach.
Abstract: The inherent flexibilities of XML in both structure
and semantics makes mining from XML data a complex task with
more challenges compared to traditional association rule mining in
relational databases. In this paper, we propose a new model for the
effective extraction of generalized association rules form a XML
document collection. We directly use frequent subtree mining
techniques in the discovery process and do not ignore the tree
structure of data in the final rules. The frequent subtrees based on the
user provided support are split to complement subtrees to form the
rules. We explain our model within multi-steps from data preparation
to rule generation.
Abstract: This paper presents an automatic feature recognition
method based on center-surround difference detecting and fuzzy logic
that can be applied in ground-penetrating radar (GPR) image
processing. Adopted center-surround difference method, the salient
local image regions are extracted from the GPR images as features of
detected objects. And fuzzy logic strategy is used to match the
detected features and features in template database. This way, the
problem of objects detecting, which is the key problem in GPR image
processing, can be converted into two steps, feature extracting and
matching. The contributions of these skills make the system have the
ability to deal with changes in scale, antenna and noises. The results of
experiments also prove that the system has higher ratio of features
sensing in using GPR to image the subsurface structures.
Abstract: Supplier selection, in real situation, is affected by
several qualitative and quantitative factors and is one of the most
important activities of purchasing department. Since at the time of
evaluating suppliers against the criteria or factors, decision makers
(DMS) do not have precise, exact and complete information, supplier
selection becomes more difficult. In this case, Grey theory helps us
to deal with this problem of uncertainty. Here, we apply Technique
for Order Preference by Similarity to Ideal Solution (TOPSIS)
method to evaluate and select the best supplier by using interval
fuzzy numbers. Through this article, we compare TOPSIS with some
other approaches and afterward demonstrate that the concept of
TOPSIS is very important for ranking and selecting right supplier.
Abstract: The purpose of this paper is to analyze the case of the
U.S. Pivot and to suggest an appropriate model including entry
strategies and success factors for QPS of Cable TV. The
telecommunication companies have been operating QPS including
IPTV service, which enables them to cross over broadcasting areas.
Due to this circumstance, the Cable TV operators are now concerned
and are planning to add QPS with the mobile service. Based on the
Porter's five forces model, an analytical framework has been proposed
to MVNO in Cable TV industry in the United States. As a result of this
study, MVNO in Cable TV industry has to have a clear killer
application with their sufficient contents. Subsequently, the direction
of the future Cable TV industry is proposed.
Abstract: Single nucleotide polymorphisms (SNPs) hold much promise as a basis for disease-gene association. However, research is limited by the cost of genotyping the tremendous number of SNPs. Therefore, it is important to identify a small subset of informative SNPs, the so-called tag SNPs. This subset consists of selected SNPs of the genotypes, and accurately represents the rest of the SNPs. Furthermore, an effective evaluation method is needed to evaluate prediction accuracy of a set of tag SNPs. In this paper, a genetic algorithm (GA) is applied to tag SNP problems, and the K-nearest neighbor (K-NN) serves as a prediction method of tag SNP selection. The experimental data used was taken from the HapMap project; it consists of genotype data rather than haplotype data. The proposed method consistently identified tag SNPs with considerably better prediction accuracy than methods from the literature. At the same time, the number of tag SNPs identified was smaller than the number of tag SNPs in the other methods. The run time of the proposed method was much shorter than the run time of the SVM/STSA method when the same accuracy was reached.
Abstract: The electrolyte stirring method of anodization etching
process for manufacturing porous silicon (PS) is reported in this work.
Two experimental setups of nature air stirring (PS-ASM) and
electrolyte stirring (PS-ESM) are employed to clarify the influence of
stirring mechanisms on electrochemical etching process. Compared to
traditional fabrication without any stirring apparatus (PS-TM), a large
plateau region of PS surface structure is obtained from samples with
both stirring methods by the 3D-profiler measurement. Moreover, the
light emission response is also improved by both proposed electrolyte
stirring methods due to the cycling force in electrolyte could
effectively enhance etch-carrier distribution while the electrochemical
etching process is made. According to the analysis of statistical
calculation of photoluminescence (PL) intensity, lower standard
deviations are obtained from PS-samples with studied stirring methods,
i.e. the uniformity of PL-intensity is effectively improved. The
calculated deviations of PL-intensity are 93.2, 74.5 and 64,
respectively, for PS-TM, PS-ASM and PS-ESM.
Abstract: The aim of this study is to discuss the relationship between tourist awareness of environmental issues and their own recreational behaviors in the Taipei Guandu Wetland. A total of 392 questionnaires were gathered for data analysis using descriptive statistics, t-testing, one-way analysis of variance (ANOVA) and least significant difference (LSD) post hoc comparisons. The results showed that most of the visitors there enjoying the beautiful scenery are 21 to 30 years old with a college education. The means and standard deviations indicate that tourists express a positive degree of cognition of environmental issues and recreational behaviors. They suggest that polluting the environment is harmful to the natural ecosystem and that the natural resources of ecotourism are fragile, as well as expressing a high degree of recognition of the need to protect wetlands. Most of respondents are cognizant of the regulations proposed by the Guandu Wetland administration which asks that users exercise self-control and follow recommended guidelines when traveling the wetland. There were significant differences in the degree of cognition related to the variables of age, number of visits and reasons for visiting. We found that most respondents with relatively high levels of education would like to learn more about the wetland and are supportive of its conservation.
Abstract: In this paper, a novel deinterlacing algorithm is
proposed. The proposed algorithm approximates the distribution of the
luminance into a polynomial function. Instead of using one
polynomial function for all pixels, different polynomial functions are
used for the uniform, texture, and directional edge regions. The
function coefficients for each region are computed by matrix
multiplications. Experimental results demonstrate that the proposed
method performs better than the conventional algorithms.
Abstract: We address the problem of joint beamforming and multipath channel parameters estimation in Wideband Code Division Multiple Access (WCDMA) communication systems that employ Multiple-Access Interference (MAI) suppression techniques in the uplink (from mobile to base station). Most of the existing schemes rely on time multiplex a training sequence with the user data. In WCDMA, the channel parameters can also be estimated from a code multiplexed common pilot channel (CPICH) that could be corrupted by strong interference resulting in a bad estimate. In this paper, we present new methods to combine interference suppression together with channel estimation when using multiple receiving antennas by using adaptive signal processing techniques. Computer simulation is used to compare between the proposed methods and the existing conventional estimation techniques.