Abstract: The objective of this research was to study the
influence of marketing mix on customers purchasing behavior. A
total of 397 respondents were collected from customers who were the
patronages of the Chatuchak Plaza market. A questionnaire was
utilized as a tool to collect data. Statistics utilized in this research
included frequency, percentage, mean, standard deviation, and
multiple regression analysis. Data were analyzed by using Statistical
Package for the Social Sciences. The findings revealed that the
majority of respondents were male with the age between 25-34 years
old, hold undergraduate degree, married and stay together. The
average income of respondents was between 10,001-20,000 baht. In
terms of occupation, the majority worked for private companies. The
research analysis disclosed that there were three variables of
marketing mix which included price (X2), place (X3), and product
(X1) which had an influence on the frequency of customer
purchasing. These three variables can predict a purchase about 30
percent of the time by using the equation; Y1 = 6.851 + .921(X2) +
.949(X3) + .591(X1). It also found that in terms of marketing mixed,
there were two variables had an influence on the amount of customer
purchasing which were physical characteristic (X6), and the process
(X7). These two variables are 17 percent predictive of a purchasing
by using the equation: Y2 = 2276.88 + 2980.97(X6) + 2188.09(X7).
Abstract: This study aims to identify cellular phone users- shopping motivating factors towards online shopping. 100 university students located in Klang Valley, Malaysia were involved as the respondents. They were required to complete a set of questionnaire and had to own a cellular phone in order to be selected as sample in this study. Three from five proposed hypotheses were supported: purchasing information, shopping utilities and service quality. As a result, marketers and retailers should concentrate more on the less important factors in order to encourage and create willingness of the consumers to purchase online. Recommendation for future research is also presented.
Abstract: This paper presents a novel method for inferring the
odor based on neural activities observed from rats- main olfactory
bulbs. Multi-channel extra-cellular single unit recordings were done
by micro-wire electrodes (tungsten, 50μm, 32 channels) implanted in
the mitral/tufted cell layers of the main olfactory bulb of anesthetized
rats to obtain neural responses to various odors. Neural response
as a key feature was measured by substraction of neural firing rate
before stimulus from after. For odor inference, we have developed a
decoding method based on the maximum likelihood (ML) estimation.
The results have shown that the average decoding accuracy is about
100.0%, 96.0%, 84.0%, and 100.0% with four rats, respectively. This
work has profound implications for a novel brain-machine interface
system for odor inference.
Abstract: The genus Fumaria L. (Papaveraceae) in Iran
comprises 8 species with a vast medicinal use in Asian folk
medicine. These herbs are considered to be useful in the
treatment of gastrointestinal disease and skin disorders.
Antioxidant activities of alkaloids and phenolic extracts of
these species had been studied previously. These species are:
F. officinalis, F. parviflora, F. asepala, F. densiflora, F.
schleicheri, F. vaillantii and F. indica. More than 50
populations of Fumaria species were sampled from nature. In
this study different fatty acids are extracted. Their picks were
recorded by GC technique. This species contain some kind of
fatty acids with antioxidant effects. A part of these lipids are
phospholipids. As these are unsaturated fatty acids they may
have industrial use as natural additive to cosmetics, dermal
and oral medicines. The presences of different materials are
discussed. Our studies for antioxidant effects of these
substances are continued.
Abstract: The aim of this study is to test the “work values"
inventory developed by Tevruz and Turgut and to utilize the concept
in a model, which aims to create a greater understanding of the work
experience. In the study multiple effects of work values, work-value
congruence and work centrality on organizational citizenship
behavior are examined. In this respect, it is hypothesized that work
values and work-value congruence predict organizational citizenship
behavior through work centrality. Work-goal congruence test, Tevruz
and Turgut-s work values inventory are administered along with
Kanungo-s work centrality and Podsakoff et al.-s [47] organizational
citizenship behavior test to employees working in Turkish SME-s.
The study validated that Tevruz and Turgut-s work values inventory
and the work-value congruence test were reliable and could be used
for future research. The study revealed the mediating role of work
centrality only for the relationship of work values and the
responsibility dimension of citizenship behavior. Most important, this
study brought in an important concept, work-value congruence,
which enables a better understanding of work values and their
relation to various attitudinal variables.
Abstract: The paper presents a space-vector pulse width modulation (SVPWM) inverter feeding a permanent-magnet synchronous motor (PMSM). The SVPWM inverter enables to feed the motor with a higher voltage with low harmonic distortions than the conventional sinusoidal PWM inverter. The control strategy of the inverter is the voltage / frequency control method, which is based on the space-vector modulation technique. The proposed PMSM drive system involving the field-oriented control scheme not only decouples the torque and flux which provides faster response but also makes the control task easy. The performance of the proposed drive is simulated. The advantages of the proposed drive are confirmed by the simulation results.
Abstract: The proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch. Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive protection for web application. WAF is a negative security model where the detection and prevention mechanisms are based on predefined or user-defined attack signatures and patterns. However, WAF alone is not adequate to offer best defensive system against web vulnerabilities that are increasing in number and complexity daily. This paper presents a methodology to automatically design a positive security based model which identifies and allows only legitimate web queries. The paper shows a true positive rate of more than 90% can be achieved.
Abstract: In this paper, three types of defected ground structure
(DGS) units which are triangular-head (TH), rectangular-head (RH)
and U-shape (US) are investigated. They are further used to low-pass
and band-pass filters designs (LPF and BPF) and the obtained
performances are examined. The LPF employing RH-DGS geometry
presents the advantages of compact size, low-insertion loss and wide
stopband compared to the other filters. It provides cutoff frequency of
2.5 GHz, largest rejection band width of 20 dB from 2.98 to 8.76
GHz, smallest transition region and smallest sharpness of the cutoff
frequency. The BPF based on RH-DGS has the highest bandwidth
(BW) of about 0.74 GHz and the lowest center frequency of 3.24
GHz, whereas the other BPFs have BWs less than 0.7 GHz.
Abstract: System development life cycle (SDLC) is a
process uses during the development of any system. SDLC
consists of four main phases: analysis, design, implement and
testing. During analysis phase, context diagram and data flow
diagrams are used to produce the process model of a system.
A consistency of the context diagram to lower-level data flow
diagrams is very important in smoothing up developing
process of a system. However, manual consistency check from
context diagram to lower-level data flow diagrams by using a
checklist is time-consuming process. At the same time, the
limitation of human ability to validate the errors is one of the
factors that influence the correctness and balancing of the
diagrams. This paper presents a tool that automates the
consistency check between Data Flow Diagrams (DFDs)
based on the rules of DFDs. The tool serves two purposes: as
an editor to draw the diagrams and as a checker to check the
correctness of the diagrams drawn. The consistency check
from context diagram to lower-level data flow diagrams is
embedded inside the tool to overcome the manual checking
problem.
Abstract: Persuasive technology has been applied in marketing,
health, environmental conservation, safety and other domains and is
found to be quite effective in changing people-s attitude and
behaviours. This research extends the application domains of
persuasive technology to information security awareness and uses a
theory-driven approach to evaluate the effectiveness of a web-based
program developed based on the principles of persuasive technology
to improve the information security awareness of end users. The
findings confirm the existence of a very strong effect of the webbased
program in raising users- attitude towards information security
aware behavior. This finding is useful to the IT researchers and
practitioners in developing appropriate and effective education
strategies for improving the information security attitudes for endusers.
Abstract: This research explores on the development of the structure of Carbon Credit Registry System those accords to the need of future events in Thailand. This research also explores the big picture of every connected system by referring to the design of each system, the Data Flow Diagram, and the design in term of the system-s data using DES standard. The purpose of this paper is to show how to design the model of each system. Furthermore, this paper can serve as guideline for designing an appropriate Carbon Credit Registry System.
Abstract: Image compression plays a vital role in today-s
communication. The limitation in allocated bandwidth leads to
slower communication. To exchange the rate of transmission in the
limited bandwidth the Image data must be compressed before
transmission. Basically there are two types of compressions, 1)
LOSSY compression and 2) LOSSLESS compression. Lossy
compression though gives more compression compared to lossless
compression; the accuracy in retrievation is less in case of lossy
compression as compared to lossless compression. JPEG, JPEG2000
image compression system follows huffman coding for image
compression. JPEG 2000 coding system use wavelet transform,
which decompose the image into different levels, where the
coefficient in each sub band are uncorrelated from coefficient of
other sub bands. Embedded Zero tree wavelet (EZW) coding exploits
the multi-resolution properties of the wavelet transform to give a
computationally simple algorithm with better performance compared
to existing wavelet transforms. For further improvement of
compression applications other coding methods were recently been
suggested. An ANN base approach is one such method. Artificial
Neural Network has been applied to many problems in image
processing and has demonstrated their superiority over classical
methods when dealing with noisy or incomplete data for image
compression applications. The performance analysis of different
images is proposed with an analysis of EZW coding system with
Error Backpropagation algorithm. The implementation and analysis
shows approximately 30% more accuracy in retrieved image
compare to the existing EZW coding system.
Abstract: Most papers model Joint Replenishment Problem
(JRP) as a (kT,S) where kT is a multiple value for a common review
period T,and S is a predefined order up to level. In general the (T,S)
policy is characterized by a long out of control period which requires
a large amount of safety stock compared to the (R,Q) policy. In this
paper a probabilistic model is built where an item, call it item(i),
with the shortest order time between interval (T)is modeled under
(R,Q) policy and its inventory is continuously reviewed, while the
rest of items (j) are periodically reviewed at a definite time
corresponding to item
Abstract: The performance of high-resolution schemes is investigated for unsteady, inviscid and compressible multiphase flows. An Eulerian diffuse interface approach has been chosen for the simulation of multicomponent flow problems. The reduced fiveequation and seven equation models are used with HLL and HLLC approximation. The authors demonstrated the advantages and disadvantages of both seven equations and five equations models studying their performance with HLL and HLLC algorithms on simple test case. The seven equation model is based on two pressure, two velocity concept of Baer–Nunziato [10], while five equation model is based on the mixture velocity and pressure. The numerical evaluations of two variants of Riemann solvers have been conducted for the classical one-dimensional air-water shock tube and compared with analytical solution for error analysis.
Abstract: Renewable energy systems are becoming a topic of
great interest and investment in the world. In recent years wind
power generation has experienced a very fast development in the
whole world. For planning and successful implementations of good
wind power plant projects, wind potential measurements are
required. In these projects, of great importance is the effective choice
of the micro location for wind potential measurements, installation of
the measurement station with the appropriate measuring equipment,
its maintenance and analysis of the gained data on wind potential
characteristics. In this paper, a wavelet transform has been applied to
analyze the wind speed data in the context of insight in the
characteristics of the wind and the selection of suitable locations that
could be the subject of a wind farm construction. This approach
shows that it can be a useful tool in investigation of wind potential.
Abstract: Determining depth of anesthesia is a challenging problem
in the context of biomedical signal processing. Various methods
have been suggested to determine a quantitative index as depth of
anesthesia, but most of these methods suffer from high sensitivity
during the surgery. A novel method based on energy scattering of
samples in the wavelet domain is suggested to represent the basic
content of electroencephalogram (EEG) signal. In this method, first
EEG signal is decomposed into different sub-bands, then samples
are squared and energy of samples sequence is constructed through
each scale and time, which is normalized and finally entropy of the
resulted sequences is suggested as a reliable index. Empirical Results
showed that applying the proposed method to the EEG signals can
classify the awake, moderate and deep anesthesia states similar to
BIS.
Abstract: This paper presents an adaptive motion estimator
that can be dynamically reconfigured by the best algorithm
depending on the variation of the video nature during the lifetime
of an application under running. The 4 Step Search (4SS) and the
Gradient Search (GS) algorithms are integrated in the estimator in
order to be used in the case of rapid and slow video sequences
respectively. The Full Search Block Matching (FSBM) algorithm
has been also integrated in order to be used in the case of the
video sequences which are not real time oriented.
In order to efficiently reduce the computational cost while
achieving better visual quality with low cost power, the proposed
motion estimator is based on a Variable Block Size (VBS) scheme
that uses only the 16x16, 16x8, 8x16 and 8x8 modes.
Experimental results show that the adaptive motion estimator
allows better results in term of Peak Signal to Noise Ratio
(PSNR), computational cost, FPGA occupied area, and dissipated
power relatively to the most popular variable block size schemes
presented in the literature.
Abstract: Lighvan cheese is basically made from sheep milk in
the area of Sahand mountainside which is located in the North West
of Iran. The main objective of this study was to investigate the effect
of enterococci isolated from traditional Lighvan cheese on the quality
of Iranian UF white during ripening. The experimental design was
split plot based on randomized complete blocks, main plots were four
types of starters and subplots were different ripening durations.
Addition of Enterococcus spp. did not significantly (P
Abstract: In high bitrate information hiding techniques, 1 bit is
embedded within each 4 x 4 Discrete Cosine Transform (DCT)
coefficient block by means of vector quantization, then the hidden bit
can be effectively extracted in terminal end. In this paper high bitrate
information hiding algorithms are summarized, and the scheme of
video in video is implemented. Experimental result shows that the host
video which is embedded numerous auxiliary information have little
visually quality decline. Peak Signal to Noise Ratio (PSNR)Y of host
video only degrades 0.22dB in average, while the hidden information
has a high percentage of survives and keeps a high robustness in
H.264/AVC compression, the average Bit Error Rate(BER) of hiding
information is 0.015%.
Abstract: Three novel and significant contributions are made in
this paper Firstly, non-recursive formulation of Haar connection
coefficients, pioneered by the present authors is presented, which
can be computed very efficiently and avoid stack and memory
overflows. Secondly, the generalized approach for state analysis of
singular bilinear time-invariant (TI) and time-varying (TV) systems
is presented; vis-˜a-vis diversified and complex works reported by
different authors. Thirdly, a generalized approach for parameter
estimation of bilinear TI and TV systems is also proposed. The unified
framework of the proposed method is very significant in that the
digital hardware once-designed can be used to perform the complex
tasks of state analysis and parameter estimation of different types
of bilinear systems single-handedly. The simplicity, effectiveness and
generalized nature of the proposed method is established by applying
it to different types of bilinear systems for the two tasks.