Abstract: This paper analysis the integrated use of safety monitoring with the domestic and international latest research on rail safety protection system, and focus on the implementation of an organic whole system, with the monitoring and early warning, risk assessment, predictive control and emergency rescue system. The system framework, contents and system structure of Security system is proposed completely. It-s pointed out that the Security system is a negative feedback system composed of by safety monitoring and warning system, risk assessment and emergency rescue system. Safety monitoring and warning system focus on the monitoring target monitoring, early warning, tracking, integration of decision-making, for objective and subjective risks factors. Risk assessment system analysis the occurrence of a major Security risk mechanism, determines the standard of the future short, medium and long term safety conditions, and give prop for development of safety indicators, accident analysis and safety standards. Emergency rescue system is with the goal of rapid and effective rescue work for accident, to minimize casualties and property losses.
Abstract: The events of October 2010, where terrorists managed to get explosive devices onboard of three passenger aircrafts and two air freighters, demonstrated weaknesses of the international air cargo and airmail security. Ever since, postal security has gained interest among policymakers and authorities. This study augments the limited body of academic literature on the topic bydemarcating areas of postal security, identifying relevant stakeholders in each area, and investigating why these stakeholders engage in postal security. Research is based on a case study on Swiss Post’s mail service.
Abstract: In order to develop any strategy, it is essential to first
identify opportunities, threats, weak and strong points. Assessment of
technology level provides the possibility of concentrating on weak
and strong points. The results of technology assessment have a direct
effect on decision making process in the field of technology transfer
or expansion of internal research capabilities so it has a critical role
in technology management. This paper presents a conceptual model
to analyze the technology capability of a company as a whole and in
four main aspects of technology. This model was tested on 10
automotive parts manufacturers in IRAN. Using this model,
capability level of manufacturers was investigated in four fields of
managing aspects, hard aspects, human aspects, and information and
knowledge aspects. Results show that these firms concentrate on hard
aspect of technology while others aspects are poor and need to be
supported more. So this industry should develop other aspects of
technology as well as hard aspect to have effective and efficient use
of its technology. These paper findings are useful for the technology
planning and management in automotive part manufactures in IRAN
and other Industries which are technology followers and transport
their needed technologies.
Abstract: The purpose of this research was to study five vital
factors related to employees’ job performance. A total of 250
respondents were sampled from employees who worked at a public
warehouse organization, Bangkok, Thailand. Samples were divided
into two groups according to their work experience. The average
working experience was about 9 years for group one and 28 years for
group two. A questionnaire was utilized as a tool to collect data.
Statistics utilized in this research included frequency, percentage,
mean, standard deviation, t-test analysis, one way ANOVA, and
Pearson Product-moment correlation coefficient. Data were analyzed
by using Statistical Package for the Social Sciences. The findings
disclosed that the majority of respondents were female between 23-
31 years old, single, and hold an undergraduate degree. The average
income of respondents was less than 30,900 baht. The findings also
revealed that the factors of organization chart awareness, job process
and technology, internal environment, employee loyalty, and policy
and management were ranked as medium level. The hypotheses
testing revealed that difference in gender, age, and position had
differences in terms of the awareness of organization chart, job
process and technology, internal environment, employee loyalty, and
policy and management in the same direction with low level.
Abstract: The present study examines the mediating effect of
online flow experience on the relationship between extraversionintroversion,
locus of control and loneliness, and depression and
satisfaction with life. The data was obtained using a structured
questionnaire prepared by adapting standardized scales available from
a sample of 102 engineering students from different technical
institutions at Bhubaneswar, India. The results indicate that there is a
positive significant relationship between introversion, external locus
of control, loneliness, depression and online flow experience, and
extraversion, internal locus of control and satisfaction with life. The
results also suggest that online flow experience mediates the
relationship between the aforementioned variables.
Abstract: The demand of hydrocarbons has increased the
construction of pipelines and the protection of the physical and
mechanical integrity of the already existing infrastructure. Corrosion
is the main reason of failures in the pipeline and it is mostly produced
by acid (HCOOCH3). In this basis, a CFD code was used, in order to
study the corrosion of internal wall of hydrocarbons pipeline. In this
situation, the corrosion phenomenon shows a growing deposit, which
causes defect damages (welding or fabrication) at diverse positions
along the pipeline. The solution of the pipeline corrosion is based on
the diminution of the Naphthenic acid.
Abstract: In this paper the problems associated with immunity
of embedded systems used in Motor-Drive systems are investigated
and appropriate solutions are presented. Integration of VSD motor
systems (Integral Motor) while partially reducing some of these
effects, adds to immunity problem of their embedded systems. Fail
safe operation of an Integral Motor in arduous industrial
environments is considered. In this paper an integral motor with a
unique design is proposed to overcome critical issues such as heat,
vibration and electromagnetic interference which are damaging to
sensitive electronics without requirement of any additional cooling
system. Advantages of the proposed Integral motor are compactness
of combo motor and drive system with no external cabling/wiring.
This motor provides a perfect shielding for least amount of radiated
emission. It has an inbuilt filter for EMC compliance and has been
designed to provide lower EMC noise for immunity of the internal
electronics as well as the other neighbouring systems.
Abstract: Despite extensive study on wireless sensor network
security, defending internal attacks and finding abnormal behaviour
of the sensor are still difficult and unsolved task. The conventional
cryptographic technique does not give the robust security or detection
process to save the network from internal attacker that cause by
abnormal behavior. The insider attacker or abnormally behaved
sensor identificationand location detection framework using false
massage detection and Time difference of Arrival (TDoA) is
presented in this paper. It has been shown that the new framework
can efficiently identify and detect the insider attacker location so that
the attacker can be reprogrammed or subside from the network to
save from internal attack.
Abstract: Service innovations are central concerns in fast
changing environment. Due to the fitness in customer demands and
advances in information technologies (IT) in service management, an
expanded conceptualization of e-service innovation is required.
Specially, innovation practices have become increasingly more
challenging, driving managers to employ a different open innovation
model to maintain competitive advantages. At the same time, firms
need to interact with external and internal customers in innovative
environments, like the open innovation networks, to co-create values.
Based on these issues, an important conceptual framework of e-service
innovation is developed. This paper aims to examine the contributing
factors on e-service innovation and firm performance, including
financial and non-financial aspects. The study concludes by showing
how e-service innovation will play a significant role in growing the
overall values of the firm. The discussion and conclusion will lead to a
stronger understanding of e-service innovation and co-creating values
with customers within open innovation networks.
Abstract: To comply with the international human right
legislation concerning the freedom of movement, transport systems
are required to be made accessible in order that all citizens, regardless
of their physical condition, have equal possibilities to use them. In
Hungary, apparently there is a considerable default in the
improvement of accessible public transport. This study is aiming to
overview the current Hungarian situation and to reveal the reasons of
the deficiency. The result shows that in spite of the relatively
favourable juridical background linked to the accessibility needs and
to the rights of persons with disabilities there is a strong delay in
putting all in practice in the field of public transport. Its main reason
is the lack of financial resource and referring to this the lack of
creating mandatory regulations. In addition to this the proprietary
rights related to public transport are also variable, which also limits
the improvement possibilities. Consequently, first of all an accurate
and detailed regulatory procedure is expected to change the present
unfavourable situation and to create the conditions of the fast
realization, which is already behind time.
Abstract: The current study begins with an awareness that
today-s media environment is characterized by technological
development and a new way of reading caused by the introduction of
the Internet. The researcher conducted a meta analysis framed within
Technological Determinism to investigate the process of hypertext
reading, its differences from linear reading and the effects such
differences can have on people-s ways of mentally structuring their
world. The relationship between literacy and the comprehension
achieved by reading hypertexts is also investigated. The results show
hypertexts are not always user friendly. People experience hyperlinks
as interruptions that distract their attention generating comprehension
and disorientation. On one hand hypertextual jumping reading
generates interruptions that finally make people lose their
concentration. On the other hand hypertexts fascinate people who
would rather read a document in such a format even though the
outcome is often frustrating and affects their ability to elaborate and
retain information.
Abstract: Nowadays, computer worms, viruses and Trojan horse
become popular, and they are collectively called malware. Those
malware just spoiled computers by deleting or rewriting important
files a decade ago. However, recent malware seems to be born to earn
money. Some of malware work for collecting personal information so
that malicious people can find secret information such as password for
online banking, evidence for a scandal or contact address which relates
with the target. Moreover, relation between money and malware
becomes more complex. Many kinds of malware bear bots to get
springboards. Meanwhile, for ordinary internet users,
countermeasures against malware come up against a blank wall.
Pattern matching becomes too much waste of computer resources,
since matching tools have to deal with a lot of patterns derived from
subspecies. Virus making tools can automatically bear subspecies of
malware. Moreover, metamorphic and polymorphic malware are no
longer special. Recently there appears malware checking sites that
check contents in place of users' PC. However, there appears a new
type of malicious sites that avoids check by malware checking sites. In
this paper, existing protocols and methods related with the web are
reconsidered in terms of protection from current attacks, and new
protocol and method are indicated for the purpose of security of the
web.
Abstract: Educational reforms are focused point of different
nations. New reform movements generally claim that something is
wrong with the current state of affairs, and that the system is deficient in its goals, its accomplishments and it is accused not being
adopted into global changes all over the world. It is the same for
Turkish education system. It is considered those recent reforms of
teacher education in Turkey and the extent to which they reflect a
response to global economic pressures. The paper challenges the
view that such imposes are inevitable determinants of educational
policy and argues that any country will need to develop its own
national approach to modernizing teacher education in light of the
global context and its particular circumstances. It draws on the idea
of reflexive modernization developed by educators and discusses its
implications for teacher education policy. The paper deals with four
themes teacher education in last decade policy in Turkey; the shift
away from the educational disciplines, the shift towards school-based
approaches, and the emergence of more centralized forms of
accountability of teacher competence.
Abstract: This paper deals with a design method of a discrete
modified Internal Model Control (IMC) for a plant with an integrator
and dead time. If there is a load disturbance in the input or output side
of the plant, the proposed control system can eliminate the steady-state
error caused by it. The disturbance compensator in this method is
simple and its order is low regardless of that of a plant. The simulation
studies show that the proposed method has superior performance for a
load disturbance rejection and robustness.
Abstract: Increasing use of cell phone as a medium of human interaction is playing a vital role in solving riddles of crime as well. A young girl went missing from her home late in the evening in the month of August, 2008 when her enraged relatives and villagers physically assaulted and chased her fiancée who often frequented her home. Two years later, her mother lodged a complaint against the relatives and the villagers alleging that after abduction her daughter was either sold or killed as she had failed to trace her. On investigation, a rusted cell phone with partial visible IMEI number, clothes, bangles, human skeleton etc. recovered from abandoned well in the month of May, 2011 were examined in the lab. All hopes pinned on identity of cell phone, for only linking evidence to fix the scene of occurrence supported by call detail record (CDR) and to dispel doubts about mode of sudden disappearance or death as DNA technology did not help in establishing identity of the deceased. The conventional scientific methods were used without success and international mobile equipment identification number of the cell phone could be generated by using statistical analysis followed by online verification.
Abstract: With the rapid growth and development of information and communication technology, the Internet has played a definite and irreplaceable role in people-s social lives in Taiwan like in other countries. In July 2008, on a general social website, an unexpected phenomenon was noticed – that there were more than one hundred users who started forming clubs voluntarily and having face-to-face gatherings for specific purposes. In this study, it-s argued whether or not teenagers- social contact on the Internet is involved in their life context, and tried to reveal the teenagers- social preferences, values, and needs, which merge with and influence teenagers- social activities. Therefore, the study conducts multiple user experience research methods, which include practical observations and qualitative analysis by contextual inquiries and in-depth interviews. Based on the findings, several design implications for software related to social interactions and cultural inheritance are offered. It is concluded that the inherent values of a social behaviors might be a key issue in developing computer-mediated communication or interaction designs in the future.
Abstract: This research tries to analyze the role that knowledge
about foreign markets has in increasing firms- exports in clustered
spaces. We consider two interrelated sources of knowledge: firms-
direct experience and indirect experience from other clustered firms –
export externalities. In particular, it is proposed that firms would
improve their export performance by accessing to export externalities
if they have some previous direct experience that allows them to
identify, understand and exploit them. Also, we propose that this
positive influence of previous direct experience on export
externalities keeps only up to a point, where it becomes negative,
creating an inverted “U" shape. Empirical evidence gathered among
wine producers located in La Rioja tends to confirm that firms enjoy
of export externalities if they have export experience along several
years and countries increase their export performance. While this
relationship becomes less relevant as they develop a higher
experience, we could not confirm the existence of a curvilinear
relationship in their influence on export externalities and export
performance.
Abstract: The purpose of this paper was to study motivation
factors affecting job performance effectiveness. This paper drew
upon data collected from an Internal Audit Staffs of Internal Audit
Line of Head Office of Krung Thai Public Company Limited.
Statistics used included frequency, percentage, mean and standard
deviation, t-test, and one-way ANOVA test. The finding revealed that
the majority of the respondents were female of 46 years of age and
over, married and live together, hold a bachelor degree, with an
average monthly income over 70,001 Baht. The majority of
respondents had over 15 years of work experience. They generally
had high working motivation as well as high job performance
effectiveness.
The hypotheses testing disclosed that employees with different
working status had different level of job performance effectiveness at
a 0.01 level of significance. Working motivation factors had an effect
on job performance in the same direction with high level. Individual
working motivation included working completion, reorganization,
working progression, working characteristic, opportunity,
responsibility, management policy, supervision, relationship with
their superior, relationship with co-worker, working position,
working stability, safety, privacy, working conditions, and payment.
All of these factors related to job performance effectiveness in the
same direction with medium level.
Abstract: The paper considers a novel modular and intrinsically safe redundant robotic system with biologically inspired actuators (pneumatic artificial muscles and rubber bellows actuators). Similarly to the biological systems, the stiffness of the internal parallel modules, representing 2 DOF joints in the serial robotic chains, is controlled by co-activation of opposing redundant actuator groups in the null-space of the module Jacobian, without influencing the actual robot position. The decoupled position/stiffness control allows the realization of variable joint stiffness according to different force-displacement relationships. The variable joint stiffness, as well as limited pneumatic muscle/bellows force ability, ensures internal system safety that is crucial for development of human-friendly robots intended for human-robot collaboration. The initial experiments with the system prototype demonstrate the capabilities of independently, simultaneously controlling both joint (Cartesian) motion and joint stiffness. The paper also presents the possible industrial applications of snake-like robots built using the new modules.
Abstract: Global environmental changes lead to increased frequency and scale of natural disaster, Taiwan is under the influence of global warming and extreme weather. Therefore, the vulnerability was increased and variability and complexity of disasters is relatively enhanced. The purpose of this study is to consider the source and magnitude of hazard characteristics on the tourism industry. Using modern risk management concepts, integration of related domestic and international basic research, this goes beyond the Taiwan typhoon disaster risk assessment model and evaluation of loss. This loss evaluation index system considers the impact of extreme weather, in particular heavy rain on the tourism industry in Taiwan. Consider the extreme climate of the compound impact of disaster for the tourism industry; we try to make multi-hazard risk assessment model, strategies and suggestions. Related risk analysis results are expected to provide government department, the tourism industry asset owners, insurance companies and banking include tourist disaster risk necessary information to help its tourism industry for effective natural disaster risk management.