Abstract: The objective of this research was to determine the
potency of indigenous acid-aluminium tolerant Bradyrhizobium
japonicum as producer of indole acetic acid (IAA) and applied it as
nitrogen fixation on local soybeans viz Anjasmoro, Tanggamus
(yellow soybean seeds), and Detam (black soybean seed). Three
isolates of acid-aluminium tolerant Bradyrhizobium japonicum (BJ)
were used in this research, i.e. BJ 11 (wt), BJ 11 (19) - BJ 11(wt)
mutant, and USDA 110 as a reference isolate. All of isolates tested to
produce the IAA by using Salkowsky method. Effect of IAA
production by each of B. japonicum was tested on growth pouch and
greenhouse using three varieties of soybean. All isolates could grow
well and produce IAA on yeast mannitol broth (YMB) medium in
the presence of 0.5 mM L-tryptophan. BJ 11 (19) produced the
highest of IAA at 4 days incubation compared to BJ 11 (wt) and
USDA 110. All tested isolates of Bradyrhizobium japonicum have
showed effect on stimulating the formation of root nodules in
soybean varieties grown on Leonard bottle. The concentration of
IAA on root nodules of soybean symbiotic with B. japonicum was
significantly different with control, except on the treatment using
Tanggamus soybean.
Abstract: The purpose of this study is to analyze the cognitive
and travel experience the situation of the tourist attraction of the sport
tourism in Penghu. This study used a questionnaires, the main island
of Taiwan to Penghu in the way of marine sports tourists adopted the
designated convenience sampling method, a total of 1447 valid
questionnaires. After statistical analysis, this study found that: 1.
Tourists to Penghu sports tourism attraction cognitive as “good air
quality, suitable for water activities". 2. Tourists in Penghu's tourism
experience, “Let me taste the delicious specialties and snacks". 3. The
attraction of the sport tourism, travel experience and perceived value
are correlated, and both the perceived value with a high degree of
predictive ability. Based on the findings of this study not only for
Penghu's tourism industry with the unit in charge of the proposed
operating and suggestions for future research to other researchers.
Abstract: The use of buffer thresholds, blocking and adequate
service strategies are well-known techniques for computer networks
traffic congestion control. This motivates the study of series queues
with blocking, feedback (service under Head of Line (HoL) priority
discipline) and finite capacity buffers with thresholds. In this paper,
the external traffic is modelled using the Poisson process and the
service times have been modelled using the exponential distribution.
We consider a three-station network with two finite buffers, for
which a set of thresholds (tm1 and tm2) is defined. This computer
network behaves as follows. A task, which finishes its service at
station B, gets sent back to station A for re-processing with
probability o. When the number of tasks in the second buffer exceeds
a threshold tm2 and the number of task in the first buffer is less than
tm1, the fed back task is served under HoL priority discipline. In
opposite case, for fed backed tasks, “no two priority services in
succession" procedure (preventing a possible overflow in the first
buffer) is applied. Using an open Markovian queuing schema with
blocking, priority feedback service and thresholds, a closed form
cost-effective analytical solution is obtained. The model of servers
linked in series is very accurate. It is derived directly from a twodimensional
state graph and a set of steady-state equations, followed
by calculations of main measures of effectiveness. Consequently,
efficient expressions of the low computational cost are determined.
Based on numerical experiments and collected results we conclude
that the proposed model with blocking, feedback and thresholds can
provide accurate performance estimates of linked in series networks.
Abstract: This study aims to explore the relationship between the
disposition effect and herding behavior of investors trading Taiwanese
information technology stocks. This study differs from previous
literature in two aspects. First, in contrast with the earlier studies that
focused on investigating investors’ herding behavior, this study
explores the possibility that the disposition effect drives investors’
herding behavior. Additionally, it takes an in-depth look at the
interdependence between the disposition effect and herding behavior
of investors, including lead-lag relationship and volatility transmission
effect. Empirical results show that investors trading Taiwan’s
information technology stocks exhibit pronounced herding behavior
and that the disposition effect has a great impact on their herding
behavior.
Abstract: Existing proceeding-models for the development of mechatronic systems provide a largely parallel action in the detailed development. This parallel approach is to take place also largely independent of one another in the various disciplines involved. An approach for a new proceeding-model provides a further development of existing models to use for the development of Adaptronic Systems. This approach is based on an intermediate integration and an abstract modeling of the adaptronic system. Based on this system-model a simulation of the global system behavior, due to external and internal factors or Forces is developed. For the intermediate integration a special data management system is used. According to the presented approach this data management system has a number of functions that are not part of the "normal" PDM functionality. Therefore a concept for a new data management system for the development of Adaptive system is presented in this paper. This concept divides the functions into six layers. In the first layer a system model is created, which divides the adaptronic system based on its components and the various technical disciplines. Moreover, the parameters and properties of the system are modeled and linked together with the requirements and the system model. The modeled parameters and properties result in a network which is analyzed in the second layer. From this analysis necessary adjustments to individual components for specific manipulation of the system behavior can be determined. The third layer contains an automatic abstract simulation of the system behavior. This simulation is a precursor for network analysis and serves as a filter. By the network analysis and simulation changes to system components are examined and necessary adjustments to other components are calculated. The other layers of the concept treat the automatic calculation of system reliability, the "normal" PDM-functionality and the integration of discipline-specific data into the system model. A prototypical implementation of an appropriate data management with the addition of an automatic system development is being implemented using the data management system ENOVIA SmarTeam V5 and the simulation system MATLAB.
Abstract: In this paper, the wear of high speed steel hobs during
hobbing has been studied. The wear mechanisms are strongly
influenced by the choice of cutting speed. At moderate and high
cutting speeds three major wear mechanisms were identified:
abrasion, mild adhesive and severe adhesive. The microstructure and
wear behavior of two high speed steel grades (M2 and ASP30) has
been compared. In contrast, a variation in chemical composition or
microstructure of HSS tool material generally did not change the
dominant wear mechanism. However, the tool material properties
determine the resistance against the operating wear mechanism and
consequently the tool life. The metallographic analysis and wear
measurement at the tip of hob teeth included scanning electron
microscopy and stereoscope microscopy. Roughness profilometery is
used for measuring the gear surface roughness.
Abstract: Cassava bagasse is one of major biomass wastes in Thailand from starch processing industry, which contains high starch content of about 60%. The object of this study was to investigate the optimal condition for hydrothermally pretreating cassava baggasses with or without acid addition. The pretreated samples were measured reducing sugar yield directly or after enzymatic hydrolysis (alpha-amylase). In enzymatic hydrolysis, the highest reducing sugar content was obtained under hydrothermal conditions for at 125oC for 30 min. The result shows that pretreating cassava baggasses increased the efficiency of enzymatic hydrolysis. For acid hydrolysis, pretreating cassava baggasses with sulfuric acid at 120oC for 60 min gave a maximum reducing sugar yield. In this study, sulfuric acid had a greater capacity for hydrolyzing cassava baggasses than phosphoric acid. In comparison, dilute acid hydrolysis to provide a higher yield of reducing sugar than the enzymatic hydrolysis combined hydrothermal pretreatment. However, enzymatic hydrolysis in a combination with hydrothermal pretreatment was an alternative to enhance efficiency reducing sugar production from cassava bagasse.
Abstract: Malaria is by far the world-s most persistent tropical parasitic disease and is endemic to tropical areas where the climatic and weather conditions allow continuous breeding of the mosquitoes that spread malaria. A mathematical model for the transmission of malaria with prophylaxis prevention is analyzed. The stability analysis of the equilibria is presented with the aim of finding threshold conditions under which malaria clears or persists in the human population. Our results suggest that eradication of mosquitoes and prophylaxis prevention can significantly reduce the malaria burden on the human population.
Abstract: These days MANET is attracting much attention as
they are expected to gratefully influence communication between
wireless nodes. Along with this great strength, there is much more
chance of leave and being attacked by a malicious node. Due to this
reason much attention is given to the security and the private issue in
MANET. A lot of research in MANET has been doing. In this paper
we present the overview of MANET, the security issues of MANET,
IP configuration in MANET, the solution to puzzle out the security
issues and the simulation of the proposal idea. We add the method to
figure out the malicious nodes so that we can prevent the attack from
them. Nodes exchange the information about nodes to prevent DAD
attack. We can get 30% better performance than the previous
MANETConf.
Abstract: This paper uses p-tolerance with the lowest posterior
loss, quadratic loss function, average length criteria, average
coverage criteria, and worst outcome criterion for computing of
sample size to estimate proportion in Binomial probability function
with Beta prior distribution. The proposed methodology is examined,
and its effectiveness is shown.
Abstract: This research aims to study the appropriate model of
Science teaching for students, academic achievement and to survey
students- attitudes toward using appropriate for students in
Mathayomsuksa 3 in Ang-Thong province. The research results were
as follows:
1. The appropriate model of Science teaching for Mathayomsuksa
3 students in Ang-Thong province including these following five
steps: Step 1. The introduction of the lessons. Step 2. Setting the
hypothesis. Step 3. Doing the experiment /survey. Step 4. Making
conclusion. Step 5. Applying to daily life or other subjects.
2. There is no significant difference between using appropriate
model teaching and regular teaching at 0.05 level significant
difference.
3. There is a significant difference between before and after
teaching using appropriate model of Science teaching at 0.05 level.
4. The satisfaction of students- attitudes to using the appropriate
model of Science teaching for students was in intermediate level.
Abstract: Firstly, research and development on RFID focuses on
manufacturing and retail sectors, because it can improve supply chain
efficiency. But, now a variety of field is considered the next research
area for Radio Frequency Identification (RFID). Although RFID is
infancy, RFID technology has great potential in power industry to
significantly reduce cost, and improve quality of power supply. To
complement the limitation of RFID, we adopt the WSN (Wireless
Sensor Network) technology. However, relevant experience is limited,
the challenge will be to derive requirement from business practice and
to determine whether it is possible or not. To explore this issue, we
conduct a case study on implementing power facility management
system using RFID/WSN in Korea Electric Power Corporation
(KEPCO). In this paper we describe requirement from power industry.
And we introduce design and implementation of the test bed.
Abstract: The present study examines the adsorption of phenol, 3-nitrophenol and dyes (methylene blue, alizarine yellow), from aqueous solutions onto a commercial activated carbon. Two different operations, semi-batch and continuous with reflux, were applied. The commercial activated carbon exhibits high adsorption abilities for phenol, 3-nitrophenol and dyes (methylene blue and alizarin yellow) from their aqueous solutions. The adsorption of all adsorbates after 1 h is higher by the continuous operation with reflux than by the semibatch operation. The adsorption of phenol is higher than that of 3-nitrophenol for both operations. Similarly, the adsorption of alizarin yellow is higher than that of methylene blue for both operations. The regenerated commercial activated carbon regains its adsorption ability due to the removal of the adsorbate from its pores during the regeneration.
Abstract: In this study, a new procedure for inspecting damages on LNG storage tanks was proposed with the use of structural diagnostic techniques: i.e., nondestructive inspection techniques such as macrography, the hammer sounding test, the Schmidt hammer test, and the ultrasonic pulse velocity test, and destructive inspection techniques such as the compressive strength test, the chloride penetration test, and the carbonation test. From the analysis of all the test results, it was concluded that the LNG storage tank cover was in good condition. Such results were also compared with the Korean concrete standard specifications and design values. In addition, the remaining life of the LNG storage tank was estimated by using existing models. Based on the results, an LNG storage tank cover performance evaluation procedure was suggested.
Abstract: Multimedia security is an incredibly significant area
of concern. A number of papers on robust digital watermarking have
been presented, but there are no standards that have been defined so
far. Thus multimedia security is still a posing problem. The aim of
this paper is to design a robust image-watermarking scheme, which
can withstand a different set of attacks. The proposed scheme
provides a robust solution integrating image moment normalization,
content dependent watermark and discrete wavelet transformation.
Moment normalization is useful to recover the watermark even in
case of geometrical attacks. Content dependent watermarks are a
powerful means of authentication as the data is watermarked with its
own features. Discrete wavelet transforms have been used as they
describe image features in a better manner. The proposed scheme
finds its place in validating identification cards and financial
instruments.
Abstract: In this paper, design, fabrication and coupled
multifield analysis of hollow out-of-plane silicon microneedle array
with piezoelectrically actuated microfluidic device for transdermal
drug delivery (TDD) applications is presented. The fabrication
process of silicon microneedle array is first done by series of
combined isotropic and anisotropic etching processes using
inductively coupled plasma (ICP) etching technology. Then coupled
multifield analysis of MEMS based piezoelectrically actuated device
with integrated 2×2 silicon microneedle array is presented. To predict
the stress distribution and model fluid flow in coupled field analysis,
finite element (FE) and computational fluid dynamic (CFD) analysis
using ANSYS rather than analytical systems has been performed.
Static analysis and transient CFD analysis were performed to predict
the fluid flow through the microneedle array. The inlet pressure from
10 kPa to 150 kPa was considered for static CFD analysis. In the
lumen region fluid flow rate 3.2946 μL/min is obtained at 150 V for
2×2 microneedle array. In the present study the authors have
performed simulation of structural, piezoelectric and CFD analysis
on three dimensional model of the piezoelectrically actuated
mcirofluidic device integrated with 2×2 microneedle array.
Abstract: This paper presents design and implements the
T-DOF PI controller design for a speed control of induction motor.
The voltage source inverter type space vector pulse width modulation
technique is used the drive system. This scheme leads to be able to
adjust the speed of the motor by control the frequency and amplitude
of the input voltage. The ratio of input stator voltage to frequency
should be kept constant. The T-DOF PI controller design by root
locus technique is also introduced to the system for regulates and
tracking speed response. The experimental results in testing the 120
watt induction motor from no-load condition to rated condition show
the effectiveness of the proposed control scheme.
Abstract: Wide applicability of concurrent programming
practices in developing various software applications leads to
different concurrency errors amongst which data race is the most
important. Java provides greatest support for concurrent
programming by introducing various concurrency packages. Aspect
oriented programming (AOP) is modern programming paradigm
facilitating the runtime interception of events of interest and can be
effectively used to handle the concurrency problems. AspectJ being
an aspect oriented extension to java facilitates the application of
concepts of AOP for data race detection. Volatile variables are
usually considered thread safe, but they can become the possible
candidates of data races if non-atomic operations are performed
concurrently upon them. Various data race detection algorithms have
been proposed in the past but this issue of volatility and atomicity is
still unaddressed. The aim of this research is to propose some
suggestions for incorporating certain conditions for data race
detection in java programs at the volatile fields by taking into account
support for atomicity in java concurrency packages and making use
of pointcuts. Two simple test programs will demonstrate the results
of research. The results are verified on two different Java
Development Kits (JDKs) for the purpose of comparison.
Abstract: Fuzzy sets theory affirmed that the linguistic value for
every contraries relation is complementary. It was stressed in the
intuitionistic fuzzy sets (IFS) that the conditions for contraries
relations, which are the fuzzy values, cannot be greater than one.
However, complementary in two contradict phenomena are not
always true. This paper proposes a new idea condition for conflicting
bifuzzy sets by relaxing the condition of intuitionistic fuzzy sets.
Here, we will critically forward examples using triangular fuzzy
number in formulating a new condition for conflicting bifuzzy sets
(CBFS). Evaluation of positive and negative in conflicting
phenomena were calculated concurrently by relaxing the condition in
IFS. The hypothetical illustration showed the applicability of the new
condition in CBFS for solving non-complement contraries
intuitionistic evaluation. This approach can be applied to any
decision making where conflicting is very much exist.
Abstract: According to development of communications and
web-based technologies in recent years, e-Learning has became very
important for everyone and is seen as one of most dynamic teaching
methods.
Grid computing is a pattern for increasing of computing power
and storage capacity of a system and is based on hardware and
software resources in a network with common purpose. In this article
we study grid architecture and describe its different layers. In this
way, we will analyze grid layered architecture. Then we will
introduce a new suitable architecture for e-Learning which is based
on grid network, and for this reason we call it Grid Learning
Architecture. Various sections and layers of suggested architecture
will be analyzed; especially grid middleware layer that has key role.
This layer is heart of grid learning architecture and, in fact,
regardless of this layer, e-Learning based on grid architecture will
not be feasible.