Abstract: Global competition is tightening and companies have
to think how to remain competitive. The main aim of this paper is to
discuss how Finnish foundries will remain competitive. To fulfil the
aim, we conducted interviews in nine companies using castings and
analysed buyer–supplier relationships, current competitive
advantages of Finnish foundries and customer perspectives on how
Finnish foundries remain competitive. We found that the customerfoundry
relationship is still closer to traditional subcontracting than
partnering and general image of foundries is negative. Current
competitive advantages of Finnish foundries include designing
cooperation, proximity and flexibility. Casting users state that
Finnish foundries should sell their know-how and services instead of
their capacity, concentrate on prototype, single and short series
castings and supply ready-to-install cast components directly to
customers- assembly lines.
Abstract: The paper proposes a new concept in developing
collaborative design system. The concept framework involves
applying simulation of supply chain management to collaborative
design called – 'SCM–Based Design Tool'. The system is developed
particularly to support design activities and to integrate all facilities
together. The system is aimed to increase design productivity and
creativity. Therefore, designers and customers can collaborate by the
system since conceptual design. JAG: Jewelry Art Generator based
on artificial intelligence techniques is integrated into the system.
Moreover, the proposed system can support users as decision tool
and data propagation. The system covers since raw material supply
until product delivery. Data management and sharing information are
visually supported to designers and customers via user interface. The
system is developed on Web–assisted product development
environment. The prototype system is presented for Thai jewelry
industry as a system prototype demonstration, but applicable for
other industry.
Abstract: The problem of spam has been seriously troubling the Internet community during the last few years and currently reached an alarming scale. Observations made at CERN (European Organization for Nuclear Research located in Geneva, Switzerland) show that spam mails can constitute up to 75% of daily SMTP traffic. A naïve Bayesian classifier based on a Bag Of Words representation of an email is widely used to stop this unwanted flood as it combines good performance with simplicity of the training and classification processes. However, facing the constantly changing patterns of spam, it is necessary to assure online adaptability of the classifier. This work proposes combining such a classifier with another NBC (naïve Bayesian classifier) based on pairs of adjacent words. Only the latter will be retrained with examples of spam reported by users. Tests are performed on considerable sets of mails both from public spam archives and CERN mailboxes. They suggest that this architecture can increase spam recall without affecting the classifier precision as it happens when only the NBC based on single words is retrained.
Abstract: New generation mobile communication networks have
the ability of supporting triple play. In order that, Orthogonal
Frequency Division Multiplexing (OFDM) access techniques have
been chosen to enlarge the system ability for high data rates
networks. Many of cross-layer modeling and optimization schemes
for Quality of Service (QoS) and capacity of downlink multiuser
OFDM system were proposed. In this paper, the Maximum Weighted
Capacity (MWC) based resource allocation at the Physical (PHY)
layer is used. This resource allocation scheme provides a much better
QoS than the previous resource allocation schemes, while
maintaining the highest or nearly highest capacity and costing similar
complexity. In addition, the Delay Satisfaction (DS) scheduling at the
Medium Access Control (MAC) layer, which allows more than one
connection to be served in each slot is used. This scheduling
technique is more efficient than conventional scheduling to
investigate both of the number of users as well as the number of
subcarriers against system capacity. The system will be optimized for
different operational environments: the outdoor deployment scenarios
as well as the indoor deployment scenarios are investigated and also
for different channel models. In addition, effective capacity approach
[1] is used not only for providing QoS for different mobile users, but
also to increase the total wireless network's throughput.
Abstract: This paper proposes an Interactive Chinese Character
Learning System (ICCLS) based on pictorial evolution as an
edutainment concept in computer-based learning of language. The
advantage of the language origination itself is taken as a learning
platform due to the complexity in Chinese language as compared to
other types of languages. Users especially children enjoy more by
utilize this learning system because they are able to memories the
Chinese Character easily and understand more of the origin of the
Chinese character under pleasurable learning environment, compares
to traditional approach which children need to rote learning Chinese
Character under un-pleasurable environment. Skeletonization is used
as the representation of Chinese character and object with an animated
pictograph evolution to facilitate the learning of the language. Shortest
skeleton path matching technique is employed for fast and accurate
matching in our implementation. User is required to either write a
word or draw a simple 2D object in the input panel and the matched
word and object will be displayed as well as the pictograph evolution
to instill learning. The target of computer-based learning system is for
pre-school children between 4 to 6 years old to learn Chinese
characters in a flexible and entertaining manner besides utilizing
visual and mind mapping strategy as learning methodology.
Abstract: The tagging data of (users, tags and resources) constitutes a folksonomy that is the user-driven and bottom-up approach to organizing and classifying information on the Web. Tagging data stored in the folksonomy include a lot of very useful information and knowledge. However, appropriate approach for analyzing tagging data and discovering hidden knowledge from them still remains one of the main problems on the folksonomy mining researches. In this paper, we have proposed a folksonomy data mining approach based on FCA for discovering hidden knowledge easily from folksonomy. Also we have demonstrated how our proposed approach can be applied in the collaborative tagging system through our experiment. Our proposed approach can be applied to some interesting areas such as social network analysis, semantic web mining and so on.
Abstract: The development of Web has affected different aspects of our lives, such as communication, sharing knowledge, searching for jobs, social activities, etc. The web portal as a gateway in the World Wide Web is a starting point for people who are connecting to the Internet. The web portal as the type of knowledge management system provides a rich space to share and search information as well as communication services like free email or content provision for the users. This research aims to discover the university needs to the web portal as a necessary tool for students in the universities to help them in getting the required information. A survey was conducted to gather students' requirements which can be incorporated in to portal to be developed.
Abstract: In this work, we present for the first time in our perception an efficient digital watermarking scheme for mpeg audio layer 3 files that operates directly in the compressed data domain, while manipulating the time and subband/channel domain. In addition, it does not need the original signal to detect the watermark. Our scheme was implemented taking special care for the efficient usage of the two limited resources of computer systems: time and space. It offers to the industrial user the capability of watermark embedding and detection in time immediately comparable to the real music time of the original audio file that depends on the mpeg compression, while the end user/audience does not face any artifacts or delays hearing the watermarked audio file. Furthermore, it overcomes the disadvantage of algorithms operating in the PCMData domain to be vulnerable to compression/recompression attacks, as it places the watermark in the scale factors domain and not in the digitized sound audio data. The strength of our scheme, that allows it to be used with success in both authentication and copyright protection, relies on the fact that it gives to the users the enhanced capability their ownership of the audio file not to be accomplished simply by detecting the bit pattern that comprises the watermark itself, but by showing that the legal owner knows a hard to compute property of the watermark.
Abstract: Statistics indicate that more than 1000 phishing attacks are launched every month. With 57 million people hit by the fraud so far in America alone, how do we combat phishing?This publication aims to discuss strategies in the war against Phishing. This study is an examination of the analysis and critique found in the ways adopted at various levels to counter the crescendo of phishing attacks and new techniques being adopted for the same. An analysis of the measures taken up by the varied popular Mail servers and popular browsers is done under this study. This work intends to increase the understanding and awareness of the internet user across the globe and even discusses plausible countermeasures at the users as well as the developers end. This conceptual paper will contribute to future research on similar topics.
Abstract: The purposes of this study were as follows to evaluate
the economic value of Phu Kradueng National Park by the travel cost
method (TCM) and the contingent valuation method (CVM) and to
estimate the demand for traveling and the willingness to pay. The
data for this study were collected by conducting two large scale
surveys on users and non-users. A total of 1,016 users and 1,034
non-users were interviewed. The data were analyzed using multiple
linear regression analysis, logistic regression model and the
consumer surplus (CS) was the integral of demand function for trips.
The survey found, were as follows:
1)Using the travel cost method which provides an estimate of direct
benefits to park users, we found that visitors- total willingness to pay
per visit was 2,284.57 bath, of which 958.29 bath was travel cost,
1,129.82 bath was expenditure for accommodation, food, and
services, and 166.66 bath was consumer surplus or the visitors -net
gain or satisfaction from the visit (the integral of demand function for
trips).
2) Thai visitors to Phu Kradueng National Park were further willing
to pay an average of 646.84 bath per head per year to ensure the
continued existence of Phu Kradueng National Park and to preserve
their option to use it in the future.
3) Thai non-visitors, on the other hand, are willing to pay an average
of 212.61 bath per head per year for the option and existence value
provided by the Park.
4) The total economic value of Phu Kradueng National Park to Thai
visitors and non-visitors taken together stands today at 9,249.55
million bath per year.
5) The users- average willingness to pay for access to Phu Kradueng
National Park rises
from 40 bath to 84.66 bath per head per trip for improved services
such as road improvement, increased cleanliness, and upgraded
information.
This paper was needed to investigate of the potential market
demand for bio prospecting in Phu Kradueng national Park and to
investigate how a larger share of the economic benefits of tourism
could be distributed income to the local residents.
Abstract: Groundwater resources in Arsanjan plain provide
water for agriculture, industry, and human consumption. Continued
agricultural development in this area needs to additional groundwater
resources for, particularly during of drought periods, and effects on
the quantity and quality of ground water available. The purpose of
this study is to evaluate water level changes in the aquifer of
Arsanjan plain in the Fars province in order to determine the areas of
greatest depletion and the causes of depletion. In this plain, farmers
and other users are pumping groundwater faster than its natural
replenishment rate, causing a continuous drop in groundwater tables
and depletion of this resource. In this research variation of
groundwater level, their effects and ways to help control groundwater
levels in aquifer of the Arsanjan plains were evaluated .Excessive
exploitation of groundwater in this aquifer caused the groundwater
levels fall too fast or to unacceptable levels. The average drawdown
of the groundwater level in this plain were 19.66 meters during
1996 to 2003.
Abstract: With the advent of DSL services, high data rates are now available over phone lines, yet higher rates are in demand. In this paper, we optimize the transmit filters that can be used over wireline channels. Results showing the bit error rates when optimized filters are used, and with a decision feedback equalizer (DFE) employed in the receiver, are given. We then show that significantly higher throughput can be achieved by modeling the channel as a multiple input multiple output (MIMO) channel. A receiver that employs a MIMO-DFE that deals jointly with several users is proposed and shown to provide significant improvement over the conventional DFE.
Abstract: Sustainable energy usage has been recognized as one
of the important measure to increase the competitiveness of the
nation globally. Many strong emphases were given in the Ninth
Malaysia Plan (RMK9) to improve energy efficient especially to
government buildings. With this in view, a project to investigate the
potential of energy saving in selected building in Universiti Tun
Hussein Onn Malaysia (UTHM) was carried out. In this project, a
case study involving electric energy consumption of the academic
staff office building was conducted. The scope of the study include to
identify energy consumption in a selected building, to study energy
saving opportunities, to analyse cost investment in term of economic
and to identify users attitude with respect to energy usage. The
MS1525:2001, Malaysian Standard -Code of practice on energy
efficiency and use of renewable energy for non-residential buildings
was used as reference. Several energy efficient measures were
considered and their merits and priority were compared. Improving
human behavior can reduce energy consumption by 6% while
technical measure can reduce energy consumption by 44%. Two
economic analysis evaluation methods were applied; they are the
payback period method and net present value method.
Abstract: Static analysis of source code is used for auditing web
applications to detect the vulnerabilities. In this paper, we propose a
new algorithm to analyze the PHP source code for detecting LFI and
RFI potential vulnerabilities. In our approach, we first define some
patterns for finding some functions which have potential to be abused
because of unhandled user inputs. More precisely, we use regular
expression as a fast and simple method to define some patterns for
detection of vulnerabilities. As inclusion functions could be also used
in a safe way, there could occur many false positives (FP). The first
cause of these FP-s could be that the function does not use a usersupplied
variable as an argument. So, we extract a list of usersupplied
variables to be used for detecting vulnerable lines of code.
On the other side, as vulnerability could spread among the variables
like by multi-level assignment, we also try to extract the hidden usersupplied
variables. We use the resulted list to decrease the false
positives of our method. Finally, as there exist some ways to prevent
the vulnerability of inclusion functions, we define also some patterns
to detect them and decrease our false positives.
Abstract: Increasing concerns over climate change have limited
the liberal usage of available energy technology options. India faces
a formidable challenge to meet its energy needs and provide adequate
energy of desired quality in various forms to users in sustainable
manner at reasonable costs. In this paper, work carried out with an
objective to study the role of various energy technology options
under different scenarios namely base line scenario, high nuclear
scenario, high renewable scenario, low growth and high growth rate
scenario. The study has been carried out using Model for Energy
Supply Strategy Alternatives and their General Environmental
Impacts (MESSAGE) model which evaluates the alternative energy
supply strategies with user defined constraints on fuel availability,
environmental regulations etc. The projected electricity demand, at
the end of study period i.e. 2035 is 500490 MWYr. The model
predicted the share of the demand by Thermal: 428170 MWYr,
Hydro: 40320 MWYr, Nuclear: 14000 MWYr, Wind: 18000 MWYr
in the base line scenario. Coal remains the dominant fuel for
production of electricity during the study period. However, the
import dependency of coal increased during the study period. In
baseline scenario the cumulative carbon dioxide emissions upto 2035
are about 11,000 million tones of CO2. In the scenario of high nuclear
capacity the carbon dioxide emissions reduced by 10 % when nuclear
energy share increased to 9 % compared to 3 % in baseline scenario.
Similarly aggressive use of renewables reduces 4 % of carbon
dioxide emissions.
Abstract: Nowadays, web-based technologies influence in
people-s daily life such as in education, business and others.
Therefore, many web developers are too eager to develop their web
applications with fully animation graphics and forgetting its
accessibility to its users. Their purpose is to make their web
applications look impressive. Thus, this paper would highlight on the
usability and accessibility of a voice recognition browser as a tool to
facilitate the visually impaired and blind learners in accessing virtual
learning environment. More specifically, the objectives of the study
are (i) to explore the challenges faced by the visually impaired
learners in accessing virtual learning environment (ii) to determine
the suitable guidelines for developing a voice recognition browser
that is accessible to the visually impaired. Furthermore, this study
was prepared based on an observation conducted with the Malaysian
visually impaired learners. Finally, the result of this study would
underline on the development of an accessible voice recognition
browser for the visually impaired.
Abstract: In the paper, the performance of quasi-synchronous
CDMA (QS-CDMA) system, which can allow an increased timing
error in synchronized access, is discussed. Average BER performance
of the system is analyzed in the condition of different access timing
error and different asynchronous users by simulation in AWGN
channel. The results show that QS-CDMA system is shown to have
great performance gain over the asynchronous system when access
timing error is within a few chips and asynchronous users is tolerable.
However, with access timing error increasing and asynchronous users
increasing, the performance of QS-CDMA will degrade. Also, we can
determine the number of tolerable asynchronous users for different
access timing error by simulation figures.
Abstract: Recommender systems are usually regarded as an
important marketing tool in the e-commerce. They use important
information about users to facilitate accurate recommendation. The
information includes user context such as location, time and interest
for personalization of mobile users. We can easily collect information
about location and time because mobile devices communicate with the
base station of the service provider. However, information about user
interest can-t be easily collected because user interest can not be
captured automatically without user-s approval process. User interest
usually represented as a need. In this study, we classify needs into two
types according to prior research. This study investigates the
usefulness of data mining techniques for classifying user need type for
recommendation systems. We employ several data mining techniques
including artificial neural networks, decision trees, case-based
reasoning, and multivariate discriminant analysis. Experimental
results show that CHAID algorithm outperforms other models for
classifying user need type. This study performs McNemar test to
examine the statistical significance of the differences of classification
results. The results of McNemar test also show that CHAID performs
better than the other models with statistical significance.
Abstract: As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.
Abstract: When designing information systems that deal with
large amount of domain knowledge, system designers need to consider
ambiguities of labeling termsin domain vocabulary for navigating
users in the information space. The goal of this study is to develop a
methodology for system designers to label navigation items, taking
account of ambiguities stems from synonyms or polysemes of labeling
terms. In this paper, we propose a method for concept labeling based
on mappings between domain ontology andthesaurus, and report
results of an empirical evaluation.