Abstract: Employment right is linked to the people’s livelihood
in our society. As a most important and representative part in the labor
market, the employment of public servants is always taking much
attention. But the discrimination in the employment of public servants
has always existed and, to become a controversy in our society. The
paper try to discuss this problem from four parts as follows: First, the
employment of public servants has a representative status in our labor
market. The second part is about the discrimination in the employment
of public servants. The third part is about the right of equality and its
significance. The last part is to analysis the legal predicament about
discrimination in the employment of public servants in China.
Abstract: Due to a high ethanol demand, the approach for effective ethanol production is important and has been developed rapidly worldwide. Several agricultural wastes are highly abundant in celluloses and the effective cellulase enzymes do exist widely among microorganisms. Accordingly, the cellulose degradation using microbial cellulase to produce a low-cost substrate for ethanol production has attracted more attention. In this study, the cellulase producing bacterial strain has been isolated from rich straw and identified by 16S rDNA sequence analysis as Acinetobacter sp. KKU44. This strain is able to grow and exhibit the cellulase activity. The optimal temperature for its growth and cellulase production is 37°C. The optimal temperature of bacterial cellulase activity is 60°C. The cellulase enzyme from Acinetobacter sp. KKU44 is heat-tolerant enzyme. The bacterial culture of 36h. showed highest cellulase activity at 120U/mL when grown in LB medium containing 2% (w/v). The capability of Acinetobacter sp. KKU44 to grow in cellulosic agricultural wastes as a sole carbon source and exhibiting the high cellulase activity at high temperature suggested that this strain could be potentially developed further as a cellulose degrading strain for a production of low-cost substrate used in ethanol production.
Abstract: The Proton Exchange Membranes (PEM) are largely studied because they operate at low temperatures and they are suitable for mobile applications. However, there are some deficiencies in their operation, mainly those that use ethanol as a hydrogen source, that require a certain attention. Therefore, this research aimed to develop Nafion® composite membranes, mixing clay minerals, kaolin and halloysite to the polymer matrix in order to improve the ethanol molecule retentions and, at the same time, to keep the system’s protonic conductivity. The modified Nafion/Kaolin, Nafion/Halloysite composite membranes were prepared in weight proportion of 0.5, 1.0 and 1.5. The membranes obtained were characterized as to their ethanol permeability, protonic conductivity and water absorption. The composite morphology and structure are characterized by SEM and EDX and the thermal behavior is determined by TGA and DSC. The analysis of the results shows ethanol permeability reduction from 48% to 63%. However, the protonic conductivity results are lower in relation to pure Nafion®. As to the thermal behavior, the Nafion® composite membranes were stable up to a temperature of 325ºC.
Abstract: The purpose of this research is to analyze the marketing strategies of Thai Halal products which related to the way of life for Thai Muslims. The expected benefit is the marketing strategy for brand building process for Halal products in Thailand. 4 elements of marketing strategies which necessary for the brand identity creation is the research framework: consists of Attributes, Benefits, Values and Personality. The research methodology was applied using qualitative and quantitative; 19 marketing experts with dynamic roles in Thai consumer products were interviewed. In addition, a field survey of 122 Thai Muslims selected from 175 Muslim communities in Bangkok was studied. Data analysis will be according to 5 categories of Thai Halal product: 1) Meat 2) Vegetable and Fruits 3) Instant foods and Garnishing ingredient 4) Beverages, Desserts and Snacks 5) Hygienic daily products; such as soap, shampoo and body lotion. The results will explain some suitable representation in the marketing strategies of Thai Halal products as are: 1) Benefit; the characteristics of the product with its benefit. Consumers will purchase this product with the reason of; it is beneficial nutrients product, there are no toxic or chemical residues. Fresh and clean materials 2) Attribute; the exterior images that attract to consumer. Consumers will purchase this product with the reason of; there is a standard proof mark, food and drug secure proof mark and Halal products mark. Packaging and its materials should be draw attention. Use an attractive graphic. Use outstanding images of product, material or ingredients. 3) Value; the value of products that affect to consumers perception; it is healthy products. Accumulate quality of life. It is a product of expertise, manufacturing of research result. Consumers are important. It’s sincere, honest and reliable to all. 4) Personality; reflection of consumers thought. The Personality feedback to them after they were consumes this product; they are health care persons. They are the rational person, moral person, justice person and thoughtful person like a progressive thinking.
Abstract: Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors, such as information leaks, using the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection, and discusses applications of this method in BYOD environment.
Abstract: In the past decades, the environment of production companies showed a permanent increase in dynamic and volatility in the form of demand fluctuations, new technologies or global crises. As a reaction to these new requirements, changeability of production systems came into attention. A changeable production system can adapt to these changes quickly and with little effort. Even though demand for changeable production exists for some time, the practical application is still insufficient.
To overcome this deficit, a three year research project at the Department of Production Systems and Logistics at the Leibniz University of Hanover/ Germany was initiated. As a result of this project, different concepts have been developed to design production changeable. An excerpt of the results will be presented in this paper. An eight step procedure will be presented to design the changeability of production logistics. This procedure has been applied at a German manufacturer of high demanding weighing machines. The developed procedure, their application in industry, as well as the major results of the application will be presented.
Abstract: This paper presents a finite buffer renewal input single working vacation and vacation interruption queue with state dependent services and state dependent vacations, which has a wide range of applications in several areas including manufacturing, wireless communication systems. Service times during busy period, vacation period and vacation times are exponentially distributed and are state dependent. As a result of the finite waiting space, state dependent services and state dependent vacation policies, the analysis of these queueing models needs special attention. We provide a recursive method using the supplementary variable technique to compute the stationary queue length distributions at pre-arrival and arbitrary epochs. An efficient computational algorithm of the model is presented which is fast and accurate and easy to implement. Various performance measures have been discussed. Finally, some special cases and numerical results have been depicted in the form of tables and graphs.
Abstract: Determination of attentional status is important because working performance and an unexpected accident is highly related with the attention. The autonomic nervous and the central nervous systems can reflect the changes in person’s attentional status. Reduced number of suitable pysiological parameters among autonomic and central nervous systems related signal parameters will be critical in optimum design of attentional devices. In this paper, we analyze the EEG (Electroencephalography) and HRV (Heart Rate Variability) signals to demonstrate the effective relation with brain signal and cardiovascular signal during event-related attention, which will be later used in selecting the minimum set of attentional parameters. Time and frequency domain parameters from HRV signal and frequency domain parameters from EEG signal are used as input to the optimum feature parameters selector.
Abstract: The characterization and modeling of the dynamic
behavior of many built-up structures under vibration conditions is still
a subject of current research. The present study emphasizes the
theoretical investigation of slip damping in layered and jointed
welded cantilever structures using finite element approach.
Application of finite element method in damping analysis is relatively
recent, as such, some problems particularly slip damping analysis has
not received enough attention. To validate the finite element model
developed, experiments have been conducted on a number of mild
steel specimens under different initial conditions of vibration. Finite
element model developed affirms that the damping capacity of such
structures is influenced by a number of vital parameters such as;
pressure distribution, kinematic coefficient of friction and micro-slip
at the interfaces, amplitude, frequency of vibration, length and
thickness of the specimen. Finite element model developed can be
utilized effectively in the design of machine tools, automobiles,
aerodynamic and space structures, frames and machine members for
enhancing their damping capacity.
Abstract: In today scenario, to meet enhanced demand imposed
by domestic, commercial and industrial consumers, various
operational & control activities of Radial Distribution Network
(RDN) requires a focused attention. Irrespective of sub-domains
research aspects of RDN like network reconfiguration, reactive
power compensation and economic load scheduling etc, network
performance parameters are usually estimated by an iterative process
and is commonly known as load (power) flow algorithm. In this
paper, a simple mechanism is presented to implement the load flow
analysis (LFA) algorithm. The reported algorithm utilizes graph
theory principles and is tested on a 69- bus RDN.
Abstract: During the past several years, face recognition in video
has received significant attention. Not only the wide range of
commercial and law enforcement applications, but also the availability
of feasible technologies after several decades of research contributes
to the trend. Although current face recognition systems have reached a
certain level of maturity, their development is still limited by the
conditions brought about by many real applications. For example,
recognition images of video sequence acquired in an open
environment with changes in illumination and/or pose and/or facial
occlusion and/or low resolution of acquired image remains a largely
unsolved problem. In other words, current algorithms are yet to be
developed. This paper provides an up-to-date survey of video-based
face recognition research. To present a comprehensive survey, we
categorize existing video based recognition approaches and present
detailed descriptions of representative methods within each category.
In addition, relevant topics such as real time detection, real time
tracking for video, issues such as illumination, pose, 3D and low
resolution are covered.
Abstract: The aim of this study was to test whether the Attention
Networks Test (ANT) showed temporal decrements in performance.
Vigilance tasks typically show such decrements, which may reflect
impairments in executive control resulting from cognitive fatigue.
The ANT assesses executive control, as well as alerting and
orienting. Thus, it was hypothesized that ANT executive control
would deteriorate over time. Manipulations including task condition
(trial composition) and masking were included in the experimental
design in an attempt to increase performance decrements. However,
results showed that there is no temporal decrement on the ANT. The
roles of task demands, cognitive fatigue and participant motivation in
producing this result are discussed. The ANT may not be an effective
tool for investigating temporal decrement in attention.
Abstract: Buildings are one of the valuable assets to provide
people with shelters for work, leisure and rest. After years of
attacks by weather, buildings will deteriorate which need proper
maintenance in order to fulfill the requirements and satisfaction of
the users. Poorly managed buildings not just give a negative image
to the city itself, but also pose potential risk hazards to the health
and safety of the general public. As a result, the management of
maintenance projects has played an important role in cities like
Hong Kong where the problem of urban decay has drawn much
attention. However, most research has focused on managing new
construction, and little research effort has been put on maintenance
projects. Given the short duration and more diversified nature of
work, repair and maintenance works are found to be more difficult
to monitor and regulate when compared with new works. Project
participants may face with problems in running maintenance
projects which should be investigated so that proper strategies can
be established. This paper aims to provide a thorough analysis on
the problems of running maintenance projects. A review of
literature on the characteristics of building maintenance projects
was firstly conducted, which forms a solid basis for the empirical
study. Results on the problems and difficulties of running
maintenance projects from the viewpoints of industry practitioners
will also be delivered with a view to formulating effective
strategies for managing maintenance projects successfully.
Abstract: During last decades, developing multi-objective
evolutionary algorithms for optimization problems has found
considerable attention. Flexible job shop scheduling problem, as an
important scheduling optimization problem, has found this attention
too. However, most of the multi-objective algorithms that are
developed for this problem use nonprofessional approaches. In
another words, most of them combine their objectives and then solve
multi-objective problem through single objective approaches. Of
course, except some scarce researches that uses Pareto-based
algorithms. Therefore, in this paper, a new Pareto-based algorithm
called controlled elitism non-dominated sorting genetic algorithm
(CENSGA) is proposed for the multi-objective FJSP (MOFJSP). Our
considered objectives are makespan, critical machine work load, and
total work load of machines. The proposed algorithm is also
compared with one the best Pareto-based algorithms of the literature
on some multi-objective criteria, statistically.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.
Abstract: The evaluation of the question answering system is a major research area that needs much attention. Before the rise of domain-oriented question answering systems based on natural language understanding and reasoning, evaluation is never a problem as information retrieval-based metrics are readily available for use. However, when question answering systems began to be more domains specific, evaluation becomes a real issue. This is especially true when understanding and reasoning is required to cater for a wider variety of questions and at the same time achieve higher quality responses The research in this paper discusses the inappropriateness of the existing measure for response quality evaluation and in a later part, the call for new standard measures and the related considerations are brought forward. As a short-term solution for evaluating response quality of heterogeneous systems, and to demonstrate the challenges in evaluating systems of different nature, this research presents a black-box approach using observation, classification scheme and a scoring mechanism to assess and rank three example systems (i.e. AnswerBus, START and NaLURI).
Abstract: Consumer behaviour analysis represents an important
field of study in marketing. Particularly strategy development for
marketing and communications will be more focused and effective
when marketers have an understanding of the motivations, behaviour
and psychology of consumers. While materialism has been found to
be one of the important elements in consumer behaviour, compulsive
consumption represents another aspect that has recently attracted
more attention. This is because of the growing prevalence of
dysfunctional buying that has raised concern in consumer societies.
Present studies and analyses on origins and motivations of
compulsive buying have mainly focused on either individual factors
or groups of related factors and hence a need for a holistic view
exists. This paper provides a comprehensive perspective on
compulsive consumption and establishes relevant propositions
keeping the family life cycle stages as a reference for the incidence of
chronic consumer states and their influence on compulsive
consumption.
Abstract: The evaluation of conversational agents or chatterbots question answering systems is a major research area that needs much attention. Before the rise of domain-oriented conversational agents based on natural language understanding and reasoning, evaluation is never a problem as information retrieval-based metrics are readily available for use. However, when chatterbots began to become more domain specific, evaluation becomes a real issue. This is especially true when understanding and reasoning is required to cater for a wider variety of questions and at the same time to achieve high quality responses. This paper discusses the inappropriateness of the existing measures for response quality evaluation and the call for new standard measures and related considerations are brought forward. As a short-term solution for evaluating response quality of conversational agents, and to demonstrate the challenges in evaluating systems of different nature, this research proposes a blackbox approach using observation, classification scheme and a scoring mechanism to assess and rank three example systems, AnswerBus, START and AINI.
Abstract: detecting the deadlock is one of the important
problems in distributed systems and different solutions have been
proposed for it. Among the many deadlock detection algorithms,
Edge-chasing has been the most widely used. In Edge-chasing
algorithm, a special message called probe is made and sent along
dependency edges. When the initiator of a probe receives the probe
back the existence of a deadlock is revealed. But these algorithms are
not problem-free. One of the problems associated with them is that
they cannot detect some deadlocks and they even identify false
deadlocks. A key point not mentioned in the literature is that when
the process is waiting to obtain the required resources and its
execution has been blocked, how it can actually respond to probe
messages in the system. Also the question of 'which process should
be victimized in order to achieve a better performance when multiple
cycles exist within one single process in the system' has received
little attention. In this paper, one of the basic concepts of the
operating system - daemon - will be used to solve the problems
mentioned. The proposed Algorithm becomes engaged in sending
probe messages to the mandatory daemons and collects enough
information to effectively identify and resolve multi-cycle deadlocks
in distributed systems.
Abstract: Recently, analysis and designing of the structures
based on the Reliability theory have been the center of attention.
Reason of this attention is the existence of the natural and random
structural parameters such as the material specification, external
loads, geometric dimensions etc. By means of the Reliability theory,
uncertainties resulted from the statistical nature of the structural
parameters can be changed into the mathematical equations and the
safety and operational considerations can be considered in the
designing process. According to this theory, it is possible to study the
destruction probability of not only a specific element but also the
entire system. Therefore, after being assured of safety of every
element, their reciprocal effects on the safety of the entire system can
be investigated.