Abstract: The purpose of this paper is to conceptualize a futureoriented
human work environment and organizational activity in
deep mines that entails a vision of good and safe workplace. Futureoriented
technological challenges and mental images required for
modern work organization design were appraised. It is argued that an
intelligent-deep-mine covering the entire value chain, including
environmental issues and with work organization that supports good
working and social conditions towards increased human productivity
could be designed. With such intelligent system and work
organization in place, the mining industry could be seen as a place
where cooperation, skills development and gender equality are key
components. By this perspective, both the youth and women might
view mining activity as an attractive job and the work environment
as a safe, and this could go a long way in breaking the unequal
gender balance that exists in most mines today.
Abstract: The aim of this study is to emphasize the opportunities in space design under the aspect of HCI as performance areas. HCI is a multidisciplinary approach that could be identified in many different areas. The aesthetical reflections of HCI by virtual reality in space design are the high-tech solutions of the new innovations as computational facilities by artistic features. The method of this paper is to identify the subject in 3 main parts. In the first part a general approach and definition of interactivity on the basis of space design; in the second part the concept of multimedia interactive theater by some chosen samples from the world and interactive design aspects; in the third part the samples from Turkey will be identified by stage designing principles. In the results it could be declared that the multimedia database is the virtual approach of theatre stage designing regarding interactive means by computational facilities according to aesthetical aspects. HCI is mostly identified in theatre stages as computational intelligence under the affect of interactivity.
Abstract: Soil organic carbon (SOC) plays a key role in soil
fertility, hydrology, contaminants control and acts as a sink or source
of terrestrial carbon content that can affect the concentration of
atmospheric CO2. SOC supports the sustainability and quality of
ecosystems, especially in semi-arid region. This study was
conducted to determine relative importance of 13 different
exploratory climatic, soil and geometric factors on the SOC contents
in one of the semiarid watershed zones in Iran. Two methods
canonical discriminate analysis (CDA) and feed-forward back
propagation neural networks were used to predict SOC. Stepwise
regression and sensitivity analysis were performed to identify
relative importance of exploratory variables. Results from sensitivity
analysis showed that 7-2-1 neural networks and 5 inputs in CDA
models output have highest predictive ability that explains %70 and
%65 of SOC variability. Since neural network models outperformed
CDA model, it should be preferred for estimating SOC.
Abstract: Electric vehicles are considered as technology which
can significantly reduce the problems related to road transport such
as increasing GHG emissions, air pollutions and energy import
dependency.
The core objective of this paper is to analyze the current energetic,
ecological and economic characteristics of different types of electric
vehicles.
The major conclusions of this analysis are: The high investments
cost are the major barrier for broad market breakthrough of battery
electric vehicles and fuel cell vehicles. For battery electric vehicles
also the limited driving range states a key obstacle. The analyzed
hybrids could in principle serve as a bridging technology. However,
due to their tank-to-wheel emissions they cannot state a proper
solution for urban areas.
Finally, the most important perception is that also battery electric
vehicles and fuel cell vehicles are environmentally benign solution if
the primary fuel source is renewable.
Abstract: Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.
Abstract: Diatoms are an important group of aquatic ecosystems and diatom-based indices are increasingly becoming important tools for the assessment of ecological conditions in lotic systems. Although the studies are very limited about Turkish rivers, diatom indices were used for monitoring rivers in different basins. In the present study, we used OMNIDIA program for estimation of stream quality. Some indices have less sensitive (IDP, WAT, LOBO, GENRE, TID, CEE, PT), intermediate sensitivities (IDSE, DESCY, IPS, DI-CH, SLA, IDAP), the others higher sensitivities (SID, IBD, SHE, EPI-D). Among the investigated diatom communities, only a few taxa indicated alfa-mesosaprobity and polysaprobity. Most of the sites were characterized by a great relative contribution of eutraphent and tolerant ones as well as oligosaprobic and betamesosaprobic diatoms. In general, SID and IBD indices gave the best results. This study suggests that the structure of benthic diatom communities and diatom indices, especially SID, can be applied for monitoring rivers in Southern Turkey.
Abstract: Imperfect knowledge cannot be avoided all the time. Imperfections may have several forms; uncertainties, imprecision and incompleteness. When we look to classification of methods for the management of imperfect knowledge we see fuzzy set-based techniques. The choice of a method to process data is linked to the choice of knowledge representation, which can be numerical, symbolic, logical or semantic and it depends on the nature of the problem to be solved for example decision support, which will be mentioned in our study. Fuzzy Logic is used for its ability to manage imprecise knowledge, but it can take advantage of the ability of neural networks to learn coefficients or functions. Such an association of methods is typical of so-called soft computing. In this study a new method was used for the management of imprecision for collected knowledge which related to economic analysis of construction industry in Turkey. Because of sudden changes occurring in economic factors decrease competition strength of construction companies. The better evaluation of these changes in economical factors in view of construction industry will made positive influence on company-s decisions which are dealing construction.
Abstract: This research aimed to study the competency of health
and wellness hotels and resorts in developing use the local natural
resources and wisdom to conform to the national health and wellness
tourism (HWT) strategy by comparing two independent samples,
from Aumpur Muang, Ranong province and Aumpur Muang,
Chiangmai province. And also study in the suggestive direct path to
lead the organization to the sustainable successful.
This research was conduct by using mix methodology; both
quantitative and qualitative data were used. The data of competency
of health and wellness hotels and resorts (HWHR) in developing use
the local natural resources for HWT promoting were collected via
300 set of questionnaires, from 6 hotels and resorts in 2 areas, 3
places from Aumpur Muang, Ranong province and another 3 from
Aumpur Muang, Chiangmai province.
Thestudy of HWHR’s competency in developing use the local
natural resources and wisdom to conform to the national HWT
strategycan be divided into fourmain areas, food and beverages
service, tourism activity, environmental service, and value adding.
The total competency of the Chiangmai sample is importantly
scoredp. value 0.01 higher than the Ranong one while the area of
safety, Chiangmai’s competency is importantly scored 0.05 higher
than the Ranong’scompetency. Others were rated not differently.
Since Chiangmai perform better, then it can be a role model in
developing HTHR or HWT destination.
From the part of qualitative research, content analysis of business
contents and its environments were analyzed. The four stages of
strategic development and plans, from the smallest scale to the largest
scale such a national base were discussed. The HWT: Evolution
model and strategy for lodging Business were suggested. All those
stages must work harmoniously together. The distinctive result
illustrates the need of human resource development as the key point
to create the identity of Thainess on Health and wellness service
providing. This will add-on the value of services and differentiates
ourselves from other competitors. The creative of Thailand’s health
and wellness brand possibly increase loyalty customers which agreed
to be a path of sustainable development.
Abstract: One of the key research issues in wireless sensor networks (WSNs) is how to efficiently deploy sensors to cover an area. In this paper, we present a Fishnet Based Dispatch Scheme (FiBDS) with energy aware mobility and interest based sensing angle. We propose two algorithms, one is FiBDS centralized algorithm and another is FiBDS distributed algorithm. The centralized algorithm is designed specifically for the non-time critical applications, commonly known as non real-time applications while the distributed algorithm is designed specifically for the time critical applications, commonly known as real-time applications. The proposed dispatch scheme works in a phase-selection manner. In this in each phase a specific constraint is dealt with according to the specified priority and then moved onto the next phase and at the end of each only the best suited nodes for the phase are chosen. Simulation results are presented to verify their effectiveness.
Abstract: Animation is simply defined as the sequencing of a
series of static images to generate the illusion of movement. Most
people believe that actual drawings or creation of the individual
images is the animation, when in actuality it is the arrangement of
those static images that conveys the motion. To become an animator,
it is often assumed that needed the ability to quickly design
masterpiece after masterpiece. Although some semblance of artistic
skill is a necessity for the job, the real key to becoming a great
animator is in the comprehension of timing. This paper will use a
combination of sprite animation, frame animation, and some other
techniques to cause a group of multi-colored static images to slither
around in the bounded area. In addition to slithering, the images
will also change the color of different parts of their body, much like
the real world creatures that have this amazing ability to change the
colors on their bodies do. This paper was implemented by using
Java 2 Standard Edition (J2SE).
It is both time-consuming and expensive to create animations,
regardless if they are created by hand or by using motion-capture
equipment. If the animators could reuse old animations and even
blend different animations together, a lot of work would be saved in
the process. The main objective of this paper is to examine a method
for blending several animations together in real time. This paper
presents and analyses a solution using Weighted Skeleton
Animation (WSA) resulting in limited CPU time and memory waste
as well as saving time for the animators. The idea presented is
described in detail and implemented. In this paper, text animation,
vertex animation, sprite part animation and whole sprite animation
were tested.
In this research paper, the resolution, smoothness and movement
of animated images will be carried out from the parameters, which
will be obtained from the experimental research of implementing
this paper.
Abstract: Climate change leading to global warming affects the
earth through many different ways such as weather (temperature, precipitation, humidity and the other parameters of weather), snow coverage and ice melting, sea level rise, hydrological cycles, quality of water, agriculture, forests, ecosystems and health. One of the most
affected areas by climate change is hydrology and water resources.
Regions where majority of runoff consists of snow melt are more
sensitive to climate change. The first step of climate change studies
is to establish trends of significant climate variables including precipitation,
temperature and flow data to detect any potential climate
change impacts already happened. Two popular non-parametric trend
analysis methods, Mann-Kendal and Spearman-s Rho were applied
to Upper Euphrates Basin (Turkey) to detect trends of precipitation,
temperatures (maximum, minimum and average) and streamflow.
Abstract: This is an applied research to propose the method for
price quotation for a contract electronics manufacturer. It has had a
precise price quoting method but such method could not quickly
provide a result as the customer required. This reduces the ability of
company to compete in this kind of business. In this case, the cause
of long time quotation process was analyzed. A lot of product
features have been demanded by customer. By checking routine
processes, it was found that high fraction of quoting time was used
for production time estimating which has effected to the
manufacturing or production cost. Then the historical data of
products including types, number of components, assembling
method, and their assembling time were used to analyze the key
components affecting to production time. The price quoting model
then was proposed. The implementation of proposed model was able
to remarkably reduce quoting time with an acceptable required
precision.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: In this paper our aim is to explore the construction of schoolgirl femininities, drawing on the results of an ethnographic study conducted in a high school in Ankara, Turkey. In this case study which tries to explore the complexities of gender discourses, we were initially motivated by the questions that have been put forward by critical and feminist literature on education which emphasize the necessarily conflicting and partial nature of both reproduction and resistance and the importance of gendered power relations in the school context. Drawing on this paradigm our research tries to address to a more specific question: how are multiple schoolgirl femininities constructed within the context of gendered school culture, and especially in relation to hegemonic masculinity? Our study reveals that the general framework of multiple femininities is engendered by a tension between two inter-related positions. The first one is different strategies of accommodation and resistance to the gender-related problems of education. The second one is the school experience of girls which is conditioned by their differential position vis-à-vis the masculine resistance culture that is dominant in the school.
Abstract: In this paper, we argue the security protocols of
ZigBee wireless sensor network in MAC layer. AES 128-bit
encryption algorithm in CCM* mode is secure transferred data;
however, AES-s secret key will be break within nearest future.
Efficient public key algorithm, ECC has been mixed with AES to
rescue the ZigBee wireless sensor from cipher text and replay attack.
Also, the proposed protocol can parallelize the integrity function to
increase system performance.
Abstract: Many researchers are working on information hiding
techniques using different ideas and areas to hide their secrete data.
This paper introduces a robust technique of hiding secret data in
image based on LSB insertion and RSA encryption technique. The
key of the proposed technique is to encrypt the secret data. Then the
encrypted data will be converted into a bit stream and divided it into
number of segments. However, the cover image will also be divided
into the same number of segments. Each segment of data will be
compared with each segment of image to find the best match
segment, in order to create a new random sequence of segments to be
inserted then in a cover image. Experimental results show that the
proposed technique has a high security level and produced better
stego-image quality.
Abstract: Organizational culture fosters innovation, and
innovation is the main engine to be sustained within the uncertainty
market. Like other countries, the construction industry significantly
contributes to the economy, society and technology of Malaysia, yet,
innovation is still considered slow compared to other industries such
as manufacturing. Given the important role of an architect as the key
player and the contributor of new ideas in the construction industry,
there is a call to identify the issue and improve the current situation
by focusing on the architectural firms. In addition, the existing
studies tend to focus only on a few dimensions of organizational
culture and very few studies consider whether innovation is being
generated or adopted. Hence, the present research tends to fill in the
gap by identifying the organizational cultures that foster or hinder
innovation generation and/or innovation adoption, and propose a
model of organizational culture and innovation generation and/or
adoption.
Abstract: There are increasingly plagiarism offences for
students in higher education in the digital educational world. On the
other hand, various and competitive online assessment and
plagiarism detection tools are available in the market. Taking the
University of Glamorgan as a case study, this paper describes and
introduces an institutional journey on electronic plagiarism detection
to inform the initial experience of an innovative tool and method
which could be further explored in the future research. The
comparative study and system workflow for e-plagiarism detection
tool are discussed. Benefits for both academics and students are also
presented. Electronic plagiarism detection tools brought great
benefits to both academics and students in Glamorgan. On the other
hand, the debates raised in such initial experience are discussed.
Abstract: In parallel, broadcasting has changed rapidly with the
changing of the world at the same area. Broadcasting is also
influenced and reshaped in terms of the emergence of new
communication technologies. These developments have resulted a lot
of economic and social consequences. The most important
consequences of these results are those of the powers of the
governments to control over the means of communication and control
mechanisms related to the descriptions of the new issues. For this
purpose, autonomous and independent regulatory bodies have been
established by the state. One of these regulatory bodies is the Radio
and Television Supreme Council, which to be established in 1994,
with the Code no 3984. Today’s Radio and Television Supreme
Council which is responsible for the regulation of the radio and
television broadcasts all across Turkey has an important and effective
position as autonomous and independent regulatory body. The Radio
and Television Supreme Council acts as being a remarkable organizer
for a sensitive area of radio and television broadcasting on one hand,
and the area of democratic, liberal and keep in mind the concept of
the public interest by putting certain principles for the functioning of
the Board control, in the context of media policy as one of the central
organs, on the other hand.
In this study, the role of the Radio and Television Supreme
Council is examined in accordance with the Code no 3894 in order to
control over the communication and control mechanisms as well as
the examination of the changes in the duties of the Code No. 6112,
dated 2011.