Abstract: Data hiding into text documents itself involves pretty
complexities due to the nature of text documents. A robust text
watermarking scheme targeting an object based environment is
presented in this research. The heart of the proposed solution
describes the concept of watermarking an object based text document
where each and every text string is entertained as a separate object
having its own set of properties. Taking advantage of the z-ordering
of objects watermark is applied with the z-axis letting zero fidelity
disturbances to the text. Watermark sequence of bits generated
against user key is hashed with selected properties of given
document, to determine the bit sequence to embed. Bits are
embedded along z-axis and the document has no fidelity issues when
printed, scanned or photocopied.
Abstract: Complex systems are composed of several plain interacting independent entities. Interaction between these entities creates a unified behavior at the global level that cannot be predicted by examining the behavior of any single individual component of the system. In this paper we consider a welded frame of an automobile trailer as a real example of Complex Technical Systems, The purpose of this paper is to introduce a Statistical method for predicting the life cycle of complex technical systems. To organize gathering of primary data for modeling the life cycle of complex technical systems an “Automobile Trailer Frame" were used as a prototype in this research. The prototype represents a welded structure of several pieces. Both information flows underwent a computerized analysis and classification for the acquisition of final results to reach final recommendations for improving the trailers structure and their operational conditions.
Abstract: This paper provides some thoughts about the lack of
attentiveness of building commissioning in the construction industry
and the lack of handling in project commissioning as an integral part
of the project life-cycle. Many have perceived commissioning as the
problem solving process of a project, rather than the start up of the
equipment, or the handing over of the project to the client. Therefore,
there is a lack of proper attention in the planning of commissioning
as a vital part of the project life-cycle. This review paper aims to
highlight the benefits of building commissioning and to propose the
lacking of knowledge gap on building commissioning. Finally, this
paper hopes to propose the shift of focus on this matter in future
research.
Abstract: Brand loyalty is a strategic asset of the company. In
the era of competition to have loyal customers decides on the market
superiority of enterprises. Creating the loyalty of buyers, however, is
a lengthy process and requires the appropriate business strategy,
preceded by the proper market research. The purpose of the paper is
to present the concept of brand loyalty, the creation of loyalty of
customers, the benefits and determinants of loyalty on the example of
brewery market in Poland.
Abstract: Client expectations and preferences about therapy
represent an important area of investigation as research shows they
are linked to engagement in therapy and therapy outcomes. Studies
examining young people-s expectations and preferences of therapy
remain a neglected area of research. The present study explored what
expectations and preferences young people seeking professional help
held regarding: their role as a client, their therapist-s role, their
therapeutic outcomes, and the processes of therapy. Gender and age
differences were also examined. Participants included 188 young
people aged 12-25 who completed a survey while attending their
initial session at a youth mental health service. Data were analysed
using quantitative methods. Results found the young people held
significantly more pessimistic expectations around therapy when
compared to what they had wanted therapy to be like. Few age and
gender differences were found. Results highlight the importance of a
collaborative therapy approach when working with young people.
Abstract: This research aimed to study the market feasibility for
new brand coffee house, the case study of Thailand.. This study is a
mixed methods research combining quantitative research and the
qualitative research. Primary data 350 sets of questionnaires were
distributed, and the high quality completed questionnaires of 320 sets
returned. Research samples are identified as customers’ of Hi-end
department stores in Thailand. The sources of secondary data were
critical selected from highly reliable sources, both from public and
private sectors. The results were used to classify the customer group
into two main groups, the younger than 25 and the older than 25years
old. Results of the younger group, are give priority to the dimension
of coffee house and its services dimension more than others, then
branding dimension and the product dimension respectively. On the
other hand, the older group give the difference result as they rate the
important of the branding, coffee house and its services, then the
product respectively. Coffee consuming is not just the trend but it
has become part of people lifestyle. And the new cultures also created
by the wise businessman. Coffee was long produced and consumed in
Thailand. But it is surprisingly the hi-end brand coffee houses in Thai
market are mostly imported brands. The café business possibility for
Thai brand coffee house in Thai market were discussed in the paper.
Abstract: The purposes of this study are to study political
information exposure, politicians- perceptions, political attitudes and
political participations among people in Bangkok Metropolitan Area.
The sample consisted of 420 which were selected by using accidental sampling method. Questionnaires were administered to all of the
respondents to obtain the data for this research. T-test, one-way ANOVA and Pearson-s correlation coefficient were used to analyze the data. The findings are as follows: The difference in gender,
education, income and occupation has significantly effect upon political information exposures. The difference in age, income has
significantly effect upon politicians- perceptions. The difference in income has significantly effect upon political attitudes. The
difference in gender, income and occupation has significantly effect
upon political participations. There were a significantly relations between political information exposures, political attitudes, political
participations and between politicians- perceptions, political attitudes and political participations.
Abstract: The purpose of this research was to design costume by the inspiration from the configurations, colors and decorations of Thai Royal Barges. The researcher investigated the bibliographies and the important of the Thai Royal Water-Course Procession, configurations and decoration techniques of four Royal Barges history. Furthermore, the researcher combined the contemporary architecture which became part of the four costumes with four patterns in this research. The four costumes designed by applied the physical configuration of the Royal Barge with the fold techniques which create the geometry pattern that are part of the Royal Barge-s decoration and contemporary architecture. Therefore, the researcher united each identity color of the barges with each costume composed with the original patterns by adjusted new layout and resized. Lastly, the new attractive patterns appeared. Nevertheless, the beauty of Thai traditional still remain by using Thai painting figure with black and white color which are the prevalent colors for the contemporary architectures.
Abstract: There have been significant improvements in automatic
voice recognition technology. However, existing systems still face difficulties,
particularly when used by non-native speakers with accents.
In this paper we address a problem of identifying the English accented
speech of speakers from different backgrounds. Once an accent is
identified the speech recognition software can utilise training set from
appropriate accent and therefore improve the efficiency and accuracy
of the speech recognition system. We introduced the Q factor, which
is defined by the sum of relationships between frequencies of the
formants. Four different accents were considered and experimented
for this research. A scoring method was introduced in order to
effectively analyse accents. The proposed concept indicates that the
accent could be identified by analysing their formants.
Abstract: Recommender systems are usually regarded as an
important marketing tool in the e-commerce. They use important
information about users to facilitate accurate recommendation. The
information includes user context such as location, time and interest
for personalization of mobile users. We can easily collect information
about location and time because mobile devices communicate with the
base station of the service provider. However, information about user
interest can-t be easily collected because user interest can not be
captured automatically without user-s approval process. User interest
usually represented as a need. In this study, we classify needs into two
types according to prior research. This study investigates the
usefulness of data mining techniques for classifying user need type for
recommendation systems. We employ several data mining techniques
including artificial neural networks, decision trees, case-based
reasoning, and multivariate discriminant analysis. Experimental
results show that CHAID algorithm outperforms other models for
classifying user need type. This study performs McNemar test to
examine the statistical significance of the differences of classification
results. The results of McNemar test also show that CHAID performs
better than the other models with statistical significance.
Abstract: One of the main environmental problems which affect extensive areas in the world is soil salinity. Traditional data collection methods are neither enough for considering this important environmental problem nor accurate for soil studies. Remote sensing data could overcome most of these problems. Although satellite images are commonly used for these studies, however there are still needs to find the best calibration between the data and real situations in each specified area. Neyshaboor area, North East of Iran was selected as a field study of this research. Landsat satellite images for this area were used in order to prepare suitable learning samples for processing and classifying the images. 300 locations were selected randomly in the area to collect soil samples and finally 273 locations were reselected for further laboratory works and image processing analysis. Electrical conductivity of all samples was measured. Six reflective bands of ETM+ satellite images taken from the study area in 2002 were used for soil salinity classification. The classification was carried out using common algorithms based on the best composition bands. The results showed that the reflective bands 7, 3, 4 and 1 are the best band composition for preparing the color composite images. We also found out, that hybrid classification is a suitable method for identifying and delineation of different salinity classes in the area.
Abstract: Society has grown to rely on Internet services, and the
number of Internet users increases every day. As more and more
users become connected to the network, the window of opportunity
for malicious users to do their damage becomes very great and
lucrative. The objective of this paper is to incorporate different
techniques into classier system to detect and classify intrusion from
normal network packet. Among several techniques, Steady State
Genetic-based Machine Leaning Algorithm (SSGBML) will be used
to detect intrusions. Where Steady State Genetic Algorithm (SSGA),
Simple Genetic Algorithm (SGA), Modified Genetic Algorithm and
Zeroth Level Classifier system are investigated in this research.
SSGA is used as a discovery mechanism instead of SGA. SGA
replaces all old rules with new produced rule preventing old good
rules from participating in the next rule generation. Zeroth Level
Classifier System is used to play the role of detector by matching
incoming environment message with classifiers to determine whether
the current message is normal or intrusion and receiving feedback
from environment. Finally, in order to attain the best results,
Modified SSGA will enhance our discovery engine by using Fuzzy
Logic to optimize crossover and mutation probability. The
experiments and evaluations of the proposed method were performed
with the KDD 99 intrusion detection dataset.
Abstract: The purposes of this paper are to (1) promote excellence in computer science by suggesting a cohesive innovative approach to fill well documented deficiencies in current computer science education, (2) justify (using the authors' and others anecdotal evidence from both the classroom and the real world) why this approach holds great potential to successfully eliminate the deficiencies, (3) invite other professionals to join the authors in proof of concept research. The authors' experiences, though anecdotal, strongly suggest that a new approach involving visual modeling technologies should allow computer science programs to retain a greater percentage of prospective and declared majors as students become more engaged learners, more successful problem-solvers, and better prepared as programmers. In addition, the graduates of such computer science programs will make greater contributions to the profession as skilled problem-solvers. Instead of wearily rememorizing code as they move to the next course, students will have the problem-solving skills to think and work in more sophisticated and creative ways.
Abstract: The transformation of vocal characteristics aims at
modifying voice such that the intelligibility of aphonic voice is
increased or the voice characteristics of a speaker (source speaker) to
be perceived as if another speaker (target speaker) had uttered it. In
this paper, the current state-of-the-art voice characteristics
transformation methodology is reviewed. Special emphasis is placed
on voice transformation methodology and issues for improving the
transformed speech quality in intelligibility and naturalness are
discussed. In particular, it is suggested to use the modulation theory
of speech as a base for research on high quality voice transformation.
This approach allows one to separate linguistic, expressive, organic
and perspective information of speech, based on an analysis of how
they are fused when speech is produced. Therefore, this theory
provides the fundamentals not only for manipulating non-linguistic,
extra-/paralinguistic and intra-linguistic variables for voice
transformation, but also for paving the way for easily transposing the
existing voice transformation methods to emotion-related voice
quality transformation and speaking style transformation. From the
perspectives of human speech production and perception, the popular
voice transformation techniques are described and classified them
based on the underlying principles either from the speech production
or perception mechanisms or from both. In addition, the advantages
and limitations of voice transformation techniques and the
experimental manipulation of vocal cues are discussed through
examples from past and present research. Finally, a conclusion and
road map are pointed out for more natural voice transformation
algorithms in the future.
Abstract: Thanks to the interdisciplinary nature of crises, the
position of researchers in that field is rather difficult. Very often the
traditional methods of research cannot be applied there. The article is
aimed at the changes in crises research. It describes the substance of
individual changes and emphasizes the shift in research approaches
to the crisis.
Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: This paper aims at a new challenge of customer
satisfaction on mobile customer relationship management. In this
paper presents a conceptualization of mCRM on its unique
characteristics of customer satisfaction. Also, this paper develops an
empirical framework in conception of customer satisfaction in
mCRM. A single-case study is applied as the methodology. In order to
gain an overall view of the empirical case, this paper accesses to
invisible and important information of company in this investigation.
Interview is the key data source form the main informants of the
company through which the issues are identified and the proposed
framework is built. It supports the development of customer
satisfaction in mCRM; links this theoretical framework into practice;
and provides the direction for future research. Therefore, this paper is
very useful for the industries as it helps them to understand how
customer satisfaction changes the mCRM structure and increase the
business competitive advantage. Finally, this paper provides a
contribution in practice by linking a theoretical framework in
conception of customer satisfaction in mCRM for companies to a
practical real case.
Abstract: This paper shows the results of empirical research. It
presents experiences of Polish companies from the Podkarpackie
voivodeship connected with implementing EMS according to the
requirements of the ISO 14001 international standard. The incentives
to introduce and certify organizational eco-innovation, which formal
EMSs are treated as, are presented in this paper.
Abstract: In a state-of-the-art industrial production line of
photovoltaic products the handling and automation processes are of
particular importance and implication. While processing a fully
functional crystalline solar cell an as-cut photovoltaic wafer is subject
to numerous repeated handling steps. With respect to stronger
requirements in productivity and decreasing rejections due to defects
the mechanical stress on the thin wafers has to be reduced to a
minimum as the fragility increases by decreasing wafer thicknesses.
In relation to the increasing wafer fragility, researches at the
Fraunhofer Institutes IPA and CSP showed a negative correlation
between multiple handling processes and the wafer integrity. Recent
work therefore focused on the analysis and optimization of the dry
wafer stack separation process with compressed air. The achievement
of a wafer sensitive process capability and a high production
throughput rate is the basic motivation in this research.
Abstract: Solar energy has a major role in renewable energy
resources. Solar Cell as a basement of solar system has attracted lots
of research. To conduct a study about solar energy system, an
authenticated model is required. Diode base PV models are widely
used by researchers. These models are classified based on the number
of diodes used in them. Single and two-diode models are well
studied. Single-diode models may have two, three or four elements.
In this study, these solar cell models are examined and the simulation
results are compared to each other. All PV models are re-designed in
the Matlab/Simulink software and they examined by certain test
conditions and parameters. This paper provides comparative studies
of these models and it tries to compare the simulation results with
manufacturer-s data sheet to investigate model validity and accuracy.
The results show a four- element single-diode model is accurate and
has moderate complexity in contrast to the two-diode model with
higher complexity and accuracy