Abstract: The decisions made by admission control algorithms are
based on the availability of network resources viz. bandwidth, energy,
memory buffers, etc., without degrading the Quality-of-Service (QoS)
requirement of applications that are admitted. In this paper, we
present an energy-aware admission control (EAAC) scheme which
provides admission control for flows in an ad hoc network based
on the knowledge of the present and future residual energy of the
intermediate nodes along the routing path. The aim of EAAC is to
quantify the energy that the new flow will consume so that it can
be decided whether the future residual energy of the nodes along
the routing path can satisfy the energy requirement. In other words,
this energy-aware routing admits a new flow iff any node in the
routing path does not run out of its energy during the transmission
of packets. The future residual energy of a node is predicted using
the Multi-layer Neural Network (MNN) model. Simulation results
shows that the proposed scheme increases the network lifetime. Also
the performance of the MNN model is presented.
Abstract: This paper characterizes the effects of artificial short
term aging in the laboratory on the rheological properties of virgin
80/100 penetration grade asphalt binder. After several years in
service, asphalt mixture started to deteriorate due to aging. Aging is a
complex physico-chemical phenomenon that influences asphalt
binder rheological properties causing a deterioration in asphalt
mixture performance. To ascertain asphalt binder aging effects, the
virgin, artificially aged and extracted asphalt binder were tested via
the Rolling Thin film Oven (RTFO), Dynamic Shear Rheometer
(DSR) and Rotational Viscometer (RV). A comparative study
between laboratory and field aging conditions were also carried out.
The results showed that the specimens conditioned for 85 minutes
inside the RTFO was insufficient to simulate the actual short term
aging caused that took place in the field under Malaysian field
conditions
Abstract: This research aimed to study the competency of health
and wellness hotels and resorts in developing use the local natural
resources and wisdom to conform to the national health and wellness
tourism (HWT) strategy by comparing two independent samples,
from Aumpur Muang, Ranong province and Aumpur Muang,
Chiangmai province. And also study in the suggestive direct path to
lead the organization to the sustainable successful.
This research was conduct by using mix methodology; both
quantitative and qualitative data were used. The data of competency
of health and wellness hotels and resorts (HWHR) in developing use
the local natural resources for HWT promoting were collected via
300 set of questionnaires, from 6 hotels and resorts in 2 areas, 3
places from Aumpur Muang, Ranong province and another 3 from
Aumpur Muang, Chiangmai province.
Thestudy of HWHR’s competency in developing use the local
natural resources and wisdom to conform to the national HWT
strategycan be divided into fourmain areas, food and beverages
service, tourism activity, environmental service, and value adding.
The total competency of the Chiangmai sample is importantly
scoredp. value 0.01 higher than the Ranong one while the area of
safety, Chiangmai’s competency is importantly scored 0.05 higher
than the Ranong’scompetency. Others were rated not differently.
Since Chiangmai perform better, then it can be a role model in
developing HTHR or HWT destination.
From the part of qualitative research, content analysis of business
contents and its environments were analyzed. The four stages of
strategic development and plans, from the smallest scale to the largest
scale such a national base were discussed. The HWT: Evolution
model and strategy for lodging Business were suggested. All those
stages must work harmoniously together. The distinctive result
illustrates the need of human resource development as the key point
to create the identity of Thainess on Health and wellness service
providing. This will add-on the value of services and differentiates
ourselves from other competitors. The creative of Thailand’s health
and wellness brand possibly increase loyalty customers which agreed
to be a path of sustainable development.
Abstract: Cloud computing is the innovative and leading
information technology model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources
that can be rapidly provisioned and released with minimal
management effort. This paper presents our development on enabling
an individual user's desktop in a virtualized environment, which is
stored on a remote virtual machine rather than locally. We present the
initial work on the integration of virtual desktop and application
sharing with virtualization technology. Given the development of
remote desktop virtualization, this proposed effort has the potential to
positively provide an efficient, resilience and elastic environment for
online cloud service. Users no longer need to burden the cost of
software licenses and platform maintenances. Moreover, this
development also helps boost user productivity by promoting a
flexible model that lets users access their desktop environments from
virtually anywhere.
Abstract: Energy intensity(energy consumption intensity) is a
global index which computes the required energy for producing a
specific value of goods and services in each country. It is computed
in terms of initial energy supply or final energy consumption. In this
study (research) Divisia method is used to decompose energy
consumption and energy intensity. This method decomposes
consumption and energy intensity to production effects, structural
and net intensity and could be done as time series or two-periodical.
This study analytically investigates consumption changes and energy
intensity on economical sectors of Iran and more specific on road
transportation(rail road and road).Our results show that the
contribution of structural effect (change in economical activities
combination) is very low and the effect of net energy consumption
has the higher contribution in consumption changes and energy
intensity. In other words, the high consumption of energy is due to
Intensity of energy consumption and is not to structural effect of
transportation sector.
Abstract: Most, if not all, public hospitals in Thailand have encountered a common problem regarding the increasing demand for medical services. The increasing number of patients causes so much strain on the hospital-s services, over-crowded, overloaded working hours, staff fatigue, medical error and long waiting time. This research studied the characteristics of operational processes of the medical care services at the medicine department in a large public university hospital. The research focuses on details regarding methods, procedures, processes, resources, and time management in overall processes. The simulation model is used as a tool to analyze the impact of various improvement strategies.
Abstract: IT consultants often take over an important role as an
interface between technological, organizational and managerial
structures. As a result, the services offered are in many cases
assigned to different disciplines which can cause a lack of
transparency on the market for consulting services. However, not all
consulting products are suitable for every company because of
different frameworks and business processes. In this context the
questions arises as to what consulting products are currently offered
and how they can be compared as well as how the market for IT
consulting services is structured on the supply side. The presented
study aims to shed light on the IT consulting market by giving an
overview of the current structure of the supply-side for IT consulting
services as well as proposing a categorization of the currently
available consulting services (consulting fields) in order to provide a
theoretical background for the empirical study. Apart from these
theoretical considerations, the empirical results of field surveys on
the Austrian IT consulting market are presented and analyzed.
Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: Mobile devices, which are progressively surrounded
in our everyday life, have created a new paradigm where they
interconnect, interact and collaborate with each other. This network
can be used for flexible and secure coordinated sharing. On the other
hand Grid computing provides dependable, consistent, pervasive, and
inexpensive access to high-end computational capabilities. In this
paper, efforts are made to map the concepts of Grid on Ad-Hoc
networks because both exhibit similar kind of characteristics like
Scalability, Dynamism and Heterogeneity. In this context we
propose “Mobile Ad-Hoc Services Grid – MASGRID".
Abstract: In this paper, we first consider the quality of service
problems in heterogeneous wireless networks for sending the video
data, which their problem of being real-time is pronounced. At last,
we present a method for ensuring the end-to-end quality of service at
application layer level for adaptable sending of the video data at
heterogeneous wireless networks. To do this, mechanism in different
layers has been used. We have used the stop mechanism, the
adaptation mechanism and the graceful degrade at the application
layer, the multi-level congestion feedback mechanism in the network
layer and connection cutting off decision mechanism in the link
layer. At the end, the presented method and the achieved
improvement is simulated and presented in the NS-2 software.
Abstract: Modern information and communication technologies
offer a variety of support options for the efficient handling of
customer relationships. CRM systems have been developed, which
are designed to support the processes in the areas of marketing, sales
and service. Along with technological progress, CRM systems are
constantly changing, i.e. the systems are continually enhanced by
new functions. However, not all functions are suitable for every
company because of different frameworks and business processes. In
this context the question arises whether or not CRM systems are
widely used in Austrian companies and which business processes are
most frequently supported by CRM systems. This paper aims to shed
light on the popularity of CRM systems in Austrian companies in
general and the use of different functions to support their daily
business. First of all, the paper provides a theoretical overview of the
structure of modern CRM systems and proposes a categorization of
currently available software functionality for collaborative,
operational and analytical CRM processes, which provides the
theoretical background for the empirical study. Apart from these
theoretical considerations, the paper presents the empirical results of
a field survey on the use of CRM systems in Austrian companies and
analyzes its findings.
Abstract: The IEEE 802.11e which is an enhanced version of the 802.11 WLAN standards incorporates the Quality of Service (QoS) which makes it a better choice for multimedia and real time applications. In this paper we study various aspects concerned with 802.11e standard. Further, the analysis results for this standard are compared with the legacy 802.11 standard. Simulation results show that IEEE 802.11e out performs legacy IEEE 802.11 in terms of quality of service due to its flow differentiated channel allocation and better queue management architecture. We also propose a method to improve the unfair allocation of bandwidth for downlink and uplink channels by varying the medium access priority level.
Abstract: Faced with social and health system capacity
constraints and rising and changing demand for welfare services,
governments and welfare providers are increasingly relying on
innovation to help support and enhance services. However, the
evidence reported by several studies indicates that the realization of
that potential is not an easy task. Innovations can be deemed
inherently complex to implement and operate, because many of them
involve a combination of technological and organizational renewal
within an environment featuring a diversity of stakeholders. Many
public welfare service innovations are markedly systemic in their
nature, which means that they emerge from, and must address, the
complex interplay between political, administrative, technological,
institutional and legal issues. This paper suggests that stakeholders
dealing with systemic innovation in welfare services must deal with
ambiguous and incomplete information in circumstances of
uncertainty. Employing a literature review methodology and case
study, this paper identifies, categorizes and discusses different
aspects of the uncertainty of systemic innovation in public welfare
services, and argues that uncertainty can be classified into eight
categories: technological uncertainty, market uncertainty,
regulatory/institutional uncertainty, social/political uncertainty,
acceptance/legitimacy uncertainty, managerial uncertainty, timing
uncertainty and consequence uncertainty.
Abstract: Quality of Service (QoS) Routing aims to find path between source and destination satisfying the QoS requirements which efficiently using the network resources and underlying routing algorithm and to fmd low-cost paths that satisfy given QoS constraints. One of the key issues in providing end-to-end QoS guarantees in packet networks is determining feasible path that satisfies a number of QoS constraints. We present a Optimized Multi- Constrained Routing (OMCR) algorithm for the computation of constrained paths for QoS routing in computer networks. OMCR applies distance vector to construct a shortest path for each destination with reference to a given optimization metric, from which a set of feasible paths are derived at each node. OMCR is able to fmd feasible paths as well as optimize the utilization of network resources. OMCR operates with the hop-by-hop, connectionless routing model in IP Internet and does not create any loops while fmding the feasible paths. Nodes running OMCR not necessarily maintaining global view of network state such as topology, resource information and routing updates are sent only to neighboring nodes whereas its counterpart link-state routing method depend on complete network state for constrained path computation and that incurs excessive communication overhead.
Abstract: The development of shape and size of a crack in a
pressure vessel under uniaxial and biaxial loadings is important in
fitness-for-service evaluations such as leak-before-break. In this
work finite element modelling was used to evaluate the mean stress
and the J-integral around a front of a surface-breaking crack. A
procedure on the basis of ductile tearing resistance curves of high and
low constrained fracture mechanics geometries was developed to
estimate the amount of ductile crack extension for surface-breaking
cracks and to show the evolution of the initial crack shape. The
results showed non-uniform constraint levels and crack driving forces
around the crack front at large deformation levels. It was also shown
that initially semi-elliptical surface cracks under biaxial load
developed higher constraint levels around the crack front than in
uniaxial tension. However similar crack shapes were observed with
more extensions associated with cracks under biaxial loading.
Abstract: In view of current IT integration development of SOA, this paper examines AIS design based on SOA, including information sources collection, accounting business process integration and real-time financial reports. The main objective of this exploratory paper is to facilitate AIS research combing the Web Service, which is often ignored in accounting and computer research. It provides a conceptual framework that clarifies the interdependency between SOA and AIS, and also presents the major SOA functions in different areas of AIS
Abstract: Prestressing in structure increases ratio of load-bearing capacity to weight. Suspendomes are single-layer braced domes reinforced with cable and strut. Prestressing of cables alter value and distribution of stress in structure. In this study two configuration, diamatic and lamella domes is selected. Investigated domes have span of 100m with rise-to-span ratios of 0.1, 0.2, and 0.3. Single layer domes loaded under service load combinations according to ISO code. After geometric nonlinear analysis, models are designed with tubular and I-shaped sections then reinforced with cable and strut and converted to suspendomes. Displacements and stresses of some groups of nodes and elements in all of single-layer domes and suspendomes for three load combinations, symmetric snow, asymmetric snow and wind are compared. Variation due to suspending system is investigated. Suspendomes are redesigned and minimum possible weight after addition of cable and strut is obtained.
Abstract: In the management of industrial waste, conversion from the use of paper invoices to electronic forms is currently under way in developed countries. Difficulties in such computerization include the lack of synchronization between the actual goods and the corresponding data managed by the server. Consequently, a system which utilizes the incorporation of a QR code in connection with the waste material has been developed. The code is read at each stage, from discharge until disposal, and progress at each stage can be easily reported. This system can be linked with Japanese public digital authentication service of waste, taking advantage of its good points, and can be used to submit reports to the regulatory authorities. Its usefulness was confirmed by a verification test, and put into actual practice.
Abstract: Cellular networks provide voice and data services to the users with mobility. To deliver services to the mobile users, the cellular network is capable of tracking the locations of the users, and allowing user movement during the conversations. These capabilities are achieved by the location management. Location management in mobile communication systems is concerned with those network functions necessary to allow the users to be reached wherever they are in the network coverage area. In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred to as cells. The cellular concept was introduced to reuse the radio frequency. Continued expansion of cellular networks, coupled with an increasingly restricted mobile spectrum, has established the reduction of communication overhead as a highly important issue. Much of this traffic is used in determining the precise location of individual users when relaying calls, with the field of location management aiming to reduce this overhead through prediction of user location. This paper describes and compares various location management schemes in the cellular networks.
Abstract: In this paper, backup and recovery technique for Peer
to Peer applications, such as a distributed asynchronous Web-Based
Training system that we have previously proposed. In order to
improve the scalability and robustness of this system, all contents and
function are realized on mobile agents. These agents are distributed
to computers, and they can obtain using a Peer to Peer network
that modified Content-Addressable Network. In the proposed system,
although entire services do not become impossible even if some
computers break down, the problem that contents disappear occurs
with an agent-s disappearance. As a solution for this issue, backups
of agents are distributed to computers. If a failure of a computer is
detected, other computers will continue service using backups of the
agents belonged to the computer.