Abstract: Mixed-traffic (e.g., pedestrians, bicycles, and vehicles)
data at an intersection is one of the essential factors for intersection
design and traffic control. However, some data such as pedestrian
volume cannot be directly collected by common detectors (e.g.
inductive loop, sonar and microwave sensors). In this paper, a video
based detection algorithm is proposed for mixed-traffic data collection
at intersections using surveillance cameras. The algorithm is derived
from Gaussian Mixture Model (GMM), and uses a mergence time
adjustment scheme to improve the traditional algorithm. Real-world
video data were selected to test the algorithm. The results show that
the proposed algorithm has the faster processing speed and more
accuracy than the traditional algorithm. This indicates that the
improved algorithm can be applied to detect mixed-traffic at
signalized intersection, even when conflicts occur.
Abstract: Despite extensive study on wireless sensor network
security, defending internal attacks and finding abnormal behaviour
of the sensor are still difficult and unsolved task. The conventional
cryptographic technique does not give the robust security or detection
process to save the network from internal attacker that cause by
abnormal behavior. The insider attacker or abnormally behaved
sensor identificationand location detection framework using false
massage detection and Time difference of Arrival (TDoA) is
presented in this paper. It has been shown that the new framework
can efficiently identify and detect the insider attacker location so that
the attacker can be reprogrammed or subside from the network to
save from internal attack.
Abstract: The objective of this research was to study the factors
related to the satisfaction of consumers who purchased a Toyota
SUV Fortuner. This paper was a survey data which collected 400
samples from 65 car dealerships. The survey was conducted mainly
in Bangkok, Thailand. The statistics utilized in this paper included
percentage, mean, standard deviation and Pearson Product-Moment.
The findings revealed that the majority of respondent were male with
an undergraduate degree, married and live together. The average
income of the respondents was between 20,001 - 30,000 baht. Most
of them worked for private companies. Most of them had a family
with the average of 4 members. The hypotheses testing revealed that
the factors of marketing mix in terms of product (ability, gas
mileage, and safety) were related to overall satisfaction at the
medium level. However, the findings also revealed that the factors of
marketing mix in terms of product (image), price, and promotion, and
service center were related to the overall satisfaction at the low level.
Abstract: Service innovations are central concerns in fast
changing environment. Due to the fitness in customer demands and
advances in information technologies (IT) in service management, an
expanded conceptualization of e-service innovation is required.
Specially, innovation practices have become increasingly more
challenging, driving managers to employ a different open innovation
model to maintain competitive advantages. At the same time, firms
need to interact with external and internal customers in innovative
environments, like the open innovation networks, to co-create values.
Based on these issues, an important conceptual framework of e-service
innovation is developed. This paper aims to examine the contributing
factors on e-service innovation and firm performance, including
financial and non-financial aspects. The study concludes by showing
how e-service innovation will play a significant role in growing the
overall values of the firm. The discussion and conclusion will lead to a
stronger understanding of e-service innovation and co-creating values
with customers within open innovation networks.
Abstract: The paper focuses on the area of context modeling with respect to the specification of context-aware systems supporting ubiquitous applications. The proposed approach, followed within the SIMPLICITY IST project, uses a high-level system ontology to derive context models for system components which consequently are mapped to the system's physical entities. For the definition of user and device-related context models in particular, the paper suggests a standard-based process consisting of an analysis phase using the Common Information Model (CIM) methodology followed by an implementation phase that defines 3GPP based components. The benefits of this approach are further depicted by preliminary examples of XML grammars defining profiles and components, component instances, coupled with descriptions of respective ubiquitous applications.
Abstract: The recognition of human faces, especially those with
different orientations is a challenging and important problem in image
analysis and classification. This paper proposes an effective scheme
for rotation invariant face recognition using Log-Polar Transform and
Discrete Cosine Transform combined features. The rotation invariant
feature extraction for a given face image involves applying the logpolar
transform to eliminate the rotation effect and to produce a row
shifted log-polar image. The discrete cosine transform is then applied
to eliminate the row shift effect and to generate the low-dimensional
feature vector. A PSO-based feature selection algorithm is utilized to
search the feature vector space for the optimal feature subset.
Evolution is driven by a fitness function defined in terms of
maximizing the between-class separation (scatter index).
Experimental results, based on the ORL face database using testing
data sets for images with different orientations; show that the
proposed system outperforms other face recognition methods. The
overall recognition rate for the rotated test images being 97%,
demonstrating that the extracted feature vector is an effective rotation
invariant feature set with minimal set of selected features.
Abstract: An investigation of noise in a micro stepping motor is
considered to study in this article. Because of the trend towards higher
precision and more and more small 3C (including Computer,
Communication and Consumer Electronics) products, the micro
stepping motor is frequently used to drive the micro system or the
other 3C products. Unfortunately, noise in a micro stepped motor is
too large to accept by the customs. To depress the noise of a micro
stepped motor, the dynamic characteristics in this system must be
studied. In this article, a Visual Basic (VB) computer program speed
controlled micro stepped motor in a digital camera is investigated.
Karman KD2300-2S non-contract eddy current displacement sensor,
probe microphone, and HP 35670A analyzer are employed to analyze
the dynamic characteristics of vibration and noise in a motor. The
vibration and noise measurement of different type of bearings and
different treatment of coils are compared. The rotating components,
bearings, coil, etc. of the motor play the important roles in producing
vibration and noise. It is found that the noise will be depressed about
3~4 dB and 6~7 dB, when substitutes the copper bearing with plastic
one and coats the motor coil with paraffin wax, respectively.
Abstract: Modern retailers such as hypermarket/supermarket
need to be more customer-oriented in order to survive in today-s
competitive business world. As a result, the investigation of
determinant factors of store loyalty becomes important issue for
modern retailing players. This study suggests that consumers- store
loyalty in the modern retailing market (hypermarkets and
supermarkets) is influenced by environmental factors (such as store
image, store personnel). Using a model of stimulus-organismresponse
(S-O-R), this research examines S-R relationship of store
loyalty. S-O-R framework is derived from the existence literature and
tested empirically based on Indonesian consumers- experience. The
stimuli for this study are store image, store personnel, satisfaction
and culture factors. Affect, or the consumers- liking to modern
retailing stores, mediates the chosen environmental factors on
consumer-s store loyalty. The findings showed that store image, store
satisfaction and culture have significant positive relationship to store
loyalty via affect.
Abstract: Various models have been derived by studying large number of completed software projects from various organizations and applications to explore how project sizes mapped into project effort. But, still there is a need to prediction accuracy of the models. As Neuro-fuzzy based system is able to approximate the non-linear function with more precision. So, Neuro-Fuzzy system is used as a soft computing approach to generate model by formulating the relationship based on its training. In this paper, Neuro-Fuzzy technique is used for software estimation modeling of on NASA software project data and performance of the developed models are compared with the Halstead, Walston-Felix, Bailey-Basili and Doty Models mentioned in the literature.
Abstract: The use of neural networks is popular in various
building applications such as prediction of heating load, ventilation
rate and indoor temperature. Significant is, that only few papers deal
with indoor carbon dioxide (CO2) prediction which is a very good
indicator of indoor air quality (IAQ). In this study, a data-driven
modelling method based on multilayer perceptron network for indoor
air carbon dioxide in an apartment building is developed.
Temperature and humidity measurements are used as input variables
to the network. Motivation for this study derives from the following
issues. First, measuring carbon dioxide is expensive and sensors
power consumptions is high and secondly, this leads to short
operating times of battery-powered sensors. The results show that
predicting CO2 concentration based on relative humidity and
temperature measurements, is difficult. Therefore, more additional
information is needed.
Abstract: In this paper a new approach to face recognition is presented that achieves double dimension reduction making the system computationally efficient with better recognition results. In pattern recognition techniques, discriminative information of image increases with increase in resolution to a certain extent, consequently face recognition results improve with increase in face image resolution and levels off when arriving at a certain resolution level. In the proposed model of face recognition, first image decimation algorithm is applied on face image for dimension reduction to a certain resolution level which provides best recognition results. Due to better computational speed and feature extraction potential of Discrete Cosine Transform (DCT) it is applied on face image. A subset of coefficients of DCT from low to mid frequencies that represent the face adequately and provides best recognition results is retained. A trade of between decimation factor, number of DCT coefficients retained and recognition rate with minimum computation is obtained. Preprocessing of the image is carried out to increase its robustness against variations in poses and illumination level. This new model has been tested on different databases which include ORL database, Yale database and a color database. The proposed technique has performed much better compared to other techniques. The significance of the model is two fold: (1) dimension reduction up to an effective and suitable face image resolution (2) appropriate DCT coefficients are retained to achieve best recognition results with varying image poses, intensity and illumination level.
Abstract: Planar systems of electrodes arranged on both sides of dielectric piezoelectric layer are applied in numerous transducers. They are capable of electronic beam-steering of generated wave both in azimuth and elevation. The wave-beam control is achieved by addressable driving of two-dimensional transducer through proper voltage supply of electrodes on opposite surfaces of the layer. In this paper a semi-analytical method of analysis of the considered transducer is proposed, which is a generalization of the well-known BIS-expansion method. It was earlier exploited with great success in the theory of interdigital transducers of surface acoustic waves, theory of elastic wave scattering by cracks and certain advanced electrostatic problems. The corresponding nontrivial electrostatic problem is formulated and solved numerically.
Abstract: In this paper we propose a new traffic simulation
package, TDMSim, which supports both macroscopic and
microscopic simulation on free-flowing and regulated traffic systems.
Both simulators are based on travel demands, which specify the
numbers of vehicles departing from origins to arrive at different
destinations. The microscopic simulator implements the carfollowing
model given the pre-defined routes of the vehicles but also
supports the rerouting of vehicles. We also propose a macroscopic
simulator which is built in integration with the microscopic simulator
to allow the simulation to be scaled for larger networks without
sacrificing the precision achievable through the microscopic
simulator. The macroscopic simulator also enables the reuse of
previous simulation results when simulating traffic on the same
networks at later time. Validations have been conducted to show the
correctness of both simulators.
Abstract: I/O workload is a critical and important factor to
analyze I/O pattern and to maximize file system performance.
However to measure I/O workload on running distributed parallel file
system is non-trivial due to collection overhead and large volume of
data. In this paper, we measured and analyzed file system activities on
two large-scale cluster systems which had TFlops level high
performance computation resources. By comparing file system
activities of 2009 with those of 2006, we analyzed the change of I/O
workloads by the development of system performance and high-speed
network technology.
Abstract: Business scenario is an important technique that may be used at various stages of the enterprise architecture to derive its characteristics based on the high-level requirements of the business. In terms of wireless deployments, they are used to help identify and understand business needs involving wireless services, and thereby to derive the business requirements that the architecture development has to address by taking into account of various wireless challenges. This study assesses the deployment of Wireless Local Area Network (WLAN) and Broadband Wireless Access (BWA) solutions for several business scenarios in Asia Pacific region. This paper focuses on the overview of the business and technology environments, whereby examples of existing (or suggested) wireless solutions (to be) adopted in Asia Pacific region will be discussed. Interactions of several players, enabling technologies, and key processes in the wireless environments are studied. The analysis and discussions associated to this study are divided into two divisions: healthcare and education, where the merits of wireless solutions in improving living quality are highlighted.
Abstract: Nowadays, computer worms, viruses and Trojan horse
become popular, and they are collectively called malware. Those
malware just spoiled computers by deleting or rewriting important
files a decade ago. However, recent malware seems to be born to earn
money. Some of malware work for collecting personal information so
that malicious people can find secret information such as password for
online banking, evidence for a scandal or contact address which relates
with the target. Moreover, relation between money and malware
becomes more complex. Many kinds of malware bear bots to get
springboards. Meanwhile, for ordinary internet users,
countermeasures against malware come up against a blank wall.
Pattern matching becomes too much waste of computer resources,
since matching tools have to deal with a lot of patterns derived from
subspecies. Virus making tools can automatically bear subspecies of
malware. Moreover, metamorphic and polymorphic malware are no
longer special. Recently there appears malware checking sites that
check contents in place of users' PC. However, there appears a new
type of malicious sites that avoids check by malware checking sites. In
this paper, existing protocols and methods related with the web are
reconsidered in terms of protection from current attacks, and new
protocol and method are indicated for the purpose of security of the
web.
Abstract: The availability of water in adequate quantity and
quality is imperative for sustainable development. Worldwide,
significant imbalance exists with regards to sustainable development
particularly from a water and sanitation perspective. Water is a
critical component of public health, and failure to supply safe water
will place a heavy burden on the entire population. Although the 21st
century has witnessed wealth and advanced development, it has not
been realized everywhere. Billions of people are still striving to
access the most basic human needs which are food, shelter, safe
drinking water and adequate sanitation. The global picture conceals
various inequalities particularly with regards to sanitation coverage in
rural and urban areas. Currently, water scarcity and in particular
water governance is the main challenge which will cause a threat to
sustainable development goals. Within the context of water,
sanitation and health, sustainable development is a confusing concept
primarily when examined from the viewpoint of policy options for
developing countries. This perspective paper aims to summarize and
critically evaluate evidence of published studies in relation to water,
sanitation and health and to identify relevant solutions to reduce
public health impacts. Evidently, improving water and sanitation
services will result in significant and lasting gains in health and
economic development.
Abstract: We present design, fabrication, and characterization of
a small (12 mm × 12 mm × 8 mm) movable railway vehicle for sensor
carrying. The miniature railway vehicle (MRV) was mainly composed
of a vibrational structure and three legs. A railway was designed and
fabricated to power and guide the MRV. It also transmits the sensed
data from the MRV to the signal processing unit. The MRV with legs
on the railway was moving due to its high-frequency vibration. A
model was derived to describe the motion. Besides, FEM simulations
were performed to design the legs. Then, the MRV and the railway
were fabricated by precision machining. Finally, an infrared sensor
was carried and tested. The result shows that the MRV without loading
was moving along the railway and its maximum speed was 12.2 mm/s.
Moreover, the testing signal was sensed by the MRV.
Abstract: This paper presents a threshold voltage model of pocket implanted sub-100 nm n-MOSFETs incorporating the drain and substrate bias effects using two linear pocket profiles. Two linear equations are used to simulate the pocket profiles along the channel at the surface from the source and drain edges towards the center of the n-MOSFET. Then the effective doping concentration is derived and is used in the threshold voltage equation that is obtained by solving the Poisson-s equation in the depletion region at the surface. Simulated threshold voltages for various gate lengths fit well with the experimental data already published in the literature. The simulated result is compared with the two other pocket profiles used to derive the threshold voltage models of n-MOSFETs. The comparison shows that the linear model has a simple compact form that can be utilized to study and characterize the pocket implanted advanced ULSI devices.
Abstract: Sediment and mangrove root samples from Iko River
Estuary, Nigeria were analyzed for microbial and polycyclic
aromatic hydrocarbon (PAH) content. The total heterotrophic
bacterial (THB) count ranged from 1.1x107 to 5.1 x107 cfu/g, total
fungal (TF) count ranged from 1.0x106 to 2.7x106 cfu/g, total
coliform (TC) count ranged from 2.0x104 to 8.0x104cfu/g while
hydrocarbon utilizing bacterial (HUB) count ranged from 1.0x 105 to
5.0 x 105cfu/g. There was a range of positive correlation (r = 0.72 to
0.93) between THB count and total HUB count, respectively. The
organisms were Staphylococcus aureus, Bacillus cereus,
Flavobacterium breve, Pseudomonas aeruginosa, Erwinia
amylovora, Escherichia coli, Enterobacter sp, Desulfovibrio sp,
Acinetobacter iwoffii, Chromobacterium violaceum, Micrococcus
sedentarius, Corynebacterium sp, and Pseudomonas putrefaciens.
The PAH were Naphthalene, 2-Methylnaphthalene, Acenapthylene,
Acenaphthene, Fluorene, Phenanthene, Anthracene, Fluoranthene,
Pyrene, Benzo(a)anthracene, Chrysene, Benzo(b)fluoranthene,
Benzo(k)fluoranthene, Benzo(a)pyrene, Dibenzo(a,h)anthracene,
Benzo(g,h,l)perylene ,Indeno(1,2,3-d)pyrene with individual PAH
concentrations that ranged from 0.20mg/kg to 1.02mg/kg, 0.20mg/kg
to 1.07mg/kg and 0.2mg/kg to 4.43mg/kg in the benthic sediment,
epipellic sediment and mangrove roots, respectively. Total PAH
ranged from 6.30 to 9.93mg/kg, 6.30 to 9.13mg/kg and 9.66 to
16.68mg/kg in the benthic sediment, epipellic sediment and
mangrove roots, respectively. The high concentrations in the
mangrove roots are indicative of bioaccumulation of the pollutant in
the plant tissue. The microorganisms are of ecological significance
and the detectable quantities of polycyclic aromatic hydrocarbon
could be partitioned and accumulated in tissues of infaunal and
epifaunal organisms in the study area.