Abstract: A model is presented to find the optimal design of the
mixed renewable warranty policy for non-repairable Weibull life
products. The optimal design considers the conflict of interests
between the customer and the manufacturer: the customer interests
are longer full rebate coverage period and longer total warranty
coverage period, the manufacturer interests are lower warranty cost
and lower risk. The design factors are full rebate and total warranty
coverage periods. Results showed that mixed policy is better than full
rebate policy in terms of risk and total warranty coverage period in all
of the three bathtub regions. In addition, results showed that linear
policy is better than mixed policy in infant mortality and constant
failure regions while the mixed policy is better than linear policy in
ageing region of the model. Furthermore, the results showed that
using burn-in period for infant mortality products reduces warranty
cost and risk.
Abstract: Guaranteeing the availability of the required parts at
the scheduled time represents a key logistical challenge. This is
especially important when several parts are required together. This
article describes a tool that supports the positioning in the area of
conflict between low stock costs and a high service level for a
consumer.
Abstract: Many accidents were happened because of fast driving, habitual working overtime or tired spirit. This paper presents a solution of remote warning for vehicles collision avoidance using vehicular communication. The development system integrates dedicated short range communication (DSRC) and global position system (GPS) with embedded system into a powerful remote warning system. To transmit the vehicular information and broadcast vehicle position; DSRC communication technology is adopt as the bridge. The proposed system is divided into two parts of the positioning andvehicular units in a vehicle. The positioning unit is used to provide the position and heading information from GPS module, and furthermore the vehicular unit is used to receive the break, throttle, and othersignals via controller area network (CAN) interface connected to each mechanism. The mobile hardware are built with an embedded system using X86 processor in Linux system. A vehicle is communicated with other vehicles via DSRC in non-addressed protocol with wireless access in vehicular environments (WAVE) short message protocol. From the position data and vehicular information, this paper provided a conflict detection algorithm to do time separation and remote warning with error bubble consideration. And the warning information is on-line displayed in the screen. This system is able to enhance driver assistance service and realize critical safety by using vehicular information from the neighbor vehicles.KeywordsDedicated short range communication, GPS, Control area network, Collision avoidance warning system.
Abstract: This paper examines the depiction of Muslim militants in Thai newspapers in 2004. Stuart Hall-s “representation" and “public idioms" are used as theoretical frameworks. Critical Discourse Analysis is employed as a methodology to examine 240 news articles from two leading Thai language newspapers. The results show that the militants are usually labeled as “southern bandits." This suggests that they are just a culprit of the violence in the deep south of Thailand. They are usually described as people who cause turbulence. Consequently, the military have to get rid of them. However, other aspects of the groups such as their political agenda or the failures of the Thai state in dealing with the Malay Muslims were not mention in the news stories. In the time of violence, the researcher argues that this kind of newspaper coverage may help perpetuate the discourse of Malay Muslim, instead of providing fuller picture of the ongoing conflicts.
Abstract: The modern Kazakh society is characterized by strengthen cross-cultural communication, the emergence of new powerful subcultures, accelerated change in social systems and values. The socio-political reforms in all fields have changed the quality of social relationships and spiritual life.Cross-cultural approach involves the analysis of different types of behavior and communication, including the manifestation of the conflict, and the formation of marginal destructive stereotypes.
Abstract: The purpose of this study was to survey the effect of
organizational communication system on the conflict in physical
education offices of Isfahan province. The research methodology of
this research was a descriptive study. All employees working in
physical education offices of Isfahan province were included in the
sample for this study (N= 236). Researcher made questionnaire and
demographic questionnaire were used as investigation instruments.
Based on the result of chi square test, there is significant difference
between organizational communication system and interpersonal
conflict. The most of participants evaluate communication in an
informal way and pointed out that the communication channels were
not open. Based on the result of binomial test, interpersonal conflict
exists in physical education offices of Isfahan.
Abstract: Trust management and Reputation models are
becoming integral part of Internet based applications such as CSCW,
E-commerce and Grid Computing. Also the trust dimension is a
significant social structure and key to social relations within a
collaborative community. Collaborative Decision Making (CDM) is
a difficult task in the context of distributed environment (information
across different geographical locations) and multidisciplinary
decisions are involved such as Virtual Organization (VO). To aid
team decision making in VO, Decision Support System and social
network analysis approaches are integrated. In such situations social
learning helps an organization in terms of relationship, team
formation, partner selection etc. In this paper we focus on trust
learning. Trust learning is an important activity in terms of
information exchange, negotiation, collaboration and trust
assessment for cooperation among virtual team members. In this
paper we have proposed a reinforcement learning which enhances the
trust decision making capability of interacting agents during
collaboration in problem solving activity. Trust computational model
with learning that we present is adapted for best alternate selection of
new project in the organization. We verify our model in a multi-agent
simulation where the agents in the community learn to identify
trustworthy members, inconsistent behavior and conflicting behavior
of agents.
Abstract: A traffic light gives security from traffic congestion,reducing the traffic jam, and organizing the traffic flow. Furthermore,increasing congestion level in public road networks is a growingproblem in many countries. Using Intelligent Transportation Systemsto provide emergency vehicles a green light at intersections canreduce driver confusion, reduce conflicts, and improve emergencyresponse times. Nowadays, the technology of wireless sensornetworks can solve many problems and can offer a good managementof the crossroad. In this paper, we develop a new approach based onthe technique of clustering and the graphical possibilistic fusionmodeling. So, the proposed model is elaborated in three phases. Thefirst one consists to decompose the environment into clusters,following by the fusion intra and inter clusters processes. Finally, wewill show some experimental results by simulation that proves theefficiency of our proposed approach.KeywordsTraffic light, Wireless sensor network, Controller,Possibilistic network/Bayesain network.
Abstract: Many environment specific methods and systems for Robot Navigation exist. However vast strides in the evolution of navigation technologies and system techniques create the need for a general unified framework that is scalable, modular and dynamic. In this paper a Unified Framework for a Robust Conflict-free Robot Navigation System that can be used for either a structured or unstructured and indoor or outdoor environments has been proposed. The fundamental design aspects and implementation issues encountered during the development of the module are discussed. The results of the deployment of three major peripheral modules of the framework namely the GSM based communication module, GIS Module and GPS module are reported in this paper.
Abstract: Decision making preferences to certain criteria
usually focus on positive degrees without considering the negative
degrees. However, in real life situation, evaluation becomes more
comprehensive if negative degrees are considered concurrently.
Preference is expected to be more effective when considering both
positive and negative degrees of preference to evaluate the best
selection. Therefore, the aim of this paper is to propose the
conflicting bifuzzy preference relations in group decision making by
utilization of a novel score function. The conflicting bifuzzy
preference relation is obtained by introducing some modifications on
intuitionistic fuzzy preference relations. Releasing the intuitionistic
condition by taking into account positive and negative degrees
simultaneously and utilizing the novel score function are the main
modifications to establish the proposed preference model. The
proposed model is tested with a numerical example and proved to be
simple and practical. The four-step decision model shows the
efficiency of obtaining preference in group decision making.
Abstract: In this paper our aim is to explore the construction of schoolgirl femininities, drawing on the results of an ethnographic study conducted in a high school in Ankara, Turkey. In this case study which tries to explore the complexities of gender discourses, we were initially motivated by the questions that have been put forward by critical and feminist literature on education which emphasize the necessarily conflicting and partial nature of both reproduction and resistance and the importance of gendered power relations in the school context. Drawing on this paradigm our research tries to address to a more specific question: how are multiple schoolgirl femininities constructed within the context of gendered school culture, and especially in relation to hegemonic masculinity? Our study reveals that the general framework of multiple femininities is engendered by a tension between two inter-related positions. The first one is different strategies of accommodation and resistance to the gender-related problems of education. The second one is the school experience of girls which is conditioned by their differential position vis-à-vis the masculine resistance culture that is dominant in the school.
Abstract: Extracting and elaborating software requirements and
transforming them into viable software architecture are still an
intricate task. This paper defines a solution architecture which is
based on the blurred amalgamation of problem space and solution
space. The dependencies between domain constraints, requirements
and architecture and their importance are described that are to be
considered collectively while evolving from problem space to
solution space. This paper proposes a revised version of Twin Peaks
Model named Win Peaks Model that reconciles software
requirements and architecture in more consistent and adaptable
manner. Further the conflict between stakeholders- win-requirements
is resolved by proposed Voting methodology that is simple
adaptation of win-win requirements negotiation model and QARCC.
Abstract: The recognition of handwritten numeral is an
important area of research for its applications in post office, banks
and other organizations. This paper presents automatic recognition of
handwritten Kannada numerals based on structural features. Five
different types of features, namely, profile based 10-segment string,
water reservoir; vertical and horizontal strokes, end points and
average boundary length from the minimal bounding box are used in
the recognition of numeral. The effect of each feature and their
combination in the numeral classification is analyzed using nearest
neighbor classifiers. It is common to combine multiple categories of
features into a single feature vector for the classification. Instead,
separate classifiers can be used to classify based on each visual
feature individually and the final classification can be obtained based
on the combination of separate base classification results. One
popular approach is to combine the classifier results into a feature
vector and leaving the decision to next level classifier. This method
is extended to extract a better information, possibility distribution,
from the base classifiers in resolving the conflicts among the
classification results. Here, we use fuzzy k Nearest Neighbor (fuzzy
k-NN) as base classifier for individual feature sets, the results of
which together forms the feature vector for the final k Nearest
Neighbor (k-NN) classifier. Testing is done, using different features,
individually and in combination, on a database containing 1600
samples of different numerals and the results are compared with the
results of different existing methods.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: Intuitionistic fuzzy sets as proposed by Atanassov,
have gained much attention from past and latter researchers for
applications in various fields. Similarity measures between
intuitionistic fuzzy sets were developed afterwards. However, it does
not cater the conflicting behavior of each element evaluated. We
therefore made some modification to the similarity measure of IFS
by considering conflicting concept to the model. In this paper, we
concentrate on Zhang and Fu-s similarity measures for IFSs and
some examples are given to validate these similarity measures. A
simple modification to Zhang and Fu-s similarity measures of IFSs
was proposed to find the best result according to the use of degree of
indeterminacy. Finally, we mark up with the application to real
decision making problems.
Abstract: There is an urgent need to conserve the biological diversity of the Nigerian Environment for the future and present generation in the face of current energy resources development. This paper gives an in-depth analysis of the impact of oil and gas activities on the biological diversity of the Nigerian Niger Delta area and its consequences on the sustainable development of the host communities as it relates to their social, economic and environmental issues, particularly on the womenfolk who are the key managers of environmental resources. Also reviewed is the frustration of these communities that is reflected in unending conflicts.
Abstract: Most of the collision warning systems currently
available in the automotive market are mainly designed to warn
against imminent rear-end and lane-changing collisions. No collision
warning system is commercially available to warn against imminent
turning collisions at intersections, especially for left-turn collisions
when a driver attempts to make a left-turn at either a signalized or
non-signalized intersection, conflicting with the path of other
approaching vehicles traveling on the opposite-direction traffic
stream. One of the major factors that lead to left-turn collisions is the
human error and misjudgment of the driver of the turning vehicle
when perceiving the speed and acceleration of other vehicles
traveling on the opposite-direction traffic stream; therefore, using a
properly-designed collision warning system will likely reduce, or
even eliminate, this type of collisions by reducing human error. This
paper introduces perceptual framework for a proposed collision
warning system that can detect imminent left-turn collisions at
intersections. The system utilizes a commercially-available detection
sensor (either a radar sensor or a laser detector) to detect approaching
vehicles traveling on the opposite-direction traffic stream and
calculate their speeds and acceleration rates to estimate the time-tocollision
and compare that time to the time required for the turning
vehicle to clear the intersection. When calculating the time required
for the turning vehicle to clear the intersection, consideration is given
to the perception-reaction time of the driver of the turning vehicle,
which is the time required by the driver to perceive the message
given by the warning system and react to it by engaging the throttle.
A regression model was developed to estimate perception-reaction
time based on age and gender of the driver of the host vehicle.
Desired acceleration rate selected by the driver of the turning vehicle,
when making the left-turn movement, is another human factor that is
considered by the system. Another regression model was developed
to estimate the acceleration rate selected by the driver of the turning
vehicle based on driver-s age and gender as well as on the location
and speed of the nearest approaching vehicle along with the
maximum acceleration rate provided by the mechanical
characteristics of the turning vehicle. By comparing time-to-collision
with the time required for the turning vehicle to clear the intersection,
the system displays a message to the driver of the turning vehicle
when departure is safe. An application example is provided to
illustrate the logic algorithm of the proposed system.
Abstract: Property investment in the real estate industry has a
high risk due to the uncertainty factors that will affect the decisions
made and high cost. Analytic hierarchy process has existed for some
time in which referred to an expert-s opinion to measure the
uncertainty of the risk factors for the risk analysis. Therefore,
different level of experts- experiences will create different opinion
and lead to the conflict among the experts in the field. The objective
of this paper is to propose a new technique to measure the uncertainty
of the risk factors based on multidimensional data model and data
mining techniques as deterministic approach. The propose technique
consist of a basic framework which includes four modules: user,
technology, end-user access tools and applications. The property
investment risk analysis defines as a micro level analysis as the
features of the property will be considered in the analysis in this
paper.
Abstract: This paper applies Bayesian Networks to support
information extraction from unstructured, ungrammatical, and
incoherent data sources for semantic annotation. A tool has been
developed that combines ontologies, machine learning, and
information extraction and probabilistic reasoning techniques to
support the extraction process. Data acquisition is performed with the
aid of knowledge specified in the form of ontology. Due to the
variable size of information available on different data sources, it is
often the case that the extracted data contains missing values for
certain variables of interest. It is desirable in such situations to
predict the missing values. The methodology, presented in this paper,
first learns a Bayesian network from the training data and then uses it
to predict missing data and to resolve conflicts. Experiments have
been conducted to analyze the performance of the presented
methodology. The results look promising as the methodology
achieves high degree of precision and recall for information
extraction and reasonably good accuracy for predicting missing
values.
Abstract: A scalable QoS aware multicast deployment in
DiffServ networks has become an important research dimension in
recent years. Although multicasting and differentiated services are
two complementary technologies, the integration of the two
technologies is a non-trivial task due to architectural conflicts
between them. A popular solution proposed is to extend the
functionality of the DiffServ components to support multicasting. In
this paper, we propose an algorithm to construct an efficient QoSdriven
multicast tree, taking into account the available bandwidth per
service class. We also present an efficient way to provision the
limited available bandwidth for supporting heterogeneous users. The
proposed mechanism is evaluated using simulated tests. The
simulated result reveals that our algorithm can effectively minimize
the bandwidth use and transmission cost