Abstract: Repeated additions of the unfertilized bacteria led to
increase the activity of Nitrogen-fixing bacteria in the root zone with
drip irrigation system compared to traditional manual vaccination to
increase the proportion of Nitrogen from 29% to 64%, and the
efficiency of adding Nitrogen fertilizer did not exceed 9.5% while
dropped to 4%, due to the amount of fertilizer added was not exceed
20kg N/h, and the second was the existence of a large amount of
available Nitrogen in the soil by fixation, while the efficiency of
irrigation system between 2.08 to 2.26 kg/m3.
Abstract: Dengue fever has become a major concern for health
authorities all over the world particularly in the tropical countries.
These countries, in particular are experiencing the most worrying
outbreak of dengue fever (DF) and dengue haemorrhagic fever
(DHF). The DF and DHF epidemics, thus, have become the main
causes of hospital admissions and deaths in Malaysia. This paper,
therefore, attempts to examine the environmental factors that may
influence the recent dengue outbreak. The aim of this study is twofold,
firstly is to establish a statistical model to describe the
relationship between the number of dengue cases and a range of
explanatory variables and secondly, to identify the lag operator for
explanatory variables which affect the dengue incidence the most.
The explanatory variables involved include the level of cloud cover,
percentage of relative humidity, amount of rainfall, maximum
temperature, minimum temperature and wind speed. The Poisson and
Negative Binomial regression analyses were used in this study. The
results of the analyses on the 915 observations (daily data taken from
July 2006 to Dec 2008), reveal that the climatic factors comprising of
daily temperature and wind speed were found to significantly
influence the incidence of dengue fever after 2 and 3 weeks of their
occurrences. The effect of humidity, on the other hand, appears to be
significant only after 2 weeks.
Abstract: In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Abstract: This study adopts a qualitative approach, which
engages in the dialectical discussion on two levels of dyad opposite
views. The first level of the dyad opposite views is the Western
strategic perspective and the Eastern Tai-Chi thinking. The second
level of the dyad opposite views is resource-based view and resource
dependence theory. This study concludes the resource-oriented actions
for competitive advantage as the metaphor of Tai-Chi consisted of yin
and yang. This study argues that the focal firm should adopt bridging
strategy during the core competence development period because its
core competence development is likely to meet its competitor’s needs
of exploring strategy during the competitor’s external resource
development stage. In addition, the focal firm should adopt buffering
strategy during the external resource development period to prevent its
competitor’s the exploiting strategy from attack during the
competitor’s core competence development stage. Consequently, this
study takes a significant first step toward a novel contextualize
understanding of resource development based on strategic perspective
and Tai-Chi thinking providing more fully sustainable strategy for
competitive advantage.
Abstract: This paper proposes a modeling method of the laws controlling manufacturing systems with temporal and non temporal constraints. A methodology of robust control construction generating the margins of passive and active robustness is being elaborated. Indeed, two paramount models are presented in this paper. The first utilizes the P-time Petri Nets which is used to manage the flow type disturbances. The second, the quality model, exploits the Intervals Constrained Petri Nets (ICPN) tool which allows the system to preserve its quality specificities. The redundancy of the robustness of the elementary parameters between passive and active is also used. The final model built allows the correlation of temporal and non temporal criteria by putting two paramount models in interaction. To do so, a set of definitions and theorems are employed and affirmed by applicator examples.
Abstract: Research results and optimal parameters investigation
of laser cut and profiling of diamond and quartz substrates by
femtosecond laser pulses are presented. Profiles 10 μm in width, ~25
μm in depth and several millimeters long were made. Investigation of
boundaries quality has been carried out with the use of AFM
«Vecco». Possibility of technological formation of profiles and
micro-holes in diamond and quartz substrates with nanometer-scale
boundaries is shown. Experimental results of multilayer dielectric
cover treatment are also presented. Possibility of precise upper layer
(thickness of 70–140 nm) removal is demonstrated. Processes of thin
metal film (60 nm and 350 nm thick) treatment are considered.
Isolation tracks (conductance ~ 10-11 S) 1.6–2.5 μm in width in
conductive metal layers are formed.
Abstract: The paper shows the necessity to increase the security
level for paper management in the cadastral field by using specific
graphical watermarks. Using the graphical watermarking will
increase the security in the cadastral content management;
furthermore any altered document will be validated afterwards of its
originality by checking the graphic watermark. If, by any reasons the
document is changed for counterfeiting, it is invalidated and found
that is an illegal copy due to the graphic check of the watermarking,
check made at pixel level
Abstract: The research investigates the “impact of VLE on mathematical concepts acquisition of the special education needs (SENs) students at KS4 secondary education sector" in England. The overall aim of the study is to establish possible areas of difficulties to approach for above or below knowledge standard requirements for KS4 students in the acquisition and validation of basic mathematical concepts. A teaching period, in which virtual learning environment (Fronter) was used to emphasise different mathematical perception and symbolic representation was carried out and task based survey conducted to 20 special education needs students [14 actually took part]. The result shows that students were able to process information and consider images, objects and numbers within the VLE at early stages of acquisition process. They were also able to carry out perceptual tasks but with limiting process of different quotient, thus they need teacher-s guidance to connect them to symbolic representations and sometimes coach them through. The pilot study further indicates that VLE curriculum approaches for students were minutely aligned with mathematics teaching which does not emphasise the integration of VLE into the existing curriculum and current teaching practice. There was also poor alignment of vision regarding the use of VLE in realisation of the objectives of teaching mathematics by the management. On the part of teacher training, not much was done to develop teacher-s skills in the technical and pedagogical aspects of VLE that is in-use at the school. The classroom observation confirmed teaching practice will find a reliance on VLE as an enhancer of mathematical skills, providing interaction and personalisation of learning to SEN students.
Abstract: Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards- weaknesses and strengths. The intention of this paper is to evaluate and analyze the impact over the network-s security due to the implementation of the wireless networks security standards WEP, WPA and WLAN 802.1X.
Abstract: This paper is concerned with the existence of a linear copositive Lyapunov function(LCLF) for a special class of switched positive linear systems(SPLSs) composed of continuousand discrete-time subsystems. Firstly, by using system matrices, we construct a special kind of matrices in appropriate manner. Secondly, our results reveal that the Hurwitz stability of these matrices is equivalent to the existence of a common LCLF for arbitrary finite sets composed of continuous- and discrete-time positive linear timeinvariant( LTI) systems. Finally, a simple example is provided to illustrate the implication of our results.
Abstract: M. Kemal Ataturk was a great leader who was fond of art and he had displayed his being fond of art many times. In his speeches and writings you can see that he had showed his approval to art and the importance of artists and art for the society. During the foundation of republic, he also wanted renovation in art as in other fields and ordered many novelties both in art and society. One of the greatest steps in realizing this was to prepare a national Turkish opera. In this study, it was studied how a Turkish opera, Özsoy was prepared in the context of social and political conditions of that time and what kind of processes it passed. As a result, it is seen that there was two main aims for Ataturk with this opera. First, Ataturk wanted to abolish the sectarian conflict between Iran and Turkey going on for centuries. The second and maybe the most important is that he wanted to make a revolution in the field of art and aimed to reach the level of civilized countries.
Abstract: The main objectif of this paper is to present a tool that
we have developed subject to characterize and modelling indoor radio
channel propagation at millimetric wave. The tool is based on the
ray tracing technique (RTT). As, in realistic environment we cannot
neglect the significant impact of Human Body Shadowing and other
objects in motion on indoor 60 GHz propagation channel. Hence,
our proposed model allows a simulation of propagation in a dynamic
indoor environment. First, we describe a model of human body.
Second, RTT with this model is used to simulate the propagation
of millimeter waves in the presence of persons in motion. Results
of the simulation show that this tool gives results in agreement with
those reported in the literature. Specially, the effects of people motion
on temporal channel properties.
Abstract: The development of One Tambon One Product
(OTOP) became the policy of the government in 1997 after the
former Prime Minister had been in power. The strategy of sections is
currently set for the policy. OTOP has become the part of the way of
community lives around the country. OTOP may be developed under
changing into ASEAN economic community in 2015 because of the
flow of capitals, productions, and many workers in the region. All
sectors are improved for the change. The purposes of study were to
study the strength and weakness of the OTOP-creating process via its
policy and to lead to the strategy to be able to apply before changing.
The methodology is qualitative to study its policy including
document and to interview experienced persons. The findings showed
that the effort of improvement of all sectors obviously involves with
OTOP development. Particularly, the strategic administration of
OTOP is in every level of the state, central sector, region, and
community.
Abstract: In this study, stress distributions on dental implants
made of functionally graded biomaterials (FGBM) are investigated
numerically. The implant body is considered to be subjected to axial
compression loads. Numerical problem is assumed to be 2D, and
ANSYS commercial software is used for the analysis. The cross
section of the implant thread varies as varying the height (H) and the
width (t) of the thread. According to thread dimensions of implant
and material properties of FGBM, equivalent stress distribution on
the implant is determined and presented with contour plots along
with the maximum equivalent stress values. As a result, with
increasing material gradient parameter (n), the equivalent stress
decreases, but the minimum stress distribution increases. Maximum
stress values decrease with decreasing implant radius (r). Maximum
von Mises stresses increases with decreasing H when t is constant.
On the other hand, the stress values are not affected by variation of t
in the case of H = constant.
Abstract: Corner detection and optical flow are common techniques for feature-based video stabilization. However, these algorithms are computationally expensive and should be performed at a reasonable rate. This paper presents an algorithm for discarding irrelevant feature points and maintaining them for future use so as to improve the computational cost. The algorithm starts by initializing a maintained set. The feature points in the maintained set are examined against its accuracy for modeling. Corner detection is required only when the feature points are insufficiently accurate for future modeling. Then, optical flows are computed from the maintained feature points toward the consecutive frame. After that, a motion model is estimated based on the simplified affine motion model and least square method, with outliers belonging to moving objects presented. Studentized residuals are used to eliminate such outliers. The model estimation and elimination processes repeat until no more outliers are identified. Finally, the entire algorithm repeats along the video sequence with the points remaining from the previous iteration used as the maintained set. As a practical application, an efficient video stabilization can be achieved by exploiting the computed motion models. Our study shows that the number of times corner detection needs to perform is greatly reduced, thus significantly improving the computational cost. Moreover, optical flow vectors are computed for only the maintained feature points, not for outliers, thus also reducing the computational cost. In addition, the feature points after reduction can sufficiently be used for background objects tracking as demonstrated in the simple video stabilizer based on our proposed algorithm.
Abstract: The Information and Communication Technologies
(ICTs), and the Wide World Web (WWW) have fundamentally
altered the practice of teaching and learning world wide. Many
universities, organizations, colleges and schools are trying to apply
the benefits of the emerging ICT. In the early nineties the term
learning object was introduced into the instructional technology
vernacular; the idea being that educational resources could be broken
into modular components for later combination by instructors,
learners, and eventually computes into larger structures that would
support learning [1]. However in many developing countries, the use
of ICT is still in its infancy stage and the concept of learning object
is quite new. This paper outlines the learning object design
considerations for developing countries depending on learning
environment.
Abstract: The dynamic spectrum allocation solutions such as
cognitive radio networks have been proposed as a key technology to
exploit the frequency segments that are spectrally underutilized.
Cognitive radio users work as secondary users who need to
constantly and rapidly sense the presence of primary users or
licensees to utilize their frequency bands if they are inactive. Short
sensing cycles should be run by the secondary users to achieve
higher throughput rates as well as to provide low level of interference
to the primary users by immediately vacating their channels once
they have been detected. In this paper, the throughput-sensing time
relationship in local and cooperative spectrum sensing has been
investigated under two distinct scenarios, namely, constant primary
user protection (CPUP) and constant secondary user spectrum
usability (CSUSU) scenarios. The simulation results show that the
design of sensing slot duration is very critical and depends on the
number of cooperating users under CPUP scenario whereas under
CSUSU, cooperating more users has no effect if the sensing time
used exceeds 5% of the total frame duration.
Abstract: Using activity theory, organisational theory and
didactics as theoretical foundations, a comprehensive model of the
organisational dimensions relevant for learning and knowledge
transfer will be developed. In a second step, a Learning Assessment
Guideline will be elaborated. This guideline will be designed to
permit a targeted analysis of organisations to identify the status quo
in those areas crucial to the implementation of learning and
knowledge transfer. In addition, this self-analysis tool will enable
learning managers to select adequate didactic models for e- and
blended learning. As part of the European Integrated Project
"Process-oriented Learning and Information Exchange" (PROLIX),
this model of organisational prerequisites for learning and knowledge
transfer will be empirically tested in four profit and non-profit
organisations in Great Britain, Germany and France (to be finalized
in autumn 2006). The findings concern not only the capability of the
model of organisational dimensions, but also the predominant
perceptions of and obstacles to learning in organisations.
Abstract: The objectif of the present work is to determinate the
potential of the solar parabolic trough collector (PTC) for use in the
design of a solar thermal power plant in Algeria. The study is based
on a mathematical modeling of the PTC. Heat balance has been
established respectively on the heat transfer fluid (HTF), the absorber
tube and the glass envelop using the principle of energy conservation
at each surface of the HCE cross-sectionn. The modified Euler
method is used to solve the obtained differential equations. At first
the results for typical days of two seasons the thermal behavior of the
HTF, the absorber and the envelope are obtained. Then to determine
the thermal performances of the heat transfer fluid, different oils are
considered and their temperature and heat gain evolutions compared.
Abstract: This paper presents a new STAKCERT KDD
processes for worm detection. The enhancement introduced in the
data-preprocessing resulted in the formation of a new STAKCERT
model for worm detection. In this paper we explained in detail how
all the processes involved in the STAKCERT KDD processes are
applied within the STAKCERT model for worm detection. Based on
the experiment conducted, the STAKCERT model yielded a 98.13%
accuracy rate for worm detection by integrating the STAKCERT
KDD processes.