Abstract: Production of hard-to-cut materials with uncoated carbide cutting tools in turning, not only cause tool life reduction but also, impairs the product surface roughness. In this paper, influence of hot machining method were studied and presented in two cases. Case1-Workpiece surface roughness quality with constant cutting parameter and 300 ºC initial workpiece surface temperature. Case 2- Tool temperature variation when cutting with two speeds 78.5 (m/min) and 51 (m/min). The workpiece material and tool used in this study were AISI 1060 steel (45HRC) and uncoated carbide TNNM 120408-SP10(SANDVIK Coromant) respectively. A gas flam heating source was used to preheating of the workpiece surface up to 300 ºC, causing reduction of yield stress about 15%. Results obtained experimentally, show that the method used can considerably improved surface quality of the workpiece.
Abstract: The objectives of this research were to explore factors
influencing knowledge management process in the manufacturing
industry and develop a model to support knowledge management
processes. The studied factors were technology infrastructure, human
resource, knowledge sharing, and the culture of the organization. The
knowledge management processes included discovery, capture,
sharing, and application. Data were collected through questionnaires
and analyzed using multiple linear regression and multiple
correlation. The results found that technology infrastructure, human
resource, knowledge sharing, and culture of the organization
influenced the discovery and capture processes. However, knowledge
sharing had no influence in sharing and application processes. A
model to support knowledge management processes was developed,
which indicated that sharing knowledge needed further improvement
in the organization.
Abstract: Two species of Physalis, P.angulataL. and P.
peruviana L. were used as models for comparative study to
understand the values of micro-morphological, -anatomical and
architectural characteristics of leaf for taxonomic purposes and
possibly breeding and commercial applications. Both speciespossess
amphistomaticleaves with 1-layer epidermis, 3-4-layer spongy
mesophyll andbicollateral bundle midrib. Palisade parenchyma cells
of P. angulatawere almost twice longer (65-75 μm) than the other
one. Type of stomata was similar as anomocyticbut stomatal
index(SI) at adaxial surface and abaxial surface of P. angulata were
less than of P. peruvianaas 3.57, 4.00 and6.25, 6.66 respectively.
Some leaf architectural characteristics such as leaf shape, order of
venationalsoprovided information of taxonomic significance
Abstract: The paper presents a numerical investigation on the
rapid gas decompression in pure nitrogen which is made by using the
one-dimensional (1D) and three-dimensional (3D) mathematical
models of transient compressible non-isothermal fluid flow in pipes.
A 1D transient mathematical model of compressible thermal multicomponent
fluid mixture flow in pipes is presented. The set of the
mass, momentum and enthalpy conservation equations for gas phase
is solved in the model. Thermo-physical properties of multicomponent
gas mixture are calculated by solving the Equation of
State (EOS) model. The Soave-Redlich-Kwong (SRK-EOS) model is
chosen. This model is successfully validated on the experimental data
[1] and shows a good agreement with measurements. A 3D transient
mathematical model of compressible thermal single-component gas
flow in pipes, which is built by using the CFD Fluent code (ANSYS),
is presented in the paper. The set of unsteady Reynolds-averaged
conservation equations for gas phase is solved. Thermo-physical
properties of single-component gas are calculated by solving the Real
Gas Equation of State (EOS) model. The simplest case of gas
decompression in pure nitrogen is simulated using both 1D and 3D
models. The ability of both models to simulate the process of rapid
decompression with a high order of agreement with each other is
tested. Both, 1D and 3D numerical results show a good agreement
between each other. The numerical investigation shows that 3D CFD
model is very helpful in order to validate 1D simulation results if the
experimental data is absent or limited.
Abstract: Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.
Abstract: Combined therapy using Interferon and Ribavirin is the standard treatment in patients with chronic hepatitis C. However, the number of responders to this treatment is low, whereas its cost and side effects are high. Therefore, there is a clear need to predict patient’s response to the treatment based on clinical information to protect the patients from the bad drawbacks, Intolerable side effects and waste of money. Different machine learning techniques have been developed to fulfill this purpose. From these techniques are Associative Classification (AC) and Decision Tree (DT). The aim of this research is to compare the performance of these two techniques in the prediction of virological response to the standard treatment of HCV from clinical information. 200 patients treated with Interferon and Ribavirin; were analyzed using AC and DT. 150 cases had been used to train the classifiers and 50 cases had been used to test the classifiers. The experiment results showed that the two techniques had given acceptable results however the best accuracy for the AC reached 92% whereas for DT reached 80%.
Abstract: The internet is constantly expanding. Identifying web
links of interest from web browsers requires users to visit each of the
links listed, individually until a satisfactory link is found, therefore
those users need to evaluate a considerable amount of links before
finding their link of interest; this can be tedious and even
unproductive. By incorporating web assistance, web users could be
benefited from reduced time searching on relevant websites. In this
paper, a rough set approach is presented, which facilitates
classification of unlimited available e-vocabulary, to assist web users
in reducing search times looking for relevant web sites. This
approach includes two methods for identifying relevance data on web
links based on the priority and percentage of relevance. As a result of
these methods, a list of web sites is generated in priority sequence
with an emphasis of the search criteria.
Abstract: This paper highlights some interesting facts on South African-s waste situation and management strategies, in particular the Integrated Waste Management. South Africa supports a waste hierarchy by promoting cleaner production, waste minimisation, reuse, recycling and waste treatment with disposal and remediation as the last preferred options in waste management. The drivers for waste management techniques are identified as increased demand for waste service provision; increased demand for waste minimisation; recycling and recovery; land use, physical and environmental limitations; and socio-economic and demographic factors. The South African government recognizes the importance of scientific research as outlined on the white paper on Integrated Pollution and Waste Management (IP and WM) (DEAT, 2000).
Abstract: In a 10-week (May – August, 2008) Phase I trial, 840, 1+ rainbow trout, Oncorhynchus mykiss, received a commercial oral immunomodulator, Fin Immune™, at four different dosages (0, 10, 20 and 30 mg g-1) to evaluate immune response and growth. The overall objective of was to determine an optimal dosage of this product for rainbow trout that provides enhanced immunity with maximal growth and health. Biweekly blood samples were taken from 10 randomly selected fish in each tank (30 samples per treatment) to evaluate the duration of enhanced immunity conferred by Fin-Immune™. The immunological assessment included serum white blood cell (lymphocyte, neutrophil) densities and blood hematocrit (packed cell volume %). Of these three variables, only lymphocyte density increased significantly among trout fed Fin- Immune™ at 20 and 30 mg g-1 which peaked at week 6. At week 7, all trout were switched to regular feed (lacking Fin-Immune™) and by week 10, lymphocyte levels decreased among all levels but were still greater than at week 0. There was growth impairment at the highest dose of Fin-Immune™ tested (30 mg g-1) which can be associated with a physiological compensatory mechanism due to a dose-specific threshold level. Thus, our main objective of this Phase I study was achieved, the 20 mg g-1 dose of Fin-Immune™ should be the most efficacious (of those we tested) to use for a Phase II disease challenge trial.
Abstract: In view of growing competition in the service sector,
services are as much in need of modeling, analysis and improvement
as business or working processes. Graphical process models are
important means to capture process-related know-how for an
effective management of the service process. In this contribution, a
human performance analysis of process model development paying
special attention to model development time and the working method
was conducted. It was found that modelers with higher application
experience need significantly less time for mental activities than
modelers with lower application experience, spend more time on
labeling graphical elements, and achieved higher process model
quality in terms of activity label quality.
Abstract: This paper focuses on systematic analysis and
controller design of the two-inertia STABILIZATION system,
considering the angular motion on a base body. This approach is
essential to the stabilization system to aim at a target under three or six
degrees of freedom base motion. Four controllers, such as
conventional PDF(Pseudo-Derivative Feedback) controller with
motor speed feedback, PDF controller with load speed feedback,
modified PDF controller with motor-load speed feedback and
feedforward controller added to modified PDF controller, are
suggested to improve reference tracking and disturbance rejection
performance. Characteristics and performance of each controller are
analyzed and validated by simulation in the case of the modified PDF
controller with and without a feedforward controller.
Abstract: This paper presents a solution for a robotic
manipulation problem. We formulate the problem as combining
target identification, tracking and interception. The task in our
solution is sensing a target on a conveyor belt and then intercepting
robot-s end-effector at a convenient rendezvous point. We used
an object recognition method which identifies the target and finds
its position from visualized scene picture, then the robot system
generates a solution for rendezvous problem using the target-s initial
position and belt velocity . The interception of the target and the
end-effector is executed at a convenient rendezvous point along the
target-s calculated trajectory. Experimental results are obtained using
a real platform with an industrial robot and a vision system over it.
Abstract: This study investigates the investors- behavioral
reaction to the investment rating change announcements from the
views of behavioral finance. The empirical results indicate that
self-interest does affect the intention of securities firms to release
investment ratings for individual stocks. In addition, behavioral
pitfalls are also found in the response of retail investors to investment
rating change announcements.
Abstract: A novel feature selection strategy to improve the recognition accuracy on the faces that are affected due to nonuniform illumination, partial occlusions and varying expressions is proposed in this paper. This technique is applicable especially in scenarios where the possibility of obtaining a reliable intra-class probability distribution is minimal due to fewer numbers of training samples. Phase congruency features in an image are defined as the points where the Fourier components of that image are maximally inphase. These features are invariant to brightness and contrast of the image under consideration. This property allows to achieve the goal of lighting invariant face recognition. Phase congruency maps of the training samples are generated and a novel modular feature selection strategy is implemented. Smaller sub regions from a predefined neighborhood within the phase congruency images of the training samples are merged to obtain a large set of features. These features are arranged in the order of increasing distance between the sub regions involved in merging. The assumption behind the proposed implementation of the region merging and arrangement strategy is that, local dependencies among the pixels are more important than global dependencies. The obtained feature sets are then arranged in the decreasing order of discriminating capability using a criterion function, which is the ratio of the between class variance to the within class variance of the sample set, in the PCA domain. The results indicate high improvement in the classification performance compared to baseline algorithms.
Abstract: In Blind Source Separation (BSS) processing, taking
advantage of scaling factor indetermination and based on the floatingpoint
representation, we propose a scaling technique applied to the
separation matrix, to avoid the saturation or the weakness in the
recovered source signals. This technique performs an Automatic Gain
Control (AGC) in an on-line BSS environment. We demonstrate
the effectiveness of this technique by using the implementation of
a division free BSS algorithm with two input, two output. This
technique is computationally cheaper and efficient for a hardware
implementation.
Abstract: There has been considerable growth in the issue of
food & beverage safety in Thailand. This is important because the
level of satisfaction in food & beverage safety has impacts on travel
decision made by foreign tourists. Therefore, this paper was aimed to
test if there is any significant gender effect in the level of satisfaction
of food & beverage safety made by foreign tourists in Thailand. In
addition, this paper utilized the Chi Square test of independent to test
if there was an association between gender and sickness because of
food and if there was an association between gender and the
perception of food safety standard. During January to June, 2012, a
total of 400 foreign tourist respondents, 200 male as well as 200
female foreign tourists, were interviewed at the departure lounge at
Suvarnabhumi airport, Thailand. The findings revealed the
astonishing result that there was no significant effect of gender. Also,
there was no significant difference in the association between gender
and being sick because of food as well as the association between
gender and the perception on the standard of food safety during their
trip in Thailand.
Abstract: Server provisioning is one of the most attractive topics in virtualization systems. Virtualization is a method of running multiple independent virtual operating systems on a single physical computer. It is a way of maximizing physical resources to maximize the investment in hardware. Additionally, it can help to consolidate servers, improve hardware utilization and reduce the consumption of power and physical space in the data center. However, management of heterogeneous workloads, especially for resource utilization of the server, or so called provisioning becomes a challenge. In this paper, a new concept for managing workloads based on user behavior is presented. The experimental results show that user behaviors are different in each type of service workload and time. Understanding user behaviors may improve the efficiency of management in provisioning concept. This preliminary study may be an approach to improve management of data centers running heterogeneous workloads for provisioning in virtualization system.
Abstract: Our goal is to effectively increase the number of boats in the river during a six month period. The main factors of determining the number of boats are duration and “select the priority trip". In the microcosmic simulation model, the best result is 4 to 24 nights with DSCF, and the number of boats is 812 with an increasing ratio of 9.0% related to the second best result. However, the number of boats is related to 31.6% less than the best one in 6 to 18 nights with FCFS. In the discrete duration model, we get from 6 to 18 nights, the numbers of boats have increased to 848 with an increase ratio of 29.7% than the best result in model I for the same time range. Moreover, from 4 to 24 nights, the numbers of boats have increase to 1194 with an increase ratio of 47.0% than the best result in model I for the same time range.
Abstract: In this paper we study the inverse eigenvalue problem for symmetric special matrices and introduce sufficient conditions for obtaining nonnegative matrices. We get the HROU algorithm from [1] and introduce some extension of this algorithm. If we have some eigenvectors and associated eigenvalues of a matrix, then by this extension we can find the symmetric matrix that its eigenvalue and eigenvectors are given. At last we study the special cases and get some remarkable results.
Abstract: We describe an effective method for image encryption
which employs magnitude and phase manipulation using carrier
images. Although it involves traditional methods like magnitude and
phase encryptions, the novelty of this work lies in deploying the
concept of carrier images for encryption purpose. To this end, a
carrier image is randomly chosen from a set of stored images. One
dimensional (1-D) discrete Fourier transform (DFT) is then carried
out on the original image to be encrypted along with the carrier
image. Row wise spectral addition and scaling is performed between
the magnitude spectra of the original and carrier images by randomly
selecting the rows. Similarly, row wise phase addition and scaling is
performed between the original and carrier images phase spectra by
randomly selecting the rows. The encrypted image obtained by these
two operations is further subjected to one more level of magnitude
and phase manipulation using another randomly chosen carrier image
by 1-D DFT along the columns. The resulting encrypted image is
found to be fully distorted, resulting in increasing the robustness
of the proposed work. Further, applying the reverse process at the
receiver, the decrypted image is found to be distortionless.