Abstract: Microstrip antennas are conformable to planar and
nonplanar surfaces, simple and inexpensive to fabricate using modern
printed-circuit technology. Circular polarization of low-profile
microstrip patch with high bandwidth is achieved in this research
through the use of a three-cross-arms branch-line coupler with
sequential rotated arrays, another low-profile antenna of hollow
cylinder is also proposed and the function of reconnaissance with
microstrip antenna on Mini UAV (unmanned aerial vehicle) are
evaluated in practical flight test.
Abstract: In this work the design and characterization of an optoelectronic automated measurement system it is presented. The optoelectronic devices of this system are an optical transmitter, the optical components and the optical receiver, which were selected for a great precision of the system. The mechanical system allows free displacement of the components as well as the devices that generate the movement. The results, length and profile of the objects are display in Lab View.
Abstract: It is claimed that a new style of urban planning and
policy intertwined with ICT is emerging and urban planning and ICT
policy are no longer considered as separate disciplines. The
interactions between electronic spaces and urban spaces are so
complex and uncertain that confront urban planners and policy makers
with great challenges. However, the assumption about the relationship
between ICT and urban planning is mainly based on North American
and European experiences. In the light of empirical evidence from
Taipei City, this paper shows that this new type of urban planning and
policy intertwined with ICT has existed in Asian city for a decade as
well. Based on these results, this paper further reviews how the Taipei
City government implements this new type of urban ICT planning and
the validity and realism of its underlying assumptions. Finally, it also
explores the extent to which urban ICT planning could promote
positive synergies between physical and electronic developments.
Abstract: Flow-shop scheduling problem (FSP) deals with the
scheduling of a set of jobs that visit a set of machines in the same
order. The FSP is NP-hard, which means that an efficient algorithm
for solving the problem to optimality is unavailable. To meet the
requirements on time and to minimize the make-span performance of
large permutation flow-shop scheduling problems in which there are
sequence dependent setup times on each machine, this paper
develops one hybrid genetic algorithms (HGA). Proposed HGA
apply a modified approach to generate population of initial
chromosomes and also use an improved heuristic called the iterated
swap procedure to improve initial solutions. Also the author uses
three genetic operators to make good new offspring. The results are
compared to some recently developed heuristics and computational
experimental results show that the proposed HGA performs very
competitively with respect to accuracy and efficiency of solution.
Abstract: The seismic vulnerability of an urban area is of a great
deal for local authorities especially those facing earthquakes. So, it is
important to have an efficient tool to assess the vulnerability of
existing buildings. The use of the VIP (Vulnerability Index Program)
and the GIS (Geographic Information System) let us to identify the
most vulnerable districts of an urban area.
The use of the vulnerability index method lets us to assess the
vulnerability of the center town of Blida (Algeria) which is a
historical town and which has grown enormously during the last
decades. In this method, three levels of vulnerability are defined. The
GIS has been used to build a data base in order to perform different
thematic analyses. These analyses show the seismic vulnerability of
Blida.
Abstract: The fluorescent pseudomonad strain R81 is a root
colonizing rhizobacteria which promotes the growth of many plants
by various mechanisms. Its broth containing siderophore (ironchelating
compound) and 2,4- diacetyl phloroglucinol (DAPG) is
used for preparing bioinoculant formulations for agronomical
applications. Glycerol was found to be the best carbon source for
improved biomass production. Splitting of nitrogen source to NH4Cl
and urea had a stabilizing effect on pH during batch cultivation. Ltryptophan
at 0.5 % in the medium increased the siderophore
production to 850 mg/l. During batch cultivation of the strain in a
bioreactor, a maximum of 4 g/l of dry cell mass, 1.8 g/l of
siderophore and 20 mg/l of DAPG was achieved when glycerol was
15 g/l and C/N ratio was maintained at 12.5. In case of intermittent
feeding of fresh medium during fed-batch cultivation, the dry cell
mass was increased to 25 g/l with improved production of DAPG to
70 mg/l.
Abstract: Dengue fever has become a major concern for health
authorities all over the world particularly in the tropical countries.
These countries, in particular are experiencing the most worrying
outbreak of dengue fever (DF) and dengue haemorrhagic fever
(DHF). The DF and DHF epidemics, thus, have become the main
causes of hospital admissions and deaths in Malaysia. This paper,
therefore, attempts to examine the environmental factors that may
influence the recent dengue outbreak. The aim of this study is twofold,
firstly is to establish a statistical model to describe the
relationship between the number of dengue cases and a range of
explanatory variables and secondly, to identify the lag operator for
explanatory variables which affect the dengue incidence the most.
The explanatory variables involved include the level of cloud cover,
percentage of relative humidity, amount of rainfall, maximum
temperature, minimum temperature and wind speed. The Poisson and
Negative Binomial regression analyses were used in this study. The
results of the analyses on the 915 observations (daily data taken from
July 2006 to Dec 2008), reveal that the climatic factors comprising of
daily temperature and wind speed were found to significantly
influence the incidence of dengue fever after 2 and 3 weeks of their
occurrences. The effect of humidity, on the other hand, appears to be
significant only after 2 weeks.
Abstract: This study aims to assess the vulnerability and risk of
the coastal areas of Taijiang to abnormal oceanographic phenomena.
In addition, this study aims to investigate and collect data regarding
the disaster losses, land utilization, and other social, economic, and
environmental issues in these coastal areas to construct a coastal
vulnerability and risk map based on the obtained climate-change risk
assessment results. Considering the indexes of the three coastal
vulnerability dimensions, namely, man-made facilities, environmental
geography, and social economy, this study adopted the equal
weighting process and Analytic Hierarchy Process to analyze the
vulnerability of these coastal areas to disasters caused by climatic
changes. Among the areas with high coastal vulnerability to climatic
changes, three towns had the highest coastal vulnerability and four had
the highest relative vulnerability. Areas with lower disaster risks were
found to be increasingly vulnerable to disasters caused by climatic
changes as time progresses.
Abstract: Technical laboratories are typically considered as
highly hazardous places in the polytechnic institution when
addressing the problems of high incidences and fatality rates. In
conjunction with several topics covered in the technical curricular,
safety and health precaution should be highlighted in order to
connect to few key ideas of being safe. Therefore the assessment of
safety awareness in terms of safety and health about hazardous and
risks at laboratories is needed and has to be incorporated with
technical education and other training programmes. The purpose of
this study was to determine the efficacy of technical laboratory safety
in one of the polytechnics in northern region. The study examined
three related issues that were; the availability of safety material and
equipment, safety practice adopted by technical teachers and
administrator-s safety attitudes in enforcing safety to the students. A
model of efficacy technical laboratory was developed to test the
linear relationship between existing safety material and equipment,
teachers- safety practice and administrators- attitude in enforcing
safety and to identify which of technical laboratory safety issues was
the most pertinent factor to realize safety in technical laboratory.
This was done by analyzing survey-based data sets particularly those
obtained from samples of 210 students in the polytechnic. The
Pearson Correlation was used to measure the association between the
variables and to test the research hypotheses. The result of the study
has found that there was a significant correlation between existing
safety material and equipment, safety practice adopted by teacher
and administrator-s attitude. There was also a significant relationship
between technical laboratory safety and safety practice adopted by
teacher and between technical laboratory safety and administrator
attitude. Hence, safety practice adopted by teacher and administrator
attitude is vital in realizing technical laboratory safety.
Abstract: In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Abstract: Using bottom-up image processing algorithms to predict human eye fixations and extract the relevant embedded information in images has been widely applied in the design of active machine vision systems. Scene text is an important feature to be extracted, especially in vision-based mobile robot navigation as many potential landmarks such as nameplates and information signs contain text. This paper proposes an edge-based text region extraction algorithm, which is robust with respect to font sizes, styles, color/intensity, orientations, and effects of illumination, reflections, shadows, perspective distortion, and the complexity of image backgrounds. Performance of the proposed algorithm is compared against a number of widely used text localization algorithms and the results show that this method can quickly and effectively localize and extract text regions from real scenes and can be used in mobile robot navigation under an indoor environment to detect text based landmarks.
Abstract: This paper reviews the optimization available
transmission capability (ATC) of power systems using a device of
FACTS named SSSC equipped with energy storage devices. So that,
emplacement and improvement of parameters of SSSC will be
illustrated. Thus, voltage magnitude constraints of network buses,
line transient stability constraints and voltage breakdown constraints
are considered. To help the calculations, a comprehensive program in
DELPHI is provided, which is able to simulate and trace the
parameters of SSSC has been installed on a specific line.
Furthermore, the provided program is able to compute ATC, TTC
and maximum value of their enhancement after using SSSC.
Abstract: This study adopts a qualitative approach, which
engages in the dialectical discussion on two levels of dyad opposite
views. The first level of the dyad opposite views is the Western
strategic perspective and the Eastern Tai-Chi thinking. The second
level of the dyad opposite views is resource-based view and resource
dependence theory. This study concludes the resource-oriented actions
for competitive advantage as the metaphor of Tai-Chi consisted of yin
and yang. This study argues that the focal firm should adopt bridging
strategy during the core competence development period because its
core competence development is likely to meet its competitor’s needs
of exploring strategy during the competitor’s external resource
development stage. In addition, the focal firm should adopt buffering
strategy during the external resource development period to prevent its
competitor’s the exploiting strategy from attack during the
competitor’s core competence development stage. Consequently, this
study takes a significant first step toward a novel contextualize
understanding of resource development based on strategic perspective
and Tai-Chi thinking providing more fully sustainable strategy for
competitive advantage.
Abstract: This paper proposes a modeling method of the laws controlling manufacturing systems with temporal and non temporal constraints. A methodology of robust control construction generating the margins of passive and active robustness is being elaborated. Indeed, two paramount models are presented in this paper. The first utilizes the P-time Petri Nets which is used to manage the flow type disturbances. The second, the quality model, exploits the Intervals Constrained Petri Nets (ICPN) tool which allows the system to preserve its quality specificities. The redundancy of the robustness of the elementary parameters between passive and active is also used. The final model built allows the correlation of temporal and non temporal criteria by putting two paramount models in interaction. To do so, a set of definitions and theorems are employed and affirmed by applicator examples.
Abstract: Research results and optimal parameters investigation
of laser cut and profiling of diamond and quartz substrates by
femtosecond laser pulses are presented. Profiles 10 μm in width, ~25
μm in depth and several millimeters long were made. Investigation of
boundaries quality has been carried out with the use of AFM
«Vecco». Possibility of technological formation of profiles and
micro-holes in diamond and quartz substrates with nanometer-scale
boundaries is shown. Experimental results of multilayer dielectric
cover treatment are also presented. Possibility of precise upper layer
(thickness of 70–140 nm) removal is demonstrated. Processes of thin
metal film (60 nm and 350 nm thick) treatment are considered.
Isolation tracks (conductance ~ 10-11 S) 1.6–2.5 μm in width in
conductive metal layers are formed.
Abstract: The National Blood Center, Thai Red Cross Society is
responsible for providing blood to hospitals all over the country.
When any hospital needs blood, it will have to send the vehicle to
pick up at the NBC. There are a lot of vehicles to pick up blood at the
NBC every day. Each vehicle is usually empty for inbound trip and a
little loaded for outbound. The NBC realized such waste or loss and
there have been the third party offered to distribute blood and charge
for fee. This paper proposes to apply the vehicle routing problem
(VRP) for estimating the fair price. The idea is tested with the real
data during seven-day period of 6 – 12 July 2010 to estimate the fair
price for transporting blood in Bangkok Metropolitan Region.
Abstract: We investigate the sufficient condition under which each positive b-weakly compact operator is Dunford-Pettis. We also investigate the necessary condition on which each positive b-weakly compact operator is Dunford-Pettis. Necessary condition on which each positive b-weakly compact operator is weakly compact is also considered. We give the operator that is semi-compact, but it is not bweakly. We present a necessary and sufficient condition under which each positive semi-compact operator is b-weakly compact.
Abstract: The running logs of a process hold valuable
information about its executed activity behavior and generated activity
logic structure. Theses informative logs can be extracted, analyzed and
utilized to improve the efficiencies of the process's execution and
conduction. One of the techniques used to accomplish the process
improvement is called as process mining. To mine similar processes is
such an improvement mission in process mining. Rather than directly
mining similar processes using a single comparing coefficient or a
complicate fitness function, this paper presents a simplified heuristic
process mining algorithm with two similarity comparisons that are
able to relatively conform the activity logic sequences (traces) of
mining processes with those of a normalized (regularized) one. The
relative process conformance is to find which of the mining processes
match the required activity sequences and relationships, further for
necessary and sufficient applications of the mined processes to process
improvements. One similarity presented is defined by the relationships
in terms of the number of similar activity sequences existing in
different processes; another similarity expresses the degree of the
similar (identical) activity sequences among the conforming processes.
Since these two similarities are with respect to certain typical behavior
(activity sequences) occurred in an entire process, the common
problems, such as the inappropriateness of an absolute comparison and
the incapability of an intrinsic information elicitation, which are often
appeared in other process conforming techniques, can be solved by the
relative process comparison presented in this paper. To demonstrate
the potentiality of the proposed algorithm, a numerical example is
illustrated.
Abstract: The paper shows the necessity to increase the security
level for paper management in the cadastral field by using specific
graphical watermarks. Using the graphical watermarking will
increase the security in the cadastral content management;
furthermore any altered document will be validated afterwards of its
originality by checking the graphic watermark. If, by any reasons the
document is changed for counterfeiting, it is invalidated and found
that is an illegal copy due to the graphic check of the watermarking,
check made at pixel level
Abstract: Outsourcing, a management practice strongly
consolidated within the area of Information Systems, is currently
going through a stage of unstoppable growth. This paper makes a
proposal about the main reasons which may lead firms to adopt
Information Systems Outsourcing. It will equally analyse the
potential risks that IS clients are likely to face. An additional
objective is to assess these reasons and risks in the case of large
Spanish firms, while simultaneously examining their evolution over
time.