Abstract: Transportation is one of the main activities related to
creating value for the tourists. Transport management in tourism
mainly focuses on managing transfer points and vehicle capacity.
However, transport service level must also be ensured as it now
relates to tourist-s experiences. This paper emphasizes on the
responsiveness as one of key service performance measures. An
evaluation framework is developed and illustarted by using the case
of small bus service in Pattaya city. It can be seen as a great potential
for the city to utilize the small bus transportation in order to meet the
needs of more diverse group of passengers and to support the
expansion of tourist areas. The framework integrates with service
operations management, logistics, and tourism behavior perspectives.
The findings from the investigation of existing small bus service are
presented and preliminarily validate the usability of the framework.
Abstract: We present a simulation and realization of a battery
charge regulator (BCR) in microsatellite earth observation. The tests
were performed on battery pack 12volt, capacity 24Ah and the solar array open circuit voltage of 100 volt and optimum power of about
250 watt. The battery charge is made by solar module. The principle is to adapt the output voltage of the solar module to the battery by
using the technique of pulse width modulation (PWM). Among the different techniques of charge battery, we opted for the technique of
the controller ON/OFF is a standard technique and simple, it-s easy to
be board executed validation will be made by simulation "Proteus Isis
Professional software ". The circuit and the program of this prototype
are based on the PIC16F877 microcontroller, a serial interface connecting a PC is also realized, to view and save data and graphics
in real time, for visualization of data and graphs we develop an interface tool “visual basic.net (VB)--.
Abstract: In this article we explore the application of a formal
proof system to verification problems in cryptography. Cryptographic
properties concerning correctness or security of some cryptographic
algorithms are of great interest. Beside some basic lemmata, we
explore an implementation of a complex function that is used in
cryptography. More precisely, we describe formal properties of this
implementation that we computer prove. We describe formalized
probability distributions (σ-algebras, probability spaces and conditional
probabilities). These are given in the formal language of the
formal proof system Isabelle/HOL. Moreover, we computer prove
Bayes- Formula. Besides, we describe an application of the presented
formalized probability distributions to cryptography. Furthermore,
this article shows that computer proofs of complex cryptographic
functions are possible by presenting an implementation of the Miller-
Rabin primality test that admits formal verification. Our achievements
are a step towards computer verification of cryptographic primitives.
They describe a basis for computer verification in cryptography.
Computer verification can be applied to further problems in cryptographic
research, if the corresponding basic mathematical knowledge
is available in a database.
Abstract: In this study, the locations and areas of commercial
accumulations were detected by using digital yellow page data. An
original buffering method that can accurately create polygons of
commercial accumulations is proposed in this paper.; by using this
method, distribution of commercial accumulations can be easily
created and monitored over a wide area. The locations, areas, and
time-series changes of commercial accumulations in the South Kanto
region can be monitored by integrating polygons of commercial
accumulations with the time-series data of digital yellow page data.
The circumstances of commercial accumulations were shown to vary
according to areas, that is, highly- urbanized regions such as the city
center of Tokyo and prefectural capitals, suburban areas near large
cities, and suburban and rural areas.
Abstract: This paper reports the fatigue crack growth behaviour
of gas tungsten arc, electron beam and laser beam welded Ti-6Al-4V
titanium alloy. Centre cracked tensile specimens were prepared to
evaluate the fatigue crack growth behaviour. A 100kN servo
hydraulic controlled fatigue testing machine was used under constant
amplitude uniaxial tensile load (stress ratio of 0.1 and frequency of
10 Hz). Crack growth curves were plotted and crack growth
parameters (exponent and intercept) were evaluated. Critical and
threshold stress intensity factor ranges were also evaluated. Fatigue
crack growth behaviour of welds was correlated with mechanical
properties and microstructural characteristics of welds. Of the three
joints, the joint fabricated by laser beam welding exhibited higher
fatigue crack growth resistance due to the presence of fine lamellar
microstructure in the weld metal.
Abstract: Textures are replications, symmetries and
combinations of various basic patterns, usually with some random
variation one of the gray-level statistics. This article proposes a
new approach to Segment texture images. The proposed approach
proceeds in 2 stages. First, in this method, local texture information
of a pixel is obtained by fuzzy texture unit and global texture
information of an image is obtained by fuzzy texture spectrum.
The purpose of this paper is to demonstrate the usefulness of fuzzy
texture spectrum for texture Segmentation.
The 2nd Stage of the method is devoted to a decision process,
applying a global analysis followed by a fine segmentation,
which is only focused on ambiguous points. The above Proposed
approach was applied to brain image to identify the components
of brain in turn, used to locate the brain tumor and its Growth
rate.
Abstract: Land degradation is of concern in many countries. People more and more must address the problems associated with the degradation of soil properties due to man. Increasingly, organic soil amendments, such as compost are being examined for their potential use in soil restoration and for preventing soil erosion. In the Czech Republic, compost is the most used to improve soil structure and increase the content of soil organic matter. Land reclamation / restoration is one of the ways to evaluate industrially produced compost because Czech farmers are not willing to use compost as organic fertilizer. The most common use of reclamation substrates in the Czech Republic is for the rehabilitation of landfills and contaminated sites.
This paper deals with the influence of reclamation substrates (RS) with different proportions of compost and sand on selected soil properties–chemical characteristics, nitrogen bioavailability, leaching of mineral nitrogen, respiration activity and plant biomass production. Chemical properties vary proportionally with addition of compost and sand to the control variant (topsoil). The highest differences between the variants were recorded in leaching of mineral nitrogen (varies from 1.36mg dm-3 in C to 9.09mg dm-3). Addition of compost to soil improves conditions for plant growth in comparison with soil alone. However, too high addition of compost may have adverse effects on plant growth. In addition, high proportion of compost increases leaching of mineral N. Therefore, mixture of 70% of soil with 10% of compost and 20% of sand may be recommended as optimal composition of RS.
Abstract: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today's commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98% detection rate (DR) in comparison with
other existing methods.
Abstract: This paper presents an algebraic approach to optimize
queries in domain-specific database management system
for protein structure data. The approach involves the introduction of
several protein structure specific algebraic operators to query the
complex data stored in an object-oriented database system. The
Protein Algebra provides an extensible set of high-level Genomic
Data Types and Protein Data Types along with a comprehensive
collection of appropriate genomic and protein functions. The paper
also presents a query translator that converts high-level query
specifications in algebra into low-level query specifications in
Protein-QL, a query language designed to query protein structure
data. The query transformation process uses a Protein Ontology that
serves the purpose of a dictionary.
Abstract: Prior to 1975, women in Laos suffered from having
reduced levels of power over decision-making in their families and in
their communities. This has had a negative impact on their ability to
develop their own identities. Their roles were identified as being
responsible for household activities and making preparations for their
marriage. Many women lost opportunities to get educated and access
the outdoor work that might have empowered them to improve their
situations. So far, no accurate figures of either emigrants or return
migrants have been compiled but it appears that most of them were
women, and it was women who most and more frequently remitted
money home. However, very few recent studies have addressed the
relationship between remittances and the roles of women in Laos.
This study, therefore, aims at redressing to some extent the
deficiencies in knowledge. Qualitative techniques were used to gather
data, including individual in-depth interviews and direct observation
in combination with the content analysis method. Forty women in
Vientiane Municipality and Savannakhet province were individually
interviewed. It was found that the monetary remittance was typically
used for family security and well-being; on fungible activities; on
economic and business activities; and on community development,
especially concerning hospitality and providing daily household
necessities. Remittances played important roles in improving many
respondents- livelihoods and positively changed their identities in
families and communities. Women became empowered as they were
able to start commercial businesses, rather than taking care of (just)
housework, children and elders. Interviews indicated that 92.5% of
the respondents their quality of lives improved, 90% felt happier in
their families and 82.5% felt conflicts in their families were reduced.
Abstract: The main aim of this work is to establish the
capabilities of new green buildings to ascertain off-grid electricity
generation based on the integration of wind turbines in the
conceptual model of a rotating tower [2] in Dubai. An in depth
performance analysis of the WinWind 3.0MW [3] wind turbine is
performed. Data based on the Dubai Meteorological Services is
collected and analyzed in conjunction with the performance analysis
of this wind turbine. The mathematical model is compared with
Computational Fluid Dynamics (CFD) results based on a conceptual
rotating tower design model. The comparison results are further
validated and verified for accuracy by conducting experiments on a
scaled prototype of the tower design. The study concluded that
integrating wind turbines inside a rotating tower can generate enough
electricity to meet the required power consumption of the building,
which equates to a wind farm containing 9 horizontal axis wind
turbines located at an approximate area of 3,237,485 m2 [14].
Abstract: Luxury is an identity, a philosophy and a culture
which requires understanding before the adoption of e-business
practices because of its intricacies and output are essentially different
from other types of goods. Factors such as culture, personal
characteristics, website quality, and vendor characteristics influence
the online purchasing behavior of consumers thus making it a
complex area of study. This paper explores the scope of e-retail for
luxury consumption in the U.A.E. by identifying what motivates and
de-motivates online purchase behavior of U.A.E. consumers and
necessary hypotheses have been drawn to reflect behavior between
online luxury preference consumers and non-online luxury preference
consumers.
Abstract: This paper study the segmented split capacitor
Digital-to-Analog Converter (DAC) implemented in a differentialtype
12-bit Successive Approximation Analog-to-Digital Converter
(SA-ADC). The series capacitance split array method employed as it
reduced the total area of the capacitors required for high resolution
DACs. A 12-bit regular binary array structure requires 2049 unit
capacitors (Cs) while the split array needs 127 unit Cs. These results
in the reduction of the total capacitance and power consumption of
the series split array architectures as to regular binary-weighted
structures. The paper will show the 12-bit DAC series split capacitor
with 4-bit thermometer coded DAC architectures as well as the
simulation and measured results.
Abstract: The Combination of path planning and path following is the main purpose of this paper. This paper describes the developed practical approach to motion control of the MRL small size robots. An intelligent controller is applied to control omni-directional robots motion in simulation and real environment respectively. The Brain Emotional Learning Based Intelligent Controller (BELBIC), based on LQR control is adopted for the omni-directional robots. The contribution of BELBIC in improving the control system performance is shown as application of the emotional learning in a real world problem. Optimizing of the control effort can be achieved in this method too. Next the implicit communication method is used to determine the high level strategies and coordination of the robots. Some simple rules besides using the environment as a memory to improve the coordination between agents make the robots' decision making system. With this simple algorithm our team manifests a desirable cooperation.
Abstract: A combination of image fusion and quad tree decomposition method is used for detecting the sunspot trajectories in each month and computation of the latitudes of these trajectories in each solar hemisphere. Daily solar images taken with SOHO satellite are fused for each month and the result of fused image is decomposed with Quad Tree decomposition method in order to classifying the sunspot trajectories and then to achieve the precise information about latitudes of sunspot trajectories. Also with fusion we deduce some physical remarkable conclusions about sun magnetic fields behavior. Using quad tree decomposition we give information about the region on sun surface and the space angle that tremendous flares and hot plasma gases permeate interplanetary space and attack to satellites and human technical systems. Here sunspot images in June, July and August 2001 are used for studying and give a method to compute the latitude of sunspot trajectories in each month with sunspot images.
Abstract: More and more governments around the world are
introducing e-government as a means of reducing costs, improving
services, saving time and increasing effectiveness and efficiency in
the public sector Therefore e-government has been identified as one
of the top priorities for Saudi government and all its agencies.
However, the adoption of e-government is facing many challenges
and barriers such as technological, cultural, organizational, and social
issues which must be considered and treated carefully by any
government contemplating its adoption. This paper reports on a pilot
study amongst online (e-ready) citizens to identify the challenges and
barriers that affect the adoption of e-government services especially
from their perspective in Saudi society. Based on the analysis of data
collected from an online survey the researcher was able to identify
some of the important barriers and challenges from the e-ready
citizen perspective. As a result, this study has generated a list of
possible strategies to move towards successful adoption of egovernment
services in Saudi Arabia.
Abstract: In this work, we consider an application of neural networks in LD converter. Application of this approach assumes a reliable prediction of steel temperature and reduces a reblow ratio in steel work. It has been applied a conventional model to charge calculation, the obtained results by this technique are not always good, this is due to the process complexity. Difficulties are mainly generated by the noisy measurement and the process non linearities. Artificial Neural Networks (ANNs) have become a powerful tool for these complex applications. It is used a backpropagation algorithm to learn the neural nets. (ANNs) is used to predict the steel bath temperature in oxygen converter process for the end condition. This model has 11 inputs process variables and one output. The model was tested in steel work, the obtained results by neural approach are better than the conventional model.
Abstract: In this paper, the order, size and degree of the nodes
of the isomorphic fuzzy graphs are discussed. Isomorphism between
fuzzy graphs is proved to be an equivalence relation. Some properties
of self complementary and self weak complementary fuzzy graphs
are discussed.
Abstract: Problems on algebraical polynomials appear in many fields of mathematics and computer science. Especially the task of determining the roots of polynomials has been frequently investigated.Nonetheless, the task of locating the zeros of complex polynomials is still challenging. In this paper we deal with the location of zeros of univariate complex polynomials. We prove some novel upper bounds for the moduli of the zeros of complex polynomials. That means, we provide disks in the complex plane where all zeros of a complex polynomial are situated. Such bounds are extremely useful for obtaining a priori assertations regarding the location of zeros of polynomials. Based on the proven bounds and a test set of polynomials, we present an experimental study to examine which bound is optimal.
Abstract: The aim of this study was to screen for
microorganism that able to utilize 3-N-trimethylamino-1-propanol
(homocholine) as a sole source of carbon and nitrogen. The aerobic
degradation of homocholine has been found by a gram-positive
Rhodococcus sp. bacterium isolated from soil. The isolate was
identified as Rhodococcus sp. strain A4 based on the phenotypic
features, physiologic and biochemical characteristics, and
phylogenetic analysis. The cells of the isolated strain grown on both
basal-TMAP and nutrient agar medium displayed elementary
branching mycelia fragmented into irregular rod and coccoid
elements. Comparative 16S rDNA sequencing studies indicated that
the strain A4 falls into the Rhodococcus erythropolis subclade and
forms a monophyletic group with the type-strains of R. opacus, and
R. wratislaviensis. Metabolites analysis by capillary electrophoresis,
fast atom bombardment-mass spectrometry, and gas
chromatography- mass spectrometry, showed trimethylamine (TMA)
as the major metabolite beside β-alanine betaine and
trimethylaminopropionaldehyde. Therefore, the possible degradation
pathway of trimethylamino propanol in the isolated strain is through
consequence oxidation of alcohol group (-OH) to aldehyde (-CHO)
and acid (-COOH), and thereafter the cleavage of β-alanine betaine
C-N bonds yielded trimethylamine and alkyl chain.