Abstract: This paper aims to present knowledge management for solving economic problem and poverty in Thai community. A community in Thailand is studied as a case study for master plan or social and economic plan which derived form the research people conducted by themselves in their community. The result shows that community uses knowledge management in recording income and expense, analyzing their consumption, and then systematic planning of the production, distribution and consumption in the community. Besides, community enterprises, that people create as the by-products of master plan, can facilitate diverse economic activities which are able to reduce economic problem and poverty. The knowledge that people gain from solving their problem through building community enterprises are both tacit and explicit knowledge. Four styles of knowledge conversion: socialization,externalization, combination and internalization, are used. Besides, knowledge sharing inside the organization, between organizations and its environment are found. Keywordsknowledge management, community enterprise, Thailand.
Abstract: In this paper we proposed a novel method to acquire
the ROI (Region of interest) of unsupervised and touch-less palmprint
captured from a web camera in real-time. We use Viola-Jones
approach and skin model to get the target area in real time. Then an
innovative course-to-fine approach to detect the key points on the hand
is described. A new algorithm is used to find the candidate key points
coarsely and quickly. In finely stage, we verify the hand key points
with the shape context descriptor. To make the user much comfortable,
it can process the hand image with different poses, even the hand is
closed. Experiments show promising result by using the proposed
method in various conditions.
Abstract: Rainfall records of rainfall station including the
rainfall potential per hour and rainfall mass of five heavy storms are
explored, respectively from 2001 to 2010. The rationalization formula
is to investigate the capability of flood peak duration of flood
detention pond in different rainfall conditions. The stable flood
detention model is also proposed by using system dynamic control
theory to get the message of flood detention pond in this research.
When rainfall frequency of one hour rainfall duration is more than
100-year frequency which exceeds the flood detention standard of
20-year frequency for the flood detention pond, the flood peak
duration of flood detention pond is 1.7 hours at most even though the
flood detention pond with maximum drainage potential about 15.0
m3/s of pumping system is constructed. If the rainfall peak current is
more than maximum drainage potential, the flood peak duration of
flood detention pond is about 1.9 hours at most. The flood detention
pond is the key factor of stable drainage control and flood prevention.
The critical factors of flood disaster is not only rainfall mass, but also
rainfall frequency of heavy storm in different rainfall duration and
flood detention frequency of flood detention system.
Abstract: In this paper, we design an integration security system
that provides authentication service, authorization service, and
management service of security data and a unified interface for the
management service. The interface is originated from XKMS protocol
and is used to manage security data such as XACML policies, SAML
assertions and other authentication security data including public keys.
The system includes security services such as authentication,
authorization and delegation of authentication by employing SAML
and XACML based on security data such as authentication data,
attributes information, assertions and polices managed with the
interface in the system. It also has SAML producer that issues
assertions related on the result of the authentication and the
authorization services.
Abstract: This paper investigates the relationship between state and business in the context of structural and institutional transformations in Indonesia following the collapse of the New Order regime in 1998. Since 1998, Indonesia has embarked on a shift from an authoritarian to democratic polity and from a centralised to a decentralised system of governance, transforming the country into the third largest democracy and one of the most decentralised states in the world. This paper examines whether the transformation of the Indonesian state has altered the pattern of state and business relations with focus on clientism and corruption as the key dependent variable, and probes how/to what extent this has changed as a result of the transformation and the ensuring shifts in business and state relations. Based on interviews with key government and business actors as well as prominent scholars in Indonesia, it is found that since the demise of the New Order, business associations in Indonesia have become more independent of state control and more influential in public decision-making whereas the government has become more responsive of business concerns and more committed to combat corruption and clientism. However, these changes have not necessarily rendered business people completely leave individualclientelistic relationship with the government, and simply pursue wider sectoral and business-wide collectivism as an alternative way of channelling their aspirations, which is expected to help reduce corruption and clientism in Indonesia. This paper concludes that democratisation and a more open politics may have helped reduce corruption and clientism in Indonesia through changes in government. However, it is still difficult to imply that such political transformation has fostered business collective action and a broader, more encompassing pattern of business lobbying and activism, which is expected to help reduce corruption and clientism.
Abstract: The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes. This paper discussed the kinds of trust model, trust metrics used to address attacks by monitoring certain behavior of network. It describes the major design issues and their countermeasures of building trust model. It also discusses existing trust models used in various decision making process of wireless sensor networks.
Abstract: The use and management of projects has risen to
a new prominence, with projects seen as critical to economic in
both the private and public sectors due challenging and dynamic
business environment. However, failure in managing project is
encountered regularly, which cause the waste of company
resources. The impacts of projects that failed to meet
stakeholders expectations have left behind long lasting negative
consequences in organization. Therefore, this research aims to
investigate on key success factors of project management in an
organization. It is believed that recognizing important factors
that contribute to successful project will help companies to
increase the overall profitability. 150 questionnaires were
distributed to respondents and 110 questionnaires were collected
and used in performing the data analysis. The result has strongly
supported the relationship between independent variables and
project performance.
Abstract: Blind signatures enable users to obtain valid signatures for a message without revealing its content to the signer. This paper presents a new blind signature scheme, i.e. identity-based blind signature scheme with message recovery. Due to the message recovery property, the new scheme requires less bandwidth than the identitybased blind signatures with similar constructions. The scheme is based on modified Weil/Tate pairings over elliptic curves, and thus requires smaller key sizes for the same level of security compared to previous approaches not utilizing bilinear pairings. Security and efficiency analysis for the scheme is provided in this paper.
Abstract: This paper investigates the effect of International
Financial Reporting Standards (IFRS) adoption on the frequency of
earnings managements towards small positive profits. We focus on
two emerging markets IFRS adopters: South Africa and Turkey.
We tested our logistic regression using appropriate panelestimation
techniques over a sample of 330 South African and 210
Turkish firm-year observations over the period 2002-2008. Our
results document that mandatory adoption of IFRS is not associated
with a reduction in earnings management towards small positive
profits in emerging markets. These results contradict most of the
previous findings of the studies conducted in developed countries.
Based on the legal system factor, we compare the intensity of
earnings management between a code law country (Turkey) and a
common law country (South Africa) over the pre and post-adoption
periods. Our findings show that the frequency of such earnings
management practice increases significantly for the code law
country.
Abstract: Fruits and vegetables are the essentials of a healthy
diet, mainly because of their antioxidant properties contributing to
disease blockage especially for some certain types of cancer. Being a
favourite fruit, citrus are produced for economic and commercial
purposes worldwide. Particularly, lemon fruit (Citrus limon L.), has
an important place in export products of Turkey. Lemon has a great
importance on human nutrition with regard to being a source of
nutrients, flavonoids, vitamin C and minerals. It is used for food
flavouring and pickling and also processed for lemonade. By
processing citrus into fruit juices, consumption may increase and also
become easier. Like many fruits and vegetables lemons are cheap and
abundant during harvesting period, while they are quite expensive in
other seasons. Lemon juice and concentrate production allows
consumers to get benefits from lemon fruit in any time of the year.
Lemonade is getting in to the focus of consumers’ attention
preferring non-carbonated drinks. The demand of healthy, convenient
functional foods affects consumer trends through innovative
products. For this reason, lemonade could be enriched with different
natural herb extracts such as ginger (Zingiber officinale), linden (Tilia
cordata), and mint (Mentha piperita).
Abstract: The curriculum of the primary school science course was redesigned on the basis of constructivism in 2005-2006 academic years, in Turkey. In this context, the name of this course has been changed as “Science and Technology"; and both content and course books, students workbooks for this course have been redesigned in light of constructivism. The aim of this study is to determine whether the Science and Technology course books and student work books for primary school 5th grade are appropriate for the constructivism by evaluating them in terms of the fundamental principles of constructivism. In this study, out of qualitative research methods, documentation technique (i.e. document analysis) is applied; while selecting samples, criterion-sampling is used out of purposeful sampling techniques. When the Science and Technology course book and workbook for the 5th grade in primary education are examined, it is seen that both books complete each other in certain areas. Consequently, it can be claimed that in spite of some inadequate and missing points in the course book and workbook of the primary school Science and Technology course for the 5th grade students, these books are attempted to be designed in terms of the principles of constructivism. To overcome the inadequacies in the books, it can be suggested to redesign them. In addition to them, not to ignore the technology dimension of the course, the activities that encourage the students to prepare projects using technology cycle should be included.
Abstract: The protection of the contents of digital products is
referred to as content authentication. In some applications, to be able
to authenticate a digital product could be extremely essential. For
example, if a digital product is used as a piece of evidence in the
court, its integrity could mean life or death of the accused. Generally,
the problem of content authentication can be solved using semifragile
digital watermarking techniques. Recently many authors have
proposed Computer Generated Hologram Watermarking (CGHWatermarking)
techniques. Starting from these studies, in this paper
a semi-fragile Computer Generated Hologram coding technique is
proposed, which is able to detect malicious tampering while
tolerating some incidental distortions. The proposed technique uses
as watermark an encrypted image, and it is well suitable for digital
image authentication.
Abstract: Systems Analysis and Design is a key subject in
Information Technology courses, but students do not find it easy to
cope with, since it is not “precise" like programming and not exact
like Mathematics. It is a subject working with many concepts,
modeling ideas into visual representations and then translating the
pictures into a real life system. To complicate matters users who are
not necessarily familiar with computers need to give their inputs to
ensure that they get the system the need. Systems Analysis and
Design also covers two fields, namely Analysis, focusing on the
analysis of the existing system and Design, focusing on the design of
the new system. To be able to test the analysis and design of a
system, it is necessary to develop a system or at least a prototype of
the system to test the validity of the analysis and design. The skills
necessary in each aspect differs vastly. Project Management Skills,
Database Knowledge and Object Oriented Principles are all
necessary. In the context of a developing country where students
enter tertiary education underprepared and the digital divide is alive
and well, students need to be motivated to learn the necessary skills,
get an opportunity to test it in a “live" but protected environment –
within the framework of a university. The purpose of this article is to
improve the learning experience in Systems Analysis and Design
through reviewing the underlying teaching principles used, the
teaching tools implemented, the observations made and the
reflections that will influence future developments in Systems
Analysis and Design. Action research principles allows the focus to
be on a few problematic aspects during a particular semester.
Abstract: The manufacture of large-scale precision aerospace
components using CNC requires a highly effective maintenance
strategy to ensure that the required accuracy can be achieved over
many hours of production. This paper reviews a strategy for a
maintenance management system based on Failure Mode Avoidance,
which uses advanced techniques and technologies to underpin a
predictive maintenance strategy. It is shown how condition
monitoring (CM) is important to predict potential failures in high
precision machining facilities and achieve intelligent and integrated
maintenance management. There are two distinct ways in which CM
can be applied. One is to monitor key process parameters and
observe trends which may indicate a gradual deterioration of
accuracy in the product. The other is the use of CM techniques to
monitor high status machine parameters enables trends to be
observed which can be corrected before machine failure and
downtime occurs.
It is concluded that the key to developing a flexible and intelligent
maintenance framework in any precision manufacturing operation is
the ability to evaluate reliably and routinely machine tool condition
using condition monitoring techniques within a framework of Failure
Mode Avoidance.
Abstract: The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.
Abstract: As in today's semiconductor industries test costs can make up to 50 percent of the total production costs, an efficient test error detection becomes more and more important. In this paper, we present a new machine learning approach to test error detection that should provide a faster recognition of test system faults as well as an improved test error recall. The key idea is to learn a classifier ensemble, detecting typical test error patterns in wafer test results immediately after finishing these tests. Since test error detection has not yet been discussed in the machine learning community, we define central problem-relevant terms and provide an analysis of important domain properties. Finally, we present comparative studies reflecting the failure detection performance of three individual classifiers and three ensemble methods based upon them. As base classifiers we chose a decision tree learner, a support vector machine and a Bayesian network, while the compared ensemble methods were simple and weighted majority vote as well as stacking. For the evaluation, we used cross validation and a specially designed practical simulation. By implementing our approach in a semiconductor test department for the observation of two products, we proofed its practical applicability.
Abstract: The impact of noise upon live quality has become an
important aspect to make both urban and environmental policythroughout
Europe and in Turkey. Concern over the quality of urban
environments, including noise levels and declining quality of green
space, is over the past decade with increasing emphasis on designing
livable and sustainable communities. According to the World Health
Organization, noise pollution is the third most hazardous
environmental type of pollution which proceeded by only air (gas
emission) and water pollution. The research carried out in two
phases, the first stage of the research noise and plant types providing
the suction of noise was evaluated through literature study and at the
second stage, definite types (Juniperus horizontalis L., Spirea
vanhouetti Briot., Cotoneaster dammerii C.K., Berberis thunbergii
D.C., Pyracantha coccinea M. etc.) were selected for the city of
Konya. Trials were conducted on the highway of Konya. The biggest
value of noise reduction was 6.3 dB(A), 4.9 dB(A), 6.2 dB(A) value
with compared to the control which includes the group that formed
by the bushes at the distance of 7m, 11m, 20m from the source and
5m, 9m, 20m of plant width, respectively. In this paper, definitions
regarding to noise and its sources were made and the precautions
were taken against to noise that mentioned earlier with the adverse
effects of noise. Plantation design approaches and suggestions
concerning to the diversity to be used, which are peculiar to roadside,
were developed to discuss the role and the function of plant material
to reduce the noise of the traffic.
Abstract: RC4 was used as an encryption algorithm in WEP(Wired Equivalent Privacy) protocol that is a standardized for 802.11 wireless network. A few attacks followed, indicating certain weakness in the design. In this paper, we proposed a new variant of RC4 stream cipher. The new version of the cipher does not only appear to be more secure, but its keystream also has large period, large complexity and good statistical properties.
Abstract: As the majority of faults are found in a few of its
modules so there is a need to investigate the modules that are
affected severely as compared to other modules and proper
maintenance need to be done in time especially for the critical
applications. As, Neural networks, which have been already applied
in software engineering applications to build reliability growth
models predict the gross change or reusability metrics. Neural
networks are non-linear sophisticated modeling techniques that are
able to model complex functions. Neural network techniques are
used when exact nature of input and outputs is not known. A key
feature is that they learn the relationship between input and output
through training. In this present work, various Neural Network Based
techniques are explored and comparative analysis is performed for
the prediction of level of need of maintenance by predicting level
severity of faults present in NASA-s public domain defect dataset.
The comparison of different algorithms is made on the basis of Mean
Absolute Error, Root Mean Square Error and Accuracy Values. It is
concluded that Generalized Regression Networks is the best
algorithm for classification of the software components into different
level of severity of impact of the faults. The algorithm can be used to
develop model that can be used for identifying modules that are
heavily affected by the faults.
Abstract: In this study, aerobic digestion of tannery industry
wastewater was carried out using mixed culture obtained from
common effluent treatment plant treating tannery wastewater. The
effect of pH, temperature, inoculum concentration, agitation speed
and initial substrate concentration on the reduction of organic matters
were found. The optimum conditions for COD reduction was found
to be pH - 7 (60%), temperature - 30ÔùªC (61%), inoculum
concentration - 2% (61%), agitation speed - 150rpm (65%) and initial
substrate concentration - 1560 mg COD/L (74%). Kinetics studies
were carried by using Monod model, First order, Diffusional model
and Singh model. From the results it was found that the Monod
model suits well for the degradation of tannery wastewater using
mixed microbial consortium.