Abstract: The paper deals with quality labels used in the food products market, especially with labels of quality, labels of origin, and labels of organic farming. The aim of the paper is to identify perception of these labels by consumers in the Czech Republic. The first part refers to the definition and specification of food quality labels that are relevant in the Czech Republic. The second part includes the discussion of marketing research results. Data were collected with personal questioning method. Empirical findings on 150 respondents are related to consumer awareness and perception of national and European food quality labels used in the Czech Republic, attitudes to purchases of labelled products, and interest in information regarding the labels. Statistical methods, in the concrete Pearson´s chi-square test of independence, coefficient of contingency, and coefficient of association are used to determinate if significant differences do exist among selected demographic categories of Czech consumers.
Abstract: In this study, the Taguchi method was used to optimize the effect of HALO structure or halo implant variations on threshold voltage (VTH) and leakage current (ILeak) in 45nm p-type Metal Oxide Semiconductor Field Effect Transistors (MOSFETs) device. Besides halo implant dose, the other process parameters which used were Source/Drain (S/D) implant dose, oxide growth temperature and silicide anneal temperature. This work was done using TCAD simulator, consisting of a process simulator, ATHENA and device simulator, ATLAS. These two simulators were combined with Taguchi method to aid in design and optimize the process parameters. In this research, the most effective process parameters with respect to VTH and ILeak are halo implant dose (40%) and S/D implant dose (52%) respectively. Whereas the second ranking factor affecting VTH and ILeak are oxide growth temperature (32%) and halo implant dose (34%) respectively. The results show that after optimizations approaches is -0.157V at ILeak=0.195mA/μm.
Abstract: It is impossible to think about democracy without elections. The litmus test of any electoral process in any country is the possibility of a one time minority to become a majority at another time and a peaceful transition of power. In many countries in Sub-Saharan Africa though the multi-party elections appeared to be competitive they failed the acid test of democracy: peaceful regime change in a free and fair election. Failure to solve electoral disputes might lead to bloody electoral conflicts as witnessed in many emerging democracies in Africa. The aim of this paper is to investigate electoral conflicts in Africa since the end of the Cold War by using the 2005 post-election violence in Ethiopia as a case study. In Ethiopia, the coming to power of the EPRDF in 1991 marked the fall of the Derg dictatorial military government and the beginning of a multi-party democracy. The country held multi-party parliamentary elections in 1995, 2000, and 2005 where the ruling EPRDF party “won" the elections through violence, involving intimidation, manipulation, detentions of political opponents, torture, and political assassinations. The 2005 electoral violence was the worst electoral violence in the country-s political history that led to the death of 193 protestors and the imprisonment of more than 40, 000 people. It is found out that the major causes of the 2005 Ethiopian election were the defeat of the ruling party in the election and its attempt to reverse the poll results by force; the Opposition-s lack of decisive leadership; the absence of independent courts and independent electoral management body; and the ruling party-s direct control over the army and police.
Abstract: RFID (Radio Frequency IDentification) system has
been widely used in our life, such as transport systems, passports,
automotive, animal tracking, human implants, library, and so on.
However, the RFID authentication protocols between RF (Radio
Frequency) tags and the RF readers have been bring about various
privacy problems that anonymity of the tags, tracking, eavesdropping,
and so on. Many researchers have proposed the solution of the
problems. However, they still have the problem, such as location
privacy, mutual authentication. In this paper, we show the problems of
the previous protocols, and then we propose a more secure and
efficient RFID authentication protocol.
Abstract: In association with path dependence, researchers often
talk of institutional “lock-in", thereby indicating that far-reaching
path deviation or path departure are to be regarded as exceptional
cases. This article submits the alleged general inclination for stability
of path-dependent processes to a critical review. The different
reasons for path dependence found in the literature indicate that
different continuity-ensuring mechanisms are at work when people
talk about path dependence (“increasing returns", complementarity,
sequences etc.). As these mechanisms are susceptible to fundamental
change in different ways and to different degrees, the path
dependence concept alone is of only limited explanatory value. It is
therefore indispensable to identify the underlying continuity-ensuring
mechanism as well if a statement-s empirical value is to go beyond
the trivial, always true “history matters".
Abstract: Road crashes not only claim lives and inflict injuries but also create economic burden to the society due to loss of productivity. The problem of deaths and injuries as a result of road traffic crashes is now acknowledged to be a global phenomenon with authorities in virtually all countries of the world concerned about the growth in the number of people killed and seriously injured on their roads. However, the road crash scenario of a developing country like Bangladesh is much worse comparing with this of developed countries. For developing proper countermeasures it is necessary to identify the factors affecting crash occurrences. The objectives of the study is to examine the effect of district wise road infrastructure, socioeconomic and demographic features on crash occurrence .The unit of analysis will be taken as individual district which has not been explored much in the past. Reported crash data obtained from Bangladesh Road Transport Authority (BRTA) from the year 2004 to 2010 are utilized to develop negative binomial model. The model result will reveal the effect of road length (both paved and unpaved), road infrastructure and several socio economic characteristics on district level crash frequency in Bangladesh.
Abstract: This study examines the impact of working capital
management on firms- performance and market value of the firms in
Nigeria. A sample of fifty four non-financial quoted firms in Nigeria
listed on the Nigeria Stock Exchange was used for this study. Data
were collected from annual reports of the sampled firms for the
period 1995-2009. This result shows there is a significant negative
relationship between cash conversion cycle and market valuation
and firm-s performance. It also shows that debt ratio is positively
related to market valuation and negatively related firm-s
performance. The findings confirm that there is a significant
relationship between Market valuation, profitability and working
capital component in line with previous studies. This mean that
Nigeria firms should ensure adequate management of working
capital especially cash conversion cycle components of account
receivables, account payables and inventories, as efficiency working
capital management is expected to contribute positively to the firms-
market value.
Abstract: This research aims to develop and evaluate a training
course to promote learning activities of 2nd year, Suan Sunandha
Rajabhat University, faculty of education students using multiple
intelligences theory. The process is divided into two phases: Phase 1
development of training course to promote learning activities
consisting of principles, objectives of the course, structure, training
duration, content, training materials, training activities, media
training, monitoring, measurement and evaluation quality of the
course. Phase 2 evaluation efficiency of training course was to use
the improved curriculum with experimental group which is 2nd year,
Suan Sunandha Rajabhat University, faculty of education students
was drawn randomly 152 students. The experimental pattern was
randomized Control Group Pre-Test Post-Test Design, Analysis Data
by t-Test with the software SPFSS for Windows. Research has shown
that: 1). the ability of teaching and learning according to the theory of
multiple intelligences after training is higher than before training
significantly in statistic at .01 level, 2). The satisfaction of students
to the training courses was overall at the highest level.
Abstract: Friction stir welding is a solid state joining process. High strength aluminum alloys are widely used in aircraft and marine industries. Generally, the mechanical properties of fusion welded aluminum joints are poor. As friction stir welding occurs in solid state, no solidification structures are created thereby eliminating the brittle and eutectic phases common in fusion welding of high strength aluminum alloys. In this review the process parameters, microstructural evolution, and effect of friction stir welding on the properties of weld specific to aluminum alloys have been discussed.
Abstract: High precision in motion is required to manipulate the
micro objects in precision industries for micro assembly, cell
manipulation etc. Precision manipulation is achieved based on the
appropriate mechanism design of micro devices such as
microgrippers. Design of a compliant based mechanism is the better
option to achieve a highly precised and controlled motion. This
research article highlights the method of designing a compliant based
three fingered microgripper suitable for holding asymmetric objects.
Topological optimization technique, a systematic method is
implemented in this research work to arrive a topologically optimized
design of the mechanism needed to perform the required micro
motion of the gripper. Optimization technique has a drawback of
generating senseless regions such as node to node connectivity and
staircase effect at the boundaries. Hence, it is required to have post
processing of the design to make it manufacturable. To reduce the
effect of post processing stage and to preserve the edges of the image,
a cubic spline interpolation technique is introduced in the MATLAB
program. Structural performance of the topologically developed
mechanism design is tested using finite element method (FEM)
software. Further the microgripper structure is examined to find its
fatigue life and vibration characteristics.
Abstract: This paper implements the inventory model developed in the first part of this paper in a simplified problem to simultaneously reduce costs and risks in JIT systems. This model is developed to ascertain an optimal ordering strategy for procuring raw materials by using regular multi-external and local backup suppliers to reduce the total cost of the products, and at the same time to reduce the risks arising from this cost reduction within production systems. A comparison between the cost of using the JIT system and using the proposed inventory model shows the superiority of the use of the inventory model.
Abstract: Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management and etc. Among them, configuration, fault and security management is more important than others. Because these are essential and useful in any fields. Configuration management is to monitor and maintain the whole system or LAN. Fault management is to detect and troubleshoot the system. Security management is to control the whole system. This paper intends to increase the network management functionalities including configuration management, fault management and security management. In configuration management system, this paper specially can support the USB ports and devices to detect and read devices configuration and solve to detect hardware port and software ports. In security management system, this paper can provide the security feature for the user account setting and user management and proxy server feature. And all of the history of the security such as user account and proxy server history are kept in the java standard serializable file. So the user can view the history of the security and proxy server anytime. If the user uses this system, the user can ping the clients from the network and the user can view the result of the message in fault management system. And this system also provides to check the network card and can show the NIC card setting. This system is used RMI (Remote Method Invocation) and JNI (Java Native Interface) technology. This paper is to implement the client/server network management system using Java 2 Standard Edition (J2SE). This system can provide more than 10 clients. And then this paper intends to show data or message structure of client/server and how to work using TCP/IP protocol.
Abstract: This paper presents the development of an electricity simulation model taking into account electrical network constraints, applied on the Belgian power system. The base of the model is optimizing an extensive Unit Commitment (UC) problem through the use of Mixed Integer Linear Programming (MILP). Electrical constraints are incorporated through the implementation of a DC load flow. The model encloses the Belgian power system in a 220 – 380 kV high voltage network (i.e., 93 power plants and 106 nodes). The model features the use of pumping storage facilities as well as the inclusion of spinning reserves in a single optimization process. Solution times of the model stay below reasonable values.
Abstract: In this paper I have developed a system for evaluating
the degree of fear emotion that the intelligent agent-based system
may feel when it encounters to a persecuting event. In this paper I
want to describe behaviors of emotional agents using human
behavior in terms of the way their emotional states evolve over time.
I have implemented a fuzzy inference system using Java
environment. As the inputs of this system, I have considered three
parameters related on human fear emotion. The system outputs can
be used in agent decision making process or choosing a person for
team working systems by combination the intensity of fear to other
emotion intensities.
Abstract: We see in the present day scenario that the Global
positioning system (GPS) has been an effective tool to track the
vehicle. However the adverse part of it is that it can only track a
vehicle-s position. Our present work provides a better platform to
track and disable a vehicle using wireless technology. In our system
we embed a microcomputer which monitors the series of automotive
systems like engine, fuel and braking system. The external USB
modem is connected with the microcomputer to provide 24 x 7
internet accesses. The microcomputer is synchronized with the
owner-s multimedia mobile by means of a software tool “REMOTE
DESKTOP". A unique username and password is provided to the
software tool, so that the owner can only access the microcomputer
through the internet on owner-s mobile. The key fact is that our
design is placed such that it is known only to the owner.
Abstract: This paper presents a new method for the
implementation of a direct rotor flux control (DRFOC) of induction
motor (IM) drives. It is based on the rotor flux components
regulation. The d and q axis rotor flux components feed proportional
integral (PI) controllers. The outputs of which are the target stator
voltages (vdsref and vqsref). While, the synchronous speed is depicted at
the output of rotor speed controller. In order to accomplish variable
speed operation, conventional PI like controller is commonly used.
These controllers provide limited good performances over a wide
range of operations even under ideal field oriented conditions. An
alternate approach is to use the so called fuzzy logic controller. The
overall investigated system is implemented using dSpace system
based on digital signal processor (DSP). Simulation and experimental
results have been presented for a one kw IM drives to confirm the
validity of the proposed algorithms.
Abstract: Minor law breaking seems more and more to be a part
of adolescence behavior. An important risk factor which seems to
influence delinquency appears to be the socio-economic one.
According to Romanian statistics, during the first six months of 2012,
1,378 minors have committed various crimes, the most common
being theft, sexual offenses and violent assaults. Drug-related
offenses did not reach the gravity of those from high income
countries of the European Union, but have a continuous upward
during the last years.
The aim of our research was to examine whether delinquency in
adolescence is correlated to mental disorders or socio-economic and
familial factors. Forensic psychiatric expertise was performed to 79
adolescents who committed offenses between 01 January 2012 and
31 December 2012. Teenagers, with ages between 12 and 17, were
examined by day hospitalization in the University Clinic of
Psychiatry Craiova.
Abstract: This paper focuses on testing database of existing
information system. At the beginning we describe the basic problems
of implemented databases, such as data redundancy, poor design of
database logical structure or inappropriate data types in columns of
database tables. These problems are often the result of incorrect
understanding of the primary requirements for a database of an
information system. Then we propose an algorithm to compare the
conceptual model created from vague requirements for a database
with a conceptual model reconstructed from implemented database.
An algorithm also suggests steps leading to optimization of
implemented database. The proposed algorithm is verified by an
implemented prototype. The paper also describes a fuzzy system
which works with the vague requirements for a database of an
information system, procedure for creating conceptual from vague
requirements and an algorithm for reconstructing a conceptual model
from implemented database.
Abstract: Communication is becoming a significant tool to engage stakeholders since half of the century ago. In the recent years, there has been rapid growth of new technology developments. In tandem with such developments, there has been growing emphasis in communication strategies and management especially in determining the level of influence and management strategies among the said stakeholders on particular field. This paper presents a research conceptual framework focusing on stakeholder theories, communication and management strategies to be implied on the engagement of stakeholders of new technology developments of fertilizer industry in Malaysia. Framework espoused in this paper will provide insights into the various stakeholder theories and engagement strategies from different principal necessary for a successful introduction of new technology development in the above stated industry. The proposed framework has theoretical significance in filling the gap of the body of knowledge in the implementation of communication strategies in Malaysian fertilizer industry.
Abstract: In the present paper, active control system is used in
different heights of the building and the most effective part was
studied where the active control system is applied. The mathematical
model of the building is established in MATLAB and in order to
active control the system FLC method was used. Three different
locations of the building are chosen to apply active control system,
namely at the lowest story, the middle height of the building, and at
the highest point of the building with TMD system. The equation of
motion was written for high rise building and it was solved by statespace
method. Also passive control was used with Tuned Mass
Damper (TMD) at the top floor of the building to show the robustness
of FLC method when compared with passive control system.