Abstract: Shipping comb is mounted on Head Stack Assembly
(HSA) to prevent collision of the heads, maintain the gap between
suspensions and protect HSA tips from unintentional contact
damaged in the manufacturing process. Failure analysis of shipping
comb in hard disk drive production processes is proposed .Field
observations were performed to determine the fatal areas on shipping
comb and their failure fraction. Root cause failure analysis (RCFA) is
applied to specify the failure causes subjected to various loading
conditions. For reliability improvement, failure mode and effects
analysis (FMEA) procedure to evaluate the risk priority is performed.
Consequently, the more suitable information design criterions were
obtained.
Abstract: The purpose of this study was to survey the effect of
organizational communication system on the conflict in physical
education offices of Isfahan province. The research methodology of
this research was a descriptive study. All employees working in
physical education offices of Isfahan province were included in the
sample for this study (N= 236). Researcher made questionnaire and
demographic questionnaire were used as investigation instruments.
Based on the result of chi square test, there is significant difference
between organizational communication system and interpersonal
conflict. The most of participants evaluate communication in an
informal way and pointed out that the communication channels were
not open. Based on the result of binomial test, interpersonal conflict
exists in physical education offices of Isfahan.
Abstract: Previous studies have indicated that one of the most
critical failure reasons of enterprise systems is the lack of knowledge
sharing and utilization across organizations. As a consequence, many
information systems researchers have paid attention to examining the
effect of absorptive capacity closely associated with knowledge
sharing and transferring on IS usage performance. A lack of
communications and interactions due to a lack of organizational
citizenship behavior might lead to weak absorptive capacity and thus
negatively influence knowledge sharing across organizations. In this
study, a theoretical model which delves into the relationship between
usage performance of enterprise systems and its determinants was
established.
Abstract: Artemia is one of the most conspicuous invertebrates
associated with aquaculture. It can be considered as a model
organism, offering numerous advantages for comprehensive and
multidisciplinary studies using morphologic or molecular methods.
Since DNA extraction is an important step of any molecular
experiment, a new and a rapid method of DNA extraction from adult
Artemia was described in this study. Besides, the efficiency of this
technique was compared with two widely used alternative techniques,
namely Chelex® 100 resin and SDS-chloroform methods. Data
analysis revealed that the new method is the easiest and the most cost
effective method among the other methods which allows a quick and
efficient extraction of DNA from the adult animal.
Abstract: This paper is devoted to a delayed periodic predatorprey system with non-monotonic numerical response on time scales. With the help of a continuation theorem based on coincidence degree theory, we establish easily verifiable criteria for the existence of multiple periodic solutions. As corollaries, some applications are listed. In particular, our results improve and generalize some known ones.
Abstract: In this note, we discuss the convergence behavior of a modified inexact Uzawa algorithm for solving generalized saddle point problems, which is an extension of the result obtained in a recent paper [Z.H. Cao, Fast Uzawa algorithm for generalized saddle point problems, Appl. Numer. Math., 46 (2003) 157-171].
Abstract: Security is an interesting and significance issue for
popular virtual platforms, such as virtualization cluster and cloud
platforms. Virtualization is the powerful technology for cloud
computing services, there are a lot of benefits by using virtual machine
tools which be called hypervisors, such as it can quickly deploy all
kinds of virtual Operating Systems in single platform, able to control
all virtual system resources effectively, cost down for system platform
deployment, ability of customization, high elasticity and high
reliability. However, some important security problems need to take
care and resolved in virtual platforms that include terrible viruses, evil
programs, illegal operations and intrusion behavior. In this paper, we
present useful Intrusion Detection Mechanism (IDM) software that not
only can auto to analyze all system-s operations with the accounting
journal database, but also is able to monitor the system-s state for
virtual platforms.
Abstract: The impact of fixed speed squirrel cage type as well as
variable speed doubly fed induction generators (DFIG) on dynamic
performance of a multimachine power system has been investigated.
Detailed models of the various components have been presented and
the integration of asynchronous and synchronous generators has been
carried out through a rotor angle based transform. Simulation studies
carried out considering the conventional dynamic model of squirrel
cage asynchronous generators show that integration, as such, could
degrade to the AC system performance transiently. This article
proposes a frequency or power controller which can effectively
control the transients and restore normal operation of fixed speed
induction generator quickly. Comparison of simulation results
between classical cage and doubly-fed induction generators indicate
that the doubly fed induction machine is more adaptable to
multimachine AC system. Frequency controller installed in the DFIG
system can also improve its transient profile.
Abstract: The present research was focused to investigate the
role of investment in the course of economic growth with reference to
Pakistan. The study analyzed the role of the public and private
investment and impact of the political and macroeconomic
uncertainty on economic growth of Pakistan by using the vector
autoregressive approach (VAR). In long-run both public and private
investment showed a positive impact on economic growth but the
growth was largely driven by private investment as compared to
public investment. Government consumption expenditure, economic
uncertainty and political instability hampered the economic growth of
Pakistan. In short-run the private investment positively influences the
growth but there was negative and insignificant effect of the public
investment and government consumption expenditure on the growth.
There was a positive relationship found between economic
uncertainty (proxy for inflation) and GDP in short run.
Abstract: A feeding trial was conducted to investigate the effect
of periodically use of garlic on performance and carcass
characteristics in broiler chickens. 240 1-day-old Ross broiler chicks
randomly allocated into the 10 dietary treatments (A, B, C, D, E, F,
G, H, I and J) for 6 wk. Treatment A or control group, received basal
diet (based on standards of Ross management guidelines) without
supplementation of garlic powder while B, C and D dietary
treatments were basal diet supplemented with 0.5, 1 and 3% garlic
powder, respectively for the whole time of experiment (6 weeks).
Birds in group E, F and G were fed control diet supplemented with
0.5, 1 and 3% garlic powder, respectively just in their starter diet (0-
21d). Birds in three other treatments (H, I and J) received control diet
for the first 21 days and 0.5, 1 and 3% of garlic powder was added to
their finisher diets, respectively. 1 and 3% supplemented groups in
finisher period had better performance as compared with other
groups. Since present study conducted in optimum and antiseptic
conditions, it seems that better or more responses could be expected
in performance if the raising conditions would not be healthy.
Abstract: Geographic Profiling has successfully assisted investigations for serial crimes. Considering the multi-cluster feature of serial criminal spots, we propose a Multi-point Centrography model as a natural extension of Single-point Centrography for geographic profiling. K-means clustering is first performed on the data samples and then Single-point Centrography is adopted to derive a probability distribution on each cluster. Finally, a weighted combinations of each distribution is formed to make next-crime spot prediction. Experimental study on real cases demonstrates the effectiveness of our proposed model.
Abstract: In this paper, some new nonlinear generalized
Gronwall-Bellman-Type integral inequalities with mixed time delays
are established. These inequalities can be used as handy tools
to research stability problems of delayed differential and integral
dynamic systems. As applications, based on these new established
inequalities, some p-stable results of a integro-differential equation
are also given. Two numerical examples are presented to illustrate
the validity of the main results.
Abstract: The objective of this work was to examine the changes
in non destructive properties caused by carbonation of CEM II
mortar. Samples of CEM II mortar were prepared and subjected to
accelerated carbonation at 20°C, 65% relative humidity and 20% CO2
concentration. We examined the evolutions of the gas permeability,
the thermal conductivity, the thermal diffusivity, the volume of the
solid phase by helium pycnometry, the longitudinal and transverse
ultrasonic velocities. The principal contribution of this work is that,
apart of the gas permeability, changes in other non destructive
properties have never been studied during the carbonation of cement
materials. These properties are important in predicting/measuring the
durability of reinforced concrete in CO2 environment. The
carbonation depth and the porosity accessible to water were also
reported in order to explain comprehensively the changes in non
destructive parameters.
Abstract: It is an important problem to compute the geodesics on
a surface in many fields. To find the geodesics in practice, however,
the traditional discrete algorithms or numerical approaches can only
find a list of discrete points. The first author proposed in 2010 a new,
elegant and accurate method, the geodesic-like method, for
approximating geodesics on a regular surface. This paper will present
by use of this method a computation of the Bezier geodesic-like curves
on spheres.
Abstract: It is not a secret that, IT management has become
more and more and integrated part of almost all organizations. IT
managers posses an enormous amount of knowledge within both
organizational knowledge and general IT knowledge. This article
investigates how IT managers keep themselves updated on IT
knowledge in general and looks into how much time IT managers
spend on weekly basis searching the net for new or problem solving
IT knowledge. The theory used in this paper is used to investigate the
current role of IT managers and what issues they are facing.
Furthermore a research is conducted where 7 IT managers in medium
sized and large Danish companies are interviewed to add further
focus on the role of the IT manager and to focus on how they keep
themselves updated. Beside finding substantial need for more
research, IT managers – generalists or specialists – only have limited
knowledge resources at hand in updating their own knowledge –
leaving much initiative to vendors.
Abstract: Real options theory suggests that managerial flexibility embedded within irreversible investments can account for a significant value in project valuation. Although the argument has become the dominant focus of capital investment theory over decades, yet recent survey literature in capital budgeting indicates that corporate practitioners still do not explicitly apply real options in investment decisions. In this paper, we explore how real options decision criteria can be transformed into equivalent capital budgeting criteria under the consideration of uncertainty, assuming that underlying stochastic process follows a geometric Brownian motion (GBM), a mixed diffusion-jump (MX), or a mean-reverting process (MR). These equivalent valuation techniques can be readily decomposed into conventional investment rules and “option impacts", the latter of which describe the impacts on optimal investment rules with the option value considered. Based on numerical analysis and Monte Carlo simulation, three major findings are derived. First, it is shown that real options could be successfully integrated into the mindset of conventional capital budgeting. Second, the inclusion of option impacts tends to delay investment. It is indicated that the delay effect is the most significant under a GBM process and the least significant under a MR process. Third, it is optimal to adopt the new capital budgeting criteria in investment decision-making and adopting a suboptimal investment rule without considering real options could lead to a substantial loss in value.
Abstract: This paper proposes the authentication method using
ESA algorithm instead of using CAVE algorithm in the CDMA
mobile communication systems including IS-95 and CDMA2000 1x.
And, we analyze to apply ESA mechanism on behalf of CAVE
mechanism without the change of message format and air interface in
the existing CDMA systems. If ESA algorithm can be used as the
substitution of CAVE algorithm, security strength of authentication
algorithm is intensified without protocol change. An algorithm
replacement proposed in this paper is not to change an authentication
mechanism, but to configure input of ESA algorithm and to produce
output. Therefore, our proposal can be the compatible to the existing
systems.
Abstract: The purpose of this study was to explore the
relationship between knowledge sharing and innovation capability,
by examining the influence of individual, organizational and
technological factors on knowledge sharing. The research is based
on a survey of 103 employees from different organizations in the
United Arab Emirates. The study is based on a model and a
questionnaire that was previously tested by Lin [1]. Thus, the study
aims at examining the validity of that model in UAE context. The
results of the research show varying degrees of correlation between
the different variables, with ICT use having the strongest relationship
with the innovation capabilities of organizations. The study also
revealed little evidence of knowledge collecting and knowledge
sharing among UAE employees.
Abstract: This paper presents an environmental and technoeconomic
evaluation of light duty vehicles in Iran. A comprehensive
well-to-wheel (WTW) analysis is applied to compare different
automotive fuel chains, conventional internal combustion engines and
innovative vehicle powertrains. The study examines the
competitiveness of 15 various pathways in terms of energy
efficiencies, GHG emissions, and levelized cost of different energy
carriers. The results indicate that electric vehicles including battery
electric vehicles (BEV), fuel cell vehicles (FCV) and plug-in hybrid
electric vehicles (PHEV) increase the WTW energy efficiency by
54%, 51% and 46%, respectively, compared to common internal
combustion engines powered by gasoline. On the other hand,
greenhouse gas (GHG) emissions per kilometer of FCV and BEV
would be 48% lower than that of gasoline engines. It is concluded
that BEV has the lowest total cost of energy consumption and
external cost of emission, followed by internal combustion engines
(ICE) fueled by CNG. Conventional internal combustion engines
fueled by gasoline, on the other hand, would have the highest costs.
Abstract: Eye localization is necessary for face recognition and
related application areas. Most of eye localization algorithms reported
so far still need to be improved about precision and computational
time for successful applications. In this paper, we propose an eye
location method based on multi-scale Gabor feature vectors, which is
more robust with respect to initial points. The eye localization based
on Gabor feature vectors first needs to constructs an Eye Model Bunch
for each eye (left or right eye) which consists of n Gabor jets and
average eye coordinates of each eyes obtained from n model face
images, and then tries to localize eyes in an incoming face image by
utilizing the fact that the true eye coordinates is most likely to be very
close to the position where the Gabor jet will have the best Gabor jet
similarity matching with a Gabor jet in the Eye Model Bunch. Similar
ideas have been already proposed in such as EBGM (Elastic Bunch
Graph Matching). However, the method used in EBGM is known to be
not robust with respect to initial values and may need extensive search
range for achieving the required performance, but extensive search
ranges will cause much more computational burden. In this paper, we
propose a multi-scale approach with a little increased computational
burden where one first tries to localize eyes based on Gabor feature
vectors in a coarse face image obtained from down sampling of the
original face image, and then localize eyes based on Gabor feature
vectors in the original resolution face image by using the eye
coordinates localized in the coarse scaled image as initial points.
Several experiments and comparisons with other eye localization
methods reported in the other papers show the efficiency of our
proposed method.