Abstract: Recently, bianisotropic media again received
increasing importance in electromagnetic theory because of advances
in material science which enable the manufacturing of complex
bianisotropic materials. By using Maxwell's equations and
corresponding boundary conditions, the electromagnetic field
distribution in bianisotropic solenoid coils is determined and the
influence of the bianisotropic behaviour of coil to the impedance and
Q-factor is considered. Bianisotropic media are the largest class of
linear media which is able to describe the macroscopic material
properties of artificial dielectrics, artificial magnetics, artificial chiral
materials, left-handed materials, metamaterials, and other composite
materials. Several special cases of coils, filled with complex
substance, have been analyzed. Results obtained by using the
analytical approach are compared with values calculated by
numerical methods, especially by our new hybrid EEM/BEM method
and FEM.
Abstract: Guaranteeing the availability of the required parts at
the scheduled time represents a key logistical challenge. This is
especially important when several parts are required together. This
article describes a tool that supports the positioning in the area of
conflict between low stock costs and a high service level for a
consumer.
Abstract: The purpose of this study is to identify the critical success factors (CSFs) for the effective implementation of Six Sigma in non-formal service Sectors.
Based on the survey of literature, the critical success factors (CSFs) for Six Sigma have been identified and are assessed for their importance in Non-formal service sector using Delphi Technique. These selected CSFs were put forth to the panel of expert to cluster them and prepare cognitive map to establish their relationship.
All the critical success factors examined and obtained from the review of literature have been assessed for their importance with respect to their contribution to Six Sigma effectiveness in non formal service sector.
The study is limited to the non-formal service sectors involved in the organization of religious festival only. However, the similar exercise can be conducted for broader sample of other non-formal service sectors like temple/ashram management, religious tours management etc.
The research suggests an approach to identify CSFs of Six Sigma for Non-formal service sector. All the CSFs of the formal service sector will not be applicable to Non-formal services, hence opinion of experts was sought to add or delete the CSFs. In the first round of Delphi, the panel of experts has suggested, two new CSFs-“competitive benchmarking (F19) and resident’s involvement (F28)”, which were added for assessment in the next round of Delphi. One of the CSFs-“fulltime six sigma personnel (F15)” has been omitted in proposed clusters of CSFs for non-formal organization, as it is practically impossible to deploy full time trained Six Sigma recruits.
Abstract: Cryptographic algorithms play a crucial role in the
information society by providing protection from unauthorized
access to sensitive data. It is clear that information technology will
become increasingly pervasive, Hence we can expect the emergence
of ubiquitous or pervasive computing, ambient intelligence. These
new environments and applications will present new security
challenges, and there is no doubt that cryptographic algorithms and
protocols will form a part of the solution. The efficiency of a public
key cryptosystem is mainly measured in computational overheads,
key size and bandwidth. In particular the RSA algorithm is used in
many applications for providing the security. Although the security
of RSA is beyond doubt, the evolution in computing power has
caused a growth in the necessary key length. The fact that most chips
on smart cards can-t process key extending 1024 bit shows that there
is need for alternative. NTRU is such an alternative and it is a
collection of mathematical algorithm based on manipulating lists of
very small integers and polynomials. This allows NTRU to high
speeds with the use of minimal computing power. NTRU (Nth degree
Truncated Polynomial Ring Unit) is the first secure public key
cryptosystem not based on factorization or discrete logarithm
problem. This means that given sufficient computational resources
and time, an adversary, should not be able to break the key. The
multi-party communication and requirement of optimal resource
utilization necessitated the need for the present day demand of
applications that need security enforcement technique .and can be
enhanced with high-end computing. This has promoted us to develop
high-performance NTRU schemes using approaches such as the use
of high-end computing hardware. Peer-to-peer (P2P) or enterprise
grids are proven as one of the approaches for developing high-end
computing systems. By utilizing them one can improve the
performance of NTRU through parallel execution. In this paper we
propose and develop an application for NTRU using enterprise grid
middleware called Alchemi. An analysis and comparison of its
performance for various text files is presented.
Abstract: In this research, we propose a weighted class based
queuing (WCBQ) mechanism to provide class differentiation and to
reduce the load for the IMS (IP Multimedia Subsystem) presence
server (PS). The tasks of admission controller for the PS are
demonstrated. Analysis and simulation models are developed to
quantify the performance of WCBQ scheme. An optimized dropping
time frame has been developed based on which some of the preexisting
messages are dropped from the PS-buffer. Cost functions are
developed and simulation comparison has been performed with FCFS
(First Come First Served) scheme. The results show that the PS
benefits significantly from the proposed queuing and dropping
algorithm (WCBQ) during heavy traffic.
Abstract: This work focuses on analysis of classical heat transfer equation regularized with Maxwell-Cattaneo transfer law. Computer simulations are performed in MATLAB environment. Numerical experiments are first developed on classical Fourier equation, then Maxwell-Cattaneo law is considered. Corresponding equation is regularized with a balancing diffusion term to stabilize discretizing scheme with adjusted time and space numerical steps. Several cases including a convective term in model equations are discussed, and results are given. It is shown that limiting conditions on regularizing parameters have to be satisfied in convective case for Maxwell-Cattaneo regularization to give physically acceptable solutions. In all valid cases, uniform convergence to solution of initial heat equation with Fourier law is observed, even in nonlinear case.
Abstract: This study analyzes on the Social Network Game
(SNG), ANIPANG, in order to discover its unique fun elements, so
that suggest new methodologies for development of SNGs. ANIPANG
is the most popular SNG in the South Korea on 2012. Recently, the
game industry is paying close attention to mobile-based SNGs due to
the rapid prevalence of smart-phones and social network services.
However, SNGs are not online games simply. Although the fun of
most online games is the victory through competition with other
players or the game system, the fun of SNG is the communication
through the collaboration with other players. Thus, features of users
and environments of game should be considered for the game industry
and for the fun of SNG to users.
Abstract: This paper evaluate the multilevel modulation for
different techniques such as amplitude shift keying (M-ASK), MASK,
differential phase shift keying (M-ASK-Bipolar), Quaternary
Amplitude Shift Keying (QASK) and Quaternary Polarization-ASK
(QPol-ASK) at a total bit rate of 107 Gbps. The aim is to find a costeffective
very high speed transport solution. Numerical investigation
was performed using Monte Carlo simulations. The obtained results
indicate that some modulation formats can be operated at 100Gbps
in optical communication systems with low implementation effort
and high spectral efficiency.
Abstract: Many accidents were happened because of fast driving, habitual working overtime or tired spirit. This paper presents a solution of remote warning for vehicles collision avoidance using vehicular communication. The development system integrates dedicated short range communication (DSRC) and global position system (GPS) with embedded system into a powerful remote warning system. To transmit the vehicular information and broadcast vehicle position; DSRC communication technology is adopt as the bridge. The proposed system is divided into two parts of the positioning andvehicular units in a vehicle. The positioning unit is used to provide the position and heading information from GPS module, and furthermore the vehicular unit is used to receive the break, throttle, and othersignals via controller area network (CAN) interface connected to each mechanism. The mobile hardware are built with an embedded system using X86 processor in Linux system. A vehicle is communicated with other vehicles via DSRC in non-addressed protocol with wireless access in vehicular environments (WAVE) short message protocol. From the position data and vehicular information, this paper provided a conflict detection algorithm to do time separation and remote warning with error bubble consideration. And the warning information is on-line displayed in the screen. This system is able to enhance driver assistance service and realize critical safety by using vehicular information from the neighbor vehicles.KeywordsDedicated short range communication, GPS, Control area network, Collision avoidance warning system.
Abstract: Employees commonly encounter unpredictable and
unavoidable work related stressors. Exposure to such stressors can
evoke negative appraisals and associated adverse mental, physical,
and behavioral responses. Because Acceptance and Commitment
Therapy (ACT) emphasizes acceptance of unavoidable stressors and
diffusion from negative appraisals, it may be particularly beneficial
for work stress. Forty-five workers were randomly assigned to an
ACT intervention for work stress (n = 21) or a waitlist control group
(n = 24). The intervention consisted of two 3-hour sessions spaced
one week apart. An examination of group process and outcomes was
conducted using the Revised Sessions Rating Scale. Results indicated
that the ACT participants reported that they perceived the
intervention to be supportive, task focused, and without adverse
therapist behaviors (e.g., feelings of being criticized or discounted).
Additionally, the second session (values clarification and
commitment to action) was perceived to be more supportive and task
focused than the first session (mindfulness, defusion). Process ratings
were correlated with outcomes. Results indicated that perceptions of
therapy supportiveness and task focus were associated with reduced
psychological distress and improved perceived physical health.
Abstract: The aim of present study was to assess the effect of
glucogenic (G) and lipogenic (L) diets on blood metabolites in
Baloochi lambs. Three rumen cannulated Baloochi sheep were used
as a 3×3 Latin square design with 3 periods (28 days). Experimental
diets were a glucogenic, a lipogenic and a mixture of G and L diets
(50:50). The animals were fed diets consisted of 50% chopped alfalfa
hay and 50% concentrate. Diets were fed once daily ad libitum.
Blood samples were taken from jugular vein before the feeding, 2, 4
and 6 hour post feeding at day 27. Results indicated that β-
hydroxybutyrate (BHBA), glucose, insulin and aspartate
aminotransferase (AST) were not affected by treatments (P > 0.05).
However, lipogenic diet increased significantly activity of Alanine
aminotransferase (ALT) and concentration of non-esterified fatty acid
(NEFA) in blood plasma (P < 0.05)
Abstract: The wireless adhoc network is comprised of wireless
node which can move freely and are connected among themselves
without central infrastructure. Due to the limited transmission range
of wireless interfaces, in most cases communication has to be relayed
over intermediate nodes. Thus, in such multihop network each node
(also called router) is independent, self-reliant and capable to route
the messages over the dynamic network topology. Various protocols
are reported in this field and it is very difficult to decide the best one.
A key issue in deciding which type of routing protocol is best for
adhoc networks is the communication overhead incurred by the
protocol. In this paper STAR a table driven and DSR on demand
protocols based on IEEE 802.11 are analyzed for their performance
on different performance measuring metrics versus varying traffic
CBR load using QualNet 5.0.2 network simulator.
Abstract: Hemodialysis patients might suffer from unhealthy
care behaviors or long-term dialysis treatments. Ultimately they need
to be hospitalized. If the hospitalization rate of a hemodialysis center
is high, its quality of service would be low. Therefore, how to decrease
hospitalization rate is a crucial problem for health care. In this study
we combined temporal abstraction with data mining techniques for
analyzing the dialysis patients' biochemical data to develop a decision
support system. The mined temporal patterns are helpful for clinicians
to predict hospitalization of hemodialysis patients and to suggest them
some treatments immediately to avoid hospitalization.
Abstract: The case study deals with the semi-quantitative risk
assessment of water resource earmarked for the emergency supply
of population with drinking water. The risk analysis has been based
on previously identified hazards/sensitivities of the elements
of hydrogeological structure and technological equipment of ground
water resource as well as on the assessment of the levels of hazard,
sensitivity and criticality of individual resource elements in the form
of point indexes. The following potential sources of hazard have
been considered: natural disasters caused by atmospheric and
geological changes, technological hazards, and environmental
burdens. The risk analysis has proved that the assessed risks are
acceptable and the water resource may be integrated into a crisis plan
of a given region.
Abstract: This paper presents design features of a rescue robot, named CEO Mission II. Its body is designed to be the track wheel type with double front flippers for climbing over the collapse and the rough terrain. With 125 cm. long, 5-joint mechanical arm installed on the robot body, it is deployed not only for surveillance from the top view but also easier and faster access to the victims to get their vital signs. Two cameras and sensors for searching vital signs are set up at the tip of the multi-joint mechanical arm. The third camera is at the back of the robot for driving control. Hardware and software of the system, which controls and monitors the rescue robot, are explained. The control system is used for controlling the robot locomotion, the 5-joint mechanical arm, and for turning on/off devices. The monitoring system gathers all information from 7 distance sensors, IR temperature sensors, 3 CCD cameras, voice sensor, robot wheels encoders, yawn/pitch/roll angle sensors, laser range finder and 8 spare A/D inputs. All sensors and controlling data are communicated with a remote control station via IEEE 802.11b Wi-Fi. The audio and video data are compressed and sent via another IEEE 802.11g Wi-Fi transmitter for getting real-time response. At remote control station site, the robot locomotion and the mechanical arm are controlled by joystick. Moreover, the user-friendly GUI control program is developed based on the clicking and dragging method to easily control the movement of the arm. Robot traveling map is plotted from computing the information of wheel encoders and the yawn/pitch data. 2D Obstacle map is plotted from data of the laser range finder. The concept and design of this robot can be adapted to suit many other applications. As the Best Technique awardee from Thailand Rescue Robot Championship 2006, all testing results are satisfied.
Abstract: The fortified of soft wheat flour with cowpea flour in
bread making was investigated. The Soft wheat flour (SWF) was
substituted by cowpea flour at levels of 5, 15 and 20%. The protein content of composite breads ranged from 6.1 – 9.9%. Significant
difference was observed in moisture, protein and crude fibre contents of control (wheat bread) and composite bread at 5% addition of
cowpea. Water absorption capacities of composite flours increased with increasing levels of cowpea flour in the blend. The specific loaf
volume decreased significantly with increased cowpea content of
blends. The overall acceptability of the 5% cowpea flour content of
composite bread was not significantly different from the control (Soft Wheat-bread) but there is significantly different with increasing the
levels of cowpea flour in the blend more than 5%.
Abstract: Worldwide many electrical equipment insulation
failures have been reported caused by switching operations, while
those equipments had previously passed all the standard tests and
complied with all quality requirements. The problem is mostly
associated with high-frequency overvoltages generated during
opening or closing of a switching device. The transients generated
during switching operations in a Gas Insulated Substation (GIS) are
associated with high frequency components in the order of few tens
of MHz.
The frequency spectrum of the VFTO generated in the 220/66 kV
Wadi-Hoff GIS is analyzed using Fast Fourier Transform technique.
The main frequency with high voltage amplitude due to the operation
of disconnector (DS5) is 5 to 10 MHz, with the highest amplitude at 9
MHz. The main frequency with high voltage amplitude due to the
operation of circuit breaker (CB5) is 1 to 25 MHz, with the highest
amplitude at 2 MHz.
Mitigating techniques damped the oscillating frequencies
effectively. The using of cable terminal reduced the frequency
oscillation effectively than that of OHTL terminal. The using of a
shunt capacitance results in vanishing the high frequency
components. Ferrite rings reduces the high frequency components
effectively especially in the range 2 to 7 MHz. The using of RC and
RL filters results in vanishing the high frequency components.
Abstract: In spite of all advancement in software testing,
debugging remains a labor-intensive, manual, time consuming, and
error prone process. A candidate solution to enhance debugging
process is to fuse it with testing process. To achieve this integration,
a possible solution may be categorizing common software tests and
errors followed by the effort on fixing the errors through general
solutions for each test/error pair. Our approach to address this issue is
based on Christopher Alexander-s pattern and pattern language
concepts. The patterns in this language are grouped into three major
sections and connect the three concepts of test, error, and debug.
These patterns and their hierarchical relationship shape a pattern
language that introduces a solution to solve software errors in a
known testing context.
Finally, we will introduce our developed framework ADE as a
sample implementation to support a pattern of proposed language,
which aims to automate the whole process of evolving software
design via evolutionary methods.
Abstract: With the proliferation of World Wide Web,
development of web-based technologies and the growth in web
content, the structure of a website becomes more complex and web
navigation becomes a critical issue to both web designers and users.
In this paper we define the content and web pages as two important
and influential factors in website navigation and paraphrase the
enhancement in the website navigation as making some useful
changes in the link structure of the website based on the
aforementioned factors. Then we suggest a new method for
proposing the changes using fuzzy approach to optimize the website
architecture. Applying the proposed method to a real case of Iranian
Civil Aviation Organization (CAO) website, we discuss the results of
the novel approach at the final section.
Abstract: Proxy signature helps the proxy signer to sign
messages on behalf of the original signer. It is very useful when
the original signer (e.g. the president of a company) is not
available to sign a specific document. If the original signer can
not forge valid proxy signatures through impersonating the proxy
signer, it will be robust in a virtual environment; thus the original
signer can not shift any illegal action initiated by herself to the
proxy signer. In this paper, we propose a new proxy signature
scheme. The new scheme can prevent the original signer from
impersonating the proxy signer to sign messages. The proposed
scheme is based on the regular ElGamal signature. In addition,
the fair privacy of the proxy signer is maintained. That means,
the privacy of the proxy signer is preserved; and the privacy can
be revealed when it is necessary.