Abstract: One of prevailing modes of finance in emerging
Islamic banking system is Murabah’a. It means a financial dealing or
transaction in which seller tells cost of the goods to be sold to buyer.
Otherwise, the transaction would become invalid. In this mainstream,
import Murabah’a transaction is divergent in such a way that the cost
is not recognized and identified due to execution of import
transaction in foreign currency i.e. US Dollar and the next transaction
of Murabaha’a with the client is executed in local currency. Since this
transaction is executed in dual currency i.e. bank pays supplier in
foreign currency and executes Murabah’a with its client in local
currency and it is not allowed in according to Islamic Injunctions as
mentioned in hadith narrated by Hazrat Ibn-e-Umar (May Allah be
pleased with them) used to sell his camels with Dirhams and take
dinars instead and vice versa. Upon revealing before the Prophet
(Peace be upon him), he was advised that it must not be contingent in
the agreement and the ready rate would be applied and possession of
one of the consideration is compulsory. The solution in this regard is
that the import Murabah’a transaction should be in single currency
However, other currency can be paid in payment at the time of
payment in a very indispensable situation provided that ready rate
would be applied. Moreover, some of other solutions have also been
given in this regard.
Abstract: Test automation allows performing difficult and time
consuming manual software testing tasks efficiently, quickly and
repeatedly. However, development and maintenance of automated
tests is expensive, so it needs a proper prioritization what to automate
first. This paper describes a simple yet efficient approach for such
prioritization of test cases based on the effort needed for both manual
execution and software test automation. The suggested approach is
very flexible because it allows working with a variety of assessment
methods, and adding or removing new candidates at any time. The
theoretical ideas presented in this article have been successfully
applied in real world situations in several software companies by the
authors and their colleagues including testing of real estate websites,
cryptographic and authentication solutions, OSGi-based middleware
framework that has been applied in various systems for smart homes,
connected cars, production plants, sensors, home appliances, car head
units and engine control units (ECU), vending machines, medical
devices, industry equipment and other devices that either contain or
are connected to an embedded service gateway.
Abstract: Companies face increasing challenges in research due
to higher costs and risks. The intensifying technology complexity and
interdisciplinarity require unique know-how. Therefore, companies
need to decide whether research shall be conducted internally or
externally with partners. On the other hand, research institutes meet
increasing efforts to achieve good financing and to maintain high
research reputation. Therefore, relevant research topics need to be
identified and specialization of competency is necessary. However,
additional competences for solving interdisciplinary research projects
are also often required. Secured financing can be achieved by
bonding industry partners as well as public fundings. The realization
of faster and better research drives companies and research institutes
to cooperate in organized research networks, which are managed by
an administrative organization. For an effective and efficient
cooperation, necessary processes, roles, tools and a set of rules need
to be determined. Goal of this paper is to show the state-of-art
research and to propose a governance framework for organized
research networks.
Abstract: Context-aware technologies provide system
applications with the awareness of environmental conditions,
customer behaviours, object movements, etc. Further, with such
capability system applications can be smart to intelligently adapt their
responses to the changing conditions. In regard to business
operations, this promises businesses that their business processes can
run more intelligently, adaptively and flexibly, and thereby either
improve customer experience, enhance reliability of service delivery,
or lower operational cost, to make the business more competitive and
sustainable. Aiming at realising such context-aware business process
management, this paper firstly explores its potential benefit, and then
identifies some gaps between the current business process
management support and the expected. In addition, some preliminary
solutions are also discussed in regard to context definition, rule-based
process execution, run-time process evolution, etc. A framework is
also presented to give a conceptual architecture of context-aware
business process management system to guide system
implementation.
Abstract: Fluctuations of Schottky diode parameters in a
structure of the mixer are investigated. These fluctuations are
manifested in two ways. At the first, they lead to fluctuations in the
transfer factor that is lead to the amplitude fluctuations in the signal
of intermediate frequency. On the basis of the measurement data of
1/f noise of the diode at forward current, the estimation of a spectrum
of relative fluctuations in transfer factor of the mixer is executed.
Current dependence of the spectrum of relative fluctuations in
transfer factor of the mixer and dependence of the spectrum of
relative fluctuations in transfer factor of the mixer on the amplitude
of the heterodyne signal are investigated. At the second, fluctuations
in parameters of the diode lead to occurrence of 1/f noise in the
output signal of the mixer. This noise limits the sensitivity of the
mixer to the value of received signal.
Abstract: Value addition to agricultural produce is of possible
potential in reducing poverty, improving food security and
malnutrition, therefore the need to develop small and microenterprises
of sweet potato production. A study was carried out in Nigeria to determine the acceptability
of blends sweet potato (Ipomea batatas) and commodities yellow
maize (Zea mays), millet (Pennisetum glaucum), soybean (Glycine
max), bambara groundnut (Vigna subterranean), guinea corn
(Sorghum vulgare), wheat (Triticum aestivum), and roselle (Hibiscus
sabdariffa) through sensory evaluation. Sweet potato (Ipomea batatas) roots were processed using two
methods: oven and sun drying. The blends were also assessed in
terms of functional, chemical and color properties. Most acceptable blends include BAW (80:20 of sweet
potato/wheat), BBC (80:20 of sweet potato/guinea corn), AAB (60:40
of sweet potato/guinea corn), YTE (100% soybean), TYG (100%
sweet potato), KTN (100% wheat flour), XGP (80:20 of sweet
potato/soybean), XAX (60:40 of sweet potato/wheat), LSS (100%
Roselle), CHK (100% Guinea corn), and ABC (60:40% of sweet
potato/ yellow maize). In addition, carried out chemical analysis
revealed that sweet potato has high percentage of vitamins A and C,
potassium (K), manganese (Mn), calcium (Ca), magnesium (Mg) and
iron (Fe) and fibre content. There is also an increase of vitamin A and
Iron in the blended products.
Abstract: Hydrogen produced by means of polymer electrolyte
membrane electrolyzer (PEME) is one of the most promising
methods due to clean and renewable energy source. In the process,
some energy loss due to mass transfer through a PEM is caused by
diffusion, electro-osmotic drag, and the pressure difference between
the cathode channel and anode channel. In PEME, water molecules
and ionic particles transferred between the electrodes from anode to
cathode, Extensive mixing of the hydrogen and oxygen at anode
channel due to gases cross-over must be avoided. In recent times the
consciousness of safety issue in high pressure PEME where the
oxygen mix with hydrogen at anode channel could create, explosive
conditions have generated a lot of concern. In this paper, the steady
state and simulation analysis of gases crossover in PEME on the
temperature and pressure effect are presented. The simulations have
been analysis in MATLAB based on the well-known Fick’s Law of
molecular diffusion. The simulation results indicated that as
temperature increases, there is a significant decrease in operating
voltage.
Abstract: The change of conditions for production companies in
high-wage countries is characterized by the globalization of
competition and the transition of a supplier´s to a buyer´s market. The
companies need to face the challenges of reacting flexibly to these
changes. Due to the significant and increasing degree of automation,
assembly has become the most expensive production process.
Regarding the reduction of production cost, assembly consequently
offers a considerable rationalizing potential. Therefore, an
aerodynamic feeding system has been developed at the Institute of
Production Systems and Logistics (IFA), Leibniz Universitaet
Hannover. This system has been enabled to adjust itself by using a
genetic algorithm. The longer this genetic algorithm is executed the
better is the feeding quality. In this paper, the relation between the
system´s setting time and the feeding quality is observed and a
function which enables the user to achieve the minimum of the total
feeding time is presented.
Abstract: Prosecution of sexual violence in international
criminal law requires not only an understanding of the mechanisms
employed to prosecute sexual violence but also a critical analysis of
the factors facilitating perpetuation of such crimes in armed conflicts.
The extrapolations laid out in this essay delve into the jurisprudence
of international criminal law pertaining to sexual and gender based
violence followed by the core question of this essay – has the
entrenchment of sexual violence as international crimes in the Rome
Statute been successful to address such violence in armed conflicts?
Abstract: Ensuring of continuity of business is basic strategy of
every company. Continuity of organization activities includes
comprehensive procedures that help in solving unexpected situations
of natural and anthropogenic character (for example flood, blaze,
economic situations). Planning of continuity operations is a process
that helps identify critical processes and implement plans for the
security and recovery of key processes. The aim of this article is to
demonstrate application of system approach to managing business
continuity called business continuity management systems in military
issues. This article describes the life cycle of business continuity
management which is based on the established cycle PDCA (Plan-
Do-Check-Act). After this is carried out by activities which are
making by University of Defence during activation of forces and
means of the integrated rescue system in case of emergencies -
accidents at a nuclear power plant in Czech Republic. Activities of
various stages of deployment earmarked forces and resources are
managed and evaluated by using MCMS application (Military
Continuity Management System).
Abstract: Privacy is sacred and would normally be expected and preserved by an individual. Online privacy is no longer about the right to be left alone, but also includes the right not to be monitored. However, with the revelations made by United States National Security Agency former employee Edward Snowden that the government is spying on internet communications, individuals’ privacy can no longer be expected. Therefore, this paper is intended to evaluate law related to privacy protection in the digital domain, who should govern it and whether invasion to a person’s privacy is a necessary justification to preserve national security.
Abstract: This paper introduces a signal monitoring program
developed with a view to helping electrical engineering students get
familiar with sensors with digital output. Because the output of digital
sensors cannot be simply monitored by a measuring instrument such as
an oscilloscope, students tend to have a hard time dealing with digital
sensors. The monitoring program runs on a PC and communicates with
an MCU that reads the output of digital sensors via an asynchronous
communication interface. Receiving the sensor data from the MCU,
the monitoring program shows time and/or frequency domain plots of
the data in real time. In addition, the monitoring program provides a
serial terminal that enables the user to exchange text information with
the MCU while the received data is plotted. The user can easily
observe the output of digital sensors and configure the digital sensors
in real time, which helps students who do not have enough experiences
with digital sensors. Though the monitoring program was programmed
in the Matlab programming language, it runs without the Matlab since
it was compiled as a standalone executable.
Abstract: Password authentication is one of the widely used
methods to achieve authentication for legal users of computers and
defense against attackers. There are many different ways to
authenticate users of a system and there are many password cracking
methods also developed. This paper proposes how best password
cracking can be performed on a CPU-GPGPU based system. The
main objective of this work is to project how quickly a password can
be cracked with some knowledge about the computer security and
password cracking if sufficient security is not incorporated to the
system.
Abstract: In this paper, a robust fault detection and isolation
(FDI) scheme is developed to monitor a multivariable nonlinear
chemical process called the Chylla-Haase polymerization reactor,
when it is under the cascade PI control. The scheme employs a radial
basis function neural network (RBFNN) in an independent mode to
model the process dynamics, and using the weighted sum-squared
prediction error as the residual. The Recursive Orthogonal Least
Squares algorithm (ROLS) is employed to train the model to
overcome the training difficulty of the independent mode of the
network. Then, another RBFNN is used as a fault classifier to isolate
faults from different features involved in the residual vector. Several
actuator and sensor faults are simulated in a nonlinear simulation of
the reactor in Simulink. The scheme is used to detect and isolate the
faults on-line. The simulation results show the effectiveness of the
scheme even the process is subjected to disturbances and
uncertainties including significant changes in the monomer feed rate,
fouling factor, impurity factor, ambient temperature, and
measurement noise. The simulation results are presented to illustrate
the effectiveness and robustness of the proposed method.
Abstract: Concurrent planning of project scheduling and
material ordering has been increasingly addressed within last decades
as an approach to improve the project execution costs. Therefore, we
have taken the problem into consideration in this paper, aiming to
maximize schedules quality robustness, in addition to minimize the
relevant costs. In this regard, a bi-objective mathematical model is
developed to formulate the problem. Moreover, it is possible to
utilize the all-unit discount for materials purchasing. The problem is
then solved by the E-constraint method, and the Pareto front is
obtained for a variety of robustness values. The applicability and
efficiency of the proposed model is tested by different numerical
instances, finally.
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.
Abstract: With the increasing dependence of countries on the
critical infrastructure, it increases their vulnerability. Big threat is
primarily in the human factor (personnel of the critical infrastructure)
and in terrorist attacks. It emphasizes the development of
methodology for searching of weak points and their subsequent
elimination. This article discusses methods for the analysis of safety
in the objects of critical infrastructure. It also contains proposal for
methodology for training employees of security services in the
objects of the critical infrastructure and developing scenarios of
attacks on selected objects of the critical infrastructure.
Abstract: This paper describes the design and implementation of
a hardware setup for online monitoring of 24 refrigerators inside
blood bank center using the microcontroller and CAN bus for
communications between each node. Due to the security of locations
in the blood bank hall and difficulty of monitoring of each
refrigerator separately, this work proposes a solution to monitor all
the blood bank refrigerators in one location. CAN-bus system is used
because it has many applications and advantages, especially for this
system due to easy in use, low cost, providing a reduction in wiring,
fast to repair and easily expanding the project without a problem.
Abstract: The 1:1 cocrystal of 2-amino-4-chloro-6-
methylpyrimidine (2A4C6MP) with 4-methylbenzoic acid (4MBA)
(I) has been prepared by slow evaporation method in methanol,
which was crystallized in monoclinic C2/c space group, Z = 8, and a
= 28.431 (2) Å, b = 7.3098 (5) Å, c = 14.2622 (10) Å and β =
109.618 (3)°. The presence of unionized –COOH functional group in
cocrystal I was identified both by spectral methods (1H and 13C
NMR, FTIR) and X-ray diffraction structural analysis. The
2A4C6MP molecule interact with the carboxylic group of the
respective 4MBA molecule through N—H⋯O and O—H⋯N
hydrogen bonds, forming a cyclic hydrogen–bonded motif R2
2(8).
The crystal structure was stabilized by Npyrimidine—H⋯O=C and
C=O—H⋯Npyrimidine types hydrogen bonding interactions.
Theoretical investigations have been computed by HF and density
function (B3LYP) method with 6–311+G (d,p)basis set. The
vibrational frequencies together with 1H and 13C NMR chemical
shifts have been calculated on the fully optimized geometry of
cocrystal I. Theoretical calculations are in good agreement with the
experimental results. Solvent–free formation of this cocrystal I is
confirmed by powder X-ray diffraction analysis.
Abstract: In this paper, we calculate the two-photon ionization
(TPI) cross-section for pump-probe scheme in Ag neutral cluster. The
pump photon energy is assumed to be close to the surface plasmon
(SP) energy of cluster in dielectric media. Due to this choice, the
pump wave excites collective oscillations of electrons-SP and the
probe wave causes ionization of the cluster. Since the interband
transition energy in Ag exceeds the SP resonance energy, the main
contribution into the TPI comes from the latter. The advantage of Ag
clusters as compared to the other noble metals is that the SP
resonance in silver cluster is much sharper because of peculiarities of
its dielectric function. The calculations are performed by separating
the coordinates of electrons corresponding to the collective
oscillations and the individual motion that allows taking into account
the resonance contribution of excited SP oscillations. It is shown that
the ionization cross section increases by two orders of magnitude if
the energy of the pump photon matches the surface plasmon energy
in the cluster.