Abstract: Fibre cement plates, often used in construction,
generally are made using quartz as an inert material, cement as a
binder and cellulose as a fibre. This paper, first of all, investigates the
mechanical properties and durability of fibre cement plates when
quartz is both partly and fully replaced with diatomite. Diatomite
does not only have lower density compared to quartz but also has
high pozzolanic activity. The main objective of this paper is the
investigation of the effects of supplementary cementing materials
(SCMs) on the short and long term mechanical properties and
durability characteristics of fibre cement plates prepared using
diatomite. Supplementary cementing materials such as ground
granulated blast furnace slug (GGBS) and fly ash (FA) are used in
this study. Volume proportions of 10, 20, 30 and 40% of GGBS and
FA are used as partial replacement materials to cement. Short and
long term mechanical properties such as compressive and flexural
strengths as well as sorptivity characteristics and mass were
investigated. Consistency and setting time at each replacement levels
of SCMs were also recorded. The effects of using supplementary
cementing materials on the carbonation and sulphate resistance of
fibre cement plates were then experimented. The results, first of all,
show that the use of diatomite as a full or partial replacement to
quartz resulted in a systematic decrease in total mass of the fibre
cement plates. The reduction of mass was largely due to the lower
density and finer particle size of diatomite compared to quartz. The
use of diatomite did not only reduce the mass of these plates but also
increased the compressive strength significantly as a result of its high
pozzolanic activity. The replacement levels of both GGBS and FA
resulted in a systematic decrease in short term compressive strength
with increasing replacement levels. This was essentially expected as
the total rate of hydration is much lower in GGBS and FA than that
of cement. Long term results however, indicated that the compressive
strength of fibre cement plates prepared using both GGBS and FA
increases with time and hence the compressive strength of plates
prepared using SCMs is either equivalent or more than the
compressive strength of plates prepared using cement alone.
Durability characteristics of fibre cement plates prepared using SCMs
were enhanced significantly. Measurements of sopritivty
characteristics were also indicated that the plates prepared using
SCMs has much lower water absorption capacities compared to
plates prepared cement alone. Much higher resistance to carbonation
and sulphate attach were observed with plates prepared using SCMs.
The results presented in this paper show that the use of SCMs does
not only support the production of more sustainable construction
materials but also enhances the mechanical properties and durability
characteristics of fibre cement plates.
Abstract: Model predictive control is a kind of optimal feedback
control in which control performance over a finite future is optimized
with a performance index that has a moving initial time and a moving
terminal time. This paper examines the stability of model predictive
control for linear discrete-time systems with additive stochastic
disturbances. A sufficient condition for the stability of the closed-loop
system with model predictive control is derived by means of a linear
matrix inequality. The objective of this paper is to show the results
of computational simulations in order to verify the effectiveness of
the obtained stability condition.
Abstract: In the field of fashion design, 3D Mannequin is a kind
of assisting tool which could rapidly realize the design concepts.
While the concept of 3D Mannequin is applied to the computer added
fashion design, it will connect with the development and the
application of design platform and system. Thus, the situation
mentioned above revealed a truth that it is very critical to develop a
module of 3D Mannequin which would correspond with the necessity
of fashion design. This research proposes a concrete plan that
developing and constructing a system of 3D Mannequin with Kinect.
In the content, ergonomic measurements of objective human features
could be attained real-time through the implement with depth camera
of Kinect, and then the mesh morphing can be implemented through
transformed the locations of the control-points on the model by
inputting those ergonomic data to get an exclusive 3D mannequin
model. In the proposed methodology, after the scanned points from the
Kinect are revised for accuracy and smoothening, a complete human
feature would be reconstructed by the ICP algorithm with the method
of image processing. Also, the objective human feature could be
recognized to analyze and get real measurements. Furthermore, the
data of ergonomic measurements could be applied to shape morphing
for the division of 3D Mannequin reconstructed by feature curves. Due
to a standardized and customer-oriented 3D Mannequin would be
generated by the implement of subdivision, the research could be
applied to the fashion design or the presentation and display of 3D
virtual clothes. In order to examine the practicality of research
structure, a system of 3D Mannequin would be constructed with JAVA
program in this study. Through the revision of experiments the
practicability-contained research result would come out.
Abstract: UAV’s are small remote operated or automated aerial
surveillance systems without a human pilot aboard. UAV’s generally
finds its use in military and special operation application, a recent
growing trend in UAV’s finds its application in several civil and nonmilitary
works such as inspection of power or pipelines. The
objective of this paper is the augmentation of a UAV in order to
replace the existing expensive sonar (Sound Navigation And
Ranging) based equipment amongst small scale fisherman, for whom
access to sonar equipment are restricted due to limited economic
resources. The surveillance equipment’s present in the UAV will
relay data and GPS (Global Positioning System) location onto a
receiver on the fishing boat using RF signals, using which the
location of the schools of fishes can be found. In addition to this, an
emergency beacon system is present for rescue operations and drone
recovery.
Abstract: In this paper a new methodology for vendor selection
and supply quotas determination (VSSQD) is proposed. The problem
of VSSQD is solved by the model that combines revised weighting
method for determining the objective function coefficients, and a
multiple objective linear programming (MOLP) method based on the
cooperative game theory for VSSQD. The criteria used for VSSQD
are: (1) purchase costs and (2) product quality supplied by individual
vendors. The proposed methodology has been tested on the example
of flour purchase for a bakery with two decision makers.
Abstract: When printing a plate (or dish) by an FDM 3D printer,
the process normally requires support material, which causes several
problems. This paper proposes a method for forming thin plates
without using wasteful support material. This method requires several
extraordinary parameter values when slicing plates. The experiments
show that the plates can, for the most part, be successfully formed
using a conventional slicer and a 3D printer; however, seams between
layers spoil them and the quality of printed objects strongly depends
on the slicer.
Abstract: This paper presents an application of a “Systematic
Soft Domain Driven Design Framework” as a soft systems approach
to domain-driven design of information systems development. The
framework use SSM as a guiding methodology within which we have
embedded a sequence of design tasks based on the UML leading to
the implementation of a software system using the Naked Objects
framework. This framework have been used in action research
projects that have involved the investigation and modelling of
business processes using object-oriented domain models and the
implementation of software systems based on those domain models.
Within this framework, Soft Systems Methodology (SSM) is used as
a guiding methodology to explore the problem situation and to
develop the domain model using UML for the given business
domain. The framework is proposed and evaluated in our previous
works, and a real case study “Information Retrieval System for
academic research” is used, in this paper, to show further practice and
evaluation of the framework in different business domain. We argue
that there are advantages from combining and using techniques from
different methodologies in this way for business domain modelling.
The framework is overviewed and justified as multimethodology
using Mingers multimethodology ideas.
Abstract: Tuberculosis (TB) remains a leading cause of
infectious mortality. It is primarily transmitted by the respiratory
route, individuals with active disease may infect others through
airborne particles which releases when they cough, talk, or sing and
subsequently inhale by others. In order to study the effect of the
Bacilli Calmette-Guerin (BCG) vaccine after vaccination of TB
patient, a Vaccinated Susceptible Infected and Recovered (VSIR)
mathematical model is being developed to achieve the desired
objectives. The mathematical model, so developed, shall be used to
quantify the effect of BCG Vaccine to protect the immigrant young
adult person. Moreover, equations are to be established for the
disease endemic and free equilibrium states and subsequently utilized
in disease stability analysis. The stability analysis will give a
complete picture of disease annihilation from the total population if
the total removal rate from the infectious group should be greater
than total number of dormant infections produced throughout
infectious period.
Abstract: In this paper, we propose a new method for threedimensional
object indexing based on D.A.M.C-S.H.C descriptor
(Direct and Analytical Method for Calculating the Spherical
Harmonics Coefficients). For this end, we propose a direct
calculation of the coefficients of spherical harmonics with perfect
precision. The aims of the method are to minimize, the processing
time on the 3D objects database and the searching time of similar
objects to a request object.
Firstly we start by defining the new descriptor using a new
division of 3-D object in a sphere. Then we define a new distance
which will be tested and prove his efficiency in the search for similar
objects in the database in which we have objects with very various
and important size.
Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.
Abstract: Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers.
Abstract: This paper reviews the model-based qualitative and
quantitative Operations Management research in the context of
Construction Supply Chain Management (CSCM). Construction
industry has been traditionally blamed for low productivity, cost and
time overruns, waste, high fragmentation and adversarial
relationships. The construction industry has been slower than other
industries to employ the Supply Chain Management (SCM) concept
and develop models that support the decision-making and planning.
However the last decade there is a distinct shift from a project-based
to a supply-based approach of construction management. CSCM
comes up as a new promising management tool of construction
operations and improves the performance of construction projects in
terms of cost, time and quality. Modeling the Construction Supply
Chain (CSC) offers the means to reap the benefits of SCM, make
informed decisions and gain competitive advantage. Different
modeling approaches and methodologies have been applied in the
multi-disciplinary and heterogeneous research field of CSCM. The
literature review reveals that a considerable percentage of the CSC
modeling research accommodates conceptual or process models
which present general management frameworks and do not relate to
acknowledged soft Operations Research methods. We particularly
focus on the model-based quantitative research and categorize the
CSCM models depending on their scope, objectives, modeling
approach, solution methods and software used. Although over the last
few years there has been clearly an increase of research papers on
quantitative CSC models, we identify that the relevant literature is
very fragmented with limited applications of simulation,
mathematical programming and simulation-based optimization. Most
applications are project-specific or study only parts of the supply
system. Thus, some complex interdependencies within construction
are neglected and the implementation of the integrated supply chain
management is hindered. We conclude this paper by giving future
research directions and emphasizing the need to develop optimization
models for integrated CSCM. We stress that CSC modeling needs a
multi-dimensional, system-wide and long-term perspective. Finally,
prior applications of SCM to other industries have to be taken into
account in order to model CSCs, but not without translating the
generic concepts to the context of construction industry.
Abstract: The main objective of this study was to assess the
annual concentration and seasonal variation of benzo(a)pyrene (BaP)
associated with PM10 in an urban site of Győr and in a rural site of
Sarród in the sampling period of 2008–2012. A total of 280 PM10
aerosol samples were collected in each sampling site and analyzed for
BaP by gas chromatography method. The BaP concentrations ranged
from undetected to 8 ng/m3 with the mean value of 1.01 ng/m3 in the
sampling site of Győr, and from undetected to 4.07 ng/m3 with the
mean value of 0.52 ng/m3 in the sampling site of Sarród, respectively.
Relatively higher concentrations of BaP were detected in samples
collected in both sampling sites in the heating seasons compared with
non-heating periods. The annual mean BaP concentrations were
comparable with the published data of different other Hungarian
sites.
Abstract: The main objective of this article is to examine the
impact of interest rates on investments in Poland in the context of
financial crisis. The paper also investigates the dependence of bank
loans to enterprises on interbank market rates. The article studies the
impact of interbank market rate on the level of investments in Poland.
Besides, this article focuses on the research of the correlation
between the level of corporate loans and the amount of investments
in Poland in order to determine the indirect impact of central bank
interest rates through the transmission mechanism of monetary policy
on the real economy. To achieve the objective we have used
econometric and statistical research methods like: econometric model
and Pearson correlation coefficient.
This analysis suggests that the central bank reference rate
inversely proportionally affects the level of investments in Poland
and this dependence is moderate. This is also important issue because
it is related to preparing of Poland to accession to euro area. The
research is important from both theoretical and empirical points of
view. The formulated conclusions and recommendations determine
the practical significance of the paper which may be used in the
decision making process of monetary and economic authorities of the
country.
Abstract: A pilot field study was conducted at the Jagjeetpur
Municipal Sewage treatment plant situated in the Haridwar town in
Uttarakhand state, India. The objectives of the present study were to
study the effect of treated wastewater on the production of various
paddy varieties (Sharbati, PR-114, PB-1, Menaka, PB1121 and PB
1509) and the emission of GHG gases (CO2, CH4 and N2O) as
compared to the same varieties grown in the control plots irrigated
with fresh water. Of late, the concept of water footprint assessment
has emerged, which explains enumeration of various types of water
footprints of an agricultural entity from its production to processing
stages. Paddy, the most water demanding staple crop of Uttarakhand
state, displayed a high green water footprint value of 2474.12 m3/
Ton. Most of the wastewater irrigated varieties displayed up to 6%
increase in production, except Menaka and PB-1121, which showed a
reduction in production (6% and 3% respectively), due to pest and
insect infestation. The treated wastewater was observed to be rich in
Nitrogen (55.94 mg/ml Nitrate), Phosphorus (54.24 mg/ml) and
Potassium (9.78 mg/ml), thus rejuvenating the soil quality and not
requiring any external nutritional supplements. A Percentage increase
of GHG gases of irrigation with treated municipal wastewater as
compared to control plots was observed as 0.4% - 8.6% (CH4), 1.1%
- 9.2% (CO2), and 0.07% - 5.8% (N2O). The variety, Sharbati,
displayed maximum production (5.5 ton/ha) and emerged as the most
resistant variety against pests and insects. The emission values of
CH4, CO2 and N2O were 729.31 mg/m2/d, 322.10 mg/m2/d and
400.21 mg/m2/d in water stagnant condition.
This study highlighted a successful possibility of reuse of
wastewater for non-potable purposes offering the potential for
exploiting this resource that can replace or reduce the existing use of
fresh water sources in agriculture sector.
Abstract: In this paper, the goal programming methodology for
solving multiple objective problem of the technological variants and
production plan optimization has been applied. The optimization
criteria are determined and the multiple objective linear programming
model for solving a problem of the technological variants and
production plan optimization is formed and solved. Then the obtained
results are analysed. The obtained results point out to the possibility
of efficient application of the goal programming methodology in
solving the problem of the technological variants and production plan
optimization. The paper points out on the advantages of the
application of the goal programming methodology compare to the
Surrogat Worth Trade-off method in solving this problem.
Abstract: The main function of Medium Access Control (MAC) is to share the channel efficiently between all nodes. In the real-time scenario, there will be certain amount of wastage in bandwidth due to back-off periods. More bandwidth will be wasted in idle state if the back-off period is very high and collision may occur if the back-off period is small. So, an optimization is needed for this problem. The main objective of the work is to reduce delay due to back-off period thereby reducing collision and increasing throughput. Here a method, called the virtual back-off algorithm (VBA) is used to optimize the back-off period and thereby it increases throughput and reduces collisions. The main idea is to optimize the number of transmission for every node. A counter is introduced at each node to implement this idea. Here counter value represents the sequence number. VBA is classified into two types VBA with counter sharing (VBA-CS) and VBA with no counter sharing (VBA-NCS). These two classifications of VBA are compared for various parameters. Simulation is done in NS-2 environment. The results obtained are found to be promising.
Abstract: Advance in techniques of image and video processing has enabled the development of intelligent video surveillance systems. This study was aimed to automatically detect moving human objects and to analyze events of dual human interaction in a surveillance scene. Our system was developed in four major steps: image preprocessing, human object detection, human object tracking, and motion trajectory analysis. The adaptive background subtraction and image processing techniques were used to detect and track moving human objects. To solve the occlusion problem during the interaction, the Kalman filter was used to retain a complete trajectory for each human object. Finally, the motion trajectory analysis was developed to distinguish between the interaction and non-interaction events based on derivatives of trajectories related to the speed of the moving objects. Using a database of 60 video sequences, our system could achieve the classification accuracy of 80% in interaction events and 95% in non-interaction events, respectively. In summary, we have explored the idea to investigate a system for the automatic classification of events for interaction and non-interaction events using surveillance cameras. Ultimately, this system could be incorporated in an intelligent surveillance system for the detection and/or classification of abnormal or criminal events (e.g., theft, snatch, fighting, etc.).
Abstract: To explore how the brain may recognise objects in its
general,accurate and energy-efficient manner, this paper proposes the
use of a neuromorphic hardware system formed from a Dynamic
Video Sensor (DVS) silicon retina in concert with the SpiNNaker
real-time Spiking Neural Network (SNN) simulator. As a first step
in the exploration on this platform a recognition system for dynamic
hand postures is developed, enabling the study of the methods used
in the visual pathways of the brain. Inspired by the behaviours of
the primary visual cortex, Convolutional Neural Networks (CNNs)
are modelled using both linear perceptrons and spiking Leaky
Integrate-and-Fire (LIF) neurons.
In this study’s largest configuration using these approaches, a
network of 74,210 neurons and 15,216,512 synapses is created and
operated in real-time using 290 SpiNNaker processor cores in parallel
and with 93.0% accuracy. A smaller network using only 1/10th of the
resources is also created, again operating in real-time, and it is able
to recognise the postures with an accuracy of around 86.4% - only
6.6% lower than the much larger system. The recognition rate of the
smaller network developed on this neuromorphic system is sufficient
for a successful hand posture recognition system, and demonstrates
a much improved cost to performance trade-off in its approach.
Abstract: Exploration and exploitation capabilities are both
important within Operations as means for improvement when
managed separately, and for establishing dynamic improvement
capabilities when combined in balance. However, it is unclear what
exploration and exploitation capabilities imply in improvement and
development work within an Operations context. So, in order to
better understand how to develop exploration and exploitation
capabilities within Operations, the main characteristics of these
constructs needs to be identified and further understood. Thus, the
objective of this research is to increase the understanding about
exploitation and exploration characteristics, to concretize what they
translates to within the context of improvement and development
work in an Operations unit, and to identify practical challenges. A
literature review and a case study are presented. In the literature
review, different interpretations of exploration and exploitation are
portrayed, key characteristics have been identified, and a deepened
understanding of exploration and exploitation characteristics is
described. The case in the study is an Operations unit, and the aim is
to explore to what extent and in what ways exploration and
exploitation activities are part of the improvement structures and
processes. The contribution includes an identification of key
characteristics of exploitation and exploration, as well as an
interpretation of the constructs. Further, some practical challenges are
identified. For instance, exploration activities tend to be given low
priority, both in daily work as in the manufacturing strategy. Also,
the overall understanding about the concepts of exploitation and
exploration (or any similar aspect of dynamic improvement
capabilities) is very low.