Abstract: Governments around the world are expending
considerable time and resources framing strategies and policies to
deliver energy security. The term 'energy security' has quietly
slipped into the energy lexicon without any meaningful discourse
about its meaning or assumptions. An examination of explicit and
inferred definitions finds that the concept is inherently slippery
because it is polysemic in nature having multiple dimensions and
taking on different specificities depending on the country (or
continent), timeframe or energy source to which it is applied. But
what does this mean for policymakers? Can traditional policy
approaches be used to address the problem of energy security or does
its- polysemic qualities mean that it should be treated as a 'wicked'
problem? To answer this question, the paper assesses energy security
against nine commonly cited characteristics of wicked policy
problems and finds strong evidence of 'wickedness'.
Abstract: This article presents a numerical study of the doublediffusive
mixed convection in a vertical channel filled with porous
medium by using non-equilibrium model. The flow is assumed
fully developed, uni-directional and steady state. The controlling
parameters are thermal Rayleigh number (RaT ), Darcy number (Da),
Forchheimer number (F), buoyancy ratio (N), inter phase heat transfer
coefficient (H), and porosity scaled thermal conductivity ratio
(γ). The Brinkman-extended non-Darcy model is considered. The
governing equations are solved by spectral collocation method. The
main emphasize is given on flow profiles as well as heat and solute
transfer rates, when two diffusive components in terms of buoyancy
ratio are in favor (against) of each other and solid matrix and fluid
are thermally non-equilibrium. The results show that, for aiding flow
(RaT = 1000), the heat transfer rate of fluid (Nuf ) increases upto a
certain value of H, beyond that decreases smoothly and converges
to a constant, whereas in case of opposing flow (RaT = -1000),
the result is same for N = 0 and 1. The variation of Nuf in (N,
Nuf )-plane shows sinusoidal pattern for RaT = -1000. For both cases
(aiding and opposing) the flow destabilize on increasing N by inviting
point of inflection or flow separation on the velocity profile. Overall,
the buoyancy force have significant impact on the non-Darcy mixed
convection under LTNE conditions.
Abstract: Breast cancer is the most common malignancy in the
world among women. Many therapies have been designed to treat
this disease. Mamectomy, chemotherapy and radiotherapy are still
the main therapies of breast cancer. However, the results were
unsatisfactory and still far from the ideal treatment.
PM 701is a natural product, has anticancer activity. The bioactive
fraction PMF and subfraction PMFK had been isolated from PM701.
PM 701 and its fractions were proved to have a cytotoxic properties
against different cancer cell lines. This article is directed for the
further examination of lyophilized PM701 and its active fractions on
the growth of breast cancer cells (MCF-7). PM 701, PMF or PMFK
were adding to the cultural medium, where MCF-7 is incubated.
PM 701, PMF or PMFK were able to inhibit significantly the
proliferation of MCF-7 cells, Moreover these new agents were
proved to induce apoptosis of the breast cancer cells; through its
direct effect on the nuclei.
Abstract: The nature of wireless ad hoc and sensor networks
make them very attractive to attackers. One of the most popular and
serious attacks in wireless ad hoc networks is wormhole attack and
most proposed protocols to defend against this attack used
positioning devices, synchronized clocks, or directional antennas.
This paper analyzes the nature of wormhole attack and existing
methods of defending mechanism and then proposes round trip time
(RTT) and neighbor numbers based wormhole detection mechanism.
The consideration of proposed mechanism is the RTT between two
successive nodes and those nodes- neighbor number which is needed
to compare those values of other successive nodes. The identification
of wormhole attacks is based on the two faces. The first consideration
is that the transmission time between two wormhole attack affected
nodes is considerable higher than that between two normal neighbor
nodes. The second detection mechanism is based on the fact that by
introducing new links into the network, the adversary increases the
number of neighbors of the nodes within its radius. This system does
not require any specific hardware, has good performance and little
overhead and also does not consume extra energy. The proposed
system is designed in ad hoc on-demand distance vector (AODV)
routing protocol and analysis and simulations of the proposed system
are performed in network simulator (ns-2).
Abstract: In the current economy of increasing global
competition, many organizations are attempting to use knowledge as
one of the means to gain sustainable competitive advantage. Besides
large organizations, the success of SMEs can be linked to how well
they manage their knowledge. Despite the profusion of research
about knowledge management within large organizations, fewer
studies tried to analyze KM in SMEs.
This research proposes a new framework showing the determinant
role of organizational dimensions onto KM approaches. The paper
and its propositions are based on a literature review and analysis.
In this research, personalization versus codification,
individualization versus institutionalization and IT-based versus non
IT-based are highlighted as three distinct dimensions of knowledge
management approaches.
The study contributes to research by providing a more nuanced
classification of KM approaches and provides guidance to managers
about the types of KM approaches that should be adopted based on
the size, geographical dispersion and task nature of SMEs.
To the author-s knowledge, the paper is the first of its kind to
examine if there are suitable configurations of KM approaches for
SMEs with different dimensions. It gives valuable information, which
hopefully will help SME sector to accomplish KM.
Abstract: International markets driven forces are changing
continuously, therefore companies need to gain a competitive edge in
such markets. Improving the company's products, processes and
practices is no longer auxiliary. Lean production is a production
management philosophy that consolidates work tasks with minimum
waste resulting in improved productivity. Lean production practices
can be mapped into many production areas. One of these is
Manufacturing Equipment and Technology (MET). Many lean
production practices can be implemented in MET, namely, specific
equipment configurations, total preventive maintenance, visual
control, new equipment/ technologies, production process
reengineering and shared vision of perfection.The purpose of this
paper is to investigate the implementation level of these six practices
in Jordanian industries. To achieve that a questionnaire survey has
been designed according to five-point Likert scale. The questionnaire
is validated through pilot study and through experts review. A sample
of 350 Jordanian companies were surveyed, the response rate was
83%. The respondents were asked to rate the extent of
implementation for each of practices. A relationship conceptual
model is developed, hypotheses are proposed, and consequently the
essential statistical analyses are then performed. An assessment tool
that enables management to monitor the progress and the
effectiveness of lean practices implementation is designed and
presented. Consequently, the results show that the average
implementation level of lean practices in MET is 77%, Jordanian
companies are implementing successfully the considered lean
production practices, and the presented model has Cronbach-s alpha
value of 0.87 which is good evidence on model consistency and
results validation.
Abstract: The design of an active leg orthosis for tumble
protection is proposed in this paper. The orthosis would be applied to
assist elders or invalids in rebalancing while they fall unexpectedly.
We observe the regain balance motion of healthy and youthful people,
and find the difference to elders or invalids. First, the physical model
of leg would be established, and we consider the leg motions are
achieve through four joints (phalanx stem, ankle, knee, and hip joint)
and five links (phalanges, talus, tibia, femur, and hip bone). To
formulate the dynamic equations, the coordinates which can clearly
describe the position in 3D space are first defined accordance with the
human movement of leg, and the kinematics and dynamics of the leg
movement can be formulated based on the robotics. For the purpose,
assisting elders and invalids in avoiding tumble, the posture variation
of unbalance and regaining balance motion are recorded by the
motion-capture image system, and the trajectory is taken as the desire
one. Then we calculate the force and moment of each joint based on
the leg motion model through programming MATLAB code. The
results would be primary information of the active leg orthosis design
for tumble protection.
Abstract: In this paper, we propose a novel metal oxide
semiconductor field effect transistor with L-shaped channel structure
(LMOS), and several type of L-shaped structures are also designed,
studied and compared with the conventional MOSFET device for the
same average gate length (Lavg). The proposed device electrical
characteristics are analyzed and evaluated by three dimension (3-D)
ISE-TCAD simulator. It can be confirmed that the LMOS devices
have higher on-state drain current and both lower drain-induced
barrier lowering (DIBL) and subthreshold swing (S.S.) than its
conventional counterpart has. In addition, the transconductance and
voltage gain properties of the LMOS are also improved.
Abstract: This paper presents the DC voltage control design of D-STATCOM when the D-STATCOM is used for load voltage regulation. Although, the DC voltage can be controlled by active current of the D-STATCOM, reactive current still affects the DC voltage. To eliminate this effect, the control strategy with elimination effect of the reactive current is proposed and the results of the control with and without the elimination the effect of the reactive current are compared. For obtaining the proportional and integral gains of the PI controllers, the symmetrical optimum and genetic algorithms methods are applied. The stability margin of these methods are obtained and discussed in detail. In addition, the performance of the DC voltage control based on symmetrical optimum and genetic algorithms methods are compared. Effectiveness of the controllers designed was verified through computer simulation performed by using Power System Tool Block (PSB) in SIMULINK/MATLAB. The simulation results demonstrated that the DC voltage control proposed is effective in regulating DC voltage when the DSTATCOM is used for load voltage regulation.
Abstract: The purpose of this paper is to highlight the
importance of the concept of competitiveness in the supply chain and
to present a conceptual framework for Supply Chain Competitiveness
(SCC). The framework is based on supply chain activities, which are
inputs, necessary for SCC and the benefits which are the outputs of
SCC. A literature review is conducted on key supply chain
competitiveness issues, its determinants, its various dimensions
followed by exploration for SCC. Based on the insights gained, a
conceptual framework for SCC is presented based on activities for
SCC, SCC environment and outcomes of SCC. The information flow
in the conceptual framework is bi-directional at all levels and the
activities are interrelated in a global competitive environment. The
activities include the activities of suppliers, manufacturers and
distributors, giving more emphasis on manufacturers- activities.
Further, implications of various factors such as economic, politicolegal,
technical, socio-cultural, competition, demographic etc. are
also highlighted. The SCC framework is an attempt to cover the
relatively less explored area of supply chain competitiveness. It is
expected that this work will further motivate researchers,
academicians and practitioners to work in this area and offers
conceptual help in providing a directions for supply chain
competitiveness which leads to improvement in the supply chain and
supply chain performance.
Abstract: The technique of inducing micro ecosystem
restoration is one of aquatic ecology engineering methods used to
retrieve the polluted water. Batch scale study, pilot plant study, and
field study were carried out to observe the eutrophication using the
Inducing Ecology Restorative Symbiosis Agent (IERSA) consisting
mainly degraded products by using lactobacillus, saccharomycete,
and phycomycete. The results obtained from the experiments of the
batch scale and pilot plant study allowed us to development the
parameters for the field study. A pond, 5 m to the outlet of a lake,
with an area of 500 m2 and depth of 0.6-1.2 m containing about 500
tons of water was selected as a model. After the treatment with 10
mg IERSA/L water twice a week for 70 days, the micro restoration
mechanisms consisted of three stages (i.e., restoration, impact
maintenance, and ecology recovery experiment after impact). The
COD, TN, TKN, and chlorophyll a were reduced significantly in the
first week. Although the unexpected heavy rain and contaminate
from sewage system might slow the ecology restoration. However,
the self-cleaning function continued and the chlorophyll a reduced
for 50% in one month. In the 4th week, amoeba, paramecium, rotifer,
and red wriggle worm reappeared, and the number of fish flies
appeared up to1000 fish fries/m3. Those results proved that inducing
restorative mechanism can be applied to improve the eutrophication
and to control the growth of algae in the lakes by gaining the selfcleaning
through inducing and competition of microbes. The
situation for growth of fishes also can reach an excellent result due to
the improvement of water quality.
Abstract: Speckle phenomena results from when coherent
radiation is reflected from a rough surface. Characterizing the speckle
strongly depends on the measurement condition and experimental
setup. In this paper we report the experimental results produced with
different parameters in the setup. We investigated the factors which
affects the speckle contrast, such as, F-number, gamma value and
exposure time of the camera, rather than geometric factors like the
distance between the projector lens to the screen, the viewing distance,
etc. The measurement results show that the speckle contrast decreases
by decreasing F-number, by increasing gamma value, and slightly
affects by exposure time of the camera and the gain value of the
camera.
Abstract: This paper proposes a novel game theoretical
technique to address the problem of data object replication in largescale
distributed computing systems. The proposed technique draws
inspiration from computational economic theory and employs the
extended Vickrey auction. Specifically, players in a non-cooperative
environment compete for server-side scarce memory space to
replicate data objects so as to minimize the total network object
transfer cost, while maintaining object concurrency. Optimization of
such a cost in turn leads to load balancing, fault-tolerance and
reduced user access time. The method is experimentally evaluated
against four well-known techniques from the literature: branch and
bound, greedy, bin-packing and genetic algorithms. The experimental
results reveal that the proposed approach outperforms the four
techniques in both the execution time and solution quality.
Abstract: One of the main concerns about parallel mechanisms
is the presence of singular points within their workspaces. In singular
positions the mechanism gains or loses one or several degrees of
freedom. It is impossible to control the mechanism in singular
positions. Therefore, these positions have to be avoided. This is a
vital need especially in computer controlled machine tools designed
and manufactured on the basis of parallel mechanisms. This need has
to be taken into consideration when selecting design parameters. A
prerequisite to this is a thorough knowledge about the effect of
design parameters and constraints on singularity. In this paper,
quality condition index was introduced as a criterion for evaluating
singularities of different configurations of a hexapod mechanism
obtainable by different design parameters. It was illustrated that this
method can effectively be employed to obtain the optimum
configuration of hexapod mechanism with the aim of avoiding
singularity within the workspace. This method was then employed to
design the hexapod table of a CNC milling machine.
Abstract: This paper applies fuzzy clustering algorithm in classifying real estate companies in China according to some general financial indexes, such as income per share, share accumulation fund, net profit margins, weighted net assets yield and shareholders' equity. By constructing and normalizing initial partition matrix, getting fuzzy similar matrix with Minkowski metric and gaining the transitive closure, the dynamic fuzzy clustering analysis for real estate companies is shown clearly that different clustered result change gradually with the threshold reducing, and then, it-s shown there is the similar relationship with the prices of those companies in stock market. In this way, it-s great valuable in contrasting the real estate companies- financial condition in order to grasp some good chances of investment, and so on.
Abstract: The present study investigates numerically the
phenomenon of vortex-shedding and its suppression in twodimensional
mixed convective flow past a square cylinder under the
joint influence of buoyancy and free-stream orientation with respect
to gravity. The numerical experiments have been conducted at a
fixed Reynolds number (Re) of 100 and Prandtl number (Pr) of 0.71,
while Richardson number (Ri) is varied from 0 to 1.6 and freestream
orientation, α, is kept in the range 0o≤ α ≤ 90o, with 0o
corresponding to an upward flow and 90o representing a cross-flow
scenario, respectively. The continuity, momentum and energy
equations, subject to Boussinesq approximation, are discretized using
a finite difference method and are solved by a semi-explicit pressure
correction scheme. The critical Richardson number, leading to the
suppression of the vortex-shedding (Ric), is estimated by using
Stuart-Landau theory at various free-stream orientations and the
neutral curve is obtained in the Ri-α plane. The neutral curve
exhibits an interesting non-monotonic behavior with Ric first
increasing with increasing values of α upto 45o and then decreasing
till 70o. Beyond 70o, the neutral curve again exhibits a sharp
increasing asymptotic trend with Ric approaching very large values
as α approaches 90o. The suppression of vortex shedding is not
observed at α = 90o (cross-flow). In the unsteady flow regime, the
Strouhal number (St) increases with the increase in Richardson
number.
Abstract: The intent of this essay is to evaluate the effectiveness
of surge suppressor aimed at power supply used for automation
devices in power distribution system which is consist of MOV and
T type low-pass filter. Books, journal articles and e-sources related
to surge protection of power supply used for automation devices in
power distribution system were consulted, and the useful information
was organized, analyzed and developed into five parts: characteristics
of surge wave, protection against surge wave, impedance characteristics
of target, using Matlab to simulate circuit response after
5kV,1.2/50s surge wave and suggestions for surge protection. The
results indicate that various types of load situation have great impact
on the effectiveness of surge protective device. Therefore, type and
parameters of surge protective device need to be carefully selected,
and load matching is also vital to be concerned.
Abstract: System testing is actually done to the entire system
against the Functional Requirement Specification and/or the System
Requirement Specification. Moreover, it is an investigatory testing
phase, where the focus is to have almost a destructive attitude and
test not only the design, but also the behavior and even the believed
expectations of the customer. It is also intended to test up to and
beyond the bounds defined in the software/hardware requirements
specifications. In Motorola®, Automated Testing is one of the testing
methodologies uses by GSG-iSGT (Global Software Group - iDEN
TM
Subcriber Group-Test) to increase the testing volume, productivity
and reduce test cycle-time in iDEN
TM
phones testing. Testing is able
to produce more robust products before release to the market. In this
paper, iHopper is proposed as a tool to perform stress test on iDEN
TM
phonse. We will discuss the value that automation has brought to
iDEN
TM
Phone testing such as improving software quality in the
iDEN
TM
phone together with some metrics. We will also look into
the advantages of the proposed system and some discussion of the
future work as well.
Abstract: Recently, various services such as television and the
Internet have come to be received through various terminals.
However, we could gain greater convenience by receiving these
services through cellular phone terminals when we go out and then
continuing to receive the same services through a large screen digital
television after we have come home. However, it is necessary to go
through the same authentication processing again when using TVs
after we have come home. In this study, we have developed an
authentication method that enables users to switch terminals in
environments in which the user receives service from a server through
a terminal. Specifically, the method simplifies the authentication of
the server side when switching from one terminal to another terminal
by using previously authenticated information.
Abstract: Nowadays, under developed countries for progress in
science and technology and decreasing the technologic gap with
developed countries, increasing the capacities and technology
transfer from developed countries. To remain competitive, industry is
continually searching for new methods to evolve their products.
Business model is one of the latest buzzwords in the Internet and
electronic business world. To be successful, organizations must look
into the needs and wants of their customers. This research attempts to
identify a specific feature of the company with a strong competitive
advantage by analyzing the cause of Customer satisfaction. Due to
the rapid development of knowledge and information technology,
business environments have become much more complicated.
Information technology can help a firm aiming to gain a competitive
advantage. This study explores the role and effect of Information
Communication Technology in Business Models and Customer
satisfaction on firms and also relationships between ICTs and
Outsourcing strategic.