Abstract: As business environments are rapidly changing,
the manufacturing system must be reconfigured to adapt to
various customer needs. In order to cope with this challenge, it
is quintessential to test industrial control logic rapidly and
easily in the design time, and monitor operational behavior in
the run time of automated manufacturing system. Proposed
integrated model for virtual prototyping and operational
monitoring of industrial control logic is to improve limitations
of current ladder programming practices and general discrete
event simulation method. Each plant layout model using HMI
package and object-oriented control logic model is designed
independently and is executed simultaneously in integrated
manner to reflect design practices of automation system in the
design time. Control logic is designed and executed using UML
activity diagram without considering complicated control
behavior to deal with current trend of reconfigurable
manufacturing. After the physical installation, layout model of
virtual prototype constructed in the design time is reused for
operational monitoring of system behavior during run time.
Abstract: The purpose of this research was to investigate Thai Muslims’ way of life through the way their clothes. The data of this qualitative research were collected from related documents and research reports, ancient cloths and clothing, and in-depth interviews with clothes owners and weavers.
The research found that in the 18th century Thai Muslims in the three southern border provinces used many types of clothing in their life. At home women wore plain clothes. They used checked cloths to cover the upper part of their body from the breasts down to the waist. When going out, they used Lima cloth and So Kae with a piece of Pla-nging cloth as a head scarf. For men, they wore a checked sarong as a lower garment, and wore no upper garment. However, when going out, they wore Puyo Potong. In addition, Thai Muslims used cloths in various religious rites, namely, the rite of placing a baby in a cradle, the Masoyawi rite, the Nikah rite, and the burial rite. These types of cloths were related to the way of life of Thai Muslims from birth to death. They reflected the race, gender, age, social status, values, and beliefs in traditions that have been inherited.
Practical Implication: Woven in these cloths are the lost local wisdom, and therefore, aesthetics on the cloths are like mirrors reflecting the background of people in this region that is fading away. These cloths are pages of a local history book that is of importance and value worth for preservation and publicity so that they are treasured. Government organizations can expand and materialize the knowledge received from the study in accordance with government policy in supporting the One Tambon, One Product project.
Abstract: Computers are being integrated in the various aspects
of human every day life in different shapes and abilities. This fact
has intensified a requirement for the software development
technologies which is ability to be: 1) portable, 2) adaptable, and 3)
simple to develop. This problem is also known as the Pervasive
Computing Problem (PCP) which can be implemented in different
ways, each has its own pros and cons and Context Oriented
Programming (COP) is one of the methods to address the PCP.
In this paper a design for a COP framework, a context aware
framework, is presented which has eliminated weak points of a
previous design based on interpreter languages, while introducing the
compiler languages power in implementing these frameworks.
The key point of this improvement is combining COP and
Dependency Injection (DI) techniques. Both old and new frameworks
are analyzed to show advantages and disadvantages. Finally a
simulation of both designs is proposed to indicating that the practical
results agree with the theoretical analysis while the new design runs
almost 8 times faster.
Abstract: Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be inestimable building blocks for cryptographic applications. They are at the heart of numerous protocols such as key agreements, public-key cryptosystems, digital signatures, identification schemes, publicly verifiable secret sharings, hash functions and bit commitments. The search for new groups with intractable DLP is therefore of great importance.The goal of this article is to study elliptic curves over the ring Fq[], with Fq a finite field of order q and with the relation n = 0, n ≥ 3. The motivation for this work came from the observation that several practical discrete logarithm-based cryptosystems, such as ElGamal, the Elliptic Curve Cryptosystems . In a first time, we describe these curves defined over a ring. Then, we study the algorithmic properties by proposing effective implementations for representing the elements and the group law. In anther article we study their cryptographic properties, an attack of the elliptic discrete logarithm problem, a new cryptosystem over these curves.
Abstract: Many agent-oriented software engineering
methodologies have been proposed for software developing; however
their application is still limited due to their lack of maturity.
Evaluating the strengths and weaknesses of these methodologies
plays an important role in improving them and in developing new
stronger methodologies. This paper presents an evaluation framework
for agent-oriented methodologies, which addresses six major areas:
concepts, notation, process, pragmatics, support for software
engineering and marketability. The framework is then used to
evaluate the Gaia methodology to identify its strengths and
weaknesses, and to prove the ability of the framework for promoting
the agent-oriented methodologies by detecting their weaknesses in
detail.
Abstract: The term Enterprise 2.0 (E2.0) describes a collection of organizational and IT practices that help organizations establish flexible work models, visible knowledge-sharing practices, and higher levels of community participation. E2.0 parallels and builds on another term commonly being used in the industry – Web 2.0. E2.0 represents also new packaging for strategic collaboration and Knowledge Management (KM). Organizations rely on collaboration and KM initiatives to attain innovation, growth, productivity, and performance goals.
Abstract: Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Abstract: The problem of laminar fluid flow which results from
the shrinking of a permeable surface in a nanofluid has been
investigated numerically. The model used for the nanofluid
incorporates the effects of Brownian motion and thermophoresis. A
similarity solution is presented which depends on the mass suction
parameter S, Prandtl number Pr, Lewis number Le, Brownian motion
number Nb and thermophoresis number Nt. It was found that the
reduced Nusselt number is decreasing function of each dimensionless
number.
Abstract: In this paper, we propose a single sample path based
algorithm with state aggregation to optimize the average rewards of
singularly perturbed Markov reward processes (SPMRPs) with a
large scale state spaces. It is assumed that such a reward process
depend on a set of parameters. Differing from the other kinds of
Markov chain, SPMRPs have their own hierarchical structure. Based
on this special structure, our algorithm can alleviate the load in the
optimization for performance. Moreover, our method can be applied
on line because of its evolution with the sample path simulated.
Compared with the original algorithm applied on these problems of
general MRPs, a new gradient formula for average reward
performance metric in SPMRPs is brought in, which will be proved
in Appendix, and then based on these gradients, the schedule of the
iteration algorithm is presented, which is based on a single sample
path, and eventually a special case in which parameters only
dominate the disturbance matrices will be analyzed, and a precise
comparison with be displayed between our algorithm with the old
ones which is aim to solve these problems in general Markov reward
processes. When applied in SPMRPs, our method will approach a fast
pace in these cases. Furthermore, to illustrate the practical value of
SPMRPs, a simple example in multiple programming in computer
systems will be listed and simulated. Corresponding to some practical
model, physical meanings of SPMRPs in networks of queues will be
clarified.
Abstract: The importance of ensuring safe meat handling and
processing practices has been demonstrated in global reports on food
safety scares and related illness and deaths. This necessitated stricter
meat safety control strategies. Today, many countries have regulated
towards preventative and systematic control over safe meat
processing at abattoirs utilizing the Hazard Analysis Critical Control
Point (HACCP) principles. HACCP systems have been reported as
effective in managing food safety risks, if correctly implemented.
South Africa has regulated the Hygiene Management System (HMS)
based on HACCP principles applicable to abattoirs. Regulators utilise
the Hygiene Assessment System (HAS) to audit compliance at
abattoirs. These systems were benchmarked from the United
Kingdom (UK). Little research has been done them since inception as
of 2004. This paper presents a review of the two systems, its
implementation and comparison with HACCP. Recommendations are
made for future research to demonstrate the utility of the HMS and
HAS in assuring safe meat to consumers.
Abstract: The purpose of this paper is to examine the current
state of corporate social responsibility statements on corporate
websites of Malaysian and Singaporean corporations and analyze
how the CSR statements contribute in building a unique corporate
identity of corporations. Content analysis is employed to examine the
websites of Malaysian and Singaporean consumer corporations. It is
believed that generally most companies tend to publish and
communicate their CSR statements visibly to general stakeholders.
However, there is a significantly different outcome of the articulation
of CSR on practices on websites between Malaysian and Singaporean
consumer corporations. A number of Singaporean organizations were
found less concerned with CSR practices as compared to Malaysian
organizations. The findings indicate a need for corporations in
Malaysia and Singapore to orchestrate their core competence of CSR
activities in order to develop a unique corporate identity in a global
business environment.
Abstract: The oil and gas industry has moved towards Load and
Resistance Factor Design through API RP2A - LRFD and the
recently published international standard, ISO-19902, for design of
fixed steel offshore structures. The ISO 19902 is intended to provide
a harmonized design practice that offers a balanced structural fitness
for the purpose, economy and safety. As part of an ongoing work, the
reliability analysis of tubular joints of the jacket structure has been
carried out to calibrate the load and resistance factors for the design
of offshore platforms in Malaysia, as proposed in the ISO.
Probabilistic models have been established for the load effects (wave,
wind and current) and the tubular joints strengths. In this study the
First Order Reliability Method (FORM), coded in MATLAB
Software has been employed to evaluate the reliability index of the
typical joints, designed using API RP2A - WSD and ISO 19902.
Abstract: Dr Eliyahu Goldratt has done the pioneering work in
the development of Theory of Constraints. Since then, many more
researchers around the globe are working to enhance this body of
knowledge. In this paper, an attempt has been made to compile the
salient features of this theory from the work done by Goldratt and
other researchers. This paper will provide a good starting point to the
potential researchers interested to work in Theory of Constraints. The
paper will also help the practicing managers by clarifying their
concepts on the theory and will facilitate its successful
implementation in their working areas.
Abstract: This paper is mainly concerned with the application of a novel technique of data interpretation to the characterization and classification of measurements of plasma columns in Tokamak reactors for nuclear fusion applications. The proposed method exploits several concepts derived from soft computing theory. In particular, Artifical Neural Networks have been exploited to classify magnetic variables useful to determine shape and position of the plasma with a reduced computational complexity. The proposed technique is used to analyze simulated databases of plasma equilibria based on ITER geometry configuration. As well as demonstrating the successful recovery of scalar equilibrium parameters, we show that the technique can yield practical advantages compares with earlier methods.
Abstract: Modern organizations operate under the pressure of
dynamic and often unpredictable changes, both in external and
internal environment. Market success, in this context, requires a
particular competence in the form of flexibility, interpreted here both
on the level of individuals and on the level of organization. This
paper addresses the changes taking place in the sphere of
employment, as observed in economic entities operating on Polish
market. Based on own empirical studies, the authors focus on the
progressing trend of ‘flexibilization’ of employment, particularly in
the context of transformations in organizational structure, designed to
facilitate the transition into management by projects and
differentiation of labor forms.
Abstract: In this paper, we propose a chaotic cipher system consisting of Improved Volterra Filters and the mapping that is created from the actual voice by using Radial Basis Function Network. In order to achieve a practical system, the system supposes to use the digital communication line, such as the Internet, to maintain the parameter matching between the transmitter and receiver sides. Therefore, in order to withstand the attack from outside, it is necessary that complicate the internal state and improve the sensitivity coefficient. In this paper, we validate the robustness of proposed method from three perspectives of "Chaotic properties", "Randomness", "Coefficient sensitivity".
Abstract: The development of competences and practical
capacities of students is getting an important incidence into the
guidelines of the European Higher Education Area (EHEA). The
methodology applied in this work is based on the education through
directed resolution of practical cases. All cases are related to
professional tasks that the students will have to develop in their
future career. The method is intended to form the necessary
competences of students of the Marine Engineering and Maritime
Transport Degree in the matter of “Physics".
The experience was applied in the course of 2011/2012. Students
were grouped, and a practical task was assigned to them, that should
be developed and solved within the team. The aim was to realize
students learning by three ways: their own knowledge, the
contribution of their teammates and the teacher's direction. The
results of the evaluation were compared with those obtained
previously by the traditional teaching method.
Abstract: To help the client to select a competent agent
construction enterprise (ACE), this study aims to investigate the
selection standards by using the Fuzzy Analytic Hierarchy Process
(FAHP) and build an evaluation mathematical model with Grey
Relational Analysis (GRA). According to the outputs of literature
review, four orderly levels are established within the model, taking the
consideration of various agent construction models in practice. Then,
the process of applying FAHP and GRA is discussed in detailed.
Finally, through a case study, this paper illustrates how to apply these
methods in getting the weights of each standard and the final
assessment result.
Abstract: The complexity of teaching English in higher
institutions by non-native speakers within a second/foreign language
setting has created continuous discussions and research about
teaching approaches and teaching practises, professional identities
and challenges. In addition, there is a growing awareness that
teaching English within discipline-specific contexts adds up to the
existing complexity. This awareness leads to reassessments,
discussions and suggestions on course design and content and
teaching approaches and techniques. In meeting expectations
teaching at a university specified in a particular discipline such as
engineering, English language educators are not only required to
teach students to be able to communicate in English effectively but
also to teach soft skills such as problem solving skills. This paper is
part of a research conducted to investigate how English language
educators negotiate with the complexities of teaching problem
solving skills through English language teaching at a technical
university. This paper reports the way an English language educator
identified himself and the way he approached his teaching in this
institutional context.