Abstract: We present a prototype interactive (hyper) map of strategic, tactical, and logistic options for Supply Chain Management. The map comprises an anthology of options, broadly classified within the strategic spectrum of efficiency versus responsiveness, and according to logistic and cross-functional drivers. They are exemplified by cases in diverse industries. We seek to get all these information and ideas organized to help supply chain managers identify effective choices for specific business environments. The key and innovative linkage we introduce is the configuration of competitive forces. Instead of going through seemingly endless and isolated cases and wondering how one can borrow from them, we aim to provide a guide by force comparisons. The premise is that best practices in a different industry facing similar forces may be a most productive resource in supply chain design and planning. A prototype template is demonstrated.
Abstract: Low power consumption is a major constraint for battery-powered system like computer notebook or PDA. In the past, specialists usually designed both specific optimized equipments and codes to relief this concern. Doing like this could work for quite a long time, however, in this era, there is another significant restraint, the time to market. To be able to serve along the power constraint while can launch products in shorter production period, objectoriented programming (OOP) has stepped in to this field. Though everyone knows that OOP has quite much more overhead than assembly and procedural languages, development trend still heads to this new world, which contradicts with the target of low power consumption. Most of the prior power related software researches reported that OOP consumed much resource, however, as industry had to accept it due to business reasons, up to now, no papers yet had mentioned about how to choose the best OOP practice in this power limited boundary. This article is the pioneer that tries to specify and propose the optimized strategy in writing OOP software under energy concerned environment, based on quantitative real results. The language chosen for studying is C# based on .NET Framework 2.0 which is one of the trendy OOP development environments. The recommendation gotten from this research would be a good roadmap that can help developers in coding that well balances between time to market and time of battery.
Abstract: The distribution of macrobenthic polychaetes along
the coastal waters of Penang National Park was surveyed to estimate
the effect of various environmental parameters at three stations
(200m, 600m and 1200m) from the shoreline, during six sampling
months, from June 2010 to April 2011.The use of polychaetes in
descriptive ecology is surveyed in the light of a recent investigation
particularly concerning the soft bottom biota environments.
Polychaetes, often connected in the former to the notion of
opportunistic species able to proliferate after an enhancement in
organic matter, had performed a momentous role particularly with
regard to effected soft-bottom habitats. The objective of this survey
was to investigate different environment stress over soft bottom
polychaete community along Teluk Ketapang and Pantai Acheh
(Penang National Park) over a year period. Variations in the
polychaete community were evaluated using univariate and
multivariate methods. The results of PCA analysis displayed a
positive relation between macrobenthic community structures and
environmental parameters such as sediment particle size and organic
matter in the coastal water. A total of 604 individuals were examined
which was grouped into 23 families. Family Nereidae was the most
abundant (22.68%), followed by Spionidae (22.02%), Hesionidae
(12.58%), Nephtylidae (9.27%) and Orbiniidae (8.61%). It is
noticeable that good results can only be obtained on the basis of good
taxonomic resolution. We proposed that, in monitoring surveys,
operative time could be optimized not only by working at a highertaxonomic
level on the entire macrobenthic data set, but by also
choosing an especially indicative group and working at lower
taxonomic and good level.
Abstract: Climate change could lead to changes in cultural
environments and landscapes as we know them.Climate change
presents an immediate and significant threat to our natural and built
environments and to the ways of life which co-exist with these
environments. In most traditional buildings, the harmony of texture
with nature and environment has been ever considered; so houses and
cities have been mixed with their natural environment so
astonishingly and the selection and usage of materials have been in
such a way that they have provided the utmost conformity with the
environment, as the result the created areas have a unique beauty and
attraction.The extent to which climate change contributes to
destruction procedure on Iran-s historic buildings.is a subject of
current discussion. Cities, towns and built-up areas also have their
own characteristics that might make them particularly vulnerable to
climate change.
Abstract: Due to its capability to resist jamming signals, chirp
spread spectrum (CSS) technique has attracted much attention in
the area of wireless communications. However, there has been little
rigorous analysis for the performance of the CSS communication
system in jamming environments. In this paper, we present analytic
results on the performance of a CSS system by deriving symbol
error rate (SER) expressions for a CSS M-ary phase shift keying
(MPSK) system in the presence of broadband and tone jamming
signals, respectively. The numerical results show that the empirical
SER closely agrees with the analytic result.
Abstract: This paper presents a new method for estimating the nonstationary
noise power spectral density given a noisy signal. The
method is based on averaging the noisy speech power spectrum using
time and frequency dependent smoothing factors. These factors are
adjusted based on signal-presence probability in individual frequency
bins. Signal presence is determined by computing the ratio of the
noisy speech power spectrum to its local minimum, which is updated
continuously by averaging past values of the noisy speech power
spectra with a look-ahead factor. This method adapts very quickly to
highly non-stationary noise environments. The proposed method
achieves significant improvements over a system that uses voice
activity detector (VAD) in noise estimation.
Abstract: While computers are known to facilitate lower levels of learning, such as rote memorization of facts, measurable through electronically administered and graded multiple-choice questions, yes/no, and true/false answers, the imparting and measurement of higher-level cognitive skills is more vexing. These require more open-ended delivery and answers, and may be more problematic in an entirely virtual environment, notwithstanding the advances in technologies such as wikis, blogs, discussion boards, etc. As with the integration of all technology, merit is based more on the instructional design of the course than on the technology employed in, and of, itself. With this in mind, this study examined the perceptions of online students in an introductory Computer Information Systems course regarding the fostering of various higher-order thinking and team-building skills as a result of the activities, resources and technologies (ART) used in the course.
Abstract: This paper discusses an artificial mind model and its
applications. The mind model is based on some theories which assert
that emotion is an important function in human decision making. An
artificial mind model with emotion is built, and the model is applied to
action selection of autonomous agents. In three examples, the agents
interact with humans and their environments. The examples show the
proposed model effectively work in both virtual agents and real robots.
Abstract: The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures
with multiple protocols, codecs, software and hardware–based
distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This
paper analyzes the VoIP throughput and the QoS parameters with
different commercial encryption methods. The measurement–based
approach uses lab scenarios to simulate LAN and WAN
environments. Security mechanisms such as TLS, SIAX2, SRTP,
IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.
Abstract: The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to process needed tasks under certain constraints. One of the proposed solutions to this drawback is the introduction of Collaborative Computing, a new concept dealing with the distribution of computational tasks amongst several handhelds. This paper introduces the basics of Collaborative Computing, and proposes a new protocol that aims at managing and optimizing computing tasks in Ad-Hoc Collaborative Computing Environments.
Abstract: This paper reports on a survey of state-of-the-art
application scenarios for smart office environments. Based on an
analysis of ongoing research activities and industry projects,
functionalities and services of future office systems are extracted. In
a second step, these results are used to identify the key characteristics
of emerging products.
Abstract: Caching was suggested as a solution for reducing bandwidth utilization and minimizing query latency in mobile environments. Over the years, different caching approaches have been proposed, some relying on the server to broadcast reports periodically informing of the updated data while others allowed the clients to request for the data whenever needed. Until recently a hybrid cache consistency scheme Scalable Asynchronous Cache Consistency Scheme SACCS was proposed, which combined the two different approaches benefits- and is proved to be more efficient and scalable. Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. This paper studies the advantages and the drawbacks of the new proposed strategy, comparing it with different categories of cache replacement strategies.
Abstract: GSM has undoubtedly become the most widespread
cellular technology and has established itself as one of the most
promising technology in wireless communication. The next
generation of mobile telephones had also become more powerful and
innovative in a way that new services related to the user-s location
will arise. Other than the 911 requirements for emergency location
initiated by the Federal Communication Commission (FCC) of the
United States, GSM positioning can be highly integrated in cellular
communication technology for commercial use. However, GSM
positioning is facing many challenges. Issues like accuracy,
availability, reliability and suitable cost render the development and
implementation of GSM positioning a challenging task. In this paper,
we investigate the optimal mobile position tracking means. We
employ an innovative scheme by integrating the Kalman filter in the
localization process especially that it has great tracking
characteristics. When tracking in two dimensions, Kalman filter is
very powerful due to its reliable performance as it supports
estimation of past, present, and future states, even when performing
in unknown environments. We show that enhanced position tracking
results is achieved when implementing the Kalman filter for GSM
tracking.
Abstract: Conceptualization strengthens intelligent systems in generalization skill, effective knowledge representation, real-time inference, and managing uncertain and indefinite situations in addition to facilitating knowledge communication for learning agents situated in real world. Concept learning introduces a way of abstraction by which the continuous state is formed as entities called concepts which are connected to the action space and thus, they illustrate somehow the complex action space. Of computational concept learning approaches, action-based conceptualization is favored because of its simplicity and mirror neuron foundations in neuroscience. In this paper, a new biologically inspired concept learning approach based on the probabilistic framework is proposed. This approach exploits and extends the mirror neuron-s role in conceptualization for a reinforcement learning agent in nondeterministic environments. In the proposed method, instead of building a huge numerical knowledge, the concepts are learnt gradually from rewards through interaction with the environment. Moreover the probabilistic formation of the concepts is employed to deal with uncertain and dynamic nature of real problems in addition to the ability of generalization. These characteristics as a whole distinguish the proposed learning algorithm from both a pure classification algorithm and typical reinforcement learning. Simulation results show advantages of the proposed framework in terms of convergence speed as well as generalization and asymptotic behavior because of utilizing both success and failures attempts through received rewards. Experimental results, on the other hand, show the applicability and effectiveness of the proposed method in continuous and noisy environments for a real robotic task such as maze as well as the benefits of implementing an incremental learning scenario in artificial agents.
Abstract: Organizational communication is an administrative
function crucial especially for executives in the implementation of
organizational and administrative functions. Executives spend a
significant part of their time on communicative activities. Doing his or her daily routine, arranging meeting schedules, speaking on the telephone, reading or replying to business correspondence, or
fulfilling the control functions within the organization, an executive typically engages in communication processes.
Efficient communication is the principal device for the adequate implementation of administrative and organizational activities. For
this purpose, management needs to specify the kind of
communication system to be set up and the kind of communication
devices to be used. Communication is vital for any organization.
In conventional offices, communication takes place within the hierarchical pyramid called the organizational structure, and is known as formal or informal communication. Formal communication
is the type that works in specified structures within the organizational rules and towards the organizational goals. Informal communication, on the other hand, is the unofficial type taking place among staff as
face-to-face or telephone interaction.
Communication in virtual as well as conventional offices is
essential for obtaining the right information in administrative
activities and decision-making. Virtual communication technologies
increase the efficiency of communication especially in virtual teams.
Group communication is strengthened through an inter-group central
channel. Further, ease of information transmission makes it possible
to reach the information at the source, allowing efficient and correct decisions. Virtual offices can present as a whole the elements of information which conventional offices produce in different
environments.
At present, virtual work has become a reality with its pros and
cons, and will probably spread very rapidly in coming years, in line
with the growth in information technologies.
Abstract: In this paper after reviewing some previous studies, in
order to optimize the above knee prosthesis, beside the inertial
properties a new controlling parameter is informed. This controlling
parameter makes the prosthesis able to act as a multi behavior system
when the amputee is opposing to different environments. This active
prosthesis with the new controlling parameter can simplify the
control of prosthesis and reduce the rate of energy consumption in
comparison to recently presented similar prosthesis “Agonistantagonist
active knee prosthesis".
In this paper three models are generated, a passive, an active, and
an optimized active prosthesis. Second order Taylor series is the
numerical method in solution of the models equations and the
optimization procedure is genetic algorithm.
Modeling the prosthesis which comprises this new controlling
parameter (SEP) during the swing phase represents acceptable results
in comparison to natural behavior of shank. Reported results in this
paper represent 3.3 degrees as the maximum deviation of models
shank angle from the natural pattern. The natural gait pattern belongs
to walking at the speed of 81 m/min.
Abstract: There is wide range of scientific workflow systems
today, each one designed to resolve problems at a specific level. In
large collaborative projects, it is often necessary to recognize the
heterogeneous workflow systems already in use by various partners
and any potential collaboration between these systems requires
workflow interoperability. Publish/Subscribe Scientific Workflow
Interoperability Framework (PS-SWIF) approach was proposed to
achieve workflow interoperability among workflow systems. This
paper evaluates the PS-SWIF approach and its system to achieve
workflow interoperability using Web Services with asynchronous
notification messages represented by WS-Eventing standard. This
experiment covers different types of communication models provided
by Workflow Management Coalition (WfMC). These models are:
Chained processes, Nested synchronous sub-processes, Event
synchronous sub-processes, and Nested sub-processes
(Polling/Deferred Synchronous). Also, this experiment shows the
flexibility and simplicity of the PS-SWIF approach when applied to a
variety of workflow systems (Triana, Taverna, Kepler) in local and
remote environments.
Abstract: In this paper, a simple heuristic genetic algorithm is
used for Multistage Multiuser detection in fast fading environments.
Multipath channels, multiple access interference (MAI) and near far
effect cause the performance of the conventional detector to degrade.
Heuristic Genetic algorithms, a rapidly growing area of artificial
intelligence, uses evolutionary programming for initial search, which
not only helps to converge the solution towards near optimal
performance efficiently but also at a very low complexity as
compared with optimal detector. This holds true for Additive White
Gaussian Noise (AWGN) and multipath fading channels.
Experimental results are presented to show the superior performance
of the proposed techque over the existing methods.
Abstract: Real world Speaker Identification (SI) application
differs from ideal or laboratory conditions causing perturbations that
leads to a mismatch between the training and testing environment
and degrade the performance drastically. Many strategies have been
adopted to cope with acoustical degradation; wavelet based Bayesian
marginal model is one of them. But Bayesian marginal models
cannot model the inter-scale statistical dependencies of different
wavelet scales. Simple nonlinear estimators for wavelet based
denoising assume that the wavelet coefficients in different scales are
independent in nature. However wavelet coefficients have significant
inter-scale dependency. This paper enhances this inter-scale
dependency property by a Circularly Symmetric Probability Density
Function (CS-PDF) related to the family of Spherically Invariant
Random Processes (SIRPs) in Log Gabor Wavelet (LGW) domain
and corresponding joint shrinkage estimator is derived by Maximum
a Posteriori (MAP) estimator. A framework is proposed based on
these to denoise speech signal for automatic speaker identification
problems. The robustness of the proposed framework is tested for
Text Independent Speaker Identification application on 100 speakers
of POLYCOST and 100 speakers of YOHO speech database in three
different noise environments. Experimental results show that the
proposed estimator yields a higher improvement in identification
accuracy compared to other estimators on popular Gaussian Mixture
Model (GMM) based speaker model and Mel-Frequency Cepstral
Coefficient (MFCC) features.
Abstract: In this paper, a novel corner detection method is
presented to stably extract geometrically important corners.
Intensity-based corner detectors such as the Harris corner can detect
corners in noisy environments but has inaccurate corner position and
misses the corners of obtuse angles. Edge-based corner detectors such
as Curvature Scale Space can detect structural corners but show
unstable corner detection due to incomplete edge detection in noisy
environments. The proposed image-based direct curvature estimation
can overcome limitations in both inaccurate structural corner detection
of the Harris corner detector (intensity-based) and the unstable corner
detection of Curvature Scale Space caused by incomplete edge
detection. Various experimental results validate the robustness of the
proposed method.