Abstract: Development of a Robust Supply Chain for Dynamic
Operating Environment as we move further into the twenty first
century, organisations are under increasing pressure to deliver a high
product variation at a reasonable cost without compromise in quality.
In a number of cases this will take the form of a customised or high
variety low volume manufacturing system that requires prudent
management of resources, among a number of functions, to achieve
competitive advantage. Purchasing and Supply Chain management is
one of such function and due to the substantial interaction with
external elements needs to be strategically managed. This requires a
number of primary and supporting tools that will enable the
appropriate decisions to be made rapidly. This capability is
especially vital in a dynamic environment as it provides a pivotal role
in increasing the profit margin of the product. The management of
this function can be challenging by itself and even more for Small
and Medium Enterprises (SMEs) due to the limited resources and
expertise available at their disposal.
This paper discusses the development of tools and concepts
towards effectively managing the purchasing and supply chain
function. The developed tools and concepts will provide a cost
effective way of managing this function within SMEs. The paper
further shows the use of these tools within Contechs, a manufacturer
of luxury boat interiors, and the associated benefits achieved as a
result of this implementation. Finally a generic framework towards
use in such environments is presented.
Abstract: This paper presents a distributed intrusion
detection system IDS, based on the concept of specialized
distributed agents community representing agents with the
same purpose for detecting distributed attacks. The semantic of
intrusion events occurring in a predetermined network has been
defined. The correlation rules referring the process which our
proposed IDS combines the captured events that is distributed
both spatially and temporally. And then the proposed IDS tries
to extract significant and broad patterns for set of well-known
attacks. The primary goal of our work is to provide intrusion
detection and real-time prevention capability against insider
attacks in distributed and fully automated environments.
Abstract: In this paper, we describe a rule-based message passing method to support developing collaborative applications, in which multiple users share resources in distributed environments. Message communications of applications in collaborative environments tend to be very complex because of the necessity to manage context situations such as sharing events, access controlling of users, and network places. In this paper, we propose a message communications method based on unification of artificial intelligence and logic programming for defining rules of such context information in a procedural object-oriented programming language. We also present an implementation of the method as java classes.
Abstract: Business Process Management (BPM) helps in optimizing the business processes inside an enterprise. But BPM architecture does not provide any help for extending the enterprise. Modern business environments and rapidly changing technologies are asking for brisk changes in the business processes. Service Oriented Architecture (SOA) can help in enabling the success of enterprise-wide BPM. SOA supports agility in software development that is directly related to achieve loose coupling of interacting software agents. Agility is a premium concern of the current software designing architectures. Together, BPM and SOA provide a perfect combination for enterprise computing. SOA provides the capabilities for services to be combined together and to support and create an agile, flexible enterprise. But there are still many questions to answer; BPM is better or SOA? and what is the future track of BPM and SOA? This paper tries to answer some of these important questions.
Abstract: In this paper we describes the authentication for DHCP
(Dynamic Host Configuration Protocol) message which provides the
efficient key management and reduces the danger replay attack without
an additional packet for a replay attack. And the authentication for
DHCP message supports mutual authentication and provides both
entity authentication and message authentication. We applied the
authentication for DHCP message to the home network environments
and tested through a home gateway.
Abstract: This paper provides an introduction into the
evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different
phases of information processing in the work domain. It starts by
charting the past and present usage of computers in work
environments and shows current technological trends, which are likely to influence future business applications. The second part
starts by briefly describing, how the usage of computers changed business processes in the past, and presents first Ambient
Intelligence applications based on identification and localization
information, which are already used in the production and retail sector. Based on current systems and prototype applications, the
paper gives an outlook of how Ambient Intelligence technologies could change business processes in the future.
Abstract: Grid environments consist of the volatile integration
of discrete heterogeneous resources. The notion of the Grid is to
unite different users and organisations and pool their resources into
one large computing platform where they can harness, inter-operate,
collaborate and interact. If the Grid Community is to achieve this
objective, then participants (Users and Organisations) need to be
willing to donate or share their resources and permit other
participants to use their resources. Resources do not have to be
shared at all times, since it may result in users not having access to
their own resource. The idea of reward-based computing was
developed to address the sharing problem in a pragmatic manner.
Participants are offered a reward to donate their resources to the
Grid. A reward may include monetary recompense or a pro rata share
of available resources when constrained. This latter point may imply
a quality of service, which in turn may require some globally agreed
reservation mechanism. This paper presents a platform for economybased
computing using the WebCom Grid middleware. Using this
middleware, participants can configure their resources at times and
priority levels to suit their local usage policy. The WebCom system
accounts for processing done on individual participants- resources
and rewards them accordingly.
Abstract: Aquatic and semi aquatic birds as a group are suited to
feed and breed in environments in which water forms a fundamental
part. These birds are biological indicator in aquatic environment,
because these birds belong to the top level of food chain in aquatic
ecosystems. There are 61 species in 14 families of aquatic and semi
aquatic birds in Iran. The birds of the Sattarkhan Lake belong to 16
species in 8 families which include 26.2 percent of total Aquatic and
semi aquatic bird species and 57% of Aquatic and semi aquatic bird's
family of Iran. Study was carried out monthly at Sattarkhan Lake
show the existence of Phalacrocorax carbo, Ardea cinerea, Egretta
alba, Egretta garzetta, Bubulcus ibis, Botaurus stellaris, Sterna
hirundo, Chlidonias leucopterus, Larus minutus, Larus argentatus,
Larus ridibunbus, Alcedo atthis, Ciconia ciconia, Plegadis
falcinellus, Circus aeruginosus, Corvus frugilegus
Abstract: The growing outsourcing of logistics services
resulting from the ongoing current in firms of costs
reduction/increased efficiency means that it is becoming more and
more important for the companies doing the outsourcing to carry out
a proper evaluation.
The multiple definitions and measures of logistics service
performance found in research on the topic create a certain degree of
confusion and do not clear the way towards the proper measurement
of their performance. Do a model and a specific set of indicators exist
that can be considered appropriate for measuring the performance of
logistics services outsourcing in industrial environments? Are said
indicators in keeping with the objectives pursued by outsourcing? We
aim to answer these and other research questions in the study we have
initiated in the field within the framework of the international High
Performance Manufacturing (HPM) project of which this paper
forms part.
As the first stage of this research, this paper reviews articles
dealing with the topic published in the last 15 years with the aim of
detecting the models most used to make this measurement and
determining which performance indicators are proposed as part of
said models and which are most used. The first steps are also taken in
determining whether these indicators, financial and operational, cover
the aims that are being pursued when outsourcing logistics services.
The findings show there is a wide variety of both models and
indicators used. This would seem to testify to the need to continue
with our research in order to try to propose a model and a set of
indicators for measuring the performance of logistics services
outsourcing in industrial environments.
Abstract: In this paper, frequency offset (FO) estimation schemes
robust to the non-Gaussian noise environments are proposed for
orthogonal frequency division multiplexing (OFDM) systems. First,
a maximum-likelihood (ML) estimation scheme in non-Gaussian
noise environments is proposed, and then, the complexity of the
ML estimation scheme is reduced by employing a reduced set of
candidate values. In numerical results, it is demonstrated that the
proposed schemes provide a significant performance improvement
over the conventional estimation scheme in non-Gaussian noise
environments while maintaining the performance similar to the
estimation performance in Gaussian noise environments.
Abstract: Simulations play a major role in education not only because they provide realistic models with which students can interact to acquire real world experiences, but also because they constitute safe environments in which students can repeat processes without any risk in order to perceive easier concepts and theories. Virtual reality is widely recognized as a significant technological advance that can facilitate learning process through the development of highly realistic 3D simulations supporting immersive and interactive features. The objective of this paper is to analyze the influence of virtual reality-s use in chemistry instruction as well as to present an integrated web-based learning environment for the simulation of chemical experiments. The proposed application constitutes a cost-effective solution for both schools and universities without appropriate infrastructure and a valuable tool for distance learning and life-long education in chemistry. Its educational objectives are the familiarization of students with the equipment of a real chemical laboratory and the execution of virtual volumetric analysis experiments with the active participation of students.
Abstract: Chloride induced corrosion of steel reinforcement is
the main cause of deterioration of reinforced concrete marine
structures. This paper investigates the relative performance of
alternative repair options with respect to the deterioration of
reinforced concrete bridge elements in marine environments. Focus is
placed on the initiation phase of reinforcement corrosion. A
laboratory study is described which involved exposing concrete
samples to accelerated chloride-ion ingress. The study examined the
relative efficiencies of two repair methods, namely Ordinary Portland
Cement (OPC) concrete and a concrete which utilised Ground
Granulated Blastfurnace Cement (GGBS) as a partial cement
replacement. The mix designs and materials utilised were identical to
those implemented in the repair of a marine bridge on the South East
coast of Ireland in 2007. The results of this testing regime serve to
inform input variables employed in probabilistic modelling of
deterioration for subsequent reliability based analysis to compare the
relative performance of the studied repair options.
Abstract: SAD (Sum of Absolute Difference) algorithm is
heavily used in motion estimation which is computationally highly
demanding process in motion picture encoding. To enhance the
performance of motion picture encoding on a VLIW processor, an
efficient implementation of SAD algorithm on the VLIW processor is
essential. SAD algorithm is programmed as a nested loop with a
conditional branch. In VLIW processors, loop is usually optimized by
software pipelining, but researches on optimal scheduling of software
pipelining for nested loops, especially nested loops with conditional
branches are rare. In this paper, we propose an optimal scheduling and
implementation of SAD algorithm with conditional branch on a VLIW
DSP processor. The proposed optimal scheduling first transforms the
nested loop with conditional branch into a single loop with conditional
branch with consideration of full utilization of ILP capability of the
VLIW processor and realization of earlier escape from the loop. Next,
the proposed optimal scheduling applies a modulo scheduling
technique developed for single loop. Based on this optimal scheduling
strategy, optimal implementation of SAD algorithm on TMS320C67x,
a VLIW DSP is presented. Through experiments on TMS320C6713
DSK, it is shown that H.263 encoder with the proposed SAD
implementation performs better than other H.263 encoder with other
SAD implementations, and that the code size of the optimal SAD
implementation is small enough to be appropriate for embedded
environments.
Abstract: Wireless sensor networks (WSN) consists of many
sensor nodes that are placed on unattended environments such as
military sites in order to collect important information.
Implementing a secure protocol that can prevent forwarding forged
data and modifying content of aggregated data and has low delay
and overhead of communication, computing and storage is very
important. This paper presents a new protocol for concealed data
aggregation (CDA). In this protocol, the network is divided to
virtual cells, nodes within each cell produce a shared key to send
and receive of concealed data with each other. Considering to data
aggregation in each cell is locally and implementing a secure
authentication mechanism, data aggregation delay is very low and
producing false data in the network by malicious nodes is not
possible. To evaluate the performance of our proposed protocol, we
have presented computational models that show the performance
and low overhead in our protocol.
Abstract: Intelligent schools are those which use IT devices and
technologies as media software, hardware and networks to improve
learning process. On the other hand Strategic management is a field
that deals with the major intended and emergent initiatives taken by
general managers on behalf of owners, involving utilization of resources, to enhance the performance of firms in their external environments. Here, we present a model Strategic Management System that has been applied on some schools and have made strict
improvement.
Abstract: According to the new developments in the field of information and communication technologies, the necessity arises for active use of these new technologies in education. It is clear that the integration of technology in education system will be different for primary-higher education or traditional- distance education. In this study, the subject of the integration of technology for distance education was discussed. The subject was taken from the viewpoint of students. With using the information of student feedback about education program in which new technological medias are used, how can survey variables can be separated into the factors as positive, negative and supporter and how can be redesigned education strategy of the higher education associations with the examining the variables of each determinated factor is explained. The paper concludes with the recommendations about the necessitity of working as a group of different area experts and using of numerical methods in establishing of education strategy to be successful.
Abstract: In this paper, we consider the analysis of the
acquisition process for a hybrid double-dwell system with antenna
diversity for DS-CDMA (direct sequence-code division multiple
access) using an adaptive threshold. Acquisition systems with a fixed
threshold value are unable to adapt to fast varying mobile
communications environments and may result in a high false alarm
rate, and/or low detection probability. Therefore, we propose an
adaptively varying threshold scheme through the use of a cellaveraging
constant false alarm rate (CA-CFAR) algorithm, which is
well known in the field of radar detection. We derive exact
expressions for the probabilities of detection and false alarm in
Rayleigh fading channels. The mean acquisition time of the system
under consideration is also derived. The performance of the system is
analyzed and compared to that of a hybrid single dwell system.
Abstract: The following study aims to outline, whether the
perceptions of entrepreneurs about their entrepreneurial activities and
the underlying meanings of their activities are universal or whether
they vary systematically across cultures. In contrast to previous
studies, the phenomenographical approach and the resulting findings
of this study provide new insights into what constitutes
entrepreneurship by drawing an inference from the perceptions of
entrepreneurs in the United States and in Germany. Culture is shown
to have an important impact on entrepreneurship, since the
underlying meanings of entrepreneurship vary significantly among
the two sample groups. Furthermore, the study sheds more light on
the culturally contingent 'why' of entrepreneurship by looking at the
internal motivations of individuals instead of exclusively focusing on
character traits or external influences of the respective economic
environments.
Abstract: Frequency domain independent component analysis has
a scaling indeterminacy and a permutation problem. The scaling
indeterminacy can be solved by use of a decomposed spectrum. For
the permutation problem, we have proposed the rules in terms of gain
ratio and phase difference derived from the decomposed spectra and
the source-s coarse directions.
The present paper experimentally clarifies that the gain ratio and
the phase difference work effectively in a real environment but their
performance depends on frequency bands, a microphone-space and
a source-microphone distance. From these facts it is seen that it is
difficult to attain a perfect solution for the permutation problem in a
real environment only by either the gain ratio or the phase difference.
For the perfect solution, this paper gives a solution to the problems
in a real environment. The proposed method is simple, the amount of
calculation is small. And the method has high correction performance
without depending on the frequency bands and distances from source
signals to microphones. Furthermore, it can be applied under the real
environment. From several experiments in a real room, it clarifies
that the proposed method has been verified.
Abstract: This paper proposes a Wavelength Division
Multiplexing (WDM) technology based Storage Area Network
(SAN) for all type of Disaster recovery operation. It considers
recovery when all paths failure in the network as well as the main
SAN site failure also the all backup sites failure by the effect of
natural disasters such as earthquakes, fires and floods, power outage,
and terrorist attacks, as initially SAN were designed to work within
distance limited environments[2]. Paper also presents a NEW PATH
algorithm when path failure occurs. The simulation result and
analysis is presented for the proposed architecture with performance
consideration.