Abstract: In this paper, the three species food chain model on time scales is established. The Monod–Haldane functional response and time delay are considered. With the help of coincidence degree theory, existence of periodic solutions is investigated, which unifies the continuous and discrete analogies.
Abstract: An effective supplier selection process is very important to the success of any manufacturing organization. The main objective of supplier selection process is to reduce purchase risk, maximize overall value to the purchaser, and develop closeness and long-term relationships between buyers and suppliers in today’s competitive industrial scenario. The literature on supplier selection criteria and methods is full of various analytical and heuristic approaches. Some researchers have developed hybrid models by combining more than one type of selection methods. It is felt that supplier selection criteria and method is still a critical issue for the manufacturing industries therefore in the present paper the literature has been thoroughly reviewed and critically analyzed to address the issue.
Abstract: Signature amortization schemes have been introduced
for authenticating multicast streams, in which, a single signature is
amortized over several packets. The hash value of each packet is
computed, some hash values are appended to other packets, forming
what is known as hash chain. These schemes divide the stream into
blocks, each block is a number of packets, the signature packet in
these schemes is either the first or the last packet of the block.
Amortization schemes are efficient solutions in terms of computation
and communication overhead, specially in real-time environment.
The main effictive factor of amortization schemes is it-s hash chain
construction. Some studies show that signing the first packet of each
block reduces the receiver-s delay and prevents DoS attacks, other
studies show that signing the last packet reduces the sender-s delay.
To our knowledge, there is no studies that show which is better, to
sign the first or the last packet in terms of authentication probability
and resistance to packet loss.
In th is paper we will introduce another scheme for authenticating
multicast streams that is robust against packet loss, reduces the
overhead, and prevents the DoS attacks experienced by the receiver
in the same time. Our scheme-The Multiple Connected Chain signing
the First packet (MCF) is to append the hash values of specific
packets to other packets,then append some hashes to the signature
packet which is sent as the first packet in the block. This scheme
is aspecially efficient in terms of receiver-s delay. We discuss and
evaluate the performance of our proposed scheme against those that
sign the last packet of the block.
Abstract: Collaborative planning, forecasting and
replenishment (CPFR) coordinates the various supply chain
management activities including production and purchase planning,
demand forecasting and inventory replenishment between supply
chain trading partners. This study proposes a systematic way of
analyzing CPFR supporting factors using fuzzy cognitive map
(FCM) approach. FCMs have proven particularly useful for solving
problems in which a number of decision variables and
uncontrollable variables are causally interrelated. Hence the FCMs
of CPFR are created to show the relationships between the factors
that influence on effective implementation of CPFR in the supply
chain.
Abstract: Inferring the network structure from time series data
is a hard problem, especially if the time series is short and noisy.
DNA microarray is a technology allowing to monitor the mRNA
concentration of thousands of genes simultaneously that produces
data of these characteristics. In this study we try to investigate the
influence of the experimental design on the quality of the result.
More precisely, we investigate the influence of two different types of
random single gene perturbations on the inference of genetic networks
from time series data. To obtain an objective quality measure for
this influence we simulate gene expression values with a biologically
plausible model of a known network structure. Within this framework
we study the influence of single gene knock-outs in opposite to
linearly controlled expression for single genes on the quality of the
infered network structure.
Abstract: A high-performance Monte Carlo simulation, which
simultaneously takes diffusion-controlled and chain-length-dependent
bimolecular termination reactions into account, is developed to
simulate atom transfer radical copolymerization of styrene and nbutyl
acrylate. As expected, increasing initial feed fraction of styrene
raises the fraction of styrene-styrene dyads (fAA) and reduces that of
n-butyl acrylate dyads (fBB). The trend of variation in randomness
parameter (fAB) during the copolymerization also varies significantly.
Also, there is a drift in copolymer heterogeneity and the highest drift
occurs in the initial feeds containing lower percentages of styrene, i.e.
20% and 5%.
Abstract: A homologous series of aromatic esters, 4-nalkanoyloxybenzylidene-
4--bromoanilines, nABBA,
consisting of two 1,4-disubstituted phenyl cores and a Schiff
base central linkage was synthesized. All the members can be
differed by the number of carbon atoms at terminal
alkanoyloxy chain (CnH2n-1COO-, n = 2, 6, 18). The molecular
structure of nABBA was confirmed with infrared
spectroscopy, nuclear magnetic resonance (NMR)
spectroscopy and electron-ionization mass (EI-MS)
spectrometry. Mesomorphic properties were studied using
differential scanning calorimetry and polarizing optical
microscopy.
Abstract: In the highly competitive and rapidly changing global
marketplace, independent organizations and enterprises often come
together and form a temporary alignment of virtual enterprise in a
supply chain to better provide products or service. As firms adopt the
systems approach implicit in supply chain management, they must
manage the quality from both internal process control and external
control of supplier quality and customer requirements. How to
incorporate quality management of upstream and downstream supply
chain partners into their own quality management system has recently
received a great deal of attention from both academic and practice.
This paper investigate the collaborative feature and the entities-
relationship in a supply chain, and presents an ontology of
collaborative supply chain from an approach of aligning
service-oriented framework with service-dominant logic. This
perspective facilitates the segregation of material flow management
from manufacturing capability management, which provides a
foundation for the coordination and integration of the business process
to measure, analyze, and continually improve the quality of products,
services, and process. Further, this approach characterizes the different
interests of supply chain partners, providing an innovative approach to
analyze the collaborative features of supply chain. Furthermore, this
ontology is the foundation to develop quality management system
which internalizes the quality management in upstream and
downstream supply chain partners and manages the quality in supply
chain systematically.
Abstract: The importance of supply chain and logistics
management has been widely recognised. Effective management of
the supply chain can reduce costs and lead times and improve
responsiveness to changing customer demands. This paper proposes a
multi-matrix real-coded Generic Algorithm (MRGA) based
optimisation tool that minimises total costs associated within supply
chain logistics. According to finite capacity constraints of all parties
within the chain, Genetic Algorithm (GA) often produces infeasible
chromosomes during initialisation and evolution processes. In the
proposed algorithm, chromosome initialisation procedure, crossover
and mutation operations that always guarantee feasible solutions
were embedded. The proposed algorithm was tested using three sizes
of benchmarking dataset of logistic chain network, which are typical
of those faced by most global manufacturing companies. A half
fractional factorial design was carried out to investigate the influence
of alternative crossover and mutation operators by varying GA
parameters. The analysis of experimental results suggested that the
quality of solutions obtained is sensitive to the ways in which the
genetic parameters and operators are set.
Abstract: Machine tools are improved capacity remarkably during the 20th century. Improving the precision of machine tools are related with precision of products and accurate processing is always associated with the subject of interest. There are a lot of the elements that determine the precision of the machine, as guides, motors, structure, control, etc. In this paper we focused on the phenomenon that vertical movement system has worse precision than horizontal movement system even they were made up with same components. The vertical movement system needs to be studied differently from the horizontal movement system to develop its precision. The vertical movement system has load on its transfer direction and it makes the movement system weak in precision than the horizontal one. Some machines have mechanical counter balance, hydraulic or pneumatic counter balance to compensate the weight of the machine head. And there is several type of compensating the weight. It can push the machine head and also can use chain or wire lope to transfer the compensating force from counter balance to machine head. According to the type of compensating, there could be error from friction, pressure error of hydraulic or pressure control error. Also according to what to use for transferring the compensating force, transfer error of compensating force could be occur.
Abstract: The growth of open networks created the interest to
commercialise it. The establishment of an electronic business
mechanism must be accompanied by a digital – electronic payment
system to transfer the value of transactions. Financial organizations
are requested to offer a secure e-payment synthesis with equivalent
level of security served in conventional paper-based payment
transactions. PKI, which is functioning as a chain of trust in security
architecture, can enable security services of cryptography to epayments,
in order to take advantage of the wider base either of
customer or of trading partners and the reduction of cost transaction
achieved by the use of Internet channels. The paper addresses the
possibilities and the implementation suggestions of PKI in relevance
to electronic payments by suggesting a framework that should be
followed.
Abstract: The cuticular hydrocarbons of Pamphagus elephas
(Orthoptera: Pamphagidae) has been analysed by gas
chromatography and by combined gas chromatograph-mass
spectrometry. The following hydrocarbon classes have been
identified in insect cuticular hydrocarbons are: n-alkanes and
methylalkanes comprising Monomethyl-, dimethyl-and
trimethylalkanes. Sexual dimorphism is observed in long chain
alkanes (C24-C36) present on male and female. The cuticulars
hydrocarbons of P.elephas ranged from 24 to 36 carbons and
incluted n-alkanes, Dimethylalkanes and Trimethylalkanes. nalkanes
represented by (C24-C36,72,7% on male and 79,2% on
female), internally branched Monomethylalkanes identified were
(C25, C30-C32,C35-C37;11% on male and 9,4% on female),
Dimethylalkanes detected are (C31-C32, C36; 2,2% on male and
2,06% on female) and Trimethylalkanes detected are (C32, C36;
3,1% on male and 4, 97 on female). Larvae male and female (stage
7) showed the same quality of n-alkanes observed in adults.
However a difference quantity is noted.
Abstract: A new approach has been used for optimized design of multipliers based upon the concepts of Vedic mathematics. The design has been targeted to state-of-the art field-programmable gate arrays (FPGAs). The multiplier generates partial products using Vedic mathematics method by employing basic 4x4 multipliers designed by exploiting 6-input LUTs and multiplexers in the same slices resulting in drastic reduction in area. The multiplier is realized on Xilinx FPGAs using devices Virtex-5 and Virtex-6.Carry Chain Adder was employed to obtain final products. The performance of the proposed multiplier was examined and compared to well-known multipliers such as Booth, Carry Save, Carry ripple, and array multipliers. It is demonstrated that the proposed multiplier is superior in terms of speed as well as power consumption.
Abstract: The ε4 allele of the ε2, ε3 and ε4 protein isoform polymorphism in the gene encoding apolipoprotein E (Apo E) has previously been associated with increased cardiac artery disease (CAD); therefore to investigate the significance of this polymorphism in pathogenesis of CAD in Iranian patients with stenosis and control subjects. To investigate the association between
Apo E polymorphism and coronary artery disease we performed a comparative case control study of the frequency of Apo E
polymorphism in One hundred CAD patients with stenosis who underwent coronary angiography (>50% stenosis) and 100 control subjects (
Abstract: Because of the great advance in multimedia
technology, digital multimedia is vulnerable to malicious
manipulations. In this paper, a public key self-recovery block-based
video authentication technique is proposed which can not only
precisely localize the alteration detection but also recover the missing
data with high reliability. In the proposed block-based technique,
multiple description coding MDC is used to generate two codes (two
descriptions) for each block. Although one block code (one
description) is enough to rebuild the altered block, the altered block
is rebuilt with better quality by the two block descriptions. So using
MDC increases the ratability of recovering data. A block signature is
computed using a cryptographic hash function and a doubly linked
chain is utilized to embed the block signature copies and the block
descriptions into the LSBs of distant blocks and the block itself. The
doubly linked chain scheme gives the proposed technique the
capability to thwart vector quantization attacks. In our proposed
technique , anyone can check the authenticity of a given video using
the public key. The experimental results show that the proposed
technique is reliable for detecting, localizing and recovering the
alterations.
Abstract: Missing data yields many analysis challenges. In case of complex survey design, in addition to dealing with missing data, researchers need to account for the sampling design to achieve useful inferences. Methods for incorporating sampling weights in neural network imputation were investigated to account for complex survey designs. An estimate of variance to account for the imputation uncertainty as well as the sampling design using neural networks will be provided. A simulation study was conducted to compare estimation results based on complete case analysis, multiple imputation using a Markov Chain Monte Carlo, and neural network imputation. Furthermore, a public-use dataset was used as an example to illustrate neural networks imputation under a complex survey design
Abstract: It is well known that the channel capacity of Multiple-
Input-Multiple-Output (MIMO) system increases as the number of
antenna pairs between transmitter and receiver increases but it suffers
from multiple expensive RF chains. To reduce the cost of RF chains,
Antenna Selection (AS) method can offer a good tradeoff between
expense and performance. In a transmitting AS system, Channel
State Information (CSI) feedback is necessarily required to choose
the best subset of antennas in which the effects of delays and errors
occurred in feedback channels are the most dominant factors
degrading the performance of the AS method. This paper presents the
concept of AS method using CSI from channel reciprocity instead of
feedback method. Reciprocity technique can easily archive CSI by
utilizing a reverse channel where the forward and reverse channels
are symmetrically considered in time, frequency and location. In this
work, the capacity performance of MIMO system when using AS
method at transmitter with reciprocity channels is investigated by
own developing Testbed. The obtained results show that reciprocity
technique offers capacity close to a system with a perfect CSI and
gains a higher capacity than a system without AS method from 0.9 to
2.2 bps/Hz at SNR 10 dB.
Abstract: The hybridisation of genetic algorithm with heuristics has been shown to be one of an effective way to improve its performance. In this work, genetic algorithm hybridised with four heuristics including a new heuristic called neighbourhood improvement were investigated through the classical travelling salesman problem. The experimental results showed that the proposed heuristic outperformed other heuristics both in terms of quality of the results obtained and the computational time.
Abstract: In this work, a new approach is proposed to control
the manipulators for Humanoid robot. The kinematics of the
manipulators in terms of joint positions, velocity, acceleration and
torque of each joint is computed using the Denavit Hardenberg (D-H)
notations. These variables are used to design the manipulator control
system, which has been proposed in this work. In view of supporting
the development of a controller, a simulation of the manipulator is
designed for Humanoid robot. This simulation is developed through
the use of the Virtual Reality Toolbox and Simulink in Matlab. The
Virtual Reality Toolbox in Matlab provides the interfacing and
controls to an environment which is developed based on the Virtual
Reality Modeling Language (VRML). Chains of bones were used to
represent the robot.
Abstract: Contact centres have been exemplars of scientific management in the discipline of operations management for more than a decade now. With the movement of industries from a resource based economy to knowledge based economy businesses have started to realize the customer eccentricity being the key to sustainability amidst high velocity of the market. However, as technologies have converged and advanced, so have the contact centres. Contact Centres have redirected the supply chains and the concept of retailing is highly diminished due to over exaggeration of cost reduction strategies. In conditions of high environmental velocity together with services featuring considerable information intensity contact centres will require up to date and enlightened agents to satisfy the demands placed upon them by those requesting their services. In this paper we examine salient factors such as Power Distance, Knowledge structures and the dynamics of job specialisation and enlargement to suggest critical success factors in the domain of contact centres.