Abstract: One of the most important secrets of succesful companies is the fact that cooperation with NGOs will create a good reputation for them so that they can be immunized to economic crisis. The performance of the most admired companies in the world based on the ratings of Forbes and Fortune show us that most of these firms also have close relationships with their NGOs. Today, if companies do something wrong this information spreads very quickly to do the society. If people do not like the activities of a company, it can find itself in public relations nightmare that can threaten its repuation. Since the cost of communication has dropped dramatically due to the vast use of internet, the increase in communication among stakeholders via internet makes companies more visible. These multiple and interdependent interactions among the network of stakeholders is called as the network relationships. NGOs play the role of catalyst among the stakeholders of a firm to enhance the awareness. Succesful firms are aware of this fact that NGOs have a central role in today-s business world. Firms are also aware of the fact that they can enhance their corporate reputation via cooperation with the NGOs. This fact will be illustrated in this paper by examining some of the actions of the most succesful companies in terms of their cooperations with the NGOs.
Abstract: The objective of this research intends to create a suitable model of distance training for community leaders in the upper northeastern region of Thailand. The implementation of the research process is divided into four steps: The first step is to analyze relevant documents. The second step deals with an interview in depth with experts. The third step is concerned with constructing a model. And the fourth step takes aim at model validation by expert assessments. The findings reveal the two important components for constructing an appropriate model of distance training for community leaders in the upper northeastern region. The first component consists of the context of technology management, e.g., principle, policy and goals. The second component can be viewed in two ways. Firstly, there are elements comprising input, process, output and feedback. Secondly, the sub-components include steps and process in training. The result of expert assessments informs that the researcher-s constructed model is consistent and suitable and overall the most appropriate.
Abstract: In this study the integration of an absorption heat
pump (AHP) with the concentration section of an industrial pulp and
paper process is investigated using pinch technology. The optimum
design of the proposed water-lithium bromide AHP is then achieved
by minimizing the total annual cost. A comprehensive optimization is
carried out by relaxation of all stream pressure drops as well as heat
exchanger areas involving in AHP structure. It is shown that by
applying genetic algorithm optimizer, the total annual cost of the
proposed AHP is decreased by 18% compared to one resulted from
simulation.
Abstract: This paper describes a low-power second-order filter
for a continuous-time chopper stabilized capacitive sensor interface,
integrated with a fully differential post-CMOS surface-micromachined
MEMS pressure sensor. The circuit uses a single-ended
folded-cascode operational amplifier and two GM-C filters connected
in cascade. The circuit is realized in a 0.18 μm CMOS process and
offers differential to single-ended conversion. The novelty of the
scheme is the cascade of two GM-C filters to achieve a second-order
filter while minimizing power dissipation. The simulated filter cutoff
frequency is 1.14 kHz at common-mode voltage 1.65 V,
operating from a 3.3 V supply while dissipating 172μW of power.
The filter achieves an operating range of 1V for an output load of
1MOhm and 10pF.
Abstract: We develop a three-step fuzzy logic-based algorithm for clustering categorical attributes, and we apply it to analyze cultural data. In the first step the algorithm employs an entropy-based clustering scheme, which initializes the cluster centers. In the second step we apply the fuzzy c-modes algorithm to obtain a fuzzy partition of the data set, and the third step introduces a novel cluster validity index, which decides the final number of clusters.
Abstract: The paper is concerned with the existence of solution
of nonlinear second order neutral stochastic differential inclusions
with infinite delay in a Hilbert Space. Sufficient conditions for the
existence are obtained by using a fixed point theorem for condensing
maps.
Abstract: Question answering (QA) aims at retrieving precise information from a large collection of documents. Most of the Question Answering systems composed of three main modules: question processing, document processing and answer processing. Question processing module plays an important role in QA systems to reformulate questions. Moreover answer processing module is an emerging topic in QA systems, where these systems are often required to rank and validate candidate answers. These techniques aiming at finding short and precise answers are often based on the semantic relations and co-occurrence keywords. This paper discussed about a new model for question answering which improved two main modules, question processing and answer processing which both affect on the evaluation of the system operations. There are two important components which are the bases of the question processing. First component is question classification that specifies types of question and answer. Second one is reformulation which converts the user's question into an understandable question by QA system in a specific domain. The objective of an Answer Validation task is thus to judge the correctness of an answer returned by a QA system, according to the text snippet given to support it. For validating answers we apply candidate answer filtering, candidate answer ranking and also it has a final validation section by user voting. Also this paper described new architecture of question and answer processing modules with modeling, implementing and evaluating the system. The system differs from most question answering systems in its answer validation model. This module makes it more suitable to find exact answer. Results show that, from total 50 asked questions, evaluation of the model, show 92% improving the decision of the system.
Abstract: Knowledge management (KM) is generally
considered to be a positive process in an organisation, facilitating
opportunities to achieve competitive advantage via better quality
information handling, compilation of expert know-how and rapid
response to fluctuations in the business environment. The KM
paradigm as portrayed in the literature informs the processes that can
increase intangible assets so that corporate knowledge is preserved.
However, in some instances, knowledge management exists in a
universe of dynamic tension among the conflicting needs to respect
privacy and intellectual property (IP), to guard against data theft, to
protect national security and to stay within the laws. While the
Knowledge Management literature focuses on the bright side of the
paradigm, there is also a different side in which knowledge is
distorted, suppressed or misappropriated due to personal or
organisational motives (the paradox). This paper describes the ethical
paradoxes that occur within the taxonomy and deontology of
knowledge management and suggests that recognising both the
promises and pitfalls of KM requires wisdom.
Abstract: During the process of compaction in Hot-Mix Asphalt
(HMA) mixtures, the distance between aggregate particles decreases
as they come together and eliminate air-voids. By measuring the
inter-particle distances in a cut-section of a HMA sample the degree
of compaction can be estimated. For this, a calibration curve is
generated by computer simulation technique when the gradation and
asphalt content of the HMA mixture are known. A two-dimensional
cross section of HMA specimen was simulated using the mixture
design information (gradation, asphalt content and air-void content).
Nearest neighbor distance methods such as Delaunay triangulation
were used to study the changes in inter-particle distance and area
distribution during the process of compaction in HMA. Such
computer simulations would enable making several hundreds of
repetitions in a short period of time without the necessity to compact
and analyze laboratory specimens in order to obtain good statistics on
the parameters defined. The distributions for the statistical
parameters based on computer simulations showed similar trends as
those of laboratory specimens.
Abstract: In this work, a characterization and modeling of
packet loss of a Voice over Internet Protocol (VoIP) communication
is developed. The distributions of the number of consecutive received
and lost packets (namely gap and burst) are modeled from the
transition probabilities of two-state and four-state model.
Measurements show that both models describe adequately the burst
distribution, but the decay of gap distribution for non-homogeneous
losses is better fit by the four-state model. The respective
probabilities of transition between states for each model were
estimated with a proposed algorithm from a set of monitored VoIP
calls in order to obtain representative minimum, maximum and
average values for both models.
Abstract: In this paper, enhanced ground proximity warning simulation and validation system is designed and implemented. First, based on square grid and sub-grid structure, the global digital terrain database is designed and constructed. Terrain data searching is implemented through querying the latitude and longitude bands and separated zones of global terrain database with the current aircraft position. A combination of dynamic scheduling and hierarchical scheduling is adopted to schedule the terrain data, and the terrain data can be read and delete dynamically in the memory. Secondly, according to the scope, distance, approach speed information etc. to the dangerous terrain in front, and using security profiles calculating method, collision threat detection is executed in real-time, and provides caution and warning alarm. According to this scheme, the implementation of the enhanced ground proximity warning simulation system is realized. Simulations are carried out to verify a good real-time in terrain display and alarm trigger, and the results show simulation system is realized correctly, reasonably and stable.
Abstract: People have always needed to believe in some
supernatural power, which could explain nature phenomena.
Different kinds of religions like Christianity, Hinduism, Islam,
Buddhism have thought believers in all world, how to behave
themselves. We think the most important role of religion in modern
society most important role of religion in modern society is safety of
the People. World and traditional religion played a prominent role in
the socio-cultural progress, and in the development of man as a
spiritual being. At the heart of religious morals the belief in god and
responsibility before it lies and specifies religious and ethical values
and categories . The religion is based on ethical standards historically
developed by society, requirements and concepts, but it puts all
social and moral relations of the person in dependence on religious
values. For everything that the believer makes on a debt or a duty, he
bears moral responsibility before conscience, people and god. The
concept of value of religious morals takes the central place because
the religion from all forms of public consciousness most values is
painted as it is urged to answer vital questions. Any religion not only
considers questions of creation of the world, sense of human
existence, relationship of god and the person, but also offers the
ethical concept, develops rules of behavior of people. The religion a
long time dominated in the history of culture, and during this time
created a set of cultural and material values. The identity of Kazakh
culture can be defined as a Cultural identity traditional ,national
identity and the identity values developed by Kazakh people in
process of cultural-historical development, promoting formation of
Kazakh culture identity on public consciousness. Identity is the
historical process but always the tradition exists in it as a component
of stability, as a component of self that what this identity formed .
Abstract: Entrepreneurship has become an important and
extensively researched concept in business studies. Research on
foreign direct investment (FDI) has become widespread due to the
growth of FDI and its importance in globalization. Most
entrepreneurship studies examined the importance and influence of
entrepreneurial orientation in a micro-level context. On the other
hand, studies and research concerning FDI used statistical techniques
to analyze the effect, determinants, and motives of FDI on a
macroeconomic level, ignoring empirical studies on other noneconomic
determinants. In order to bridge the gap between the theory
and empirical evidence on FDI and the theory and research on
entrepreneurship, this study examines the impact of entrepreneurship
on inward foreign direct investment. The relationship between
entrepreneurship and foreign direct investment is investigated
through regression analysis of pooled time-series and cross-sectional
data. The results suggest that entrepreneurship has a significant effect
on FDI.
Abstract: This paper presents an economic game for sybil
detection in a distributed computing environment. Cost parameters
reflecting impacts of different sybil attacks are introduced in the sybil
detection game. The optimal strategies for this game in which both
sybil and non-sybil identities are expected to participate are devised.
A cost sharing economic mechanism called Discriminatory
Rewarding Mechanism for Sybil Detection is proposed based on this
game. A detective accepts a security deposit from each active agent,
negotiates with the agents and offers rewards to the sybils if the latter
disclose their identity. The basic objective of the detective is to
determine the optimum reward amount for each sybil which will
encourage the maximum possible number of sybils to reveal
themselves. Maintaining privacy is an important issue for the
mechanism since the participants involved in the negotiation are
generally reluctant to share their private information. The mechanism
has been applied to Tor by introducing a reputation scoring function.
Abstract: In this paper, an automatic determination algorithm for nuclear magnetic resonance (NMR) spectra of the metabolites in the living body by magnetic resonance spectroscopy (MRS) without human intervention or complicated calculations is presented. In such method, the problem of NMR spectrum determination is transformed into the determination of the parameters of a mathematical model of the NMR signal. To calculate these parameters efficiently, a new model called modified Hopfield neural network is designed. The main achievement of this paper over the work in literature [30] is that the speed of the modified Hopfield neural network is accelerated. This is done by applying cross correlation in the frequency domain between the input values and the input weights. The modified Hopfield neural network can accomplish complex dignals perfectly with out any additinal computation steps. This is a valuable advantage as NMR signals are complex-valued. In addition, a technique called “modified sequential extension of section (MSES)" that takes into account the damping rate of the NMR signal is developed to be faster than that presented in [30]. Simulation results show that the calculation precision of the spectrum improves when MSES is used along with the neural network. Furthermore, MSES is found to reduce the local minimum problem in Hopfield neural networks. Moreover, the performance of the proposed method is evaluated and there is no effect on the performance of calculations when using the modified Hopfield neural networks.
Abstract: Pressure waves and Water Hammer occur in a
pumping system when valves are closed or opened suddenly or in
the case of sudden failure of pumps. Determination of maximum
water hammer is considered one of the most important technical
and economical items of which engineers and designers of
pumping stations and conveyance pipelines should take care.
Hammer Software is a recent application used to simulate water
hammer. The present study focuses on determining significance of
each input parameter of the application relative to the maximum
amount of water hammer estimated by the software. The study
determines estimated maximum water hammer variations due to
variations of input parameters including water temperature, pipe
type, thickness and diameter, electromotor rpm and power, and
moment of inertia of electromotor and pump. In our study,
Kuhrang Pumping Station was modeled using WaterGEMS
Software. The pumping station is characterized by total discharge
of 200 liters per second, dynamic height of 194 meters and 1.5
kilometers of steel conveyance pipeline and transports water to
Cheshme Morvarid for farmland irrigation. The model was run in
steady hydraulic condition and transferred to Hammer Software.
Then, the model was run in several unsteady hydraulic conditions
and sensitivity of maximum water hammer to each input parameter
was calculated. It is shown that parameters to which maximum
water hammer is most sensitive are moment of inertia of pump and
electromotor, diameter, type and thickness of pipe and water
temperature, respectively.
Abstract: In this work we study the effect of several covariates X on a censored response variable T with unknown probability distribution. In this context, most of the studies in the literature can be located in two possible general classes of regression models: models that study the effect the covariates have on the hazard function; and models that study the effect the covariates have on the censored response variable. Proposals in this paper are in the second class of models and, more specifically, on least squares based model approach. Thus, using the bootstrap estimate of the bias, we try to improve the estimation of the regression parameters by reducing their bias, for small sample sizes. Simulation results presented in the paper show that, for reasonable sample sizes and censoring levels, the bias is always smaller for the new proposals.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.
Abstract: Coal tar is a liquid by-product of the process of coal
gasification and carbonation. This liquid oil mixture contains various
kinds of useful compounds such as phenol, o-cresol, and p-cresol.
These compounds are widely used as raw material for insecticides,
dyes, medicines, perfumes, coloring matters, and many others.
This research needed to be done that given the optimum conditions
for the separation of phenol, o-cresol, and p-cresol from the coal tar
by solvent extraction process. The aim of the present work was to
study the effect of two kinds of aqueous were used as solvents:
methanol and acetone solutions, the effect of temperature (298, 306,
and 313K) and mixing (30, 35, and 40rpm) for the separation of
phenol, o-cresol, and p-cresol from coal tar by solvent extraction.
Results indicated that phenol, o-cresol, and p-cresol in coal tar
were selectivity extracted into the solvent phase and these
components could be separated by solvent extraction. The aqueous
solution of methanol, mass ratio of solvent to feed, Eo/Ro=1,
extraction temperature 306K and mixing 35 rpm were the most
efficient for extraction of phenol, o-cresol, and p-cresol from coal tar.
Abstract: The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.