Abstract: Procurement is an important component in the field of
operating resource management and e-procurement is the golden key
to optimizing the supply chains system. Global firms are optimistic
on the level of savings that can be achieved through full
implementation of e-procurement strategies. E-procurement is an
Internet-based business process for obtaining materials and services
and managing their inflow into the organization. In this paper, the
subjects of supply chains and e-procurement and its benefits to
organizations have been studied. Also, e-procurement in construction
and its drivers and barriers have been discussed and a framework of
supplier selection in an e-procurement environment has been
demonstrated. This paper also has addressed critical success factors
in adopting e-procurement in supply chains.
Abstract: This paper presents a practical scheme that can be used for allocating the transmission loss to generators and loads. In this scheme first the share of a generator or load on the current through a branch is determined using Z-bus modified matrix. Then the current components are decomposed and the branch loss allocation is obtained. A motivation of proposed scheme is to improve the results of Z-bus method and to reach more fair allocation. The proposed scheme has been implemented and tested on several networks. To achieve practical and applicable results, the proposed scheme is simulated and compared on the transmission network (400kv) of Khorasan region in Iran and the 14-bus standard IEEE network. The results show that the proposed scheme is comprehensive and fair to allocating the energy losses of a power market to its participants.
Abstract: Increasing growth of information volume in the
internet causes an increasing need to develop new (semi)automatic
methods for retrieval of documents and ranking them according to
their relevance to the user query. In this paper, after a brief review
on ranking models, a new ontology based approach for ranking
HTML documents is proposed and evaluated in various
circumstances. Our approach is a combination of conceptual,
statistical and linguistic methods. This combination reserves the
precision of ranking without loosing the speed. Our approach
exploits natural language processing techniques for extracting
phrases and stemming words. Then an ontology based conceptual
method will be used to annotate documents and expand the query.
To expand a query the spread activation algorithm is improved so
that the expansion can be done in various aspects. The annotated
documents and the expanded query will be processed to compute
the relevance degree exploiting statistical methods. The outstanding
features of our approach are (1) combining conceptual, statistical
and linguistic features of documents, (2) expanding the query with
its related concepts before comparing to documents, (3) extracting
and using both words and phrases to compute relevance degree, (4)
improving the spread activation algorithm to do the expansion based
on weighted combination of different conceptual relationships and
(5) allowing variable document vector dimensions. A ranking
system called ORank is developed to implement and test the
proposed model. The test results will be included at the end of the
paper.
Abstract: In this work we present some matrix operators named
circulant operators and their action on square matrices. This study on
square matrices provides new insights into the structure of the space
of square matrices. Moreover it can be useful in various fields as in
agents networking on Grid or large-scale distributed self-organizing
grid systems.
Abstract: In this work, a radial basis function (RBF) neural network is developed for the identification of hyperbolic distributed parameter systems (DPSs). This empirical model is based only on process input-output data and used for the estimation of the controlled variables at specific locations, without the need of online solution of partial differential equations (PDEs). The nonlinear model that is obtained is suitably transformed to a nonlinear state space formulation that also takes into account the model mismatch. A stable robust control law is implemented for the attenuation of external disturbances. The proposed identification and control methodology is applied on a long duct, a common component of thermal systems, for a flow based control of temperature distribution. The closed loop performance is significantly improved in comparison to existing control methodologies.
Abstract: In this paper, by using Mawhin-s continuation theorem of coincidence degree and a method based on delay differential inequality, some sufficient conditions are obtained for the existence and global exponential stability of periodic solutions of cellular neural networks with distributed delays and impulses on time scales. The results of this paper generalized previously known results.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Abstract: This paper presents an automatic feature recognition
method based on center-surround difference detecting and fuzzy logic
that can be applied in ground-penetrating radar (GPR) image
processing. Adopted center-surround difference method, the salient
local image regions are extracted from the GPR images as features of
detected objects. And fuzzy logic strategy is used to match the
detected features and features in template database. This way, the
problem of objects detecting, which is the key problem in GPR image
processing, can be converted into two steps, feature extracting and
matching. The contributions of these skills make the system have the
ability to deal with changes in scale, antenna and noises. The results of
experiments also prove that the system has higher ratio of features
sensing in using GPR to image the subsurface structures.
Abstract: Single nucleotide polymorphisms (SNPs) hold much promise as a basis for disease-gene association. However, research is limited by the cost of genotyping the tremendous number of SNPs. Therefore, it is important to identify a small subset of informative SNPs, the so-called tag SNPs. This subset consists of selected SNPs of the genotypes, and accurately represents the rest of the SNPs. Furthermore, an effective evaluation method is needed to evaluate prediction accuracy of a set of tag SNPs. In this paper, a genetic algorithm (GA) is applied to tag SNP problems, and the K-nearest neighbor (K-NN) serves as a prediction method of tag SNP selection. The experimental data used was taken from the HapMap project; it consists of genotype data rather than haplotype data. The proposed method consistently identified tag SNPs with considerably better prediction accuracy than methods from the literature. At the same time, the number of tag SNPs identified was smaller than the number of tag SNPs in the other methods. The run time of the proposed method was much shorter than the run time of the SVM/STSA method when the same accuracy was reached.
Abstract: The potential of economically cheaper cellulose
containing natural materials like rice husk was assessed for nickel
adsorption from aqueous solutions. The effects of pH, contact time,
sorbent dose, initial metal ion concentration and temperature on the
uptake of nickel were studied in batch process. The removal of nickel
was dependent on the physico-chemical characteristics of the
adsorbent, adsorbate concentration and other studied process
parameters. The sorption data has been correlated with Langmuir,
Freundlich and Dubinin-Radush kevich (D-R) adsorption models. It
was found that Freundlich and Langmuir isotherms fitted well to the
data. Maximum nickel removal was observed at pH 6.0. The
efficiency of rice husk for nickel removal was 51.8% for dilute
solutions at 20 g L-1 adsorbent dose. FTIR, SEM and EDAX were
recorded before and after adsorption to explore the number and
position of the functional groups available for nickel binding on to
the studied adsorbent and changes in surface morphology and
elemental constitution of the adsorbent. Pseudo-second order model
explains the nickel kinetics more effectively. Reusability of the
adsorbent was examined by desorption in which HCl eluted 78.93%
nickel. The results revealed that nickel is considerably adsorbed on
rice husk and it could be and economic method for the removal of
nickel from aqueous solutions.
Abstract: Since polymerase chain reaction (PCR) has been
invented, it has emerged as a powerful tool in genetic analysis. The
PCR products are closely linked with thermal cycles. Therefore, to
reduce the reaction time and make temperature distribution uniform in
the reaction chamber, a novel oscillatory thermal cycler is designed.
The sample is placed in a fixed chamber, and three constant isothermal
zones are established and lined in the system. The sample is oscillated
and contacted with three different isothermal zones to complete
thermal cycles. This study presents the design of the geometric
characteristics of the chamber. The commercial software
CFD-ACE+TM is utilized to investigate the influences of various
materials, heating times, chamber volumes, and moving speed of the
chamber on the temperature distributions inside the chamber. The
chamber moves at a specific velocity and the boundary conditions
with time variations are related to the moving speed. Whereas the
chamber moves, the boundary is specified at the conditions of the
convection or the uniform temperature. The user subroutines compiled
by the FORTRAN language are used to make the numerical results
realistically. Results show that the reaction chamber with a rectangular
prism is heated on six faces; the effects of various moving speeds of
the chamber on the temperature distributions are examined. Regarding
to the temperature profiles and the standard deviation of the
temperature at the Y-cut cross section, the non-uniform temperature
inside chamber is found as the moving speed is larger than 0.01 m/s.
By reducing the heating faces to four, the standard deviation of the
temperature of the reaction chamber is under 1.4×10-3K with the range
of velocities between 0.0001 m/s and 1 m/s. The nature convective
boundary conditions are set at all boundaries while the chamber moves
between two heaters, the effects of various moving velocities of the
chamber on the temperature distributions are negligible at the assigned
time duration.
Abstract: Traffic enforcement units (the Police) are partly
responsible for the severity and frequency of the traffic accidents via
the effectiveness of their safety measures. The Police claims that the
reductions in accidents and their severities occur largely by their
timely interventions at the black spots, through traffic management
or temporary changes in the road design (guiding, reducing speeds
and eliminating sight obstructions, etc.). Yet, some other external
factors than the Police measures may intervene into which such
claims require a statistical confirmation. In order to test the net
impact of the Police contribution in the reduction of the number of
crashes, Chi square test was applied for 25 spots (streets and
intersections) and an average evaluation was achieved for general
conclusion in the case study of Izmir city. Separately, the net impact
of economic crisis in the reduction of crashes is assessed by the
trend analysis for the case of the economic crisis with the probable
reduction effects on the trip generation or modal choice. Finally, it
was proven that the Police measures were effective to some degree as
they claimed, though the economic crisis might have only negligible
contribution to the reductions in the same period observed.
Abstract: Serial Analysis of Gene Expression is a powerful
quantification technique for generating cell or tissue gene expression
data. The profile of the gene expression of cell or tissue in several
different states is difficult for biologists to analyze because of the large
number of genes typically involved. However, feature selection in
machine learning can successfully reduce this problem. The method
allows reducing the features (genes) in specific SAGE data, and
determines only relevant genes. In this study, we used a genetic
algorithm to implement feature selection, and evaluate the
classification accuracy of the selected features with the K-nearest
neighbor method. In order to validate the proposed method, we used
two SAGE data sets for testing. The results of this study conclusively
prove that the number of features of the original SAGE data set can be
significantly reduced and higher classification accuracy can be
achieved.
Abstract: The wisest economic decision of United States in the
20th century was establishing the favorable international monetary
system, and capturing the leadership position in it. This decision gave
economic hegemony to the US for the next more than 7 decades. The
continuation of this hegemony till the next decade seems difficult as
the US economy is under continuous streams of recessions since
2007. On the other hand, Chinese economy is progressing with a
very fast speed and is estimated to pass the US economy till 2025, in
various aspects. Will the US be able to continue its leadership in the
IMS? Will China replace US in the international monetary system?
The answers to these questions have been explored by comparing the
economic competitiveness of US and China, with respect to each
other. The paper concludes that the change in global economic
environment will compel US to share the leadership of international
monetary system with China. This sharing will solve most problems
of the current IMS, but will also birth some new problems.
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: A considerable progress has been achieved in transient
stability analysis (TSA) with various FACTS controllers. But, all
these controllers are associated with single transmission line. This
paper is intended to discuss a new approach i.e. a multi-line FACTS
controller which is interline power flow controller (IPFC) for TSA of
a multi-machine power system network. A mathematical model of
IPFC, termed as power injection model (PIM) presented and this
model is incorporated in Newton-Raphson (NR) power flow
algorithm. Then, the reduced admittance matrix of a multi-machine
power system network for a three phase fault without and with IPFC
is obtained which is required to draw the machine swing curves. A
general approach based on L-index has also been discussed to find
the best location of IPFC to reduce the proximity to instability of a
power system. Numerical results are carried out on two test systems
namely, 6-bus and 11-bus systems. A program in MATLAB has
been written to plot the variation of generator rotor angle and speed
difference curves without and with IPFC for TSA and also a simple
approach has been presented to evaluate critical clearing time for test
systems. The results obtained without and with IPFC are compared
and discussed.
Abstract: Cognitive radio devices have been considered as a key technology for next-generation of wireless communication. These devices in the context of IEEE 802.11 standards and IEEE 802.16 standards, can opportunistically utilize the wireless spectrum to achieve better user performance and improve the overall spectrumutilization efficiency, mainly in the unlicensed 5 GHz bands. However, opportunistic use of wireless spectrum creates news problems such as peaceful coexistence with other wireless technologies, such as the radiolocation systems, as well as understanding the influence of interference that each of these networks can create. In this paper, we suggest a dynamic access model that considerably reduces this interference and allows efficiency and fairness use of the wireless spectrum.
Abstract: This paper presents the theoretical background and
the real implementation of an automated computer system to
introduce machine vision in flower, fruit and vegetable processing
for recollection, cutting, packaging, classification, or fumigation
tasks. The considerations and implementation issues presented in this
work can be applied to a wide range of varieties of flowers, fruits and
vegetables, although some of them are especially relevant due to the
great amount of units that are manipulated and processed each year
over the world. The computer vision algorithms developed in this
work are shown in detail, and can be easily extended to other
applications. A special attention is given to the electromagnetic
compatibility in order to avoid noisy images. Furthermore, real
experimentation has been carried out in order to validate the
developed application. In particular, the tests show that the method
has good robustness and high success percentage in the object
characterization.
Abstract: Innovation is more important in any companies.
However, it is not easy to measure the innovation performance
correctly. Patent is one of measuring index nowadays. This paper
wants to purpose an approach for valuing patents based on market
reaction to patent infringement litigations. The interesting
phenomenon is found from collection of patent infringement litigation
events. That is if any patent litigation event occurs the stock value will
follow changing. The plaintiffs- stock value raises some percentage.
According to this interesting phenomenon, the relationship between
patent litigation and stock value is tested and verified. And then, the
stock value variation is used to deduce the infringed patents- value.
The purpose of this study is providing another concept model to
evaluate the infringed patents. This study can provide a decision assist
system to help drafting patent litigation strategy and determine the
technology value