Abstract: Procurement is an important component in the field of
operating resource management and e-procurement is the golden key
to optimizing the supply chains system. Global firms are optimistic
on the level of savings that can be achieved through full
implementation of e-procurement strategies. E-procurement is an
Internet-based business process for obtaining materials and services
and managing their inflow into the organization. In this paper, the
subjects of supply chains and e-procurement and its benefits to
organizations have been studied. Also, e-procurement in construction
and its drivers and barriers have been discussed and a framework of
supplier selection in an e-procurement environment has been
demonstrated. This paper also has addressed critical success factors
in adopting e-procurement in supply chains.
Abstract: A reliable estimate of the average bond stress within
the anchorage of steel reinforcing bars in tension is critically
important for the design of reinforced concrete member. This paper
describes part of a recently completed experimental research program
in the Centre for Infrastructure Engineering and Safety (CIES) at the
University of New South Wales, Sydney, Australia aimed at
assessing the effects of different factors on the anchorage
requirements of modern high strength steel reinforcing bars. The
study found that an increase in the anchorage length and bar diameter
generally leads to a reduction of the average ultimate bond stress. By
the extension of a well established analytical model of bond and
anchorage, it is shown here that the differences in the average
ultimate bond stress for different anchorage lengths is associated with
the variable degree of plastic deformation in the tensile zone of the
concrete surrounding the bar.
Abstract: This paper addresses an efficient technique to embed and detect digital fingerprint code. Orthogonal modulation method is a straightforward and widely used approach for digital fingerprinting but shows several limitations in computational cost and signal efficiency. Coded modulation method can solve these limitations in theory. However it is difficult to perform well in practice if host signals are not available during tracing colluders, other kinds of attacks are applied, and the size of fingerprint code becomes large. In this paper, we propose a hybrid modulation method, in which the merits of or-thogonal modulation and coded modulation method are combined so that we can achieve low computational cost and high signal efficiency. To analyze the performance, we design a new fingerprint code based on GD-PBIBD theory and modulate this code into images by our method using spread-spectrum watermarking on frequency domain. The results show that the proposed method can efficiently handle large fingerprint code and trace colluders against averaging attacks.
Abstract: Full adders are important components in applications
such as digital signal processors (DSP) architectures and
microprocessors. In addition to its main task, which is adding two
numbers, it participates in many other useful operations such as
subtraction, multiplication, division,, address calculation,..etc. In
most of these systems the adder lies in the critical path that
determines the overall speed of the system. So enhancing the
performance of the 1-bit full adder cell (the building block of the
adder) is a significant goal.Demands for the low power VLSI have
been pushing the development of aggressive design methodologies to
reduce the power consumption drastically. To meet the growing
demand, we propose a new low power adder cell by sacrificing the
MOS Transistor count that reduces the serious threshold loss
problem, considerably increases the speed and decreases the power
when compared to the static energy recovery full (SERF) adder. So a
new improved 14T CMOS l-bit full adder cell is presented in this
paper. Results show 50% improvement in threshold loss problem,
45% improvement in speed and considerable power consumption
over the SERF adder and other different types of adders with
comparable performance.
Abstract: There are reports of gas and oil wells fire due to different accidents. Many different methods are used for fire fighting in gas and oil industry. Traditional fire extinguishing techniques are mostly faced with many problems and are usually time consuming and needs lots of equipments. Besides, they cause damages to facilities, and create health and environmental problems. This article proposes innovative approach in fire extinguishing techniques in oil and gas industry, especially applicable for burning oil wells located offshore. Fire extinguishment employing a turbojet is a novel approach which can help to extinguishment the fire in short period of time. Divergent and convergent turbojets modeled in laboratory scale along with a high pressure flame were used. Different experiments were conducted to determine the relationship between output discharges of trumpet and oil wells. The results were corrected and the relationship between dimensionless parameters of flame and fire extinguishment distances and also the output discharge of turbojet and oil wells in specified distances are demonstrated by specific curves.
Abstract: This paper proposes a method that discovers sequential patterns corresponding to user-s interests from sequential data. This method expresses the interests as constraint patterns. The constraint patterns can define relationships among attributes of the items composing the data. The method recursively decomposes the constraint patterns into constraint subpatterns. The method evaluates the constraint subpatterns in order to efficiently discover sequential patterns satisfying the constraint patterns. Also, this paper applies the method to the sequential data composed of stock price indexes and verifies its effectiveness through comparing it with a method without using the constraint patterns.
Abstract: Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Abstract: The problem of controlling a two link robotic manipulator, consisting of a rotating and a prismatic links, is addressed. The actuations of both links are assumed to have unknown dead zone nonlinearities and friction torques modeled by LuGre friction model. Because of the existence of the unknown dead zone and friction torque at the actuations, unknown parameters and unmeasured states would appear to be part of the overall system dynamics that need for estimation. Unmeasured states observer, unknown parameters estimators, and robust adaptive control laws have been derived such that closed loop global stability is achieved. Simulation results have been performed to show the efficacy of the suggested approach.
Abstract: The aim of this study is to discuss the relationship between tourist awareness of environmental issues and their own recreational behaviors in the Taipei Guandu Wetland. A total of 392 questionnaires were gathered for data analysis using descriptive statistics, t-testing, one-way analysis of variance (ANOVA) and least significant difference (LSD) post hoc comparisons. The results showed that most of the visitors there enjoying the beautiful scenery are 21 to 30 years old with a college education. The means and standard deviations indicate that tourists express a positive degree of cognition of environmental issues and recreational behaviors. They suggest that polluting the environment is harmful to the natural ecosystem and that the natural resources of ecotourism are fragile, as well as expressing a high degree of recognition of the need to protect wetlands. Most of respondents are cognizant of the regulations proposed by the Guandu Wetland administration which asks that users exercise self-control and follow recommended guidelines when traveling the wetland. There were significant differences in the degree of cognition related to the variables of age, number of visits and reasons for visiting. We found that most respondents with relatively high levels of education would like to learn more about the wetland and are supportive of its conservation.
Abstract: We address the problem of joint beamforming and multipath channel parameters estimation in Wideband Code Division Multiple Access (WCDMA) communication systems that employ Multiple-Access Interference (MAI) suppression techniques in the uplink (from mobile to base station). Most of the existing schemes rely on time multiplex a training sequence with the user data. In WCDMA, the channel parameters can also be estimated from a code multiplexed common pilot channel (CPICH) that could be corrupted by strong interference resulting in a bad estimate. In this paper, we present new methods to combine interference suppression together with channel estimation when using multiple receiving antennas by using adaptive signal processing techniques. Computer simulation is used to compare between the proposed methods and the existing conventional estimation techniques.
Abstract: The autonomic nervous system has a regulatory
structure that helps people adapt to changes in their environment by
adjusting or modifying some functions in response to stress, and regulating involuntary function of human organs. The purpose of this
study was to investigate the effect of combined stimulation, both
far-infrared heating and chiropractic, on the autonomic nervous system
activities using thermal image and heart rate variability. Six healthy subjects participated in this test. We compared the before and after
autonomic nervous system activities through obtaining thermal image
and photoplethysmogram signal. The thermal images showed that the
combined stimulation changed subject-s body temperature more
highly and widely than before. The result of heart rate variability
indicated that LF/HF ratio decreased. We concluded that combined
stimulation activates autonomic nervous system, and expected other
possibilities of this combined stimulation.
Abstract: Supplementation of palm vitamin E has been reported
to prevent loss of bone density in ovariectomised female rats. The
mechanism by which palm vitamin E exerts these effects is still
unknown. We hypothesized that palm vitamin E may act by
preventing the protein expression changes. Two dimensional poly
acyrilamide gel electrophoresis (2-D PAGE) and PD Quest software
genomic solutions Investigator (proteomics) was used to analyze the
differential protein expression profile in femoral and humeri bones
harvested from three groups of rats; sham-operated rats (SO),
ovariectomised rats (Ovx) and ovariectomised rats supplemented for
2 months with palm vitamin E. The results showed that there were
over 300 valued spot on each of the groups PVE and OVX as
compared to about 200 in SO. Comparison between the differential
protein expression between OVX and PVE groups showed that ten
spots were down –regulated in OVX but up-regulated in PVE. The
ten differential spots were separately named P1-P10. The
identification and understanding of the pathway of the differential
protein expression among the groups is ongoing and may account for
the molecular mechanism through which palm vitamin E exert its
anti-osteoporotic effect.
Abstract: Serial Analysis of Gene Expression is a powerful
quantification technique for generating cell or tissue gene expression
data. The profile of the gene expression of cell or tissue in several
different states is difficult for biologists to analyze because of the large
number of genes typically involved. However, feature selection in
machine learning can successfully reduce this problem. The method
allows reducing the features (genes) in specific SAGE data, and
determines only relevant genes. In this study, we used a genetic
algorithm to implement feature selection, and evaluate the
classification accuracy of the selected features with the K-nearest
neighbor method. In order to validate the proposed method, we used
two SAGE data sets for testing. The results of this study conclusively
prove that the number of features of the original SAGE data set can be
significantly reduced and higher classification accuracy can be
achieved.
Abstract: Group contribution based models are widely used in
industrial applications for its convenience and flexibility. Although a
number of group contribution models have been proposed, there were
certain limitations inherent to those models. Models based on group
contribution excess Gibbs free energy are limited to low pressures and
models based on equation of state (EOS) cannot properly describe
highly nonideal mixtures including acids without introducing
additional modification such as chemical theory. In the present study
new a new approach derived from quantum chemistry have been used
to calculate necessary EOS group interaction parameters. The
COSMO-RS method, based on quantum mechanics, provides a
reliable tool for fluid phase thermodynamics. Benefits of the group
contribution EOS are the consistent extension to hydrogen-bonded
mixtures and the capability to predict polymer-solvent equilibria up to
high pressures. The authors are confident that with a sufficient
parameter matrix the performance of the lattice EOS can be improved
significantly.
Abstract: The wisest economic decision of United States in the
20th century was establishing the favorable international monetary
system, and capturing the leadership position in it. This decision gave
economic hegemony to the US for the next more than 7 decades. The
continuation of this hegemony till the next decade seems difficult as
the US economy is under continuous streams of recessions since
2007. On the other hand, Chinese economy is progressing with a
very fast speed and is estimated to pass the US economy till 2025, in
various aspects. Will the US be able to continue its leadership in the
IMS? Will China replace US in the international monetary system?
The answers to these questions have been explored by comparing the
economic competitiveness of US and China, with respect to each
other. The paper concludes that the change in global economic
environment will compel US to share the leadership of international
monetary system with China. This sharing will solve most problems
of the current IMS, but will also birth some new problems.
Abstract: Wavelet transforms are multiresolution
decompositions that can be used to analyze signals and images.
Image compression is one of major applications of wavelet
transforms in image processing. It is considered as one of the most
powerful methods that provides a high compression ratio. However,
its implementation is very time-consuming. At the other hand,
parallel computing technologies are an efficient method for image
compression using wavelets. In this paper, we propose a parallel
wavelet compression algorithm based on quadtrees. We implement
the algorithm using MatlabMPI (a parallel, message passing version
of Matlab), and compute its isoefficiency function, and show that it is
scalable. Our experimental results confirm the efficiency of the
algorithm also.
Abstract: Among all mechanical joining processes, welding has
been employed for its advantage in design flexibility, cost saving,
reduced overall weight and enhanced structural performance.
However, for structures made of relatively thin components, welding
can introduce significant buckling distortion which causes loss of
dimensional control, structural integrity and increased fabrication
costs. Different parameters can affect buckling behavior of welded
thin structures such as, heat input, welding sequence, dimension of
structure. In this work, a 3-D thermo elastic-viscoplastic finite
element analysis technique is applied to evaluate the effect of shell
dimensions on buckling behavior and entropy generation of welded
thin shells. Also, in the present work, the approximated longitudinal
transient stresses which produced in each time step, is applied to the
3D-eigenvalue analysis to ratify predicted buckling time and
corresponding eigenmode. Besides, the possibility of buckling
prediction by entropy generation at each time is investigated and it is
found that one can predict time of buckling with drawing entropy
generation versus out of plane deformation. The results of finite
element analysis show that the length, span and thickness of welded
thin shells affect the number of local buckling, mode shape of global
buckling and post-buckling behavior of welded thin shells.
Abstract: A considerable progress has been achieved in transient
stability analysis (TSA) with various FACTS controllers. But, all
these controllers are associated with single transmission line. This
paper is intended to discuss a new approach i.e. a multi-line FACTS
controller which is interline power flow controller (IPFC) for TSA of
a multi-machine power system network. A mathematical model of
IPFC, termed as power injection model (PIM) presented and this
model is incorporated in Newton-Raphson (NR) power flow
algorithm. Then, the reduced admittance matrix of a multi-machine
power system network for a three phase fault without and with IPFC
is obtained which is required to draw the machine swing curves. A
general approach based on L-index has also been discussed to find
the best location of IPFC to reduce the proximity to instability of a
power system. Numerical results are carried out on two test systems
namely, 6-bus and 11-bus systems. A program in MATLAB has
been written to plot the variation of generator rotor angle and speed
difference curves without and with IPFC for TSA and also a simple
approach has been presented to evaluate critical clearing time for test
systems. The results obtained without and with IPFC are compared
and discussed.
Abstract: In this paper, we evaluate the choice of suitable
quantization characteristics for both the decoder messages and the
received samples in Low Density Parity Check (LDPC) coded
systems using M-QAM (Quadrature Amplitude Modulation)
schemes. The analysis involves the demapper block that provides
initial likelihood values for the decoder, by relating its quantization
strategy of the decoder. A mapping strategy refers to the grouping of
bits within a codeword, where each m-bit group is used to select a
2m-ary signal in accordance with the signal labels. Further we
evaluate the system with mapping strategies like Consecutive-Bit
(CB) and Bit-Reliability (BR). A new demapper version, based on
approximate expressions, is also presented to yield a low complexity
hardware implementation.
Abstract: The brain MR imaging-based clinical research and analysis system were specifically built and the development for a large-scale data was targeted. We used the general clinical data available for building large-scale data. Registration period for the selection of the lesion ROI and the region growing algorithm was used and the Mesh-warp algorithm for matching was implemented. The accuracy of the matching errors was modified individually. Also, the large ROI research data can accumulate by our developed compression method. In this way, the correctly decision criteria to the research result was suggested. The experimental groups were age, sex, MR type, patient ID and smoking which can easily be queries. The result data was visualized of the overlapped images by a color table. Its data was calculated by the statistical package. The evaluation for the utilization of this system in the chronic ischemic damage in the area has done from patients with the acute cerebral infarction. This is the cause of neurologic disability index location in the center portion of the lateral ventricle facing. The corona radiate was found in the position. Finally, the system reliability was measured both inter-user and intra-user registering correlation.