Abstract: The actual grow of the infrastructure in develop country require sophisticate ways manage the operation and control the quality served. This research wants to concentrate in the operation of this infrastructure beyond the construction. The infrastructure-s operation involves an uncertain environment, where unexpected variables are present every day and everywhere. Decision makers need to make right decisions with right information/data analyzed most in real time. To adequately support their decisions and decrease any negative impact and collateral effect, they need to use computational tools called decision support systems (DSS), but now the main source of information came from common users thought an extensive crowdsourcing
Abstract: This paper seeks to give a general idea of the universe of project portfolio management, from its multidisciplinary nature, to the many challenges it raises, passing through the different techniques, models and tools used to solve the multiple problems known. It is intended to contribute to the clarification, with great depth, of the impacts and relationships involved in managing the projects- portfolio. It aims at proposing a technique for the project alignment with the organisational strategy, in order to select projects that later on will be considered in the analysis and selection of the portfolio. We consider the development of a methodology for assessing the project alignment index very relevant in the global market scenario. It can help organisations to gain a greater awareness of market dynamics, speed up the decision process and increase its consistency, thus enabling the strategic alignment and the improvement of the organisational performance.
Abstract: Recently, Denial of Service(DoS) attacks and Distributed DoS(DDoS) attacks which are stronger form of DoS attacks from plural hosts have become security threats on the Internet. It is important to identify the attack source and to block attack traffic as one of the measures against these attacks. In general, it is difficult to identify them because information about the attack source is falsified. Therefore a method of identifying the attack source by tracing the route of the attack traffic is necessary. A traceback method which uses traffic patterns, using changes in the number of packets over time as criteria for the attack traceback has been proposed. The traceback method using the traffic patterns can trace the attack by matching the shapes of input traffic patterns and the shape of output traffic pattern observed at a network branch point such as a router. The traffic pattern is a shapes of traffic and unfalsifiable information. The proposed trace methods proposed till date cannot obtain enough tracing accuracy, because they directly use traffic patterns which are influenced by non-attack traffics. In this paper, a new traffic pattern matching method using Independent Component Analysis(ICA) is proposed.
Abstract: A lightpipe is an about 99 percent specular reflective
mirror pipe or duct that is used for the transmission of the daylight
from the outside into a building. The lightpipes are usually used in
the daylighting buildings, in the residential, industrial and
commercial sectors. This paper is about the performances of a
lightpipe installed in a laboratory (3 m x 2.6 m x 3 m) without
windows. The aim is to analyse the luminous intensity distribution
for several sky/sun conditions. The lightpipe was monitored during
the year 2006. The lightpipe is 1 m long and the diameter of the top
collector and of the internal diffuser device is 0.25 m. In the
laboratory there are seven illuminance sensors: one external is
located on the roof of the laboratory and six internal sensors are
connected to a data acquisition system. The internal sensors are
positioned under the internal diffusive device at an height of 0.85 m
from the floor to simulate a working plane. The numerical data are
obtained through a simulation software. This paper shows the
comparison between the experimental and numerical results
concerning the behavior of the lightpipe.
Abstract: The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
Abstract: In this paper the multi-mode resource-constrained project scheduling problem with discounted cash flows is considered. Minimizing the makespan and maximization the net present value (NPV) are the two common objectives that have been investigated in the literature. We apply one evolutionary algorithm named multiobjective particle swarm optimization (MOPSO) to find Pareto front solutions. We used standard sets of instances from the project scheduling problem library (PSPLIB). The results are computationally compared respect to different metrics taken from the literature on evolutionary multi-objective optimization.
Abstract: Innovations, especially technological, are considered
key-drivers for sustainable economic growth and competitiveness in
the globalised world. As such they should also play an important role
in the process of economical convergence inside the EU.
Unfortunately, the problem of insufficient innovation performance
concerns around half of the EU countries. Poland shows that a lack of
a consistent high-tech financing system constitutes a serious obstacle
for the development of innovative firms. In this article we will
evaluate these questions referring to the example of Ammono S.A., a
Polish company established to develop and commercialise an original
technology for the production of bulk GaN crystals. We will focus on
its efforts to accumulate the financial resources necessary at different
stages of its development. The purpose of this article is to suggest
possible ways to improve the national innovative system, which
would make it more competent in generating high-tech leaders.
Abstract: Nanowire arrays of copper with uniform diameters have
been synthesized by potentiostatic electrochemical metal deposition
(EMD) of copper sulphate and potassium chloride solution within
the nano-channels of porous Indium-Tin Oxide (ITO), also known as
Tin doped Indium Oxide templates. The nanowires developed were
fairly continuous with diameters ranging from 110-140 nm along
the entire length. Single as well as poly-crystalline copper wires
have been prepared by application of appropriate potential during the
EMD process. Scanning electron microscopy (SEM), high resolution
transmission electron microscopy (HRTEM), small angle electron
diffraction (SAED) and atomic force microscopy (AFM) were used
to characterize the synthesized nano wires at room temperature. The
electrochemical response of synthesized products was evaluated by
cyclic voltammetry while surface energy analysis was carried out
using a Goniometer.
Abstract: Nowadays, efficiency, effectiveness and economy are regarded as the main objectives of managers and the secret of the continuity of an organization in competing economy. In such competing settings, it is essential that the management of an organization has not been neglected and been obliged to identify quickly the opportunities for improving the operation of organization and remove the shortcomings of their managed system in order to use the opportunities for development. Operational auditing is a useful tool for system adjustment and leading an organization toward its objectives. Operational auditing is indeed a viewpoint which identifies the causes of insufficiencies, weaknesses and deficiencies of system and plans to eliminate them. Operational auditing is useful in the effectiveness and optimization of executive managers- decisions and increasing the efficiency and economy of their performance in the future and prevents the waste and incorrect use of resources. Evidence shows that operational auditing is used at a limited level in Iran. This matter raises some questions like the following ones in the minds. Why do a limited number of corporations use operational auditing? Which factors can guarantee its full implementation? What obstacles are there in its implementation? The purpose of this article is to determine executive objectives, the operation domain of operational auditing, the components of operational auditing and the executive obstacles to operational auditing in Iran.
Abstract: Service discovery is a very important component of Service Oriented Architectures (SOA). This paper presents two alternative approaches to customise the query results of private service registry such as Universal Description, Discovery and Integration (UDDI). The customisation is performed based on some pre-defined and/or real-time changing parameters. This work identifies the requirements, designs and additional mechanisms that must be applied to UDDI in order to support this customisation capability. We also detail the implements of the approaches and examine its performance and scalability. Based on our experimental results, we conclude that both approaches can be used to customise registry query results, but by storing personalization parameters in external resource will yield better performance and but less scalable when size of query results increases. We believe these approaches when combined with semantics enabled service registry will enhance the service discovery methods within a private UDDI registry environment.
Abstract: The plant world is the source of many medicines.
Recently, researchers have estimated that there are approximately
400,000 plant species worldwide, of which about a quarter or a third
have been used by societies for medicinal purposes. The human uses
of plants for thousands of years to treat various ailments, in many
developing countries, much of the population trust in traditional
doctors and their collections of medicinal plants to treat them.
Essential oils have many therapeutic properties. In herbal medicine,
they are used for their antiseptic properties against infectious
diseases of fungal origin, against dermatophytes, those of bacterial
origin. The aim of our study is to determine the antimicrobial effect
of essential oils of the plant Trigonella focnum greacum on some
pathogenic bacteria, it is a medicinal plant used in traditional
therapy. The test adopted is based on the diffusion method on solid
medium (Antibiogram), this method determines the sensitivity or
resistance of a microorganism vis-à-vis the extract studied. Our study
reveals that the essential oil of the plant Trigonella focnum greacum
has a different effect on the resistance of germs. For staphiloccocus
Pseudomonnas aeroginosa and Krebsilla, are moderately sensitive
strains, also Escherichia coli and Candida albicans represents a high
sensitivity. By against Proteus is a strain that represents a weak
sensitivity.
Abstract: With the resource exhaustion, bad affections of human
activities and the awakening of the human rights, the corporate social
responsibility became popular corporate strategy achieving
sustainable development of both corporation and society. The issue of
Guideline of Chinese Corporate Social Responsibility Report
promotes greatly corporation to take social responsibility. This paper
built the index system according to this guideline and takes the textile
industry as an example, uses the analytical hierarchy process to
identify the weightings of different responsibilities of corporation to
guide the corporate social responsibility performance assessment.
Abstract: The survival of publicly listed companies largely
depends on their stocks being liquidly traded. This goal can be
achieved when new investors are attracted to invest on companies-
stocks. Among different groups of investors, individual investors are
generally less able to objectively evaluate companies- risks and
returns, and tend to be emotionally biased in their investing
decisions. Therefore their decisions may be formed as a result of
perceived risks and returns, and influenced by companies- images.
This study finds that perceived risk, perceived returns and trust
directly affect individual investors- trading decisions while attitude
towards brand partially mediates the relationships. This finding
suggests that, in courting individual investors, companies still need to
perform financially while building a good image can result in their
stocks being accepted quicker than the stocks of good performing
companies with hidden images.
Abstract: The major focus of this work was to characterize hydrodynamics in a packed-bed with and without static mixer by using Computational Fluid Dynamic (CFD). The commercial software: COMSOL MULTIPHYSICSTM Version 3.3 was used to simulate flow fields of mixed-gas reactants i.e. CO and H2. The packed-bed was a single tube with the inside diameter of 0.8 cm and the length of 1.2 cm. The static mixer was inserted inside the tube. The number of twisting elements was 1 with 0.8 cm in diameter and 1.2 cm in length. The packed-bed with and without static mixer were both packed with approximately 700 spherical structures representing catalyst pellets. Incompressible Navier-Stokes equations were used to model the gas flow inside the beds at steady state condition, in which the inlet Reynolds Number (Re) was 2.31. The results revealed that, with the insertion of static mixer, the gas was forced to flow radially inward and outward between the central portion of the tube and the tube wall. This could help improving the overall performance of the packed-bed, which could be utilized for heterogeneous catalytic reaction such as reforming and Fischer- Tropsch reactions.
Abstract: The copper flotation tailings from Konkola Copper
mine in Nchanga, Zambia were used in the study. The purpose of this
study was to determine the leaching characteristics of the tailings
material prior and after the physical beneficiation process is
employed. The Knelson gravity concentrator (KC-MD3) was used for
the beneficiation process. The copper leaching efficiencies and
impurity co-extraction percentages in both the upgraded and the raw
feed material were determined at different pH levels and temperature.
It was observed that the copper extraction increased with an increase
in temperature and a decrease in pH levels. In comparison to the raw
feed sample, the upgraded sample reported a maximum copper
extraction of 69% which was 9%, higher than raw feed % extractions.
The impurity carry over was reduced from 18% to 4 % on the
upgraded sample. The reduction in impurity co-extraction was as a
result of the removal of the reactive gangue elements during the
upgrading process, this minimized the number of side reaction
occurring during leaching.
Abstract: A DC-to-DC converter for applications involving a
source with widely varying voltage conditions with loads requiring
constant voltage from full load down to no load is presented.
The switching regulator considered is a Buck converter with Pulse
Skipping Modulation control whereby pulses applied to the switch
are blocked or released on output voltage crossing a predetermined
value. Results of the study on the performance of regulator circuit
are presented. The regulator regulates over a wide input voltage range
with slightly higher ripple content and good transient response. Input
current spectrum indicates a good EMI performance with crowding
of components at low frequency range.
Abstract: The number of the companies accepting RFID in Korea
has been increased continuously due to the domestic development of
information technology. The acceptance of RFID by companies in
Korea enabled them to do business with many global enterprises in a
much more efficient and effective way. According to a survey[33,
p76], many companies in Korea have used RFID for inventory or
distribution manages. But, the use of RFID in the companies in Korea
is in the early stages and its potential value hasn-t fully been realized
yet. At this time, it would be very important to investigate the factors
that affect RFID acceptance. For this study, many previous studies
were referenced and some RFID experts were interviewed. Through
the pilot test, four factors were selected - Security Trust, Employee
Knowledge, Partner Influence, Service Provider Trust - affecting
RFID acceptance and an extended technology acceptance
model(e-TAM) was presented with those factors. The proposed model
was empirically tested using data collected from employees in
companies or public enterprises. In order to analyze some
relationships between exogenous variables and four variables in TAM,
structural equation modeling(SEM) was developed and SPSS12.0 and
AMOS 7.0 were used for analyses. The results are summarized as
follows: 1) security trust perceived by employees positively
influences on perceived usefulness and perceived ease of use; 2)
employee-s knowledge on RFID positively influences on only
perceived ease of use; 3) a partner-s influence for RFID acceptance
positively influences on only perceived usefulness; 4) service provider
trust very positively influences on perceived usefulness and perceived
ease of use 5) the relationships between TAM variables are the same as
the previous studies.
Abstract: Nodes in mobile Ad Hoc Network (MANET) do not
rely on a central infrastructure but relay packets originated by other
nodes. Mobile ad hoc networks can work properly only if the
participating nodes collaborate in routing and forwarding. For
individual nodes it might be advantageous not to collaborate, though.
In this conceptual paper we propose a new approach based on
relationship among the nodes which makes them to cooperate in an
Adhoc environment. The trust unit is used to calculate the trust
values of each node in the network. The calculated trust values are
being used by the relationship estimator to determine the relationship
status of nodes. The proposed enhanced protocol was compared with
the standard DSR protocol and the results are analyzed using the
network simulator-2.
Abstract: Work-life balance has been acknowledged and
promoted for the sake of employee retention. It is essential for a
manager to realize the human resources situation within a company to
help employees work happily and perform at their best. This paper
suggests knowledge management and critical thinking are useful to
motivate employees to think about their work-life balance. A
qualitative case study is presented, which aimed to discover the
meaning of work-life balance-s meaning from the perspective of Thai
knowledge workers and how it affects their decision-making towards
work resignation. Results found three types of work-life balance
dimensions; a work- life balance including a workplace and a private
life setting, an organizational working life balance only, and a worklife
balance only in a private life setting. These aspects all influenced
the decision-making of the employees. Factors within a theme of an
organizational work-life balance were involved with systematic
administration, fair treatment, employee recognition, challenging
assignments to gain working experience, assignment engagement,
teamwork, relationship with superiors, and working environment,
while factors concerning private life settings were about personal
demands such as an increasing their salary or starting their own
business.
Abstract: According to the conception of personnel
management, human resource management requires efficient use of
human resources. This is ensured by various activities directed
towards the area of management. Among these activities there are for
example the recruitment of employees, development, strengthening
of relations, mutual inspiring, implementation of correct working
processes and systems used by individuals or groups.