Abstract: We present a prototype interactive (hyper) map of strategic, tactical, and logistic options for Supply Chain Management. The map comprises an anthology of options, broadly classified within the strategic spectrum of efficiency versus responsiveness, and according to logistic and cross-functional drivers. They are exemplified by cases in diverse industries. We seek to get all these information and ideas organized to help supply chain managers identify effective choices for specific business environments. The key and innovative linkage we introduce is the configuration of competitive forces. Instead of going through seemingly endless and isolated cases and wondering how one can borrow from them, we aim to provide a guide by force comparisons. The premise is that best practices in a different industry facing similar forces may be a most productive resource in supply chain design and planning. A prototype template is demonstrated.
Abstract: Prickly pear (Opuntia spp) fruit has received renewed
interest since it contains a betalain pigment that has an attractive
purple colour for the production of juice. Prickly pear juice was
prepared by homogenizing the fruit and treating the pulp with 48 g of
pectinase from Aspergillus niger. Titratable acidity was determined
by diluting 10 ml prickly pear juice with 90 ml deionized water and
titrating to pH 8.2 with 0.1 N NaOH. Brix was measured using a
refractometer and ascorbic acid content assayed
spectrophotometrically. Colour variation was determined
colorimetrically (Hunter L.a.b.). Hunter L.a.b. analysis showed that
the red purple colour of prickly pear juice had been affected by juice
treatments. This was indicated by low light values of colour
difference meter (CDML*), hue, CDMa* and CDMb* values. It was
observed that non-treated prickly pear juice had a high (colour
difference meter of light) CDML* of 3.9 compared to juice
treatments (range 3.29 to 2.14). The CDML* significantly (p
Abstract: There is strong evidence that water channel proteins
'aquaporins (AQPs)' are central components in plant-water relations
as well as a number of other physiological parameters. We had
previously reported the isolation of 24 plasma membrane intrinsic
protein (PIP) type AQPs. However, the gene numbers in rice and the
polyploid nature of bread wheat indicated a high probability of
further genes in the latter. The present work focused on identification
of further AQP isoforms in bread wheat. With the use of altered
primer design, we identified five genes homologous, designated
PIP1;5b, PIP2;9b, TaPIP2;2, TaPIP2;2a, TaPIP2;2b. Sequence
alignments indicate PIP1;5b, PIP2;9b are likely to be homeologues of
two previously reported genes while the other three are new genes
and could be homeologs of each other. The results indicate further
AQP diversity in wheat and the sequence data will enable physical
mapping of these genes to identify their genomes as well as genetic to
determine their association with any quantitative trait loci (QTLs)
associated with plant-water relation such as salinity or drought
tolerance.
Abstract: We present a new algorithm for nonlinear dimensionality reduction that consistently uses global information, and that enables understanding the intrinsic geometry of non-convex manifolds. Compared to methods that consider only local information, our method appears to be more robust to noise. Unlike most methods that incorporate global information, the proposed approach automatically handles non-convexity of the data manifold. We demonstrate the performance of our algorithm and compare it to state-of-the-art methods on synthetic as well as real data.
Abstract: Security management has changed from the
management of security equipments and useful interface to manager.
It analyzes the whole security conditions of network and preserves the
network services from attacks. Secure router technology has security
functions, such as intrusion detection, IPsec(IP Security) and access
control, are applied to legacy router for secure networking. It controls
an unauthorized router access and detects an illegal network intrusion.
This paper relates to a security engine management of router based on
a security policy, which is the definition of security function against a
network intrusion. This paper explains the security policy and designs
the structure of security engine management framework.
Abstract: Paper deals with environmental metrics and assessment systems devoted to Small and Medium Sized Enterprises. Authors are presenting proposed assessment model which has an ability to discover current environmental strengths and weaknesses of Small and Middle Sized Enterprise. Suggested model has also an ambition to become a Sustainability Decision Tool. Model is able to identify "best environmental devision" in the company, and to quantify how this decision contributed into overall environmental improvement. Authors understand environmental improvements as environmental innovations (product, process and organizational). Suggested model is based on its own concept; however, authors are also utilizing already existing environmental assessment tools.
Abstract: In order to encourage the construction of green homes
(GH) in Malaysia, a simple and attainable framework for designing
and building GHs is needed. This can be achieved by aligning GH
principles against Cole-s 'Sustainable Building Criteria' (SBC). This
set of considerations was used to categorize the GH features of three
case studies from Malaysia. Although the categorization of building
features is useful at exploring the presence of sustainability
inclinations of each house, the overall impact of building features in
each of the five SBCs are unknown. Therefore, this paper explored
the possibility of quantifying the impact of building features
categorized in SBC1 – “Buildings will have to adapt to the new
environment and restore damaged ecology while mitigating resource
use" based on existing GH assessment tools and methods and other
literature. This process as reported in this paper could lead to a new
dimension in green home rating and assessment methods.
Abstract: This paper describes a simulation model for analyzing artificial emotion injected to design the game characters. Most of the game storyboard is interactive in nature and the virtual characters of the game are equipped with an individual personality and dynamic emotion value which is similar to real life emotion and behavior. The uncertainty in real expression, mood and behavior is also exhibited in game paradigm and this is focused in the present paper through a fuzzy logic based agent and storyboard. Subsequently, a pheromone distribution or labeling is presented mimicking the behavior of social insects.
Abstract: To make use of the limited amounts of water in arid
region, the Iranians developed man-made underground water
channels called qanats (kanats) .In fact, qanats may be considered as
the first long-distance water transfer system. Qanats are an ancient
water transfer system found in arid regions wherein groundwater
from mountainous areas, aquifers and sometimes from rivers, was
brought to points of re-emergence such as an oasis, through one or
more underground tunnels. The tunnels, many of which were
kilometers in length, had designed for slopes to provide gravitational
flow. The tunnels allowed water to drain out to the surface by gravity
to supply water to lower and flatter agricultural land.
Qanats have been an ancient, sustainable system facilitating the
harvesting of water for centuries in Iran, and more than 35 additional
countries of the world such as India, Arabia, Egypt, North Africa,
Spain and even to New world.
There are about 22000 qanats in Iran with 274000 kilometers of
underground conduits all built by manual labor. The amount of
water of the usable qanats of Iran produce is altogether 750 to
1000 cubic meter per second. The longest chain of qanat is
situated in Gonabad region in Khorasan province. It is 70
kilometers long. Qanats are renewable water supply systems that
have sustained agricultural settlement on the Iranian plateau for
millennia. The great advantages of Qanats are no evaporation
during transit, little seepage , no raising of the water- table and no
pollution in the area surrounding the conduits. Qanat systems
have a profound influence on the lives of the water users in Iran, and
conform to Iran-s climate. Qanat allows those living in a desert
environment adjacent to a mountain watershed to create a large oasis
in an otherwise stark environment.
This paper explains qanats structure designs, their history,
objectives causing their creation, construction materials, locations
and their importance in different times, as well as their present
sustainable role in Iran.
Abstract: Heavy rains are one of the features of arid and semi
arid climates which result in flood. This kind of rainfall originates
from environmental and synoptic conditions. Mediterranean cyclones
are the major factor in heavy rainfall in Iran, but these cyclones do
not happen in some parts of Iran such as Southern and Southeastern
areas. In this study, it has been tried to pinpoint the synoptic reasons
of heavy rainfall in Isfahan through the analysis of the relationship
between this rainfall in Isfahan and atmospheric system over Iran and
the areas around it. The findings of this study show that the major
factor have is the arrival of Sudanese low pressure system in this
region from the southwest, of course if the ascent local conditions
such as heat occur, the heaviest rains happen in Isfahan. In fact this
kind of rainfall in Isfahan has a Sudanese origin and if it is
accompanied by Mediterranean system, heavier rain falls.
Abstract: Cooperative visual modeling is more and more
necessary in our complicated world. A collaborative environment
which supports interactive operation and communication is required
to increase work efficiency. We present a collaborative visual
modeling framework which collaborative platform could be built on.
On this platform, cooperation and communication is available for
designers from different regions. This framework, which is different
from other collaborative frameworks, contains a uniform message
format, a message handling mechanism and other functions such as
message pretreatment and Role-Communication-Token Access
Control (RCTAC). We also show our implementation of this
framework called Orchestra Designer, which support BPLE
workflow modeling cooperatively online.
Abstract: In this paper we present a full performance analysis of an energy conserving routing protocol in mobile ad hoc network, named ER-AODV (Energy Reverse Ad-hoc On-demand Distance Vector routing). ER-AODV is a reactive routing protocol based on a policy which combines two mechanisms used in the basic AODV protocol. AODV and most of the on demand ad hoc routing protocols use single route reply along reverse path. Rapid change of topology causes that the route reply could not arrive to the source node, i.e. after a source node sends several route request messages, the node obtains a reply message, and this increases in power consumption. To avoid these problems, we propose a mechanism which tries multiple route replies. The second mechanism proposes a new adaptive approach which seeks to incorporate the metric "residual energy " in the process route selection, Indeed the residual energy of mobile nodes were considered when making routing decisions. The results of simulation show that protocol ER-AODV answers a better energy conservation.
Abstract: In recent years, global warming has become a
worldwide problem. The reduction of carbon dioxide emissions is a
top priority for many companies in the manufacturing industry. In the
automobile industry as well, the reduction of carbon dioxide emissions
is one of the most important issues. Technology to reduce the weight
of automotive parts improves the fuel economy of automobiles, and is
an important technology for reducing carbon dioxide. Also, even if
this weight reduction technology is applied to electric automobiles
rather than gasoline automobiles, reducing energy consumption
remains an important issue. Plastic processing of hollow pipes is one
important technology for realizing the weight reduction of automotive
parts. Ohashi et al. [1],[2] present an example of research on pipe
formation in which a process was carried out to enlarge a pipe
diameter using a lost core, achieving the suppression of wall thickness
reduction and greater pipe expansion than hydroforming.
In this study, we investigated a method to increase the wall
thickness of a pipe through pipe compression using planetary rolls.
The establishment of a technology whereby the wall thickness of a
pipe can be controlled without buckling the pipe is an important
technology for the weight reduction of products. Using the finite
element analysis method, we predicted that it would be possible to
increase the compression of an aluminum pipe with a 3mm wall
thickness by approximately 20%, and wall thickness by approximately
20% by pressing the hollow pipe with planetary rolls.
Abstract: Education in the modern world provides the socioeconomic
progress of society. In today's society, where the presence
of large middle class ensures its stability and is a symbol of
resolution of hidden economic problems, education is an integral part
of formation and reproduction of the middle class. This article presents part of results of the sociological study conducted under the
project "Kazakhstan model of education: international experience and national traditions" supported by the Foundation of the First President
of Republic of Kazakhstan - Leader of the Nation to determine the
ratio of students to the transformations of the educational system. The
authors conclude that the Kazakhstani system of education, passing
through the transformation processes, improving the quality of
educational programs and trying to correspond to the international
standards, not yet in full range, but begins to perform important
functions in the formation of the middle class.
Abstract: Toxoplasma gondii is an intracellular parasite capable
of infecting all nucleated cells in a diverse array of species.
Toxoplasma plaque assay have been described using Bacto Agar.
Because of its experimental advantages carboxymethyl cellulose
overlay, medium viscosity was choosing and the aim of this work
was to develop alternative method for formation of T. gondii plaques.
Tachyzoites were inoculated onto monolayers of Vero cells and
cultured at 37° C under 5 % CO2. The cultures were followed up by
microscopy inspection. Small plaques were visible by naphtol blue
stain 4 days after infection. Larger plaques could be observed by day
10 of culture. The carboxymethyl cellulose is a cheap reagent and the
methodology is easier, faster than assays under agar overlay. This is
the first description of the carboxymethyl cellulose overlay use for
obtaining the formation of T. gondii plaques and may be useful in
consequent obtaining tachyzoites for detailed studies.
Abstract: This paper proves that the problem of finding connected
vertex cover in a 2-connected planar graph ( CVC-2 ) with maximum degree 4 is NP-complete. The motivation for proving this result is to
give a shorter and simpler proof of NP-Completeness of TRA-MLC (the Top Right Access point Minimum-Length Corridor) problem [1], by finding the reduction from CVC-2. TRA-MLC has many applications in laying optical fibre cables for data communication and electrical wiring in floor plans.The problem of finding connected vertex cover in any planar graph ( CVC ) with maximum degree 4 is NP-complete [2]. We first show that CVC-2 belongs to NP and then we find a polynomial reduction from CVC to CVC-2. Let a graph G0 and an integer K form an instance of CVC, where G0 is a planar graph and K is an upper bound on the size of the connected vertex cover in G0. We construct a 2-connected planar graph, say G, by identifying the blocks and cut vertices of G0, and then finding the planar representation of all the blocks of G0, leading to a plane graph G1. We replace the cut vertices with cycles in such a way that the resultant graph G is a 2-connected planar graph with maximum
degree 4. We consider L = K -2t+3 t i=1 di where t is the number of cut vertices in G1 and di is the number of blocks for which ith cut vertex is common. We prove that G will have a connected vertex
cover with size less than or equal to L if and only if G0 has a connected vertex cover of size less than or equal to K.
Abstract: This paper proposes a new technique to detect code
clones from the lexical and syntactic point of view, which is based
on PALEX source code representation. The PALEX code contains
the recorded parsing actions and also lexical formatting information
including white spaces and comments. We can record a list of parsing
actions (shift, reduce, and reading a token) during a compiling process
after a compiler finishes analyzing the source code. The proposed
technique has advantages for syntax sensitive approach and language
independency.
Abstract: In the present work, Pulsed Electro Acoustic (PEA)
technique was adopted to understand the space charge dynamics in
elastomeric material. It is observed that the polarity of the applied
DC voltage voltage and its magnitude alters the space charge
dynamics in insulation structure. It is also noticed that any addition
of compound to the base material/processing technique have
characteristic variation in the space charge injection process. It could
be concluded based on the present work that the plasticizer could
inject heterocharges into the insulation medium. Also it is realized
that space charge magnitude is less with the addition of plasticizer. In
the PEA studies, it is observed that local electric field in the
insulating material can be much more than applied electric field due
to space charge formation. One of the important conclusions arrived
at based on PEA technique is that one could understand the safe
operating electric field of an insulation material and the charge trap
sites.
Abstract: We are proposing a simple watermarking method
based on visual cryptography. The method is based on selection of
specific pixels from the original image instead of random selection of
pixels as per Hwang [1] paper. Verification information is generated
which will be used to verify the ownership of the image without the
need to embed the watermark pattern into the original digital data.
Experimental results show the proposed method can recover the
watermark pattern from the marked data even if some changes are
made to the original digital data.
Abstract: Sudoku is a kind of logic puzzles. Each puzzle consists
of a board, which is a 9×9 cells, divided into nine 3×3 subblocks
and a set of numbers from 1 to 9. The aim of this puzzle is to
fill in every cell of the board with a number from 1 to 9 such
that in every row, every column, and every subblock contains each
number exactly one. Sudoku puzzles belong to combinatorial problem
(NP complete). Sudoku puzzles can be solved by using a variety of
techniques/algorithms such as genetic algorithms, heuristics, integer
programming, and so on. In this paper, we propose a new approach for
solving Sudoku which is by modelling them as block-world problems.
In block-world problems, there are a number of boxes on the table
with a particular order or arrangement. The objective of this problem
is to change this arrangement into the targeted arrangement with the
help of two types of robots. In this paper, we present three models
for Sudoku. We modellized Sudoku as parameterized multi-agent
systems. A parameterized multi-agent system is a multi-agent system
which consists of several uniform/similar agents and the number of
the agents in the system is stated as the parameter of this system. We
use Temporal Logic of Actions (TLA) for formalizing our models.