Abstract: The globalization of markets, the need to develop
competitive advantages and core competencies, among other things,
lead organizations to increasingly cross borders to operate in other
countries. The expatriation of professionals who go to work in
another country besides their own becomes increasingly common. In
order to generate data about this issue, research was conducted
concerning the perception of expatriate employees concerning
expatriation success. The research method used was case study
through a qualitative approach. This research was done through
interviews with five India expatriates and five China expatriates,
interview with expatriate department heads and analysis of company
documents. It was found that there are differences between the
organizational perception and perception of expatriates of what
constitutes mission success. The paper also provides suggestions for
further research and suggestions for future expatriates.
Abstract: In recent years, the compression of date (Phoenix
dactylifera L.) fruit powders (DP) to obtain date tablets (DT) has
been suggested as a promising form of valorization of non
commercial valuable date fruit (DF) varieties. To further improve
and characterize DT, the present study aims to investigate the
influence of the DP particle size and compression force on some
physical properties of DT. The results show that independently of
particle size, the hardness (y) of tablets increases with the increase of
the compression force (x) following a logarithmic law (y = a ln (bx)
where a and b are the constants of model). Further, a full factorial
design (FFD) at two levels, applied to investigate the erosion %,
reveals that the effects of time and particle size are the same in
absolute value and they are beyond the effect of the compression.
Regarding the disintegration time, the obtained results also by means
of a FFD show that the effect of the compression force exceeds 4
times that of the DP particle size. As final stage, the color parameters
in the CIELab system of DT immediately after their obtaining are
differently influenced by the size of the initial powder.
Abstract: Taking the design tolerance into account, this paper
presents a novel efficient approach to generate iso-scallop tool path for
five-axis strip machining with a barrel cutter. The cutter location is
first determined on the scallop surface instead of the design surface,
and then the cutter is adjusted to locate the optimal tool position based
on the differential rotation of the tool axis and satisfies the design
tolerance simultaneously. The machining strip width and error are
calculated with the aid of the grazing curve of the cutter. Based on the
proposed tool positioning algorithm, the tool paths are generated by
keeping the scallop height formed by adjacent tool paths constant. An
example is conducted to confirm the validity of the proposed method.
Abstract: The use of eXtensible Markup Language (XML) in
web, business and scientific databases lead to the development of
methods, techniques and systems to manage and analyze XML data.
Semi-structured documents suffer due to its heterogeneity and
dimensionality. XML structure and content mining represent
convergence for research in semi-structured data and text mining. As
the information available on the internet grows drastically, extracting
knowledge from XML documents becomes a harder task. Certainly,
documents are often so large that the data set returned as answer to a
query may also be very big to convey the required information. To
improve the query answering, a Semantic Tree Based Association
Rule (STAR) mining method is proposed. This method provides
intentional information by considering the structure, content and the
semantics of the content. The method is applied on Reuter’s dataset
and the results show that the proposed method outperforms well.
Abstract: A field experiment was carried out at Arab El-
Awammer Research Station, Agric. Res. Center. Assiut Governorate
during summer seasons of 2013 and 2014. The present study assessed
the effect of cowpea with maize intercropping on yield and its
components. The experiment comprised of three treatments (sole
cowpea, sole maize and cowpea-maize intercrop). The experimental
design was a randomized complete block with four replications.
Results indicated that intercropped maize plants with cowpea,
exhibited greater potentiality and resulted in higher values of most of
the studied criteria viz., plant height, number of ears/plant, number of
rows/ear, number of grains/row, grains weight/ear, 100–grain weight
and straw and grain yields. Fresh and dry forage yields of cowpea
were lower in intercropping with maize than sole. Furthermore, the
combined of the two seasons revealed that the total Land Equivalent
Ratio (LER) between cowpea and maize was 1.65. The Aggressivity
(A) maize was 0.45 and cowpea was -0.45. This showed that maize
was the dominant crop, whereas cowpea was the dominated. The
Competitive Ratio (CR) indicated that maize more competitive than
cowpea, maize was 1.75 and cowpea was 0.57. The Actual Yield
Loss (AYL) maize was 0.05 and cowpea was -0.40. The Monetary
Advantage Index (MAI) was 2360.80.
Abstract: The IEEE 802.22 working group aims to drive the
Digital Video Broadcasting-Terrestrial (DVB-T) bands for data
communication to the rural area without interfering the TV broadcast.
In this paper, we arrive at a closed-form expression for average
detection probability of Fusion center (FC) with multiple antenna
over the κ − μ fading channel model. We consider a centralized
cooperative multiple antenna network for reporting. The DVB-T
samples forwarded by the secondary user (SU) were combined using
Maximum ratio combiner at FC, an energy detection is performed
to make the decision. The fading effects of the channel degrades
the detection probability of the FC, a generalized independent and
identically distributed (IID) κ − μ and an additive white Gaussian
noise (AWGN) channel is considered for reporting and sensing
respectively. The proposed system performance is verified through
simulation results.
Abstract: E-learning has become an efficient and widespread
means of education at all levels of human activities. Statistics is no
exception. Unfortunately the main focus in statistics teaching is
usually paid to the substitution in formulas. Suitable websites can
simplify and automate calculations and provide more attention and
time to the basic principles of statistics, mathematization of real-life
situations and following interpretation of results. We now introduce
our own web-site for hypothesis testing. Its didactic aspects, the
technical possibilities of the individual tools, the experience of use
and the advantages or disadvantages are discussed in this paper. This
web-site is not a substitute for common statistical software but should
significantly improve the teaching of statistics at universities.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: The tomato is a very important crop, whose
cultivation in the Mediterranean basin is severely affected by the
phytoparasitic weed Phelipanche ramosa. The semiarid regions of
the world are considered the main areas where this parasitic weed is
established causing heavy infestation as it is able to produce high
numbers of seeds (up to 500,000 per plant), which remain viable for
extended period (more than 20 years). In this paper the results
obtained from eleven treatments in order to control this parasitic
weed including chemical, agronomic, biological and biotechnological
methods compared with the untreated test under two plowing depths
(30 and 50 cm) are reported. The split-plot design with 3 replicates
was adopted. In 2014 a trial was performed in Foggia province
(southern Italy) on processing tomato (cv Docet) grown in the field
infested by Phelipanche ramosa. Tomato seedlings were transplant
on May 5, on a clay-loam soil. During the growing cycle of the
tomato crop, at 56-78 and 92 days after transplantation, the number
of parasitic shoots emerged in each plot was detected. At tomato
harvesting, on August 18, the major quantity-quality yield parameters
were determined (marketable yield, mean weight, dry matter, pH,
soluble solids and color of fruits). All data were subjected to analysis
of variance (ANOVA) and the means were compared by Tukey's test.
Each treatment studied did not provide complete control against
Phelipanche ramosa. However, among the different methods tested,
some of them which Fusarium, gliphosate, radicon biostimulant and
Red Setter tomato cv (improved genotypes obtained by Tilling
technology) under deeper plowing (50 cm depth) proved to mitigate
the virulence of the Phelipanche ramose attacks. It is assumed that
these effects can be improved combining some of these treatments
each other, especially for a gradual and continuing reduction of the
“seed bank” of the parasite in the soil.
Abstract: This paper investigates the viability of using carbon
fiber reinforced epoxy composites modified with carbon nanotubes to
strengthening reinforced concrete (RC) columns. Six RC columns
was designed and constructed according to ASCE standards. The
columns were wrapped using carbon fiber sheets impregnated with
either neat epoxy or CNTs modified epoxy. These columns were then
tested under concentric axial loading. Test results show that;
compared to the unwrapped specimens; wrapping concrete columns
with carbon fiber sheet embedded in CNTs modified epoxy resulted
in an increase in its axial load resistance, maximum displacement,
and toughness values by 24%, 109% and 232%, respectively. These
results reveal that adding CNTs into epoxy resin enhanced the
confinement effect, specifically, increased the axial load resistance,
maximum displacement, and toughness values by 11%, 6%, and
19%, respectively compared with columns strengthening with carbon
fiber sheet embedded in neat epoxy.
Abstract: Cloud computing has provided the impetus for change
in the demand, sourcing, and consumption of IT-enabled services.
The technology developed from an emerging trend towards a ‘musthave’.
Many organizations harnessed on the quick-wins of cloud
computing within the last five years but nowadays reach a plateau
when it comes to sustainable savings and performance. This study
aims to investigate what is needed from an organizational perspective
to make cloud computing a sustainable success. The study was
carried out in Germany among senior IT professionals, both in
management and delivery positions. Our research shows that IT
executives must be prepared to realign their IT workforce to sustain
the advantage of cloud computing for today and the near future.
While new roles will undoubtedly emerge, roles alone cannot ensure
the success of cloud deployments. What is needed is a change in the
IT workforce’s business behaviour, or put more simply, the ways in
which the IT personnel works. It gives clear guidance on which
dimensions of an employees’ working behaviour need to be adapted.
The practical implications are drawn from a series of semi-structured
interviews, resulting in a high-level workforce enablement plan.
Lastly, it elaborates on tools and gives clear guidance on which
pitfalls might arise along the proposed workforce enablement
process.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: The paper describes a Chinese shadow play animation
system based on Kinect. Users, without any professional training, can
personally manipulate the shadow characters to finish a shadow play
performance by their body actions and get a shadow play video
through giving the record command to our system if they want. In our
system, Kinect is responsible for capturing human movement and
voice commands data. Gesture recognition module is used to control
the change of the shadow play scenes. After packaging the data from
Kinect and the recognition result from gesture recognition module,
VRPN transmits them to the server-side. At last, the server-side uses
the information to control the motion of shadow characters and video
recording. This system not only achieves human-computer interaction,
but also realizes the interaction between people. It brings an
entertaining experience to users and easy to operate for all ages. Even
more important is that the application background of Chinese shadow
play embodies the protection of the art of shadow play animation.
Abstract: This work presents a new planar multiband antenna
based on fractal geometry. This structure is optimized and validated
into simulation by using CST-MW Studio. To feed this antenna we
have used a CPW line which makes it easy to be incorporated with
integrated circuits. The simulation results presents a good matching
input impedance and radiation pattern in the GSM band at 900 MHz
and ISM band at 2.4 GHz. The final structure is a dual band fractal
antenna with 70 x 70 mm² as a total area by using an FR4 substrate.
Abstract: This paper presents a novel design of a microstrip
fractal antenna based on the use of Sierpinski triangle shape, it’s
designed and simulated by using FR4 substrate in the operating
frequency bands (GPS, WiMAX), the design is a fractal antenna with
a modified ground structure. The proposed antenna is simulated and
validated by using CST Microwave Studio Software, the simulated
results presents good performances in term of radiation pattern and
matching input impedance.
Abstract: The paper involves a chain of activities from
synthesis, establishment of the methodology for characterization and
testing of novel protective materials through the pilot production and
application on model supports.
It summarizes the results regarding the development of the pilot
production protocol for newly developed self-cleaning materials. The
optimization of the production parameters was completed in order to
improve the most important functional properties (mineralogy
characteristics, particle size, self-cleaning properties and
photocatalytic activity) of the newly designed nanocomposite
material.
Abstract: Near infrared (NIR) spectroscopy has always been of
great interest in the food and agriculture industries. The development
of prediction models has facilitated the estimation process in recent
years. In this study, 110 crude palm oil (CPO) samples were used to
build a free fatty acid (FFA) prediction model. 60% of the collected
data were used for training purposes and the remaining 40% used for
testing. The visible peaks on the NIR spectrum were at 1725 nm and
1760 nm, indicating the existence of the first overtone of C-H bands.
Principal component regression (PCR) was applied to the data in
order to build this mathematical prediction model. The optimal
number of principal components was 10. The results showed
R2=0.7147 for the training set and R2=0.6404 for the testing set.
Abstract: This paper designs the four-phase Boost Converter
which overcomes the problem of high input ripple current and output
ripple voltage. Digital control is more convenient for such a topology
on basis of synchronization, phase shift operation, etc. Simulation
results are presented for open-loop and closed-loop for four phase
boost converter. This control scheme is applicable for PFC rectifiers
as well. Thus a comparative analysis based on the obtained results is
performed.
Abstract: The star network is one of the promising
interconnection networks for future high speed parallel computers, it
is expected to be one of the future-generation networks. The star
network is both edge and vertex symmetry, it was shown to have
many gorgeous topological proprieties also it is owns hierarchical
structure framework. Although much of the research work has been
done on this promising network in literature, it still suffers from
having enough algorithms for load balancing problem. In this paper
we try to work on this issue by investigating and proposing an
efficient algorithm for load balancing problem for the star network.
The proposed algorithm is called Star Clustered Dimension Exchange
Method SCDEM to be implemented on the star network. The
proposed algorithm is based on the Clustered Dimension Exchange
Method (CDEM). The SCDEM algorithm is shown to be efficient in
redistributing the load balancing as evenly as possible among all
nodes of different factor networks.
Abstract: Supply chain (SC) is an operational research (OR)
approach and technique which acts as catalyst within central nervous
system of business today. Without SC, any type of business is at
doldrums, hence entropy. SC is the lifeblood of business today
because it is the pivotal hub which provides imperative competitive
advantage. The paper present a conceptual framework dubbed as
Homomorphic Conceptual Framework for Effective Supply Chain
Strategy (HCEFSC).The term Homomorphic is derived from abstract
algebraic mathematical term homomorphism (same shape) which
also embeds the following mathematical application sets:
monomorphisms, isomorphism, automorphisms, and endomorphism.
The HCFESC is intertwined and integrated with wide and broad sets
of elements.