Abstract: Extensive research has been devoted to economic
production quantity (EPQ) problem. However, no attention has been
paid to problems where production period length is constrained. In
this paper, we address the problem of deciding the optimal
production quantity and the number of minor setups within each
cycle, in which, production period length is constrained but a minor
setup is possible for pass the constraint. A mathematical model is
developed and Iterated Local Search (ILS) is proposed to solve this
problem. Finally, solution procedure illustrated with a numerical
example and results are analyzed.
Abstract: This paper addresses the problem of recognizing and
interpreting the behavior of human workers in industrial
environments for the purpose of integrating humans in software
controlled manufacturing environments. In this work we propose a
generic concept in order to derive solutions for task-related manual
production applications. Thus, we are able to use a versatile concept
providing flexible components and being less restricted to a specific
problem or application. We instantiate our concept in a spot welding
scenario in which the behavior of a human worker is interpreted
when performing a welding task with a hand welding gun. We
acquire signals from inertial sensors, video cameras and triggers and
recognize atomic actions by using pose data from a marker based
video tracking system and movement data from inertial sensors.
Recognized atomic actions are analyzed on a higher evaluation level
by a finite state machine.
Abstract: One of the aims of the paper is to make a comparison
of experimental results with numerical simulation for a side cooler.
Specifically, it was the amount of air to be delivered by the side
cooler with fans running at 100%. This integral value was measured
and evaluated within the plane parallel to the front side of the side
cooler at a distance of 20mm from the front side. The flow field
extending from the side cooler to the space was also evaluated.
Another objective was to address the contribution of evaluated values
to the increase of data center energy consumption.
Abstract: Frauds in insurance industry are one of the major
sources of operational risk of insurance companies and constitute a
significant portion of their losses. Every reasonable company on the
market aims for improving their processes of uncovering frauds and
invests their resources to reduce them. This article is addressing fraud
management area from the view of extension of existing Business
Intelligence solution. We describe the frame of such solution and
would like to share with readers all benefits brought to insurance
companies by adopting this approach in their fight against insurance
frauds.
Abstract: Gabor-based face representation has achieved enormous success in face recognition. This paper addresses a novel algorithm for face recognition using neural networks trained by Gabor features. The system is commenced on convolving a face image with a series of Gabor filter coefficients at different scales and orientations. Two novel contributions of this paper are: scaling of rms contrast and introduction of fuzzily skewed filter. The neural network employed for face recognition is based on the multilayer perceptron (MLP) architecture with backpropagation algorithm and incorporates the convolution filter response of Gabor jet. The effectiveness of the algorithm has been justified over a face database with images captured at different illumination conditions.
Abstract: The database reverse engineering problems and
solving processes are getting mature, even though, the academic
community is facing the complex problem of knowledge transfer,
both in university and industrial contexts. This paper presents a new
CASE tool developed at the University of Jordan which addresses an
efficient support of this transfer, namely UJ-CASE-TOOL. It is a
small and self-contained application exhibiting representative
problems and appropriate solutions that can be understood in a
limited time. It presents an algorithm that describes the developed
academic CASE tool which has been used for several years both as
an illustration of the principles of database reverse engineering and
as an exercise aimed at academic and industrial students.
Abstract: Logic based methods for learning from structured data
is limited w.r.t. handling large search spaces, preventing large-sized
substructures from being considered by the resulting classifiers. A
novel approach to learning from structured data is introduced that
employs a structure transformation method, called finger printing, for
addressing these limitations. The method, which generates features
corresponding to arbitrarily complex substructures, is implemented in
a system, called DIFFER. The method is demonstrated to perform
comparably to an existing state-of-art method on some benchmark
data sets without requiring restrictions on the search space.
Furthermore, learning from the union of features generated by finger
printing and the previous method outperforms learning from each
individual set of features on all benchmark data sets, demonstrating
the benefit of developing complementary, rather than competing,
methods for structure classification.
Abstract: Internet application in China has maintained a constant
development tendency in the past decade. China is now one of the
most populous countries in terms of internet user population. While
offering enormous opportunities, the dramatic digitalization also
brings about a series of challenges that demand urgent attention.
Digital divide is one of the challenges that affect China as well as other
countries in the world. This paper examines digital divide in the
Chinese context from the perspective of development communication.
Through a case study of a rural township under the backdrop of the
rapid internet development in China, the paper discusses the
economic, psychological and cultural roots of digital divide; and
explores development communication strategies addressing the roots
of digital divide. It is argued that development communication must be
responsive to the potentialities and preferences of the specific society
and serve the purposes of participation and sustainability.
Abstract: Concurrency and synchronization are becoming big
issues as every new PC comes with multi-core processors. A major
reason for Object-Oriented Programming originally was to enable
easier reuse: encode your algorithm into a class and thoroughly
debug it, then you can reuse the class again and again. However,
when we get to concurrency and synchronization, this is often not
possible. Thread-safety issues means that synchronization constructs
need to be entangled into every class involved. We contributed a
detailed literature review of issues and challenges in concurrent
programming and present a methodology that uses the Aspect-
Oriented paradigm to address this problem. Aspects will allow us to
extract the synchronization concerns as schemes to be “weaved in"
later into the main code. This allows the aspects to be separately
tested and verified. Hence, the functional components can be weaved
with reusable synchronization schemes that are robust and scalable.
Abstract: Due to rapid economic growth, Indonesia's energy needs is rapidly increasing. Indonesia-s primary energy consumption has doubled in 2007 compared to 2003. Indonesia's status change from oil net-exporter to oil net-importer country recently has increased Indonesia's concern over energy security. Due to this, oil import becomes center of attention in the dynamics of Indonesia's energy security. Conventional studies addressing Indonesia's energy security have focused on energy production sector. This study explores Indonesia-s energy security considering energy import sector by modeling and simulating Indonesia-s energy-related policies using system dynamics. Simulation result of Indonesia's energy security in 2020 in Business-As-Usual scenario shows that in term of supply demand ratio, energy security will be very high, but also it poses high dependence on energy import. The Alternative scenario result shows lower energy security in term of supply demand ratio and much lower dependence on energy import. It is also found that the Alternative scenario produce lower GDP growth.
Abstract: This paper presents data annotation models at
five levels of granularity (database, relation, column, tuple, and cell) of relational data to address the problem of unsuitability of most relational databases to express annotations. These models
do not require any structural and schematic changes to the
underlying database. These models are also flexible, extensible,
customizable, database-neutral, and platform-independent. This paper also presents an SQL-like query language, named Annotation Query Language (AnQL), to query annotation documents. AnQL is simple to understand and exploits the already-existent wide knowledge and skill set of SQL.
Abstract: In this paper comparison of Reflector Antenna
analyzing techniques based on wave and ray nature of optics is
presented for an offset reflector antenna using GRASP (General
Reflector antenna Analysis Software Package) software. The results
obtained using PO (Physical Optics), PTD (Physical theory of
Diffraction), and GTD (Geometrical Theory of Diffraction) are
compared. The validity of PO and GTD techniques in regions around
the antenna, caustic behavior of GTD in main beam, and deviation of
GTD in case of near-in sidelobes of radiation pattern are discussed.
The comparison for far-out sidelobes predicted by PO, PO + PTD
and GTD is described. The effect of Direct Radiations from feed
which results in feed selection for the system is addressed.
Abstract: This article addresses the procedures to validate the Arabic version of Multiple Intelligence Development Assessment Scale (MIDAS). The content validity was examined based on the experts- judgments on the MIDAS-s items in the Arabic version. The content of eleven items in the Arabic version of MIDAS was modified to match the Arabic context. Then a translation from original English version of MIDAS into Arabic language was performed. The reliability of the Arabic MIDAS was calculated based on test and retest method and found to be 0.85 for the overall MIDAS and for the different subscales ranging between 0.78 - 0.87. The examination of construct validity for the overall Arabic MIDAS and its subscales was established by using Winsteps program version 6 based on Rasch model in order to fit the items into the Arabic context. The findings indicated that, the eight subscales in Arabic version of MIDAS scale have a unidimensionality, and the total number of kept items in the overall scale is 108 items.
Abstract: Address Matching is an important application of
Geographic Information System (GIS). Prior to Address Matching
working, obtaining X,Y coordinates is necessary, which process is
calling Address Geocoding. This study will illustrate the effective
address geocoding process of using household registry database, and
the check system for geocoded address.
Abstract: Globin superfamily proteins including myoglobin and
hemoglobin, have welcome new members recently, namely,
cytoglobin, neuroglobin and globin X, though their physiological
functions are still to be addressed. Fish are the excellent models for the
study of these globins, but their characteristics have not yet been
discussed to date. In the present study, attempts have been made to
characterize their structural uniqueness by making use of proteomics
approach. This is the first comparative study on the characterization of
globin superfamily proteins from fish.
Abstract: An iterative algorithm is proposed and tested in Cournot Game models, which is based on the convergence of sequential best responses and the utilization of a genetic algorithm for determining each player-s best response to a given strategy profile of its opponents. An extra outer loop is used, to address the problem of finite accuracy, which is inherent in genetic algorithms, since the set of feasible values in such an algorithm is finite. The algorithm is tested in five Cournot models, three of which have convergent best replies sequence, one with divergent sequential best replies and one with “local NE traps"[14], where classical local search algorithms fail to identify the Nash Equilibrium. After a series of simulations, we conclude that the algorithm proposed converges to the Nash Equilibrium, with any level of accuracy needed, in all but the case where the sequential best replies process diverges.
Abstract: In this paper we present an energy efficient match-line
(ML) sensing scheme for high-speed ternary content-addressable
memory (TCAM). The proposed scheme isolates the sensing unit of
the sense amplifier from the large and variable ML capacitance. It
employs feedback in the sense amplifier to successfully detect a
match while keeping the ML voltage swing low. This reduced voltage
swing results in large energy saving. Simulation performed using
130nm 1.2V CMOS logic shows at least 30% total energy saving in
our scheme compared to popular current race (CR) scheme for
similar search speed. In terms of speed, dynamic energy, peak power
consumption and transistor count our scheme also shows better
performance than mismatch-dependant (MD) power allocation
technique which also employs feedback in the sense amplifier.
Additionally, the implementation of our scheme is simpler than CR
or MD scheme because of absence of analog control voltage and
programmable delay circuit as have been used in those schemes.
Abstract: In today-s competitive global business environment,
the concept of supply chain management (SCM) continues to become
increasingly market-oriented, shifting the primary driver of the value
chain from supply to demand. Recent recommendations encourage
researchers to focus investigations on the supply chain process
integration (SCPI) capabilities that integrate a focal firm with its
network of suppliers and business customers to create value for it.
However, theoretical and empirical researches pertaining to the
antecedents and consequences of a focal firm-s SCPI capabilities have
been limited and piecemeal. The purpose of this study is to investigate
the critical determinants and consequences of a focal firm-s SCPI
capabilities. We test our proposed research framework using a sample
of 139 sales managers of manufacturing industries in Taiwan, our
research findings show that (1) both perceived business customer-s
power and focal firm-s market-oriented culture positively influences a
focal firm-s SCPI capabilities, and (2) SCPI capabilities positively
influence a focal firm-s SCM performance, both operational and
strategic benefits. Implications for practitioners and researchers and
suggestions for future research are also addressed in this study.
Abstract: Random Access Memory (RAM) is an important
device in computer system. It can represent the snapshot on how the
computer has been used by the user. With the growth of its
importance, the computer memory has been an issue that has been
discussed in digital forensics. A number of tools have been developed
to retrieve the information from the memory. However, most of the
tools have their limitation in the ability of retrieving the important
information from the computer memory. Hence, this paper is aimed
to discuss the limitation and the setback for two main techniques such
as process signature search and process enumeration. Then, a new
hybrid approach will be presented to minimize the setback in both
individual techniques. This new approach combines both techniques
with the purpose to retrieve the information from the process block
and other objects in the computer memory. Nevertheless, the basic
theory in address translation for x86 platforms will be demonstrated
in this paper.
Abstract: Operational safety of critical systems, such as nuclear power plants, industrial chemical processes and means of transportation, is a major concern for system engineers and operators. A means to assure that is on-line safety monitors that deliver three safety tasks; fault detection and diagnosis, alarm annunciation and fault controlling. While current monitors deliver these tasks, benefits and limitations in their approaches have at the same time been highlighted. Drawing from those benefits, this paper develops a distributed monitor based on semi-independent agents, i.e. a multiagent system, and monitoring knowledge derived from a safety assessment model of the monitored system. Agents are deployed hierarchically and provided with knowledge portions and collaboration protocols to reason and integrate over the operational conditions of the components of the monitored system. The monitor aims to address limitations arising from the large-scale, complicated behaviour and distributed nature of monitored systems and deliver the aforementioned three monitoring tasks effectively.