Abstract: Nitrogen loss from irrigated cropland, particularly
sandy soils, significantly contributes to nitrate (NO3
-) levels in
surface and groundwaters. Thus, it is of great interest to use
inexpensive natural products that can increase the fertilizer efficiency
and decrease nitrate leaching. In this study, the ability of natural
Iranian zeolite clinoptilolite (Cp) and surfactant modified zeolite
clinoptilolite (SMZ) to remove NH4
+ and NO3
-, respectively, from
aqueous solutions was determined. The feasibility of using Cp and
SMZ as soil amendment to reduce nitrate leaching from soil using
lysimeters was also investigated. Zeolite showed 10.23% to 88.42%
NH4
+ removal efficiency over a wide range of initial NH4
+
concentrations. Nitrate removal efficiency by SMZ was 32.26% to
82.26%. Field study results showed that Cp and SMZ significantly (p
< 0.05) reduced leachate NO3-N concentration compared to control.
There was no significant difference between maximum and mean
leachate NO3-N concentration of SMZ lysimeters and those of Cp
lysimeters.
Abstract: A pilot plant for continuous flow microwave-assisted
chemical reaction combined with microreactors was developed and
water heating tests were conducted for evaluation of the developed
plant. We developed a microwave apparatus having a single
microwave generator that can heat reaction solutions in four reaction
fields simultaneously in order to increase throughput. We also
designed a four-branch waveguide using electromagnetic simulation,
and found that the transmission efficiency at 99%. Finally, we
developed the pilot plant using the developed microwave apparatus
and conducted water heating tests. The temperatures in the respective
reaction fields were controlled within ±1.1 K at 353.2 K. Moreover,
the energy absorption rates by the water were about 90% in the
respective reaction fields, whereas the energy absorption rate was
about 40% when 100 cm3 of water was heated by a commercially
available multimode microwave chemical reactor.
Abstract: A novel low-cost flight simulator with the development
goals cost effectiveness and high performance has been realized for
meeting the huge pilot training needs of airlines. The simulator
consists of an aircraft dynamics model, a sophisticated designed
low-profile electrical driven motion system with a subsided cabin, a
mixed reality based semi-virtual cockpit system, a control loading
system and some other subsystems. It shows its advantages over
traditional flight simulator by its features achieved with open
architecture, software solutions and low-cost hardware.
Abstract: This paper covers various aspects of film piracy over the Internet. In order to successfully deal with this matter, it is needed to recognize motivational factors related to film piracy. Thus, this study discusses group factors that could motivate individuals to engage in pirate activities. Furthermore, the paper discusses the theoretical effect on box office revenues and explains it on a proposed scheme of solutions for decreasing revenues. The article also maps the scheme of incentive motivational anti-piracy campaigns. Moreover, the paper proposes the preliminary scheme for system dynamic modeling of the Internet film piracy. Scheme is developed as a model of behaviors, influences and relations among the elements pertaining to the Internet film piracy.
Abstract: In this paper, by constructing a special set and utilizing fixed point index theory, we study the existence of solution for the boundary value problem of second-order singular differential equations in Banach space, which improved and generalize the result of related paper.
Abstract: This paper presents a multi-objective model for addressing two main objectives in designing rural roads networks: minimization of user operation costs and maximization of population covered. As limited budgets often exist, a reasonable trade-off must be obtained in order to account for both cost and social benefits in this type of networks. For a real-world rural road network, the model is solved, where all non-dominated solutions were obtained. Afterwards, an analysis is made on the (possibly) most interesting solutions (the ones providing better trade-offs). This analysis, coupled with the knowledge of the real world scenario (typically provided by decision makers) provides a suitable method for the evaluation of road networks in rural areas of developing countries.
Abstract: This paper examines the problem of designing a robust H∞ filter for a class of uncertain fuzzy descriptor systems described by a Takagi-Sugeno (TS) fuzzy model. Based on a linear matrix inequality (LMI) approach, LMI-based sufficient conditions for the uncertain nonlinear descriptor systems to have an H∞ performance are derived. To alleviate the ill-conditioning resulting from the interaction of slow and fast dynamic modes, solutions to the problem are given in terms of linear matrix inequalities which are independent of the singular perturbation ε, when ε is sufficiently small. The proposed approach does not involve the separation of states into slow and fast ones and it can be applied not only to standard, but also to nonstandard uncertain nonlinear descriptor systems. A numerical example is provided to illustrate the design developed in this paper.
Abstract: As a by-product of its "cyberspace" status, electronic
commerce is global, encompassing a whole range of B2C
relationships which need to be approached with solutions provided at
a local level while remaining viable when applied to global issues.
Today, the European Union seems to be endowed with a reliable
legal framework for consumer protection. A question which remains,
however, is enforcement of this protection. This is probably a matter
of time and awareness from both parties in the B2C relationship.
Business should realize that enhancing trust in the minds of
consumers is more than a question of technology; it is a question of
best practice. Best practice starts with the online service of high
street banks as well as with the existence of a secure, user-friendly
and cost-effective payment system. It also includes the respect of
privacy and the use of smart cards as well as enhancing privacy
technologies and fair information practice. In sum, only by offering
this guarantee of privacy and security will the consumer be assured
that, in cyberspace, his/her interests will be protected in the same
manner as in a traditional commercial environment.
Abstract: In this paper, we investigate dynamics of 2n almost periodic attractors for Cohen-Grossberg neural networks (CGNNs) with variable and distribute time delays. By imposing some new assumptions on activation functions and system parameters, we split invariant basin of CGNNs into 2n compact convex subsets. Then the existence of 2n almost periodic solutions lying in compact convex subsets is attained due to employment of the theory of exponential dichotomy and Schauder-s fixed point theorem. Meanwhile, we derive some new criteria for the networks to converge toward these 2n almost periodic solutions and exponential attracting domains are also given correspondingly.
Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.
Abstract: The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to process needed tasks under certain constraints. One of the proposed solutions to this drawback is the introduction of Collaborative Computing, a new concept dealing with the distribution of computational tasks amongst several handhelds. This paper introduces the basics of Collaborative Computing, and proposes a new protocol that aims at managing and optimizing computing tasks in Ad-Hoc Collaborative Computing Environments.
Abstract: In this paper, by using Mawhin-s continuation theorem of coincidence degree theory, we establish the existence of multiple positive periodic solutions of a competitor-competitor-mutualist Lotka-Volterra system with harvesting terms. Finally, an example is given to illustrate our results.
Abstract: In this paper the multi-mode resource-constrained project scheduling problem with discounted cash flows is considered. Minimizing the makespan and maximization the net present value (NPV) are the two common objectives that have been investigated in the literature. We apply one evolutionary algorithm named multiobjective particle swarm optimization (MOPSO) to find Pareto front solutions. We used standard sets of instances from the project scheduling problem library (PSPLIB). The results are computationally compared respect to different metrics taken from the literature on evolutionary multi-objective optimization.
Abstract: Sinc-collocation scheme is one of the new techniques
used in solving numerical problems involving integral equations. This
method has been shown to be a powerful numerical tool for finding
fast and accurate solutions. So, in this paper, some properties of the
Sinc-collocation method required for our subsequent development
are given and are utilized to reduce integral equation of the first
kind to some algebraic equations. Then convergence with exponential
rate is proved by a theorem to guarantee applicability of numerical
technique. Finally, numerical examples are included to demonstrate
the validity and applicability of the technique.
Abstract: In the past 20 years the economy of the Czech
Republic has experienced substantial changes. In the 1990s the
development was affected by the transformation which sought to
establish the right conditions for privatization and creation of
elementary market relations. In the last decade the characteristic
elements such as private ownership and corresponding institutional
framework have been strengthened. This development was marked by
the accession of the Czech Republic to the EU. The Czech Republic
is striving to reduce the difference between its level of economic
development and the quality of institutional framework in
comparison with other developed countries. The process of finding
the adequate solutions has been hampered by the negative impact of
the world financial crisis on the Czech Republic and the standard of
living of its inhabitants. This contribution seeks to address the
question of whether and to which extent the economic development
of the transitive Czech economy is affected by the change in
behaviour of households and their tendency to consumption, i.e. in
the sense of reduction or increase in demand for goods and services.
It aims to verify whether the increasing trend of household
indebtedness and decreasing trend of saving pose a significant risk in
the Czech Republic. At a general level the analysis aims to contribute
to finding an answer to the question of whether the debt increase of
Czech households is connected to the risk of "eating through" the
borrowed money and whether Czech households risk falling into a
debt trap. In addition to household indebtedness risks in the Czech
Republic the analysis will focus on identification of specifics of the
transformation phase of the Czech economy in comparison with the
EU countries, or selected OECD countries.
Abstract: Both the minimum energy consumption and
smoothness, which is quantified as a function of jerk, are generally
needed in many dynamic systems such as the automobile and the
pick-and-place robot manipulator that handles fragile equipments.
Nevertheless, many researchers come up with either solely
concerning on the minimum energy consumption or minimum jerk
trajectory. This research paper proposes a simple yet very interesting
relationship between the minimum direct and indirect jerks
approaches in designing the time-dependent system yielding an
alternative optimal solution. Extremal solutions for the cost functions
of direct and indirect jerks are found using the dynamic optimization
methods together with the numerical approximation. This is to allow
us to simulate and compare visually and statistically the time history
of control inputs employed by minimum direct and indirect jerk
designs. By considering minimum indirect jerk problem, the
numerical solution becomes much easier and yields to the similar
results as minimum direct jerk problem.
Abstract: Today, money laundering (ML) poses a serious threat
not only to financial institutions but also to the nation. This criminal
activity is becoming more and more sophisticated and seems to have
moved from the cliché of drug trafficking to financing terrorism and
surely not forgetting personal gain. Most international financial
institutions have been implementing anti-money laundering solutions
(AML) to fight investment fraud. However, traditional investigative
techniques consume numerous man-hours. Recently, data mining
approaches have been developed and are considered as well-suited
techniques for detecting ML activities. Within the scope of a
collaboration project for the purpose of developing a new solution for
the AML Units in an international investment bank, we proposed a
data mining-based solution for AML. In this paper, we present a
heuristics approach to improve the performance for this solution. We
also show some preliminary results associated with this method on
analysing transaction datasets.
Abstract: In this paper, using (G/G )-expansion method and modified F-expansion method, we give some explicit formulas of exact traveling wave solutions for the (3+1)-dimensional breaking soliton equation. A modified F-expansion method is proposed by taking full advantages of F-expansion method and Riccati equation in seeking exact solutions of the equation.
Abstract: The Maximum Weighted Independent Set (MWIS)
problem is a classic graph optimization NP-hard problem. Given an
undirected graph G = (V, E) and weighting function defined on the
vertex set, the MWIS problem is to find a vertex set S V whose total
weight is maximum subject to no two vertices in S are adjacent. This
paper presents a novel approach to approximate the MWIS of a graph
using minimum weighted vertex cover of the graph. Computational
experiments are designed and conducted to study the performance
of our proposed algorithm. Extensive simulation results show that
the proposed algorithm can yield better solutions than other existing
algorithms found in the literature for solving the MWIS.
Abstract: Domain-specific languages describe specific solutions to problems in the application domain. Traditionally they form a solution composing black-box abstractions together. This, usually, involves non-deep transformations over the target model. In this paper we argue that it is potentially powerful to operate with grey-box abstractions to build a domain-specific software system. We present parametric code templates as grey-box abstractions and conceptual tools to encapsulate and manipulate these templates. Manipulations introduce template-s merging routines and can be defined in a generic way. This involves reasoning mechanisms at the code templates level. We introduce the concept of Neurath Modelling Language (NML) that operates with parametric code templates and specifies a visualisation mapping mechanism for target models. Finally we provide an example of calculating a domain-specific software system with predefined NML elements.