Abstract: Sedimentation is a hydraulic phenomenon that is
emerging as a serious challenge in river engineering. When the flow
reaches a certain state that gather potential energy, it shifts the
sediment load along channel bed. The transport of such materials can
be in the form of suspended and bed loads. The movement of these
along the river course and channels and the ways in which this could
influence the water intakes is considered as the major challenges for
sustainable O&M of hydraulic structures. This could be very serious
in arid and semi-arid regions like Iran, where inappropriate watershed
management could lead to shifting a great deal of sediments into the
reservoirs and irrigation systems. This paper aims to investigate
sedimentation in the Western Canal of Dez Diversion Weir in Iran,
identifying factors which influence the process and provide ways in
which to mitigate its detrimental effects by using the SHARC
Software.
For the purpose of this paper, data from the Dezful water authority
and Dezful Hydrometric Station pertinent to a river course of about 6
Km were used.
Results estimated sand and silt bed loads concentrations to be 193
ppm and 827ppm respectively. Given the available data on average
annual bed loads and average suspended sediment loads of 165ppm
and 837ppm, there was a significant statistical difference (16%)
between the sand grains, whereas no significant difference (1.2%)
was find in the silt grain sizes. One explanation for such finding
being that along the 6 Km river course there was considerable
meandering effects which explains recent shift in the hydraulic
behavior along the stream course under investigation. The sand
concentration in downstream relative to present state of the canal
showed a steep descending curve. Sediment trapping on the other
hand indicated a steep ascending curve. These occurred because the
diversion weir was not considered in the simulation model.
Abstract: The study will search the level of existence of the
sweethearting in Saudi Arabia's Supermarkets in Riyadh.
Sweethearting occurs when frontline workers give unauthorized free
or uncounted goods and services to customer-s conspirators. The
store managers and /or security managers were asked about the
sweethearting that occurs in the supermarkets. The characteristics of
sweethearting in Riyadh stores were investigated. Two independent
variables were related to the report of sweethearting. These
independent variables are: The effect of store environment on
sweethearting and the security techniques and loss prevention
electronics techniques used. This study expected to shed the light
about the level of sweethearting in Saudi Arabia and the factors
behind it. This study will serve as an exploratory study for such
phenomenon in Saudi Arabia as well as both descriptive for the
characteristics of sweethearting and explanatory study to link
between the environmental and security systems factors to
sweethearting.
Abstract: High Performance Work Systems (HPWS) generally give rise to positive impacts on employees by increasing their commitments in workplaces. While some argued this actually have considerable negative impacts on employees with increasing possibilities of imposing strains caused by stress and intensity of such work places. Do stressful workplaces hamper employee commitment? The author has tried to find the answer by exploring linkages between HPWS practices and its impact on employees in Japanese organizations. How negative outcomes like job intensity and workplaces and job stressors can influence different forms of employees- commitments which can be a hindrance to their performance. Design: A close ended questionnaire survey was conducted amongst 16 large, medium and small sized Japanese companies from diverse industries around Chiba, Saitama, and Ibaraki Prefectures and in Tokyo from the month of October 2008 to February 2009. Questionnaires were aimed to the non managerial employees- perceptions of HPWS practices, their behavior, working life experiences in their work places. A total of 227 samples are used for analysis in the study. Methods: Correlations, MANCOVA, SEM Path analysis using AMOS software are used for data analysis in this study. Findings: Average non-managerial perception of HPWS adoption is significantly but negatively correlated to both work place Stressors and Continuous commitment, but positively correlated to job Intensity, Affective, Occupational and Normative commitments in different workplaces at Japan. The path analysis by SEM shows significant indirect relationship between Stressors and employee Affective organizational commitment and Normative organizational commitments. Intensity also has a significant indirect effect on Occupational commitments. HPWS has an additive effect on all the outcomes variables. Limitations: The sample size in this study cannot be a representative to the entire population of non-managerial employees in Japan. There were no respondents from automobile, pharmaceuticals, finance industries. The duration of the survey coincided in a period when Japan as most of the other countries is under going recession. Biases could not be ruled out completely. We must take cautions in interpreting the results of studies as they cannot be generalized. And the path analysis cannot provide the complete causality of the inter linkages between the variables used in the study. Originality: There have been limited studies on linkages in HPWS adoptions and their impacts on employees- behaviors and commitments in Japanese workplaces. This study may provide some ingredients for further research in the fields of HRM policies and practices and their linkages on different forms of employees- commitments.
Abstract: Transition prediction of boundary layers has always
been an important problem in fluid mechanics both theoretically and
practically, yet notwithstanding the great effort made by many
investigators, there is no satisfactory answer to this problem. The most
popular method available is so-called e-N method which is heavily
dependent on experiments and experience. The author has proposed
improvements to the e-N method, so to reduce its dependence on
experiments and experience to a certain extent. One of the key
assumptions is that transition would occur whenever the velocity
amplitude of disturbance reaches 1-2% of the free stream velocity.
However, the reliability of this assumption needs to be verified. In this
paper, transition prediction on a flat plate is investigated by using both
the improved e-N method and the parabolized stability equations (PSE)
methods. The results show that the transition locations predicted by
both methods agree reasonably well with each other, under the above
assumption. For the supersonic case, the critical velocity amplitude in
the improved e-N method should be taken as 0.013, whereas in the
subsonic case, it should be 0.018, both are within the range 1-2%.
Abstract: Ad hoc networks are characterized by multi-hop
wireless connectivity and frequently changing network topology.
Forming security association among a group of nodes in ad-hoc
networks is more challenging than in conventional networks due to the
lack of central authority, i.e. fixed infrastructure. With that view in
mind, group key management plays an important building block of
any secure group communication. The main contribution of this paper
is a low complexity key management scheme that is suitable for fully
self-organized ad-hoc networks. The protocol is also password
authenticated, making it resilient against active attacks. Unlike other
existing key agreement protocols, ours make no assumption about the
structure of the underlying wireless network, making it suitable for
“truly ad-hoc" networks. Finally, we will analyze our protocol to show
the computation and communication burden on individual nodes for
key establishment.
Abstract: Different methods containing biometric algorithms are
presented for the representation of eigenfaces detection including
face recognition, are identification and verification. Our theme of this
research is to manage the critical processing stages (accuracy, speed,
security and monitoring) of face activities with the flexibility of
searching and edit the secure authorized database. In this paper we
implement different techniques such as eigenfaces vector reduction
by using texture and shape vector phenomenon for complexity
removal, while density matching score with Face Boundary Fixation
(FBF) extracted the most likelihood characteristics in this media
processing contents. We examine the development and performance
efficiency of the database by applying our creative algorithms in both
recognition and detection phenomenon. Our results show the
performance accuracy and security gain with better achievement than
a number of previous approaches in all the above processes in an
encouraging mode.
Abstract: This article considers the main features of party
construction in the course of political modernization of Kazakhstan.
Along with consideration of party construction author analyzed how
the transformation of the party system was fulfilled in Kazakhstan.
Besides the basic stages in the course of party construction were
explained by the author. The statistical data is cited.
Abstract: This paper is a continuation of our interest in the influence of temperature on specific retention volumes and the resulting infinite dilution activity coefficients. This has a direct effect in the design of absorption and stripping columns for the abatement of volatile organic compounds. The interaction of 13 volatile organic compounds (VOCs) with polydimethylsiloxane (PDMS) at varying temperatures was studied by gas liquid chromatography (GLC). Infinite dilution activity coefficients and specific retention volumes obtained in this study were found to be in agreement with those obtained from static headspace and group contribution methods by the authors as well as literature values for similar systems. Temperature variation also allows for transport calculations for different seasons. The results of this work confirm that PDMS is well suited for the scrubbing of VOCs from waste gas streams. Plots of specific retention volumes against temperature gave linear van-t Hoff plots.
Abstract: The link between coordinate transformations in the plane and their effects on the graph of a function can be difficult for students studying college level mathematics to comprehend. To solidify this conceptual link in the mind of a student Microsoft Excel can serve as a convenient graphing tool and pedagogical aid. The authors of this paper describe how various transformations and their related functional symmetry properties can be graphically displayed with an Excel spreadsheet.
Abstract: Internal controls of accounting are an essential
business function for a growth-oriented organization, and include the
elements of risk assessment, information communications and even
employees' roles and responsibilities. Internal controls of accounting
systems are designed to protect a company from fraud, abuse and
inaccurate data recording and help organizations keep track of
essential financial activities. Internal controls of accounting provide a
streamlined solution for organizing all accounting procedures and
ensuring that the accounting cycle is completed consistently and
successfully. Implementing a formal Accounting Procedures Manual
for the organization allows the financial department to facilitate
several processes and maintain rigorous standards. Internal controls
also allow organizations to keep detailed records, manage and
organize important financial transactions and set a high standard for
the organization's financial management structure and protocols. A
well-implemented system also reduces the risk of accounting errors
and abuse. A well-implemented controls system allows a company's
financial managers to regulate and streamline all functions of the
accounting department. Internal controls of accounting can be set up
for every area to track deposits, monitor check handling, keep track
of creditor accounts, and even assess budgets and financial statements
on an ongoing basis. Setting up an effective accounting system to
monitor accounting reports, analyze records and protect sensitive
financial information also can help a company set clear goals and
make accurate projections. Creating efficient accounting processes
allows an organization to set specific policies and protocols on
accounting procedures, and reach its financial objectives on a regular
basis. Internal accounting controls can help keep track of such areas
as cash-receipt recording, payroll management, appropriate recording
of grants and gifts, cash disbursements by authorized personnel, and
the recording of assets. These systems also can take into account any
government regulations and requirements for financial reporting.
Abstract: Article presents the geometry and structure
reconstruction procedure of the aircraft model for flatter research
(based on the I22-IRYDA aircraft). For reconstruction the Reverse
Engineering techniques and advanced surface modeling CAD tools
are used. Authors discuss all stages of data acquisition process,
computation and analysis of measured data. For acquisition the three
dimensional structured light scanner was used. In the further sections,
details of reconstruction process are present. Geometry
reconstruction procedure transform measured input data (points
cloud) into the three dimensional parametric computer model
(NURBS solid model) which is compatible with CAD systems.
Parallel to the geometry of the aircraft, the internal structure
(structural model) are extracted and modeled. In last chapter the
evaluation of obtained models are discussed.
Abstract: Fisheries management all around the world is
hampered by the lack, or poor quality, of critical data on fish
resources and fishing operations. The main reasons for the chronic
inability to collect good quality data during fishing operations is the
culture of secrecy common among fishers and the lack of modern
data gathering technology onboard most fishing vessels. In response,
OLRAC-SPS, a South African company, developed fisheries datalogging
software (eLog in short) and named it Olrac. The Olrac eLog
solution is capable of collecting, analysing, plotting, mapping,
reporting, tracing and transmitting all data related to fishing
operations. Olrac can be used by skippers, fleet/company managers,
offshore mariculture farmers, scientists, observers, compliance
inspectors and fisheries management authorities. The authors believe
that using eLog onboard fishing vessels has the potential to
revolutionise the entire process of data collection and reporting
during fishing operations and, if properly deployed and utilised,
could transform the entire commercial fleet to a provider of good
quality data and forever change the way fish resources are managed.
In addition it will make it possible to trace catches back to the actual
individual fishing operation, to improve fishing efficiency and to
dramatically improve control of fishing operations and enforcement
of fishing regulations.
Abstract: Global Software Development (GSD) projects are
passing through different boundaries of a company, country and even
in other continents where time zone differs between both sites.
Beside many benefits of such development, research declared plenty
of negative impacts on these GSD projects. It is important to
understand problems which may lie during the execution of GSD
project with different time zones. This research project discussed and
provided different issues related to time delays in GSD projects. In
this paper, authors investigated some of the time delay factors which
usually lie in GSD projects with different time zones. This
investigation is done through systematic review of literature.
Furthermore, the practices to overcome these delay factors which
have already been reported in literature and GSD organizations are
also explored through literature survey and case studies.
Abstract: In the management of industrial waste, conversion from the use of paper invoices to electronic forms is currently under way in developed countries. Difficulties in such computerization include the lack of synchronization between the actual goods and the corresponding data managed by the server. Consequently, a system which utilizes the incorporation of a QR code in connection with the waste material has been developed. The code is read at each stage, from discharge until disposal, and progress at each stage can be easily reported. This system can be linked with Japanese public digital authentication service of waste, taking advantage of its good points, and can be used to submit reports to the regulatory authorities. Its usefulness was confirmed by a verification test, and put into actual practice.
Abstract: Users of computer systems may often require the
private transfer of messages/communications between parties across
a network. Information warfare and the protection and dominance of
information in the military context is a prime example of an
application area in which the confidentiality of data needs to be
maintained. The safe transportation of critical data is therefore often
a vital requirement for many private communications. However,
unwanted interception/sniffing of communications is also a
possibility. An elementary stealthy transfer scheme is therefore
proposed by the authors. This scheme makes use of encoding,
splitting of a message and the use of a hashing algorithm to verify the
correctness of the reconstructed message. For this proof-of-concept
purpose, the authors have experimented with the random sending of
encoded parts of a message and the construction thereof to
demonstrate how data can stealthily be transferred across a network
so as to prevent the obvious retrieval of data.
Abstract: In open settings, the participants in virtual
organization are autonomous and there is no central authority to
ensure the felicity of their interactions. When agents interact in such
settings, each relies upon being able to model the trustworthiness of
the agents with whom it interacts. Fundamentally, such models must
consider the past behavior of the other parties in order to predict their
future behavior. Further, it is sensible for the agents to share
information via referrals to trustworthy agents. In this article, trust is
a bet on the future contingent actions of others" and enumerates six
major factors supporting it: (1) reputation, (2) performance, (3)
appearance, (4) accountability, (5) precommitment, and (6)
contextual facilitation.
Abstract: The architecture of Safavid Dynasty can be considered the epitome of Iranian architectural beauty. Safavid dynasty (1501- 1722 AC) along with Ottoman in Turkey and Mughal Empire in India were the three great Islamic nations of their time (1500 AC) often known as the last Islamic countries with international authority up to the 20th Century. This era approximately coincide with Renaissance in Europe. In this era, large European countries begin amassing power thanks to significant scientific, cultural and religious revolutions of that time and colonizing nations such as England, Spain and Portugal began to influence international trends with in an increasing while other non-industrial nations diminished. The main objective of this paper is to give a typological overview of the development of decoration and ornament in the architecture of Safafid Dynasty in Iran. It is expected that it can start a wider discussion to enrich this nation-s heritage and contribute to the development of Islamic ornament in general.
Abstract: The paper presents a new system for the automat
control of the aircrafts- flight in lateral plane using the cinematic
model and the dynamic inversion. Starting from the equations of the
aircrafts- lateral movement, the authors use two axes systems and
obtained a control law that cancels the lateral deviation of the flying
objects from the runway line. This system makes the aircrafts-
direction angle to follow the direction angle of the runway line.
Simulations in Matlab/Simulink have been done for different
aircraft-s initial points and direction angles. The inconvenience of
this system is the long duration of the “transient regime". That is why
this system can be used independently, but the results are not very
good; thus, it can be a part (subsystem) of other systems. The main
system that cancels the lateral deviation from the runway line is
based on dynamic inversion and uses, as subsystem, the control
system for the lateral movement using the cinematic model. Using
complex Matlab/Simulink models, the authors obtained the time
evolution of the direction angle and the time evolution of the aircraft
lateral deviation with respect to the runway line, for different values
of the initial direction angle and for different wind types. The system
has a very good behavior for all initial direction angles and wind
types.
Abstract: The scope of this paper is to describe a real electrical
installation of renewable energy using photovoltaic cells. The
displayed power grid connected network was established in 2007 at
area of Northern Greece. The photovoltaic park is composed of 6120
photovoltaic cells able to deliver a total power of 1.101.600 Wp. For
the transformation of DC voltage to AC voltage have been used 25
stand alone three phases inverters and for the connection at the
medium voltage network of Greek Power Authority have been
installed two oil immersed transformer of 630 kVA each one. Due to
the wide space area of installation a specific external lightning
protection system has been designed. Additionally, due to the
sensitive electronics of the control and protection systems of park,
surge protection, equipotent bonding and shielding were also of
major importance.
Abstract: This article introduces the actual problem that is а
study of proposed by the authors Hydrocele ointment in amino acids’
metabolism of cows’ blood in inflammation of traumatic origin.
Hydrocele ointment has shown a positive effect on inflammatory
process and amino acids’ metabolism of animals treated with the
drug. Amino acid levels reached physiological parameters on the 10th
day after treatment; in the control group this parameter was higher
than normal.