Abstract: China apparel industry, which is deeply embedded in
the global production network (GPN), faces the dual pressures of
social upgrading and economic upgrading. Based on the survey in
Ningbo apparel cluster, the paper shows the state of corporate social
responsibility (CSR) in China apparel industry is better than before.
And the investigation indicates that the firms who practice CSR
actively perform better both socially and economically than those who
inactively. The research demonstrates that CSR can be an initial
capital rather than cost, and “doing well by doing good" is also existed
in labor intensive industry.
Abstract: Dichotomization of the outcome by a single cut-off point is an important part of various medical studies. Usually the relationship between the resulted dichotomized dependent variable and explanatory variables is analyzed with linear regression, probit regression or logistic regression. However, in many real-life situations, a certain cut-off point dividing the outcome into two groups is unknown and can be specified only approximately, i.e. surrounded by some (small) uncertainty. It means that in order to have any practical meaning the regression model must be robust to this uncertainty. In this paper, we show that neither the beta in the linear regression model, nor its significance level is robust to the small variations in the dichotomization cut-off point. As an alternative robust approach to the problem of uncertain medical categories, we propose to use the linear regression model with the fuzzy membership function as a dependent variable. This fuzzy membership function denotes to what degree the value of the underlying (continuous) outcome falls below or above the dichotomization cut-off point. In the paper, we demonstrate that the linear regression model of the fuzzy dependent variable can be insensitive against the uncertainty in the cut-off point location. In the paper we present the modeling results from the real study of low hemoglobin levels in infants. We systematically test the robustness of the binomial regression model and the linear regression model with the fuzzy dependent variable by changing the boundary for the category Anemia and show that the behavior of the latter model persists over a quite wide interval.
Abstract: The paper deals with a mathematical model for fluid dynamic flows on road networks which is based on conservation laws. This nonlinear framework is based on the conservation of cars. We focus on traffic circle, which is a finite number of roads that meet at some junctions. The traffic circle with junctions having either one incoming and two outgoing or two incoming and one outgoing roads. We describe the numerical schemes with the particular boundary conditions used to produce approximated solutions of the problem.
Abstract: In this paper after reviewing some previous studies, in
order to optimize the above knee prosthesis, beside the inertial
properties a new controlling parameter is informed. This controlling
parameter makes the prosthesis able to act as a multi behavior system
when the amputee is opposing to different environments. This active
prosthesis with the new controlling parameter can simplify the
control of prosthesis and reduce the rate of energy consumption in
comparison to recently presented similar prosthesis “Agonistantagonist
active knee prosthesis".
In this paper three models are generated, a passive, an active, and
an optimized active prosthesis. Second order Taylor series is the
numerical method in solution of the models equations and the
optimization procedure is genetic algorithm.
Modeling the prosthesis which comprises this new controlling
parameter (SEP) during the swing phase represents acceptable results
in comparison to natural behavior of shank. Reported results in this
paper represent 3.3 degrees as the maximum deviation of models
shank angle from the natural pattern. The natural gait pattern belongs
to walking at the speed of 81 m/min.
Abstract: Ontologies and tagging systems are two different ways to organize the knowledge present in the current Web. In this paper we propose a simple method to model folksonomies, as tagging systems, with ontologies. We show the scalability of the method using real data sets. The modeling method is composed of a generic ontology that represents any folksonomy and an algorithm to transform the information contained in folksonomies to the generic ontology. The method allows representing folksonomies at any instant of time.
Abstract: Adaptive echo cancellers with two-path algorithm are
applied to avoid the false adaptation during the double-talk situation.
In the two-path algorithm, several transfer logic solutions have been
proposed to control the filter update. This paper presents an improved
transfer logic solution. It improves the convergence speed of the
two-path algorithm, and allows the reduction of the memory elements
and computational complexity. Results of simulations show the
improved performance of the proposed solution.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: Ultrasonic machining (USM) is a non-traditional
machining process being widely used for commercial machining of
brittle and fragile materials such as glass, ceramics and
semiconductor materials. However, USM could be a viable
alternative for machining a tough material such as titanium; and this
aspect needs to be explored through experimental research. This
investigation is focused on exploring the use of ultrasonic machining
for commercial machining of pure titanium (ASTM Grade-I) and
evaluation of tool wear rate (TWR) under controlled experimental
conditions. The optimal settings of parameters are determined
through experiments planned, conducted and analyzed using Taguchi
method. In all, the paper focuses on parametric optimization of
ultrasonic machining of pure titanium metal with TWR as response,
and validation of the optimized value of TWR by conducting
confirmatory experiments.
Abstract: Our aim in this piece of work is to demonstrate the
power of the Laplace Adomian decomposition method (LADM) in
approximating the solutions of nonlinear differential equations
governing the two-dimensional viscous flow induced by a shrinking
sheet.
Abstract: Coal fly ash (CFA) generated by coal-based thermal
power plants is mainly composed of some oxides having high
crystallinity, like quartz and mullite. In this study, the effect of CFA
crystallinity toward lead adsorption capacity was investigated. To get
solid with various crystallinity, the solution of sodium hydroxide
(NaOH) of 1-7 M was used to treat CFA at various temperature and
reflux time. Furthermore, to evaluate the effect of NaOH-treated CFA
with respect to adsorption capacity, the treated CFA were examine as
adsorbent for removing lead in the solution. The result shows that
using NaOH to treat CFA causes crystallinity of quartz and mullite
decrease. At higher NaOH concentration (>3M), in addition the
damage of quartz and mullite crystallinity is followed by crystal
formation called hydroxysodalite. The lower crystalllinity, the higher
adsorption capacity.
Abstract: The aim of the article is to describe modern
contemporary systems of employees' remuneration used in
organizations, to give a general overview of these questions based on
the questionnaire survey made by the authors, as well as to assess
possible effects of economic crisis in this area. It is necessary to be
aware of the fact that firm's success in the contemporary business
environment depends not only on the technical equipment, financial
resources, availability of raw materials and information and effective
management, but one of the crucial factors of firm's success is its
human potential. The article emphasizes that the well working
remuneration system has a very important position in the
organization in the broadest sense. The paper also aims to the current
situation in the area of employees' remuneration in one of Czech
Republic regions, in the Moravian-Silesian Region.
Abstract: In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the information security education would have rather higher recognition concerning countermeasures than other users including self-educated users. It is suggested that the information security education should be enhanced so that the users may appropriately take the information security countermeasures. In addition, the information security policy such as carrying out "e- net caravan" and "information security seminars" are effective in improving the users' awareness on the information security in Japan.
Abstract: This paper proposes a direct power control for
doubly-fed induction machine for variable speed wind power
generation. It provides decoupled regulation of the primary side
active and reactive power and it is suitable for both electric energy
generation and drive applications. In order to control the power
flowing between the stator of the DFIG and the network, a decoupled
control of active and reactive power is synthesized using PI
controllers.The obtained simulation results show the feasibility
and the effectiveness of the suggested method
Abstract: An integrated vehicle dynamics control system is developed in this paper by a combination of active front steering (AFS) and direct yaw-moment control (DYC) based on fuzzy logic control. The control system has a hierarchical structure consisting of two layers. A fuzzy logic controller is used in the upper layer (yaw rate controller) to keep the yaw rate in its desired value. The yaw rate error and its rate of change are applied to the upper controlling layer as inputs, where the direct yaw moment control signal and the steering angle correction of the front wheels are the outputs. In the lower layer (fuzzy integrator), a fuzzy logic controller is designed based on the working region of the lateral tire forces. Depending on the directions of the lateral forces at the front wheels, a switching function is activated to adjust the scaling factor of the fuzzy logic controller. Using a nonlinear seven degrees of freedom vehicle model, the simulation results illustrate considerable improvements which are achieved in vehicle handling through the integrated AFS/DYC control system in comparison with the individual AFS or DYC controllers.
Abstract: Normally business changes are made in order to
change a level of activity in some way, whether it is sales, cash flow,
productivity, or product portfolio. When attempts are made to make
such changes, too often the business reverts to the old levels of
activity as soon as management attention is diverted. Risk
management is a field of growing interest to project managers as well
as in general business and organizational management. There are
several approaches used to manage risk in projects and this paper is a
brief outline of some that you might encounter, with an indication of
their strengths and weaknesses.
Abstract: There is wide range of scientific workflow systems
today, each one designed to resolve problems at a specific level. In
large collaborative projects, it is often necessary to recognize the
heterogeneous workflow systems already in use by various partners
and any potential collaboration between these systems requires
workflow interoperability. Publish/Subscribe Scientific Workflow
Interoperability Framework (PS-SWIF) approach was proposed to
achieve workflow interoperability among workflow systems. This
paper evaluates the PS-SWIF approach and its system to achieve
workflow interoperability using Web Services with asynchronous
notification messages represented by WS-Eventing standard. This
experiment covers different types of communication models provided
by Workflow Management Coalition (WfMC). These models are:
Chained processes, Nested synchronous sub-processes, Event
synchronous sub-processes, and Nested sub-processes
(Polling/Deferred Synchronous). Also, this experiment shows the
flexibility and simplicity of the PS-SWIF approach when applied to a
variety of workflow systems (Triana, Taverna, Kepler) in local and
remote environments.
Abstract: In this paper, we investigate the problem of the existence, uniqueness and global asymptotic stability of the equilibrium point for a class of neural networks, the neutral system has mixed time delays and parameter uncertainties. Under the assumption that the activation functions are globally Lipschitz continuous, we drive a new criterion for the robust stability of a class of neural networks with time delays by utilizing the Lyapunov stability theorems and the Homomorphic mapping theorem. Numerical examples are given to illustrate the effectiveness and the advantage of the proposed main results.
Abstract: Soft topological spaces are considered as mathematical tools for dealing with uncertainties, and a fuzzy topological space
is a special case of the soft topological space. The purpose of this paper is to study soft topological spaces. We introduce some new concepts in soft topological spaces such as soft closed mapping, soft open mappings, soft connected spaces and soft paracompact spaces. We also redefine the concept of soft points such that it is reasonable in soft topological spaces. Moreover, some basic properties of these concepts are explored.
Abstract: This paper describes analysis of low velocity transverse impact on fully backed sandwich beams with composite faces from Eglass/epoxy and cores from Polyurethane or PVC. Indentation on sandwich beams has been analyzed with the existing theories and modeled with the FE code ABAQUS, also loadings have been done experimentally to verify theoretical results. Impact on fully backed has been modeled in two cases of impactor energy with SDOF model (single-degree-of-freedom) and indentation stiffness: lower energy for elastic indentation of sandwich beams and higher energy for plastic area in indentation. Impacts have been modeled by ABAQUS. Impact results can describe response of beam in terms of core and faces thicknesses, core material, indentor energy and energy absorbed. The foam core is modeled using the crushable foam material model and response of the foam core is experimentally characterized in uniaxial compression with higher velocity loading to define quasi impact behaviour.
Abstract: This study is a descriptive-normative research. It
attempted to investigate the restaurants’ firm performance in terms of
the customers and restaurant personnel’s degree of satisfaction. A
total of 12 restaurants in Bangkok, Thailand that offer Thai cuisine
were included in this study. It involved 24 stockholders/managers,
120 subordinates and 360 customers. General Managers and
restaurants’ stockholders, 10 staffs, and 30 costumers for each
restaurant were chosen for random sampling. This study found that
respondents are slightly satisfied with their work environment but are
generally satisfied with the accessibility to transportation, to malls,
convenience, safety, recreation, noise-free, and attraction; customers
find the Quality of Food in most Thai Cuisines like services, prices of
food, sales promotion, and capital and length of service satisfactory.
Therefore, both stockholder-related and personnel-related factors
which are influenced by restaurant, personnel, and customer-related
factors are partially accepted whereas; customer-related factors which
are influenced by restaurant, personnel and customer-related factors
are rejected.