Abstract: The flow field within the combustor of scramjet
engine is very complex and poses a considerable challenge in the
design and development of a supersonic combustor with an optimized
geometry. In this paper comprehensive numerical studies on flow
field characteristics of different cavity based scramjet combustors
with transverse injection of hydrogen have been carried out for both
non-reacting and reacting flows. The numerical studies have been
carried out using a validated 2D unsteady, density based 1st-order
implicit k-omega turbulence model with multi-component finite rate
reacting species. The results show a wide variety of flow features
resulting from the interactions between the injector flows, shock
waves, boundary layers, and cavity flows. We conjectured that an
optimized cavity is a good choice to stabilize the flame in the
hypersonic flow, and it generates a recirculation zone in the scramjet
combustor. We comprehended that the cavity based scramjet
combustors having a bearing on the source of disturbance for the
transverse jet oscillation, fuel/air mixing enhancement, and flameholding
improvement. We concluded that cavity shape with
backward facing step and 45o forward ramp is a good choice to get
higher temperatures at the exit compared to other four models of
scramjet combustors considered in this study.
Abstract: This contribution aims to outline some topics around the process of introduction of compulsory electronic exchange of documents (so called e-Boxes) in public administration. The research was conducted in order to gauge the difference between the expectation of those using internal email and their experience in reality. Both qualitative and quantitative research is employed to lead also to an estimation of the willingness and readiness of government bodies, business units and citizens to adopt new technologies. At the same time the most potent barriers to successful e-communication through the e-Boxes are identified.
Abstract: This work describes a CACSD tool for automatic design of robust controllers for hydraulic turbines. The tool calculates the optimal controller using the MATLAB hinfopt function and it
serves as a practical and effective solution for the laborious task of
designing a different controller for each type of turbine and generator, and different parameters and conditions of the plant. Results of the simulation of a generating unit subject to parameters
variation show the accuracy and efficiency of the obtained robust
controllers.
Abstract: This paper presents the robust stability criteria for uncertain genetic regulatory networks with time-varying delays. One key point of the criterion is that the decomposition of the matrix ˜D into ˜D = ˜D1 + ˜D2. This decomposition corresponds to a decomposition of the delayed terms into two groups: the stabilizing ones and the destabilizing ones. This technique enables one to take the stabilizing effect of part of the delayed terms into account. Meanwhile, by choosing an appropriate new Lyapunov functional, a new delay-dependent stability criteria is obtained and formulated in terms of linear matrix inequalities (LMIs). Finally, numerical examples are presented to illustrate the effectiveness of the theoretical results.
Abstract: This paper examines the problem of designing a robust H∞ filter for a class of uncertain fuzzy descriptor systems described by a Takagi-Sugeno (TS) fuzzy model. Based on a linear matrix inequality (LMI) approach, LMI-based sufficient conditions for the uncertain nonlinear descriptor systems to have an H∞ performance are derived. To alleviate the ill-conditioning resulting from the interaction of slow and fast dynamic modes, solutions to the problem are given in terms of linear matrix inequalities which are independent of the singular perturbation ε, when ε is sufficiently small. The proposed approach does not involve the separation of states into slow and fast ones and it can be applied not only to standard, but also to nonstandard uncertain nonlinear descriptor systems. A numerical example is provided to illustrate the design developed in this paper.
Abstract: As a by-product of its "cyberspace" status, electronic
commerce is global, encompassing a whole range of B2C
relationships which need to be approached with solutions provided at
a local level while remaining viable when applied to global issues.
Today, the European Union seems to be endowed with a reliable
legal framework for consumer protection. A question which remains,
however, is enforcement of this protection. This is probably a matter
of time and awareness from both parties in the B2C relationship.
Business should realize that enhancing trust in the minds of
consumers is more than a question of technology; it is a question of
best practice. Best practice starts with the online service of high
street banks as well as with the existence of a secure, user-friendly
and cost-effective payment system. It also includes the respect of
privacy and the use of smart cards as well as enhancing privacy
technologies and fair information practice. In sum, only by offering
this guarantee of privacy and security will the consumer be assured
that, in cyberspace, his/her interests will be protected in the same
manner as in a traditional commercial environment.
Abstract: Al-Murabahah is an Islamic financing facility used in
asset financing, the profit rate of the contract is determined by
components which are also being used in the conventional banking.
Such are cost of fund, overhead cost, risk premium cost and bank-s
profit margin. At the same time, the profit rate determined by Islamic
banking system also refers to Inter-Bank Offered Rate (LIBOR) in
London as a benchmark. This practice has risen arguments among
Muslim scholars in term of its validity of the contract; whether the
contract maintains the Shariah compliance or not. This paper aims to
explore the view of Shariah towards the above components practiced
by Islamic Banking in determining the profit rate of al-murabahah
asset financing in Malaysia. This is a comparative research which
applied the views of Muslim scholars from all major mazahibs in
Islamic jurisprudence and examined the practices by Islamic banks in
Malaysia for the above components. The study found that the shariah
accepts all the components with conditions. The cost of fund is
accepted as a portion of al-mudarabah-s profit, the overhead cost is
accepted as a cost of product, risk premium cost consist of business
risk and mitigation risk are accepted through the concept of alta-awun
and bank-s profit margin is accepted as a right of bank after
venturing in risky investment.
Abstract: In this work, we treat the problems related to chemical and petrochemical plants of a certain complex process taking the centrifugal compressor as an example, a system being very complex by its physical structure as well as its behaviour (surge phenomenon). We propose to study the application possibilities of the recent control approaches to the compressor behaviour, and consequently evaluate their contribution in the practical and theoretical fields. Facing the studied industrial process complexity, we choose to make recourse to fuzzy logic for analysis and treatment of its control problem owing to the fact that these techniques constitute the only framework in which the types of imperfect knowledge can jointly be treated (uncertainties, inaccuracies, etc..) offering suitable tools to characterise them. In the particular case of the centrifugal compressor, these imperfections are interpreted by modelling errors, the neglected dynamics, no modelisable dynamics and the parametric variations. The purpose of this paper is to produce a total robust nonlinear controller design method to stabilize the compression process at its optimum steady state by manipulating the gas rate flow. In order to cope with both the parameter uncertainty and the structured non linearity of the plant, the proposed method consists of a linear steady state regulation that ensures robust optimal control and of a nonlinear compensation that achieves the exact input/output linearization.
Abstract: In recent years, though, the concept of fit has been
now in widespread used in strategic management research, it is in its
infancy for applying fit concept to service innovation issue. Therefore,
drawing on the concept of fit, this present research proposed an
innovation service fit model within service innovation, market
orientation, marketing strategy, and IT adoption are coexisted. The
perspective of fit as covariation will be employed to test the hypothesis
and identify the effects of fit. We contend that the fit among these four
factors will contribution to business performance. Finally, according
to the empirical data collected from manufacturing, service, and
financial industry in Taiwan, meaningful findings and conclusions
will be proposed and discussed.
Abstract: In this paper, a strategy for long-span bridge disaster response was developed, divided into risk analysis, business impact analysis, and emergency response plan. At the risk analysis stage, the critical risk was estimated. The critical risk was “car accident."The critical process by critical-risk classification was assessed at the business impact analysis stage. The critical process was the task related to the road conditions and traffic safety. Based on the results of the precedent analysis, an emergency response plan was established. By making the order of the standard operating procedures clear, an effective plan for dealing with disaster was formulated. Finally, a prototype software was developed based on the research findings. This study laid the foundation of an information-technology-based disaster response guideline and is significant in that it computerized the disaster response plan to improve the plan-s accessibility.
Abstract: Asynchronous Transfer Mode (ATM) is widely used
in telecommunications systems to send data, video and voice at a
very high speed. In ATM network optimizing the bandwidth through
dynamic routing is an important consideration. Previous research
work shows that traditional optimization heuristics result in suboptimal
solution. In this paper we have explored non-traditional
optimization technique. We propose comparison of two such
algorithms - Genetic Algorithm (GA) and Tabu search (TS), based on
non-traditional Optimization approach, for solving the dynamic
routing problem in ATM networks which in return will optimize the
bandwidth. The optimized bandwidth could mean that some
attractive business applications would become feasible such as high
speed LAN interconnection, teleconferencing etc. We have also
performed a comparative study of the selection mechanisms in GA
and listed the best selection mechanism and a new initialization
technique which improves the efficiency of the GA.
Abstract: Considering the serious health hazards of air pollutants from automobiles, the present study was aimed to estimate the genotoxic/tumor inducing potential of three soil samples collected from junctions of Bus stand (BS), Crystal (CT) and Railway station (RS) of Amritsar, Punjab (India) using Allium cepa root chromosomal aberration assay (AlRCAA) and potato disc tumor assay (PDTA). The genotoxic potential in AlRCAA was 41.27% and 41.26% for BS; 37.89% and 43.38% for RS and 33.76% and 37.83% for CT during in situ and root dip treatments, respectively. The maximum number of tumors were induced in RS sample (64) followed by BS (21) and CT (9) during PDTA. The physicochemical parameters of soil sample were also studied and the concentration of lead was found to be 95.21 mg/Kg in RS, 35.30 mg/Kg in BS and 24.59 mg/Kg in CT samples.
Abstract: An effective visual error concealment method has been presented by employing a robust rotation, scale, and translation (RST) invariant partial patch matching model (RSTI-PPMM) and
exemplar-based inpainting. While the proposed robust and inherently
feature-enhanced texture synthesis approach ensures the generation
of excellent and perceptually plausible visual error concealment results, the outlier pruning property guarantees the significant quality improvements, both quantitatively and qualitatively. No intermediate
user-interaction is required for the pre-segmented media and the
presented method follows a bootstrapping approach for an automatic
visual loss recovery and the image and video error concealment.
Abstract: Design Patterns have gained more and more
acceptances since their emerging in software development world last
decade and become another de facto standard of essential knowledge
for Object-Oriented Programming developers nowadays.
Their target usage, from the beginning, was for regular computers,
so, minimizing power consumption had never been a concern.
However, in this decade, demands of more complicated software for
running on mobile devices has grown rapidly as the much higher
performance portable gadgets have been supplied to the market
continuously. To get along with time to market that is business
reason, the section of software development for power conscious,
battery, devices has shifted itself from using specific low-level
languages to higher level ones. Currently, complicated software
running on mobile devices are often developed by high level
languages those support OOP concepts. These cause the trend of
embracing Design Patterns to mobile world.
However, using Design Patterns directly in software development
for power conscious systems is not recommended because they were
not originally designed for such environment. This paper
demonstrates the adapted Design Pattern for power limitation system.
Because there are numerous original design patterns, it is not possible
to mention the whole at once. So, this paper focuses only in creating
Energy Conscious version of existing regular "Builder Pattern" to be
appropriated for developing low power consumption software.
Abstract: Both image steganography and image encryption have
advantages and disadvantages. Steganograhy allows us to hide a
desired image containing confidential information in a covered or
host image while image encryption is decomposing the desired image
to a non-readable, non-comprehended manner. The encryption
methods are usually much more robust than the steganographic ones.
However, they have a high visibility and would provoke the attackers
easily since it usually is obvious from an encrypted image that
something is hidden! The combination of steganography and
encryption will cover both of their weaknesses and therefore, it
increases the security. In this paper an image encryption method
based on sinc-convolution along with using an encryption key of 128
bit length is introduced. Then, the encrypted image is covered by a
host image using a modified version of JSteg steganography
algorithm. This method could be applied to almost all image formats
including TIF, BMP, GIF and JPEG. The experiment results show
that our method is able to hide a desired image with high security and
low visibility.
Abstract: In the context of spectrum surveillance, a new method
to recover the code of spread spectrum signal is presented, while the
receiver has no knowledge of the transmitter-s spreading sequence. In
our previous paper, we used Genetic algorithm (GA), to recover
spreading code. Although genetic algorithms (GAs) are well known
for their robustness in solving complex optimization problems, but
nonetheless, by increasing the length of the code, we will often lead
to an unacceptable slow convergence speed. To solve this problem we
introduce Particle Swarm Optimization (PSO) into code estimation in
spread spectrum communication system. In searching process for
code estimation, the PSO algorithm has the merits of rapid
convergence to the global optimum, without being trapped in local
suboptimum, and good robustness to noise. In this paper we describe
how to implement PSO as a component of a searching algorithm in
code estimation. Swarm intelligence boasts a number of advantages
due to the use of mobile agents. Some of them are: Scalability, Fault
tolerance, Adaptation, Speed, Modularity, Autonomy, and
Parallelism. These properties make swarm intelligence very attractive
for spread spectrum code estimation. They also make swarm
intelligence suitable for a variety of other kinds of channels. Our
results compare between swarm-based algorithms and Genetic
algorithms, and also show PSO algorithm performance in code
estimation process.
Abstract: Environmental studies have expanded dramatically all
over the world in the past few years. Nowadays businesses interact
with society and the environment in ways that put their mark on both
sides. Efforts improving human standard living, through the control
of nature and the development of new products, have also resulted in
contamination of the environment. Consequently companies play an
important role in environmental sustainability of a region or country.
Therefore we can say that a company's sustainable development is
strictly dependent on the environment. This article presents a fuzzy
model to evaluate a company's environmental impact. Article
illustrates an example of the automotive industry in order to prove the
usefulness of using such a model.
Abstract: Artificial Neural Networks (ANNs) have been used successfully in many scientific, industrial and business domains as a method for extracting knowledge from vast amounts of data. However the use of ANN techniques in the sporting domain has been limited. In professional sport, data is stored on many aspects of teams, games, training and players. Sporting organisations have begun to realise that there is a wealth of untapped knowledge contained in the data and there is great interest in techniques to utilise this data. This study will use player data from the elite Australian Football League (AFL) competition to train and test ANNs with the aim to predict the onset of injuries. The results demonstrate that an accuracy of 82.9% was achieved by the ANNs’ predictions across all examples with 94.5% of all injuries correctly predicted. These initial findings suggest that ANNs may have the potential to assist sporting clubs in the prediction of injuries.
Abstract: The consumption capability of people in China has
been a big issue to tourism business. Due to the increasing of China
tourists, Taiwan-s government rescinded the category of people in
China and opened up the non-stopped airline from China to Taiwan.
The “one-day traveling style between China and Taiwan" has formed,
hoping to bring business to Taiwan. Night market, which shows
foreigners the very local character of Taiwan, contains various
merchandise for consumers to purchase. With the increasing numbers
of non-stopped airline, visiting Taiwan-s night markets has also been
one of major activities to China-s tourists. The purpose of the present
study is to understand the consumer behavior of China tourists in
tourist night markets in Taipei and analyze that if their shopping
motives cause the different shopping behaviors and post-purchase
satisfaction and revisiting intention. The results reveled that for the
China tourists, the motives of significant influence to the shopping
behaviors. Also, the shopping behaviors significant influence to the
whole satisfaction and the whole satisfaction significant influence to
post-purchase behavior.
Abstract: This paper describes an expanded system for a servo
system design by using the Loop Shaping Design Procedure (LSDP).
LSDP is one of the H∞ design procedure. By conducting Loop
Shaping with a compensator and robust stabilization to satisfy the
index function, we get the feedback controller that makes the control
system stable. In this paper, we propose an expanded system for a
servo system design and apply to the DC motor. The proposed method
performs well in the DC motor positioning control. It has no
steady-state error in the disturbance response and it has robust
stability.