Abstract: In today-s competitive global business environment,
the concept of supply chain management (SCM) continues to become
increasingly market-oriented, shifting the primary driver of the value
chain from supply to demand. Recent recommendations encourage
researchers to focus investigations on the supply chain process
integration (SCPI) capabilities that integrate a focal firm with its
network of suppliers and business customers to create value for it.
However, theoretical and empirical researches pertaining to the
antecedents and consequences of a focal firm-s SCPI capabilities have
been limited and piecemeal. The purpose of this study is to investigate
the critical determinants and consequences of a focal firm-s SCPI
capabilities. We test our proposed research framework using a sample
of 139 sales managers of manufacturing industries in Taiwan, our
research findings show that (1) both perceived business customer-s
power and focal firm-s market-oriented culture positively influences a
focal firm-s SCPI capabilities, and (2) SCPI capabilities positively
influence a focal firm-s SCM performance, both operational and
strategic benefits. Implications for practitioners and researchers and
suggestions for future research are also addressed in this study.
Abstract: Most standard software development methodologies
are often not applied to software projects in many developing
countries of the world. The approach generally practice is close to
what eXtreme Programming (XP) is likely promoting, just keep
coding and testing as the requirement evolves. XP is an agile
software process development methodology that has inherent
capability for improving efficiency of Business Software
Development (BSD). XP can facilitate Business-to-Development
(B2D) relationship due to its customer-oriented advocate. From
practitioner point of view, we applied XP to BSD and result shows
that customer involvement has positive impact on productivity, but
can as well frustrate the success of the project. In an effort to
promote software engineering practice in developing countries of
Africa, we present the experiment performed, lessons learned,
problems encountered and solution adopted in applying XP
methodology to BSD.
Abstract: A model-free robust control (MFRC) approach is proposed for position control of robot manipulators in the state space. The control approach is verified analytically to be robust subject to uncertainties including external disturbances, unmodeled dynamics, and parametric uncertainties. There is a high flexibility to work on different systems including actuators by the use of the proposed control approach. The proposed control approach can guarantee the robustness of control system. A PUMA 560 robot driven by geared permanent magnet dc motors is simulated. The simulation results show a satisfactory performance for control system under technical specifications. KeywordsModel-free, robust control, position control, PUMA 560.
Abstract: A research study was conducted with an objective to propose a collaborative business strategy of a oil and gas trading company, representing PPT Energy Trading Co., Ltd., with its shareholder, especially electricity and power supply companies for LNG Form of Coal Bed Methane in B2B Transaction. Collaborative business strategy is a strategy to collaborate with other organizations due to have future benefits in both parties, or achieve the business objective through the collaboration of business, its strategy and partners. A structured interview was established to collect the required primary data from the company. Not only interview, but also company’s business plan and annual report were collected and analyzed for the company’s current condition. As the result, this research shows a recommendation to propose a new collaborative strategy with limiting its target market, diversifying product, conducting new business model, and considering other stakeholders.
Abstract: The majority of micro-entrepreneurs in Malaysia
operate very small-scaled business activities such as food stalls,
burger stalls, night market hawkers, grocery stores, constructions,
rubber and oil palm small holders, and other agro-based services and
activities. Why are they venturing into entrepreneurship - is it for
survival, out of interest or due to encouragement and assistance from
the local government? And why is it that some micro-entrepreneurs
are lagging behind in entrepreneurship, and what do they need to
rectify this situation so that they are able to progress further?
Furthermore, what are the skills that the micro entrepreneurs should
developed to transform them into successful micro-enterprises and
become small and medium-sized enterprises (SME)? This paper
proposes a 7-Step approach that can serve as a basis for identification
of critical entrepreneurial success factors that enable policy makers,
practitioners, consultants, training managers and other agencies in
developing tools to assist micro business owners. This paper also
highlights the experience of one of the successful companies in
Malaysia that has transformed from micro-enterprise to become a
large organization in less than 10 years.
Abstract: Recent widespread use of information and
communication technology has greatly changed information security
risks that businesses and institutions encounter. Along with this
situation, in order to ensure security and have confidence in electronic
trading, it has become important for organizations to take competent
information security measures to provide international confidence that
sensitive information is secure. Against this backdrop, the approach to
information security checking has come to an important issue, which
is believed to be common to all countries. The purpose of this paper is
to introduce the new system of information security checking program
in Korea and to propose synthetic information security
countermeasures under domestic circumstances in order to protect
physical equipment, security management and technology, and the
operation of security check for securing services on ISP(Internet
Service Provider), IDC(Internet Data Center), and
e-commerce(shopping malls, etc.)
Abstract: Most of ignition delay correlations studies have been
developed in a constant volume bombs which cannot capture the
dynamic variation in pressure and temperature during the ignition
delay as in real engines. Watson, Assanis et. al. and Hardenberg
and Hase correlations have been developed based on experimental
data of diesel engines. However, they showed limited predictive
ability of ignition delay when compared to experimental results. The
objective of the study was to investigate the dependency of ignition
delay time on engine brake power. An experimental investigation of
the effect of automotive diesel and water diesel emulsion fuels on
ignition delay under steady state conditions of a direct injection diesel
engine was conducted. A four cylinder, direct injection naturally
aspirated diesel engine was used in this experiment over a wide range
of engine speeds and two engine loads. The ignition delay
experimental data were compared with predictions of Assanis et. al.
and Watson ignition delay correlations. The results of the
experimental investigation were then used to develop a new ignition
delay correlation. The newly developed ignition delay correlation has
shown a better agreement with the experimental data than Assanis et.
al. and Watson when using automotive diesel and water diesel
emulsion fuels especially at low to medium engine speeds at both
loads. In addition, the second derivative of cylinder pressure which is
the most widely used method in determining the start of combustion
was investigated.
Abstract: Resource Discovery in Grids is critical for efficient
resource allocation and management. Heterogeneous nature and
dynamic availability of resources make resource discovery a
challenging task. As numbers of nodes are increasing from tens to
thousands, scalability is essentially desired. Peer-to-Peer (P2P)
techniques, on the other hand, provide effective implementation of
scalable services and applications. In this paper we propose a model
for resource discovery in Condor Middleware by using the four axis
framework defined in P2P approach. The proposed model enhances
Condor to incorporate functionality of a P2P system, thus aim to
make Condor more scalable, flexible, reliable and robust.
Abstract: In this paper, we propose a robust controller design method for discrete-time systems with sector-bounded nonlinearities and time-varying delay. Based on the Lyapunov theory, delaydependent stabilization criteria are obtained in terms of linear matrix inequalities (LMIs) by constructing the new Lyapunov-Krasovskii functional and using some inequalities. A robust state feedback controller is designed by LMI framework and a reciprocally convex combination technique. The effectiveness of the proposed method is verified throughout a numerical example.
Abstract: This paper describes the application of a model predictive controller to the problem of batch reactor temperature control. Although a great deal of work has been done to improve reactor throughput using batch sequence control, the control of the actual reactor temperature remains a difficult problem for many operators of these processes. Temperature control is important as many chemical reactions are sensitive to temperature for formation of desired products. This controller consist of two part (1) a nonlinear control method GLC (Global Linearizing Control) to create a linear model of system and (2) a Model predictive controller used to obtain optimal input control sequence. The temperature of reactor is tuned to track a predetermined temperature trajectory that applied to the batch reactor. To do so two input signals, electrical powers and the flow of coolant in the coil are used. Simulation results show that the proposed controller has a remarkable performance for tracking reference trajectory while at the same time it is robust against noise imposed to system output.
Abstract: The one of best robust search technique on large scale
search area is heuristic and meta heuristic approaches. Especially in
issue that the exploitation of combinatorial status in the large scale
search area prevents the solution of the problem via classical
calculating methods, so such problems is NP-complete. in this
research, the problem of winner determination in combinatorial
auctions have been formulated and by assessing older heuristic
functions, we solve the problem by using of genetic algorithm and
would show that this new method would result in better performance
in comparison to other heuristic function such as simulated annealing
greedy approach.
Abstract: The business strategy of any company wanting to be
competitive on the market should be designed around the concept of
intangibles, with an increasingly decisive role in knowledge transfer
of the biggest corporations. Advancing the research in these areas,
this study integrates the two approaches, emphasizing the
relationships between the components of intellectual capital and
corporate social responsibility. The three dimensions of intellectual
capital in terms of sustainability requirements are debated. The paper
introduces the concept of sustainable intellectual capital and debates
it within an assessment model designed on the base of key
performance indicators. The results refer to the assessment of
possible ways for including the information on intellectual capital
and corporate responsibility within the corporate strategy. The
conclusions enhance the need for companies to be ready to support
the integration of this type of information the knowledge transfer
process, in order to develop competitive advantage on the market.
Abstract: Procurement is an important component in the field of
operating resource management and e-procurement is the golden key
to optimizing the supply chains system. Global firms are optimistic
on the level of savings that can be achieved through full
implementation of e-procurement strategies. E-procurement is an
Internet-based business process for obtaining materials and services
and managing their inflow into the organization. In this paper, the
subjects of supply chains and e-procurement and its benefits to
organizations have been studied. Also, e-procurement in construction
and its drivers and barriers have been discussed and a framework of
supplier selection in an e-procurement environment has been
demonstrated. This paper also has addressed critical success factors
in adopting e-procurement in supply chains.
Abstract: This paper presents a practical scheme that can be used for allocating the transmission loss to generators and loads. In this scheme first the share of a generator or load on the current through a branch is determined using Z-bus modified matrix. Then the current components are decomposed and the branch loss allocation is obtained. A motivation of proposed scheme is to improve the results of Z-bus method and to reach more fair allocation. The proposed scheme has been implemented and tested on several networks. To achieve practical and applicable results, the proposed scheme is simulated and compared on the transmission network (400kv) of Khorasan region in Iran and the 14-bus standard IEEE network. The results show that the proposed scheme is comprehensive and fair to allocating the energy losses of a power market to its participants.
Abstract: In this work, a radial basis function (RBF) neural network is developed for the identification of hyperbolic distributed parameter systems (DPSs). This empirical model is based only on process input-output data and used for the estimation of the controlled variables at specific locations, without the need of online solution of partial differential equations (PDEs). The nonlinear model that is obtained is suitably transformed to a nonlinear state space formulation that also takes into account the model mismatch. A stable robust control law is implemented for the attenuation of external disturbances. The proposed identification and control methodology is applied on a long duct, a common component of thermal systems, for a flow based control of temperature distribution. The closed loop performance is significantly improved in comparison to existing control methodologies.
Abstract: Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Abstract: The problem of controlling a two link robotic manipulator, consisting of a rotating and a prismatic links, is addressed. The actuations of both links are assumed to have unknown dead zone nonlinearities and friction torques modeled by LuGre friction model. Because of the existence of the unknown dead zone and friction torque at the actuations, unknown parameters and unmeasured states would appear to be part of the overall system dynamics that need for estimation. Unmeasured states observer, unknown parameters estimators, and robust adaptive control laws have been derived such that closed loop global stability is achieved. Simulation results have been performed to show the efficacy of the suggested approach.
Abstract: This paper proposes a new design of spatial FIR
filter to automatically detect water level from a video signal of
various river surroundings. A new approach in this report applies
"addition" of frames and a "horizontal" edge detector to distinguish
water region and land region. Variance of each line of a filtered
video frame is used as a feature value. The water level is recognized
as a boundary line between the land region and the water region.
Edge detection filter essentially demarcates between two distinctly
different regions. However, the conventional filters are not
automatically adaptive to detect water level in various lighting
conditions of river scenery. An optimized filter is purposed so that
the system becomes robust to changes of lighting condition. More
reliability of the proposed system with the optimized filter is
confirmed by accuracy of water level detection.
Abstract: Service identification is one of the main activities in
the modeling of a service-oriented solution, and therefore errors
made during identification can flow down through detailed design
and implementation activities that may necessitate multiple
iterations, especially in building composite applications. Different
strategies exist for how to identify candidate services that each of
them has its own benefits and trade offs. The approach presented in
this paper proposes a selective identification of services approach,
based on in depth business process analysis coupled with use cases
and existing assets analysis and goal service modeling. This article
clearly emphasizes the key activities need for the analysis and
service identification to build a optimized service oriented
architecture. In contrast to other approaches this article mentions
some best practices and steps, wherever appropriate, to point out the
vagueness involved in service identification.
Abstract: A considerable progress has been achieved in transient
stability analysis (TSA) with various FACTS controllers. But, all
these controllers are associated with single transmission line. This
paper is intended to discuss a new approach i.e. a multi-line FACTS
controller which is interline power flow controller (IPFC) for TSA of
a multi-machine power system network. A mathematical model of
IPFC, termed as power injection model (PIM) presented and this
model is incorporated in Newton-Raphson (NR) power flow
algorithm. Then, the reduced admittance matrix of a multi-machine
power system network for a three phase fault without and with IPFC
is obtained which is required to draw the machine swing curves. A
general approach based on L-index has also been discussed to find
the best location of IPFC to reduce the proximity to instability of a
power system. Numerical results are carried out on two test systems
namely, 6-bus and 11-bus systems. A program in MATLAB has
been written to plot the variation of generator rotor angle and speed
difference curves without and with IPFC for TSA and also a simple
approach has been presented to evaluate critical clearing time for test
systems. The results obtained without and with IPFC are compared
and discussed.