Abstract: Having done in this study, air-conditioning
automation for patisserie shopwindow was designed. In the cooling
sector it is quite important to cooling up the air temperature in the
shopwindow within short time interval. Otherwise the patisseries
inside of the shopwindow will be spoilt in a few days. Additionally
the humidity is other important parameter for the patisseries kept in
shopwindow. It must be raised up to desired level in a quite short
time. Traditional patisserie shopwindows only allow controlling
temperature manually. There is no humidity control and humidity is
supplied by fans that are directed to the water at the bottom of the
shopwindows. In this study, humidity and temperature sensors
(SHT11), PIC, AC motor controller, DC motor controller, ultrasonic
nebulizer and other electronic circuit members were used to simulate
air conditioning automation for patisserie shopwindow in proteus
software package. The simulation results showed that temperature
and humidity values are adjusted in desired time duration by openloop
control technique. Outer and inner temperature and humidity
values were used for control mechanism.
Abstract: This paper explores the issues that influence online retailing in Saudi Arabia. Retailers in Saudi Arabia have been reserved in their adoption of electronically delivered aspects of their business. Despite the fact that Saudi Arabia has the largest and fastest growth of ICT marketplaces in the Arab region, e-commerce activities are not progressing at the same speed. Only very few Saudi companies, mostly medium and large companies from the manufacturing sector, are involved in e-commerce implementation. Based on qualitative data collected by conducting interviews with 16 retailers and 16 potential customers in Saudi Arabia, several factors influencing online retailing diffusion in Saudi Arabia are identified. However, government support comes the highest and most influencing factor for online retailing growth as identified by both parties; retailers and potential customers in Saudi Arabia.
Abstract: This paper presents a remote on-line diagnostic system
for vehicles via the use of On-Board Diagnostic (OBD), GPS, and 3G
techniques. The main parts of the proposed system are on-board
computer, vehicle monitor server, and vehicle status browser. First,
the on-board computer can obtain the location of deriver and vehicle
status from GPS receiver and OBD interface, respectively. Then
on-board computer will connect with the vehicle monitor server
through 3G network to transmit the real time vehicle system status.
Finally, vehicle status browser could show the remote vehicle status
including vehicle speed, engine rpm, battery voltage, engine coolant
temperature, and diagnostic trouble codes. According to the
experimental results, the proposed system can help fleet managers and
car knockers to understand the remote vehicle status. Therefore this
system can decrease the time of fleet management and vehicle repair
due to the fleet managers and car knockers who find the diagnostic
trouble messages in time.
Abstract: This paper analyzed the perception of e-commerce
application services by construction material traders in Malaysia.
Five attributes were tested: usability, reputation, trust, privacy and
familiarity. Study methodology consists of survey questionnaire and
statistical analysis that includes reliability analysis, factor analysis,
ANOVA and regression analysis. The respondents were construction
material traders, including hardware stores in Klang Valley, Kuala
Lumpur.
Findings support that usability and familiarity with e-commerce
services in Malaysia have insignificant influence on the acceptance of
e-commerce application. However, reputation, trust and privacy
attributes have significant influence on the choice of e-commerce
acceptance by construction material traders. E-commerce
applications studied included customer database, e-selling, emarketing,
e-payment, e-buying and online advertising. Assumptions
are made that traders have basic knowledge and exposure to ICT
services. i.e. internet service and computers. Study concludes that
reputation, privacy and trust are the three website attributes that
influence the acceptance of e-commerce by construction material
traders.
Abstract: Buoyancy driven heat transfer of nanofluids in a
cylindrical enclosure used as a control unit in the subsea hydrocarbon
injection wells is investigated in this study. The governing equations
obtained with the Boussinesq approximation are solved using Comsol
Multiphysics finite element analysis and simulation software. The
base fluid is water and CuO is used as nanoparticles. Solution is
obtained for nanoparticle solid volume fraction of 8% and for
Rayleigh number in the range of 105-107. The results show that
nanoparticle usage in the cylindrical electronic control unit has a
significant effect on the flow and heat transfer.
Abstract: The main goal of this seminal paper is to introduce the
application of Wireless Sensor Networks (WSN) in long distance
infrastructure monitoring (in particular in pipeline infrastructure
monitoring) – one of the on-going research projects by the Wireless
Communication Research Group at the department of Electronic and
Computer Engineering, Nnamdi Azikiwe University, Awka. The
current sensor network architectures for monitoring long distance
pipeline infrastructures are previewed. These are wired sensor
networks, RF wireless sensor networks, integrated wired and wireless
sensor networks. The reliability of these architectures is discussed.
Three reliability factors are used to compare the architectures in
terms of network connectivity, continuity of power supply for the
network, and the maintainability of the network. The constraints and
challenges of wireless sensor networks for monitoring and protecting
long distance pipeline infrastructure are discussed.
Abstract: Simulation accuracy by recent dynamic vehicle
simulation multidimensional expression significantly has progressed
and acceptable results not only for passive vehicles but also for
active vehicles normally equipped with advanced electronic
components is also provided. Recently, one of the subjects that has it
been considered, is increasing the safety car in design. Therefore,
many efforts have been done to increase vehicle stability especially
in the turn. One of the most important efforts is adjusting the camber
angle in the car suspension system. Optimum control camber angle in
addition to the vehicle stability is effective in the wheel adhesion on
road, reducing rubber abrasion and acceleration and braking. Since
the increase or decrease in the camber angle impacts on the stability
of vehicles, in this paper, a car suspension system mechanism is
introduced that could be adjust camber angle and the mechanism is
application and also inexpensive. In order to reach this purpose, in
this paper, a passive double wishbone suspension system with
variable camber angle is introduced and then variable camber
mechanism designed and analyzed for study the designed system
performance, this mechanism is modeled in Visual Nastran software
and kinematic analysis is revealed.
Abstract: In the past, there were more researches of recommendation system in applied electronic commerce. However, because all circles promote information technology integrative instruction actively, the quantity of instruction resources website is more and more increasing on the Internet. But there are less website including recommendation service, especially for teachers. This study established an instruction resource recommendation website that analyzed teaching style of teachers, then provided appropriate instruction resources for teachers immediately. We used the questionnaire survey to realize teacher-s suggestions and satisfactions with the instruction resource contents and recommendation results. The study shows: (1)The website used “Transactional Ability Inventory" that realized teacher-s style and provided appropriate instruction resources for teachers in a short time, it reduced the step of data filter. (2)According to the content satisfaction of questionnaire survey, four styles teachers were almost satisfied with the contents of the instruction resources that the website recommended, thus, the conception of developing instruction resources with different teaching style is accepted. (3) According to the recommendation satisfaction of questionnaire survey, four styles teachers were almost satisfied with the recommendation service of the website, thus, the recommendation strategy that provide different results for teachers in different teaching styles is accepted.
Abstract: Mobile Learning (M-Learning) is a new technology
which is to enhance current learning practices and activities for all
people especially students and academic practitioners UTP is
currently, implemented two types of learning styles which are
conventional and electronic learning. In order to improve current
learning approaches, it is necessary for UTP to implement m-learning
in UTP. This paper presents a study on the students- perceptions on
mobile utilization in the learning practices in UTP. Besides, this
paper also presents a survey that was conducted among 82 students
from System Analysis and Design (SAD) course in UTP. The survey
includes basic information of mobile devices that have been used by
the students, opinions on current learning practices and also the
opinions regarding the m-learning implementation in the current
learning practices especially in SAD course. Based on the results of
the survey, majority of the students are using the mobile devices that
can support m-learning environment. Other than that, students also
agreed that current learning practices are ineffective and they believe
that m-learning utilization can improve the effectiveness of current
learning practices.
Abstract: Blind Signature were introduced by Chaum. In this
scheme, a signer can “sign” a document without knowing the
document contain. This is particularly important in electronic voting.
CryptO-0N2 is an electronic voting protocol which is development of
CryptO-0N. During its development this protocol has not been
furnished with the requirement of blind signature, so the choice of
voters can be determined by counting center. In this paper will be
presented of implementation of blind signature using RSA algorithm.
Abstract: The history of money is described in relationship to the history of computing. With the transformation and acceptance of money as information, major challenges to the security of money have involved engineering, computer science, and management. Research opportunities and challenges are described as money continues its transformation into information.
Abstract: The electronically available Urdu data is in image form
which is very difficult to process. Printed Urdu data is the root cause
of problem. So for the rapid progress of Urdu language we need an
OCR systems, which can help us to make Urdu data available for the
common person. Research has been carried out for years to automata
Arabic and Urdu script. But the biggest hurdle in the development of
Urdu OCR is the challenge to recognize Nastalique Script which is
taken as standard for writing Urdu language. Nastalique script is
written diagonally with no fixed baseline which makes the script
somewhat complex. Overlap is present not only in characters but in
the ligatures as well. This paper proposes a method which allows
successful recognition of Nastalique Script.
Abstract: This manuscript presents a fast blind signature scheme
with extremely low computation for users. Only several modular additions
and multiplications are required for a user to obtain and verify
a signature in the proposed scheme. Comparing with the existing
ones in the literature, the scheme greatly reduces the computations
for users.
Abstract: Among the various cooling processes in industrial
applications such as: electronic devices, heat exchangers, gas
turbines, etc. Gas turbine blades cooling is the most challenging one.
One of the most common practices is using ribbed wall because of
the boundary layer excitation and therefore making the ultimate
cooling. Vortex formation between rib and channel wall will result in
a complicated behavior of flow regime. At the other hand, selecting
the most efficient method for capturing the best results comparing to
experimental works would be a fascinating issue. In this paper 4
common methods in turbulence modeling: standard k-e, rationalized
k-e with enhanced wall boundary layer treatment, k-w and RSM
(Reynolds stress model) are employed to a square ribbed channel to
investigate the separation and thermal behavior of the flow in the
channel. Finally all results from different methods which are used in
this paper will be compared with experimental data available in
literature to ensure the numerical method accuracy.
Abstract: Phase locked loops in 10 Gb/s and faster data links are
low phase noise devices. Characterization of their phase jitter
transfer functions is difficult because the intrinsic noise of the PLLs
is comparable to the phase noise of the reference clock signal. The
problem is solved by using a linear model to account for the intrinsic
noise. This study also introduces a novel technique for measuring the
transfer function. It involves the use of the reference clock as a
source of wideband excitation, in contrast to the commonly used
sinusoidal excitations at discrete frequencies. The data reported here
include the intrinsic noise of a PLL for 10 Gb/s links and the jitter
transfer function of a PLL for 12.8 Gb/s links. The measured transfer
function suggests that the PLL responded like a second order linear
system to a low noise reference clock.
Abstract: This paper has two main ideas. Firstly, it describes Evans and Wurster-s concepts “the trade-off between reach and richness", and relates them to the impact of technology on the virtual markets. Authors Evans and Wurster see the transfer of information as a 'trade'off between richness and reach-. Reach refers to the number of people who share particular information, with Richness ['Rich'] being a more complex concept combining: bandwidth, customization, interactivity, reliability, security and currency. Traditional shopping limits the number of shops the shopper is able to visit due to time and other cost constraints; the time spent traveling consequently leaves the shopper with less time to evaluate the product. The paper concludes that although the Web provides Reach, offering Richness and the sense of community required for creating and sustaining relationships with potential clients could be difficult.
Abstract: While computers are known to facilitate lower levels of learning, such as rote memorization of facts, measurable through electronically administered and graded multiple-choice questions, yes/no, and true/false answers, the imparting and measurement of higher-level cognitive skills is more vexing. These require more open-ended delivery and answers, and may be more problematic in an entirely virtual environment, notwithstanding the advances in technologies such as wikis, blogs, discussion boards, etc. As with the integration of all technology, merit is based more on the instructional design of the course than on the technology employed in, and of, itself. With this in mind, this study examined the perceptions of online students in an introductory Computer Information Systems course regarding the fostering of various higher-order thinking and team-building skills as a result of the activities, resources and technologies (ART) used in the course.
Abstract: ebXML (Electronic Business using eXtensible
Markup Language) is an e-business standard, sponsored by
UN/CEFACT and OASIS, which enables enterprises to exchange
business messages, conduct trading relationships, communicate
data in common terms and define and register business
processes. While there is tremendous e-business value in the
ebXML, security remains an unsolved problem and one of the
largest barriers to adoption. XML security technologies emerging
recently have extensibility and flexibility suitable for security
implementation such as encryption, digital signature, access
control and authentication.
In this paper, we propose ebXML business transaction models
that allow trading partners to securely exchange XML based
business transactions by employing XML security technologies.
We show how each XML security technology meets the ebXML
standard by constructing the test software and validating messages
between the trading partners.
Abstract: This contribution aims to outline some topics around the process of introduction of compulsory electronic exchange of documents (so called e-Boxes) in public administration. The research was conducted in order to gauge the difference between the expectation of those using internal email and their experience in reality. Both qualitative and quantitative research is employed to lead also to an estimation of the willingness and readiness of government bodies, business units and citizens to adopt new technologies. At the same time the most potent barriers to successful e-communication through the e-Boxes are identified.
Abstract: As a by-product of its "cyberspace" status, electronic
commerce is global, encompassing a whole range of B2C
relationships which need to be approached with solutions provided at
a local level while remaining viable when applied to global issues.
Today, the European Union seems to be endowed with a reliable
legal framework for consumer protection. A question which remains,
however, is enforcement of this protection. This is probably a matter
of time and awareness from both parties in the B2C relationship.
Business should realize that enhancing trust in the minds of
consumers is more than a question of technology; it is a question of
best practice. Best practice starts with the online service of high
street banks as well as with the existence of a secure, user-friendly
and cost-effective payment system. It also includes the respect of
privacy and the use of smart cards as well as enhancing privacy
technologies and fair information practice. In sum, only by offering
this guarantee of privacy and security will the consumer be assured
that, in cyberspace, his/her interests will be protected in the same
manner as in a traditional commercial environment.