Abstract: The purpose of this paper is to explore the role of
cognitive decision effort in recommendation system, combined with
indicators "information quality" and "service quality" from IS success
model to exam the awareness of the user for the "recommended system
performance". A total of 411 internet user answered a questionnaire
assessing their attention of use and satisfaction of recommendation
system in internet book store. Quantitative result indicates following
research results. First, information quality of recommended system
has obvious influence in consumer shopping decision-making process,
and the attitude to use the system. Second, in the process of consumer's
shopping decision-making, the recommendation system has no
significant influence for consumers to pay lower cognitive
decision-making effort. Third, e-commerce platform provides
recommendations and information is necessary, but the quality of
information on user needs must be considered, or they will be other
competitors offer homogeneous services replaced.
Abstract: Recent developments in automotive technology are focused on economy, comfort and safety. Vehicle tracking and collision detection systems are attracting attention of many investigators focused on safety of driving in the field of automotive mechatronics. In this paper, a vision-based vehicle detection system is presented. Developed system is intended to be used in collision detection and driver alert. The system uses RGB images captured by a camera in a car driven in the highway. Images captured by the moving camera are used to detect the moving vehicles in the image. A vehicle ahead of the camera is detected in daylight conditions. The proposed method detects moving vehicles by subtracting successive images. Plate height of the vehicle is determined by using a plate recognition algorithm. Distance of the moving object is calculated by using the plate height. After determination of the distance of the moving vehicle relative speed of the vehicle and Time-to-Collision are calculated by using distances measured in successive images. Results obtained in road tests are discussed in order to validate the use of the proposed method.
Abstract: The aim of a biological model is to understand the
integrated structure and behavior of complex biological systems as a
function of the underlying molecular networks to achieve simulation
and forecast of their operation. Although several approaches have
been introduced to take into account structural and environment
related features, relatively little attention has been given to represent
the behavior of biological systems. The Abstract Biological Process
(ABP) model illustrated in this paper is an object-oriented model
based on UML (the standard object-oriented language). Its main
objective is to bring into focus the functional aspects of the
biological system under analysis.
Abstract: An Advance Driver Assistance System (ADAS) is a computer system on board a vehicle which is used to reduce the risk of vehicular accidents by monitoring factors relating to the driver, vehicle and environment and taking some action when a risk is identified. Much work has been done on assessing vehicle and environmental state but there is still comparatively little published work that tackles the problem of driver state. Visual attention is one such driver state. In fact, some researchers claim that lack of attention is the main cause of accidents as factors such as fatigue, alcohol or drug use, distraction and speeding all impair the driver-s capacity to pay attention to the vehicle and road conditions [1]. This seems to imply that the main cause of accidents is inappropriate driver behaviour in cases where the driver is not giving full attention while driving. The work presented in this paper proposes an ADAS system which uses an image based template matching algorithm to detect if a driver is failing to observe particular windscreen cells. This is achieved by dividing the windscreen into 24 uniform cells (4 rows of 6 columns) and matching video images of the driver-s left eye with eye-gesture templates drawn from images of the driver looking at the centre of each windscreen cell. The main contribution of this paper is to assess the accuracy of this approach using Receiver Operating Characteristic analysis. The results of our evaluation give a sensitivity value of 84.3% and a specificity value of 85.0% for the eye-gesture template approach indicating that it may be useful for driver point of regard determinations.
Abstract: Since the beginning of human history, human
activities have caused many changes in the environment. Today, a
particular attention should be paid to gaining knowledge about water
quality of wetlands which are pristine natural environments rich in
genetic reserves. If qualitative conditions of industrial areas (in terms
of both physicochemical and biological conditions) are not addressed
properly, they could cause disruption in natural ecosystems,
especially in rivers. With regards to the quality of water resources,
determination of pollutant sources plays a pivotal role in engineering
projects as well as designing water quality control systems. Thus,
using different methods such as flow duration curves, dischargepollution
load model and frequency analysis by HYFA software
package, risk of various industrial pollutants in international and
ecologically important Gavkhoni wetland is analyzed. In this study, a
station located at Varzaneh City is used as the last station on
Zayanderud River, from where the river water is discharged into the
wetland. Results showed that elements- concentrations often
exceeded the allowed level and river water can endanger regional
ecosystem. In addition, if the river discharge is managed on Q25
basis, this basis can lower concentrations of elements, keeping them
within the normal level.
Abstract: the data quality is a kind of complex and unstructured concept, which is concerned by information systems managers. The reason of this attention is the high amount of Expenses for maintenance and cleaning of the inefficient data. Such a data more than its expenses of lack of quality, cause wrong statistics, analysis and decisions in organizations. Therefor the managers intend to improve the quality of their information systems' data. One of the basic subjects of quality improvement is the evaluation of the amount of it. In this paper, we present a precautionary method, which with its application the data of information systems would have a better quality. Our method would cover different dimensions of data quality; therefor it has necessary integrity. The presented method has tested on three dimensions of accuracy, value-added and believability and the results confirm the improvement and integrity of this method.
Abstract: In communication networks where communication nodes are connected with finite capacity transmission links, the packet inter-arrival times are strongly correlated with the packet length and the link capacity (or the packet service time). Such correlation affects the system performance significantly, but little attention has been paid to this issue. In this paper, we propose a mathematical framework to study the impact of the correlation between the packet service times and the packet inter-arrival times on system performance. With our mathematical model, we analyze the system performance, e.g., the unfinished work of the system, and show that the correlation affects the system performance significantly. Some numerical examples are also provided.
Abstract: Expert systems are used extensively in many domains.
This paper discusses the use of medical expert systems in Pakistan.
Countries all over the world pay special attention on health facilities.
A country like Pakistan faces a lot of trouble in health sector.
Several attempts have been made in Pakistan to improve the health
conditions of the people but the situation is still not encouraging.
There is a shortage of doctors and other trained personnel in
Pakistan. Expert systems can play a vital role in such cases where the
medical expert is not readily available. The purpose of this paper is
to analyze the role that such systems can play in improving the health
conditions of the people in Pakistan.
Abstract: The development and use of mobile devices as well as its integration within education systems to deliver electronic contents and to support real-time communications was the focus of this research. In order to investigate the software engineering issues in using mobile devices a research on electronic content was initiated. The Developed MP3 mobile software solution was developed as a prototype for testing and developing a strategy for designing a usable m-learning environment. The mobile software solution was evaluated using mobile device using the link: http://projects.seeu.edu.mk/mlearn. The investigation also tested the correlation between the two mobile learning indicators: electronic content and attention, based on the Task Based learning instructional method. The mobile software solution ''M-Learn“ was developed as a prototype for testing the approach and developing a strategy for designing usable m-learning environment. The proposed methodology is about what learning modeling approach is more appropriate to use when developing mobile learning software.
Abstract: Spray chilling using air-mist nozzles has received
much attention in the food processing industry because of the
benefits it has shown over forced air convection. These benefits
include an increase in the heat transfer coefficient and a reduction in
the water loss by the product during cooling. However, few studies
have simulated the heat transfer and aerodynamics phenomena of the
air-mist chilling process for optimal operating conditions. The study
provides insight into the optimal conditions for spray impaction, heat
transfer efficiency and control of surface flooding. A computational
fluid dynamics model using a two-phase flow composed of water
droplets injected with air is developed to simulate the air-mist
chilling of food products. The model takes into consideration
droplet-to-surface interaction, water-film accumulation and surface
runoff. The results of this study lead to a better understanding of the
heat transfer enhancement, water conservation, and to a clear
direction for the optimal design of air-mist chilling systems that can
be used in commercial applications in the food and meat processing
industries.
Abstract: The significance of emissions from the road transport
sector (such as air pollution, noise, etc) has grown considerably in
recent years. In Australia, 14.3% of national greenhouse gas
emissions in 2000 were the transport sector-s share which 12.9% of
net national emissions were related to a road transport alone.
Considering the growing attention to the green house gas(GHG)
emissions, this paper attempts to provide air pollution modeling
aspects of environmental consequences of the road transport by using
one of the best computer based tools including the Geographic
Information System (GIS). In other word, in this study, GIS and its
applications is explained, models which are used to model air
pollution and GHG emissions from vehicles are described and GIS is
applied in real case study that attempts to forecast GHG emission
from people who travel to work by car in 2031 in Melbourne for
analysing results as thematic maps.
Abstract: In this paper, the innovative intelligent fuzzy weighted
input estimation method (FWIEM) can be applied to the inverse heat
transfer conduction problem (IHCP) to estimate the unknown
time-varying heat flux efficiently as presented. The feasibility of this
method can be verified by adopting the temperature measurement
experiment. We would like to focus attention on the heat flux
estimation to three kinds of samples (Copper, Iron and Steel/AISI 304)
with the same 3mm thickness. The temperature measurements are then
regarded as the inputs into the FWIEM to estimate the heat flux. The
experiment results show that the proposed algorithm can estimate the
unknown time-varying heat flux on-line.
Abstract: Normally business changes are made in order to
change a level of activity in some way, whether it is sales, cash flow,
productivity, or product portfolio. When attempts are made to make
such changes, too often the business reverts to the old levels of
activity as soon as management attention is diverted. Risk
management is a field of growing interest to project managers as well
as in general business and organizational management. There are
several approaches used to manage risk in projects and this paper is a
brief outline of some that you might encounter, with an indication of
their strengths and weaknesses.
Abstract: This paper describes WiPoD (Wireless Position
Detector) which is a pure software based location determination and
tracking (positioning) system. It uses empirical signal strength measurements from different wireless access points for mobile user
positioning. It is designed to determine the location of users having
802.11 enabled mobile devices in an 802.11 WLAN infrastructure
and track them in real time. WiPoD is the first main module in our
LBS (Location Based Services) framework. We tested K-Nearest
Neighbor and Triangulation algorithms to estimate the position of a
mobile user. We also give the analysis results of these algorithms for
real time operations. In this paper, we propose a supportable, i.e.
understandable, maintainable, scalable and portable wireless
positioning system architecture for an LBS framework. The WiPoD
software has a multithreaded structure and was designed and implemented with paying attention to supportability features and real-time constraints and using object oriented design principles. We also describe the real-time software design issues of a wireless positioning system which will be part of an LBS framework.
Abstract: The Spalart and Allmaras turbulence model has been
implemented in a numerical code to study the compressible turbulent
flows, which the system of governing equations is solved with a
finite volume approach using a structured grid. The AUSM+ scheme
is used to calculate the inviscid fluxes. Different benchmark
problems have been computed to validate the implementation and
numerical results are shown. A special Attention is paid to wall jet
applications. In this study, the jet is submitted to various wall
boundary conditions (adiabatic or uniform heat flux) in forced
convection regime and both two-dimensional and axisymmetric wall
jets are considered. The comparison between the numerical results
and experimental data has given the validity of this turbulence model
to study the turbulent wall jets especially in engineering applications.
Abstract: Recently, the RFID (Radio Frequency
Identification) technology attracts the world market attention as
essential technology for ubiquitous environment. The RFID
market has focused on transponders and reader development.
But that concern has shifted to RFID software like as
high-valued e-business applications, RFID middleware and
related development tools. However, due to the high sensitivity
of data and service transaction within the RFID network,
security consideration must be addressed. In order to guarantee
trusted e-business based on RFID technology, we propose a
security enhanced RFID middleware system. Our proposal is
compliant with EPCglobal ALE (Application Level Events),
which is standard interface for middleware and its clients. We
show how to provide strengthened security and trust by
protecting transported data between middleware and its client,
and stored data in middleware. Moreover, we achieve the
identification and service access control against illegal service
abuse. Our system enables secure RFID middleware service
and trusted e-business service.
Abstract: The human friendly interaction is the key function of a human-centered system. Over the years, it has received much attention to develop the convenient interaction through intention recognition. Intention recognition processes multimodal inputs including speech, face images, and body gestures. In this paper, we suggest a novel approach of intention recognition using a graph representation called Intention Graph. A concept of valid intention is proposed, as a target of intention recognition. Our approach has two phases: goal recognition phase and intention recognition phase. In the goal recognition phase, we generate an action graph based on the observed actions, and then the candidate goals and their plans are recognized. In the intention recognition phase, the intention is recognized with relevant goals and user profile. We show that the algorithm has polynomial time complexity. The intention graph is applied to a simple briefcase domain to test our model.
Abstract: Wireless sensor networks (WSNs) have gained
tremendous attention in recent years due to their numerous
applications. Due to the limited energy resource, energy efficient
operation of sensor nodes is a key issue in wireless sensor networks.
Cooperative caching which ensures sharing of data among various
nodes reduces the number of communications over the wireless
channels and thus enhances the overall lifetime of a wireless sensor
network. In this paper, we propose a cooperative caching scheme
called ZCS (Zone Cooperation at Sensors) for wireless sensor
networks. In ZCS scheme, one-hop neighbors of a sensor node form a
cooperative cache zone and share the cached data with each other.
Simulation experiments show that the ZCS caching scheme achieves
significant improvements in byte hit ratio and average query latency
in comparison with other caching strategies.
Abstract: The current study begins with an awareness that
today-s media environment is characterized by technological
development and a new way of reading caused by the introduction of
the Internet. The researcher conducted a meta analysis framed within
Technological Determinism to investigate the process of hypertext
reading, its differences from linear reading and the effects such
differences can have on people-s ways of mentally structuring their
world. The relationship between literacy and the comprehension
achieved by reading hypertexts is also investigated. The results show
hypertexts are not always user friendly. People experience hyperlinks
as interruptions that distract their attention generating comprehension
and disorientation. On one hand hypertextual jumping reading
generates interruptions that finally make people lose their
concentration. On the other hand hypertexts fascinate people who
would rather read a document in such a format even though the
outcome is often frustrating and affects their ability to elaborate and
retain information.
Abstract: Encrypted messages sending frequently draws the attention
of third parties, perhaps causing attempts to break and
reveal the original messages. Steganography is introduced to hide
the existence of the communication by concealing a secret message
in an appropriate carrier like text, image, audio or video. Quantum
steganography where the sender (Alice) embeds her steganographic
information into the cover and sends it to the receiver (Bob) over a
communication channel. Alice and Bob share an algorithm and hide
quantum information in the cover. An eavesdropper (Eve) without
access to the algorithm can-t find out the existence of the quantum
message. In this paper, a text quantum steganography technique based
on the use of indefinite articles (a) or (an) in conjunction with the nonspecific
or non-particular nouns in English language and quantum
gate truth table have been proposed. The authors also introduced a
new code representation technique (SSCE - Secret Steganography
Code for Embedding) at both ends in order to achieve high level of
security. Before the embedding operation each character of the secret
message has been converted to SSCE Value and then embeds to cover
text. Finally stego text is formed and transmits to the receiver side.
At the receiver side different reverse operation has been carried out
to get back the original information.