Abstract: There has been a growing interest in implementing humanoid avatars in networked virtual environment. However, most existing avatar communication systems do not take avatars- social backgrounds into consideration. This paper proposes a novel humanoid avatar animation system to represent personalities and facial emotions of avatars based on culture, profession, mood, age, taste, and so forth. We extract semantic keywords from the input text through natural language processing, and then the animations of personalized avatars are retrieved and displayed according to the order of the keywords. Our primary work is focused on giving avatars runtime instruction from multiple natural languages. Experiments with Chinese, Japanese and English input based on the prototype show that interactive avatar animations can be displayed in real time and be made available online. This system provides a more natural and interesting means of human communication, and therefore is expected to be used for cross-cultural communication, multiuser online games, and other entertainment applications.
Abstract: Knowledge management (KM) is generally
considered to be a positive process in an organisation, facilitating
opportunities to achieve competitive advantage via better quality
information handling, compilation of expert know-how and rapid
response to fluctuations in the business environment. The KM
paradigm as portrayed in the literature informs the processes that can
increase intangible assets so that corporate knowledge is preserved.
However, in some instances, knowledge management exists in a
universe of dynamic tension among the conflicting needs to respect
privacy and intellectual property (IP), to guard against data theft, to
protect national security and to stay within the laws. While the
Knowledge Management literature focuses on the bright side of the
paradigm, there is also a different side in which knowledge is
distorted, suppressed or misappropriated due to personal or
organisational motives (the paradox). This paper describes the ethical
paradoxes that occur within the taxonomy and deontology of
knowledge management and suggests that recognising both the
promises and pitfalls of KM requires wisdom.
Abstract: This research study examines cases of Saudi Arabian
universities and female academics for work environment issues
within the context of design management applications. The study
proposes use of design research, ergonomics and systems design
thinking to develop the university design which facilitates removal of
physical and cognitive barriers for female academics. Review of
literature demonstrates that macro and micro ergonomic combined
with design management and system design strategies can
significantly improve the workplace design for female academics.
The university design model would be prepared based on the analyses
of primary data obtained from archived documents, participants'
observation logs, photo audits, focus groups and semi-structured
interviews of currently employed female academics in the selected
case universities.
Abstract: Viscous heating becomes significant in the high speed
resin coating process of glass fibers for optical fiber manufacturing.
This study focuses on the coating resin flows inside the capillary
coating die of optical fiber coating applicator and they are numerically
simulated to examine the effects of viscous heating and subsequent
temperature increase in coating resin. Resin flows are driven by fast
moving glass fiber and the pressurization at the coating die inlet, while
the temperature dependent viscosity of liquid coating resin plays an
important role in the resin flow. It is found that the severe viscous
heating near the coating die wall profoundly alters the radial velocity
profiles and that the increase of final coating thickness by die
pressurization is amplified if viscous heating is present.
Abstract: Pressure waves and Water Hammer occur in a
pumping system when valves are closed or opened suddenly or in
the case of sudden failure of pumps. Determination of maximum
water hammer is considered one of the most important technical
and economical items of which engineers and designers of
pumping stations and conveyance pipelines should take care.
Hammer Software is a recent application used to simulate water
hammer. The present study focuses on determining significance of
each input parameter of the application relative to the maximum
amount of water hammer estimated by the software. The study
determines estimated maximum water hammer variations due to
variations of input parameters including water temperature, pipe
type, thickness and diameter, electromotor rpm and power, and
moment of inertia of electromotor and pump. In our study,
Kuhrang Pumping Station was modeled using WaterGEMS
Software. The pumping station is characterized by total discharge
of 200 liters per second, dynamic height of 194 meters and 1.5
kilometers of steel conveyance pipeline and transports water to
Cheshme Morvarid for farmland irrigation. The model was run in
steady hydraulic condition and transferred to Hammer Software.
Then, the model was run in several unsteady hydraulic conditions
and sensitivity of maximum water hammer to each input parameter
was calculated. It is shown that parameters to which maximum
water hammer is most sensitive are moment of inertia of pump and
electromotor, diameter, type and thickness of pipe and water
temperature, respectively.
Abstract: This paper presents an analysis on the capacity and performance of MIMO-OFDM systems. The work is focused on the capacity of MIMO-OFDM systems over rician fading channel, in the case of the channel being known at the receiver only, which is more practical case of the channel. Simple expression for capacity is derived for the case of correlated rician fading. The performance of some MIMO-OFDM implementations with rician fading model is presented using an Alamouti coding scheme and Simulation results are obtained for both capacity and performance analysis.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.
Abstract: The following study aims to outline, whether the
perceptions of entrepreneurs about their entrepreneurial activities and
the underlying meanings of their activities are universal or whether
they vary systematically across cultures. In contrast to previous
studies, the phenomenographical approach and the resulting findings
of this study provide new insights into what constitutes
entrepreneurship by drawing an inference from the perceptions of
entrepreneurs in the United States and in Germany. Culture is shown
to have an important impact on entrepreneurship, since the
underlying meanings of entrepreneurship vary significantly among
the two sample groups. Furthermore, the study sheds more light on
the culturally contingent 'why' of entrepreneurship by looking at the
internal motivations of individuals instead of exclusively focusing on
character traits or external influences of the respective economic
environments.
Abstract: Today, people are more interested in the foods
beneficial on their health. However, there are still lacks of accurate
knowledge in the field of biological properties, functional properties,
including the application of legume in foods. This study focused on
antioxidant activity of soybean (SB) and fermented soybean (FSB)
crude extracts evaluating to have more information in fortification SB
and FSB crude extracts in food products and/or dietary supplement.
SB and FSB crude extracts were prepared by infusion with water and
ethanol. The antioxidant activity of crude extracts was studied with
DPPH and ABTS assay including commercial standard. From both
DPPH and ABTS assay, the antioxidant activity of SB and FSB water
crude extract showed higher antioxidant activity than ethanol crude
extract, and FSB crude extract showed higher antioxidant activity
than SB crude extract. In DPPH assay, BHT and vitamin C showed
IC50 values at 0.241, 0.039 mg/ml, in ABTS assay. In addition,
Trolox showed IC50 at 0.058 mg/ml respectively. FSB water crude
extract showed high antioxidant activity. Finally, the functional
properties study of both water and ethanol crude extracts should be
done for beneficial in application of these extracts in food products
and dietary supplement in the near future.
Abstract: This paper looks at transgender identities and the law in the context of marriage. It particularly focuses on the role of language and definition in classifying transgendered individuals into a legal category. Two lines of cases in transgender jurisprudence are examined. The former cases decided the definition of 'man' and 'woman' on the basis of biological criteria while the latter cases held that biological factors should not be the sole criterion for defining a man or a woman. Three categories were found to classify transgender people, namely male, female and "monstrous". Since transgender people challenge the core gender distinction that the law stresses, they are often regarded as problematic and monstrous which caused them to be subjected to severe legal consequences. This paper discusses these issues by analyzing and comparing different cases in transgender jurisprudence as well as examining how these issues play out in contemporary Hong Kong.
Abstract: In this paper we focus on event extraction from Tamil
news article. This system utilizes a scoring scheme for extracting and
grouping event-specific sentences. Using this scoring scheme eventspecific
clustering is performed for multiple documents. Events are
extracted from each document using a scoring scheme based on
feature score and condition score. Similarly event specific sentences
are clustered from multiple documents using this scoring scheme.
The proposed system builds the Event Template based on user
specified query. The templates are filled with event specific details
like person, location and timeline extracted from the formed clusters.
The proposed system applies these methodologies for Tamil news
articles that have been enconverted into UNL graphs using a Tamil to
UNL-enconverter. The main intention of this work is to generate an
event based template.
Abstract: The Malaysia Highway Authority (MHA) was
established by the Government in 1980 for the purpose of designing,
constructing and maintaining toll highways in Malaysia that include
the North-South Expressway and the Penang Bridge, which were
procured using the publicly-funded traditional procurement. However
following a recession in the mid 80-s, the operations of these tolledhighways
had been privatized to ensure that their operational services
continue through private financing as a result of long-term
concession agreement concurred between the Malaysian Government
and private operators. The change in the contract strategy for
highway projects in Malaysia would have a great tendency to dictate
a significant risk exposure towards the key parties involved,
particularly the Malaysian Government as project principal, unless
operational risks are clearly identified and managed via appropriate
mitigation measures prior to a contract signing.
This research identifies potential operational risks that have a
possibility to occur in highway projects in Malaysia from the
perspective of public sector clients. Since this research focuses on the
operational risks for highway projects in Malaysia, the initial results
acquired from literature review on the operational risks of highway
projects in some Asian countries are then justified by a number of
key individuals from the MHA through interviews. As a result,
among key operational risks that have possibility to occur in the
highway projects in Malaysia include initial toll-tariff decided by the
Government, traffic congestion, change of road network and overloaded
freight transportation, which could cause damage to the road
surface and hence affecting the operation of a particular highway.
Abstract: The study attempted to identify the dominant
intelligences of athletes by comparing the developmental differences
of multiple intelligences between athletes and non-athletes. The
weekly specialized training hours and years of specialized training
was examined to see how it can predict the dominant intelligence with
the age factor controlled. There were 355 participants in the research
(202 athletes and 153 non-athletes). Collected data were analyzed with
one-way MANOVA and multiple hierarchical regression. The results
suggested the dominant intelligences of athletes were Interpersonal
Intelligence, Bodily-Kinesthetic Intelligence, and Intrapersonal
Intelligence. The weekly specialized training hours and years of
specialized training could effectively predict the Interpersonal
Intelligence, Bodily-Kinesthetic Intelligence, and Intrapersonal
Intelligence of athletes. The author suggested the future studies could
focus on the theory construction of weekly specialized training and
years of specialized training. Also, the studies on using “Bridge
strategy" by the athletes to guide disadvantage intelligences with
dominant intelligences are highly valued.
Abstract: The emergence of the Internet has brewed the
revolution of information storage and retrieval. As most of the
data in the web is unstructured, and contains a mix of text,
video, audio etc, there is a need to mine information to cater to
the specific needs of the users without loss of important
hidden information. Thus developing user friendly and
automated tools for providing relevant information quickly
becomes a major challenge in web mining research. Most of
the existing web mining algorithms have concentrated on
finding frequent patterns while neglecting the less frequent
ones that are likely to contain outlying data such as noise,
irrelevant and redundant data. This paper mainly focuses on
Signed approach and full word matching on the organized
domain dictionary for mining web content outliers. This
Signed approach gives the relevant web documents as well as
outlying web documents. As the dictionary is organized based
on the number of characters in a word, searching and retrieval
of documents takes less time and less space.
Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: The proliferation of user-generated content (UGC) results in huge opportunities to explore event patterns. However, existing event recommendation systems primarily focus on advanced information technology users. Little work has been done to address novice and low-literacy users. The next billion users providing and consuming UGC are likely to include communities from developing countries who are ready to use affordable technologies for subsistence goals. Therefore, we propose a design framework for providing event recommendations to address the needs of such users. Grounded in information integration theory (IIT), our framework advocates that effective event recommendation is supported by systems capable of (1) reliable information gathering through structured user input, (2) accurate sense making through spatial-temporal analytics, and (3) intuitive information dissemination through interactive visualization techniques. A mobile pest management application is developed as an instantiation of the design framework. Our preliminary study suggests a set of design principles for novice and low-literacy users.
Abstract: This paper focuses attention on specific aspects of
entrepreneurial decisions relating to investment, both in the total
fixed investments and plant & machinery (separately). Demand and
financial factors, internal and external, are considered in the
investment analysis. Finally the influence of determinants of fixed
investment and investment plans are examined in Electric Power
industry in India.
Abstract: Nowadays increasingly the population makes use of
Information Technology (IT). As such, in recent year the Portuguese
government increased its focus on using the IT for improving
people-s life and began to develop a set of measures to enable the
modernization of the Public Administration, and so reducing the gap
between Public Administration and citizens.Thus the Portuguese
Government launched the Simplex Program. However these
SIMPLEX eGov measures, which have been implemented over the
years, present a serious challenge: how to forecast its impact on
existing Information Systems Architecture (ISA). Thus, this research
is focus in addressing the problem of automating the evaluation of the
actual impact of implementation an eGovSimplification and
Modernization measures in the Information Systems Architecture. To
realize the evaluation we proposes a Framework, which is supported
by some key concepts as: Quality Factors, ISA modeling,
Multicriteria Approach, Polarity Profile and Quality Metrics
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.
Abstract: Medical image registration is the key technology in image guided radiation therapy (IGRT) systems. On the basis of the previous work on our IGRT prototype with a biorthogonal x-ray imaging system, we described a method focused on the 2D/2D rigid-body registration using multiresolution pyramid based mutual information in this paper. Three key steps were involved in the method : firstly, four 2D images were obtained including two x-ray projection images and two digital reconstructed radiographies(DRRs ) as the input for the registration ; Secondly, each pair of the corresponding x-ray image and DRR image were matched using multiresolution pyramid based mutual information under the ITK registration framework ; Thirdly, we got the final couch offset through a coordinate transformation by calculating the translations acquired from the two pairs of the images. A simulation example of a parotid gland tumor case and a clinical example of an anthropomorphic head phantom were employed in the verification tests. In addition, the influence of different CT slice thickness were tested. The simulation results showed that the positioning errors were 0.068±0.070, 0.072±0.098, 0.154±0.176mm along three axes which were lateral, longitudinal and vertical. The clinical test indicated that the positioning errors of the planned isocenter were 0.066, 0.07, 2.06mm on average with a CT slice thickness of 2.5mm. It can be concluded that our method with its verified accuracy and robustness can be effectively used in IGRT systems for patient setup.