Abstract: Background: Taiwan now is an aging society. Research
on the elderly should not be confined to caring for seniors, but should
also be focused on ways to improve health and the quality of life.
Senior citizens who participate in volunteer services could become
less lonely, have new growth opportunities, and regain a sense of
accomplishment. Thus, the question of how to get the elderly to
participate in volunteer service is worth exploring. Objective: Apply
the Transtheoretical Model to understand stages of change in regular
volunteer service and voluntary service behaviour among the seniors.
Methods: 1525 adults over the age of 65 from the Renai district of
Keelung City were interviewed. The research tool was a
self-constructed questionnaire, and individual interviews were
conducted to collect data. Then the data was processed and analyzed
using the IBM SPSS Statistics 20 (Windows version) statistical
software program. Results: In the past six months, research subjects
averaged 9.92 days of volunteer services. A majority of these elderly
individuals had no intention to change their regular volunteer services.
We discovered that during the maintenance stage, the self-efficacy for
volunteer services was higher than during all other stages, but
self-perceived barriers were less during the preparation stage and
action stage. Self-perceived benefits were found to have an important
predictive power for those with regular volunteer service behaviors in
the previous stage, and self-efficacy was found to have an important
predictive power for those with regular volunteer service behaviors in
later stages. Conclusions/Implications for Practice: The research
results support the conclusion that community nursing staff should
group elders based on their regular volunteer services change stages
and design appropriate behavioral change strategies.
Abstract: Science and technology has a major impact on many
societal domains such as communication, medicine, food,
transportation, etc. However, this dominance of modern technology
can have a negative unintended impact on indigenous systems, and in
particular on indigenous foods. This problem serves as a motivation
to this study whose aim is to examine the perceptions of learners on
the usefulness of Information and Communication Technologies
(ICTs) for learning about indigenous foods. This aim will be
subdivided into two types of research objectives. The design and
identification of theories and models will be achieved using literature
content analysis. The objective on the empirical testing of such
theories and models will be achieved through the survey of
Hospitality studies learners from different schools in the iLembe and
Umgungundlovu Districts of the South African Kwazulu-Natal
province. SPSS is used to quantitatively analyze the data collected by
the questionnaire of this survey using descriptive statistics and
Pearson correlations after the assessment of the validity and the
reliability of the data. The main hypothesis behind this study is that
there is a connection between the demographics of learners, their
perceptions on the usefulness of ICTs for learning about indigenous
foods, and the following personality and eLearning related theories
constructs: Computer self-efficacy, Trust in ICT systems, and
Conscientiousness; as suggested by existing studies on learning
theories. This hypothesis was fully confirmed by the survey
conducted by this study except for the demographic factors where
gender and age were not found to be determinant factors of learners’
perceptions on the usefulness of ICTs for learning about indigenous
foods.
Abstract: Cross flow water tube heat exchanger can be designed
and made operational using methods of model building and
simulation of the system. This paper projects the design and
development of a model of cross flow water tube heat-exchanger
system, simulation and validation of control analysis of different
tuning methods. Feedback and override control system is developed
using inputs acquired with the help of sensory system. A
mathematical model is formulated for analysis of system behaviour.
The temperature is regulated at the desired set point automatically.
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: In this paper, we present preconditioned generalized
accelerated overrelaxation (GAOR) methods for solving certain
nonsingular linear system. We compare the spectral radii of the
iteration matrices of the preconditioned and the original methods. The
comparison results show that the preconditioned GAOR methods
converge faster than the GAOR method whenever the GAOR method
is convergent. Finally, we give two numerical examples to confirm our
theoretical results.
Abstract: The use of eXtensible Markup Language (XML) in
web, business and scientific databases lead to the development of
methods, techniques and systems to manage and analyze XML data.
Semi-structured documents suffer due to its heterogeneity and
dimensionality. XML structure and content mining represent
convergence for research in semi-structured data and text mining. As
the information available on the internet grows drastically, extracting
knowledge from XML documents becomes a harder task. Certainly,
documents are often so large that the data set returned as answer to a
query may also be very big to convey the required information. To
improve the query answering, a Semantic Tree Based Association
Rule (STAR) mining method is proposed. This method provides
intentional information by considering the structure, content and the
semantics of the content. The method is applied on Reuter’s dataset
and the results show that the proposed method outperforms well.
Abstract: The main purpose of this research is to
comprehensively explore and identify the problems of attestation of
the public servants and to propose solutions for these issues through
deeply analyzing laws and the legal theoretical literature. For the
detailed analysis of the above-mentioned problems we will use some
research methods, the implementation of which has a goal to ensure
the objectivity and clarity of scientific research and its results.
Abstract: The tomato is a very important crop, whose
cultivation in the Mediterranean basin is severely affected by the
phytoparasitic weed Phelipanche ramosa. The semiarid regions of
the world are considered the main areas where this parasitic weed is
established causing heavy infestation as it is able to produce high
numbers of seeds (up to 500,000 per plant), which remain viable for
extended period (more than 20 years). In this paper the results
obtained from eleven treatments in order to control this parasitic
weed including chemical, agronomic, biological and biotechnological
methods compared with the untreated test under two plowing depths
(30 and 50 cm) are reported. The split-plot design with 3 replicates
was adopted. In 2014 a trial was performed in Foggia province
(southern Italy) on processing tomato (cv Docet) grown in the field
infested by Phelipanche ramosa. Tomato seedlings were transplant
on May 5, on a clay-loam soil. During the growing cycle of the
tomato crop, at 56-78 and 92 days after transplantation, the number
of parasitic shoots emerged in each plot was detected. At tomato
harvesting, on August 18, the major quantity-quality yield parameters
were determined (marketable yield, mean weight, dry matter, pH,
soluble solids and color of fruits). All data were subjected to analysis
of variance (ANOVA) and the means were compared by Tukey's test.
Each treatment studied did not provide complete control against
Phelipanche ramosa. However, among the different methods tested,
some of them which Fusarium, gliphosate, radicon biostimulant and
Red Setter tomato cv (improved genotypes obtained by Tilling
technology) under deeper plowing (50 cm depth) proved to mitigate
the virulence of the Phelipanche ramose attacks. It is assumed that
these effects can be improved combining some of these treatments
each other, especially for a gradual and continuing reduction of the
“seed bank” of the parasite in the soil.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: This work was one of the tasks of the
Manufacturing2Client project, whose objective was to develop a
frontal deflector to be commercialized in the automotive industry,
using new project and manufacturing methods. In this task, in
particular, it was proposed to develop the ability to predict
computationally the aerodynamic influence of flow in vehicles, in an
effort to reduce fuel consumption in vehicles from class 3 to 8. With
this aim, two deflector models were developed and their aerodynamic
performance analyzed. The aerodynamic study was done using the
Computational Fluid Dynamics (CFD) software Ansys CFX and
allowed the calculation of the drag coefficient caused by the vehicle
motion for the different configurations considered. Moreover, the
reduction of diesel consumption and carbon dioxide (CO2) emissions
associated with the optimized deflector geometry could be assessed.
Abstract: Electricity spot prices are highly volatile under
optimal generation capacity scenarios due to factors such as nonstorability
of electricity, peak demand at certain periods, generator
outages, fuel uncertainty for renewable energy generators, huge
investments and time needed for generation capacity expansion etc.
As a result market participants are exposed to price and volume risk,
which has led to the development of risk management practices. This
paper provides an overview of risk management practices by market
participants in electricity markets using financial derivatives.
Abstract: Red blood cells (RBC) are the most common types of
blood cells and are the most intensively studied in cell biology. The
lack of RBCs is a condition in which the amount of hemoglobin level
is lower than normal and is referred to as “anemia”. Abnormalities in
RBCs will affect the exchange of oxygen. This paper presents a
comparative study for various techniques for classifying the RBCs as
normal or abnormal (anemic) using WEKA. WEKA is an open
source consists of different machine learning algorithms for data
mining applications. The algorithms tested are Radial Basis Function
neural network, Support vector machine, and K-Nearest Neighbors
algorithm. Two sets of combined features were utilized for
classification of blood cells images. The first set, exclusively consist
of geometrical features, was used to identify whether the tested blood
cell has a spherical shape or non-spherical cells. While the second
set, consist mainly of textural features was used to recognize the
types of the spherical cells. We have provided an evaluation based on
applying these classification methods to our RBCs image dataset
which were obtained from Serdang Hospital - Malaysia, and
measuring the accuracy of test results. The best achieved
classification rates are 97%, 98%, and 79% for Support vector
machines, Radial Basis Function neural network, and K-Nearest
Neighbors algorithm respectively.
Abstract: The paper presents a plastic analysis procedure based
on the energy balance concept for performance based seismic retrofit
of multi-story multi-bay masonry infilled reinforced concrete (R/C)
frames with a ‘soft’ ground story using passive energy dissipation
(PED) devices with the objective of achieving a target performance
level of the retrofitted R/C frame for a given seismic hazard level at
the building site. The proposed energy based plastic analysis
procedure was employed for developing performance based design
(PBD) formulations for PED devices for a simulated application in
seismic retrofit of existing frame structures designed in compliance
with the prevalent standard codes of practice. The PBD formulations
developed for PED devices were implemented for simulated seismic
retrofit of a representative code-compliant masonry infilled R/C
frame with a ‘soft’ ground story using friction dampers as the PED
device. Non-linear dynamic analyses of the retrofitted masonry
infilled R/C frames is performed to investigate the efficacy and
accuracy of the proposed energy based plastic analysis procedure in
achieving the target performance level under design level
earthquakes. Results of non-linear dynamic analyses demonstrate that
the maximum inter-story drifts in the masonry infilled R/C frames
with a ‘soft’ ground story that is retrofitted with the friction dampers
designed using the proposed PBD formulations are controlled within
the target drifts under near-field as well far-field earthquakes.
Abstract: Enterprise Architecture (EA) is employed by
enterprises for providing integrated Information Systems (ISs) in
order to support alignment of their business and Information
Technology (IT). Evaluation of EA implementation can support
enterprise to reach intended goals. There are some problems in
current evaluation methods of EA implementation that lead to
ineffectiveness implementation of EA. This paper represents current
issues on evaluation of EA implementation. In this regard, we set the
framework in order to represent evaluation’s issues based on their
functionality and structure. The results of this research not only
increase the knowledge of evaluation, but also could be useful for
both academics and practitioners in order to realize the current
situation of evaluations.
Abstract: The inspection of underneath vehicle system has been
given significant attention by governments after the threat of
terrorism become more prevalent. New technologies such as mobile
robots and computer vision are led to have more secure environment.
This paper proposed that a mobile robot like Aria robot can be used
to search and inspect the bombs under parking a lot vehicle. This
robot is using fuzzy logic and subsumption algorithms to control the
robot that movies underneath the vehicle. An OpenCV library and
laser Hokuyo are added to Aria robot to complete the experiment for
under vehicle inspection. This experiment was conducted at the
indoor environment to demonstrate the efficiency of our methods to
search objects and control the robot movements under vehicle. We
got excellent results not only by controlling the robot movement but
also inspecting object by the robot camera at same time. This success
allowed us to know the requirement to construct a new cost effective
robot with more functionality.
Abstract: The objective of meta-analysis is to combine results
from several independent studies in order to create generalization
and provide evidence base for decision making. But recent studies
show that the magnitude of effect size estimates reported in many
areas of research significantly changed over time and this can
impair the results and conclusions of meta-analysis. A number of
sequential methods have been proposed for monitoring the effect
size estimates in meta-analysis. However they are based on statistical
theory applicable only to fixed effect model (FEM) of meta-analysis.
For random-effects model (REM), the analysis incorporates the
heterogeneity variance, τ 2 and its estimation create complications.
In this paper we study the use of a truncated CUSUM-type test with
asymptotically valid critical values for sequential monitoring in REM.
Simulation results show that the test does not control the Type I error
well, and is not recommended. Further work required to derive an
appropriate test in this important area of applications.
Abstract: Communicating and managing customers’
requirements in software development projects play a vital role in the
software development process. While it is difficult to do so locally, it
is even more difficult to communicate these requirements over
distributed boundaries and to convey them to multiple distribution
customers. This paper discusses the communication of multiple
distribution customers’ requirements in the context of customised
software products. The main purpose is to understand the challenges
of communicating and managing customisation requirements across
distributed boundaries. We propose a model for Communicating
Customisation Requirements of Multi-Clients in a Distributed
Domain (CCRD). Thereafter, we evaluate that model by presenting
the findings of a case study conducted with a company with
customisation projects for 18 distributed customers. Then, we
compare the outputs of the real case process and the outputs of the
CCRD model using simulation methods. Our conjecture is that the
CCRD model can reduce the challenge of communication
requirements over distributed organisational boundaries, and the
delay in decision making and in the entire customisation process
time.
Abstract: Among modern airflow measurement methods,
Particle Image Velocimetry (PIV) and Particle Tracking Velocimetry
(PTV), as visualized and non-instructive measurement techniques, are
playing more important role. This paper conducts a comparative
experimental study for airflow measurement employing both
techniques with the same condition. Velocity vector fields, velocity
contour fields, voticity profiles and turbulence profiles are selected as
the comparison indexes. The results show that the performance of both
PIV and PTV techniques for airflow measurement is satisfied, but
some differences between the both techniques are existed, it suggests
that selecting the measurement technique should be based on a
comprehensive consideration.
Abstract: Urban public spaces are sutured with a range of
surveillance and sensor technologies that claim to enable new forms
of ‘data based citizen participation’, but also increase the tendency
for ‘function-creep’, whereby vast amounts of data are gathered,
stored and analysed in a broad application of urban surveillance. This
kind of monitoring and capacity for surveillance connects with
attempts by civic authorities to regulate, restrict, rebrand and reframe
urban public spaces. A direct consequence of the increasingly
security driven, policed, privatised and surveilled nature of public
space is the exclusion or ‘unfavourable inclusion’ of those considered
flawed and unwelcome in the ‘spectacular’ consumption spaces of
many major urban centres. In the name of urban regeneration,
programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’
city initiatives refashion public space as sites of selective inclusion
and exclusion. In this context of monitoring and control procedures,
in particular, children and young people’s use of space in parks,
neighbourhoods, shopping malls and streets is often viewed as a
threat to the social order, requiring various forms of remedial action.
This paper suggests that cities, places and spaces and those who
seek to use them, can be resilient in working to maintain and extend
democratic freedoms and processes enshrined in Marshall’s concept
of citizenship, calling sensor and surveillance systems to account.
Such accountability could better inform the implementation of public
policy around the design, build and governance of public space and
also understandings of urban citizenship in the sensor saturated urban
environment.
Abstract: Floods play a key role in landform evolution of an
area. This process is likely to alter the topography of the earth’s
surface. The present study area, Kota Bharu is very prone to floods
extends from upstream of Kelantan River near Kemubu to the
downstream area near Kuala Besar. These flood events which occur
every year in the study area exhibit a strong bearing on river
morphological set-up. In the present study, three satellite imageries of
different time periods have been used to manifest the post-flood
landform changes. The pre-processing of the images such as subset,
geometric corrections and atmospheric corrections were carried-out
using ENVI 4.5 followed by the analysis processes. Twenty sets of
cross sections were plotted using software Erdas 9.2, ERDAS and
ArcGis 10 for the all three images. The results show a significant
change in the length of the cross section which suggest that the
geomorphological processes play a key role in carving and shaping
the river banks during the floods.