Abstract: Building inspection is one of the key components of building maintenance. The primary purpose of performing a building inspection is to evaluate the building-s condition. Without inspection, it is difficult to determine a built asset-s current condition, so failure to inspect can contribute to the asset-s future failure. Traditionally, a longhand survey description has been widely used for property condition reports. Surveys that employ ratings instead of descriptions are gaining wide acceptance in the industry because they cater to the need for numerical analysis output. These kinds of surveys are also in keeping with the new RICS HomeBuyer Report 2009. In this paper, we propose a new assessment method, derived from the current rating systems, for assessing the specifically smart school building-s condition and rating the seriousness of each defect identified. These two assessment criteria are then multiplied to find the building-s score, which we called the Condition Survey Protocol (CSP) 1 Matrix. Instead of a longhand description of a building-s defects, this matrix requires concise explanations about the defects identified, thus saving on-site time during a smart school building inspection. The full score is used to give the building an overall rating: Good, Fair or Dilapidated.
Abstract: The direct sewage sludge application is a relative
cheap method for their liquidation. In the past heavy metal contents
increase in soils treated with sewage sludge was observed. In 2003
there was acceptance on act n.188/2003 about sewage sludge
application on soils. The basic philosophy of act is a safety of the
environmental proof of sludge application on soils. The samples of
soils from wastewater treatment plant (WTP) Poprad (35) and WTP
Michalovce (33 samples) were analyzed which were chosen for
sludge application on soils. According to the results only 14 areas for
Poprad and 25 areas for Michalovce are suitable for sludge
application according to act No. 188/2003. The application dose of
sludge was calculated 50 t.ha-1 or 75 t. ha-1 once in 5 years to ensure
that heavy metal contents in treated soils will be kept.
Abstract: Design Patterns have gained more and more
acceptances since their emerging in software development world last
decade and become another de facto standard of essential knowledge
for Object-Oriented Programming developers nowadays.
Their target usage, from the beginning, was for regular computers,
so, minimizing power consumption had never been a concern.
However, in this decade, demands of more complicated software for
running on mobile devices has grown rapidly as the much higher
performance portable gadgets have been supplied to the market
continuously. To get along with time to market that is business
reason, the section of software development for power conscious,
battery, devices has shifted itself from using specific low-level
languages to higher level ones. Currently, complicated software
running on mobile devices are often developed by high level
languages those support OOP concepts. These cause the trend of
embracing Design Patterns to mobile world.
However, using Design Patterns directly in software development
for power conscious systems is not recommended because they were
not originally designed for such environment. This paper
demonstrates the adapted Design Pattern for power limitation system.
Because there are numerous original design patterns, it is not possible
to mention the whole at once. So, this paper focuses only in creating
Energy Conscious version of existing regular "Builder Pattern" to be
appropriated for developing low power consumption software.
Abstract: This paper illustrates why existing technology
acceptance models are only of limited use for predicting and
explaining the adoption of future information and communication
technologies. It starts with a general overview over technology
adoption processes, and presents several theories for the acceptance
as well as adoption of traditional information technologies. This is
followed by an overview over the recent developments in the area of
information and communication technologies. Based on the
arguments elaborated in these sections, it is shown why the factors
used to predict adoption in existing systems, will not be sufficient for
explaining the adoption of future information and communication
technologies.
Abstract: The number of the companies accepting RFID in Korea
has been increased continuously due to the domestic development of
information technology. The acceptance of RFID by companies in
Korea enabled them to do business with many global enterprises in a
much more efficient and effective way. According to a survey[33,
p76], many companies in Korea have used RFID for inventory or
distribution manages. But, the use of RFID in the companies in Korea
is in the early stages and its potential value hasn-t fully been realized
yet. At this time, it would be very important to investigate the factors
that affect RFID acceptance. For this study, many previous studies
were referenced and some RFID experts were interviewed. Through
the pilot test, four factors were selected - Security Trust, Employee
Knowledge, Partner Influence, Service Provider Trust - affecting
RFID acceptance and an extended technology acceptance
model(e-TAM) was presented with those factors. The proposed model
was empirically tested using data collected from employees in
companies or public enterprises. In order to analyze some
relationships between exogenous variables and four variables in TAM,
structural equation modeling(SEM) was developed and SPSS12.0 and
AMOS 7.0 were used for analyses. The results are summarized as
follows: 1) security trust perceived by employees positively
influences on perceived usefulness and perceived ease of use; 2)
employee-s knowledge on RFID positively influences on only
perceived ease of use; 3) a partner-s influence for RFID acceptance
positively influences on only perceived usefulness; 4) service provider
trust very positively influences on perceived usefulness and perceived
ease of use 5) the relationships between TAM variables are the same as
the previous studies.
Abstract: A different concept for designing and detailing of
reinforced concrete precast frame structures is analyzed in this paper.
The new detailing of the joints derives from the special hybrid
moment frame joints. The special reinforcements of this alternative
detailing, named modified special hybrid joint, are bondless with
respect to both column and beams. Full scale tests were performed on
a plan model, which represents a part of 5 story structure, cropped in
the middle of the beams and columns spans. Theoretical approach
was developed, based on testing results on twice repaired model,
subjected to lateral seismic type loading. Discussion regarding the
modified special hybrid joint behavior and further on widening
research needed concludes the presentation.
Abstract: This paper introduces a framework that aims to
support the design and development of mobile services. The
traditional innovation process and its supporting instruments in form
of creativity tools, acceptance research and user-generated content
analysis are screened for potentials for improvement. The result is a
reshaped innovation process where acceptance research and usergenerated
content analysis are fully integrated within a creativity
tool. Advantages of this method are the enhancement of design
relevant information for developers and designers and the possibility
to forecast market success.
Abstract: Genetically modified (GM) technology in food
production continued to generate controversies. Consumers were
concerned with the GM foods about the healthy and environmental
risks. While consumers- acceptance was a critical factor affecting how
widely this technology be used. According to the research review,
consumers- lack of information was one of the reasons to explain
consumers- low acceptance toward GM foods. The objective for this
study wanted to find out would informative product package affect
consumers- behavior toward GM foods. An experiment was designed
to investigate consumer behavior toward different product package
information. The results indicated that the product package
information influenced consumer product trust toward GM foods.
Compared with the traceability production system information, the
information about the GM rice was approved by authorized
organizations could increase consumers product trust in GM foods.
Consumers in Taiwan saw the information provided by authorized
organizations more credible than other information.
Abstract: Previous research has demonstrated that negative
attitudes towards people with physical disabilities and obesity are
predicted by a component of perceived vulnerability to disease; germ
aversion. These findings have been suggested as illustrations of an
evolved but over-active mechanism which promotes the avoidance of
pathogen-carrying individuals. To date, this interpretation of attitude
formation has not been explored with regard to people with
intellectual disability, and no attempts have been made to examine
possible mediating factors. This study examined attitudes in 333
adults and demonstrated that the moderate positive relationship
between germ aversion and negative attitudes toward people with
intellectual disability is fully mediated by social dominance
orientation, a general preference for hierarchies and inequalities
among social groups. These findings have implications for the
design of programs which attempt to promote community acceptance
and inclusion of people with disabilities.
Abstract: This paper investigates the use of mobile phones and
tablets for learning purposes among university students in Saudi
Arabia. For this purpose, an extended Technology Acceptance Model
(TAM) is proposed to analyze the adoption of mobile devices and
smart phones by Saudi university students for accessing course
materials, searching the web for information related to their
discipline, sharing knowledge, conducting assignments etc.
Abstract: We constructed a method of noise reduction for
JPEG-compressed image based on Bayesian inference using the
maximizer of the posterior marginal (MPM) estimate. In this method,
we tried the MPM estimate using two kinds of likelihood, both of
which enhance grayscale images converted into the JPEG-compressed
image through the lossy JPEG image compression. One is the
deterministic model of the likelihood and the other is the probabilistic
one expressed by the Gaussian distribution. Then, using the Monte
Carlo simulation for grayscale images, such as the 256-grayscale
standard image “Lena" with 256 × 256 pixels, we examined the
performance of the MPM estimate based on the performance measure
using the mean square error. We clarified that the MPM estimate via
the Gaussian probabilistic model of the likelihood is effective for
reducing noises, such as the blocking artifacts and the mosquito noise,
if we set parameters appropriately. On the other hand, we found that
the MPM estimate via the deterministic model of the likelihood is not
effective for noise reduction due to the low acceptance ratio of the
Metropolis algorithm.
Abstract: Signature represents an individual characteristic of a
person which can be used for his / her validation. For such application
proper modeling is essential. Here we propose an offline signature
recognition and verification scheme which is based on extraction of
several features including one hybrid set from the input signature
and compare them with the already trained forms. Feature points
are classified using statistical parameters like mean and variance.
The scanned signature is normalized in slant using a very simple
algorithm with an intention to make the system robust which is
found to be very helpful. The slant correction is further aided by the
use of an Artificial Neural Network (ANN). The suggested scheme
discriminates between originals and forged signatures from simple
and random forgeries. The primary objective is to reduce the two
crucial parameters-False Acceptance Rate (FAR) and False Rejection
Rate (FRR) with lesser training time with an intension to make the
system dynamic using a cluster of ANNs forming a multiple classifier
system.
Abstract: Matching algorithms have significant importance in
speaker recognition. Feature vectors of the unknown utterance are
compared to feature vectors of the modeled speakers as a last step in
speaker recognition. A similarity score is found for every model in
the speaker database. Depending on the type of speaker recognition,
these scores are used to determine the author of unknown speech
samples. For speaker verification, similarity score is tested against a
predefined threshold and either acceptance or rejection result is
obtained. In the case of speaker identification, the result depends on
whether the identification is open set or closed set. In closed set
identification, the model that yields the best similarity score is
accepted. In open set identification, the best score is tested against a
threshold, so there is one more possible output satisfying the
condition that the speaker is not one of the registered speakers in
existing database. This paper focuses on closed set speaker
identification using a modified version of a well known matching
algorithm. The results of new matching algorithm indicated better
performance on YOHO international speaker recognition database.
Abstract: The burst of Web 2.0 technology and social
networking tools manifest different styles of learning and managing
knowledge among both knowledge workers and adult learners. In the
Western countries, open-learning concept has been made popular due
to the ease of use and the reach that the technology provides. In
Malaysia, there are still some gaps between the learners- acceptance
of technology and the full implementation of the technology in the
education system. There is a need to understand how adult learners,
who are knowledge workers, manage their personal knowledge via
social networking tools, especially in their learning process. Four
processes of personal knowledge management (PKM) and four
cognitive enablers are proposed supported by analysed data on adult
learners in a university. The model derived from these processes and
enablers is tested and presented, with recommendations on features to be included in adult learners- learning environment.
Abstract: Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.
Abstract: The 2008 Candlelight Protests of Korea was very
significant to portray the political environment among the South
Korean youth. Many challenges and new advanced technologies have
driven the youth community to be engaged in the political arena that
has shifted them from traditional Korean youth to a very greater
community. Due to historical perspective with the people of North
Korea, the young generation has embraced different view of ethnic
nationalism. This study examines the youth involvement in politics in
line with their level of acceptance the practice of democracy. The
increase usage of new media has shown great results in the survey
results whereby the youth used as a platform to gain political
information and brought higher degree of their sociopolitical interests
among them. Furthermore, the rise of nationalism and patriotism will
be discussed in this paper to the dynamism of the political approaches
used by the Korea government
Abstract: Despite the strong and consistent increase in the use of
electronic payment methods worldwide, the diffusion of electronic
wallets is still far from widespread. Analysis of the failure of
electronic wallet uptake has either focused on technical issues or
chosen to analyse a specific scheme. This article proposes a joint
approach to analysing key factors affecting the adoption of e-wallets
by using the ‘Technology Acceptance Model” [1] which we have
expanded to take into account the cost of using e-wallets. We use this
model to analyse Monéo, the only French electronic wallet still in
operation.
Abstract: Solid waste can be considered as an urban burden or
as a valuable resource depending on how it is managed. To meet the
rising demand for energy and to address environmental concerns, a
conversion from conventional energy systems to renewable resources
is essential. For the sustainability of human civilization, an
environmentally sound and techno-economically feasible waste
treatment method is very important to treat recyclable waste. Several
technologies are available for realizing the potential of solid waste as
an energy source, ranging from very simple systems for disposing of
dry waste to more complex technologies capable of dealing with
large amounts of industrial waste. There are three main pathways for
conversion of waste material to energy: thermo chemical,
biochemical and physicochemical. This paper investigates the thermo
chemical conversion of solid waste for energy recovery. The
processes, advantages and dis-advantages of various thermo chemical
conversion processes are discussed and compared. Special attention
is given to Gasification process as it provides better solutions
regarding public acceptance, feedstock flexibility, near-zero
emissions, efficiency and security. Finally this paper presents
comparative statements of thermo chemical processes and introduces
an integrated waste management system.
Abstract: The purpose of this paper is to propose an integrated
consumer health informatics utilization framework that can be used
to gauge the online health information needs and usage patterns
among Malaysian women. The proposed framework was developed
based on four different theories/models: Use and Gratification
Theory, Technology Acceptance 3 Model, Health Belief Model, and
Multi-level Model of Information Seeking. The relevant constructs
and research hypotheses are also presented in this paper. The
framework will be tested in order for it to be used successfully to
identify Malaysian women-s preferences of online health information
resources and health information seeking activities.
Abstract: In today-s information age, numbers of organizations
are still arguing on capitalizing the values of Information Technology
(IT) and Knowledge Management (KM) to which individuals can
benefit from and effective communication among the individuals can
be established. IT exists in enabling positive improvement for
communication among knowledge workers (k-workers) with a
number of social network technology domains at workplace. The
acceptance of digital discourse in sharing of knowledge and
facilitating the knowledge and information flows at most of the
organizations indeed impose the culture of knowledge sharing in
Digital Social Networks (DSN). Therefore, this study examines
whether the k-workers with IT background would confer an effect on
the three knowledge characteristics -- conceptual, contextual, and
operational. Derived from these three knowledge characteristics, five
potential factors will be examined on the effects of knowledge
exchange via e-mail domain as the chosen query. It is expected, that
the results could provide such a parameter in exploring how DSN
contributes in supporting the k-workers- virtues, performance and
qualities as well as revealing the mutual point between IT and KM.