Abstract: Despite the fact that Knowledge Sharing (KS) is very important, we found only little discussion about the reasons why people have the willingness to share knowledge at such platform even though there is no immediate benefit to the persons who contribute knowledge in it. The aim of this study is to develop an integrative understanding of the factors that support or inhibit individuals- knowledge sharing intentions in virtual communities and to find whether habit would generate people-s willingness to be involved. We apply Social Capital Theory (SCT), and we also add two dimensions for discussion: member incentive and habitual domain (HD). This research assembles the questionnaire from individuals who have experienced knowledge sharing in virtual communities, and applies survey and Structural Equation Model (SEM) to analyze the results from the questionnaires. Finally, results confirm that individuals are willing to share knowledge in virtual communities: (1) if they consider reciprocity, centrality, and have longer tenure in their field, and enjoy helping. (2) if they have the habit of sharing knowledge. This study is useful for the developers of virtual communities to insight into knowledge sharing in cyberspace.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: the data of Taiwanese 8th grader in the 4th cycle of
Trends in International Mathematics and Science Study (TIMSS) are
analyzed to examine the influence of the science teachers- preference
in experimental teaching on the relationships between the affective
variables ( the perceived usefulness of science, ease of using science
and science learning interest) and the academic achievement in science.
After dealing with the missing data, 3711 students and 145 science
teacher-s data were analyzed through a Hierarchical Linear Modeling
technique. The major objective of this study was to determine the role
of the experimental teaching moderates the relationship between
perceived usefulness and achievement.
Abstract: Although electrical motors are still the main devices
used in vehicular exhaust comprises more than 95 percent of the air
pollution in Taiwan's largest city, Taipei. On average, all commuters in Taipei travel 13.6 km daily, while motorcycle commuters travel 12.2 km. The convenience and mobility of motorcycles makes them
irreplaceable in Taiwan city traffic but they add significantly to air pollution problems. In order to improve air pollution conditions, some
new types of vehicles have been proposed, such as fuel cell driven and
hybrid energy vehicles. In this study, we develop a model pneumatic hybrid motorcycle system and simulate its acceleration and mileage
(km/L) performance. The results show that the pneumatic hybrid
motorcycle can improve efficiency.
Abstract: In this paper, we prove that if X is regular strongly screenable DC-like (C-scattered), then X ×Y is strongly screenable for every strongly screenable space Y . We also show that the product i∈ω Yi is strongly screenable if every Yi is a regular strongly screenable DC-like space. Finally, we present that the strongly screenableness are poorly behaved with its Tychonoff products.
Abstract: Fruit drying is a well known process mostly used for
preservation of fruits. Osmotic dehydration of apricot slices were
carried out in three different salt-sucrose concentrations and four
different temperatures. Also three different weight ratios of solution
to sample were conducted to one set of experiments. The dehydration
curves were constructed using Peleg-s model. Increasing the solution
volume increased the mass transfer rate and hence the solid gain
increased rapidly. Increasing the volume of osmotic media caused an
increase in overall mass transfer but a 'solution to sample' ratio of 5:1
gave the best product quality. The best temperature and concentration
that had a high water loss to solid gain ratio and an acceptable taste
were 40°C and 5%, respectively.
Abstract: The objective of this paper is to investigate a new
approach based on the idea of pictograms for food portion size. This
approach adopts the model of the United States Pharmacopeia- Drug
Information (USP-DI). The representation of each food portion size
composed of three parts: frame, the connotation of dietary portion
sizes and layout. To investigate users- comprehension based on this
approach, two experiments were conducted, included 122 Taiwanese
people, 60 male and 62 female with ages between 16 and 64 (divided
into age groups of 16-30, 31-45 and 46-64). In Experiment 1, the mean
correcting rate of the understanding level of food items is 48.54%
(S.D.= 95.08) and the mean response time 2.89sec (S.D.=2.14). The
difference on the correct rates for different age groups is significant
(P*=0.00
Abstract: Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
Abstract: An experiment was conducted to examine the effect of the level of performance stabilization on the human adaptability to perceptual-motor perturbation in a complex coincident timing task. Three levels of performance stabilization were established operationally: pre-stabilization, stabilization, and super-stabilization groups. Each group practiced the task until reached its level of stabilization in a constant sequence of movements and under a constant time constraint before exposure to perturbation. The results clearly showed that performance stabilization is a pre-condition for adaptation. Moreover, variability before reaching stabilization is harmful to adaptation and persistent variability after stabilization is beneficial. Moreover, the behavior of variability is specific to each measure.
Abstract: This study was a part of the three-year longitudinal
research on setting up an math learning model for the disadvantaged
students in Taiwan. A target 2nd grade class with 10 regular students
and 6 disadvantaged students at a disadvantaged area in Taipei
participated in this study. Two units of a market basal math textbook
concerning fractions, three-dimensional figures, weight and capacity
were adapted to enhance their math learning motivations, confidences
and effects. The findings were (1) curriculum adaptation was effective
on enhancing students- learning motivations, confidences and effects;
(2) story-type problems and illustrations decreased difficulties on
understanding math language for students from new immigrant
families and students with special needs; (3) “concrete –
semiconcrete – abstract" teaching strategies and hands-on activities
were essential to raise students learning interests and effects; and (4)
curriculum adaptation knowledge and skills needed to be included in
the pre- and in-service teacher training programs.
Abstract: How to simulate experimentally the air flow and heat
transfer under microgravity on the ground is important, which has not
been completely solved so far. Influence of gravity on air natural
convection results in convection heat transfer on ground difference
from that on orbit. In order to obtain air temperature and velocity
deviations of manned spacecraft during terrestrial thermal test,
dimensionless number analysis and numerical simulation analysis are
performed. The calculated temperature distribution and velocity
distribution of the horizontal test cases are compared to the vertical
cases. The results show that the influence of gravity is neglected for
facility drawer racks and more obvious for vertical cabins.
Abstract: According to the mobility of the satellite network nodes and the characteristic of management domain dynamic partition in the satellite network, the login and logout mechanism of the satellite network dynamic management domain partition was proposed in the paper. In the mechanism, a ground branch-station sends the packets of login broadcasting to satellites in view. After received the packets, the SNMP agents on the satellites adopt link-delay test to respond. According to the mechanism, the SNMP primitives were extended, and the new added primitives were as follows: broadcasting, login, login confirmation,delay_testing, test responses, and logout. The definition of primitives, which followed RFC1157 criterion, could be encoded by the BER coding. The policy of the dynamic management domain partition on the basis of the login and logout mechanism, which was supported by the SNMP protocol, was realized by the design of the extended primitives.
Abstract: Artificial Immune System is applied as a Heuristic
Algorithm for decades. Nevertheless, many of these applications
took advantage of the benefit of this algorithm but seldom proposed
approaches for enhancing the efficiency. In this paper, a
Self-evolving Artificial Immune System is proposed via developing
the T and B cell in Immune System and built a self-evolving
mechanism for the complexities of different problems. In this
research, it focuses on enhancing the efficiency of Clonal selection
which is responsible for producing Affinities to resist the invading of
Antigens. T and B cell are the main mechanisms for Clonal
Selection to produce different combinations of Antibodies.
Therefore, the development of T and B cell will influence the
efficiency of Clonal Selection for searching better solution.
Furthermore, for better cooperation of the two cells, a co-evolutional
strategy is applied to coordinate for more effective productions of
Antibodies. This work finally adopts Flow-shop scheduling
instances in OR-library to validate the proposed algorithm.
Abstract: Rough set theory is a very effective tool to deal with granularity and vagueness in information systems. Covering-based rough set theory is an extension of classical rough set theory. In this paper, firstly we present the characteristics of the reducible element and the minimal description covering-based rough sets through downsets. Then we establish lattices and topological spaces in coveringbased rough sets through down-sets and up-sets. In this way, one can investigate covering-based rough sets from algebraic and topological points of view.
Abstract: In this paper, we extend the compound binomial model to the case where the premium income process, based on a binomial process, is no longer a linear function. First, a mathematically recursive formula is derived for non ruin probability, and then, we examine the expected discounted penalty function, satisfy a defect renewal equation. Third, the asymptotic estimate for the expected discounted penalty function is then given. Finally, we give two examples of ruin quantities to illustrate applications of the recursive formula and the asymptotic estimate for penalty function.
Abstract: Nonspecific protein adsorption generally occurs on
any solid surfaces and usually has adverse consequences. Adsorption
of proteins onto a solid surface is believed to be the initial and
controlling step in biofouling. Surfaces modified with end-tethered
poly(ethylene glycol) (PEG) have been shown to be protein-resistant
to some degree. In this study, the adsorption of β-casein and
lysozyme was performed on 6 different types of surfaces where PEG
was tethered onto stainless steel by polyethylene imine (PEI) through
either OH or NHS end groups. Protein adsorption was also performed
on the bare stainless steel surface as a control. The adsorption was
conducted at 23 °C and pH 7.2. In situ QCM-D was used to
determine PEG adsorption kinetics, plateau PEG chain densities,
protein adsorption kinetics and plateau protein adsorbed quantities.
PEG grafting density was the highest for a NHS coupled chain,
around 0.5 chains / nm2. Interestingly, lysozyme which has smaller
size than β-casein, appeared to adsorb much less mass than that of β-
casein. Overall, the surface with high PEG grafting density exhibited
a good protein rejection.
Abstract: Home is important for Chinese people. Because the
information regarding the house attributes and surrounding
environments is incomplete in most real estate agency, most house
buyers are difficult to consider the overall factors effectively and only
can search candidates by sorting-based approach. This study aims to
develop a decision support system for housing purchasing, in which
surrounding facilities of each house are quantified. Then, all
considered house factors and customer preferences are incorporated
into Simple Multi-Attribute Ranking Technique (SMART) to support
the housing evaluation. To evaluate the validity of proposed approach,
an empirical study was conducted from a real estate agency. Based on
the customer requirement and preferences, the proposed approach can
identify better candidate house with consider the overall house
attributes and surrounding facilities.
Abstract: The economic and stable operation was affected
seriously by coal quality disturbance for power plants. Based on model
analysis, influence of the disturbance can be considered as gain change
of control system. Power capability coefficient of coal was
constructed to inhibit it. Accuracy of the coefficient was verified by
operating data. Then coal quality disturbance free system based on
gain scheduling was designed for coordinated control system.
Simulation showed that, the strategy improved control quality
obviously, and inhibited the coal quality disturbance.
Abstract: The consumption capability of people in China has
been a big issue to tourism business. Due to the increasing of China
tourists, Taiwan-s government rescinded the category of people in
China and opened up the non-stopped airline from China to Taiwan.
The “one-day traveling style between China and Taiwan" has formed,
hoping to bring business to Taiwan. Night market, which shows
foreigners the very local character of Taiwan, contains various
merchandise for consumers to purchase. With the increasing numbers
of non-stopped airline, visiting Taiwan-s night markets has also been
one of major activities to China-s tourists. The purpose of the present
study is to understand the consumer behavior of China tourists in
tourist night markets in Taipei and analyze that if their shopping
motives cause the different shopping behaviors and post-purchase
satisfaction and revisiting intention. The results reveled that for the
China tourists, the motives of significant influence to the shopping
behaviors. Also, the shopping behaviors significant influence to the
whole satisfaction and the whole satisfaction significant influence to
post-purchase behavior.
Abstract: This paper presents an integrated model that
automatically measures the change of rivers, damage area of bridge
surroundings, and change of vegetation. The proposed model is on the
basis of a neurofuzzy mechanism enhanced by SOM optimization
algorithm, and also includes three functions to deal with river imagery.
High resolution imagery from FORMOSAT-2 satellite taken before
and after the invasion period is adopted. By randomly selecting a
bridge out of 129 destroyed bridges, the recognition results show that
the average width has increased 66%. The ruined segment of the
bridge is located exactly at the most scour region. The vegetation
coverage has also reduced to nearly 90% of the original. The results
yielded from the proposed model demonstrate a pinpoint accuracy rate
at 99.94%. This study brings up a successful tool not only for
large-scale damage assessment but for precise measurement to
disasters.