Abstract: This research attempts to explore gaps in Information
Systems (IS) and innovation literatures by developing a model of
Information Technology (IT) capability in enabling innovation. The
research was conducted by using semi-structured interview with six
innovators in business consulting, financial, healthcare and academic
organizations. The interview results suggest four elements of ITenabled
innovation capability which are information (ability to
capture ideas and knowledge), connectivity (ability to bridge
geographical boundary and mobilize human resources),
communication (ability to attain and engage relationships between
human resources) and transformation (ability to change the functions
and process integrations) in defining IT-enabled innovation platform.
The results also suggests innovators- roles and IT capability.
Abstract: The study of the fouling deposition of pink guava
juice (PGJ) is relatively new research compared to milk fouling
deposit. In this work, a new experimental set-up was developed to
imitate the fouling formation in heat exchanger, namely a continuous
flow experimental set-up heat exchanger. The new experimental setup
was operated under industrial pasteurization temperature of PGJ,
which was at 93°C. While the flow rate and pasteurization period
were based on the experimental capacity, which were 0.5 and 1
liter/min for the flow rate and the pasteurization period was set for 1
hour. Characterization of the fouling deposit was determined by
using various methods. Microstructure of the deposits was carried
out using ESEM. Proximate analyses were performed to determine
the composition of moisture, fat, protein, fiber, ash and carbohydrate
content. A study on the hardness and stickiness of the fouling deposit
was done using a texture analyzer. The presence of seedstone in pink
guava juice was also analyzed using a particle analyzer. The findings
shown that seedstone from pink guava juice ranging from 168 to
200μm and carbohydrate was found to be a major composition
(47.7% of fouling deposit consists of carbohydrate). Comparison
between the hardness and stickiness of the deposits at two different
flow rates showed that fouling deposits were harder and denser at
higher flow rate. Findings from this work provide basis knowledge
for further study on fouling and cleaning of PGJ.
Abstract: The aim of this study is to examine the reading
comprehension scores of Turkish 5th grade students according to the
variables given in the student questionnaire. In this descriptive
survey study research participated 279 5th grade students, who
studied at 10 different primary schools in four provinces of Ankara in
2008-2009 academic year. Two different data collection tools were
made use of in the study: “Reading Comprehension Test" and
“Student Information Questionnaire". Independent sample t-test, oneway
Anova and two-way Anova tests were used in the analyses of
the gathered data. The results of the study indicate that the reading
comprehension scores of the students differ significantly according to
sex of the students, the number of books in their houses, the
frequency of summarizing activities on the reading text of free and
the frequency reading hours provided by their teachers; but, differ
not significantly according to educational level of their mothers and
fathers.
Abstract: Dynamics of a vapour bubble generated due to a high local energy input near a circular thin bronze plate in the absence of the buoyancy forces is numerically investigated in this paper. The bubble is generated near a thin bronze plate and during the growth and collapse of the bubble, it deforms the nearby plate. The Boundary Integral Equation Method is employed for numerical simulation of the problem. The fluid is assumed to be incompressible, irrotational and inviscid and the surface tension on the bubble boundary is neglected. Therefore the fluid flow around the vapour bubble can be assumed as a potential flow. Furthermore, the thin bronze plate is assumed to have perfectly plastic behaviour. Results show that the displacement of the circular thin bronze plate has considerable effect on the dynamics of its nearby vapour bubble. It is found that by decreasing the thickness of the thin bronze plate, the growth and collapse rate of the bubble becomes higher and consequently the lifetime of the bubble becomes shorter.
Abstract: Droplet size distributions in the cold spray of a fuel
are important in observed combustion behavior. Specification of
droplet size and velocity distributions in the immediate downstream
of injectors is also essential as boundary conditions for advanced
computational fluid dynamics (CFD) and two-phase spray transport
calculations. This paper describes the development of a new model to
be incorporated into maximum entropy principle (MEP) formalism
for prediction of droplet size distribution in droplet formation region.
The MEP approach can predict the most likely droplet size and
velocity distributions under a set of constraints expressing the
available information related to the distribution.
In this article, by considering the mechanisms of turbulence
generation inside the nozzle and wave growth on jet surface, it is
attempted to provide a logical framework coupling the flow inside the
nozzle to the resulting atomization process. The purpose of this paper
is to describe the formulation of this new model and to incorporate it
into the maximum entropy principle (MEP) by coupling sub-models
together using source terms of momentum and energy. Comparison
between the model prediction and experimental data for a gas turbine
swirling nozzle and an annular spray indicate good agreement
between model and experiment.
Abstract: SeqWord Gene Island Sniffer, a new program for
the identification of mobile genetic elements in sequences of bacterial chromosomes is presented. This program is based on the
analysis of oligonucleotide usage variations in DNA sequences. 3,518 mobile genetic elements were identified in 637 bacterial
genomes and further analyzed by sequence similarity and the
functionality of encoded proteins. The results of this study are stored in an open database http://anjie.bi.up.ac.za/geidb/geidbhome.
php). The developed computer program and the database provide the information valuable for further investigation of the
distribution of mobile genetic elements and virulence factors among bacteria. The program is available for download at www.bi.up.ac.za/SeqWord/sniffer/index.html.
Abstract: A passive system "Qanat" is collection of some
underground wells. A mother-well was dug in a place far from the
city where they could reach to the water table maybe 100 meters
underground, they dug other wells to direct water toward the city,
with minimum possible gradient. Using the slope of the earth they
could bring water close to the surface in the city. The source of water
or the appearance of Qanat, land slope and the ownership lines are
the important and effective factors in the formation of routes and the
segment division of lands to the extent that making use of Qanat as
the techniques of extracting underground waters creates a channel of
routes with an organic order and hierarchy coinciding the slope of
land and it also guides the Qanat waters in the tradition texture of salt
desert and border provinces of it. Qanats are excavated in a specified
distinction from each other. The quantity of water provided by
Qanats depends on the kind of land, distance from mountain,
geographical situation of them and the rate of water supply from the
underground land. The rate of underground waters, possibility of
Qanat excavation, number of Qanats and rate of their water supply
from one hand and the quantity of cultivable fertile lands from the
other hand are the important natural factors making the size of cities.
In the same manner the cities with several Qanats have multi central
textures. The location of cities is in direct relation with land quality,
soil fertility and possibility of using underground water by excavating
Qanats. Observing the allowable distance for Qanat watering is a
determining factor for distance between villages and cities.
Topography, land slope, soil quality, watering system, ownership,
kind of cultivation, etc. are the effective factors in directing Qanats
for excavation and guiding water toward the cultivable lands and it
also causes the formation of different textures in land division of
farming provinces. Several divisions such as orderly and wide, inorderly,
thin and long, comb like, etc. are the introduction to organic
order. And at the same time they are complete coincidence with
environmental conditions in the typical development of ecological
architecture and planning in the traditional cities and settlements
order.
Abstract: In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Abstract: The present paper represent the efforts undertaken for
the development of an semi-automatic robot that may be used for
various post-disaster rescue operation planning and their subsequent
execution using one-way communication of video and data from the
robot to the controller and controller to the robot respectively.
Wireless communication has been used for the purpose so that the
robot may access the unapproachable places easily without any
difficulties. It is expected that the information obtained from the
robot would be of definite help to the rescue team for better planning
and execution of their operations.
Abstract: Power consumption of nodes in ad hoc networks is a
critical issue as they predominantly operate on batteries. In order to
improve the lifetime of an ad hoc network, all the nodes must be
utilized evenly and the power required for connections must be
minimized. In this project a link layer algorithm known as Power
Aware medium Access Control (PAMAC) protocol is proposed
which enables the network layer to select a route with minimum total
power requirement among the possible routes between a source and a
destination provided all nodes in the routes have battery capacity
above a threshold. When the battery capacity goes below a
predefined threshold, routes going through these nodes will be
avoided and these nodes will act only as source and destination.
Further, the first few nodes whose battery power drained to the set
threshold value are pushed to the exterior part of the network and the
nodes in the exterior are brought to the interior. Since less total
power is required to forward packets for each connection. The
network layer protocol AOMDV is basically an extension to the
AODV routing protocol. AOMDV is designed to form multiple
routes to the destination and it also avoid the loop formation so that it
reduces the unnecessary congestion to the channel. In this project, the
performance of AOMDV is evaluated using PAMAC as a MAC layer
protocol and the average power consumption, throughput and
average end to end delay of the network are calculated and the results
are compared with that of the other network layer protocol AODV.
Abstract: This article presents the developments of efficient
algorithms for tablet copies comparison. Image recognition has
specialized use in digital systems such as medical imaging,
computer vision, defense, communication etc. Comparison between
two images that look indistinguishable is a formidable task. Two
images taken from different sources might look identical but due to
different digitizing properties they are not. Whereas small variation
in image information such as cropping, rotation, and slight
photometric alteration are unsuitable for based matching
techniques. In this paper we introduce different matching
algorithms designed to facilitate, for art centers, identifying real
painting images from fake ones. Different vision algorithms for
local image features are implemented using MATLAB. In this
framework a Table Comparison Computer Tool “TCCT" is
designed to facilitate our research. The TCCT is a Graphical Unit
Interface (GUI) tool used to identify images by its shapes and
objects. Parameter of vision system is fully accessible to user
through this graphical unit interface. And then for matching, it
applies different description technique that can identify exact
figures of objects.
Abstract: Medical Tourism is a new development in Taiwan
recently. The willingness and barriers of potential tourists from
China to participate medical tourism are studied. A questionnaire
survey is conducted and the SPSS software is used to analyze data.
The results show that under one fifth of respondents express full
medical tourism participation willingness. Among travel barriers
toward medical tourism, “insufficient information of medical tourism
trip", “not enough time", “no companion", “worrying about
unsatisfied itinerary." are perceived the most important barriers.
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.
Abstract: The present paper aims to present the significant role that the concept of governance can play in order to combine naturals resources as useful funding basis for the formation of a stable and effective welfare state model. The combination of those two different fields aims to represent the modern trends of our era as the means to solve the severe financial and economic issues caused mostly due to the malfunction of the welfare state and its public sector. European Union and Asian countries (especially China) are the main areas of interest since EU experiences a fiscal and economic crisis while China rules the area of the natural resources exploiting 97% of rare earths elements worldwide.
Abstract: The purpose of this paper is to study Database Models
to use them efficiently in E-commerce websites. In this paper we are
going to find a method which can save and retrieve information in Ecommerce
websites. Thus, semantic web applications can work with,
and we are also going to study different technologies of E-commerce
databases and we know that one of the most important deficits in
semantic web is the shortage of semantic data, since most of the
information is still stored in relational databases, we present an
approach to map legacy data stored in relational databases into the
Semantic Web using virtually any modern RDF query language, as
long as it is closed within RDF. To achieve this goal we study XML
structures for relational data bases of old websites and eventually we
will come up one level over XML and look for a map from relational
model (RDM) to RDF. Noting that a large number of semantic webs
get advantage of relational model, opening the ways which can be
converted to XML and RDF in modern systems (semantic web) is
important.
Abstract: A large amount of valuable information is available in
plain text clinical reports. New techniques and technologies are
applied to extract information from these reports. In this study, we
developed a domain based software system to transform 600
Otorhinolaryngology discharge notes to a structured form for
extracting clinical data from the discharge notes. In order to decrease
the system process time discharge notes were transformed into a data
table after preprocessing. Several word lists were constituted to
identify common section in the discharge notes, including patient
history, age, problems, and diagnosis etc. N-gram method was used
for discovering terms co-Occurrences within each section. Using this
method a dataset of concept candidates has been generated for the
validation step, and then Predictive Apriori algorithm for Association
Rule Mining (ARM) was applied to validate candidate concepts.
Abstract: Decision support based upon risk analysis into
comparison of the electricity generation from different renewable
energy technologies can provide information about their effects on
the environment and society. The aim of this paper is to develop the
assessment framework regarding risks to health and environment,
and the society-s benefits of the electric power plant generation from
different renewable sources. The multicriteria framework to
multiattribute risk analysis technique and the decision analysis
interview technique are applied in order to support the decisionmaking
process for the implementing renewable energy projects to
the Bangkok case study. Having analyses the local conditions and
appropriate technologies, five renewable power plants are postulated
as options. As this work demonstrates, the analysis can provide a tool
to aid decision-makers for achieving targets related to promote
sustainable energy system.
Abstract: The control design for unmanned underwater vehicles (UUVs) is challenging due to the uncertainties in the complex dynamic modeling of the vehicle as well as its unstructured operational environment. To cope with these difficulties, a practical robust control is therefore desirable. The paper deals with the application of coefficient diagram method (CDM) for a robust control design of an autonomous underwater vehicle. The CDM is an algebraic approach in which the characteristic polynomial and the controller are synthesized simultaneously. Particularly, a coefficient diagram (comparable to Bode diagram) is used effectively to convey pertinent design information and as a measure of trade-off between stability, response speed and robustness. In the polynomial ring, Kharitonov polynomials are employed to analyze the robustness of the controller due to parametric uncertainties.
Abstract: Laser beam forming is a novel technique developed for the joining of metallic components. In this study, an overview of the laser beam forming process, areas of application, the basic mechanisms of the laser beam forming process, some recent research
studies and the need to focus more research effort on improving the
laser-material interaction of laser beam forming of titanium and its
alloys are presented.
Abstract: Systems Analysis and Design is a key subject in
Information Technology courses, but students do not find it easy to
cope with, since it is not “precise" like programming and not exact
like Mathematics. It is a subject working with many concepts,
modeling ideas into visual representations and then translating the
pictures into a real life system. To complicate matters users who are
not necessarily familiar with computers need to give their inputs to
ensure that they get the system the need. Systems Analysis and
Design also covers two fields, namely Analysis, focusing on the
analysis of the existing system and Design, focusing on the design of
the new system. To be able to test the analysis and design of a
system, it is necessary to develop a system or at least a prototype of
the system to test the validity of the analysis and design. The skills
necessary in each aspect differs vastly. Project Management Skills,
Database Knowledge and Object Oriented Principles are all
necessary. In the context of a developing country where students
enter tertiary education underprepared and the digital divide is alive
and well, students need to be motivated to learn the necessary skills,
get an opportunity to test it in a “live" but protected environment –
within the framework of a university. The purpose of this article is to
improve the learning experience in Systems Analysis and Design
through reviewing the underlying teaching principles used, the
teaching tools implemented, the observations made and the
reflections that will influence future developments in Systems
Analysis and Design. Action research principles allows the focus to
be on a few problematic aspects during a particular semester.