The Adoption of Process Management for Accounting Information Systems in Thailand

Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimisation of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.

Characterising the Effects of Sand Blasting on Formed Steel Samples

The present research study focuses on the investigation of the influence of sand blasting on formed mild steel samples. The investigation involved the examinations on the parent material and a sand blasted material. The results were compared to the mechanically formed materials (sand and non-sand blasted) as well as a laser formed material (sand and non-sand blasted). Each material was characterized for the grain sizes and hardness. The percentage change in the grain sizes was quantified and correlation to the microhardness values was established. The Ultimate Tensile Strength (UTS) of the materials was also quantified using the obtained hardness values. The investigations revealed that the sand blasting causes an increase in the Vickers microhardness values of all the materials which also led to an increase in the UTS. After the forming operation, the microstructure revealed elongated grains as compared to almost equiaxed obtained from the parent non-sand blasted materials.

Pre-Service Teachers’ Assessment of Information Technology Application to Instruction

Technology has moved into the classroom, and it becomes difficult talking of achievement in and attitude to learning without making mention of it. The use of technology makes learning easy, real and practical as it motivates learners, sustains their interest and improves their attitude to learning. This study, therefore examined the pre-service teachers’ assessment of information technology application to instruction. The use of technology emphasizes and encourages active learning in the classroom. The study involved 100 pre-service teachers in the selected two (2) Colleges of Education, Nigeria. Purposive random sampling was used in selecting the participants and ex-post facto design was adopted the in which there is no manipulation of variables. Two valid and reliable instruments were used for data collection: Access Point ICT facilities and Application of ICT. The study established that pre-service teachers have less access to ICT facilities and Application of ICT in the college, apart from those students having the access outside the college. Also fewer pre-service teachers used ICT facilities on weekly and monthly bases. It was concluded that the establishment of students’ resources centres and Campus wide wireless connectivity must be implemented so as to improve and enhance students’ achievement in and attitude to learning. The time and attention devoted to learning activities and strategic specialized ICT skills and requisite entrepreneur skills should be increased so as to have easy access to information sources and be able to apply it in teaching process.

Hospital-Pharmacy Management System: A UAE Case Study

Large patients’ queues at pharmacies and hospitals are a problem that faces the supposedly smooth and healthy environment in United Arab Emirates. As this sometimes leads to dissatisfaction from visiting patients, we tried to solve this problem with additional beneficial functions by developing the Hospital-Pharmacy Management System. The primary purpose of this research is to develop a system that joins the databases of a hospital and a pharmacy together for a better integrated system that provides a better coherent working environment. Three methods are used to design the system. These methods are detailed literature review, an extensive feasibility study and surveys for doctors, hospital IT managers and End-users. Interviews and surveys with related stakeholders were done to depict system’s requirements; design and prototype. The prototype illustrates system’s features and its client and server architecture. The system has a mobile application for visiting patients to, mainly, keep track of their prescriptions and access to their personal information. The server side allows doctors to submit the prescriptions online to pharmacists who will process them. This system is expected to reduce the long waiting queues of patients and increase their satisfaction while also reducing doctors and pharmacists’ stress and facilitating their work. It will be deployed to users of Android devices only. This limitation will be resolved, as one of main future enhancements, once the system finds acceptance from hospitals and pharmacies in United Arab Emirates.

Cloud Computing Cryptography "State-of-the-Art"

Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the “keys generation and management” mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.

Structural Performance of a Timber-Concrete Bridge Prototype

Timber-concrete structures were recently introduced in Brazil as a viable option for bridge construction on side roads. Binding between timber and concrete is fundamentally important to assure the rigidity and performance of this structural system. The objective of this study was to assess the structural performance of a timber-concrete bridge prototype with width of 170cm and span of 400cm, whose binding among timber beams and concrete slabs was made with metal pins, obtained from CA 50 construction steel bars of 12.5mm diameter. It was possible to conclude, from the results obtained experimentally in laboratory, that the timber-concrete bridge prototype showed a good structural performance. This structural system provides an economical, rapid implementation solution, which may be used on side roads, favoring regional integration and agricultural production flow.

Energy Efficient Transmission of Image over DWT-OFDM System

In many applications retransmissions of lost packets are not permitted. OFDM is a multi-carrier modulation scheme having excellent performance which allows overlapping in frequency domain. With OFDM there is a simple way of dealing with multipath relatively simple DSP algorithms.  In this paper, an image frame is compressed using DWT, and the compressed data is arranged in data vectors, each with equal number of coefficients. These vectors are quantized and binary coded to get the bit steams, which are then packetized and intelligently mapped to the OFDM system. Based on one-bit channel state information at the transmitter, the descriptions in order of descending priority are assigned to the currently good channels such that poorer sub-channels can only affect the lesser important data vectors. We consider only one-bit channel state information available at the transmitter, informing only about the sub-channels to be good or bad. For a good sub-channel, instantaneous received power should be greater than a threshold Pth. Otherwise, the sub-channel is in fading state and considered bad for that batch of coefficients. In order to reduce the system power consumption, the mapped descriptions onto the bad sub channels are dropped at the transmitter. The binary channel state information gives an opportunity to map the bit streams intelligently and to save a reasonable amount of power. By using MAT LAB simulation we can analysis the performance of our proposed scheme, in terms of system energy saving without compromising the received quality in terms of peak signal-noise ratio.

Investigations of Natural Convective Heat Transfer in Rectangular Thermal Passages

The evaluation of the convective heat transfer of flow in passages with rectangular cross section is still of interest for the heat transfer investigators, as in the air heater solar collectors. The aim of this paper is to present investigation results on the natural convection heat transfer in a solar air heater. The effect of the channel length as heat transfer surface and the inclination of the passage were investigated. The results were obtained experimentally and theoretically. For that, an experimental test rig was fabricated with channel lengths of 1m, 1.5m, and 2m. For each length, the air outlet and inlet temperatures, absorber and cover temperatures, solar radiation intensity and air flow rate were measured at 10o, 30o, 50o, 70o, and 90o tilt angles. Measurements were recorded every 2 hours interval to investigate the transient behavior of the system. The experimental and theoretical results are presented in terms of Nu number versus Ra number and discussed. The percentages of differences between experimental and theoretical results are within the margin of 6% to 13%, effectively. It is recommended to extend the investigation to study the same configurations with different artificial surface roughing by ribs or pins.

A Comparative Analysis of Insolvency Proceedings in France, Germany and Slovak Republic

This contribution aims to compare legislation adjusting the course of insolvency proceedings in France, Germany and Slovakia. On the basis of an investigation of the legislative adjustment of this problem, an attempt is made to ascertain in the given countries the extent to which the outcome of the entire proceedings is influenced by legislation and to determine the fundamental moments that influence costs, recovery rate and the duration of proceedings. A comparative analysis was utilized in order to achieve the set goal. The results of the survey could be used to improve legislation so as to lead in the best and most expedient way to a departure from the market of those subjects that are for economic reasons unable to continue with their activities whilst burdening the entire process with the lowest possible costs, which would lead to a high level of satisfaction for creditors. 

Using the Technology-Organization-Environment Framework and Zuboff’s Concepts for Understanding Environmental Sustainability and RFID: Two Case Studies

Radio frequency identification (RFID) has been recognized as a key enabler of efficient and effective supply chains. Recently, with increasing concern for environmental sustainability, researchers and practitioners have been exploring the role of RFID in supporting “green supply chains.” This qualitative study uses the technology-organization-environment framework of Tornatzky and Fleischer, and Zuboff’s concepts of automating-informating-transformating in analyzing two case studies involving RFID use: the recycling of Hewlett Packard inkjet printers and the garbage and recycling program of the City of Grand Rapids, Michigan.

Antimicrobial Activity of Girardinia heterophylla

In the present study an attempt has been made to prepare the crude extracts of leaves and stem of ‘Girardinia heterophylla’ by using various solvents like petroleum ether, ethanol and double distilled water. The samples were given the code NGLS 1, NGLS 2, NGLS 3 and NGSS 1, NGSS 2 and NGSS 3 respectively. All the extracts were used to study their antimicrobial activity against gram positive bacteria e.g. Bacillus subtilis, gram negative bacteria e.g. E. coli and K. pneumonia and antifungal activity against Aspergillus niger. The results of the antimicrobial activity showed that all the crude extracts of the plant possesses antibacterial activity. Maximum antibacterial activity was shown by NGLS 2, NGLS 3 and NGSS 3 against K. pneumonia. The growth of fungus A. niger was also inhibited by all the crude extracts. Maximum inhibition was shown by NGSS 2 followed by NGSS 1.

Mobile Ad Hoc Networks and It’s Routing Protocols

A mobile ad hoc network (MANET) is a self configuring network, without any centralized control. The topology of this network is not always defined. The main objective of this paper is to introduce the fundamental concepts of MANETs to the researchers and practitioners, who are involved in the work in the area of modeling and simulation of MANETs. This paper begins with an overview of mobile ad hoc networks. Then it proceeds with the overview of routing protocols used in the MANETS, their properties and simulation methods. A brief tabular comparison between the routing protocols is also given in this paper considering different routing protocol parameters. This paper introduces a new routing scheme developed by the use of evolutionary algorithms (EA) and analytical hierarchy process (AHP) which will be used for getting the optimized output of MANET. In this paper cryptographic technique, ceaser cipher is also employed for making the optimized route secure.

Simulating Flow Transients in Conveying Pipeline Systems by Rigid Column and Full Elastic Methods: Pump Combined with Air Chamber

In water pipeline systems, the flow control is an integrated part of the operation, for instance, opening and closing the valves, starting and stopping the pumps, when these operations very quickly performed, they shall cause the hydraulic transient phenomena, which may cause pump and, valve failures and catastrophic pipe ruptures. Fluid transient analysis is one of the more challenging and complicated flow problems in the design and the operation of water pipeline systems. Transient control has become an essential requirement for ensuring safe operation of water pipeline systems. An accurate analysis and suitable protection devices should be used to protect water pipeline systems. The fourth-order Runge-Kutta method has been used to solve the dynamic and continuity equations in the rigid column method, while the characteristics method used to solve these equations in the full elastic methods. This paper presents the problem of modeling and simulating of transient phenomena in conveying pipeline systems based on the rigid column and full elastic methods. Also, it provides the influence of using the protection devices to protect the pipeline systems from damaging due to the gain pressure which occur in the transient state. The results obtained provide that the model is an efficient tool for flow transient analysis and provide approximately identical results by using these two methods. Moreover; using the closed surge tank reduces the unfavorable effects of transients.

An Efficient Burst Errors Combating for Image Transmission over Mobile WPANs

This paper presents an efficient burst error spreading tool. Also, it studies a vital issue in wireless communications, which is the transmission of images over wireless networks. IEEE ZigBee 802.15.4 is a short-range communication standard that could be used for small distance multimedia transmissions. In fact, the ZigBee network is a Wireless Personal Area Network (WPAN), which needs a strong interleaving mechanism for protection against error bursts. Also, it is low power technology and utilized in the Wireless Sensor Networks (WSN) implementation. This paper presents the chaotic interleaving scheme as a data randomization tool for this purpose. This scheme depends on the chaotic Baker map. The mobility effects on the image transmission are studied with different velocity through utilizing the Jakes’ model. A comparison study between the proposed chaotic interleaving scheme and the traditional block and convolutional interleaving schemes for image transmission over a correlated fading channel is presented. The simulation results show the superiority of the proposed chaotic interleaving scheme over the traditional schemes.

Can EEG Test Helps in Identifying Brain Tumor?

Brain tumor is inherently serious and life-threatening disease. Brain tumor builds the intracranial pressure in the brain, by shifting the brain or pushing against the skull, and also damaging nerves and healthy brain tissues. This intracranial pressure affects and interferes with normal brain functionality, which results in generation of abnormal electrical activities from brain. With recent development in the medical engineering and instruments, EEG instruments are able to record the brain electric activities with high accuracy, which establishes EEG as a primary tool for diagnosing the brain abnormalities. Research scholars and general physicians, often face difficulty in understanding EEG patterns. This paper presents the EEG patterns associated with brain tumor by combing medicine theory and neurologist experience. Paper also explains the pros-cons of the EEG based brain tumor identification.

Examination of the Effect of Air Viscosity on Narrow Acoustic Tubes Using FEM Involving Complex Effective Density and Complex Bulk Modulus

Earphones and headphones, which are compact electro-acoustic transducers, tend to have a lot of acoustic absorption materials and porous materials known as dampers, which often have a large number of extremely small holes and narrow slits to inhibit the resonance of the vibrating system, because the air viscosity significantly affects the acoustic characteristics in such acoustic paths. In order to perform simulations using the finite element method (FEM), it is necessary to be aware of material characteristics such as the impedance and propagation constants of sound absorbing materials and porous materials. The transfer function is widely known as a measurement method for an acoustic tube with such physical properties, but literature describing the measurements at the upper limits of the audible range is yet to be found. The acoustic tube, which is a measurement instrument, must be made narrow, and the distance between the two sets of microphones must be shortened in order to take measurements of acoustic characteristics at higher frequencies. When such a tube is made narrow, however, the characteristic impedance has been observed to become lower than the impedance of air. This paper considers the cause of this phenomenon to be the effect of the air viscosity and describes an FEM analysis of an acoustic tube considering air viscosity to compare to the theoretical formula by including the effect of air viscosity in the theoretical formula for an acoustic tube.

Towards Creating a Nation of Engineerpreneur

New conceptualizations were introduced to address the emerging need to develop innovativeness and creativity attitudes in future engineering professional. Thus, entrepreneurial engineering education needs an environment where future engineers can be formed through practical learning and the interaction with forces, ideas and inspirations, in the final perspective of effectively identifying, acquiring, developing, and transferring technology into new business products and services. This paper aims to investigate the characteristics of a successful entrepreneur for engineering students. A questionnaire was used to measure the level of entrepreneurial competencies. The questionnaire was based on the Personal Entrepreneurial Competence Model, developed by McClelland Individual. Participants were recruited from the final year students of eight programs under the Faculty of Engineering. Of the 432 questionnaires distributed, 210 were collected back, giving a response rate of approximately 49%. Findings suggest that final year engineering students have respectable entrepreneurial attitudes and behaviors, and are competent to be engineerpreneur. The study also recommended that we need an environment that does not insist that engineers become entrepreneurs, but one where the two can meet, and business leaders can organize our nation effectively.

Socio-Demographic Effects on Digital Libraries Preference and Use: A Case Study at Higher Learning Institutions

Explosion in information management and information system technology has brought dramatic changes in learning and library system environments. The use of academic digital libraries does witness the spectacular impact on academic societies’ way of performing their study in Malaysia, a country with a multi-racial people. This paper highlights a research on examining the socio-demographic differences on the preference and use of academic digital libraries as compared to physical libraries at higher learning institutions. Findings indicate that preference towards digital libraries differed between ethnicity, gender and university. However none of the socio-demographic factors is statistically significant in terms of the use of digital libraries.

A Computational Fluid Dynamic Model of Human Sniffing

The objective of this paper is to develop a computational model of human nasal cavity from computed tomography (CT) scans using MIMICS software. Computational fluid dynamic techniques were employed to understand nasal airflow. Gambit and Fluent software was used to perform CFD simulation. Velocity profiles, iteration plots, pressure distribution, streamline and pathline patterns for steady, laminar airflow inside the human nasal cavity of healthy and also infected persons are presented in detail. The implications for olfaction are visualized. Results are validated with the available numerical and experimental data. The graphs reveal that airflow varies with different anatomical nasal structures and only fraction of the inspired air reaches the olfactory region. The Deviations in the results suggest that the treatment of infected volunteers will improve the olfactory function.

Bernstein-Galerkin Approach for Perturbed Constant-Coefficient Differential Equations, One-Dimensional Analysis

A numerical approach for solving constant-coefficient differential equations whose solutions exhibit boundary layer structure is built by inserting Bernstein Partition of Unity into Galerkin variational weak form. Due to the reproduction capability of Bernstein basis, such implementation shows excellent accuracy at boundaries and is able to capture sharp gradients of the field variable by p-refinement using regular distributions of equi-spaced evaluation points. The approximation is subjected to convergence experimentation and a procedure to assemble the discrete equations without a background integration mesh is proposed.