Abstract: E-tailing websites are often perceived to be static, impersonal and distant. However, with the movement of the World Wide Web to Web 2.0 in recent years, these online websites have been found to display personalities akin to 'humanistic' qualities and project impressions much like its retailing counterpart i.e. salespeople. This paper examines the personality of e-tailing websites and their impact on consumers- initial trust towards the sites. A total of 239 Internet users participated in this field experiment study which utilized 6 online book retailers- websites that the participants had not previously visited before. Analysis revealed that out of four website personalities (sincerity, competence, excitement and sophistication) only sincerity and competence are able to exert an influence in building consumers- trust upon their first visit to the website. The implications of the findings are further elaborated in this paper.
Abstract: Many people regard food events as part of gastronomic tourism and important in enhancing visitors’ experiences. Realizing the importance and contribution of food events to a country’s economy, the Malaysia government is undertaking greater efforts to promote such tourism activities to international tourists. Among other food events, the Ramadan bazaar is a unique food culture event, which receives significant attention from the Malaysia Ministry of Tourism. This study reports the empirical investigation into the international tourists’ perceptions, attraction towards the Ramadan bazaar and willingness in disseminating the information. Using the Ramadan bazaar at Kampung Baru, Kuala Lumpur as the data collection setting, results revealed that the Ramadan bazaar attributes (food and beverages, events and culture) significantly influenced the international tourist attraction to such a bazaar. Their high level of experience and satisfaction positively influenced their willingness to disseminate information. The positive response among the international tourists indicates that the Ramadan bazaar as gastronomic tourism can be used in addition to other tourism products as a catalyst to generate and boost the local economy. The related authorities that are closely associated with the tourism industry therefore should not ignore this indicator but continue to take proactive action in promoting the gastronomic event as one of the major tourist attractions.
Abstract: The effect of thermally induced stress on the modal
properties of highly elliptical core optical fibers is studied in this
work using a finite element method. The stress analysis is carried out
and anisotropic refractive index change is calculated using both the
conventional plane strain approximation and the generalized plane
strain approach. After considering the stress optical effect, the modal
analysis of the fiber is performed to obtain the solutions of
fundamental and higher order modes. The modal effective index,
modal birefringence, group effective index, group birefringence, and
dispersion of different modes of the fiber are presented. For
propagation properties, it can be seen that the results depend much on
the approach of stress analysis.
Abstract: Nowadays there are lots of applications of power and
free conveyors in logistics. They are the most frequently used
conveyor systems worldwide. Overhead conveyor technologies like
power and free systems are used in the most intra-logistics
applications in trade and industry. The automotive, food, beverage
and textile industry as well as aeronautic catering or engineering are
among the applications. Power and free systems employ different
manufacturing intervals in manufacturing as well as in production as
temporary store and buffer. Depending on the application area, power
and free conveyors are equipped with target controls enabling
complex distribution-and sorting tasks. This article introduces a new
power and free conveyor design in intra-logistics and explains its
components. According to the explanation of the components, a
model is created by means of their technical characteristics. Through
the CAD software, the model is visualized. After that, the static
analysis is evaluated. This analysis helps the calculation of the
mandatory state of structures under force action. This powerful model
helps companies achieve lower development costs as well as quicker
market maturity.
Abstract: The stability of a software system is one of the most
important quality attributes affecting the maintenance effort. Many
techniques have been proposed to support the analysis of software
stability at the architecture, file, and class level of software systems,
but little effort has been made for that at the feature (i.e., method and
attribute) level. And the assumptions the existing techniques based
on always do not meet the practice to a certain degree. Considering
that, in this paper, we present a novel metric, Stability of Software
(SoS), to measure the stability of object-oriented software systems
by software change propagation analysis using a simulation way
in software dependency networks at feature level. The approach is
evaluated by case studies on eight open source Java programs using
different software structures (one employs design patterns versus one
does not) for the same object-oriented program. The results of the
case studies validate the effectiveness of the proposed metric. The
approach has been fully automated by a tool written in Java.
Abstract: This paper covers the present situation and problem of experimental teaching of mathematics specialty in recent years, puts
forward and demonstrates experimental teaching methods for different
education. From the aspects of content and experimental teaching
approach, uses as an example the course “Experiment for Program
Designing & Algorithmic Language" and discusses teaching practice
and laboratory course work. In addition a series of successful methods
and measures are introduced in experimental teaching.
Abstract: This paper proposes an investment cost recovery
based efficient and fast sequential optimization approach to optimal
allocation of thyristor controlled series compensator (TCSC) in
competitive power market. The optimization technique has been used
with an objective to maximizing the social welfare and minimizing
the device installation cost by suitable location and rating of TCSC in
the system. The effectiveness of proposed approach for location of
TCSC has been compared with some existing methods of TCSC
placement, in terms of its impact on social welfare, TCSC investment
recovery and optimal generation as well as load patterns. The results
have been obtained on modified IEEE 14-bus system.
Abstract: Wireless Mesh Networks (WMNs) are an emerging
technology for last-mile broadband access. In WMNs, similar to ad
hoc networks, each user node operates not only as a host but also as a
router. User packets are forwarded to and from an Internet-connected
gateway in multi-hop fashion. The WMNs can be integrated with
other networking technologies i.e. ad hoc networks, to implement a
smooth network extension. The meshed topology provides good
reliability and scalability, as well as low upfront investments. Despite
the recent start-up surge in WMNs, much research remains to be
done in standardizing the functional parameters of WMNs to fully
exploit their full potential. An edifice of the security concerns of
these networks is authentication of a new client joining an integrated
ad hoc network and such a scenario will require execution of a multihop
authentication technique. Our endeavor in this paper is to
introduce a secure authentication technique, with light over-heads
that can be conveniently implemented for the ad-hoc nodes forming
clients of an integrated WMN, thus facilitating their inter-operability.
Abstract: Wind turbine should be controlled to capture maximum
wind energy and to prevent the turbine from being stalled. To achieve
those two goals, wind turbine controller controls torque on generator
and limits input torque from wind by pitching blade. Usually, torque
on generator is controlled using inverter torque set point. However,
verifying a control algorithm in actual wind turbine needs a lot of
efforts to test and the actual wind turbine could be broken while testing
a control algorithm. So, several software have developed and
commercialized by Garrad Hassan, GH Bladed, and NREL, FAST.
Even though, those programs can simulate control system modeling
with subroutines or DLLs. However, those simulation programs are
not able to emulate detailed generator or PMSG. In this paper, a small
size wind turbine simulator is developed with induction motor and
small size drive train. The developed system can simulate wind turbine
control algorithm in the region before rated power.
Abstract: this paper gives a novel approach towards real-time speed estimation of multiple traffic vehicles using fuzzy logic and image processing techniques with proper arrangement of camera parameters. The described algorithm consists of several important steps. First, the background is estimated by computing median over time window of specific frames. Second, the foreground is extracted using fuzzy similarity approach (FSA) between estimated background pixels and the current frame pixels containing foreground and background. Third, the traffic lanes are divided into two parts for both direction vehicles for parallel processing. Finally, the speeds of vehicles are estimated by Maximum a Posterior Probability (MAP) estimator. True ground speed is determined by utilizing infrared sensors for three different vehicles and the results are compared to the proposed algorithm with an accuracy of ± 0.74 kmph.
Abstract: At present, increased concerns about global
environmental problems have magnified the importance of
sustainability management. To move towards sustainability,
companies need to look at everything from a holistic perspective in
order to understand the interconnections between economic growth
and environmental and social sustainability. This paper aims to gain
an understanding of key determinants that drive sustainability
management and barriers that hinder its development. It employs
semi-structured interviews with key informants, site observation and
documentation. The informants are production, marketing and
environmental managers of the leading wine producer, which aims to
become an Asia-s leader in wine & wine based products. It is found
that corporate image and top management leadership are the primary
factors influencing the adoption of sustainability management. Lack
of environmental knowledge and inefficient communication are
identified as barriers.
Abstract: Oral health is particular important to the hospitalized
patients with chronic schizophrenia for an extreme high potential of the respiratory infections. Due to the degeneration of physical capability, patients of this kind typically fall dependent in the activity of daily living (ADL). A very high percentage of patients had dental
problems of which mostly could be easily avoid by easy regular tooth brushing. Purpose of the project is to develop a mechanism in helping the schizophrenia patients in rebuilding a tooth-cleaning habit. The
project observed and evaluated the tooth-cleaning behavior of 100
male patients in a psychiatric hospital, and found the majority of them
ignored such an activity in a three-month period of time. In the meantime, the primary care-givers were not aware or not convinced
the importance of such a need of dental hygiene, and thus few if any
tooth cleaning training or knowledge on dental hygiene were given to
the patients. The project then developed a program based on the numerous observations and discussions. The improvement program
included patients- group education, care-givers- training, and a
tool-kit for tooth-brush holding was erected. The project launched
with some incentive package. The outcomes were encouraging with
87% of the patients had rebuilt their tooth-brushing habits against
previous 22%, and the tooth cleaning kits were 100% kept against 22%
in the past. This project had significantly improved the oral health of
the patients. The project, included the procedure and the tool-kit
holder specific for this purpose, was a good examples for psychiatric
hospitals.
Abstract: We consider a two-way relay network where two sources exchange information. A relay helps the two sources exchange information using the decode-and-XOR-forward protocol. We investigate the power minimization problem with minimum rate constraints. The system needs two time slots and in each time slot the required rate pair should be achievable. The power consumption is minimized in each time slot and we obtained the closed form solution. The simulation results confirm that the proposed power allocation scheme consumes lower total power than the conventional schemes.
Abstract: This paper presented a MATLAB-based system named Smart Access Network Testing, Analyzing and Database (SANTAD), purposely for in-service transmission surveillance and self restoration against fiber fault in fiber-to-the-home (FTTH) access network. The developed program will be installed with optical line terminal (OLT) at central office (CO) to monitor the status and detect any fiber fault that occurs in FTTH downwardly from CO towards residential customer locations. SANTAD is interfaced with optical time domain reflectometer (OTDR) to accumulate every network testing result to be displayed on a single computer screen for further analysis. This program will identify and present the parameters of each optical fiber line such as the line's status either in working or nonworking condition, magnitude of decreasing at each point, failure location, and other details as shown in the OTDR's screen. The failure status will be delivered to field engineers for promptly actions, meanwhile the failure line will be diverted to protection line to ensure the traffic flow continuously. This approach has a bright prospect to improve the survivability and reliability as well as increase the efficiency and monitoring capabilities in FTTH.
Abstract: Solar energy has a major role in renewable energy
resources. Solar Cell as a basement of solar system has attracted lots
of research. To conduct a study about solar energy system, an
authenticated model is required. Diode base PV models are widely
used by researchers. These models are classified based on the number
of diodes used in them. Single and two-diode models are well
studied. Single-diode models may have two, three or four elements.
In this study, these solar cell models are examined and the simulation
results are compared to each other. All PV models are re-designed in
the Matlab/Simulink software and they examined by certain test
conditions and parameters. This paper provides comparative studies
of these models and it tries to compare the simulation results with
manufacturer-s data sheet to investigate model validity and accuracy.
The results show a four- element single-diode model is accurate and
has moderate complexity in contrast to the two-diode model with
higher complexity and accuracy
Abstract: In this paper, a heuristic method for simultaneous
rescue robot path-planning and mission scheduling is introduced
based on project management techniques, multi criteria decision
making and artificial potential fields path-planning. Groups of
injured people are trapped in a disastrous situation. These people are
categorized into several groups based on the severity of their
situation. A rescue robot, whose ultimate objective is reaching
injured groups and providing preliminary aid for them through a path
with minimum risk, has to perform certain tasks on its way towards
targets before the arrival of rescue team. A decision value is assigned
to each target based on the whole degree of satisfaction of the criteria
and duties of the robot toward the target and the importance of
rescuing each target based on their category and the number of
injured people. The resulted decision value defines the strength of the
attractive potential field of each target. Dangerous environmental
parameters are defined as obstacles whose risk determines the
strength of the repulsive potential field of each obstacle. Moreover,
negative and positive energies are assigned to the targets and
obstacles, which are variable with respects to the factors involved.
The simulation results show that the generated path for two cases
studies with certain differences in environmental conditions and
other risk factors differ considerably.
Abstract: Educational institutions increasingly adopt the
students-as-customers concept to satisfy their students.
Understanding students- perspectives on the use of this business
concept in educational institutions is necessary for the institutions to
effectively align these perspectives with their management practice.
The study investigates whether students in technology and business
disciplines have significantly different attitudes toward using the
students-as-customers concept in educational institutions and
explores the impact of treating students as customers in technology
disciplines under students- perspectives. The results from
quantitative and qualitative data analyses show that technology
students, in contrast to business students, fairly disagree with
educational institutions to treat students as customers. Treating
students as customers in technology disciplines will have a negative
influence on teaching performance, instructor-student relationships
and educational institutions- aim, but a positive influence on service
quality in educational institutions. The paper discusses the findings
and concludes with implications and limitations of the study.
Abstract: Environment today is featured with aging population,
increasing prevalence of chronic disease and complex of medical
treatment. Safe use of pharmaceutics relied very much on the efforts
made by both the health- related organizations and as well as the
government agencies. As far as the specialization concern in providing
health services to the patients, the government actively issued and
implemented the divisions of medical treatment and pharmaceutical to
improve the quality of care and to reduce medication errors and ensure
public health. Pharmaceutical sub-sector policy has been implemented
for 13 years. This study attempts to explore the factors that affect the
patients- behavior intention of refilling a prescription from a NHIB
pharmacy. Samples were those patients refilling their prescriptions
with the case NHIB pharmacies. A self-administered questionnaire
was used to collect respondents- information while the patients or
family members visit the pharmacy for the refilling. 1,200
questionnaires were dispatched in 37 pharmacies that randomly
selected from Pingtung City, Dongkang, Chaozhou, Hengchun areas.
732 responses were gained with 604 valid samples for further analyses.
Results of data analyses indicated that respondents- attitude,
subjective norm, perceived behavior control and behavior intentions
toward refilling behavior varied from some demographic variables to
another. This research also suggested adding actual behavior, either by
a self-report or observed, into the research.
Abstract: Privacy issues commonly discussed among
researchers, practitioners, and end-users in pervasive healthcare.
Pervasive healthcare systems are applications that can support
patient-s need anytime and anywhere. However, pervasive healthcare
raises privacy concerns since it can lead to situations where patients
may not be aware that their private information is being shared and
becomes vulnerable to threat. We have systematically analyzed the
privacy issues and present a summary in tabular form to show the
relationship among the issues. The six issues identified are medical
information misuse, prescription leakage, medical information
eavesdropping, social implications for the patient, patient difficulties
in managing privacy settings, and lack of support in designing
privacy-sensitive applications. We narrow down the issues and chose
to focus on the issue of 'lack of support in designing privacysensitive
applications' by proposing a privacy-sensitive architecture
specifically designed for pervasive healthcare monitoring systems.
Abstract: Model Predictive Control (MPC) is an established control
technique in a wide range of process industries. The reason for
this success is its ability to handle multivariable systems and systems
having input, output or state constraints. Neverthless comparing to
PID controller, the implementation of the MPC in miniaturized
devices like Field Programmable Gate Arrays (FPGA) and microcontrollers
has historically been very small scale due to its complexity in
implementation and its computation time requirement. At the same
time, such embedded technologies have become an enabler for future
manufacturing enterprisers as well as a transformer of organizations
and markets. In this work, we take advantage of these recent advances
in this area in the deployment of one of the most studied and applied
control technique in the industrial engineering. In this paper, we
propose an efficient firmware for the implementation of constrained
MPC in the performed STM32 microcontroller using interior point
method. Indeed, performances study shows good execution speed
and low computational burden. These results encourage to develop
predictive control algorithms to be programmed in industrial standard
processes. The PID anti windup controller was also implemented in
the STM32 in order to make a performance comparison with the
MPC. The main features of the proposed constrained MPC framework
are illustrated through two examples.