Abstract: This study suggests a model of a new set of evaluation criteria that will be used to measure the efficiency of real-world E-commerce websites. Evaluation criteria include design, usability and performance for websites, the Data Envelopment Analysis (DEA) technique has been used to measure the websites efficiency. An efficient Web site is defined as a site that generates the most outputs, using the smallest amount of inputs. Inputs refer to measurements representing the amount of effort required to build, maintain and perform the site. Output is amount of traffic the site generates. These outputs are measured as the average number of daily hits and the average number of daily unique visitors.
Abstract: The mountain road slope failures triggered by
earthquake activities and torrential rain namely to create the disaster.
Province Road No. 24 is a main route to the Wutai Township. The area
of the study is located at the mileages between 46K and 47K along the
road. However, the road has been suffered frequent damages as a result
of landslide and slope failures during typhoon seasons. An
understanding of the sliding behaviors in the area appears to be
necessary. Slope failures triggered by earthquake activities and heavy
rainfalls occur frequently. The study is to understand the mechanism
of slope failures and to look for the way to deal with the situation. In
order to achieve these objectives, this paper is based on theoretical and
structural geology data interpretation program to assess the potential
slope sliding behavior. The study showed an intimate relationship
between the landslide behavior of the slopes and the stratum materials,
based on structural geology analysis method to analysis slope stability
and finds the slope safety coefficient to predict the sites of destroyed
layer. According to the case study and parameter analyses results, the
slope mainly slips direction compared to the site located in the
southeast area. Find rainfall to result in the rise of groundwater level is
main reason of the landslide mechanism. Future need to set up
effective horizontal drain at corrective location, that can effective
restrain mountain road slope failures and increase stability of slope.
Abstract: In this paper, mathematical modeling of detonation in the ground is studied. Estimation of flow parameters such as velocity, maximum velocity, acceleration, maximum acceleration, shock pressure as a result of an explosion in the ground have been computed in an appropriate dynamic model approach. The variation of these parameters with the diameter of detonation place (L), density of earth or stone (¤ü), time decay of detonation (T), peak pressure (Pm), and time (t) have been analyzed. The model has been developed from the concept of underwater explosions [Refs. [1]-[3]] with appropriate changes to the present model requirements.
Abstract: The requirements analysis, modeling, and simulation have consistently been one of the main challenges during the development of complex systems. The scenarios and the state machines are two successful models to describe the behavior of an interactive system. The scenarios represent examples of system execution in the form of sequences of messages exchanged between objects and are a partial view of the system. In contrast, state machines can represent the overall system behavior. The automation of processing scenarios in the state machines provide some answers to various problems such as system behavior validation and scenarios consistency checking. In this paper, we propose a method for translating scenarios in state machines represented by Discreet EVent Specification and procedure to detect implied scenarios. Each induced DEVS model represents the behavior of an object of the system. The global system behavior is described by coupling the atomic DEVS models and validated through simulation. We improve the validation process with integrating formal methods to eliminate logical inconsistencies in the global model. For that end, we use the Z notation.
Abstract: The Expert Witness Testimony in the Battered
Woman Syndrome Expert witness testimony (EWT) is a kind of
information given by an expert specialized in the field (here in BWS)
to the jury in order to help the court better understand the case. EWT
does not always work in favor of the battered women. Two main
decision-making models are discussed in the paper: the Mathematical
model and the Explanation model. In the first model, the jurors
calculate ″the importance and strength of each piece of evidence″
whereas in the second model they try to integrate the EWT with the
evidence and create a coherent story that would describe the crime.
The jury often misunderstands and misjudges battered women for
their action (or in this case inaction). They assume that these women
are masochists and accept being mistreated for if a man abuses a
woman constantly, she should and could divorce him or simply leave
at any time. The research in the domain found that indeed, expert
witness testimony has a powerful influence on juror’s decisions thus
its quality needs to be further explored. One of the important factors
that need further studies is a bias called the dispositionist worldview
(a belief that what happens to people is of their own doing). This
kind of attributional bias represents a tendency to think that a
person’s behavior is due to his or her disposition, even when the
behavior is clearly attributed to the situation. Hypothesis The
hypothesis of this paper is that if a juror has a dispositionist
worldview then he or she will blame the rape victim for triggering the
assault. The juror would therefore commit the fundamental
attribution error and believe that the victim’s disposition caused the
rape and not the situation she was in. Methods The subjects in the
study were 500 randomly sampled undergraduate students from
McGill, Concordia, Université de Montréal and UQAM.
Dispositional Worldview was scored on the Dispositionist
Worldview Questionnaire. After reading the Rape Scenarios, each
student was asked to play the role of a juror and answer a
questionnaire consisting of 7 questions about the responsibility,
causality and fault of the victim. Results The results confirm the
hypothesis which states that if a juror has a dispositionist worldview
then he or she will blame the rape victim for triggering the assault.
By doing so, the juror commits the fundamental attribution error
because he will believe that the victim’s disposition, and not the
constraints or opportunities of the situation, caused the rape scenario.
Abstract: Orthogonal frequency division multiplexing (OFDM)
has developed into a popular scheme for wideband digital
communications used in consumer applications such as digital broadcasting, wireless networking and broadband internet access. In
the OFDM system, carrier frequency offset (CFO) causes intercarrier
interference (ICI) which significantly degrades the system error performance. In this paper we provide an exact evaluation method for error performance analysis of arbitrary 2-D modulation OFDM systems with CFO, and analyze the effect of CFO on error performance.
Abstract: This paper proposes a novel architecture for At-
Home medical care which enables senior citizens, patients
with chronic ailments and patients requiring post- operative
care to be remotely monitored in the comfort of their homes.
This architecture is implemented using sensors and wireless
networking for transmitting patient data to the hospitals,
health- care centers for monitoring by medical professionals.
Patients are equipped with sensors to measure their
physiological parameters, like blood pressure, pulse rate etc.
and a Wearable Data Acquisition Unit is used to transmit the
patient sensor data. Medical professionals can be alerted to
any abnormal variations in these values for diagnosis and
suitable treatment. Security threats and challenges inherent to
wireless communication and sensor network have been
discussed and a security mechanism to ensure data
confidentiality and source authentication has been proposed.
Symmetric key algorithm AES has been used for encrypting
the data and a patent-free, two-pass block cipher mode CCFB
has been used for implementing semantic security.
Abstract: In order to protect original data, watermarking is first consideration direction for digital information copyright. In addition, to achieve high quality image, the algorithm maybe can not run on embedded system because the computation is very complexity. However, almost nowadays algorithms need to build on consumer production because integrator circuit has a huge progress and cheap price. In this paper, we propose a novel algorithm which efficient inserts watermarking on digital image and very easy to implement on digital signal processor. In further, we select a general and cheap digital signal processor which is made by analog device company to fit consumer application. The experimental results show that the image quality by watermarking insertion can achieve 46 dB can be accepted in human vision and can real-time execute on digital signal processor.
Abstract: Reinforced concrete stair slabs with mid landings i.e.
Dog-legged shaped are conventionally designed as per specifications
of standard codes of practices which guide about the effective span
according to the varying support conditions. Presently, the behavior
of such slabs has been investigated using Finite Element method. A
single flight stair slab with landings on both sides and supported at
ends on wall, and a multi flight stair slab with landings and six
different support arrangements have been analyzed. The results
obtained for stresses, strains and deflections are used to describe the
behavior of such stair slabs, including locations of critical moments
and deflections. Values of critical moments obtained by F.E. analysis
have also have been compared with that obtained from conventional
analysis. Analytical results show that the moments are also critical
near the kinks i.e. junction of mid-landing and inclined waist slab.
This change in the behavior of dog-legged stair slab may be due to
continuity of the material in transverse direction in two landings
adjoining the waist slab, hence additional stiffness achieved. This
change in the behavior is generally not taken care of in conventional
method of design.
Abstract: The purposes of this research were 1) to investigate
behavior of media exposure and participation in environmental
activities of King Mongkut-s University of Technology Thonburi
(KMUTT) dormitory students, 2) to compare the correlation between
faculties and participation in environmental activities of KMUTT
dormitory students, and 3) to compare the correlation between media
exposure and participation in environmental activities of KMUTT
dormitory students. The tool used for collecting data was
questionnaire. The research findings revealed that dormitory students
were mostly exposed to the environmental media via public relations
boards for general media and KMUTT dormitory media. Dormitory
students were daily exposed to media via websites on the internet and
weekly for other media. Dormitory students participation in the
environmental activities was at high level (x = 3.65) on an
individual basis and was at medium level (x = 2.76) on a collective
basis. Faculties did not correlate with the participation in
environmental activities of dormitory students at the .01 statistical
level and media exposure via various media correlated with
participation in environmental activities of dormitory students at the
.01 statistical level.
Abstract: Unlike general-purpose processors, digital signal
processors (DSP processors) are strongly application-dependent. To
meet the needs for diverse applications, a wide variety of DSP
processors based on different architectures ranging from the
traditional to VLIW have been introduced to the market over the
years. The functionality, performance, and cost of these processors
vary over a wide range. In order to select a processor that meets the
design criteria for an application, processor performance is usually
the major concern for digital signal processing (DSP) application
developers. Performance data are also essential for the designers of
DSP processors to improve their design. Consequently, several DSP
performance benchmarks have been proposed over the past decade or
so. However, none of these benchmarks seem to have included recent
new DSP applications.
In this paper, we use a new benchmark that we recently developed
to compare the performance of popular DSP processors from Texas
Instruments and StarCore. The new benchmark is based on the
Selectable Mode Vocoder (SMV), a speech-coding program from the
recent third generation (3G) wireless voice applications. All
benchmark kernels are compiled by the compilers of the respective
DSP processors and run on their simulators. Weighted arithmetic
mean of clock cycles and arithmetic mean of code size are used to
compare the performance of five DSP processors.
In addition, we studied how the performance of a processor is
affected by code structure, features of processor architecture and
optimization of compiler. The extensive experimental data gathered,
analyzed, and presented in this paper should be helpful for DSP
processor and compiler designers to meet their specific design goals.
Abstract: The purpose of this study was to survey the effect of
organizational communication system on the conflict in physical
education offices of Isfahan province. The research methodology of
this research was a descriptive study. All employees working in
physical education offices of Isfahan province were included in the
sample for this study (N= 236). Researcher made questionnaire and
demographic questionnaire were used as investigation instruments.
Based on the result of chi square test, there is significant difference
between organizational communication system and interpersonal
conflict. The most of participants evaluate communication in an
informal way and pointed out that the communication channels were
not open. Based on the result of binomial test, interpersonal conflict
exists in physical education offices of Isfahan.
Abstract: In the present paper, we-ll explore how social media tools provide an opportunity for new developments of the e-Learning in the context of managing personal knowledge. There will be a discussion how social media tools provide a possibility for helping knowledge workersand students to gather, organize and manage their personal information as a part of the e-learning process. At the centre of this social software driven approach to e-learning environments are the challenges of personalization and collaboration. We-ll share concepts of how organizations are using social media for e-Learning and believe that integration of these tools into traditional e-Learning is probably not a choice, but inevitability. Students- Survey of use of web technologies and social networking tools is presented. Newly developed framework for semantic blogging capable of organizing results relevant to user requirements is implemented at Varna Free University (VFU) to provide more effective navigation and search.
Abstract: The purpose of this study was to explore the
relationship between knowledge sharing and innovation capability,
by examining the influence of individual, organizational and
technological factors on knowledge sharing. The research is based
on a survey of 103 employees from different organizations in the
United Arab Emirates. The study is based on a model and a
questionnaire that was previously tested by Lin [1]. Thus, the study
aims at examining the validity of that model in UAE context. The
results of the research show varying degrees of correlation between
the different variables, with ICT use having the strongest relationship
with the innovation capabilities of organizations. The study also
revealed little evidence of knowledge collecting and knowledge
sharing among UAE employees.
Abstract: This paper presents an exploration into the structure of the corporate governance network and interlocking directorates in the Czech Republic. First a literature overview and a basic terminology of the network theory is presented. Further in the text, statistics and other calculations relevant to corporate governance networks are presented. For this purpose an empirical data set consisting of 2 906 joint stock companies in the Czech Republic was examined. Industries with the highest average number of interlocks per company were healthcare, and energy and utilities. There is no observable link between the financial performance of the company and the number of its interlocks. Also interlocks with financial companies are very rare.
Abstract: Eye localization is necessary for face recognition and
related application areas. Most of eye localization algorithms reported
so far still need to be improved about precision and computational
time for successful applications. In this paper, we propose an eye
location method based on multi-scale Gabor feature vectors, which is
more robust with respect to initial points. The eye localization based
on Gabor feature vectors first needs to constructs an Eye Model Bunch
for each eye (left or right eye) which consists of n Gabor jets and
average eye coordinates of each eyes obtained from n model face
images, and then tries to localize eyes in an incoming face image by
utilizing the fact that the true eye coordinates is most likely to be very
close to the position where the Gabor jet will have the best Gabor jet
similarity matching with a Gabor jet in the Eye Model Bunch. Similar
ideas have been already proposed in such as EBGM (Elastic Bunch
Graph Matching). However, the method used in EBGM is known to be
not robust with respect to initial values and may need extensive search
range for achieving the required performance, but extensive search
ranges will cause much more computational burden. In this paper, we
propose a multi-scale approach with a little increased computational
burden where one first tries to localize eyes based on Gabor feature
vectors in a coarse face image obtained from down sampling of the
original face image, and then localize eyes based on Gabor feature
vectors in the original resolution face image by using the eye
coordinates localized in the coarse scaled image as initial points.
Several experiments and comparisons with other eye localization
methods reported in the other papers show the efficiency of our
proposed method.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: Nowadays Multilevel inverters are widely using in various applications. Modulation strategy at fundamental switching frequency like, SHEPWM is prominent technique to eliminate lower order of harmonics with less switching losses and better harmonic profile. The equations which are formed by SHE are highly nonlinear transcendental in nature, there may exist single, multiple or even no solutions for a particular MI. However, some loads such as electrical drives, it is required to operate in whole range of MI. In order to solve SHE equations for whole range of MI, intelligent techniques are well suited to solve equations so as to produce lest %THDV. Hence, this paper uses Continuous genetic algorithm for minimising harmonics. This paper also presents wavelet based analysis of harmonics. The developed algorithm is simulated and %THD from FFT analysis and Wavelet analysis are compared. MATLAB programming environment and SIMULINK models are used whenever necessary.
Abstract: Quantitative characterization of nonlinear directional
couplings between stochastic oscillators from data is considered. We
suggest coupling characteristics readily interpreted from a physical
viewpoint and their estimators. An expression for a statistical
significance level is derived analytically that allows reliable coupling
detection from a relatively short time series. Performance of the
technique is demonstrated in numerical experiments.
Abstract: The purpose of the current study is to gain insight into the relative role of professional self-image (PSI) for service providers among leader-member exchange (LMX), career success. Lack of studies demonstrated that PSI of service providers affect on their CS. So, it is necessary to, according to service providers- perspective, explore the relationship among LMX and CS in hospitality industry. The result of the current study can suggest strategic directions for hospitality practitioners in terms of constructing LMX relationship, so as to make service providers realize and build their PSI, and to promote their CS. Implications of these findings for hospitality implementations as well as future research directions are subsequently discussed.