Abstract: Traditional Javanese classic dance is a valuable
inheritance in Java Indonesia. Nowadays, this treasure of culture is
no longer belonging to Javanese people only. Many art departments
from universities around the world already put this as a subject in
their curriculum. Nonetheless, dance is a practical skill. It needs to be
practices so often while accompanied by an instructor to get the right
technique. An interactive Computer Aided Instruction (iCAI) that can
interactively assist the student to practice is developed. By using this
software students can conduct a self practice in studio and get some
feedbacks from the software. This CAI is not intended to replace the
instructor, but to assist them in increasing the student fly-time in
practice.
Abstract: All-to-all personalized communication, also known as complete exchange, is one of the most dense communication patterns in parallel computing. In this paper, we propose new indirect algorithms for complete exchange on all-port ring and torus. The new algorithms fully utilize all communication links and transmit messages along shortest paths to completely achieve the theoretical lower bounds on message transmission, which have not be achieved among other existing indirect algorithms. For 2D r × c ( r % c ) all-port torus, the algorithm has time complexities of optimal transmission cost and O(c) message startup cost. In addition, the proposed algorithms accommodate non-power-of-two tori where the number of nodes in each dimension needs not be power-of-two or square. Finally, the algorithms are conceptually simple and symmetrical for every message and every node so that they can be easily implemented and achieve the optimum in practice.
Abstract: The problem of lot sizing, sequencing and scheduling
multiple products in flow line production systems has been studied
by several authors. Almost all of the researches in this area assumed
that setup times and costs are sequence –independent even though
sequence dependent setups are common in practice. In this paper we
present a new mixed integer non linear program (MINLP) and a
heuristic method to solve the problem in sequence dependent case.
Furthermore, a genetic algorithm has been developed which applies
this constructive heuristic to generate initial population. These two
proposed solution methods are compared on randomly generated
problems. Computational results show a clear superiority of our
proposed GA for majority of the test problems.
Abstract: The protection issues in distribution systems with open and closed-loop are studied, and a generalized protection setting scheme based on the traditional over current protection theories is proposed to meet the new requirements. The setting method is expected to be easier realized using computer program, so that the on-line adaptive setting for coordination in distribution system can be implemented. An automatic setting program is created and several cases are taken into practice. The setting results are verified by the coordination curves of the protective devices which are plotted using MATLAB.
Abstract: The search for factors that influence user behavior has remained an important theme for both the academic and practitioner Information Systems Communities. In this paper we examine relevant user behaviors in the phase after adoption and investigate two factors that are expected to influence such behaviors, namely User Involvement (UI) and Personal Innovativeness in IT (PIIT). We conduct a field study to examine how these factors influence postadoption behavior and how they are interrelated. Building on theoretical premises and prior empirical findings, we propose and test two alternative models of the relationship between these factors. Our results reveal that the best explanation of post-adoption behavior is provided by the model where UI and PIIT independently influence post-adoption behavior. Our findings have important implications for research and practice. To that end, we offer directions for future research.
Abstract: Nowadays e-Learning is more popular, in Vietnam
especially. In e-learning, materials for studying are very important.
It is necessary to design the knowledge base systems and expert
systems which support for searching, querying, solving of
problems. The ontology, which was called Computational Object
Knowledge Base Ontology (COB-ONT), is a useful tool for
designing knowledge base systems in practice. In this paper, a
design method for knowledge base systems in education using
COKB-ONT will be presented. We also present the design of a
knowledge base system that supports studying knowledge and
solving problems in higher mathematics.
Abstract: The main objective of this paper is to provide an efficient tool for delineating brain tumors in three-dimensional magnetic resonance images. To achieve this goal, we use basically a level-sets approach to delineating three-dimensional brain tumors. Then we introduce a compression plan of 3D brain structures based for the meshes simplification, adapted for time to the specific needs of the telemedicine and to the capacities restricted by network communication. We present here the main stages of our system, and preliminary results which are very encouraging for clinical practice.
Abstract: Transnational corporations (TNCs) are playing a major role in global R&D, not only through activities in their home countries but also increasingly abroad. However, the process of R&D offshoring is not yet discussed thoroughly. Based on in-depth case study on Agilent China Communications Operation, this paper presents a stage model for theorizing the R&D offshoring process. This stage model outlines 5 maturity levels of organization and the offshoring process: Subsidiary team, Mirror team, Independent team, Mirror sector and the Independent sector (from software engineering point of view, it is similar to the local team's capability level of maturity model). Moreover, the paper gives a detailed discussion on the relevant characteristics, as well as the ability/responsibility of transfer, priorities and the corresponding organization structure. It also gives the characteristics and key points of different level-s R&D offshoring implementation using actual team practice.
Abstract: This paper demonstrates a model of an e-Learning
system based on nowadays learning theory and distant education
practice. The relationships in the model are designed to be simple
and functional and do not necessarily represent any particular e-
Learning environments. It is meant to be a generic e-Learning
system model with implications for any distant education course
instructional design. It allows online instructors to move away from
the discrepancy between the courses and body of knowledge. The
interrelationships of four primary sectors that are at the e-Learning
system are presented in this paper. This integrated model includes
[1] pedagogy, [2] technology, [3] teaching, and [4] learning. There
are interactions within each of these sectors depicted by system loop
map.
Abstract: In the upgrade process of enterprise information
systems, whether new systems will be success and their development
will be efficient, depends on how to deal with and utilize those legacy systems. We propose an evaluation system, which comprehensively
describes the capacity of legacy information systems in five aspects.
Then a practical legacy systems evaluation method is scripted. Base on
the evaluation result, we put forward 4 kinds of migration strategy: eliminated, maintenance, modification, encapsulating. The methods
and strategies play important roles in practice.
Abstract: This paper discusses the issue of tribal development,
displacement, rehabilitation and resettlement policies, and
implementation in the agency (scheduled / tribal) areas of the West
Godavari District, Andhra Pradesh State, India. This study is based
on action anthropological approach, conducted among the displaced
tribal communities i.e. Konda Reddis and Nayakapods of this region,
under the 'Kovvada Reservoir' Project. These groups are
traditionally shifting cultivators and popularly known as the
Primitive Tribal Groups (PTGs) in the government records. This
paper also focuses on the issues of tribal displacement and land
alienation due to construction of the Kovvada reservoir, without
proper rehabilitation and resettlement, although there are well
defined guidelines, procedures and norms for the rehabilitation of
Project Affected Persons (PAPs). It is necessary to begin with, to
provide an overview of the issues in tribal development and policies
related to displacement and rehabilitation in the Indian context as a
background to the Kovvada Reservoir Project, the subject of this
study.
Abstract: Content-Based Image Retrieval (CBIR) has been
one on the most vivid research areas in the field of computer vision
over the last 10 years. Many programs and tools have been
developed to formulate and execute queries based on the visual or
audio content and to help browsing large multimedia repositories.
Still, no general breakthrough has been achieved with respect to
large varied databases with documents of difering sorts and with
varying characteristics. Answers to many questions with respect to
speed, semantic descriptors or objective image interpretations are
still unanswered. In the medical field, images, and especially
digital images, are produced in ever increasing quantities and used
for diagnostics and therapy. In several articles, content based
access to medical images for supporting clinical decision making
has been proposed that would ease the management of clinical data
and scenarios for the integration of content-based access methods
into Picture Archiving and Communication Systems (PACS) have
been created. This paper gives an overview of soft computing
techniques. New research directions are being defined that can
prove to be useful. Still, there are very few systems that seem to be
used in clinical practice. It needs to be stated as well that the goal
is not, in general, to replace text based retrieval methods as they
exist at the moment.
Abstract: As a by-product of its "cyberspace" status, electronic
commerce is global, encompassing a whole range of B2C
relationships which need to be approached with solutions provided at
a local level while remaining viable when applied to global issues.
Today, the European Union seems to be endowed with a reliable
legal framework for consumer protection. A question which remains,
however, is enforcement of this protection. This is probably a matter
of time and awareness from both parties in the B2C relationship.
Business should realize that enhancing trust in the minds of
consumers is more than a question of technology; it is a question of
best practice. Best practice starts with the online service of high
street banks as well as with the existence of a secure, user-friendly
and cost-effective payment system. It also includes the respect of
privacy and the use of smart cards as well as enhancing privacy
technologies and fair information practice. In sum, only by offering
this guarantee of privacy and security will the consumer be assured
that, in cyberspace, his/her interests will be protected in the same
manner as in a traditional commercial environment.
Abstract: As increasing importance of symbiosis and cooperation among mobile communication industries, the mobile ecosystem has been especially highlighted in academia and practice. The structure of mobile ecosystem is quite complex and the ecological role of actors is important to understand that structure. In this respect, this study aims to explore structure of mobile ecosystem in the case of Korea using inter-industry network analysis. Then, the ecological roles in mobile ecosystem are identified using centrality measures as a result of network analysis: degree of centrality, closeness, and betweenness. The result shows that the manufacturing and service industries are separate. Also, the ecological roles of some actors are identified based on the characteristics of ecological terms: keystone, niche, and dominator. Based on the result of this paper, we expect that the policy makers can formulate the future of mobile industry and healthier mobile ecosystem can be constructed.
Abstract: Rapid steps made in the field of Information and Communication Technology (ICT) has facilitated the development of teaching and learning methods and prepared them to serve the needs of an assorted educational institution. In other words, the information age has redefined the fundamentals and transformed the institutions and method of services delivery forever. The vision is the articulation of a desire to transform the method of teaching and learning could proceed through e-learning. E-learning is commonly deliberated to use of networked information and communications technology in teaching and learning practice. This paper deals the general aspects of the e-leaning with its issues, developments, opportunities and challenges, which can the higher institutions own.
Abstract: Collaborative networked learning (hereafter CNL)
was first proposed by Charles Findley in his work “Collaborative
networked learning: online facilitation and software support" as part
of instructional learning for the future of the knowledge worker. His
premise was that through electronic dialogue learners and experts
could interactively communicate within a contextual framework to
resolve problems, and/or to improve product or process knowledge.
Collaborative learning has always been the forefront of educational
technology and pedagogical research, but not in the mainstream of
operations management. As a result, there is a large disparity in the
study of CNL, and little is known about the antecedents of network
collaboration and sharing of information among diverse employees in
the manufacturing environment. This paper presents a model to
bridge the gap between theory and practice. The objective is that
manufacturing organizations will be able to accelerate organizational
learning and sharing of information through various collaborative
Abstract: Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize zone partitioning to establish distinct key infrastructure under Certificate Authority (CA) supervision in different regions. Secure anonymous broadcasting (SAB) is one of these protocols that preserves most of security aspects but it has some deficiencies in practice. A very important issue is region change of a vehicle for its mobility. Changing regions leads to change of CA and necessity of having new key set to resume communication. In this paper, we propose solutions for informing vehicles about region change to obtain new key set before entering next region. This hinders attackers- intrusion, packet loss and lessons time delay. We also make key request messages secure by confirming old CA-s public key to the message, hence stronger security for safety message broadcasting is attained.
Abstract: The paper is included within the framework of a
complex research program, which was initiated from the hypothesis
arguing on the existence of a correlation between pineal indolic and
peptide hormones and the somatic development rhythm, including
thus the epithalamium-epiphysis complex involvement. At birds,
pineal gland contains a circadian oscillator, playing a main role in the
temporal organization of the cerebral functions. The secretion of
pineal indolic hormones is characterized by a high endogenous
rhythmic alternation, modulated by the light/darkness (L/D)
succession and by temperature as well. The research has been carried
out using 100 chicken broilers - “Ross" commercial hybrid,
randomly allocated in two experimental batches: Lc batch, reared
under a 12L/12D lighting schedule and Lexp batch, which was photic
pinealectomised through continuous exposition to light (150 lux, 24
hours, 56 days). Chemical and physical features of the meat issued
from breast fillet and thighs muscles have been studied, determining
the dry matter, proteins, fat, collagen, salt content and pH value, as
well. Besides the variations of meat chemical composition in relation
with lighting schedule, other parameters have been studied: live
weight dynamics, feed intake and somatic development degree. The
achieved results became significant since chickens have 7 days of
age, some variations of the studied parameters being registered,
revealing that the pineal gland physiologic activity, in relation with
the lighting schedule, could be interpreted through the monitoring of
the somatic development technological parameters, usually studied
within the chicken broilers rearing aviculture practice.
Abstract: Optical 1x12 fused-taper-twisted polymer optical fiber (POF) couplers has been fabricated by a perform technique. Characterization of the coupler which proposed to be used in passive night vision application to tracking a blind sport area was reported. During the development process of fused-taper-twisted POF couplers was carried out, red LED fully utilized to be injected into the couplers to test the quality of fabricated couplers. Some characterization parameters, such as optical output power, POFs attenuation characteristics and power losses on the network were observed. The maximum output power efficiency of the coupler is about 40%, but it can be improved gradually through experience and practice.
Abstract: Conflicts identification among non-functional requirements is often identified intuitively which impairs conflict analysis practices. This paper proposes a new model to identify conflicts among non-functional requirements. The proposed model uses the matrix mechanism to identify the quality based conflicts among non-functional requirements. The potential conflicts are identified through the mapping of low level conflicting quality attributes to low level functionalities using the matrices. The proposed model achieves the identification of conflicts among product and process requirements, identifies false conflicts, decreases the documentation overhead, and maintains transparency of identified conflicts. The attributes are not concomitantly taken into account by current models in practice.