{"title":"An Empirical Study on the Antecedents of Socially Responsible Consumption Behavior","authors":"Chia-Ju Lu","doi":"10.1109/CISIS.2013.118","DOIUrl":"https://doi.org/10.1109/CISIS.2013.118","url":null,"abstract":"Recently, several firms are award of the importance of reflecting consumers' attitudes towards the society in developing their marketing strategies. Socially responsible consumption (SRC) can promote social and ecological causes consumers deem important. Based on the SRC behaviors in both ecological and societal concerns, the present study will apply the model of value-attitude/belief-behavior hierarchy (Homer and Kahle, 1988, Kim and Choi, 2005) to identify key antecedents of socially responsible consumption behavior.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125808009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds: Pattern Data Structure","authors":"Zhe Wang","doi":"10.1109/CISIS.2013.86","DOIUrl":"https://doi.org/10.1109/CISIS.2013.86","url":null,"abstract":"Evolution pattern will be defined as an Xml Schema document, the generation of pattern aspect is the process of generating xml instance from its related Xml Schema definition document. The process can be iterative until all the evolution requirement carried by the specific evolution feature has been realized by each evolution pattern aspect (Model Driven Architecture).","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nishimura, Tsuneo Kagawa, Hiroaki Nishino, K. Utsumiya
{"title":"A Document Browser Based on a Book-Style Interface with Augmented Reality","authors":"M. Nishimura, Tsuneo Kagawa, Hiroaki Nishino, K. Utsumiya","doi":"10.1109/CISIS.2013.133","DOIUrl":"https://doi.org/10.1109/CISIS.2013.133","url":null,"abstract":"We propose a document browsing method based on a book-style interface usable in a normal office environment. Augmented reality (AR) technology is applied to realize an easy-to-use interface. In the proposed method, documents and multi-media contents are projected on a real booklet including an AR marker printed on each page. Users can feel that they are reading a book consisting of document files, presentation files, movies, and images. Furthermore, we utilize the motion sensor Kinect to recognize the users' gestures. The detected gestures can be used to activate some functions such as picking a page up and placing it in a real work space. In this paper, we describe the proposed book-style interface, its implementation method, and evaluate and discuss the effectiveness of the proposed method.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Modularity Metrics to Assist Move Method Refactoring of Large Systems","authors":"Christian Napoli, G. Pappalardo, E. Tramontana","doi":"10.1109/CISIS.2013.96","DOIUrl":"https://doi.org/10.1109/CISIS.2013.96","url":null,"abstract":"For large software systems, refactoring activities can be a challenging task, since for keeping component complexity under control the overall architecture as well as many details of each component have to be considered. Product metrics are therefore often used to quantify several parameters related to the modularity of a software system. This paper devises an approach for automatically suggesting refactoring opportunities on large software systems. We show that by assessing metrics for all components, move methods refactoring can be suggested in such a way to improve modularity of several components at once, without hindering any other. However, computing metrics for large software systems, comprising thousands of classes or more, can be a time consuming task when performed on a single CPU. For this, we propose a solution that computes metrics by resorting to GPU, hence greatly shortening computation time. Thanks to our approach precise knowledge on several properties of the system can be continuously gathered while the system evolves, hence assisting developers to quickly assess several solutions for reducing modularity issues.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116403135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Total Adaptive Power Allocation for Physical Layer Network Coding in Wireless Networks","authors":"Yung-Fa Huang, Tan-Hsu Tan, Shi-Yan Peng, Chia-Hsin Cheng","doi":"10.1109/CISIS.2013.58","DOIUrl":"https://doi.org/10.1109/CISIS.2013.58","url":null,"abstract":"In linear networks with physical layer network coding (PNC), the relay node performs the combination of the relaying data from both end users. Moreover, the adaptive power allocation (APA) scheme can optimize the transmission rate of PNC for relaying communication systems. However, when the relay nodes are deployed with different distance to both of end user nodes, it is called near-far effect (NFE). The NFE degrades the bit error rate (BER) performance with deteriorating the decoding performance of PNC. Therefore, in order to further optimize the transmission power allocation (PA) for both of end user nodes and relaying node we propose a total adaptive power allocation (TAPA) scheme in this paper. With the proposed TAPA scheme, the NFE of conventional PNC systems can be diminished and the BER performance is improved. Simulation results show that the proposed TAPA improves the BER performance especially for the severe NFE environments.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"95-98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Four-Layers Hierarchical Clustering Topology Architecture with Sleep Mode in a Wireless Sensor Network","authors":"Young-Long Chen, Yi-Nung Shih, Jia-Sheng Lin","doi":"10.1109/CISIS.2013.61","DOIUrl":"https://doi.org/10.1109/CISIS.2013.61","url":null,"abstract":"In this paper, our proposed architecture involve new four-layer clustering topology architecture based on LEACH architecture. We propose four-layer clustering topology architecture: the Random Cluster Head and Maximum Energy Sub-cluster Head with Relay node and Sleep mode (RCHMESHR-S) architecture, the aim is to improve energy efficiency and extend the lifetime of wireless sensor networks. The RCHMESHR-S architecture considers the residual energy of wireless sensor nodes when selecting the sub-cluster head and relay node, in order to increase the energy efficiency of a wireless sensor network. Furthermore, the RCHMESHR-S architecture uses correlations among sensor data within wireless sensor nodes to develop a sleep mode that can effectively reduce energy consumption. Simulation results show that the performances of our proposed RCHMESHR-S architecture is better than that of the LEACH architecture in terms of initial node death and the number of nodes alive.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marco Gaudina, Victor Zappi, E. Bellanti, G. Vercelli
{"title":"eLaparo4D: A Step Towards a Physical Training Space for Virtual Video Laparoscopic Surgery","authors":"Marco Gaudina, Victor Zappi, E. Bellanti, G. Vercelli","doi":"10.1109/CISIS.2013.110","DOIUrl":"https://doi.org/10.1109/CISIS.2013.110","url":null,"abstract":"The paper presents the preliminary implementation of eLaparo4D, an immersive training space designed for videolaparoscopic surgery. This is a low-cost training space which integrates haptic devices with realistic surgery tools and 3D rendering with physically deformable 3D CG models of the human internal organs. The main objective of the eLaparo4D first prototype is to design effective training exercises for medicine students within a realistic scenario of a videolaparoscopic operating room. The simulator is based on a client/server layered architecture in order to act as a sort of data gateway: the hardware is interfaced with the physics 3D engine to obtain real-time performances, with an HTML5-based 3D output visual interface in order to integrate the tracking of operating sessions within a custom training platform.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I-Hsuan Peng, Meng-Hsien Lin, Yen-Wen Chen, Fong-Ming Yang, A. S. Sue
{"title":"Improvement of Streaming Video in Differential Service Networks by Using Opportunity RED Mechanism","authors":"I-Hsuan Peng, Meng-Hsien Lin, Yen-Wen Chen, Fong-Ming Yang, A. S. Sue","doi":"10.1109/CISIS.2013.116","DOIUrl":"https://doi.org/10.1109/CISIS.2013.116","url":null,"abstract":"The video streaming service is one of the emerging services for network users. The network conveys various kinds of traffic to the users and different traffic classes always have different quality requirements. Therefore, it is a critical issue to allocate suitable network resource to suitable traffic class for better service quality provisioning and resource utilization. This paper considers the characteristics of video frames to forward the video packet in an efficient way. The proposed scheme properly utilizes the unused bits of the differential service (DS) field of the IP header to provide some heuristic information for packet early discarding. Thus, by using the opportunity random early dropping (RED) concept, the proposed packet correlated RED (PCRED) scheme refers the heuristic information to selectively drop useless packet that is not helpful for the improvement of receiving quality for better buffer and bandwidth utilization. Exhaustive simulations were conducted to compare the performance of the proposed scheme with the RED with in/out (RIO) and weighted RED (WRED) schemes. The simulation results show that the proposed scheme is superior to the other schemes for video streaming services.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group-Based Control Method for Machine Type Communications in LTE System","authors":"Feng-Ming Yang, Chun-Yen Hsu, Wen-Chien Hung","doi":"10.1109/CISIS.2013.51","DOIUrl":"https://doi.org/10.1109/CISIS.2013.51","url":null,"abstract":"Machine Type Communication (MTC) devices perform the attach procedure without bit rate limitations, congestion arise at the core network. To prevent such congestion, Long Term Evolution (LTE) takes advantages of the group-based policing to regulate the maximum bit rate of all traffic generated by a group of MTC devices. But previous researches on Access Point Name-Aggregate Maximum Bit Rate (APN-AMBR) based on group-based policing are relatively limited. This study proposes a multi-stage control mechanism, called MSC, to process the operations of maximum bit rate allocation based on resource utilization information. Simulation results indicate that MSC mechanism achieved a higher overall throughput for all MTC devices. For the purpose of performance evaluation, a M/G/k/k Markov chain was used to analyze the time controlled MTC application in LTE networks. The simulation results revealed that the throughput of MSC is 28% higher than that of the LTE standard model by using the group-based policing.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Intelligent Context-Aware Systems to the Detection of Online Student Cheating","authors":"T. Lancaster","doi":"10.1109/CISIS.2013.94","DOIUrl":"https://doi.org/10.1109/CISIS.2013.94","url":null,"abstract":"Student cheating and plagiarism present a combined threat to the value of academic awards. The technological age has increased the ease with which students can cheat. Although some computerised solutions exist to detect plagiarism and cheating in its other forms, many of these are easily fooled. For other types of cheating, technical solutions are not yet widely available. This suggests that students are receiving awards that they do not deserve. This paper presents three different examples of student cheating, all of which provide academics with a problem. These issues include: (1) plagiarism of documents through automated essay spinning, (2) social media facilitated student cheating groups, and (3) contract cheating using agency and auction web sites. Each of these problems is shown to benefit from the provision of intelligent context-aware systems. The context behind each problem is explored and suggestions for technical implementations of intelligent context-aware systems for each are provided.","PeriodicalId":155467,"journal":{"name":"2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}