{"title":"Price-Service Competition and Cooperation in a Supply Chain Distribution System","authors":"Yu Tian, Yanxue Gong, Shao-chao Sun","doi":"10.1109/IACSIT-SC.2009.76","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.76","url":null,"abstract":"The competition and cooperation issues are jointly addressed in a supply chain distribution system consisting of a supplier and N independent retailers. These retailers face their individual stochastic demand markets, but they compete with each other through price and service two stage operation. The price and service level equilibria are derived respectively in competition and cooperation and compared in case of ceteris paribus assumption. It indicates that competition leads to lower price, while a relative balance point exists between two kinds of competitive intensity. These results provide decision-making reference for firms in competitive markets. Finally, they are validated through some numerical examples and the impact of contract parameters and competitive intensity on equilibria is also included.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116705948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Naji, S. Hameed, M. Islam, B. Zaidan, T. Gunawan, A. Zaidan
{"title":"\"Stego-Analysis Chain, Session Two\" Novel Approach of Stego-Analysis System for Image File","authors":"A. Naji, S. Hameed, M. Islam, B. Zaidan, T. Gunawan, A. Zaidan","doi":"10.1109/IACSIT-SC.2009.104","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.104","url":null,"abstract":"Stenography systems has too many approaches, it has a lot of applications and different ways, too many type of attackers have been tried to attacked the information that already embed in the carrier, however there is not yet a real stego- analysis system offered, the goal of this chain is to have too many investigations on the stego analysis systems, this paper will focus on the image file, the earlier tests showing that we may use the histogram habits to classify the image in to image carried data hidden and original image, the study will focus in to two main idea, the first idea, on the colour image, the colour start become grouping parallel with the increasing of the data hidden and the second feature on the gray level image, the histogram in the original image was pure without colours, after the embedding method has been applied there are many colour start to appears as shown down in the histogram, we will try through this paper to offer a new stego-analysis system though study the habits of the histogram.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovery of Novel Relationship among Single Nucleotide Polymorphisms, Exon Skipping Events, and Tumors","authors":"F. Hsu, Wen Chun Lo","doi":"10.1109/IACSIT-SC.2009.111","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.111","url":null,"abstract":"Expressed sequence tags (ESTs) are single-pass sequence reads from cDNA clones. ESTs usually represent genes expressed in a particular tissue. Single nucleotide polymorphism (SNP) is a very important resource for protein structure and function. It may make a contribution to understand a complex disease, such as tumor. Through analysis of large scale human ESTs, we try to find relationship among SNPs, exon skipping events, and tumors. We found 784 human SNPs are related to exon skipping (ES) events. A total of 395 tumor-specific exon skipping events were found. Our test revealed 38,776 SNPs having an association with tumor.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132012786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Repetitive and Contextual Advertisements on Consumer Behavior: An Exploratory Study","authors":"S. Verma","doi":"10.1109/IACSIT-SC.2009.20","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.20","url":null,"abstract":"Researchers have predicted that advertising has astonishing powers and is often a very effective tool. But sometimes it is not as powerful as it is being thought. There are no concrete evidences that advertising actually works by any strong form of influence or manipulation. Consumers are confronted with a lot of advertisements in their present-day life and hence have developed disinterest and resistance against them. Advertisers are developing strategies that can attract consumers to process ads. In this paper the impact of repetitive and contextual advertisement on the behavior of consumers was explored through primary research. Chi-square test established a relation between contextual advertisements and consumer purchase decision as well as a relation between repetitive advertisements and consumer purchase decision. The Kendall tau-b test result indicated that attention to advertisement, inducement to purchase and continuous patronage is negatively related to repetitive and contextual advertisements. The findings indicate that the typical relationship between advertising exposure and affective response is believed to display an inverted U-shaped pattern, where initial exposures generate increasing familiarity and positive effect, but subsequent exposures eventually lead to wear out and a decrease in positive affect.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124077182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Protocol for Secured Routing in Ad Hoc Networks","authors":"A. Kush, C. Hwang","doi":"10.1109/IACSIT-SC.2009.28","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.28","url":null,"abstract":"A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been observed that different protocols need different strategies for security. The Hashing approach has been adopted in the proposed scheme of this paper. This scheme can make most of the on demand protocols secure. The study will help in making protocols more robust against attacks and standardize parameters for security in routing protocols. The proposed scheme has been evaluated using NS2 and compared with existing scheme. The study will help in making protocol more robust against attacks and standardizing parameters for security in routing protocols.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of Country-of-Origin on Human Resource Strategy of Multinational Companies in Developing Countries","authors":"Ashatu Hussein, Muhajir Kachwamba","doi":"10.1109/IACSIT-SC.2009.65","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.65","url":null,"abstract":"Human resources can be one of the company's sources of competitive advantage if it is managed effectively and efficiently. Taking this into considerations, MNCs are straggling in designing the human resource strategy that helps them to gain competitive advantage in host countries. In a globalized world however, multinational companies (MNCs) are in the complex pressure of finding appropriate balance between global, home country and local practices especially in the area of human resource management due to the fact that cultural contexts differ significantly among nations. According to theories of ethnocentricity, MNCs tend to transplant the dominant business strategic practices of the country of origin into their subsidiaries and apply them wherever they operate. Country-of-origin effect on firm's strategic behavior however, can be mediated by a strong regulatory framework in the host country. On the other side, permissive business environment and policies that characterize developing countries give MNCs a window of opportunity to implement their home country business cultures. However, little is known about the influence of country-of-origin on human resource strategy of MNCs operating in developing countries by considering the permissive business environment and policies that characterize these countries. Thus, this paper provides a conceptual basis for an empirical work in filling out this empirical gap on the influence of country of origin on human resource strategy of MNCs operating in developing countries by taking developing countries context into considerations.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Government Performance Evaluation with Fuzzy Numbers","authors":"M. Fasanghari, F. Habibipour","doi":"10.1109/IACSIT-SC.2009.122","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.122","url":null,"abstract":"E-government is no longer just an option but a necessity for countries aiming for better governance. The e-government performance evaluation is important for the development of e-government. As conventional evaluation models for e-government performance are generally too subjective and inaccurate, this paper proposed a fuzzy TOPSIS method to evaluating the e-government performance.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Video-Based User Interface for People with Disabilities of the Fingers","authors":"H. Higa, T. Dojo, K. Mihara, H. Uehara, V. Asari","doi":"10.1109/IACSIT-SC.2009.74","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.74","url":null,"abstract":"Design of a video-based user interface using image processing for people with disabilities of the fingers, such as rheumatism and osteoarthritis, is implemented in this paper. This user interface is simply composed of a CCD camera and a PC, and allows users to manipulate the PC using small movements of single finger. The finger is appropriately detected in the images from the CCD camera using image processing techniques. Control boxes for pointing and character input functions are also made. To verify the usability of the interface, some tasks such as clicking, dragging, maze, and character input tasks are experimentally performed by a healthy subject. It is clear from the experimental results that he could smoothly perform clicking and dragging actions, and that he could directly input sentences in Microsoft Word without any difficulty.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115401024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolescu Ovidiu, N. Ciprian, Popa Ion, C. Sebastian, Dobrin Cosmin, C. Eduard
{"title":"Innovation in Romanian SMEs and Its Impact on Performance","authors":"Nicolescu Ovidiu, N. Ciprian, Popa Ion, C. Sebastian, Dobrin Cosmin, C. Eduard","doi":"10.1109/IACSIT-SC.2009.134","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.134","url":null,"abstract":"Romania, a New Member state of European Union, has undertaken a complex process to adapt to new conditions and requirements of European market, especially the growing competition of foreign products and services once the commercial barriers had fallen. Romanian SMEs are the one of the most affected area. In order to create a general perspective on small and medium enterprises in Romania, apprehension of the innovative activities developed within these institutions has an essential role. The undertaken research revealed that innovative efforts within SMEs were especially focused on new products, new technologies, new managerial and marketing approaches, renewing the informational system and human resources training1.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Networks Based Diagnosis of Heart Arrhythmias Using Chaotic and Nonlinear Features of HRV Signals","authors":"M. Rouhani, Reza Soleymani","doi":"10.1109/IACSIT-SC.2009.23","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.23","url":null,"abstract":"in this paper, an efficient novel algorithm is presented for classification of the most important heart arrhythmias. By computing Heart Rate Variability (HRV) signal form electrocardiogram (ECG) signals, 14 carefully selected time domain, frequency domain, nonlinear and chaotic features are extracted and used to train MLP neural networks. Before applying those features to neural networks, we reduce the order of feature space by generalized discriminate analysis (GDA). Furthermore, to improve the learning performance of MLP network, training set is filtered by deleting confusing data. This is done by means of a self organized map which categorizes train data set and indicates data which are not representative to be ignored. HRV signal is known to be less sensitive to noise as compared to ECG and has higher chaotic and nonlinear characteristics. 7 arrhythmias (i.e. PVC, AF, CHB, LBBB, NSR, VF, and VT) have been classified with accuracies ranged from 95% to 100% on MIT-BIH dataset.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114649048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}