2009 International Association of Computer Science and Information Technology - Spring Conference最新文献

筛选
英文 中文
Price-Service Competition and Cooperation in a Supply Chain Distribution System 供应链分销系统中的价格-服务竞争与合作
Yu Tian, Yanxue Gong, Shao-chao Sun
{"title":"Price-Service Competition and Cooperation in a Supply Chain Distribution System","authors":"Yu Tian, Yanxue Gong, Shao-chao Sun","doi":"10.1109/IACSIT-SC.2009.76","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.76","url":null,"abstract":"The competition and cooperation issues are jointly addressed in a supply chain distribution system consisting of a supplier and N independent retailers. These retailers face their individual stochastic demand markets, but they compete with each other through price and service two stage operation. The price and service level equilibria are derived respectively in competition and cooperation and compared in case of ceteris paribus assumption. It indicates that competition leads to lower price, while a relative balance point exists between two kinds of competitive intensity. These results provide decision-making reference for firms in competitive markets. Finally, they are validated through some numerical examples and the impact of contract parameters and competitive intensity on equilibria is also included.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116705948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File “隐写分析链,第二节”图像文件隐写分析系统的新方法
A. Naji, S. Hameed, M. Islam, B. Zaidan, T. Gunawan, A. Zaidan
{"title":"\"Stego-Analysis Chain, Session Two\" Novel Approach of Stego-Analysis System for Image File","authors":"A. Naji, S. Hameed, M. Islam, B. Zaidan, T. Gunawan, A. Zaidan","doi":"10.1109/IACSIT-SC.2009.104","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.104","url":null,"abstract":"Stenography systems has too many approaches, it has a lot of applications and different ways, too many type of attackers have been tried to attacked the information that already embed in the carrier, however there is not yet a real stego- analysis system offered, the goal of this chain is to have too many investigations on the stego analysis systems, this paper will focus on the image file, the earlier tests showing that we may use the histogram habits to classify the image in to image carried data hidden and original image, the study will focus in to two main idea, the first idea, on the colour image, the colour start become grouping parallel with the increasing of the data hidden and the second feature on the gray level image, the histogram in the original image was pure without colours, after the embedding method has been applied there are many colour start to appears as shown down in the histogram, we will try through this paper to offer a new stego-analysis system though study the habits of the histogram.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Discovery of Novel Relationship among Single Nucleotide Polymorphisms, Exon Skipping Events, and Tumors 发现单核苷酸多态性、外显子跳跃事件与肿瘤之间的新关系
F. Hsu, Wen Chun Lo
{"title":"Discovery of Novel Relationship among Single Nucleotide Polymorphisms, Exon Skipping Events, and Tumors","authors":"F. Hsu, Wen Chun Lo","doi":"10.1109/IACSIT-SC.2009.111","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.111","url":null,"abstract":"Expressed sequence tags (ESTs) are single-pass sequence reads from cDNA clones. ESTs usually represent genes expressed in a particular tissue. Single nucleotide polymorphism (SNP) is a very important resource for protein structure and function. It may make a contribution to understand a complex disease, such as tumor. Through analysis of large scale human ESTs, we try to find relationship among SNPs, exon skipping events, and tumors. We found 784 human SNPs are related to exon skipping (ES) events. A total of 395 tumor-specific exon skipping events were found. Our test revealed 38,776 SNPs having an association with tumor.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132012786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Repetitive and Contextual Advertisements on Consumer Behavior: An Exploratory Study 重复与情境广告对消费者行为的影响:一项探索性研究
S. Verma
{"title":"Impact of Repetitive and Contextual Advertisements on Consumer Behavior: An Exploratory Study","authors":"S. Verma","doi":"10.1109/IACSIT-SC.2009.20","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.20","url":null,"abstract":"Researchers have predicted that advertising has astonishing powers and is often a very effective tool. But sometimes it is not as powerful as it is being thought. There are no concrete evidences that advertising actually works by any strong form of influence or manipulation. Consumers are confronted with a lot of advertisements in their present-day life and hence have developed disinterest and resistance against them. Advertisers are developing strategies that can attract consumers to process ads. In this paper the impact of repetitive and contextual advertisement on the behavior of consumers was explored through primary research. Chi-square test established a relation between contextual advertisements and consumer purchase decision as well as a relation between repetitive advertisements and consumer purchase decision. The Kendall tau-b test result indicated that attention to advertisement, inducement to purchase and continuous patronage is negatively related to repetitive and contextual advertisements. The findings indicate that the typical relationship between advertising exposure and affective response is believed to display an inverted U-shaped pattern, where initial exposures generate increasing familiarity and positive effect, but subsequent exposures eventually lead to wear out and a decrease in positive affect.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124077182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposed Protocol for Secured Routing in Ad Hoc Networks Ad Hoc网络中安全路由的建议协议
A. Kush, C. Hwang
{"title":"Proposed Protocol for Secured Routing in Ad Hoc Networks","authors":"A. Kush, C. Hwang","doi":"10.1109/IACSIT-SC.2009.28","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.28","url":null,"abstract":"A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been observed that different protocols need different strategies for security. The Hashing approach has been adopted in the proposed scheme of this paper. This scheme can make most of the on demand protocols secure. The study will help in making protocols more robust against attacks and standardize parameters for security in routing protocols. The proposed scheme has been evaluated using NS2 and compared with existing scheme. The study will help in making protocol more robust against attacks and standardizing parameters for security in routing protocols.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Influence of Country-of-Origin on Human Resource Strategy of Multinational Companies in Developing Countries 原产国对发展中国家跨国公司人力资源战略的影响
Ashatu Hussein, Muhajir Kachwamba
{"title":"The Influence of Country-of-Origin on Human Resource Strategy of Multinational Companies in Developing Countries","authors":"Ashatu Hussein, Muhajir Kachwamba","doi":"10.1109/IACSIT-SC.2009.65","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.65","url":null,"abstract":"Human resources can be one of the company's sources of competitive advantage if it is managed effectively and efficiently. Taking this into considerations, MNCs are straggling in designing the human resource strategy that helps them to gain competitive advantage in host countries. In a globalized world however, multinational companies (MNCs) are in the complex pressure of finding appropriate balance between global, home country and local practices especially in the area of human resource management due to the fact that cultural contexts differ significantly among nations. According to theories of ethnocentricity, MNCs tend to transplant the dominant business strategic practices of the country of origin into their subsidiaries and apply them wherever they operate. Country-of-origin effect on firm's strategic behavior however, can be mediated by a strong regulatory framework in the host country. On the other side, permissive business environment and policies that characterize developing countries give MNCs a window of opportunity to implement their home country business cultures. However, little is known about the influence of country-of-origin on human resource strategy of MNCs operating in developing countries by considering the permissive business environment and policies that characterize these countries. Thus, this paper provides a conceptual basis for an empirical work in filling out this empirical gap on the influence of country of origin on human resource strategy of MNCs operating in developing countries by taking developing countries context into considerations.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
E-Government Performance Evaluation with Fuzzy Numbers 基于模糊数的电子政务绩效评价
M. Fasanghari, F. Habibipour
{"title":"E-Government Performance Evaluation with Fuzzy Numbers","authors":"M. Fasanghari, F. Habibipour","doi":"10.1109/IACSIT-SC.2009.122","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.122","url":null,"abstract":"E-government is no longer just an option but a necessity for countries aiming for better governance. The e-government performance evaluation is important for the development of e-government. As conventional evaluation models for e-government performance are generally too subjective and inaccurate, this paper proposed a fuzzy TOPSIS method to evaluating the e-government performance.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Video-Based User Interface for People with Disabilities of the Fingers 为手指残疾人士设计的视频用户界面
H. Higa, T. Dojo, K. Mihara, H. Uehara, V. Asari
{"title":"A Video-Based User Interface for People with Disabilities of the Fingers","authors":"H. Higa, T. Dojo, K. Mihara, H. Uehara, V. Asari","doi":"10.1109/IACSIT-SC.2009.74","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.74","url":null,"abstract":"Design of a video-based user interface using image processing for people with disabilities of the fingers, such as rheumatism and osteoarthritis, is implemented in this paper. This user interface is simply composed of a CCD camera and a PC, and allows users to manipulate the PC using small movements of single finger. The finger is appropriately detected in the images from the CCD camera using image processing techniques. Control boxes for pointing and character input functions are also made. To verify the usability of the interface, some tasks such as clicking, dragging, maze, and character input tasks are experimentally performed by a healthy subject. It is clear from the experimental results that he could smoothly perform clicking and dragging actions, and that he could directly input sentences in Microsoft Word without any difficulty.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115401024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Innovation in Romanian SMEs and Its Impact on Performance 罗马尼亚中小企业的创新及其对绩效的影响
Nicolescu Ovidiu, N. Ciprian, Popa Ion, C. Sebastian, Dobrin Cosmin, C. Eduard
{"title":"Innovation in Romanian SMEs and Its Impact on Performance","authors":"Nicolescu Ovidiu, N. Ciprian, Popa Ion, C. Sebastian, Dobrin Cosmin, C. Eduard","doi":"10.1109/IACSIT-SC.2009.134","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.134","url":null,"abstract":"Romania, a New Member state of European Union, has undertaken a complex process to adapt to new conditions and requirements of European market, especially the growing competition of foreign products and services once the commercial barriers had fallen. Romanian SMEs are the one of the most affected area. In order to create a general perspective on small and medium enterprises in Romania, apprehension of the innovative activities developed within these institutions has an essential role. The undertaken research revealed that innovative efforts within SMEs were especially focused on new products, new technologies, new managerial and marketing approaches, renewing the informational system and human resources training1.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Neural Networks Based Diagnosis of Heart Arrhythmias Using Chaotic and Nonlinear Features of HRV Signals 基于HRV信号混沌和非线性特征的神经网络诊断心律失常
M. Rouhani, Reza Soleymani
{"title":"Neural Networks Based Diagnosis of Heart Arrhythmias Using Chaotic and Nonlinear Features of HRV Signals","authors":"M. Rouhani, Reza Soleymani","doi":"10.1109/IACSIT-SC.2009.23","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.23","url":null,"abstract":"in this paper, an efficient novel algorithm is presented for classification of the most important heart arrhythmias. By computing Heart Rate Variability (HRV) signal form electrocardiogram (ECG) signals, 14 carefully selected time domain, frequency domain, nonlinear and chaotic features are extracted and used to train MLP neural networks. Before applying those features to neural networks, we reduce the order of feature space by generalized discriminate analysis (GDA). Furthermore, to improve the learning performance of MLP network, training set is filtered by deleting confusing data. This is done by means of a self organized map which categorizes train data set and indicates data which are not representative to be ignored. HRV signal is known to be less sensitive to noise as compared to ECG and has higher chaotic and nonlinear characteristics. 7 arrhythmias (i.e. PVC, AF, CHB, LBBB, NSR, VF, and VT) have been classified with accuracies ranged from 95% to 100% on MIT-BIH dataset.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114649048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信