Loading...

Proceedings of

International Conference on Future Trends In Computing and Communication FTCC FTCC 2013

Date
13-Jul-2013
Location
Bangkok , Thailand
Authors
66
ISBN
978-981-07-7021-1

29 Articles Published

1. GENERALIZATIONS OF K-MEANS ALGORITHMS FOR CONSTRAINED CLUSTERING

Authors: HARUKA KONDOH , SADAAKI MIYAMOTO

Abstract: A generalization of K-means clustering algorithms including cluster size variables and covariance variables are introduced. Moreover an on-line version of that is considered. A constrained clustering algorithm using these generalizations and the idea in the COP K-means is proposed. Performances of the proposed algorithms are compared using numerical examples.

Keywords: Generalized K-means clustering, on-line algorithm, constrained clustering

Pages: 1 - 4 | DOI: 10.15224/978-981-07-7021-1-01

2. THE DEVELOPMENT OF CHINA’S TOURISM E-COMMERCE-TAKE C-TRIP COMPANY AS AN EXAMPLE TO SHOW ITS INNOVATION

Authors: QILUN ZHANG

Abstract: In terms of the market of the on-line travel agencies, many new concepts and even commercial models emerge these years. Facing the big challenging of the Qunar, Net and Baidu’s integration, the C-Trip is quite hard to move forward. Yahoo, eBay, Google are on the multiple ways, but the C-Trip is devoted herself to go her professional way. Following the model, the only one, she will learn from Starbucks, Wal-Mart and McDonalds’s to do so. C-Trip has to be more innovative and creative in a long run, including her culture and inter-management, otherwise, she cannot be adaptive and sustainable. This paper is aiming at the C-Trip’sinnovative model to analyze the features and significance. The research may follow the mega-company’s development to dig the other special and sustainable value-sectors. It’s just a guiding-way to say something to the other on-line travelling corporations.

Keywords: professional, way. Following, company, example, show, innovation

Pages: 5 - 8 | DOI: 10.15224/978-981-07-7021-1-02

3. A DETAILED STUDY OF TRANSPORT LAYER SCT PROTOCOL AND ITS SECURITY SOLUTIONS

Authors: RAGHAVENDRA GANIGA , SANOOP MALLISSERY

Abstract: Among many reliable transport protocols, the Stream Control Transmission (SCT) Protocol is very much suitable in networking scenario. To transport telephone signaling messages over IP networks the SCT Protocol act as key role. Multimedia data such as speech, images and video is basic input to SCT Protocol and can be compared with the traditional protocols. The key factor of SCT Protocol will be the capacity to secure the transported data on the network. Security services like authentication, authorization and confidentiality are important and must be provided for SCT Protocol traffic. This paper is highlighting on working of SCT Protocol on transport layer and the security solutions.

Keywords: SCTP, RFC, S-SCTP, TLS, IPSec, SSH

Pages: 9 - 14 | DOI: 10.15224/978-981-07-7021-1-03

4. ENVIRONMENTAL MANAGEMENT SYSTEM FOR MARSHLANDS IRAQ

Authors: AHMAID R. MOHAIN , MOHAMED ADEL AL-SHAHER , MOHAMMED JABER AL-KHAFAJI , NASSIR JABIR AL-KHAFAJI

Abstract: Due to the climatic changes that have been taking place in Iraq, especially in the southern regions, there is a difficulty in sending data from branch offices to main offices in a timely manner. This paper attempts to design a system that will allow branch offices and main offices to exchange information efficiently through electronic means. Consequently, this will make it easier for managers to make decisions at theright time and without any delay.

Keywords: Marshlands; EMS; Sharing Information; Information and comminication Technology;

Pages: 20 - 23 | DOI: 10.15224/978-981-07-7021-1-05

5. A NEW DUAL CHANNEL BASED MEDIUM ACCESS CONTROL PROTOCOL FOR AD HOC NETWORKS

Authors: JONGIN JOO , JOOSEOK SONG

Abstract: Ad hoc networks are widely researched and applied on various fields. To implement Ad Hoc Networks, the IEEE 802.11 standard Medium Access Control(MAC) protocol are widely applied. However, there are some problems which decrease the transmission efficiency of wireless networks at the standard MAC layer. The standard use 4-way handshake procedure(RTS/CTS/DATA/ACK) to overcome the MAC layer problems. But some problemscannot be solved if only a single channel is used in MAC Layer. Therefore, many multi-channel based MAC protocols were proposed to prevent MAC layer problems. But, those scheme either cannot solve MAC layer problems perfectly. This paper proposes New Dual Channel based Medium Access Control(NDCMAC) protocol for ad hoc networks. This protocol requests just one additional channel and perfectly solves most of MAC layer related problems. For this scheme, busy tone and Negative ACK(NACK) concepts are applied. Using NDCMAC, the channel utilization is significantly increased. Result

Keywords: ad hoc network, medium accecc control, MAC, busy tone, dual channel

Pages: 24 - 28 | DOI: 10.15224/978-981-07-7021-1-06

6. ACCURACY ANALYSIS OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION SYSTEM USING NSL-KDD DATASET

Authors: RAGHAVENDRA GANIGA , SANOOP MALLISSERY

Abstract: Intrusion Detection System (IDS) that turns to be a vital component to secure the network. The lack of regular updation, less capability to detect unknown attacks, high non adaptable false alarm rate, more consumption of network resources etc., makes IDS to compromise. This paper aims to classify the NSL-KDD dataset with respect to their metric data by using the best six data mining classification algorithms like J48, ID3, CART, Bayes Net, Naïve Bayes and SVM to find which algorithm will be able to offer more testing accuracy. NSL-KDD dataset has solved some of the inherent limitations of the available KDD’99 dataset.

Keywords: IDS, KDD, Classification Algorithms, PCA

Pages: 29 - 34 | DOI: 10.15224/978-981-07-7021-1-07

7. LIFETIME ENHANCEMENT OF WSN USING COOPERATIVE GAME THEORY BASED ROUTING PROTOCOL

Authors: P. DANANJAYAN , P. RAJA

Abstract: Wireless Sensor Network (WSN) plays a major role in collecting physical data from various locations using battery powered sensor nodes and forward it to the sink node. Limited energy resource is the major constraint associated with WSN, since in most cases it may not be possible to change or recharge batteries. For successful communication, the lifetime of sensor nodes or motes play an important role. Hence, designing of energy efficient routing algorithm is one of the key challenges that need to be addressed for extending the life time of the network. In this paper, cooperative game theoretic approach is applied in A Novel Clustering Algorithm for Energy Efficiency (G-ANCAEE) and low energy adaptive clustering hierarchy (G-LEACH). The G-ANCAEE performance enhances the life time of the nodes by minimizing energy consumption during data transmission. The G-ANCAEE involves fixed clusters and randomized weighted algorithm for cluster head (CH) selection which efficiently reduces the energ

Keywords: WSN, energy consumption, cooperative game, G-LEACH, G-ANCAEE

Pages: 35 - 39 | DOI: 10.15224/978-981-07-7021-1-08

8. WSN, ENERGY CONSUMPTION, COOPERATIVE GAME, G-LEACH, G-ANCAEE

Authors: A.SUNDHAR , P. DANANJAYAN

Abstract: Multi-Carrier Code Division Multiple Access MC-CDMA is a promising technology for supporting high data rate in next generation wireless networks. By combining MCCDMA technology with Multiple-Input Multiple-Output (MIMO) spatial multiplexing, data transfer rate can be enhanced. However, the performance of MCCDMA technology is limited by the multiple-access Interference (MAI) and Inter- Carrier Interference (ICI). In this paper, the interference noise is diminished by adopting power control and subcarrier allocation methods to enhance the system performances like capacity, BER and power savings through Iterative water filling game theory. The water filling game strategy assigns power level to each subcarrier based on the SINR value received by the transmitter instead of getting full channel state information, which is time varying in nature. The subcarrier group assignment is implemented by selecting best subcarriers with maximum SINR value. The performances of mean capacity, BER and pow

Keywords: Channel State Information, Inter Carrier Interference, IWFA, Qos- Quality of Services, Multiple-Access Interference, MCCDMA, Signal to Interference plus Noise Ratio.

Pages: 40 - 44 | DOI: 10.15224/978-981-07-7021-1-09

9. CULTURAL ADAPTIVITY FOR SUSTAINABLE USER INTERFACE: INVESTIGATING USER EXPECTATION ON ASEAN COUNTRY

Authors: ASLINA BAHARUM , AZIZAH JAAFAR

Abstract: This study investigates user interface with cultural adaptivity on user expectation from ASEAN cultural group. Cultural adaptivity was believed to enhance the usability of user interface websites to attract large numbers of users. The findings lead to the conclusion that provides a user interface for various countries is not enough, due to the difficulty of pinning down cultural background. Localized user interfaces usually modify the most obvious elements to meet the target country and/or region, for instance by adapting to different languages and regional characteristic. Despite this fact, research has acknowledged, the culture does not keep within the boundaries. Research has shown that the interpretation of the national culture, in which the term is leveled with a particular country, will bundle a lot of choice. Thus, localization of objects can help users to navigate the web and access information easily. Environment of different countries and different cultures can interoperate

Keywords: Culture, Adaptivity, Cultural Diversity, Sustainability, User Interface, Localization, Web Objects, User Expectation

Pages: 45 - 49 | DOI: 10.15224/978-981-07-7021-1-10

10. THE IMPACT OF CTS ON COMPUTER-GAMES PLAYING: A STUDY AMONG MALAYSIAN UNIVERSITY STUDENTS

Authors: AZIZAH JAAFAR , FARIZA HANIS ABDUL RAZAK , NURUL HIDAYAH MAT ZAIN

Abstract: Carpal Tunnel Syndrome (CTS) is known to be one of the hand complications resulting from prolonged static posture and high muscle tension, particularly during computer-game playing. This study focuses on examining the impact of CTS during computer-game playing among university students in Malaysia. For the purposes of this study, students in the age range of 18-25 years and have experiencing hand discomforts, such as numbness, tingling, pain or burning sensations while playing computer games were approached. A Boston Carpal Tunnel Questionnaire (BCTQ) was administered and students reported on the frequency, the severity of CTS and experiences during computer-game playing. The commonest symptom was numbness. Most of the symptom cases were mild and half of the respondents also described having hand difficulty. This problem creates a great impact relating to their subsequent playing experiences. This study shows that, CTS among the students is in the mild category.

Keywords: Computer Games, Carpal Tunnel Syndrome, Boston Carpal Tunnel Questionnaire, Computer-Game Playing, Impact, Enjoyment

Pages: 50 - 54 | DOI: 10.15224/978-981-07-7021-1-11

11. DYSLEXIA, EDUCATIONAL MULTIMEDIA COURSEWARE, INTERFACE DESIGN

Authors: AZIZAH JAAFAR , MAZNAN DERAMAN , ROZITA ISMAIL

Abstract: The first journey to knowledge is reading, a must-have capability or skill to discover life’s full potential. Dyslexia is a problem related to reading difficulties and inability to comprehend textual or phonological materials that is easy for non-dyslexic person. The situation will lead to anxiety and frustration when a person with dyslexia finds reading as one of the most hated activities especially for children.This paper presented few findings from a study involving twelve (12) dyslexic children in a primary school in Malaysia. An educational multimedia courseware is used in the experiment to test set of research questions related to reaction towards text instruction, icons, colors and other elements of interface. Findings from the experiment were discussed to understand reasons behind learning difficulties by dyslexic children. We also put emphasize on the engagement activities with the courseware to understand any design issues which may cause the low success rate of normal multim

Keywords: Dyslexia, educational multimedia courseware, interface design

Pages: 55 - 59 | DOI: 10.15224/978-981-07-7021-1-12

12. MODELING OF MULTIAGENT BASED RAILWAY SYSTEM USING BDI LOGIC

Authors: ANIMESH DUTTA , ANKIT BHARDWAJ , SUPRIYO GHOSH

Abstract: Multi-Agent based modeling and simulation is an evolving paradigm for solving real life problems for solving real life problems for the last one decade. In this paper, we model the manually controlled Indian Railway to a multi agent based automated system which is robust in nature and provide a fully automated collision avoidance guarantee. We consider individual entity such as station, junction and train as an agent and the whole railway network is framed as a graph. To sharpen the solutions of existing system´s problems such as collisions and delays, BDI agent with first order predicate logic is incorporated in this paper. The communication and coordination between respective agents (with help of their BDI and rule base running as backbone) can now be a substitution in place of manual decisions. Thus the idea can replace the hectic job of railway control room personals in more sophisticated and methodical way.

Keywords: Agent, Multiagent Technology, BDI Logic, Predicate Logic, Railway Management, Distributed System

Pages: 60 - 65 | DOI: 10.15224/978-981-07-7021-1-13

13. ENERGY EFFICIENT DATA AGGREGATION USING BITMASK TECHNIQUES FOR WIRELESS SENSOR NETWORKS

Authors: SANTHOSH KAMATH

Abstract: The rapid advancement of hardware technology has enabled the development of small, powerful, and inexpensive sensor nodes, which are capable of sensing, performing computation and wireless communication. This modernizes the deployment of wireless sensor network for monitoring some vicinity and collecting required information. However, sensor nodes have limited energy constraint which is a major challenge for such visionto become reality. We consider energy constrained wireless sensor network deployed over a region. The main job of such a network is to gather information from node and transmit it to sink node for further processing. So the aim of any data forwarding protocol is to conserve energy to maximize the network lifespan. Sensor nodes are capable of performing in-network aggregation of data coming from more than one source.In this paper we focused on energy consumption issue and aim to develop an energy efficient data aggregation protocol. To deliver energy efficiency we have co

Keywords: Data aggregation, Wireless sensor networks. Energy efficiency, Bit mask.

Pages: 66 - 70 | DOI: 10.15224/978-981-07-7021-1-14

14. E-SUPPLY CHAIN MANAGEMENT USING SOFTWARE AGENTS

Authors: PRASHANT R.NAIR

Abstract: Today enterprises are facing increasing problems in adapting to sudden changes in the market requirements as also to cater to multiple geographies and to shorter product lifecycle times. Various supply chain problems like parts paucity, excessive finished good inventories, unused plant capacity, excessive warehousing costs, and inefficient transportation of supplies and finished goods are causing huge losses to companies. E-supply chain management using software agents has the benefit of solving the tasks by various participants in the supply chain network through their local intelligence and problem-solving paradigms. Using agent-based technologies, various stakeholders, suppliers, manufacturers and transporters can negotiate through dialogue and interaction mechanisms and distribute various activities in a decentralized manner more efficiently. Applications of software agents in various activities of the supply chain like production planning, production monitoring, workflow modeling,

Keywords: agents, e-supply chain, intelligent agents, multi-agent systems, negotiation, scheduling

Pages: 71 - 75 | DOI: 10.15224/978-981-07-7021-1-15

15. THE NEED FOR TWO FACTOR AUTHENTICATION IN SOCIAL MEDIA

Authors: CHRIS O. IMAFIDON , EHINOME J. IKHALIA

Abstract: Social networks are unequivocally the most used application for communication and information sharing in the 21st century. As growth of this technology increases, there is a need to implement a more secure authentication mechanism to protect users as well as the platform providers from various social engineering attacks. A recent study from LinkedIn and Twitter hacks shows that weak passwords and single factor authentication are still prevalent shortcomings facing most social networking sites. This end-user security lapse often paves way for phishing and malware attacks and undermines the overall integrity of the system.In this study, we review the rise of social networks and the underlying concepts of two factor authentication. Furthermore, we propose a novel, feasible, cost effective and secure technique of applying an email based password tokenization as a second factor authentication in social networking sites.

Keywords: Authentication, Social Media Security, Tokenization, Renren, Sina Weibo

Pages: 76 - 82 | DOI: 10.15224/978-981-07-7021-1-16

16. KNOWLEDGE AND INTERACTIVE COMMUNICATION AS A VIRTUAL PATH FOR THE URBAN HERITAGE

Authors: FAUSTO PUGNALONI

Abstract: The understanding of our modern world is strictly linked to the knowledge of the past as the future depends on our understanding of the present.This research aims at analyzing and promoting the instruments to develop cultural interaction and knowledge exchange for inter-universities cooperation.The above ideas will be realized through a shared platform for data communication and its basis device is the digital room project. It constitutes a space where the faculties of architecture can exploit their work and give it a new dimension, connecting other structures located in the partners\' universities. Therefore knowledge will be transmitted through the access to a shared database.The platform will be implemented through the intervention of several expertises, in order to develop a dynamic system and to share the scientific researching activities and methodologies, in the long term it is foreseen to clone the e-rooms in order to create a network of the most important universities of the w

Keywords: knowledge exchange, architectural communication, innovative training approach, cultural and transnational dynamism, virtual mobility

Pages: 83 - 86 | DOI: 10.15224/978-981-07-7021-1-17

17. FACTORS INFLUENCE RESTAURANT CONSUMERS\' PERCEIVED VALUE AND SATISFACTION

Authors: CHENG LING TAI , CHIH PEI CHIEN , HSUEH HSUN TU

Abstract: The article proposes a model that related the mediating role of perceived value in the reltionships among ambience, facilities aesthetics, staff appearance, food quality and food aesthetics and sumer\'s dining satisfaction. Data was collected from consumers who had dining experience in the most recent month.. A total of 400 questionnaires were distributed, of which 224 were successfully replied respondents, yielding a usable response rate of 56%. Multiple regression analyses were used for hypothesis testing. The results of this article show support the hypothesis that quality of food and the aesthetic presentation of food have apositive influence on perceived value. The results also show tht perceived value plays a mediating role in the relationship of food quality, food aesthetics and customers satisfaction. Our finding contributes new evidence to dispute views in previous studies, while at the same time offering important implications for both research and practice.as illustrated by

Keywords: customers satisfaction, perceived value, ambience, facilities aesthetics, staff appearance, food aesthetics, food quality

Pages: 87 - 92 | DOI: 10.15224/978-981-07-7021-1-18

18. THE IMPACTS OF UTILITARIAN AND HEDONIC MOTIVATIONS ON HABIT AND ONLINE BROWSERS’ BEHAVIORS

Authors: CHENG LING TAI

Abstract: Online shopping is becoming increasingly popular. In this paper, the term \"habit\" is used to describe the \"routine\", \"indispensable\" yet \"unspecific\" phenomenon of \"browsing online shops\" and is explained through a model established from the motivation perspective. Data are collected from online shop browsers. All hypotheses were tested using AMOS (Analysis of Moment Structures). Results show that hedonic motivations can better help form a habit than utilitarian motivations and can best enhance online purchase frequency. People with utilitarian motivations emphasize \"the importance of perceived information\" the most. The significance of this study and the generated practical suggestions are listed in the end of this paper.

Keywords: utilitarian motivation, hedonic motivation, habit, purchase frequency, perceived information importance

Pages: 98 - 102 | DOI: 10.15224/978-981-07-7021-1-20

19. THE ANTECEDENTS AND CONSEQUENCES OF CONSUMERS’ONLINE PERCEIVED TRUST

Authors: CHENG LING TAI , CHIH PEI CHIEN , HSUEH HSUN TU

Abstract: The article proposes a model that related online shopping experience, attitude, reputation, privacy policy, positive rating, word of mouth to purchase intention, medicated by perceived trust. Respondents to the questionnaires were restricted to consumers who had experiences in online shopping in the most recent months. A total of 450 questionnaires were distributed, of which 232 were successfully replied respondents, yielding a usable response rate of 51.5%. Multiple regression analyses were used for hypothesis testing. The results of the study show that attitude, reputation, positive rating have a significant impact on purchase intention. In addition, the mediating impact of perceived trust is partially supported. Suggestions for implications of the research and future research are also presented.

Keywords: perceived trust, purchase intention, attitude, reputation, positive rating

Pages: 103 - 107 | DOI: 10.15224/978-981-07-7021-1-21

20. UNDERSTANDING USER RESPONSES TOWARDS A MEASUREMENT MODEL USING THE RASCH ANALYSIS

Authors: AZIZAH JAAFAR , FARIZA HANIS ABDUL RAZAK , NURUL HIDAYAH MAT ZAIN

Abstract: In this paper, we propose the Rasch analysis for studying an existing measurement model towards a design. The user satisfaction measurement model (e-Learner Satisfaction (ELS) and Website User Satisfaction (WUS)) was used to show how to understand users’ response patterns. A twenty four item questionnaire was adapted based on the user satisfaction measurement model and administered to 86 students. The user satisfaction responses towards the design of the On-line Discussion Site (ODS) in Universiti Teknologi MARA (UiTM) e-learning portal were investigated. Step by step guidance is provided on how data was analyzed in understanding users responses towards the ODS design using the Rasch analysis. The findings from Rasch analysis will reveal the likelihood of user satisfaction with the ODS design. Thus the Rasch analysis was able to provide the most and least agreed items in a measurement model. Thereby system designers can easily identify items that need to be further improved in a design

Keywords: rasch analysis; user satisfaction; on-line discussion site (ODS)

Pages: 119 - 123 | DOI: 10.15224/978-981-07-7021-1-24

21. AN INTEGRATED PLATFORM FOR SYSTEM TRADE USING THE CLOUD

Authors: HIROAKI TSUJIMOTO , TAKAHIRO KOITA

Abstract: Recently, algorithmic trading, which is an automatic trade by means of a computer and a trading rule, has become popular. To use the algorithmic trading effectively, its trading rule is quite important because the trading rule is an algorithm to determine the timing of using market parameters. Investors are eager to find a good trading rule, which can be a good indicator to trade stocks, from among enormous numbers of rules. However, the existing trading-rules evaluation systems for virtual dealing cannot be used for full search of trading rules. The causes of the problem are the compatibility of virtual dealing software and the computing resource available for trading-rules evaluation. In this research, we have designed and developed an integrated platform for trading rules search to cope with these two issues.

Keywords: algorithmic trading,cloud computing,Hadoop

Pages: 124 - 127 | DOI: 10.15224/978-981-07-7021-1-25

22. A SECURE AND EFFICIENT MULTI-DEVICE AUTHENTICATION PROTOCOL BASED ON SECRET SHARING IN HETEROGENEOUS NETWORKS

Authors: HAEJUN JUNG , JOOSEOK SONG

Abstract: Current EAP-AKA provides mutual authentication and key agreement in heterogeneous networks. However, with mobile devices increasing explosively, this protocol seems to be inefficient as each device needs to communicate with its remote home network to authenticate. In this paper, we propose a secure and efficient authentication protocol for owner of multiple devices by implementing shared group temporary key and secretsharing method. The devices which belong to a user generate group temporary key with shared secret. A master device communicates with home network for authentication. The other devices can be authenticated by serving network locally instead of communicating with remote home network. We will prove that the proposed protocol provides secure authentication and it is more efficient than the conventional EAP-AKA in multi-device scenario.

Keywords: EAP-AKA, authentication, multi-device, secret sharing, group key

Pages: 128 - 132 | DOI: 10.15224/978-981-07-7021-1-26

23. USING BACK PROPAGATION NEURAL NETWORK TECHNIQUES ON PREDICTION OF TAIWAN STOCK MARKET

Authors: FU-JYH KO , JIAN-HON LIU , JIN-CHERNG LIN , YUEH-TING LIN

Abstract: In this research, we use Back Propagation Network method combined statistics to measure up the analysis on the close value of stock market, and individual stocks and predict the trend of stock and individual stocks index in a period of time, also use RMSE and daily average error to analyze result. During this research, we use the close value of Taiwan Stocks Index from 1999 to 2010, and for the individual stock, we choose Taiwan Semiconductor Manufacturing Company (TSMC) and ASUS Company to perform the test. Based on the training data of the Back Propagation Network and prediction data during this experiment result, we find out use Back Propagation Network method combined statistics can achieve certain degree result on assessment

Keywords: Stock-index estimation, Back propagation neural network, Back propagation network algorithm, Root-meansquare-error.

Pages: 133 - 137 | DOI: 10.15224/978-981-07-7021-1-27

24. DEVELOPMENT OF 3D MEASUREMENT SYSTEM USING PHASE-SHIFT DIGITAL HOLOGRAPHY

Authors: HIDEYOSHI HORIMAI , MASAHIRO HOGURO , QIYUE YU , RYO TAGUCHI

Abstract: We propose a digital holography reconstruction method using convolution approach rather than the conventional Fresnel approach. Simultaneously, we propose a 3D measure-ment system of phase-shift digital holography using principle of light detector. Using proposal method, we develop a compact 3D measurement system of phase-shift digital holography with low price and high measurement accuracy.

Keywords: 3D measurement, phase-shift digital holography, optical system

Pages: 138 - 142 | DOI: 10.15224/978-981-07-7021-1-28

25. RELATIONSHIP BETWEEN CONSUMERS’PERCEPTIONS, WEBSITE CHARACTERISTICS AND REPURCHASE INTENTION-THE MEDIATING ROLE OF RECOVERY SATISFACTION

Authors: CHENG LING TAI , HSUEH HSUN TU

Abstract: The article proposes a model that related material factors, affective factors, handling process factors to consumers’ repurchase intention, medicated by recovery satisfaction. Data was collected from students studying at a number of colleges and workers. A total of 400 questionnaires were distributed, of which 256 were successfully replied respondents, yielding a usable response rate of 64%. Multiple regression analyseswere used for hypothesis testing. The results of the study show that complain frequency, perceived norms, perceived monitoring, perceived apology and ease of use of grievance channels have a significant impact on consumer\'s repurchase intention. In addition, the mediating impact of recovery satisfaction is partially supported. Suggestions for implications of the research and future research are also presented.

Keywords: Material factors, affective factors, handling process factors, recovery satisfaction, consumers’ repurchase intention

Pages: 143 - 147 | DOI: 10.15224/978-981-07-7021-1-29

26. ENERGY EFFICIENT WITH THROUGHPUT MAXIMIZATION ROUTING IN MANETS

Authors: P. P. WAGHAMARE

Abstract: In Mobile Ad-hoc network, the mobility decides the routing path and the delivery rate of the packet transmission thus mobile nodes may lead to network partitioning or performance degradation. Several techniques proposed to increase the overall throughput using on-demand routing protocol. We develop an efficient energy model with dynamic link repair routing, which reduce the dropping ratio in the network. By selecting the shortest hop neighbour through on-demand protocol delay can be minimised to reduce the energy usage in the network .Thus the proposed approach in demonstrated under network simulation in terms of Overall Throughput, End to end Delay and packet delivery rate.

Keywords: Mobile ad hoc networks, link repair routing, Energy Optimisation, Throughput Maximization.

Pages: 148 - 151 | DOI: 10.15224/978-981-07-7021-1-30

27. APPLYING MOBILE CREDIT CARD POS SYSTEM FOR HOME DELIVERY SERVICE

Authors: CHUNG-CHIANG HU , MAO-HSIUNG CHANG , HING-HAN LI , WEI-YU CHEN

Abstract: Pervasive Internet and the popularity of terminal network devices have provided the opportunities of e-commerce to flourish, promoted the diversified electronic payment mechanism and made the security of electronic payment mechanism attracted much attention. The prevalence of Internet shopping led to the flourish of the home-delivery industry that offers the home-delivery services. For customers and Internet sellers, home-delivery payment becomes a type of reliable payment service. This study analyzes the characteristics and advantages of payment on delivery and mobile payment and explores the feasibility of the mechanism of their combination. Finally, this research uses case studies to understand the benefits of credit card payment on home-delivery and provides the customers, Internet stores, sales drivers a more convenient and the secure goods-delivery and payment mechanism that makes payment transactions more efficient.

Keywords: Home delivery Service, Payment on delivery, Mobile payment, Credit card payment on delivery.

Pages: 152 - 156 | DOI: 10.15224/978-981-07-7021-1-31

28. DESCRIBING MPLS IN AN OPEN FLOW ENABLED SOFTWARE DEFINED NETWORKS

Authors: R.A. KHAN , SANDEEP SINGH

Abstract: The main advantage for taking this proposed approach is that it is a protocol and application agnostic. This will not only work for MPLS, but also for other tunneling protocols such as GRE, or L2TP. It will also work for L2 protocols such as PBB, and applications such as VPLS. Variants such as Nested LSPs are handled as well in the same manner. Our goal is to make the switch as protocol/application unaware as possible. Instead the protocol and applications reside in the controller only. Our Specification is Implementation independent (aka Platform Independent), as a specification should be. At the same time, we do leverage our extensive experience with implementations to make sure that our specification is not devised in vacuum. We have gone to pains to make sure that the implementations will have the flexibility to address their own specific constraints and optimizations while working within the boundaries of the specification.

Keywords: MPLS, Open Flow Switch, SDN.

Pages: 157 - 160 | DOI: 10.15224/978-981-07-7021-1-62

29. EFFECTS OF KNOWLEDGE LEADERSHIP BEHAVIOUR IN KM APPLICATIONS

Authors: JOYCE NESAMANI SIMSON , ROHIZA AHMAD

Abstract: The challenge facing knowledge management professionals is how to leverage knowledge for improving organisational performance. The purpose of this paper is to investigate the relationship as well as the impact of leadership styles on knowledge management (KM) practices. It is imperative for employees to engage in knowledge sharing among themselves, considering its potential impact on enhancing the effectiveness of organisations. In relation to KM, the Kouzes and Posner model of leadership is useful in identifying how to get others to want to do things that matter, namely KM implementation. Since leadership is perceived to be ‘a process between those who choose to lead and those who choose to follow’, this paper will explore how reciprocal processes occur in the knowledge sharing context. This study will aim to identify the influence of personal orientation coupled with leadership traits that would create intention towards using KM in employees, thus providing a guideline for leadership

Keywords: Knowledge Management, Leadership Behaviour, Organisational Performance

Pages: 161 - 166 | DOI: 10.15224/978-981-07-7021-1-63

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study