scispace - formally typeset
Search or ask a question

Showing papers by "Aletheia University published in 2020"


Journal ArticleDOI
TL;DR: This study proposes an energy saving routing mechanism, named Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks (EERH for short), in which several WSNs deployed in the same geographical environment form a heterogeneous sensor network and sensors relay packets for its own WSN and also for other W SNs.
Abstract: Generally, routing techniques are essential for Wireless Sensor Networks (WSNs) to deliver data packets to their destinations (also known as sinks). For a practical application, sensors are deployed to monitor environmental changes and events. Most WSNs detect specific events in their specific environments. But, different WSNs may monitor different events with different sensors in the same area. For example, a smart-home WSN deploys thermal sensors/meters to measure indoor and outdoor temperatures, body-temperature sensors to detect thief intrusion, etc. Also, in the underlying house, there is a health WSN which utilizes physiological sensors to monitor patients’ health condition. In other words, several WSNs of different purposes co-exist in the same geographical area. Currently, each WSN’s data delivery is independent from others’. Basically, if all sensors in such a multi-WSNs environment can share their routing paths/nodes and relay event packets for other WSNs, the delivery efficiency can be enhanced since many more sensors can be found there for packet relay. Consequently, the transmission energy can be reduced since energy consumed for wireless transmission is proportional to d2 where d is the transmission distance between sender and receiver. Therefore, in this study, we propose an energy saving routing mechanism, named Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks (EERH for short), in which several WSNs deployed in the same geographical environment form a heterogeneous sensor network and sensors relay packets for its own WSN and also for other WSNs. Routing paths are dynamically established according to the transmission directions of event packets and the residual energy of the underlying sensors and their neighbors. In addition, the packets routed to the same direction by the same sensors are aggregated to save delivering energy. Moreover, the network parameters of the EERH, like propagation delay of an event packet and the transmission distance of a sensor, are adjustable so as to satisfy the practical environment needs. Simulation results show that the EERH efficiently extends the lifetime of a heterogeneous WSN.

48 citations


Journal ArticleDOI
TL;DR: A session key generation method is proposed to generate session keys with which two servers can securely communicate with each other, especially enhancing the application layer communication securities undefined in the LoRaWAN Specification.
Abstract: In recent years, Internet of Things (IoT) as an essential infrastructure for industrial development, environmental protection and human life enhancement has attracted researchers’ attention. Currently, there are four hot research topics in IoT fields, including sensor design, communication scheme, secure transmission, and data mining. The LoRaWAN, an unlicensed band based long range wide area network specification, is very suitable for the activities or operations in an IoT environment due to its low power and long range communication. In the LoRaWAN, star-of-stars topology, asynchronous communication, and three communication modes are used to reduce its power consumption. In order to enhance the security of network communication, the LoRaWAN adopts the 128-bit Advanced Encryption Standard (AES-128) and utilizes two session keys: network session key and application session key, for encrypting/decrypting data between end devices and network/application servers. However, according to the LoRaWAN Backend Interfaces 1.0 Specification announced by LoRa Alliance in 2017, the application layer communication securities between two arbitrary servers (including network servers, join server, and application servers) are out of the specification’s scope. That is to say that the important data transmitted from one server to another may be attacked, falsified, or stolen easily. In this paper, a session key generation method is proposed to generate session keys with which two servers can securely communicate with each other, especially enhancing the application layer communication securities undefined in the LoRaWAN Specification. By integrating elliptic curve cryptography and AES-128, the session keys for different pairs of servers are created. The security discussion shows that the proposed method provides the features of mutual authentication, confidentiality and message integrity. Besides, it can also help to resist replay and eavesdropping attacks.

33 citations


Journal ArticleDOI
TL;DR: In this article, a mediated-moderation model of the mutual relationships among critical attributes of social entrepreneurial orientation (SEO) and test the buffering role of high social entrepreneurial self-efficacy in the market and value co-creation processes was developed and examined.

27 citations


Journal ArticleDOI
TL;DR: In this paper, the authors extended the expectation-confirmation model for predicting mandatory continued KMS use in the public sector, using data from a sample of 627 employees of the Kaohsiung City government in Taiwan and analyzed using the finite mixture partial least squares method.
Abstract: Knowledge management systems (KMS) can help an organization support knowledge management activities and thereby increase organizational performance. This study extends the expectation-confirmation model for predicting mandatory continued KMS use in the public sector. The models are assessed using data from a sample of 627 employees of the Kaohsiung City government in Taiwan and analyzed using the finite mixture partial least squares (FIMIX-PLS) method. The results of this study indicate that (1) data heterogeneity (i.e., educational level) segments two specific groups that show different perceptions toward continued KMS use; (2) the results of aggregate-based data analysis are different from the results of group-specific data analysis; (3) compatibility, relative to confirmation, has larger impact on perceived usefulness regardless of groups; (4) the effect of user satisfaction on continued usage behavior is significant different between the two groups; (5) cognition-driven continued use and emotion-driven continued use are identified in the two groups.

26 citations


Journal ArticleDOI
TL;DR: The experimental results show that the AR-based mobile touring system significantly improved the students’ memorising dimension of learning achievement, as compared with a conventional mobile toured system, and suggest the potential of AR technology to increaseStudents’ learning interest and improve their learning achievements in outdoor settings.
Abstract: In this study, we proposed an augmented reality- (AR-) based mobile touring system for an authentic learning activity, which enables students to observe and learn key information regarding cultural heritage sites. To evaluate the effectiveness of the proposed system, we conducted an experiment in a cultural heritage course at a Taiwanese university. A total of 72 students were divided into two groups and randomly assigned to an experimental group who learned with the AR-based mobile touring system and a control group who learned with a conventional mobile touring system. The experimental results show that the AR-based mobile touring system significantly improved the students’ memorising dimension of learning achievement, as compared with a conventional mobile touring system. Moreover, the positive impact of the proposed system on students’ actualised interest and task-based interest factors provide a particularly encouraging result for outdoor experiences. These experimental results also suggest the potential of AR technology to increase students’ learning interest and improve their learning achievements in outdoor settings. Therefore, we suggest that, when applying an AR-based mobile touring system in authentic learning activities, AR virtual objects should be designed appropriately, in order that the content recall performance and learning interest are enhanced. Implications for practice or policy: Teachers may need to consider using an AR-based mobile touring system for outdoor learning activities. First-year student learning achievements and interest can be improved by an AR-based mobile touring system. First-year student learning performance and interest can be improved by AR technology. The usefulness of AR technology can be proved through a comparison of experimental designs.

26 citations


Journal ArticleDOI
TL;DR: Experimental results show that the proposed data collection algorithm can notably reduce the path length of mobile sink, while the data of every sensor can be collected completely and efficiently.
Abstract: Data collection is one of the most fundamental and important operations in applications of wireless sensor networks (WSNs). Recent research has shown that using mobile sink to collect data brings many advantages to WSNs, such as improving energy efficiency of sensor nodes and prolonging network lifetime. However, the limited speed of mobile sink leads to larger latency, which cause that the data is not fresh or the buffer overflow problem of static sensor nodes. Based on the adaptive rate control, this paper proposes a data collection algorithm which aims to reduce the length of path along which mobile sink collects data from static sensor nodes. The proposed algorithm not only guarantees the completeness of data collection from each static node but also reduces path length by adopting appreciate transmission rate. Through extensive simulations, experimental results show that our approach can notably reduce the path length of mobile sink, while the data of every sensor can be collected completely and efficiently.

20 citations


Journal ArticleDOI
TL;DR: In this article, a model identifies multiple mechanisms of a cooperative culture, as well as the creative process behind the relationship between knowledge acquisition, sharing and student creativity, and the moderating role of the learning environment and knowledge sharing strengthens the relationship of knowledge acquisition and cooperation culture.
Abstract: In this study, the proposed model identifies multiple mechanisms of a cooperative culture, as well as the creative process behind the relationship between knowledge acquisition, sharing and student creativity. Furthermore, the moderating role of the learning environment and knowledge sharing strengthens the relationship between knowledge acquisition and cooperation culture. Moreover, the mutual relationships among creative processes were tested, which have not been tested in previous studies. 633 tourism and hospitality students from the north, middle and south regions of Taiwan confirmed the proposed model. The implications for education and theoretical contributions are discussed in the final section.

19 citations


Journal ArticleDOI
Hung-Ming Wu1
TL;DR: In this article, the authors investigated the symmetric and asymmetric effects of non-clean energy consumption (total fossil fuel consumption) on environmental quality and proposed a method to measure the effect of non clean energy consumption.
Abstract: Non-clean energy consumption is one of the key components of environmental quality. The current study investigates the symmetric and asymmetric effects of non-clean energy consumption (total fossil...

12 citations


Journal ArticleDOI
30 Mar 2020-Sensors
TL;DR: A head-mounted device developed to track the gaze of the eyes and estimate the gaze point on the user’s visual plane is combined with a sized endoscope camera, infrared light, and mobile phone to provide a cost-effective vision tracking solution.
Abstract: In this study, a head-mounted device was developed to track the gaze of the eyes and estimate the gaze point on the user's visual plane. To provide a cost-effective vision tracking solution, this head-mounted device is combined with a sized endoscope camera, infrared light, and mobile phone; the devices are also implemented via 3D printing to reduce costs. Based on the proposed image pre-processing techniques, the system can efficiently extract and estimate the pupil ellipse from the camera module. A 3D eye model was also developed to effectively locate eye gaze points from extracted eye images. In the experimental results, average accuracy, precision, and recall rates of the proposed system can achieve an average of over 97%, which can demonstrate the efficiency of the proposed system. This study can be widely used in the Internet of Things, virtual reality, assistive devices, and human-computer interaction applications.

12 citations



Journal ArticleDOI
Kuo-Sui Lin1
02 Jan 2020
TL;DR: A new cosine similarity retrieval algorithm for case reasoning, in which mixed measurement scales are considered and applied, is proposed and applied to the search engine of the CBR system for interior design drawing retrieval.
Abstract: During concept design stage, a case-based reasoning (CBR) system is good for searching the most suitable interior design drawing case as a preliminary concept drawing design aid to bridge the desig...

Journal ArticleDOI
TL;DR: An inventory model for deteriorating items with a return period and price-dependent demand for the retailer who offers two-phase advance sales to his/her customers is established and an easy-to-use method to obtain the optimal selling price and the optimal sales period is provided to achieve the retailer’s maximum total profit.
Abstract: In this article, we establish an inventory model for deteriorating items with a return period and price-dependent demand for the retailer who offers two-phase advance sales to his/her customers. The replenishment cycle is divided into two sales periods: one is the two-phase advance sales period, and the other is the spot sales period. Before customers with reservations receive their orders, they may cancel the order. On the other hand, when the customers receive the order, they can make a request to return products for any reason during the return period. We provide an easy-to-use method to obtain the optimal selling price and the optimal sales period to achieve the retailer’s maximum total profit. Finally, we give numerical examples to illustrate the solution procedure. We perform a sensitivity analysis to investigate the effect of changes of some main parameter values on the optimal solution and provide an economic interpretation.

Journal ArticleDOI
TL;DR: This study proposed using a ubiquitous guide-learning system to enhance students’ performance and active participation in cultural heritage courses to yield a significant learning advantage for students by improving overall learning performance and motivation.
Abstract: In most cultural heritage courses, students physically visit several renowned heritage sites for educational purposes. However, because of time and manpower limitations, many teachers use traditional outdoor instruction methods to transmit vital information regarding these sites and buildings. This approach could result in students merely memorizing knowledge for test-taking purposes, rather than engaging in active thinking. Therefore, this study proposed using a ubiquitous guide-learning system to enhance students’ performance and active participation in cultural heritage courses. To evaluate the effectiveness of the proposed system, a trial experiment was conducted to visit eight heritage sites featured in the cultural heritage course offered by a local university. In total, 62 students were randomly assigned to either an experimental group testing the proposed system or a control group using traditional outdoor instruction methods. The experimental results indicated that our ubiquitous guide-learning system significantly improved students’ learning achievements. The outcome of the Instructional Materials Motivation Survey questionnaire indicated that the experimental group participants were motivated to learn and interested in using the proposed system. Moreover, the two groups had statistically significant results for the attention, confidence, and satisfaction factors. Therefore, implementing our proposed system in conjunction with cultural heritage education courses may yield a significant learning advantage for students by improving overall learning performance and motivation.

Journal ArticleDOI
TL;DR: It is demonstrated that the optimal path of the advertising effort is unique and converges monotonically to its corresponding equilibrium over the long run in the opposite direction as the stock of advertising goodwill.
Abstract: The article formulates a joint dynamic trade credit and advertising problem in which the demand rate varies simultaneously with the length of the credit period offered to the customers and the stoc...

Journal ArticleDOI
TL;DR: The Republic of China (ROC) coach exchange pl... as discussed by the authors was a phenomenon of the export of sport talent during the Cold War and were a strategy of sport exchange in public diplomacy.
Abstract: Expatriate sport coaches were a phenomenon of the export of sport talent during the Cold War and were a strategy of sport exchange in public diplomacy. The Republic of China (ROC) coach exchange pl...

Journal ArticleDOI
TL;DR: It is elucidated that unilateral ANT DBS enhanced the seizure threshold by increasing the amount of REM sleep and decreasing the progressive enhancement of delta power during NREM sleep to suppress spontaneous seizure recurrences in PTZ kindling-induced epileptic rats.
Abstract: We previously demonstrated that seizure occurrences at different zeitgeber times alter sleep and circadian rhythm differently. On the other hand, the synchronized delta wave of electroencephalogram (EEG) during non-rapid eye movement (NREM) sleep facilitates seizure, while the desynchronized EEG of rapid eye movement (REM) sleep suppresses it. We also elucidated that unilateral deep brain stimulation (DBS) of the anterior nucleus of thalamus (ANT) suppresses seizure recurrence. In the present study, we intraperitoneally injected pentylenetetrazol (PTZ, 40 mg/kg) for 14 consecutive days (PTZ kindling) to induce spontaneous seizure in rats, and a 30-min (delivered 10 min before each PTZ injection) or a 3-h DBS of unilateral ANT (delivered 1 h before each PTZ injection) was applied to suppress seizure. The frequency of DBS stimulation was 200 Hz and the electrical current consisted of biphasic square pulses with 50-μA intensity, 100-μs pulse width, and 4.1-ms stimulation interval. Our results found that PTZ-induced spontaneous seizure did not cause a significant change in the quantity of NREM sleep but suppressed the amount of REM sleep. Unilateral ANT DBS prolonged the onset latency of ictal seizure, decreased the spontaneous seizure duration, and increased the survival rate but did not change the amplitude of epileptiform EEGs during ictal period. Unilateral ANT DBS did not significantly alter NREM sleep but increased the amount of REM sleep. An analysis of the spectrograms of fast Fourier transform indicated that the intensities of all frequencies were enhanced during the PTZ-induced ictal period and the subsequent spontaneous seizure. Thirty minutes of unilateral ANT DBS suppressed the augmentation of low-frequency (<10 Hz) intensities during the spontaneous seizure induced by PTZ kindling. We further found that consecutive injections of PTZ progressively increased the enhancement of the delta powers during NREM sleep, whereas unilateral ANT DBS inhibited this progressive enhancement. It was also noticed that 30 min of ANT DBS exhibited a better efficacy in epilepsy suppression than 3 h of ANT DBS. These results elucidated that unilateral ANT DBS enhanced the seizure threshold by increasing the amount of REM sleep and decreasing the progressive enhancement of delta power during NREM sleep to suppress spontaneous seizure recurrences in PTZ kindling-induced epileptic rats.

Journal ArticleDOI
TL;DR: This article found that nine common biases can indeed be reduced to only three main factors: self-related and non-self-related information processing, and the connection between those, while cognitive reflection decreases biases related to external information processing and emotions can increase biases associated with internal information processing.
Abstract: In the past decades, a multitude of judgmental and behavioral biases with regards to financial decision making has been found. But are these biases connected with each other? Are people prone to, e.g., illusion of control, usually also more prone to confirmation or hindsight bias? In this study we show that nine common biases can indeed be reduced to only three main factors. These three factors can be related to biases in self-related and non-self-related information processing and in the connection between those. We also show that cognitive reflection decreases biases related to external, while emotions can increase biases related to internal information processing.

Journal ArticleDOI
TL;DR: In this article, the relationship between trade openness and environmental pollution was studied through the theoretical framework and it was shown that there is a non-uniform effect of trade openness on environmental pollut...
Abstract: This paper re-studies the relationship between trade openness and environmental pollution. Through the theoretical framework, there is a non-uniform effect of trade openness on environmental pollut...

Proceedings ArticleDOI
01 Aug 2020
TL;DR: This paper proposes the blockchain-indexed storage (BIS) to provide scalable and secure IoT-enabled supply chain traceability and supports adaptive transaction arrival rate to control latency and cost according to demand.
Abstract: In this paper, we propose the blockchain-indexed storage (BIS) to provide scalable and secure IoT-enabled supply chain traceability. Although blockchain can prevent data from being maliciously tampered with, scalability is the challenge to directly store supply chain data into blockchain. A massive IoT devices can generate enormous transactions and data which can significantly increase latency and cost. Instead of directly storing supply chain data into blockchain, BIS stores data and data fingerprint into off-chain storages and blockchain, respectively. In addition, BIS supports adaptive transaction arrival rate to control latency and cost according to demand. Our preliminary implementation and analysis show the feasibility of applying BIS to provide scalable and secure supply chain traceability.

Journal ArticleDOI
Li-Ling Hung1
08 Oct 2020-Sensors
TL;DR: This work proposes a distributed cooperative mechanism where neighboring sensors mutually confirm event occurrences for improved monitoring accuracy and transmits events in a time- and energy-efficient manner by using smart antennae to extend monitoring lifetimes.
Abstract: Wireless sensor networks (WSNs) have long been used for many applications. The efficiency of a WSN is subject to its monitoring accuracy and limited energy capacity. Thus, accurate detection and limited energy are two crucial problems for WSNs. Some studies have focused on building energy-efficient transmission mechanisms to extend monitoring lifetimes, and others have focused on building additional systems to support monitoring for enhanced accuracy. Herein, we propose a distributed cooperative mechanism where neighboring sensors mutually confirm event occurrences for improved monitoring accuracy. Moreover, the mechanism transmits events in a time- and energy-efficient manner by using smart antennae to extend monitoring lifetimes. The results of the simulations reveal that monitoring lifetime is extended and time for event notifications is shortened under the proposed mechanism. The evaluations also demonstrate that the monitoring accuracy of the proposed mechanism is much higher than that of other existing mechanisms.

Journal ArticleDOI
TL;DR: In this article, the authors present an endogenous growth model in which households display their social status by holding not only capital but also bonds, and they find that if government bonds constitute part of the wealth for households' quest for social status, the quest to social status decreases economic growth.

Journal ArticleDOI
01 Nov 2020-Heliyon
TL;DR: A gender difference was found in that female participants were more concerned with physical aspects while male participants focused more on the social dimension, and an educational approach was suggested to address these findings.

Journal ArticleDOI
TL;DR: A novel iterative method is constructed to simplify the previous approach proposed by the three-sequence approach for the optimal solution by demonstrating that it can control the findings to converge more accurately than previous results.
Abstract: This paper is a response to two papers. We improve the lengthy proof for the first paper by an elegant verification. For the second paper, we point out the three-sequence approach will result in different convergent rates such that when the other two sequences are converged, the ordering quantity sequence may still not converge to the optimal solution. We construct a novel iterative method to simplify the previous approach proposed by the three-sequence approach for the optimal solution. By the same numerical examples of three published papers, we demonstrate that we can control our findings to converge more accurately than previous results. Moreover, we show that there are three distinct features of our proposed approach. (i) It converges to the desired solution within the preassigned threshold value. (ii) We estimate the convergent ratio. (iii) We find the dominant factors for our proposed convergent sequence.

Journal ArticleDOI
07 May 2020
TL;DR: An intelligent surgery information system to reduce writing errors caused by human negligence and reduce nurse’s and physician's workload and elevate the quality of patient care is developed and feedback shows that the system should improve the function of automatic saving on regular basis.
Abstract: The Internet of Things (IoT) enables new hospital information system by using RFID technology. It becomes the key mechanism for IoT. RFID technology is not only help us to identify doctors, nurses or patients in the hospital information system, but also track doctors, nurses or patients in the hospital. More and more data is being collected into the system in order to achieve an intelligent information system. In this study, we develop an intelligent surgery information system to reduce writing errors caused by human negligence and reduce nurse’s and physician’s workload and elevate the quality of patient care. The study was conducted at a medical center located in northern Taiwan. Through the establishment of the proposed intelligent surgery information system, documents used in surgeries are eliminated and are recorded in computers. The intelligent surgery information system combines HIS, PACS and LIS to assist medical personnel to import patient’s clinical records, imaging reports, inspection reports and other relevant information before, during and after surgery. We propose the record, re-check, report and reference, the 4R checking mechanism as the core concept of the development of the proposed intelligent surgery information system. The checking mechanism can automatically view the completion of medical record, and maintain a high degree of integrity if the records are incomplete. After launching the system one and half year, we conduct a questionnaire survey and collect data from nurses and physicians who use this system. The survey was designed to measure the successfulness of the intelligent surgery information system. Questions focused on three broad areas: information quality, system quality, and users’ satisfaction. The results confirmed a high degree of satisfaction among users. According to the feedback, it shows that the system should improve the function of automatic saving on regular basis.

Journal ArticleDOI
Yi-You Yang1
TL;DR: It is proved that the set of viable proposals of a cohesive game coincides with the minimal dominant set, which is another nonempty extension of the coalition structure core introduced by Kóczy and Lauwers.
Abstract: Sengupta and Sengupta (Int Econ Rev 35:347–359, 1994) consider a payoff configuration of a TU game as a viable proposal if it challenges each legitimate contender. Lauwers (Int Econ Rev 43:1369–1371, 2002) prove that the set of viable proposals is nonempty for every game. In the present paper, we prove that the set of viable proposals coincides with the coalition structure core if there exists an undominated proposal; otherwise, it coincides with the set of accessible proposals. This characterization result implies that a proposal is a viable proposal if and only if it is undominated or accessible. Moreover, we prove that the set of viable proposals includes the minimal dominant set, which is another nonempty extension of the coalition structure core introduced by Koczy and Lauwers (Games Econ Behav 61:277–298, 2007). In particular, we prove that the set of viable proposals of a cohesive game coincides with the minimal dominant set.

Journal ArticleDOI
Yi-You Yang1
TL;DR: It is proved that every path independent choice function is rationalizable, which implies that under the substitutability assumption, the rationalizability condition and the irrelevance of rejected contracts (IRC) condition are equivalent.

Journal ArticleDOI
TL;DR: The analytical and closed form expressions of the fuzzy additions of the generalized fuzzy numbers and the interval type 2 fuzzy numbers (IT2FS) are developed and the application to the linguistic multiple criteria decision making aggregation of the IT2FS additions based on t-norms is introduced.
Abstract: Fuzzy addition is one of the operations widely used in the application of fuzzy systems. The analytical and closed form expressions of the fuzzy additions of the generalized fuzzy numbers and the interval type 2 fuzzy numbers (IT2FS) are developed. The generalized fuzzy numbers is a non-flat and subnormal fuzzy number with different left and right shape functions. Classical fuzzy operations based on the minimum t-norm could lead to uncontrollable fuzziness. Fuzzy addition based on generalized t-norm can better control ambiguity. In order to control the ambiguity of fuzzy addition, this paper is to develop a general type 1 fuzzy set and interval type 2 fuzzy set (IT2FS) additions based on t-norm. The closed forms of the generalized IT2FS additions based on some popular t-norms are formulated. The specific analytical and closed form expressions based on Archimedean t-norms: e.g. drastic, Łukasiewicz, product and the families of Schweizer-Sklar and Yager t-norms are derived. The IT2FS are widely used to characterize the natural words, e.g. the decision making linguistic judgments, the fuzzy real time control systems with linguistic rules. Furthermore, based on the analytical T1FS additions results, the application to the linguistic multiple criteria decision making aggregation of the IT2FS additions based on t-norms is introduced. A comparative MCDM numerical example is demonstrated for the verification of the developed closed form expressions.

Proceedings ArticleDOI
28 Sep 2020
TL;DR: A learning system combining multimedia technology and game mechanics based on multimedia andgame mechanics that included a guide module, story module, question module, learning module, feedback module, and scoring module was proposed.
Abstract: This study proposed a learning system combining multimedia technology and game mechanics based on multimedia and game mechanics that included a guide module, story module, question module, learning module, feedback module, and scoring module. These modules were used to guide users who were learning a course. This system could assist users in learning and reviewing the history of Tamsui's development. It was hoped that this system could be used as a teaching aid that allows learners to gain knowledge through games and achieve the effect of teaching and entertainment.

Journal ArticleDOI
TL;DR: In this paper, the authors derived the first-order terms of the discrete approximations, which involve some functionals of the Poisson processes, and then applied Richardson's extrapolation to yield corrected (second-order) approximation.
Abstract: In the literature on scan statistics, the distributions of continuous scan statistics for one-dimensional Poisson processes have been extensively studied, most of which deal with single window scan statistics under homogeneous Poisson processes. In this paper, we consider discrete approximations for the distributions of multiple window scan statistics of homogeneous/nonhomogeneous Poisson processes. We derive the first-order terms of the discrete approximations, which involve some functionals of the Poisson processes. We then apply Richardson’s extrapolation to yield corrected (second-order) approximations. Numerical results are presented to show the accuracy of the approximations.

Journal ArticleDOI
Kai-Chen Hsu1
TL;DR: In this article, the co-ordinated convex function can connect to the right-hand side of Fejér inequality in two variables and thus a new refinement can be found.
Abstract: Abstract In this paper, we shall establish the co-ordinated convex function. It can connect to the right-hand side of Fejér inequality in two variables and thus a new refinement can be found. In addition, some applications to estimates for Euler’s Beta function are also given in the end.