scispace - formally typeset
Search or ask a question

Showing papers by "Tainan University of Technology published in 2017"


Journal ArticleDOI
TL;DR: In this article, a novel, value-driven approach was applied to evaluate experiential value as the antecedent for food tourism in Tainan, a Taiwanese historical city with many street vendors selling traditional foods.
Abstract: Although food tourism has been characterized as an emerging industry, studies of branding in food tourism are limited. This work applies a novel, value-driven approach to evaluate experiential value as the antecedent for branding food tourism. The research setting is Tainan: a Taiwanese historical city with many street vendors selling traditional foods. Data were collected only from Taiwanese residents. Empirical results reveal that one type of experiential value, consumer return on investment (CROI), can significantly enhance a place's food image. Place food image then, in turn, significantly affects a tourist's behavioral intentions toward food tourism. Based on the findings, the study makes a theoretical contribution to examining experiential values in food tourism by identifying CROI as a key antecedent of place food image. The study also makes practical recommendations for branding food tourism in a given destination.

219 citations


Journal ArticleDOI
23 Jun 2017-Sensors
TL;DR: An improved secure authentication and data encryption scheme for the IoT-based medical care system is presented, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks, and is more efficient in performance compared with previous related schemes.
Abstract: In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

92 citations


Journal ArticleDOI
TL;DR: In this paper, an integrated model was developed to examine the causal relationship among transformational leadership behaviors, leader-member exchange (LMX), psychological contract breach and turnover intention in Taiwan's tourist hotel industry.
Abstract: Purpose This study aims to explore the high turnover intention issue in Taiwan’s tourist hotel industry Due to a lack of empirical research regarding front-line employees’ psychological contract breach perceptions in tourism literature, this study develops an integrated model to examine the causal relationship among transformational leadership behaviors, leader–member exchange (LMX), psychological contract breach and turnover intentions Design/methodology/approach Data from the 226 frontline employees in Taiwan’s tourist hotel industry were employed to examine the proposed hypotheses by using a series of structural equation modeling analyses Findings Statistic results revealed that transformational leadership behaviors influence LMX and LMX in turn influences psychological contract breach, which consequently leads to lower turnover intention Practical implication The results of this study suggest that hospitality organizations should recruit individuals who have the potential to exhibit transformational leadership skills, along with designing leadership training programs for middle- and high-level managers Originality/value This study provides hospitality organization leaders with the necessary information to formulate a beneficial relationship with their front-line employees, which, in turn, weakens their perception of psychological contract breaches and reduces their willingness to leave the organization

82 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigated the relationship among the students' learning motivation, off-campus internship efficacy, career decision self-efficacy, and career preparations, and found that students' motivation positively and significantly influenced internship efficacy.
Abstract: Efficient student internships are essential for appropriate career preparations to ensure a smooth transition to their professions after graduation. Therefore, this study aimed to investigate the relationship among the students’ learning motivation, off-campus internship efficacy, career decision self-efficacy, and career preparations. Stratified sampling was used to recruit graduating university students from Taiwan as participants and 613 valid questionnaires were returned. The results indicate that students’ learning motivation positively and significantly influenced internship efficacy, and that career decision self-efficacy exerts a complete mediating effect between internship efficacy and career preparation. Practical implementations and suggestions are also addressed at the end of the article.

41 citations


Journal ArticleDOI
TL;DR: In order to repair shortcomings existing in Chen et al.
Abstract: Recently, the sport of mountaineering is a popular leisure activity and many people may injure while mountaineering. In the year of 2014, Chen et al. suggested a cloud-based emergency response and SOS system for mountaineering travelers when they encounter dangers. Chen et al. claimed that their proposed system is secure against various known attacks and the executive performance of the system is reasonable when the protocol is implemented on the traveler’s mobile device. However, in this paper, we discover that Chen et al. ’s scheme is unable to protect the privacy of mountaineering travelers and the vulnerability allows a malicious attacker to spy on the electronic medical records of all mountaineering travelers by launching eavesdropping attacks. Moreover, Chen et al. ’s scheme is vulnerable to off-line password guessing attack when the mobile device of the mountaineering traveler is lost or stolen by an attacker. In order to repair these shortcomings existing in Chen et al. ’s scheme, we suggest an improved version of their scheme, which is provably secure in the random oracle model under the DDH and CDH problems.

35 citations


Journal ArticleDOI
TL;DR: This article developed a career anxiety scale for tourism and hospitality graduates before they enter the labor market to understand problems related to career choices that may be encountered by tourism and tourism graduates before their entry into the workforce.
Abstract: To understand problems related to career choices that may be encountered by tourism and hospitality graduates before they enter the labor market, we developed a career anxiety scale for tourism and...

27 citations


Journal Article
TL;DR: The findings reveal that the use of certain music, such as Mozart K.488, can be a potential tool to enhance reading outcomes when using e-books and that the music had a negative effect on the students’ attention for their interpretation process.
Abstract: Some music has been proved effectively to mitigate anxiety, beneficial to reading. However, little was known on its influence of reading behaviors and outcomes. Thanks to the advance of e-book technology, it becomes possible to track reading rate and outcomes in a real-time manner by the underlying mobile devices. This study intends to examine the effects of the Mozart piece K.448 (sonata for two pianos in D major) on the learning anxiety, reading rates and reading comprehension of students for reading e-books. The quasi-experimental design was applied, and 62 senior grade elementary school students participated in this experiment. The results showed that when compared with a silent task (reading without the music), this piece of Mozart’s music had positive effect in reducing learning anxiety, and improving the students’ reading rates, reading comprehension and direct process performance. However, we found that the music had a negative effect on the students’ attention for their interpretation process. We inferred that this Mozart’s music might take part of attention resource. This was supported by the increase of students’ extraneous load while listening to Mozart music, which led to the insufficient concentration in the interpretation and the evaluation of content. Overall, the findings reveal that the use of certain music, such as Mozart K.488, can be a potential tool to enhance reading outcomes when using e-books.

26 citations


Journal ArticleDOI
01 Dec 2017
TL;DR: This study has developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems that differs in that it needs no authority.
Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity’s public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems. Although the new scheme works pretty much the same way as regular certificate-based techniques, it differs in that it needs no authority. Taking the password/secret key pair as the certificate of public key for an entity, the new key authentication technique is very simple but profoundly secure.

23 citations


Journal ArticleDOI
TL;DR: In this article, the quantum Hall effects in sliding bilayer graphene and a AAB-stacked trilayer system are investigated using the Kubo formula and a generalized tight-binding model.
Abstract: The quantum Hall effects in sliding bilayer graphene and a AAB-stacked trilayer system are investigated using the Kubo formula and a generalized tight-binding model. The various stacking configurations can greatly diversify the magnetic quantization and thus create rich and unique transport properties. The quantum conductivities are very sensitive to the Fermi energy and magnetic-field strength. The diverse features cover the specific non-integer conductivities, the integer conductivities with distinct steps, the splitting-created reduction and complexity of quantum conductivity, a vanishing or non-zero conductivity at the neutral point, and the well-like, staircase, composite, and abnormal plateau structures in the field dependencies. Such stacking-dependent characteristics mainly originate from the crossing, anticrossing and splitting Landau-level energy spectra and three kinds of quantized modes.

21 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigated the dynamics of multi-quality attributes towards satisfaction from the perspective of mainland China incentive travelers by identifying quality attributes as frustrators, dissatisfiers, hybrids, satisfiers, and delighters, and prioritizing attributes for the purpose of effective satisfaction management.

19 citations


Journal ArticleDOI
TL;DR: The present study introduces VR, AR, and MR applications in medical practice and education with the aim of helping health professionals better understand the applications and use these technologies to improve the quality of medical care.
Abstract: As technology advances, mobile devices have gradually turned into wearable devices. Furthermore, virtual reality (VR), augmented reality (AR), and mixed reality (MR) are being increasingly applied in medical fields such as medical education and training, surgical simulation, neurological rehabilitation, psychotherapy, and telemedicine. Research results demonstrate the ability of VR, AR, and MR to ameliorate the inconveniences that are often associated with traditional medical care, reduce incidents of medical malpractice caused by unskilled operations, and reduce the cost of medical education and training. What is more, the application of these technologies has enhanced the effectiveness of medical education and training, raised the level of diagnosis and treatment, improved the doctor-patient relationship, and boosted the efficiency of medical execution. The present study introduces VR, AR, and MR applications in medical practice and education with the aim of helping health professionals better understand the applications and use these technologies to improve the quality of medical care.

Journal ArticleDOI
TL;DR: A new location algorithm that uses time- of-arrival measurements to improve the mobile station location accuracy when three base stations are available and performs better than the related algorithms in wireless positioning systems, even in severe non-line-of-sight propagation conditions.
Abstract: Because there are always non-line-of-sight effects in signal propagation, researchers have proposed various algorithms to mitigate the measured error caused by non-line-of-sight. Initially inspired...

Journal ArticleDOI
TL;DR: In this paper, the authors investigated the effects of three initial public offering (IPO) methods-namely, fixed-price, auction, and bookbuilding, on post-IPO performance and the trading behavior of institutional investors.

Book ChapterDOI
20 Mar 2017
TL;DR: It is demonstrated that Wu et al.
Abstract: Recently, Wu et al. proposed a secure channel free searchable encryption (SCF-PEKS) scheme which not only can guard against keyword guessing and record disclosure attacks but also can provide much better performance than other related scheme for shareable EMRs. However, in this paper, we demonstrated that Wu et al.’s SCF-PEKS scheme has some design flaws and security weaknesses such as (1) it fails to ensure the properties of message authentication and untraceability, (2) it fails to prevent the malicious outsider from forging a fake EMR as the sender, (3) it fails to prevent the privileged cloud insider from revealing sender’s secret keyword and sensitive record. The aforementioned security flaws in Wu et al.’s scheme may lead to privacy exposure and the receiver misled the contents of this fake record.

Proceedings ArticleDOI
01 May 2017
TL;DR: In this article, the authors make an attempt to interpret the words and lyrics of poem and song as the cultural element extraction source, through the deep understanding and unearth of the content, to establish a new approach on cultural creative design.
Abstract: In this article making an attempt to interpret the words and lyrics of poem and song as the cultural element extraction source, through the deep understanding and unearth of the content, to establish a new approach on cultural creative design. In the case of Taiwan's well-known lyricist and writer, Mr. Vincent Fang (Fang Wen Shan) and mandopop (Mandarin popular music) singer Jay Chou's (Chou JieLun) song “Lan-ting Xu”, which the song and lyric was inspired from the original poem of “The Orchid Pavilion” (Lantingji Xu) by Wang Xizhi (Chinese: 王羲之, AD303-361). The author draws elements from the original background of the song, the content of the lyrics and the performance of the genre, making the whole new designs for cultural creative products meaningfully and consumer finds familiar with.

Journal ArticleDOI
TL;DR: In this paper, a Semantic-Topological-Geometric (STG) pattern is proposed to guide architects in composing algorithms for representing, modeling, and validating design knowledge and criteria.
Abstract: Generative modeling tools have become a popular means of composing algorithms to generate complex building forms at the conceptual design stage. However, composing algorithms in order to meet the requirements of general design criteria, and communicating those criteria with other disciplines by means of generative algorithms still faces many technical challenges. This paper proposes the use of a “Semantic-Topological-Geometric (STG)” pattern to guide architects in composing algorithms for representing, modeling, and validating design knowledge and criteria. The STG pattern can help architects to convert semantic information concerning the conditions and requirements of a project into design criteria, which are usually composed of topological relations among design elements, in order to explore the geometric properties of spaces and building components by means of generated 3D models.

Journal ArticleDOI
TL;DR: This paper presents a meta-modelling framework that automates the very labor-intensive and therefore time-heavy and therefore expensive process of designing and implementing generative algorithms.
Abstract: Although algorithmic modeling tools have become a popular means of generating complex geometric forms, the potential of generative algorithms should not be limited to geometric intentions. However,...

Book ChapterDOI
20 Mar 2017
TL;DR: It is found that Chiou et al.
Abstract: Recently, Chiou et al. proposed a secure authentication scheme which not only ensures message confidentiality and patient anonymity but also provides real telemedicine system implementation. However, in this paper, we found that Chiou et al.’s telemedicine scheme has some security weaknesses such as (1) it fails to protect the confidentiality of patient’s inspection report and doctor’s treatment record, (2) it fails to provide the property of unlinkability. The above-mentioned design flaws in Chiou et al.’s scheme may lead to privacy exposure and malicious outsider can link and discover the sensitive relationship between the patient and the doctor.

Journal ArticleDOI
TL;DR: An information fusion method that can detect data inconsistency in the early stages of data fusion and minimizes the probability of errors from incorrect results for multi-robot operations, for which fusion is conducted continuously.
Abstract: Purpose The historical data usually consist of overlapping reports, and these reports may contain inconsistent data, which may return incorrect results of a query search. Moreover, users who issue the query may not learn of this inconsistency even after a data cleaning process (e.g. schema matching or data screening). The inconsistency can exist in different types of data, such as temporal or spatial data. Therefore, this paper aims to introduce an information fusion method that can detect data inconsistency in the early stages of data fusion. Design/methodology/approach This paper introduces an information fusion method for multi-robot operations, for which fusion is conducted continuously. When the environment is explored by multiple robots, the robot logs can provide more information about the number and coordination of targets or victims. The information fusion method proposed in this paper generates an underdetermined linear system of overlapping spatial reports and estimates the case values. Then, the least squares method is used for the underdetermined linear system. By using these two methods, the conflicts between reports can be detected and the values of the intervals at specific times or locations can be estimated. Findings The proposed information fusion method was tested for inconsistency detection and target projection of spatial fusion in sensor networks. The proposed approach examined the values of sensor data from simulation that robots perform search tasks. This system can be expanded to data warehouses with heterogeneous data sources to achieve completeness, robustness and conciseness. Originality/value Little research has been devoted to the linear systems for information fusion of tasks of mobile robots. The proposed information fusion method minimizes the cost of time and comparison for data fusion and also minimizes the probability of errors from incorrect results.

Journal ArticleDOI
TL;DR: It is suggested that physicians liberally use computed tomography scans on patients with unknown causes of pain and inflammatory processes, and a combination of surgical and medical treatments is indicated for all patients with infected aortic and iliac aneurysms.
Abstract: BACKGROUND Accurate diagnosis of infected aortic and iliac aneurysms is often delayed, hampering timely treatment and potentially resulting in a fatal consequence. The aim of this study was to discover useful clinical features that can help physicians to identify these patients. METHODS We reviewed the discharge notes from two hospitals and identified all patients who had a diagnosis of infected aneurysms of the thoracoabdominal aorta and iliac arteries between July 2009 and December 2013. Eighteen patients, aged from 41 to 93, were reviewed. Only 6 patients were diagnosed accurately in their first visit to our ED. RESULTS Most patients had at least one underlying illness, and it took 1 to 30 (9.9±6.5) days for physicians to diagnose their infected aneurysm. Localized pain and fever were the two most commonly presented symptoms. The majority (92%) of isolated microorganisms were gram-negative bacilli, including Salmonella spp, Klebsiella pneumoniae, and Escherichia coli. Two of the 3 patients who underwent non-operative therapy died, and all of the patients who underwent a combination of medical and operative therapies survived. CONCLUSION We suggest that physicians liberally use computed tomography scans on patients with unknown causes of pain and inflammatory processes. A combination of surgical and medical treatments is indicated for all patients with infected aortic and iliac aneurysms.

Posted Content
TL;DR: In this article, the existence and stability of Dirac nodal lines in three-dimensional layered systems was studied, where each layer individually has Dirac points protected by chiral symmetry.
Abstract: We study the existence and stability of Dirac nodal lines in three-dimensional layered systems, whose layers individually have Dirac nodal points protected by chiral (sublattice) symmetry. The model system we consider is the rhombohedral stack of graphene layers with each layer subjected to a uniform external potential that respects either AIII or BDI classes. From the Hamiltonians in either classes, a pair of nontrivial spiraling Dirac nodal lines can be derived. The results are reasonable in accord to the topological classification of gapless phases for codimension $2$. The nodal lines approach each other as the magnitude of the potential increases, revealing their annihilation due to the fact that regarding the full system their topological invariants are cancelled out.

Journal ArticleDOI
TL;DR: Simulation results show that the proposed algorithms can always provide much better location estimation than Taylor series algorithm, hybrid lines of position algorithm as well as the geometrical positioning methods for different levels of biased, unbiased, and distance-dependent non-line-of-sight errors.
Abstract: To enhance the effectiveness and accuracy of mobile station location estimation, author utilizes time of arrival measurements from three base stations and one angle of arrival information at the serving base station to locate mobile station in non-line-of-sight environments. This article makes use of linear lines of position, rather than circular lines of position, to give location estimation of the mobile station. It is much easier to solve two linear line equations rather than nonlinear circular ones. Artificial neural networks are widely used techniques in various areas due to overcoming the problem of exclusive and nonlinear relationships. The proposed algorithms employ the intersections of three linear lines of position and one angle of arrival line, based on Levenburg–Marquardt algorithm, to determine the mobile station location without requiring a priori information about the non-line-of-sight error. The simulation results show that the proposed algorithms can always provide much better location es...

Book ChapterDOI
09 Jul 2017
TL;DR: The design elements of 2D and 3D icons, including icon composition, border, polarity, shade, and shadow, are extracted comprehensively to serve as a practical and scholarly reference in the field of icon design in the future.
Abstract: Due to the rise of the app market, icon design is highly valuable to app marketing. Currently, with a wide range of icons in the main menu, users can not immediately identify their needed interface or function, thus encountering operational problems. In the past, almost all relevant studies mainly focused on visual recognizability and shape features of 2D icons, not on those of 3D icons. Therefore, this study probed comprehensively into the design elements of 2D and 3D icons. The design elements include icon composition, border, polarity, shade, and shadow. After that, the design elements of 2D and 3D icons were extracted which may serve as a practical and scholarly reference in the field of icon design in the future.

Journal ArticleDOI
01 Aug 2017
TL;DR: In this paper, a collaborative research project for the supply and logistics of fresh agricultural products in Tianjin was performed, where the model-driven business transformation, an approach uses formal models to explicitly define the structure and behavior of a business, is applied for the review and analysis process.
Abstract: Issues and concerns for food safety, agro-processing, and the environmental and ecological impact of food production have been attracted many research interests. Traceability and logistics management of fresh agricultural products is faced with the technological challenges including food product label and identification, activity/process characterization, information systems for the supply chain, i.e., from farm to table. Application of one-stop logistics service focuses on the whole supply chain process integration for fresh agricultural products is studied. A collaborative research project for the supply and logistics of fresh agricultural products in Tianjin was performed. Requirement analysis for the one-stop logistics management information system is studied. The model-driven business transformation, an approach uses formal models to explicitly define the structure and behavior of a business, is applied for the review and analysis process. Specific requirements for the logistic management solutions are proposed. Development of this research is crucial for the solution of one-stop logistics management information system integration platform for fresh agricultural products.

Book ChapterDOI
09 Jul 2017
TL;DR: The results of this study provide an alternative assessment of the development and sightseeing of urban corridors in terms of urban comfort, which are based on the sound field comfort.
Abstract: In recent years, Taiwan’s public transport infrastructures at all levels have improved and enhanced public convenience which is including the airport, high-speed railway, metropolitan rapid train (MRT), and so on. The aircraft channel location and highway plane elevated, the formation of the connected trail system and open recreation spaces can provide people holiday gathering and recreation of the important field. The NIMBY effect of the noise in the public open space along the traffic facilities is not reduced, it is the best choice for another area of residents’ gathering and recreation on the contrary. For the urban traffic corridor along the adjacent channel system and open space, to the urban soundscape theory as the basis, through the time, energy and space and other factors for the exploring the sound energy distribution of the sound field. In this study, objective physical measurements were taken as an evaluation method, and the equivalent sound level LAeq (dB) was used to monitor the field, and the sound energy distribution map was drawn from the point, line and region. This paper discusses the relationship between subjective physical measurement and objective evaluations and tries to construct an important exposition of urban soundscape as the research theme of the next stage. The results of this study provide an alternative assessment of the development and sightseeing of urban corridors in terms of urban comfort, which are based on the sound field comfort.

Proceedings ArticleDOI
01 May 2017
TL;DR: In this paper, the authors proposed related opinions for the theory based on the analysis of and discussions on documents and data, and integrated the product life cycle with the industrial and industrialization theory to construct the life cycle model of cultural creative product industrialization.
Abstract: The study aimed to probe into the establishment of the product life cycle model of cultural creative product industrialization. It proposed related opinions for the theory based on the analysis of and discussions on documents and data. Moreover, based on the results of case study and in-depth interviews, the study integrated the product life cycle with the industrial and industrialization theory to construct the life cycle model of cultural creative product industrialization. The characteristics of cultural creative product industrialization in each management stage and meanings behind it could be comprehended through the model, and it can serve as references for enterprises in designing and developing cultural creative products and in planning management strategies. The findings of the study are as follows: (1) The concept of integrating cultural creative product industrialization with the product life cycle was feasible as each industrialization stage of products could be probed into in depth to adjust strategies to adapt to the change of environment, (2) The product life cycle process of cultural creative product industrialization chiefly includes introduction stage, growth stage, maturity stage and decline stage; (3) The strategies of each stage of the product life cycle: “introduction stage—innovation and creativity-oriented,” “growth stage—quality maintenance and product diversity-oriented,” “maturity stage—product renewal and new product development-oriented;” “decline stage—product function improvement-oriented.”


Proceedings ArticleDOI
01 May 2017
TL;DR: The real benefits of the digital narrative in different materials reacting in the audience are researched, thus providing the feedback the focus points of giving correct determination and selection in creating related digital audio and video works.
Abstract: The narrative messages of digital media are delivered to the audience through “video,” “voice,” “text,” and other materials. In this article, two issues for the three materials-“video,” “voice,” and “text”- are explored by two experimental methods respectively; two experimental data can also be mutually compared to clarify experimental results. In the first part, the strength comparison of narrative benefits of three materials used in digital media is explored. In the second part, whether there are interaction and associated benefits between each other when the three materials are used in narrative is studied. It is the real benefits of the digital narrative in different materials reacting in the audience are researched, thus providing the feedback the focus points of giving correct determination and selection in creating related digital audio and video works.

Proceedings ArticleDOI
01 Oct 2017
TL;DR: A novel method with M-sequence code in optical code-division multiple-access (OCDMA) network, called pseudo-random number mapping/coding (PRNMC) algorithm, includes chaos equation, HCC/EHCC algorithm, two mapping methods.
Abstract: A novel method with M-sequence code in optical code-division multiple-access (OCDMA) network, called pseudo-random number mapping/coding (PRNMC) algorithm, includes chaos equation, HCC/EHCC algorithm, two mapping methods. An approximately symmetric scheme is used to transmit and receive the secret key in private channel from encoder to decoder. By combining those algorithms appropriately, the security of network is increased and reduces the probability of eavesdropping of codeword.