Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 7 )

2019 ( 31 )

2018 ( 59 )

2017 ( 73 )

Custom range...

Search Results: 1 - 10 of 8652 matches for " Alain Yee-Loong Chong "
All listed articles are free for downloading (OA Articles)
Page 1 /8652
Display every page Item
Collaborative Commerce in Supply Chain Management: A study of Adoption Status in Malaysian Electrical and Electronic Industry
Alain Yee-Loong Chong,Keng-Boon Ooi
Journal of Applied Sciences , 2008,
Abstract: The principle objective of this study is to examine the adoption status of Collaborative Commerce (C-Commerce) in the Malaysian Electrical and Electronic (E and E) organizations. Original research using a self-administered questionnaire that was distributed to 400 Malaysian E and E organizations. Data were analyzed by employing descriptive statistics. In general, the adoption level of C-Commerce tools in the Malaysian E and E industry is still considered low with an average mean of 3.011. Based on the tools adopted, most organizations are utilizing C-Commerce for their supply chain execution. Among tools with lower adoption, they are mainly supply chain planning tools such as capacity planning tool and business strategy tool. This research enables organizations to have a better understanding of the current status of C-Commerce adoption level for SCM in the Malaysian E and E industry. This research have addressed previous lack of study in the adoption status of C-Commerce in the Malaysian E and E industry.
Total Quality Management and Knowledge Sharing: Comparing Malaysia’s Manufacturing and Service Organizations
Weng-Choong Cheah,Keng-Boon Ooi,Pei-Lee Teh,Alain Yee-Loong Chong
Journal of Applied Sciences , 2009,
Abstract: The aim of this study was to examine the difference between Malaysian manufacturing and service organizations with regard to the multidimensionality of TQM practices and the relationship of these practices to knowledge sharing behavior from middle management employees’ perspective. The empirical data for this study were collected from 208 middle management employees from Malaysian manufacturing and service organizations with a response rate of 62.01% (129 respondents) from the manufacturing firms and 37.98% (79 respondents) from the service firms. The finding indicated there was no significance difference between Malaysian manufacturing and service organizations in the level of TQM practices and knowledge sharing. The multiple regression analysis also indicated a stronger relationship for manufacturing firms than for service firms between TQM practices and knowledge sharing, particularly in relation to teamwork. Results should be an interest to the TQM managers and practitioners in Malaysia. This finding increased our understanding on the applicability of TQM practices and the association of these practices to knowledge sharing in both Malaysian manufacturing and service organizations. This study has contributed towards advancing the TQM literature with a better understanding of the perception of middle management employees of TQM practices and its association with knowledge sharing in both Malaysian manufacturing and service organizations.
Security Mechanism in Computer Network Environment: A Study of Adoption Status in Malaysian Company
N. Darmawan,A. Yee-Loong Chong,Keng-Boon Ooi,V. A/L Venggadasallam
Journal of Applied Sciences , 2009,
Abstract: The principle objective of this study was to examine the computer network security level of Malaysian companies. Original research using a self-administered questionnaire was distributed to 300 Malaysian companies. Data were analyzed by employing descriptive statistics. In general the adoption level of network security tools in Malaysia is still considered low with an average mean of 3.22. Based on the tools adopted, most of the companies are using common network security tool such as antivirus as their main protection for their computers. Tools that have lower adoption include vulnerability scanner and packet crafting tool. This research enables company to have a better understanding of the network security tools usage in Malaysian companies. This research has addressed previous lack of study in the examination of company’s security level among Malaysian companies. Information Technology (IT) security personnel in Malaysia will also be able to use this result as a guide as to what type of network security tools is generally being employed among their peers. 3.22 of average mean considered low for the security adoption level in Malaysia, it is necessary to the companies to put more focus on this security mechanism field.
Investigations of field instability of ferrofluid in hypergravity and microgravity
Theng Yee Chong,Kent Loong Ho,Boon Hoong Ong
AIP Advances , 2012, DOI: 10.1063/1.3685806
Abstract: The field instability of the free surface of ferrofluid was investigated under microgravity and hypergravity environments conducted by parabolic flight. It is observed that the perturbation was suppressed under hypergravity, whereas at the microgravity condition, it appeared to have only slight increase in the amplitude of the perturbation peaks compared to the case of ground condition. Besides, an observation of peak-trough distance showed that not only the peak, but the trough was also very much dependent on the applied magnetic field. The difference of magnetic pole (north and south) had shown to be a factor to the perturbation as well.
Susuk: Charm needles in orofacial soft tissues  [PDF]
Sathesh Balasundram, Sherrie Chong Mei Yee, P. Shanmuhasuntharam
Open Journal of Stomatology (OJST) , 2013, DOI: 10.4236/ojst.2013.32028

Purpose of the Study: To understand the reasons for charm needle insertions, chemical constituents of charm needles and their significance to magnetic resonance imaging. Materials and Methods: Confidential interviews were used to collect information from charm needle wearers. Two attempts at surgical removal of charm needles were carried out. Charm needle samples were chemically analyzed using EPMA method. A review of literature on the possible complications of charm needles in relation to MRI was made. Results: Patients had varied reasons for wearing charm needles including to be physically attractive, to overcome personal problems and for protection. Charm needles were made of gold alloy consisting of gold (85.2%-88.6%), copper (9.3%-10.8%) and trace elements of aluminium and silver. As such, MRI may not be a hazard to charm needle wearers given the fact that gold is non-ferromagnetic. However, artefacts may potentially distort the MR imaging. Conclusion: A tactful manner in handling these patients may be to ignore the needles unless a clinical need warrants intervention. The surgical removal of these needles may be a straightforward procedure, but the localization is usually a challenging task. At present, the pertinent literature does not contain carefully controlled studies that demonstrate the absolute safety of charm needle exposure to powerful magnetic fields.

Cycloart-24-ene-3β,26-diol from the leaves of Aglaia exima
Khalijah Awang,Xe Min Loong,Khalit Mohamad,Soon Lim Chong
Acta Crystallographica Section E , 2010, DOI: 10.1107/s1600536810029168
Abstract: Cycloart-24-ene-3β,26-diol, C30H50O2, isolated from the leaves of Aglaia exima, has three six-membered rings fused together that adopt chair conformations. There are two independent molecules in the asymmetric unit. O—H...O hydrogen bond interactions between the hydroxyl groups in the 3β and 26 positions lead to the formation of a layer structure parallel to (10overline2).
Metaprobability and Dempster-Shafer in Evidential Reasoning
Robert Fung,Chee Yee Chong
Computer Science , 2013,
Abstract: Evidential reasoning in expert systems has often used ad-hoc uncertainty calculi. Although it is generally accepted that probability theory provides a firm theoretical foundation, researchers have found some problems with its use as a workable uncertainty calculus. Among these problems are representation of ignorance, consistency of probabilistic judgements, and adjustment of a priori judgements with experience. The application of metaprobability theory to evidential reasoning is a new approach to solving these problems. Metaprobability theory can be viewed as a way to provide soft or hard constraints on beliefs in much the same manner as the Dempster-Shafer theory provides constraints on probability masses on subsets of the state space. Thus, we use the Dempster-Shafer theory, an alternative theory of evidential reasoning to illuminate metaprobability theory as a theory of evidential reasoning. The goal of this paper is to compare how metaprobability theory and Dempster-Shafer theory handle the adjustment of beliefs with evidence with respect to a particular thought experiment. Sections 2 and 3 give brief descriptions of the metaprobability and Dempster-Shafer theories. Metaprobability theory deals with higher order probabilities applied to evidential reasoning. Dempster-Shafer theory is a generalization of probability theory which has evolved from a theory of upper and lower probabilities. Section 4 describes a thought experiment and the metaprobability and DempsterShafer analysis of the experiment. The thought experiment focuses on forming beliefs about a population with 6 types of members {1, 2, 3, 4, 5, 6}. A type is uniquely defined by the values of three features: A, B, C. That is, if the three features of one member of the population were known then its type could be ascertained. Each of the three features has two possible values, (e.g. A can be either "a0" or "al"). Beliefs are formed from evidence accrued from two sensors: sensor A, and sensor B. Each sensor senses the corresponding defining feature. Sensor A reports that half of its observations are "a0" and half the observations are 'al'. Sensor B reports that half of its observations are ``b0,' and half are "bl". Based on these two pieces of evidence, what should be the beliefs on the distribution of types in the population? Note that the third feature is not observed by any sensor.
3-D Grid-Based Localization Technique in Mobile Sensor Networks  [PDF]
Jia Li, Lei Sun, Wai Yee Leong, Peter H J Chong
Wireless Sensor Network (WSN) , 2010, DOI: 10.4236/wsn.2010.211100
Abstract: Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wireless sensor network technology. The proposed technique estimates the location of a sensor node based on the current set of hop-count values, which are collected through the anchor nodes’ broadcast. Our algorithm incorporates two salient features; grid-based output and event-triggering mechanism, to improve the accuracy while reducing the power consumption. Through the computer simulation, the output region obtained from our algorithm can always cover the target node. In addition, the algorithm was implemented and tested with a set of Crossbow sensors. Experimental results demonstrated the high feasibility and worked well in real environment.
A Comparison of Stock Market Efficiency of the BRIC Countries  [PDF]
Terence Tai-Leung Chong, Sam Ho-Sum Cheng, Elfreda Nga-Yee Wong
Technology and Investment (TI) , 2010, DOI: 10.4236/ti.2010.14029
Abstract: This article compares the stock market efficiency of Brazil, Russia, India and China (commonly referred to as BRIC). The profitability of trading rules associated with the Simple Moving Average (SMA), the Relative Strength Index (RSI), the Moving Average Convergence Divergence (MACD) and the Momentum (MOM) are evaluated. It is found that these indicators are most profitable in the Russian stock market. The Brazilian stock market is found to be the most efficient market among the BRIC. An explanation for such a discrepancy is provided.
Implementation Study of a Centralized Routing Protocol for Data Acquisition in Wireless Sensor Networks  [PDF]
Trung Hieu Pham, Xue Jun Li, Wai Yee Leong, Peter Han Joo Chong
Wireless Sensor Network (WSN) , 2011, DOI: 10.4236/wsn.2011.35019
Abstract: Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are the main concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as data-centric approach, hierarchical approach and location-based approach, which were designed for a particular application with specific requirements. In this paper, we study the design and implementation of a routing protocol for data acquisition in WSNs. The designed routing protocol is named Centralized Sensor Protocol for Information via Negotiation (CSPIN), which essentially combines the advertise-request-transfer process and a routing distribution mechanism. Implementation is realized and demonstrated with the Crossbow MicaZ hardware using nesC/TinyOS. It was our intention to provide a hand-on study of implementation of centralized routing protocol for WSNs.
Page 1 /8652
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.