International Student Recruitment in Higher Education: A Comparative Study of the Countries in the Middle East

Historical and ancestral bonds of the countries in the Middle East have led to similarities in culture and context of their societies. In addition, economical resources, such as the oil industry, have generally been an integrative point in the region. Higher education of a country is influenced by different national and international factors and, regarding the mentioned bonds, it is inviting to study the development of the countries of the Middle East in higher education and draw some practical implications which can be used in the educational policymaking of the region. This review includes a data analysis on the population of international students in the countries of the Middle East. As its second objective, a review study on the successful countries, that is, those which host the highest number of international students, and the strategies they have developed to reach this state among the countries of the region, has been conducted. Suggestions are made as to the strategies in higher education systems of these countries which could prove useful and practical in the development of internationalization of higher education in the region, specifically with regard to the recruitment of international students.

Combined Automatic Speech Recognition and Machine Translation in Business Correspondence Domain for English-Croatian

The paper presents combined automatic speech recognition (ASR) of English and machine translation (MT) for English and Croatian and Croatian-English language pairs in the domain of business correspondence. The first part presents results of training the ASR commercial system on English data sets, enriched by error analysis. The second part presents results of machine translation performed by free online tool for English and Croatian and Croatian-English language pairs. Human evaluation in terms of usability is conducted and internal consistency calculated by Cronbach's alpha coefficient, enriched by error analysis. Automatic evaluation is performed by WER (Word Error Rate) and PER (Position-independent word Error Rate) metrics, followed by investigation of Pearson’s correlation with human evaluation.

Component Lifecycle and Concurrency Model in Usage Control (UCON) System

Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.

Exploiting Kinetic and Kinematic Data to Plot Cyclograms for Managing the Rehabilitation Process of BKAs by Applying Neural Networks

Kinematic data wisely correlate vector quantities in space to scalar parameters in time to assess the degree of symmetry between the intact limb and the amputated limb with respect to a normal model derived from the gait of control group participants. Furthermore, these particular data allow a doctor to preliminarily evaluate the usefulness of a certain rehabilitation therapy. Kinetic curves allow the analysis of ground reaction forces (GRFs) to assess the appropriateness of human motion. Electromyography (EMG) allows the analysis of the fundamental lower limb force contributions to quantify the level of gait asymmetry. However, the use of this technological tool is expensive and requires patient’s hospitalization. This research work suggests overcoming the above limitations by applying artificial neural networks.

A New Method to Estimate the Low Income Proportion: Monte Carlo Simulations

Estimation of a proportion has many applications in economics and social studies. A common application is the estimation of the low income proportion, which gives the proportion of people classified as poor into a population. In this paper, we present this poverty indicator and propose to use the logistic regression estimator for the problem of estimating the low income proportion. Various sampling designs are presented. Assuming a real data set obtained from the European Survey on Income and Living Conditions, Monte Carlo simulation studies are carried out to analyze the empirical performance of the logistic regression estimator under the various sampling designs considered in this paper. Results derived from Monte Carlo simulation studies indicate that the logistic regression estimator can be more accurate than the customary estimator under the various sampling designs considered in this paper. The stratified sampling design can also provide more accurate results.

The Application of Hybrid Orthonomal Bernstein and Block-Pulse Functions in Finding Numerical Solution of Fredholm Fuzzy Integral Equations

In this paper, we have proposed a numerical method for solving fuzzy Fredholm integral equation of the second kind. In this method a combination of orthonormal Bernstein and Block-Pulse functions are used. In most cases, the proposed method leads to the exact solution. The advantages of this method are shown by an example and calculate the error analysis.

Influence of Pomegranate (Punica granatum L.) on Dimethoate Induced Hepatotoxicity in Rats

Pomegranate (Punica granatum L.) is an ancient fruit of great medical interest and rich source of antioxidants. Pesticides as dimethoate play a crucial role in the occurrence many diseases in plants, animal and human. Therefore the ability of Pomegranate (Punica granatum L.) to alleviate hepatotoxicity induced by organophosphate pesticide dimethoate was investigated. Albino male rats were divided randomly into 4 groups and kept at 7 animals per group in an environmentally controlled condition for 6 weeks. The first group was served as a control group (basal diet), the second group fed on basal diet supplemented with 5% freeze dried pomegranate seeds, the third group fed on 20 ppm dimethoate contaminated diet and the last group fed on dimethoate contaminated diet supplemented with 5% freeze dried pomegranate seeds. The results revealed that administration of dimethoate caused high significant increased in liver functions: alanine aminotransferase (ALT), aspartate aminotransferase (AST), alkaline phosphatase (ALP) activities as well as lipid peroxide (malonaldhyde, MDA); on the other hand high significant decreased on glutathione (GSH), glutathione peroxidase (GPx), albumin and total protein were observed. However addition of 5% freeze dried pomegranate seeds significantly improved all previously mentioned parameters. These results indicate the dimethoate induced hepatotoxicity and highlight the protective effect of pomegranate seeds as a potential protective agent against dimethoate induced hepatotoxicity. This may be attributed to the powerful antioxidants (polyphenols, total phenols, and total flavonoids) which present in high levels in pomegranate as well as improving the immunity by activation of antioxidant enzymes GSH and GPx.

Application of the Experimental Planning Design to the Notched Precracked Tensile Fracture of Composite

Composite materials have important assets compared to traditional materials. They bring many functional advantages: lightness, mechanical resistance and chemical, etc. In the present study we examine the effect of a circular central notch and a precrack on the tensile fracture of two woven composite materials. The tensile tests were applied to a standardized specimen, notched and a precarcked (orientation of the crack 0°, 45° and 90°). These tensile tests were elaborated according to an experimental planning design of the type 23.31 requiring 24 experiments with three repetitions. By the analysis of regression, we obtained a mathematical model describing the maximum load according to the influential parameters (hole diameter, precrack length, angle of a precrack orientation). The specimens precracked at 90° have a better behavior than those having a precrack at 45° and still better than those having of the precracks oriented at 0°. In addition the maximum load is inversely proportional to the notch size.

3D Guidance of Unmanned Aerial Vehicles Using Sliding Mode Approach

This paper presents a 3D guidance scheme for Unmanned Aerial Vehicles (UAVs). The proposed guidance scheme is based on the sliding mode approach using nonlinear sliding manifolds. Generalized 3D kinematic equations are considered here during the design process to cater for the coupling between longitudinal and lateral motions. Sliding mode based guidance scheme is then derived for the multiple-input multiple-output (MIMO) system using the proposed nonlinear manifolds. Instead of traditional sliding surfaces, nonlinear sliding surfaces are proposed here for performance and stability in all flight conditions. In the reaching phase control inputs, the bang-bang terms with signum functions are accompanied with proportional terms in order to reduce the chattering amplitudes. The Proposed 3D guidance scheme is implemented on a 6-degrees-of-freedom (6-dof) simulation of a UAV and simulation results are presented here for different 3D trajectories with and without disturbances.

Effect of Humidity on in-Process Crystallization of Lactose during Spray Drying

The effect of various humidities on process yields and degrees of crystallinity for spray-dried powders from spray drying of lactose with humid air in a straight-through system have been studied. It has been suggested by Williams–Landel–Ferry kinetics (WLF) that a higher particle temperature and lower glass-transition temperature would increase the crystallization rate of the particles during the spray-drying process. Freshly humidified air produced by a Buchi-B290 spray dryer as a humidifier attached to the main spray dryer decreased the particle glass-transition temperature (Tg), while allowing the particle temperature (Tp) to reach higher values by using an insulated drying chamber. Differential scanning calorimetry (DSC) and moisture sorption analysis were used to measure the degree of crystallinity for the spray-dried lactose powders. The results showed that higher Tp-Tg, as a result of applying humid air, improved the process yield from 21 ± 4 to 26 ± 2% and crystallinity of the particles by decreasing the latent heat of crystallization from 43 ± 1 to 30 ± 11 J/g and the sorption peak height from 7.3 ± 0.7% to 6 ± 0.7%.

Transformations between Bivariate Polynomial Bases

It is well known, that any interpolating polynomial p (x, y) on the vector space Pn,m of two-variable polynomials with degree less than n in terms of x and less than m in terms of y, has various representations that depends on the basis of Pn,m that we select i.e. monomial, Newton and Lagrange basis e.t.c.. The aim of this short note is twofold : a) to present transformations between the coordinates of the polynomial p (x, y) in the aforementioned basis and b) to present transformations between these bases.

An Investigation of Performance versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Meanwhile, the licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disabled and cloud platform is enabled.

“Moves” for Guiding Presentations in French

Despite four years of study in the tourism industry, the Bachelor’s graduates cannot perform their jobs as experienced tour guides. This research aimed to develop French teaching and studying for Tourism with two main purposes: to analyze ‘Moves’ used in oral presentations at tourist attraction; and to study content in guiding presentations or 'Guide Speak'. The study employed audio recording of these presentations as an interview method in authentic situations, having four tour guides as respondents and information providers. The data was analyzed via moves and content analysis. The results found that there were eight Moves used; namely, Welcoming, Introducing oneself, Drawing someone’s attention, Giving information, Explaining, Highlighting, Persuading and Saying goodbye. In terms of content, the information being presented covered the outstanding characteristics of the places and wellintegrated with other related content. The findings were used as guidelines for curriculum development; in particular, the core content and the presentation forming the basis for students to meet the standard requirements of the labor-market and professional schemes.

Analytical Study on the Shape of T-type Girder Modular Bridge Connection by Using Parameter

Recently, to cope with the rapidly changing construction trend with aging infrastructures, modular bridge technology has been studied actively. Modular bridge is easily constructed by assembling standardized precast structure members in the field. It will be possible to construct rapidly and reduce construction cost efficiently. However, the shape of the transverse connection of T-type girder newly developed between the segmented modules is not verified. Therefore, the verification of the connection shape is needed. In this study, shape of the modular T-girder bridge transverse connection was analyzed by finite element model that was verified in study which was verified model of transverse connection using Abaqus. Connection angle was chosen as the parameter. The result of analyses showed that optimal value of angle is 130 degree.

Identification of Spam Keywords Using Hierarchical Category in C2C E-commerce

Consumer-to-Consumer (C2C) E-commerce has been growing at a very high speed in recent years. Since identical or nearly-same kinds of products compete one another by relying on keyword search in C2C E-commerce, some sellers describe their products with spam keywords that are popular but are not related to their products. Though such products get more chances to be retrieved and selected by consumers than those without spam keywords, the spam keywords mislead the consumers and waste their time. This problem has been reported in many commercial services like ebay and taobao, but there have been little research to solve this problem. As a solution to this problem, this paper proposes a method to classify whether keywords of a product are spam or not. The proposed method assumes that a keyword for a given product is more reliable if the keyword is observed commonly in specifications of products which are the same or the same kind as the given product. This is because that a hierarchical category of a product in general determined precisely by a seller of the product and so is the specification of the product. Since higher layers of the hierarchical category represent more general kinds of products, a reliable degree is differently determined according to the layers. Hence, reliable degrees from different layers of a hierarchical category become features for keywords and they are used together with features only from specifications for classification of the keywords. Support Vector Machines are adopted as a basic classifier using the features, since it is powerful, and widely used in many classification tasks. In the experiments, the proposed method is evaluated with a golden standard dataset from Yi-han-wang, a Chinese C2C E-commerce, and is compared with a baseline method that does not consider the hierarchical category. The experimental results show that the proposed method outperforms the baseline in F1-measure, which proves that spam keywords are effectively identified by a hierarchical category in C2C E-commerce.

Airport Investment Risk Assessment under Uncertainty

The construction of a new airport or the extension of an existing one requires massive investments and many times public private partnerships were considered in order to make feasible such projects. One characteristic of these projects is uncertainty with respect to financial and environmental impacts on the medium to long term. Another one is the multistage nature of these types of projects. While many airport development projects have been a success, some others have turned into a nightmare for their promoters. This communication puts forward a new approach for airport investment risk assessment. The approach takes explicitly into account the degree of uncertainty in activity levels prediction and proposes milestones for the different stages of the project for minimizing risk. Uncertainty is represented through fuzzy dual theory and risk management is performed using dynamic programming. An illustration of the proposed approach is provided.

Predictor Factors for Treatment Failure among Patients on Second Line Antiretroviral Therapy

Second line antiretroviral therapy (ART) regimen is used when patients fail their first line regimen. There are many factors such as non-adherence, drug resistance as well as virological and immunological failure that lead to second line highly active antiretroviral therapy (HAART) regimen treatment failure. This study was aimed at determining predictor factors to treatment failure with second line HAART and analyzing median survival time. An observational, retrospective study was conducted in Sungai Buloh Hospital (HSB) to assess current status of HIV patients treated with second line HAART regimen. Convenience sampling was used and 104 patients were included based on the study’s inclusion and exclusion criteria. Data was collected for six months i.e. from July until December 2013. Data was then analysed using SPSS version 18. Kaplan-Meier and Cox regression analyses were used to measure median survival times and predictor factors for treatment failure. The study population consisted mainly of male subjects, aged 30- 45 years, who were heterosexual, and had HIV infection for less than 6 years. The most common second line HAART regimen given was lopinavir/ritonavir (LPV/r)-based combination. Kaplan-Meier analysis showed that patients on LPV/r demonstrated longer median survival times than patients on indinavir/ritonavir (IDV/r) based combination (p

Isolation and Identification Fibrinolytic Protease Endophytic Fungi from Hibiscus Leaves in Shah Alam

Fibrin degradation is an important part in prevention or treatment of intravascular thrombosis and cardiovascular diseases. Plasmin like fibrinolytic enzymes has given new hope to patient with cardiovascular diseases by treating fibrin aggregation related diseases with traditional plasminogen activator which have many side effects. Various researches involving wide range of sources for production of fibrinolytic proteases, from bacteria, fungi, insects and fermented foods. But few have looked into endophytic fungi as a potential source. Sixteen (16) endophytic fungi were isolated from Hibiscus sp. leaves from six different locations in Shah Alam, Selangor. Only two endophytic fungi, FH3 and S13 showed positive fibrinolytic protease activities. FH3 produced 5.78cm and S13 produced 4.48cm on Skim Milk Agar after 4 days of incubation at 27°C. Fibrinolytic activity was observed; 3.87cm and 1.82cm diameter clear zone on fibrin plate of FH3 and S13 respectively. 18srRNA was done for identification of the isolated fungi with positive fibrinolytic protease. S13 had the highest similarity (100%) to that of Penicillium citrinum strain TG2 and FH3 had the highest similarity (99%) to that of Fusarium sp. FW2PhC1, Fusarium sp. 13002, Fusarium sp. 08006, Fusarium equiseti strain Salicorn 8 and Fungal sp. FCASAn-2. Media composition variation showed the effects of carbon nitrogen on protein concentration, where the decrement of 50% of media composition caused drastic decrease in protease of FH3 from 1.081 to 0.056 and also S13 from 2.946 to 0.198.

Stock Market Prediction by Regression Model with Social Moods

This paper presents a regression model with autocorrelated errors in which the inputs are social moods obtained by analyzing the adjectives in Twitter posts using a document topic model, where document topics are extracted using LDA. The regression model predicts Dow Jones Industrial Average (DJIA) more precisely than autoregressive moving-average models.

An Optimal Bayesian Maintenance Policy for a Partially Observable System Subject to Two Failure Modes

In this paper, we present a new maintenance model for a partially observable system subject to two failure modes, namely a catastrophic failure and a failure due to the system degradation. The system is subject to condition monitoring and the degradation process is described by a hidden Markov model. A cost-optimal Bayesian control policy is developed for maintaining the system. The control problem is formulated in the semi-Markov decision process framework. An effective computational algorithm is developed, illustrated by a numerical example.