Abstract: Emerging adulthood, between the ages of 18 and 25, as a new developmental stage extending from adolescence to young adulthood. According to Arnett [2004], there are experiments related to identity in three basic fields which are love, work and view of the world in emerging adulthood. When the literature related to identity is examined, it is seen that identity has been studied more with adolescent, and studies were concentrated on the relationship of identity with many demographic variables neglecting important variables such as marital status, parental status and SES. Thus, the main aim of this study is to determine whether identity statuses differenciate with marital status, parental status and SES. A total of 700 emerging adults participated in this study, and the mean age was 22,45 years [SD = 3.76]. The sample was made up of 347 female and 353 male. All participants in the study were students from colleges. Student responses to the Extended Version of the Objective Measure of Ego Identity Status [EOM-EIS-2] used to classify students into one of the four identity statuses. SPSS 15.00 program wasa used to analyse data. Percentage, frequency and X2 analysis were used in the analysis of data. When the findings of the study is viewed as a whole, the most frequently observed identity status in the group is found to be moratorium. Also, identity statuses differenciate with marital status, parental status and SES. Findings were discussed in the context of emerging adulthood.
Abstract: Attachment theory focuses on the bond that develops between child and caretaker and the consequences that this bond has on the childs future relationships. Adolescents attempt to define their identity by experiencing various risky behaviors. The first aim of the study was whether risk taking behavior differs according to attachment styles. The second was to examine risk taking behavior differences according to gender. The third aim of this study was to examine attachment X gender interaction effect for risk taking behavior. And final was to investigate attachment styles differences according to gender. Data were collected from 218 participants (114 female and 104 male) who are university students. The results of this study showed that attachment styles differentiated by risk taking behavior and males had higher risk taking score than females. It was also found out that there was significant attachment X gender interaction effect for risk taking behavior. And finally, the results showed that attachment styles differentiated according to gender.KeywordsAttachment style, risk taking
Abstract: The speech signal conveys information about the
identity of the speaker. The area of speaker identification is
concerned with extracting the identity of the person speaking the
utterance. As speech interaction with computers becomes more
pervasive in activities such as the telephone, financial transactions
and information retrieval from speech databases, the utility of
automatically identifying a speaker is based solely on vocal
characteristic. This paper emphasizes on text dependent speaker
identification, which deals with detecting a particular speaker from a
known population. The system prompts the user to provide speech
utterance. System identifies the user by comparing the codebook of
speech utterance with those of the stored in the database and lists,
which contain the most likely speakers, could have given that speech
utterance. The speech signal is recorded for N speakers further the
features are extracted. Feature extraction is done by means of LPC
coefficients, calculating AMDF, and DFT. The neural network is
trained by applying these features as input parameters. The features
are stored in templates for further comparison. The features for the
speaker who has to be identified are extracted and compared with the
stored templates using Back Propogation Algorithm. Here, the
trained network corresponds to the output; the input is the extracted
features of the speaker to be identified. The network does the weight
adjustment and the best match is found to identify the speaker. The
number of epochs required to get the target decides the network
performance.
Abstract: β-Glucosidase is an important enzyme for production
of ethanol from lignocellulose. With hydrolytic activity on
cellooligosaccharides, especially cellobiose, β-glucosidase removes
product inhibitory effect on cellulases and forms fermentable sugars.
In this study, β-glucosidase encoding gene (BGL1) from traditional
starter yeast Saccharomycosis fibuligera BMQ908 was cloned and
expressed in Pichia pastoris. BGL1 of S. fibuligera BMQ 908 shared
98% nucleotide homology with the closest GenBank sequence
(M22475) but identity in amino-acid sequences of catalytic domains.
Recombinant plasmid pPICZαA/BGL1 containing the sequence
encoding BGL1 mature protein and α-factor secretion signal was
constructed and transformed into methylotrophic yeast P. pastoris by
electroporation. The recombinant strain produced single extracellular
protein with molecular weight of 120 kDa and cellobiase activity of
60 IU/ml. The optimum pH of the recombinant β-glucosidase was 5.0
and the optimum temperature was 50°C.
Abstract: Delivering course material via a virtual environment
is beneficial to today-s students because it offers the interactivity,
real-time interaction and social presence that students of all ages
have come to accept in our gaming rich community. It is essential
that the Net Generation also known as Generation Why, have
exposure to learning communities that encompass interactivity to
form social and educational connections. As student and professor
become interconnected through collaboration and interaction in a
virtual learning space, relationships develop and students begin to
take on an individual identity. With this in mind the research project
was developed to investigate the use of virtual environments on
student satisfaction and the effectiveness of course delivery.
Furthermore, the project was designed to integrate both interactive
(real-time) classes conducted in the Virtual Reality (VR)
environment while also creating archived VR sessions for student use
in retaining and reviewing course content.
Abstract: Buildings are considered as significant part in the
cities, which plays main role in organization and arrangement of city
appearance, which is affects image of that building facades, as an
connective between inner and outer space, have a main role in city
image and they are classified as rich image and poor image by people
evaluation which related to visual architectural and urban elements in
building facades. the buildings in Karimi street , in Lahijan city
where, lies in north of Iran, contain the variety of building's facade
types which, have made a city image in Historical part of Lahijan
city, while reflected the Iranian cities identity. The study attempt to
identify the architectural and urban elements that impression the
image of building facades in historical area, based on public
evaluation. Quantitative method were used and the data was collected
through questionnaire survey, the result presented architectural style,
color, shape, and design evaluated by people as most important factor
which should be understate in future development. in fact, the rich
architectural style with strong design make strong city image as weak
design make poor city image.
Abstract: Multiple sequence alignment is a fundamental part in
many bioinformatics applications such as phylogenetic analysis.
Many alignment methods have been proposed. Each method gives a
different result for the same data set, and consequently generates a
different phylogenetic tree. Hence, the chosen alignment method
affects the resulting tree. However in the literature, there is no
evaluation of multiple alignment methods based on the comparison of
their phylogenetic trees. This work evaluates the following eight
aligners: ClustalX, T-Coffee, SAGA, MUSCLE, MAFFT, DIALIGN,
ProbCons and Align-m, based on their phylogenetic trees (test trees)
produced on a given data set. The Neighbor-Joining method is used
to estimate trees. Three criteria, namely, the dNNI, the dRF and the
Id_Tree are established to test the ability of different alignment
methods to produce closer test tree compared to the reference one
(true tree). Results show that the method which produces the most
accurate alignment gives the nearest test tree to the reference tree.
MUSCLE outperforms all aligners with respect to the three criteria
and for all datasets, performing particularly better when sequence
identities are within 10-20%. It is followed by T-Coffee at lower
sequence identity (30%), trees scores of all methods
become similar.
Abstract: Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Abstract: In the given article the creative arts is being
investigated in the modern era and from the aspect of the artistic
interrelationship, having created by the character of his personality
and as the viewer. A study in the identity formation terms, the
definition of its being unique, unity and similarity as a global issue of
the XXI century has been conducted by the analyzing the definitions
which characterize the human nature in the arts. Spiritual universality
and human existence have been considered in the art system as a
human who is a creator, as the man hero and as the character who is
the recipient as well as the analyses which have been conducted
along with the worldwide cultural and historical processes.
Abstract: There is a real threat on the VIPs personal pages on
the Social Network Sites (SNS). The real threats to these pages is
violation of privacy and theft of identity through creating fake pages
that exploit their names and pictures to attract the victims and spread
of lies. In this paper, we propose a new secure architecture that
improves the trusting and finds an effective solution to reduce fake
pages and possibility of recognizing VIP pages on SNS. The
proposed architecture works as a third party that is added to
Facebook to provide the trust service to personal pages for VIPs.
Through this mechanism, it works to ensure the real identity of the
applicant through the electronic authentication of personal
information by storing this information within content of their
website. As a result, the significance of the proposed architecture is
that it secures and provides trust to the VIPs personal pages.
Furthermore, it can help to discover fake page, protect the privacy,
reduce crimes of personality-theft, and increase the sense of trust and
satisfaction by friends and admirers in interacting with SNS.
Abstract: The Block Sorting problem is to sort a given
permutation moving blocks. A block is defined as a substring
of the given permutation, which is also a substring of the
identity permutation. Block Sorting has been proved to be
NP-Hard. Until now two different 2-Approximation algorithms
have been presented for block sorting. These are the best known
algorithms for Block Sorting till date. In this work we present
a different characterization of Block Sorting in terms of a
transposition cycle graph. Then we suggest a heuristic,
which we show to exhibit a 2-approximation performance
guarantee for most permutations.
Abstract: In policy discourse of 1990s, more inclusive spaces
have been constructed for realizing full and meaningful participation
of common people in education. These participatory spaces provide
an alternative possibility for universalizing elementary education
against the backdrop of a history of entrenched forms of social and
economical exclusion; inequitable education provisions; and
shrinking role of the state in today-s neo-liberal times. Drawing on
case-studies of bottom-up approaches to school governance, the study
examines an array of innovative ways through which poor people
gained a sense of identity and agency by evolving indigenous
solutions to issues regarding schooling of their children. In the
process, state-s institutions and practices became more accountable
and responsive to educational concerns of the marginalized people.
The deliberative participation emerged as an active way of
experiencing deeper forms of empowerment and democracy than its
passive realization as mere bearers of citizen rights.
Abstract: The paper presents an analysis of linkages and
structures of co-operation and their intensity like the potential for the
establishment of clusters in the Central and Eastern (Pannonian)
Croatian. Starting from the theoretical elaboration of the need for
entrepreneurs to organize through the cluster model and the terms of
their self-actualization, related to the importance of traditional values
in terms of benefits, social capital and assess where the company now
is, in order to prove the need to create their own identity in terms of
clustering. The institutional dimensions of social capital where the
public sector has the best role in creating the social structure of
clusters, and social dimensions of social capital in terms of trust,
cooperation and networking will be analyzed to what extent the trust
and coherency are present between companies in the Brod posavina
and Pozega slavonia County, expressed through the readiness of
inclusion in clusters in the NUTS II region - Central and Eastern
(Pannonian) Croatia, as a homogeneous economic entity, with
emphasis on limiting factors that stand in the way of greater
competitiveness.
Abstract: A wide spectrum of systems require reliable
personal recognition schemes to either confirm or determine the
identity of an individual person. This paper considers multimodal
biometric system and their applicability to access control,
authentication and security applications. Strategies for feature
extraction and sensor fusion are considered and contrasted. Issues
related to performance assessment, deployment and standardization
are discussed. Finally future directions of biometric systems
development are discussed.
Abstract: Possible advantages of technology in educational
context required the defining boundaries of formal and informal
learning. Increasing opportunity to ubiquitous learning by
technological support has revealed a question of how to discover
the potential of individuals in the spontaneous environments such as
social networks. This seems to be related with the question of what
purposes in social networks have been being used? Social networks
provide various advantages in educational context as collaboration,
knowledge sharing, common interests, active participation and
reflective thinking. As a consequence of these, the purpose of this
study is composed of proposing a new model that could determine
factors which effect adoption of social network applications for usage
in educational context. While developing a model proposal, the
existing adoption and diffusion models have been reviewed and they
are thought to be suitable on handling an original perspective instead
of using completely other diffusion or acceptance models because of
different natures of education from other organizations. In the
proposed model; social factors, perceived ease of use, perceived
usefulness and innovativeness are determined four direct constructs
that effect adoption process. Facilitating conditions, image,
subjective norms and community identity are incorporated to model
as antecedents of these direct four constructs.
Abstract: Reducing the risk of information leaks is one of
the most important functions of identity management systems. To
achieve this purpose, Dey et al. have already proposed an account
management method for a federated login system using a blind
signature scheme. In order to ensure account anonymity for the
authentication provider, referred to as an IDP (identity provider),
a blind signature scheme is utilized to generate an authentication
token on an authentication service and the token is sent to an IDP.
However, there is a problem with the proposed system. Malicious
users can establish multiple accounts on an IDP by requesting such
accounts. As a measure to solve this problem, in this paper, the
authors propose an account checking method that is performed before
account generation.
Abstract: In films, visual effects have played the role of
expressing realities more realistically or describing imaginations as if
they are real. Such images are immediated images representing
realism, and the logic of immediation for the reality of images has
been perceived dominant in visual effects. In order for immediation to
have an identity as immediation, there should be the opposite concept
hypermediation.
In the mid 2000s, hypermediated images were settled as a code of
mass culture in Asia. Thus, among Asian films highly popular in those
days, this study selected five displaying hypermediated images – 2 Korean, 2 Japanese, and 1 Thailand movies – and examined the
semiotic meanings of such images using Roland Barthes- directional and implicated meaning analysis and Metz-s paradigmatic analysis
method, focusing on how hypermediated images work in the general
context of the films, how they are associated with spaces, and what
meanings they try to carry.
Abstract: This research aimed to study the competency of health
and wellness hotels and resorts in developing use the local natural
resources and wisdom to conform to the national health and wellness
tourism (HWT) strategy by comparing two independent samples,
from Aumpur Muang, Ranong province and Aumpur Muang,
Chiangmai province. And also study in the suggestive direct path to
lead the organization to the sustainable successful.
This research was conduct by using mix methodology; both
quantitative and qualitative data were used. The data of competency
of health and wellness hotels and resorts (HWHR) in developing use
the local natural resources for HWT promoting were collected via
300 set of questionnaires, from 6 hotels and resorts in 2 areas, 3
places from Aumpur Muang, Ranong province and another 3 from
Aumpur Muang, Chiangmai province.
Thestudy of HWHR’s competency in developing use the local
natural resources and wisdom to conform to the national HWT
strategycan be divided into fourmain areas, food and beverages
service, tourism activity, environmental service, and value adding.
The total competency of the Chiangmai sample is importantly
scoredp. value 0.01 higher than the Ranong one while the area of
safety, Chiangmai’s competency is importantly scored 0.05 higher
than the Ranong’scompetency. Others were rated not differently.
Since Chiangmai perform better, then it can be a role model in
developing HTHR or HWT destination.
From the part of qualitative research, content analysis of business
contents and its environments were analyzed. The four stages of
strategic development and plans, from the smallest scale to the largest
scale such a national base were discussed. The HWT: Evolution
model and strategy for lodging Business were suggested. All those
stages must work harmoniously together. The distinctive result
illustrates the need of human resource development as the key point
to create the identity of Thainess on Health and wellness service
providing. This will add-on the value of services and differentiates
ourselves from other competitors. The creative of Thailand’s health
and wellness brand possibly increase loyalty customers which agreed
to be a path of sustainable development.
Abstract: Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples- personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can arise through undisciplined use and/or misuse of social media. We specifically address identity theft, misrepresentation of information posted, cyber bullying, children and social networking, and social networking in the work place. Recommendations are provided for how to reduce the risk of being the victim of a crime or engaging in embarrassing behavior that could irrevocably harm one-s reputation either professionally or personally. We also discuss what responsibilities social networking companies have to protect their users and also what law enforcement and policy makers can do to help alleviate the problems.
Abstract: This paper aims to address the new trend of social
commerce as electronic commerce leverages Web 2.0 technologies
and online social media. The infusions of new technologies on the
World Wide Web connect users in their homes and workplaces,
thus transforming social formations and business transactions. An
in-depth study of the growth and success of a social commerce site,
Facebook was conducted. The investigation is finalized with a triad
relational model which reflects socioeconomic life in the Internet
today. The following three concepts work jointly to form a global
community that has already started to take the place of traditional
commerce and socialization: Web 2.0 technology, E-commerce,
and online social media. A discussion of the research findings
indicates that social commerce networks are sustainable because of
the various incentives given to users as they collaborate with others
regardless of their identity and location. The focus of this article is
to increase understanding on quickly developing Web 2.0 based
social media and their subsequent effects on the emerging social
commerce.