Abstract: The aim of this paper is to understand how peers can
influence adolescent girls- dieting behaviour and their body image.
Departing from imitation and social learning theories, we study
whether adolescent girls tend to model their peer group dieting
behaviours, thus influencing their body image construction. Our
study was conducted through an enquiry applied to a cluster sample
of 466 adolescent high school girls in Lisbon city public schools. Our
main findings point to an association between girls- and peers-
dieting behaviours, thus reinforcing the modelling hypothesis.
Abstract: The productivity of software development is one of the major concerns for project managers. Given the increasing complexity of the software being developed and the concomitant rise in the typical project size, the productivity has not consistently improved. By analyzing the latest release of ISBSG data repository with 4106 projects ever developed, we report on the factors found to significantly influence productivity, and present an original model for the estimation of productivity during project design. We further illustrate that software development productivity has experienced irregular variations between the years 1995 and 2005. Considering the factors significant to productivity, we found its variations are primarily caused by the variations of average team size for the development and the unbalanced use of the less productive development language 3GL.
Abstract: Mankind has entered into an extremely complex and
controversial stage of its development: the world is simultaneously
organized and chaoticized, globalized and localized, combined and
split. Analysts point out that globalization as a process of
strengthening economic, cultural, financial and other ties of states
cause many problems. In the economic sphere, it creates the danger
of growing gap between the states, in the sphere of politics it leads to
the weakening of political power and influence of nation-states.
Abstract: The purpose of this article is to study the effects of
plants cover on overland flow and, therefore, its influences on the
amount of eroded and transported soil. In this investigation, all the
experiments were conducted in the LEGHYD laboratory using a
rainfall simulator and a soil tray. The experiments were conducted
using an experimental plot (soil tray) which is 2m long, 0.5 m wide
and 0.15 m deep. The soil used is an agricultural sandy soil (62,08%
coarse sand, 19,14% fine sand, 11,57% silt and 7,21% clay). Plastic
rods (4 mm in diameter) were used to simulate the plants at different
densities: 0 stem/m2 (bared soil), 126 stems/m², 203 stems/m², 461
stems/m² and 2500 stems/m²). The used rainfall intensity is 73mm/h
and the soil tray slope is fixed to 3°. The results have shown that the
overland flow velocities decreased with increasing stems density, and
the density cover has a great effect on sediment concentration.
Darcy–Weisbach and Manning friction coefficients of overland flow
increased when the stems density increased. Froude and Reynolds
numbers decreased with increasing stems density and, consequently,
the flow regime of all treatments was laminar and subcritical. From
these findings, we conclude that increasing the plants cover can
efficiently reduce soil loss and avoid denuding the roots plants.
Abstract: Compaction testing methods allow at-speed detecting
of errors while possessing low cost of implementation. Owing to this
distinctive feature, compaction methods have been widely used for
built-in testing, as well as external testing. In the latter case, the
bandwidth requirements to the automated test equipment employed
are relaxed which reduces the overall cost of testing. Concurrent
compaction testing methods use operational signals to detect
misbehavior of the device under test and do not require input test
stimuli. These methods have been employed for digital systems only.
In the present work, we extend the use of compaction methods for
concurrent testing of analog-to-digital converters. We estimate
tolerance bounds for the result of compaction and evaluate the
aliasing rate.
Abstract: Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.
Abstract: The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.
Abstract: 'Secure routing in Mobile Ad hoc networks' and
'Internet connectivity to Mobile Ad hoc networks' have been dealt
separately in the past research. This paper proposes a light weight
solution for secure routing in integrated Mobile Ad hoc Network
(MANET)-Internet. The proposed framework ensures mutual
authentication of Mobile Node (MN), Foreign Agent (FA) and Home
Agent (HA) to avoid various attacks on global connectivity and
employs light weight hop-by-hop authentication and end-to-end
integrity to protect the network from most of the potential security
attacks. The framework also uses dynamic security monitoring
mechanism to monitor the misbehavior of internal nodes. Security
and performance analysis show that our proposed framework
achieves good security while keeping the overhead and latency
minimal.
Abstract: This paper provides a replacement policy for warranty products with different failure rate from the consumer-s viewpoint. Assume that the product is replaced once within a finite planning horizon, and the failure rate of the second product is lower than the failure rate of the first product. Within warranty period (WP), the failed product is corrected by minimal repair without any cost to the consumers. After WP, the failed product is repaired with a fixed repair cost to the consumers. However, each failure incurs a fixed downtime cost to the consumers over a finite planning horizon. In this paper, we derive the model of the expected total disbursement cost within a finite planning horizon and some properties of the optimal replacement policy under some reasonable conditions are obtained. Finally, numerical examples are given to illustrate the features of the optimal replacement policy under various maintenance costs.
Abstract: This paper aims at identifying and analyzing the
knowledge transmission channels in textile and clothing clusters
located in Brazil and in Europe. Primary data was obtained through
interviews with key individuals. The collection of primary data was
carried out based on a questionnaire with ten categories of indicators
of knowledge transmission. Secondary data was also collected
through a literature review and through international organizations
sites. Similarities related to the use of the main transmission channels
of knowledge are observed in all cases. The main similarities are:
influence of suppliers of machinery, equipment and raw materials;
imitation of products and best practices; training promoted by
technical institutions and businesses; and cluster companies being
open to acquire new knowledge. The main differences lie in the
relationship between companies, where in Europe the intensity of this
relationship is bigger when compared to Brazil. The differences also
occur in importance and frequency of the relationship with the
government, with the cultural environment, and with the activities of
research and development. It is also found factors that reduce the
importance of geographical proximity in transmission of knowledge,
and in generating trust and the establishment of collaborative
behavior.
Abstract: This paper describes the architecture for a collaborative Car Pooling System based on a credits mechanism to motivate the cooperation among users. Users can spend the accumulated credits on parking facilities. For this, we propose a business model to support the collaboration between a car pooling system and parking facilities. The Portuguese Lisbon-s Metropolitan area is used as application scenario.
Abstract: As mobile ad hoc networks (MANET) have different
characteristics from wired networks and even from standard wireless
networks, there are new challenges related to security issues that
need to be addressed. Due to its unique features such as open nature,
lack of infrastructure and central management, node mobility and
change of dynamic topology, prevention methods from attacks on
them are not enough. Therefore intrusion detection is one of the
possible ways in recognizing a possible attack before the system
could be penetrated. All in all, techniques for intrusion detection in
old wireless networks are not suitable for MANET. In this paper, we
classify the architecture for Intrusion detection systems that have so
far been introduced for MANETs, and then existing intrusion
detection techniques in MANET presented and compared. We then
indicate important future research directions.
Abstract: The White Kwao (Pueraria mirifica), a potent phytoestrogenic medicinal plant, has long been use in Thailand as a traditional folkmedicine. However, no scientific information of the direct effect of White Kwao on the development of mammalian embryo was available. Therefore, the purpose of this study was to investigate the effect of White Kwao extract on the in vitro development and implantation rate of mouse embryos. This study was designed into two experiments. In the first experiment, the two-cell stage mouse embryos were collected from the oviduct of superovulated mature female mice, and randomly cultured in three different media, the M16, M16 supplemented with 0.52μg esthinylestradiol-17β, and M16 supplemented with 10 mg/ml White Kwao extract. The culture was incubated in CO2 incubator at 37 oC . After the embryos were cultivated, the developments of embryos were observed every 24 hours for 5 days. The development rate of embryos from the two-cell stage to blastocyst stage in the media was with White Kwao was significantly higher (p
Abstract: The primary objective of this study is to test whether
there is any difference in performance between funded and nonfunded
registered charity organizations. In this study, performance as
the dependent variable is measured using total donations. Using a
sample of 101 charity organizations registered with the Registry of
Society, analysis of variance (ANOVA) results indicate that there is a
difference in financial performance between funded and non-funded
charity organizations. The study provides empirical evidence to
resource providers and the policy makers in scrutinizing the decision
to disburse their funds and resources to these charity organizations.
Abstract: Least Significant Bit (LSB) technique is the earliest
developed technique in watermarking and it is also the most simple,
direct and common technique. It essentially involves embedding the
watermark by replacing the least significant bit of the image data with
a bit of the watermark data. The disadvantage of LSB is that it is not
robust against attacks. In this study intermediate significant bit (ISB)
has been used in order to improve the robustness of the watermarking
system. The aim of this model is to replace the watermarked image
pixels by new pixels that can protect the watermark data against
attacks and at the same time keeping the new pixels very close to the
original pixels in order to protect the quality of watermarked image.
The technique is based on testing the value of the watermark pixel
according to the range of each bit-plane.
Abstract: In the article the historical formation of interethnic and
interconfessional agreement policy in Kazakhstan and their
developing features at present time will be analyzed.
The successfully pursued by Kazakhstan at the present in the
direction of ethnic and confessional policy is regarded as a major
factor in promoting stability for the country.
Abstract: Ventricular fibrillation is a very important health
problem as is the cause of most of the sudden deaths in the world.
Waves of electrical activity are sent by the SA node, propagate
through the cardiac tissue and activate the mechanisms of cell
contraction, and therefore are responsible to pump blood to the body
harmonically. A spiral wave is an abnormal auto sustainable wave
that is responsible of certain types of arrhythmias. When these waves
break up, give rise to the fibrillation regime, in which there is a
complete loss in the coordination of the contraction of the heart
muscle. Interaction of spiral waves and obstacles is also of great
importance as it is believed that the attachment of a spiral wave to an
obstacle can provide with a transition of two different arrhythmias.
An obstacle can be partially excitable or non excitable. In this talk,
we present a numerical study of the interaction of meandering spiral
waves with partially and non excitable obstacles and focus on the
problem where the obstacle plays a fundamental role in the switch
between different spiral regimes, which represent different
arrhythmic regimes. Particularly, we study the phenomenon of
destabilization of spiral waves due to the presence of obstacles, a
phenomenon not completely understood (This work will appear as a
Chapter in a Book named Cardiac Arrhytmias by INTECH under the
name "Spiral Waves, Obstacles and Cardiac Arrhythmias", ISBN
979-953-307-050-5.).
Abstract: Machine Translation (MT 3) of English text to its Urdu equivalent is a difficult challenge. Lot of attempts has been made, but a few limited solutions are provided till now. We present a direct approach, using an expert system to translate English text into its equivalent Urdu, using The Unicode Standard, Version 4.0 (ISBN 0-321-18578-1) Range: 0600–06FF. The expert system works with a knowledge base that contains grammatical patterns of English and Urdu, as well as a tense and gender-aware dictionary of Urdu words (with their English equivalents).
Abstract: Geographic Information System (GIS) is a computerbased
tool used extensively to solve various engineering problems
related to spatial data. In spite of growing popularity of GIS, its
complete potential to construction industry has not been realized. In
this paper, the summary of up-to-date work on spatial applications of
GIS technologies in construction industry is presented. GIS
technologies have the potential to solve space related problems of
construction industry involving complex visualization, integration of
information, route planning, E-commerce, cost estimation, etc. GISbased
methodology to handle time and space issues of construction
projects scheduling is developed and discussed in this paper.
Abstract: Internal controls of accounting are an essential
business function for a growth-oriented organization, and include the
elements of risk assessment, information communications and even
employees' roles and responsibilities. Internal controls of accounting
systems are designed to protect a company from fraud, abuse and
inaccurate data recording and help organizations keep track of
essential financial activities. Internal controls of accounting provide a
streamlined solution for organizing all accounting procedures and
ensuring that the accounting cycle is completed consistently and
successfully. Implementing a formal Accounting Procedures Manual
for the organization allows the financial department to facilitate
several processes and maintain rigorous standards. Internal controls
also allow organizations to keep detailed records, manage and
organize important financial transactions and set a high standard for
the organization's financial management structure and protocols. A
well-implemented system also reduces the risk of accounting errors
and abuse. A well-implemented controls system allows a company's
financial managers to regulate and streamline all functions of the
accounting department. Internal controls of accounting can be set up
for every area to track deposits, monitor check handling, keep track
of creditor accounts, and even assess budgets and financial statements
on an ongoing basis. Setting up an effective accounting system to
monitor accounting reports, analyze records and protect sensitive
financial information also can help a company set clear goals and
make accurate projections. Creating efficient accounting processes
allows an organization to set specific policies and protocols on
accounting procedures, and reach its financial objectives on a regular
basis. Internal accounting controls can help keep track of such areas
as cash-receipt recording, payroll management, appropriate recording
of grants and gifts, cash disbursements by authorized personnel, and
the recording of assets. These systems also can take into account any
government regulations and requirements for financial reporting.