Abstract: One of the main concerns in the Information Technology field is adoption with new technologies in organizations which may result in increasing the usage paste of these technologies.This study aims to look at the issue of culture-s role in accepting and using new technologies in organizations. The study examines the effect of culture on accepting and intention to use new technology in organizations. Studies show culture is one of the most important barriers in adoption new technologies. The model used for accepting and using new technology is Technology Acceptance Model (TAM), while for culture and dimensions a well-known theory by Hofsted was used. Results of the study show significant effect of culture on intention to use new technologies. All four dimensions of culture were tested to find the strength of relationship with behavioral intention to use new technologies. Findings indicate the important role of culture in the level of intention to use new technologies and different role of each dimension to improve adaptation process. The study suggests that transferring of new technologies efforts are most likely to be successful if the parties are culturally aligned.
Abstract: In the management of industrial waste, conversion from the use of paper invoices to electronic forms is currently under way in developed countries. Difficulties in such computerization include the lack of synchronization between the actual goods and the corresponding data managed by the server. Consequently, a system which utilizes the incorporation of a QR code in connection with the waste material has been developed. The code is read at each stage, from discharge until disposal, and progress at each stage can be easily reported. This system can be linked with Japanese public digital authentication service of waste, taking advantage of its good points, and can be used to submit reports to the regulatory authorities. Its usefulness was confirmed by a verification test, and put into actual practice.
Abstract: The purpose of this research is to disentangle and
validate the underlying factorial-structure of Ecotourism Experiential
Value (EEV) measurement scale and subsequently investigate its
psychometric properties. The analysis was based on a sample of 225
eco-tourists, collected at the vicinity of Taman Negara National Park
(TNNP) via interviewer-administered questionnaire. Exploratory
factor analysis (EFA) was performed to determine the factorial
structure of EEV. Subsequently, to confirm and validate the factorial
structure and assess the psychometric properties of EEV,
confirmatory factor analysis (CFA) was executed. In addition, to
establish the nomological validity of EEV a structural model was
developed to examine the effect of EEV on Total Eco-tourist
Experience Quality (TEEQ). It is unveiled that EEV is a secondorder
six-factorial structure construct and it scale has adequately met
the psychometric criteria, thus could permit interpretation of results
confidently. The findings have important implications for future
research directions and management of ecotourism destination.
Abstract: In this paper, some brief sufficient conditions for the stability of FO-LTI systems dαx(t) dtα = Ax(t) with the fractional order are investigated when the matrix A and the fractional order α are uncertain or both α and A are uncertain, respectively. In addition, we also relate the stability of a fractional-order system with order 0 < α ≤ 1 to the stability of its equivalent fractional-order system with order 1 ≤ β < 2, the relationship between α and β is presented. Finally, a numeric experiment is given to demonstrate the effectiveness of our results.
Abstract: This paper examines the implementation of RC5 block cipher for digital images along with its detailed security analysis. A complete specification for the method of application of the RC5 block cipher to digital images is given. The security analysis of RC5 block cipher for digital images against entropy attack, bruteforce, statistical, and differential attacks is explored from strict cryptographic viewpoint. Experiments and results verify and prove that RC5 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC5 block cipher algorithm.
Abstract: A new technique to quantify the differential mode
delay (DMD) in multimode fiber (MMF) is been presented. The
technique measures DMD based on angular launch and
measurements of the difference in modal delay using variable
apertures at the fiber face. The result of the angular spatial filtering
revealed less excitation of higher order modes when the laser beam is
filtered at higher angles. This result would indicate that DMD
profiles would experience a data pattern dependency.
Abstract: With the development of the Polyvinyl chloride
(PVC) products in many applications, the challenge of investigating
the raw material composition and reducing the cost have both
become more and more important. Considerable research has been
done investigating the effect of additives on the PVC products. Most
of the PVC composites research investigates only the effect of
single/few factors, at a time. This isolated consideration of the input
factors does not take in consideration the interaction effect of the
different factors. This paper implements a mixture experimental
design approach to find out a cost-effective PVC composition for the
production of electrical-insulation cables considering the ASTM
Designation (D) 6096. The results analysis showed that a minimum
cost can be achieved through using 20% virgin PVC, 18.75%
recycled PVC, 43.75% CaCO3 with participle size 10 microns, 14%
DOP plasticizer, and 3.5% CPW plasticizer. For maximum UTS the
compound should consist of: 17.5% DOP, 62.5% virgin PVC, and
20.0% CaCO3 of particle size 5 microns. Finally, for the highest
ductility the compound should be made of 35% virgin PVC, 20%
CaCO3 of particle size 5 microns, and 45.0% DOP plasticizer.
Abstract: This study investigated the ecological effects of
particulate pollution from a cement factory on the vegetation in the
western Mediterranean coastal desert of Egypt. Variations in
vegetation, soil chemical characters, and some responses of Atriplex
halimus, as a dominant species in the study area, were investigated in
some sites located in different directions from the cement factory
between Burg El-Arab in the east and El-Hammam in the west. The
results showed an obvious decrease in vegetation diversity, in
response to cement-kiln dust pollution, that accompanied by a high
dominance attributed to the high contribution of Atriplex halimus.
Annual species were found to be more sensitive to cement dust
pollution as they all failed to persist in highly disturbed sites. It is
remarkable that cover and phytomass of Atriplex halimus were
increased greatly in response to cement dust pollution, and this was
accompanied by a reduction in the mature seeds and leaf-area of the
plant. The few seeds of the affected individuals seemed to be more
fertile and attained higher germination percentages and exhibited
hardening against drought stress.
Abstract: UML is a collection of notations for capturing a software system specification. These notations have a specific syntax defined by the Object Management Group (OMG), but many of their constructs only present informal semantics. They are primarily graphical, with textual annotation. The inadequacies of standard UML as a vehicle for complete specification and implementation of real-time embedded systems has led to a variety of competing and complementary proposals. The Real-time UML profile (UML-RT), developed and standardized by OMG, defines a unified framework to express the time, scheduling and performance aspects of a system. We present in this paper a framework approach aimed at deriving a complete specification of a real-time system. Therefore, we combine two methods, a semiformal one, UML-RT, which allows the visual modeling of a realtime system and a formal one, CSP+T, which is a design language including the specification of real-time requirements. As to show the applicability of the approach, a correct design of a real-time system with hard real time constraints by applying a set of mapping rules is obtained.
Abstract: Bacillus subtilis strain LB5 produced lipopeptide
antibiotic iturin A-2 in liquid medium. Crude extract
from cell-free supernatant of B. subtilis cultivated broth extracted
with n-butanol showed antifungal activity to conidial germination of
Colletotrichum gloeosporioides. The germination of conidia was
completely inhibited by crude extract. The ultrastructure of conidia
after treated with crude extract was found an accumulation of vesiclelike
material between cell wall and plasma membrane while this
accumulation was not observed in untreated and germinated conidia.
Besides, the cell wall was not affected by crude extract.
Abstract: In this paper, The T-G-action topology on a set acted
on by a fuzzy T-neighborhood (T-neighborhood, for short) group is
defined as a final T-neighborhood topology with respect to a set of
maps. We mainly prove that this topology is a T-regular Tneighborhood
topology.
Abstract: The present work deals with the calculation of
transport properties of Hg0.8Cd0.2Te (MCT) semiconductor in
degenerate case. Due to their energy-band structure, this material
becomes degenerate at moderate doping densities, which are around
1015 cm-3, so that the usual Maxwell-Boltzmann approximation is
inaccurate in the determination of transport parameters. This problem
is faced by using Fermi-Dirac (F-D) statistics, and the non-parabolic
behavior of the bands may be approximated by the Kane model. The
Monte Carlo (MC) simulation is used here to determinate transport
parameters: drift velocity, mean energy and drift mobility versus
electric field and the doped densities. The obtained results are in
good agreement with those extracted from literature.
Abstract: This paper presents a forgetting factor scheme for variable step-size affine projection algorithms (APA). The proposed scheme uses a forgetting processed input matrix as the projection matrix of pseudo-inverse to estimate system deviation. This method introduces temporal weights into the projection matrix, which is typically a better model of the real error's behavior than homogeneous temporal weights. The regularization overcomes the ill-conditioning introduced by both the forgetting process and the increasing size of the input matrix. This algorithm is tested by independent trials with coloured input signals and various parameter combinations. Results show that the proposed algorithm is superior in terms of convergence rate and misadjustment compared to existing algorithms. As a special case, a variable step size NLMS with forgetting factor is also presented in this paper.
Abstract: Information and communication technology (ICT) is
essential to the operation of business, and create many employment
opportunities. High volumes of students graduate in ICT however
students struggle to find job placement. A discrepancy exists between
graduate skills and industry skill requirements. To address the need
for ICT skills required, universities must create programs to meet the
demands of a changing ICT industry. This requires a partnership
between industry, universities and other stakeholders. This situation
may be viewed as a critical systems thinking problem situation as
there are various role players each with their own needs and
requirements. Jackson states a typical critical systems methods has a
pluralistic nature. This paper explores the applicability and suitability
of Maslow and Dooyeweerd to guide understanding and make
recommendations for change in ICT WIL, to foster an all-inclusive
understanding of the situation by stakeholders. The above methods
provide tools for understanding softer issues beyond the skills
required. The study findings suggest that besides skills requirements,
a deeper understanding and empowering students from being a
student to a professional need to be understood and addressed.
Abstract: The functional response of an infective is the relationship
between an infected individual-s infection rate and the abundance
of the number of susceptibles that one can potentially be infected.
In this paper, we consider defensive attitudes for HIV prevention
(primary prevention) while at the same time emphasizing on offensive
attitudes that reduce infection for those infected (secondary prevention).
We look at how defenses can protect an uninfected individual
in the case where high risk groups such as commercial sex workers
and those who deliberately go out to look for partners. We propose
an infection cycle that begins with a search, then an encounter,
a proposal and contact. The infection cycle illustrates the various
steps an infected individual goes through to successfully infect a
susceptible. For heterogeneous transmission of HIV, there will be no
infection unless there is contact. The ability to avoid an encounter,
detection, proposal and contact constitute defense.
Abstract: VRML( The virtual reality modeling language) is a standard language used to build up 3D virtualized models. The quick development of internet technology and computer manipulation has promoted the commercialization of reality virtualization. VRML, thereof, is expected to be the most effective framework of building up virtual reality. This article has studied plans to build virtualized scenes based on the technology of virtual reality and Java programe, and introduced how to execute real-time data transactions of VRML file and Java programe by applying Script Node, in doing so we have the VRML interactivity being strengthened.
Abstract: Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very few works have discussed on the issues responsible for secure data communication and its robustness improvement. The current paper has critically analyzed few such factors namely properties of spreading codes, proper signal decomposition suitable for data embedding, security provided by the key, successive bit cancellation method applied at decoder which have greater impact on the detection reliability, secure communication of significant signal under camouflage of insignificant signals etc. Based on the analysis, robust SS watermarking scheme for secure data communication is proposed in wavelet domain and improvement in secure communication and robustness performance is reported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data.
Abstract: Contamination of heavy metals represents one of the
most pressing threats to water and soil resources as well as human
health. Phytoremediation can be potentially used to remediate metalcontaminated
sites. A major step towards the development of
phytoremediation of heavy metal impacted soils is the discovery of
the heavy metal hyperaccumulation in plants. In this study, the
several established criteria to define a hyperaccumulator plant were
applied. The case study was represented by a mining area in
Hamedan province in the central west part of Iran. Obtained results
showed that the most of sampled species were able to grow on
heavily metal-contaminated soils and also were able to accumulate
extraordinarily high concentrations of some metals such as Zn, Mn,
Cu, Pb and Fe. Using the most common criteria, Euphorbia
macroclada and Centaurea virgata can be classified as
hyperaccumulators of some measured heavy metals and, therefore,
they have suitable potential for phytoremediation of contaminated
soils.
Abstract: In the context of business incubation (BI) as strategic
enablers, this paper critically reviews the literature relating to the
strategic benefits of BI in the Middle East. The taxonomy of BI
benefits in the strategic elements on 1) type, 2) financial model, 3)
services, 4) objectives, 5) number of clients, 6) number of graduates,
and 7) jobs creation. Understanding the importance of BI benefits can
be significant in the economic development although most incubators
lead to diversify the economy. Thus, taxonomies of the benefits of BI
are produced from both the academic literature and published case
studies. In this way, a classification of strategic benefits elements as
they relate to incubators has been developed to provide a greater
understanding of the benefits needed to obtain a specific element.
The result of this paper is Business incubators is aimed
entrepreneurship, jobs creation, research commercialization and
profitable enterprises in Middle Eastern countries.
Abstract: Imaging is defined as the process of obtaining
geometric images either two dimensional or three dimensional by scanning or digitizing the existing objects or products. In this research, it applied to retrieve 3D information of the human skin
surface in medical application. This research focuses on analyzing
and determining volume of leg ulcers using imaging devices. Volume
determination is one of the important criteria in clinical assessment of leg ulcer. The volume and size of the leg ulcer wound will give the
indication on responding to treatment whether healing or worsening.
Different imaging techniques are expected to give different result (and accuracies) in generating data and images. Midpoint projection
algorithm was used to reconstruct the cavity to solid model and compute the volume. Misinterpretation of the results can affect the
treatment efficacy. The objectives of this paper is to compare the
accuracy between two 3D data acquisition method, which is laser
triangulation and structured light methods, It was shown that using models with known volume, that structured-light-based 3D technique
produces better accuracy compared with laser triangulation data
acquisition method for leg ulcer volume determination.