Abstract: The history of technology and banking is examined as
it relates to risk and technological determinism. It is proposed that
the services that banks offer are determined by technology and that
banks must adopt new technologies to be competitive. The adoption
of technologies paradoxically forces the adoption of other new
technologies to protect the bank from the increased risk of
technology. This cycle will lead to bank examiners and regulators to
focus on human behavior, not on the ever changing technology.
Abstract: The “conveyor belt" as a product represents a
complex high performance component with a wide range of different
applications. Further development of these highly complex
components demands an integration of new technologies and new
enhanced materials. In this context nanostructured fillers appear to
have a more promising effect on the performance of the conveyor
belt composite than conventional micro-scaled fillers.
Within the project “DotTrans" nanostructured fillers, for example
silicon dioxide, are used to optimize performance parameters of
conveyor belt systems. The objective of the project includes
operating parameters like energy consumption or friction
characteristics as well as adaptive parameters like cut or wear
resistance.
Abstract: With the advent of new technologies, factors related to
mental health in e-workspaces are taken into consideration more than
ever. Studies have revealed that one of the factors affecting the
productivity of employees in an organization is occupational stress.
Another influential factor is quality of work life which is important in
the improvement of work environment conditions and organizational
efficiency. In order to uncover the quality of work life level and to
investigate the impact of occupational stress on quality of work life
among information technology employees in Iran, a cross-sectional
study design was applied and data were gathered using a
questionnaire validated by a group of experts. The results of the study
showed that information technology staffs have average level of both
occupational stress and quality of work life. Furthermore, it was
found that occupational stress has a negative impact on quality of
work life. In addition, the same results were observed for role
ambiguity, role conflict, role under-load, work-pace, work
repetitiveness and tension toward quality of work life. No significant
relation was found between role overload and quality of work life.
Finally, directions for future research are proposed and discussed.
Abstract: According to the new developments in the field of information and communication technologies, the necessity arises for active use of these new technologies in education. It is clear that the integration of technology in education system will be different for primary-higher education or traditional- distance education. In this study, the subject of the integration of technology for distance education was discussed. The subject was taken from the viewpoint of students. With using the information of student feedback about education program in which new technological medias are used, how can survey variables can be separated into the factors as positive, negative and supporter and how can be redesigned education strategy of the higher education associations with the examining the variables of each determinated factor is explained. The paper concludes with the recommendations about the necessitity of working as a group of different area experts and using of numerical methods in establishing of education strategy to be successful.
Abstract: The task of strategic information technology
management is to focus on adapting technology to ensure
competitiveness. A key factor for success in this sector is awareness
and readiness to deploy new technologies and exploit the services
they offer. Recently, the need for more flexible and dynamic user
interfaces (UIs) has been recognized, especially in mobile
applications. An ongoing research project (MOP), initiated by TUT
in Finland, is looking at how mobile device UIs can be adapted for
different needs and contexts. It focuses on examining the possibilities
to develop adapter software for solving the challenges related to the
UI and its flexibility in mobile devices. This approach has great
potential for enhancing information transfer in mobile devices, and
consequently for improving information management. The
technology presented here could be one of the key emerging
technologies in the information technology sector in relation to
mobile devices and telecommunications.
Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: This contribution aims to outline some topics around the process of introduction of compulsory electronic exchange of documents (so called e-Boxes) in public administration. The research was conducted in order to gauge the difference between the expectation of those using internal email and their experience in reality. Both qualitative and quantitative research is employed to lead also to an estimation of the willingness and readiness of government bodies, business units and citizens to adopt new technologies. At the same time the most potent barriers to successful e-communication through the e-Boxes are identified.
Abstract: In the last years, the computers have increased their capacity of calculus and networks, for the interconnection of these machines. The networks have been improved until obtaining the actual high rates of data transferring. The programs that nowadays try to take advantage of these new technologies cannot be written using the traditional techniques of programming, since most of the algorithms were designed for being executed in an only processor,in a nonconcurrent form instead of being executed concurrently ina set of processors working and communicating through a network.This paper aims to present the ongoing development of a new system for the reconfiguration of grouping of computers, taking into account these new technologies.
Abstract: The implementation of the new software and hardware-s technologies for tritium processing nuclear plants, and especially those with an experimental character or of new technology developments shows a coefficient of complexity due to issues raised by the implementation of the performing instrumentation and equipment into a unitary monitoring system of the nuclear technological process of tritium removal. Keeping the system-s flexibility is a demand of the nuclear experimental plants for which the change of configuration, process and parameters is something usual. The big amount of data that needs to be processed stored and accessed for real time simulation and optimization demands the achievement of the virtual technologic platform where the data acquiring, control and analysis systems of the technological process can be integrated with a developed technological monitoring system. Thus, integrated computing and monitoring systems needed for the supervising of the technological process will be executed, to be continued with the execution of optimization system, by choosing new and performed methods corresponding to the technological processes within the tritium removal processing nuclear plants. The developing software applications is executed with the support of the program packages dedicated to industrial processes and they will include acquisition and monitoring sub-modules, named “virtually" as well as the storage sub-module of the process data later required for the software of optimization and simulation of the technological process for tritium removal. The system plays and important role in the environment protection and durable development through new technologies, that is – the reduction of and fight against industrial accidents in the case of tritium processing nuclear plants. Research for monitoring optimisation of nuclear processes is also a major driving force for economic and social development.
Abstract: This study discusses the stumbling blocks stifling the
adoption of GPS technology in the public sector of Pakistan. This
study has been carried out in order to describe the value of GPS
technology and its adoption at various public sector organisations in
Pakistan. Sample size for the research conducted was 200; personnel
working in public sector having age above 29 years were surveyed.
Data collected for this research has been quantitatively analysed with
the help of SPSS. Regression analysis, correlation and cross
tabulation were the techniques used to determine the strength of
relationship between key variables. Findings of this research indicate
that main hurdles in GPS adoption in the public sector of Pakistan are
lack of awareness about GPS among masses in general and the
stakeholders in particular, lack of initiative on part of government in
promoting new technologies, unavailability of GPS infrastructure in
Pakistan and prohibitions on map availability because of security
reasons.
Abstract: During recent years, the traditional learning
approaches have undergone fundamental changes due to the
emergence of new technologies such as multimedia, hypermedia and
telecommunication. E-learning is a modern world phenomenon that
has come into existence in the information age and in a knowledgebased
society. E-learning has developed significantly within a short
period of time. Thus it is of a great significant to secure information,
allow a confident access and prevent unauthorized accesses. Making
use of individuals- physiologic or behavioral (biometric) properties is
a confident method to make the information secure. Among the
biometrics, fingerprint is more acceptable and most countries use it as
an efficient methods of identification. This article provides a new
method to compare the fingerprint comparison by pattern recognition
and image processing techniques. To verify fingerprint, the shortest
distance method is used together with perceptronic multilayer neural
network functioning based on minutiae. This method is highly
accurate in the extraction of minutiae and it accelerates comparisons
due to elimination of false minutiae and is more reliable compared
with methods that merely use directional images.
Abstract: The use of new technologies such internet (e-mail, chat
rooms) and cell phones has steeply increased in recent years.
Especially among children and young people, use of technological
tools and equipments is widespread. Although many teachers and
administrators now recognize the problem of school bullying, few are
aware that students are being harassed through electronic
communication. Referred to as electronic bullying, cyber bullying, or
online social cruelty, this phenomenon includes bullying through email,
instant messaging, in a chat room, on a website, or through
digital messages or images sent to a cell phone. Cyber bullying is
defined as causing deliberate/intentional harm to others using internet
or other digital technologies. It has a quantitative research design nd
uses relational survey as its method. The participants consisted of
300 secondary school students in the city of Konya, Turkey. 195
(64.8%) participants were female and 105 (35.2%) were male. 39
(13%) students were at grade 1, 187 (62.1%) were at grade 2 and 74
(24.6%) were at grade 3. The “Cyber Bullying Question List"
developed by Ar─▒cak (2009) was given to students. Following
questions about demographics, a functional definition of cyber
bullying was provided. In order to specify students- human values,
“Human Values Scale (HVS)" developed by Dilmaç (2007) for
secondary school students was administered. The scale consists of 42
items in six dimensions. Data analysis was conducted by the primary
investigator of the study using SPSS 14.00 statistical analysis
software. Descriptive statistics were calculated for the analysis of
students- cyber bullying behaviour and simple regression analysis was
conducted in order to test whether each value in the scale could
explain cyber bullying behaviour.
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and cvazistationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine 1st stage nozzle blade
Abstract: Article devoted to the development of technologies
for medicine and agroecology by using plant organelle – spherosome.
Technological method of purification and isolation of this organelle
by using novel nanostructured carbon sorbent – “nanocarbosorb"
ARK type are presented. Also the methods of preparation of
nanocontainers based on using of spherosome with loaded isosorbide
dinitrate, piroxicam or diclofenak are exhibited. We found that the
spherosome could be applied for ecological aims as bioregulator and
also as biosensor for determination of ammonia ions in water
reservoirs at concentration range 1mM to 100mM.
Abstract: E-learning is not restricted to the use of new technologies for the online content, but also induces the adoption of new approaches to improve the quality of education. This quality depends on the ability of these approaches (technical and pedagogical) to provide an adaptive learning environment. Thus, the environment should include features that convey intentions and meeting the educational needs of learners by providing a customized learning path to acquiring a competency concerned In our proposal, we believe that an individualized learning path requires knowledge of the learner. Therefore, it must pass through a personalization of diagnosis to identify precisely the competency gaps to fill, and reduce the cognitive load To personalize the diagnosis and pertinently measure the competency gap, we suggest implementing the formative assessment in the e-learning environment and we propose the introduction of a pre-regulation process in the area of formative assessment, involving its individualization and implementation in e-learning.
Abstract: The use of e-business in small and medium-sized
enterprises (SMEs) has been recently received an enormous attention
in information systems research by both academic and practitioners.
With the adoption of new and efficient technologies to enhance
businesses, Thai SMEs should be able to compete worldwide.
Unfortunately, most of the owners are not used to new technologies.
It is clear that most Thai SMEs prefer to work manually rather than
electronically. This paper aims to provide a fundamental conceptual
framework for E-business adoption by Thai SMEs. Rooted in
Knowledge transfer model, several factors are identified, which drive
and enable e-business adoption. By overlooking the benefits
associated with implementing new technologies, it is difficult for
Thai SMEs to perform well enough to compete globally. The paper
also helps Thai SMEs to understand factors related to E-business
adoption.
Abstract: The huge development of new technologies and the
apparition of open communication system more and more
sophisticated create a new challenge to protect digital content from
piracy. Digital watermarking is a recent research axis and a new
technique suggested as a solution to these problems. This technique
consists in inserting identification information (watermark) into
digital data (audio, video, image, databases...) in an invisible and
indelible manner and in such a way not to degrade original medium-s
quality. Moreover, we must be able to correctly extract the
watermark despite the deterioration of the watermarked medium (i.e
attacks). In this paper we propose a system for watermarking satellite
images. We chose to embed the watermark into frequency domain,
precisely the discrete wavelet transform (DWT). We applied our
algorithm on satellite images of Tunisian center. The experiments
show satisfying results. In addition, our algorithm showed an
important resistance facing different attacks, notably the compression
(JEPG, JPEG2000), the filtering, the histogram-s manipulation and
geometric distortions such as rotation, cropping, scaling.
Abstract: Group work, projects and discussions are important
components of teacher education courses whether they are face-toface,
blended or exclusively online formats. This paper examines the varieties of tasks and challenges with this learning format in a face to
face class teacher education class providing specific examples of both
failure and success from both the student and instructor perspective.
The discussion begins with a brief history of collaborative and cooperative learning, moves to an exploration of the promised
benefits and then takes a look at some of the challenges which can
arise specifically from the use of new technologies. The discussion concludes with guidelines and specific suggestions.
Abstract: Technology or lack of it will play an important role in Africa-s effort to achieve inclusive development. Although a key determinant of competitiveness, new technology can exacerbate exclusion of the majority from the mainstream economic activities. To minimise potential technology exclusion while leveraging its critical role in African-s development, requires insight into technology diffusion process. Using system dynamics approach, a technology diffusion model is presented. The frequency of interaction of people exposed to and those not exposed to technology, and the technology adoption rate - the fraction of people who embrace new technologies once they are exposed, are identified as the broad factors critical to technology diffusion to wider society enabling more people to be part of the economic growth process. Based on simulation results, it is recommends that these two broad factors should form part of national policy aimed at achieving inclusive and sustainable development in Africa.
Abstract: In modern era, the biggest challenge facing the
software industry is the upcoming of new technologies. So, the
software engineers are gearing up themselves to meet and manage
change in large software system. Also they find it difficult to deal
with software cognitive complexities. In the last few years many
metrics were proposed to measure the cognitive complexity of
software. This paper aims at a comprehensive survey of the metric of
software cognitive complexity. Some classic and efficient software
cognitive complexity metrics, such as Class Complexity (CC),
Weighted Class Complexity (WCC), Extended Weighted Class
Complexity (EWCC), Class Complexity due to Inheritance (CCI) and
Average Complexity of a program due to Inheritance (ACI), are
discussed and analyzed. The comparison and the relationship of these
metrics of software complexity are also presented.