Abstract: South Africa is facing a crisis with not being able to produce enough graduates in the scarce skills areas to sustain economic growth. The crisis is fuelled by a school system that does not produce enough potential students with Mathematics, Accounting and Science. Since the introduction of the new school curriculum in 2008, there is no longer an option to take pure maths on a standard grade level. Instead, only two mathematical subjects are offered: pure maths (which is on par with higher grade maths) and mathematical literacy. It is compulsory to take one or the other. As a result, lees student finishes Grade 12 with pure mathematics every year. This national problem needs urgent attention if South Africa is to make any headway in critical skills development as mathematics is a gateway to scarce skills professions. Higher education institutions initiated several initiatives in an attempt to address the above, including preparatory courses, bridging programmes and extended curricula with foundation provisions. In view of the above, and government policy directives to broaden access in the scarce skills areas to increase student throughput, foundation provision was introduced for Commerce and Information Technology programmes at the Vaal Triangle Campus (VTC) of North-West University (NWU) in 2010. Students enrolling for extended programmes do not comply with the minimum prerequisites for the normal programmes. The question then arises as to whether these programmes have the intended impact? This paper reports the results of a two year longitudinal study, tracking the first year academic achievement of the two cohorts of enrolments since 2010. The results provide valuable insight into the structuring of an extended programme and its potential impact.
Abstract: This paper describes the two stage control using a disturbance observer and a Kalman filter. The system feedback uses the estimated state when it controls the speed. After the change-over point, its feedback uses the controlled plant output when it controls the position. To change the system continually, a change-over point has to be determined pertinently, and the controlled plant input has to be adjusted by the addition of the appropriate value. The proposed method has noise-reduction effect. It changes the system continually, even if the controlled plant identification has the error. Although the conventional method needs a speed sensor, the proposed method does not need it. The proposed method has a superior robustness compared with the conventional two stage control.
Abstract: Recommender systems are usually regarded as an
important marketing tool in the e-commerce. They use important
information about users to facilitate accurate recommendation. The
information includes user context such as location, time and interest
for personalization of mobile users. We can easily collect information
about location and time because mobile devices communicate with the
base station of the service provider. However, information about user
interest can-t be easily collected because user interest can not be
captured automatically without user-s approval process. User interest
usually represented as a need. In this study, we classify needs into two
types according to prior research. This study investigates the
usefulness of data mining techniques for classifying user need type for
recommendation systems. We employ several data mining techniques
including artificial neural networks, decision trees, case-based
reasoning, and multivariate discriminant analysis. Experimental
results show that CHAID algorithm outperforms other models for
classifying user need type. This study performs McNemar test to
examine the statistical significance of the differences of classification
results. The results of McNemar test also show that CHAID performs
better than the other models with statistical significance.
Abstract: As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.
Abstract: These days we face with so many advertisements in
magazines, those mentioned coaching is pragmatic specialties which
help people make change in their lives. Up to know Specialty coaches
are not necessarily therapists, consultants or psychologist, thus they
may not know psychological theories. The International Coach
Federation identifies "facilitating learning and results" as one of its
four core coach competencies, without understanding learning
theories coaching practice hangs in theoretical abyss. Thus the aim of
this article is investigating learning theories within coaching process.
Therefore, I reviewed some cognitive and behavioral learning
theories and analyzed their contribution with coaching process which
has been introduced in mentor coaches and ICF certified coaches'
papers and books. The result demonstrated that coaching profession
is strongly grounded in learning theories, and it will be strengthened
by the validation of theories and evidence-based research as we move
forward. Thus, it needs more research in order to applying effective
theoretical frameworks.
Abstract: ERP systems are the largest software applications adopted by universities, along with quite significant investments in their implementation. However, unlike other applications little research has been conducted regarding these systems in a university environment. This paper aims at providing a critical review of previous research in ERP system in higher education with a special focus on higher education in Australia. The research not only forms the basis of an evaluation of previous research and research needs, it also makes inroads in identifying the payoff of ERPs in the sector from different perspectives with particular reference to the user. The paper is divided into two parts, the first part focuses on ERP literature in higher education at large, while the second focuses on ERP literature in higher education in Australia.
Abstract: One of the main environmental problems which affect extensive areas in the world is soil salinity. Traditional data collection methods are neither enough for considering this important environmental problem nor accurate for soil studies. Remote sensing data could overcome most of these problems. Although satellite images are commonly used for these studies, however there are still needs to find the best calibration between the data and real situations in each specified area. Neyshaboor area, North East of Iran was selected as a field study of this research. Landsat satellite images for this area were used in order to prepare suitable learning samples for processing and classifying the images. 300 locations were selected randomly in the area to collect soil samples and finally 273 locations were reselected for further laboratory works and image processing analysis. Electrical conductivity of all samples was measured. Six reflective bands of ETM+ satellite images taken from the study area in 2002 were used for soil salinity classification. The classification was carried out using common algorithms based on the best composition bands. The results showed that the reflective bands 7, 3, 4 and 1 are the best band composition for preparing the color composite images. We also found out, that hybrid classification is a suitable method for identifying and delineation of different salinity classes in the area.
Abstract: The development and extension of large cities induced
a need for shallow tunnel in soft ground of building areas. Estimation
of ground settlement caused by the tunnel excavation is important
engineering point. In this paper, prediction of surface subsidence
caused by tunneling in one section of seventh line of Tehran subway
is considered. On the basis of studied geotechnical conditions of the
region, tunnel with the length of 26.9km has been excavated applying
a mechanized method using an EPB-TBM with a diameter of 9.14m.
In this regard, settlement is estimated utilizing both analytical and
numerical finite element method. The numerical method shows that
the value of settlement in this section is 5cm. Besides, the analytical
consequences (Bobet and Loganathan-Polous) are 5.29 and 12.36cm,
respectively. According to results of this study, due tosaturation of
this section, there are good agreement between Bobet and numerical
methods. Therefore, tunneling processes in this section needs a
special consolidation measurement and support system before the
passage of tunnel boring machine.
Abstract: Complexity, as a theoretical background has made it
easier to understand and explain the features and dynamic behavior
of various complex systems. As the common theoretical background
has confirmed, borrowing the terminology for design from the
natural sciences has helped to control and understand urban
complexity. Phenomena like self-organization, evolution and
adaptation are appropriate to describe the formerly inaccessible
characteristics of the complex environment in unpredictable bottomup
systems. Increased computing capacity has been a key element in
capturing the chaotic nature of these systems.
A paradigm shift in urban planning and architectural design has
forced us to give up the illusion of total control in urban
environment, and consequently to seek for novel methods for
steering the development. New methods using dynamic modeling
have offered a real option for more thorough understanding of
complexity and urban processes. At best new approaches may renew
the design processes so that we get a better grip on the complex
world via more flexible processes, support urban environmental
diversity and respond to our needs beyond basic welfare by liberating
ourselves from the standardized minimalism.
A complex system and its features are as such beyond human
ethics. Self-organization or evolution is either good or bad. Their
mechanisms are by nature devoid of reason. They are common in
urban dynamics in both natural processes and gas. They are features
of a complex system, and they cannot be prevented. Yet their
dynamics can be studied and supported.
The paradigm of complexity and new design approaches has been
criticized for a lack of humanity and morality, but the ethical
implications of scientific or computational design processes have not
been much discussed. It is important to distinguish the (unexciting)
ethics of the theory and tools from the ethics of computer aided
processes based on ethical decisions. Urban planning and architecture
cannot be based on the survival of the fittest; however, the natural
dynamics of the system cannot be impeded on grounds of being
“non-human".
In this paper the ethical challenges of using the dynamic models
are contemplated in light of a few examples of new architecture and
dynamic urban models and literature. It is suggested that ethical
challenges in computational design processes could be reframed
under the concepts of responsibility and transparency.
Abstract: Multi-agent system approach has proven to be an effective and appropriate abstraction level to construct whole models of a diversity of biological problems, integrating aspects which can be found both in "micro" and "macro" approaches when modeling this type of phenomena. Taking into account these considerations, this paper presents the important computational characteristics to be gathered into a novel bioinformatics framework built upon a multiagent architecture. The version of the tool presented herein allows studying and exploring complex problems belonging principally to structural biology, such as protein folding. The bioinformatics framework is used as a virtual laboratory to explore a minimalist model of protein folding as a test case. In order to show the laboratory concept of the platform as well as its flexibility and adaptability, we studied the folding of two particular sequences, one of 45-mer and another of 64-mer, both described by an HP model (only hydrophobic and polar residues) and coarse grained 2D-square lattice. According to the discussion section of this piece of work, these two sequences were chosen as breaking points towards the platform, in order to determine the tools to be created or improved in such a way to overcome the needs of a particular computation and analysis of a given tough sequence. The backwards philosophy herein is that the continuous studying of sequences provides itself important points to be added into the platform, to any time improve its efficiency, as is demonstrated herein.
Abstract: We propose that Virtual Learning Environments (VLEs) should be designed by taking into account the characteristics, the special needs and the specific operating rules of the academic institutions in which they are employed. In this context, we describe a VLE module that extends the support of the organization and delivery of course material by including administration activities related to the various stages of teaching. These include the co-ordination, collaboration and monitoring of the course material development process and institution-specific course material delivery modes. Our specialized module, which enhances VLE capabilities by Helping Educators and Learners through a Laboratory Assistance System, is willing to assist the Greek tertiary technological sector, which includes Technological Educational Institutes (T.E.I.).
Abstract: Using neural network we try to model the unknown function f for given input-output data pairs. The connection strength of each neuron is updated through learning. Repeated simulations of crisp neural network produce different values of weight factors that are directly affected by the change of different parameters. We propose the idea that for each neuron in the network, we can obtain quasi-fuzzy weight sets (QFWS) using repeated simulation of the crisp neural network. Such type of fuzzy weight functions may be applied where we have multivariate crisp input that needs to be adjusted after iterative learning, like claim amount distribution analysis. As real data is subjected to noise and uncertainty, therefore, QFWS may be helpful in the simplification of such complex problems. Secondly, these QFWS provide good initial solution for training of fuzzy neural networks with reduced computational complexity.
Abstract: Since Cloud environment has appeared as the most powerful
keyword in the computing industry, the growth in VDI (Virtual Desktop
Infrastructure) became remarkable in domestic market. In recent years, with the trend
that mobile devices such as smartphones and pads spread so rapidly, the strengths of
VDI that allows people to access and perform business on the move along with
companies' office needs expedite more rapid spread of VDI.
In this paper, mobile OTP (One-Time Password) authentication method is proposed
to secure mobile device portability through rapid and secure authentication using
mobile devices such as mobile phones or pads, which does not require additional
purchase or possession of OTP tokens of users. To facilitate diverse and wide use of
Services in the future, service should be continuous and stable, and above all, security
should be considered the most important to meet advanced portability and user
accessibility, the strengths of VDI.
Abstract: In image processing and visualization, comparing two
bitmapped images needs to be compared from their pixels by matching
pixel-by-pixel. Consequently, it takes a lot of computational time
while the comparison of two vector-based images is significantly
faster. Sometimes these raster graphics images can be approximately
converted into the vector-based images by various techniques. After
conversion, the problem of comparing two raster graphics images
can be reduced to the problem of comparing vector graphics images.
Hence, the problem of comparing pixel-by-pixel can be reduced to
the problem of polynomial comparisons. In computer aided geometric
design (CAGD), the vector graphics images are the composition of
curves and surfaces. Curves are defined by a sequence of control
points and their polynomials. In this paper, the control points will be
considerably used to compare curves. The same curves after relocated
or rotated are treated to be equivalent while two curves after different
scaled are considered to be similar curves. This paper proposed an
algorithm for comparing the polynomial curves by using the control
points for equivalence and similarity. In addition, the geometric
object-oriented database used to keep the curve information has also
been defined in XML format for further used in curve comparisons.
Abstract: In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.
Abstract: As days go by, we hear more and more about HIV,
Ebola, Bird Flu and other dreadful viruses which were unknown a
few decades ago. In both detecting and fighting viral diseases
ordinary methods have come across some basic and important
difficulties. Vaccination is by a sense introduction of the virus to the
immune system before the occurrence of the real case infection. It is
very successful against some viruses (e.g. Poliomyelitis), while
totally ineffective against some others (e.g. HIV or Hepatitis-C). On
the other hand, Anti-virus drugs are mostly some tools to control and
not to cure a viral disease. This could be a good motivation to try
alternative treatments. In this study, some key features of possible
physical-based alternative treatments for viral diseases are presented.
Electrification of body parts or fluids (especially blood) with micro
electric signals with adjusted current or frequency is also studied. The
main approach of this study is to find a suitable energy field, with
appropriate parameters that are able to kill or deactivate viruses. This
would be a lengthy, multi-disciplinary research which needs the
contribution of virology, physics, and signal processing experts. It
should be mentioned that all the claims made by alternative cures
researchers must be tested carefully and are not advisable at the time
being.
Abstract: Many IT projects come to failure because of having
technical approach, focusing on the final product and lack of proper
attention to strategic alignment. Project management models quite
often have technical management view [4], [8], [13], [14]. These
models focus greatly on the finalization of the project product and the
delivery of the product to the customer. However, many project
problems are due to lack of attention to the needs and capabilities of
the organizations or disregarding how to deploy and use the product
in the organization. In this regard, in the current research we are
trying to present a solution with the purpose of raising the value of
the project in an organization. This way, the project outputs will be
properly deployed in the organization. Therefore, a comprehensive
model is presented which takes into account the whole processes
from initial step of project definition to the deployment of the final
outputs in the organization and then the definition of all roles and
responsibilities to put the model into practice. Taking into account
the opinions of experts and project managers, to prove the
performance of the model, the project problems were recognized and
based on the model, categorized and analyzed. And at the end it is
made clear that ignoring the proper definition of the project and not
having a proper understanding of the expected value on the one hand
and not supervising the emerged value in the process of production
and installment are among the most important factors that bring a
project to failure.
Abstract: Due to the emergence of “Humanized Healthcare"
introduced by Professor Dr. Prawase Wasi in 2003[1], the
development of this paradigm tends to be widely implemented. The
organizations included Healthcare Accreditation Institute (public
organization), National Health Foundation, Mahidol University in
cooperation with Thai Health Promotion Foundation, and National
Health Security Office (Thailand) have selected the hospitals or
infirmaries that are qualified for humanized healthcare since 2008-
2010 and 35 of them are chosen to be the outstandingly navigating
organizations for the development of humanized healthcare,
humanized healthcare award [2].
The research aims to study the current issue, characteristics and
patterns of hospital administration contributing to humanized
healthcare system in Thailand. The selected case studies are from
four hospitals including Dansai Crown Prince Hospital, Leoi;
Ubolrattana Hospital, Khon Kaen; Kapho Hospital, Pattani; and
Prathai Hospital, Nakhonrachasima. The methodology is in-depth
interviewing with 10 staffs working as hospital executive directors,
and representatives from leader groups including directors,
multidisciplinary hospital committees, personnel development
committees, physicians and nurses in each hospital. (Total=40) In
addition, focus group discussions between hospital staffs and general
people (including patients and their relatives, the community leader,
and other people) are held by means of setting 4 groups including 8
people within each group. (Total=128) The observation on the
working in each hospital is also implemented. The findings of the
study reveal that there are five important aspects found in each
hospital including (1) the quality improvement under the mental and
spiritual development policy from the chief executives and lead
teams, leaders as Role model and they have visionary leadership; (2)
the participation hospital administration system focusing on learning
process and stakeholder- needs, spiritual human resource
management and development; (3) the relationship among people
especially staffs, team work skills, mutual understanding, effective
communication and personal inner-development; (4) organization
culture relevant to the awareness of patients- rights as well as the
participation policy including spiritual growth achieving to the same
goals, sharing vision, developing public mind, and caring; and (5)
healing structures or environment providing warmth and convenience
for hospital staffs, patients and their relatives and visitors.
Abstract: Serious games have proven to be a useful instrument
to engage learners and increase motivation. Nevertheless, a broadly
accepted, practical instructional design approach to serious games
does not exist. In this paper, we introduce the use of an instructional
design model that has not been applied to serious games yet, and has
some advantages compared to other design approaches. We present
the case of mechanics mechatronics education to illustrate the close
match with timing and role of knowledge and information that the
instructional design model prescribes and how this has been
translated to a rigidly structured game design. The structured
approach answers the learning needs of applicable knowledge within
the target group. It combines advantages of simulations with
strengths of entertainment games to foster learner-s motivation in the
best possible way. A prototype of the game will be evaluated along a
well-respected evaluation method within an advanced test setting
including test and control group.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.