Abstract: With the rapid usage of portable devices mobility in
IP networks becomes more important issue in the recent years. IETF
standardized Mobile IP that works in Network Layer, which involves
tunneling of IP packets from HA to Foreign Agent. Mobile IP suffers
many problems of Triangular Routing, conflict with private
addressing scheme, increase in load in HA, need of permanent home
IP address, tunneling itself, and so on. In this paper, we proposed
mobility management in Application Layer protocol SIP and show
some comparative analysis between Mobile IP and SIP in context of
mobility.
Abstract: The aim of this study is to investigate the effect of
perceived social support and stress on the coping capability and level
of depression of foreign and local students in Malaysia. Using
convenience sampling, 200 students from three universities in
Selangor, Malaysia participated in the study. The results of this study
revealed that there was a significant relationship between perceived
social support and coping capability. It is also found that there is a
negative relationship between coping capability and depression.
Further, stress and depression are positively related whereas stress
and coping capability are negatively related. Lastly, there is no
significant difference for the stress level and coping capability
amongst local and foreign students.
Abstract: The curriculum of the primary school science course was redesigned on the basis of constructivism in 2005-2006 academic years, in Turkey. In this context, the name of this course has been changed as “Science and Technology"; and both content and course books, students workbooks for this course have been redesigned in light of constructivism. The aim of this study is to determine whether the Science and Technology course books and student work books for primary school 5th grade are appropriate for the constructivism by evaluating them in terms of the fundamental principles of constructivism. In this study, out of qualitative research methods, documentation technique (i.e. document analysis) is applied; while selecting samples, criterion-sampling is used out of purposeful sampling techniques. When the Science and Technology course book and workbook for the 5th grade in primary education are examined, it is seen that both books complete each other in certain areas. Consequently, it can be claimed that in spite of some inadequate and missing points in the course book and workbook of the primary school Science and Technology course for the 5th grade students, these books are attempted to be designed in terms of the principles of constructivism. To overcome the inadequacies in the books, it can be suggested to redesign them. In addition to them, not to ignore the technology dimension of the course, the activities that encourage the students to prepare projects using technology cycle should be included.
Abstract: In this article, we introduce a mechanism by which the same concept of differentiated services used in network transmission can be applied to provide quality of service levels to pervasive systems applications. The classical DiffServ model, including marking and classification, assured forwarding, and expedited forwarding, are all utilized to create quality of service guarantees for various pervasive applications requiring different levels of quality of service. Through a collection of various sensors, personal devices, and data sources, the transmission of contextsensitive data can automatically occur within a pervasive system with a given quality of service level. Triggers, initiators, sources, and receivers are four entities labeled in our mechanism. An explanation of the role of each is provided, and how quality of service is guaranteed.
Abstract: Systems Analysis and Design is a key subject in
Information Technology courses, but students do not find it easy to
cope with, since it is not “precise" like programming and not exact
like Mathematics. It is a subject working with many concepts,
modeling ideas into visual representations and then translating the
pictures into a real life system. To complicate matters users who are
not necessarily familiar with computers need to give their inputs to
ensure that they get the system the need. Systems Analysis and
Design also covers two fields, namely Analysis, focusing on the
analysis of the existing system and Design, focusing on the design of
the new system. To be able to test the analysis and design of a
system, it is necessary to develop a system or at least a prototype of
the system to test the validity of the analysis and design. The skills
necessary in each aspect differs vastly. Project Management Skills,
Database Knowledge and Object Oriented Principles are all
necessary. In the context of a developing country where students
enter tertiary education underprepared and the digital divide is alive
and well, students need to be motivated to learn the necessary skills,
get an opportunity to test it in a “live" but protected environment –
within the framework of a university. The purpose of this article is to
improve the learning experience in Systems Analysis and Design
through reviewing the underlying teaching principles used, the
teaching tools implemented, the observations made and the
reflections that will influence future developments in Systems
Analysis and Design. Action research principles allows the focus to
be on a few problematic aspects during a particular semester.
Abstract: Professions are concerned about the public image they
have, and this public image is represented by stereotypes. Research is
needed to understand how accountants are perceived by different
actors in the society in different contexts, which would allow
universities, professional bodies and employers to adjust their
strategies to attract the right people to the profession and their
organizations. We aim to develop in this paper a framework to be
used in empirical testing in different environments to determine and
analyze the accountant-s stereotype. This framework will be useful in
analyzing the nuances associated to the accountant-s image and in
understanding the factors that may lead to uniformity in the
profession and of those leading to diversity from one context
(country, type of countries, region) to another.
Abstract: The increasing interest in plant sterol enriched foods
is due to the fact that they reduce blood cholesterol concentrations
without adverse side effects. In this context, enriched foods with
phytosterols may be helpful in protecting population against
atherosclerosis and cardiovascular diseases. The aim of the present
work was to evaluate in a population of Viseu, Portugal, the
consumption habits low-fat, plant sterol-enriched yoghurt. For this
study, 577 inquiries were made and the sample was randomly
selected for people shopping in various supermarkets. The
preliminary results showed that the biggest consumers of these
products were women aged 45 to 65 years old. Most of the people
who claimed to buy these products consumed them once a day. Also,
most of the consumers under antidyslipidemic therapeutics noticed
positive effects on hypercholesterolemia.
Abstract: Academia-industry relationship is not like that of
technology donator-acceptor, but is of interactive and collaborative
nature, acknowledging and ensuring mutual respect for each other-s
role and contributions with an eye to attaining the true purpose of
such relationships, namely, bringing about research-outcome
synergy. Indeed, academia-industry interactions are a system that
requires active and collaborative participations of all the
stakeholders.
This paper examines various issues associated with academic
institutions and industry collaboration with special attention to the
nature of resources and potentialities of stakeholders in the context of
knowledge management. This paper also explores the barriers of
academia-industry interaction. It identifies potential areas where
industry-s participation with academia would be most effective for
synergism. Lastly, this paper proposes an integrated model of several
new collaborative approaches that are possible, mainly in the Indian
scenario to strengthen academia-industry interface.
Abstract: The association between emotional inhibition strategies linked to depression has been showed inconsistent among studies. Mild emotional inhibition maybe benefit for social interaction, especially for female among East Asian cultures. The present study aimed to examine whether the inhibition–depression relationship is dependent on level of emotion inhibition and gender context, given differing value of suppressing emotional displays. We hypothesized that the negative associations between inhibition and adolescent depression would not directly, in which affected by interaction between emotion inhibition and gender. To test this hypothesis, we asked 309 junior high school students which age range from 12 to14 years old to report on their use of emotion inhibition and depression syndrome. A multiple regressions analysis revealed that significant interaction that gender as a moderator to the relationships between emotion inhibition and adolescent depression. The group with the highest level of depression was girls with high levels of emotion inhibition, whose depression score was higher than that of boys with high levels of emotion inhibition. The result highlights that the importance of context in understanding the inhibition-depression relationship.
Abstract: We propose a downlink multiple-input multipleoutput
(MIMO) multi-carrier code division multiple access (MCCDMA)
system with adaptive beamforming algorithm for smart
antennas. The algorithm used in this paper is based on the Least
Mean Square (LMS), with pilot channel estimation (PCE) and the
zero forcing equalizer (ZFE) in the receiver, requiring reference
signal and no knowledge channel. MC-CDMA is studied in a
multiple antenna context in order to efficiently exploit robustness
against multipath effects and multi-user flexibility of MC-CDMA and
channel diversity offered by MIMO systems for radio mobile
channels. Computer simulations, considering multi-path Rayleigh
Fading Channel, interference inter symbol and interference are
presented to verify the performance. Simulation results show that the
scheme achieves good performance in a multi-user system.
Abstract: Rapid advancement in computing technology brings
computers and humans to be seamlessly integrated in future. The
emergence of smartphone has driven computing era towards
ubiquitous and pervasive computing. Recognizing human activity has
garnered a lot of interest and has raised significant researches-
concerns in identifying contextual information useful to human
activity recognition. Not only unobtrusive to users in daily life,
smartphone has embedded built-in sensors that capable to sense
contextual information of its users supported with wide range
capability of network connections. In this paper, we will discuss the
classification algorithms used in smartphone-based human activity.
Existing technologies pertaining to smartphone-based researches in
human activity recognition will be highlighted and discussed. Our
paper will also present our findings and opinions to formulate
improvement ideas in current researches- trends. Understanding
research trends will enable researchers to have clearer research
direction and common vision on latest smartphone-based human
activity recognition area.
Abstract: This study examines perception of environmental
approach in small and medium-sized enterprises (SMEs) – the
process by which firms integrate environmental concern into
business. Based on a review of the literature, the paper synthesizes
focus on environmental issues with the reflection in a case study in
the Czech Republic. Two themes of corporate environmentalism are
discussed – corporate environmental orientation and corporate
stances toward environmental concerns. It provides theoretical
material on greening organizational culture that is helpful in
understanding the response of contemporary business to
environmental problems. We integrate theoretical predictions with
empirical findings confronted with reality. Scales to measure these
themes are tested in a survey of managers in 229 Czech firms. We
used the process of in-depth questioning. The research question was
derived and answered in the context of the corresponding literature
and conducted research. A case study showed us that environmental
approach is variety different (depending on the size of the firm) in
SMEs sector. The results of the empirical mapping demonstrate
Czech company’s approach to environment and define the problem
areas and pinpoint the main limitation in the expansion of
environmental aspects. We contribute to the debate for recognition of
the particular role of environmental issues in business reality.
Abstract: The feature extraction method(s) used to recognize
hand-printed characters play an important role in ICR applications.
In order to achieve high recognition rate for a recognition system, the
choice of a feature that suits for the given script is certainly an
important task. Even if a new feature required to be designed for a
given script, it is essential to know the recognition ability of the
existing features for that script. Devanagari script is being used in
various Indian languages besides Hindi the mother tongue of majority
of Indians. This research examines a variety of feature extraction
approaches, which have been used in various ICR/OCR applications,
in context to Devanagari hand-printed script. The study is conducted
theoretically and experimentally on more that 10 feature extraction
methods. The various feature extraction methods have been evaluated
on Devanagari hand-printed database comprising more than 25000
characters belonging to 43 alphabets. The recognition ability of the
features have been evaluated using three classifiers i.e. k-NN, MLP
and SVM.
Abstract: One of the long standing challenging aspect in mobile robotics is the ability to navigate autonomously, avoiding modeled and unmodeled obstacles especially in crowded and unpredictably changing environment. A successful way of structuring the navigation task in order to deal with the problem is within behavior based navigation approaches. In this study, Issues of individual behavior design and action coordination of the behaviors will be addressed using fuzzy logic. A layered approach is employed in this work in which a supervision layer based on the context makes a decision as to which behavior(s) to process (activate) rather than processing all behavior(s) and then blending the appropriate ones, as a result time and computational resources are saved.
Abstract: The recent global financial problem urges government
to play role in stimulating the economy due to the fact that private
sector has little ability to purchase during the recession. A concerned
question is whether the increased government spending crowds out
private consumption and whether it helps stimulate the economy. If
the government spending policy is effective; the private consumption
is expected to increase and can compensate the recent extra
government expense. In this study, the government spending is
categorized into government consumption spending and government
capital spending. The study firstly examines consumer consumption
along the line with the demand function in microeconomic theory.
Three categories of private consumption are used in the study. Those
are food consumption, non food consumption, and services
consumption. The dynamic Almost Ideal Demand System of the three
categories of the private consumption is estimated using the Vector
Error Correction Mechanism model. The estimated model indicates
the substituting effects (negative impacts) of the government
consumption spending on budget shares of private non food
consumption and of the government capital spending on budget share
of private food consumption, respectively. Nevertheless the result
does not necessarily indicate whether the negative effects of changes
in the budget shares of the non food and the food consumption means
fallen total private consumption. Microeconomic consumer demand
analysis clearly indicates changes in component structure of
aggregate expenditure in the economy as a result of the government
spending policy. The macroeconomic concept of aggregate demand
comprising consumption, investment, government spending (the
government consumption spending and the government capital
spending), export, and import are used to estimate for their
relationship using the Vector Error Correction Mechanism model.
The macroeconomic study found no effect of the government capital
spending on either the private consumption or the growth of GDP
while the government consumption spending has negative effect on
the growth of GDP. Therefore no crowding out effect of the
government spending is found on the private consumption but it is
ineffective and even inefficient expenditure as found reducing growth
of the GDP in the context of Thailand.
Abstract: Not with standing the importance of foreign highly
skilled professionals for host economies, there is a paucity of
research studies investigating the role of the corporate social context
during the integration process. This research aims to address this
paucity by exploring the role of social capital in the integration of
foreign health professionals. It does so by using a qualitative research
approach. In this pilot study the hospital sector forms this study-s
sample and interviews were conducted with HR managers, foreign
health professionals and external HR consultants. It was found that
most of the participating hospitals had not established specific HR
practices and had only partly linked the development of
organisational social capital with a successful integration process.
This research contributes, for example, to the HR literature on the
integration of self-initiated expatriates by analysing the role of HRM
in generating organisational social capital needed for a successful
integration process.
Abstract: As seen in literature, about 70% of the improvement initiatives fail, and a significant number do not even get started. This paper analyses the problem of failing initiatives on Software Process Improvement (SPI), and proposes good practices supported by motivational tools that can help minimizing failures. It elaborates on the hypothesis that human factors are poorly addressed by deployers, especially because implementation guides usually emphasize only technical factors. This research was conducted with SPI deployers and analyses 32 SPI initiatives. The results indicate that although human factors are not commonly highlighted in guidelines, the successful initiatives usually address human factors implicitly. This research shows that practices based on human factors indeed perform a crucial role on successful implantations of SPI, proposes change management as a theoretical framework to introduce those practices in the SPI context and suggests some motivational tools based on SPI deployers experience to support it.
Abstract: This paper presents a watermarking protocol able to
solve the well-known “customer-s right problem" and “unbinding
problem". In particular, the protocol has been purposely designed
to be adopted in a web context, where users wanting to buy digital
contents are usually neither provided with digital certificates issued
by certification authorities (CAs) nor able to autonomously perform
specific security actions. Furthermore, the protocol enables users to
keep their identities unexposed during web transactions as well as
allows guilty buyers, i.e. who are responsible distributors of illegal
replicas, to be unambiguously identified. Finally, the protocol has
been designed so that web content providers (CPs) can exploit
copyright protection services supplied by web service providers (SPs)
in a security context. Thus, CPs can take advantage of complex
services without having to directly implement them.
Abstract: This study proposes a novel recommender system to
provide the advertisements of context-aware services. Our proposed
model is designed to apply a modified collaborative filtering (CF)
algorithm with regard to the several dimensions for the personalization
of mobile devices – location, time and the user-s needs type. In
particular, we employ a classification rule to understand user-s needs
type using a decision tree algorithm. In addition, we collect primary
data from the mobile phone users and apply them to the proposed
model to validate its effectiveness. Experimental results show that the
proposed system makes more accurate and satisfactory advertisements
than comparative systems.
Abstract: Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modeling is a useful method to better characterize the field due to the rich ideas that can be generated based on the use of secular associations, chronological origins, linked concepts, categorizations and context specifications. This paper proposes the use of non-quantitative methods through a morphological analysis to better explore and define the influential conditions in a network warfare environment.