Abstract: This paper starts with a critical view of beautiful female images in the mass media being frequently generated by a stereotypical Korean concept of beauty. Several female beauty myths have evolved in Korea during the present decade. Nearly all of them have formed due to a deeply-ingrained androcentric ideology which objectifies women. Mass media causes the public to hold a distorted concept about female beauty. There is a huge gap between women in reality and representative women in the mass media. It is essential to have an unbiased perception of female images presented in the mass media. Due to cosmetic advertisements projecting contemporary images of female beauty to promote products, cosmetics images will be examined in regard to female beauty myths portrayed by the mass media. This paper will analyze features of female beauty myths in Korea and their intrinsic characteristics.
Abstract: In this paper, we design an integration security system
that provides authentication service, authorization service, and
management service of security data and a unified interface for the
management service. The interface is originated from XKMS protocol
and is used to manage security data such as XACML policies, SAML
assertions and other authentication security data including public keys.
The system includes security services such as authentication,
authorization and delegation of authentication by employing SAML
and XACML based on security data such as authentication data,
attributes information, assertions and polices managed with the
interface in the system. It also has SAML producer that issues
assertions related on the result of the authentication and the
authorization services.
Abstract: This paper investigates the relationship between state and business in the context of structural and institutional transformations in Indonesia following the collapse of the New Order regime in 1998. Since 1998, Indonesia has embarked on a shift from an authoritarian to democratic polity and from a centralised to a decentralised system of governance, transforming the country into the third largest democracy and one of the most decentralised states in the world. This paper examines whether the transformation of the Indonesian state has altered the pattern of state and business relations with focus on clientism and corruption as the key dependent variable, and probes how/to what extent this has changed as a result of the transformation and the ensuring shifts in business and state relations. Based on interviews with key government and business actors as well as prominent scholars in Indonesia, it is found that since the demise of the New Order, business associations in Indonesia have become more independent of state control and more influential in public decision-making whereas the government has become more responsive of business concerns and more committed to combat corruption and clientism. However, these changes have not necessarily rendered business people completely leave individualclientelistic relationship with the government, and simply pursue wider sectoral and business-wide collectivism as an alternative way of channelling their aspirations, which is expected to help reduce corruption and clientism in Indonesia. This paper concludes that democratisation and a more open politics may have helped reduce corruption and clientism in Indonesia through changes in government. However, it is still difficult to imply that such political transformation has fostered business collective action and a broader, more encompassing pattern of business lobbying and activism, which is expected to help reduce corruption and clientism.
Abstract: Over the past decades, automatic face recognition has become a highly active research area, mainly due to the countless application possibilities in both the private as well as the public sector. Numerous algorithms have been proposed in the literature to cope with the problem of face recognition, nevertheless, a group of methods commonly referred to as appearance based have emerged as the dominant solution to the face recognition problem. Many comparative studies concerned with the performance of appearance based methods have already been presented in the literature, not rarely with inconclusive and often with contradictory results. No consent has been reached within the scientific community regarding the relative ranking of the efficiency of appearance based methods for the face recognition task, let alone regarding their susceptibility to appearance changes induced by various environmental factors. To tackle these open issues, this paper assess the performance of the three dominant appearance based methods: principal component analysis, linear discriminant analysis and independent component analysis, and compares them on equal footing (i.e., with the same preprocessing procedure, with optimized parameters for the best possible performance, etc.) in face verification experiments on the publicly available XM2VTS database. In addition to the comparative analysis on the XM2VTS database, ten degraded versions of the database are also employed in the experiments to evaluate the susceptibility of the appearance based methods on various image degradations which can occur in "real-life" operating conditions. Our experimental results suggest that linear discriminant analysis ensures the most consistent verification rates across the tested databases.
Abstract: This article analyses conspiracy theories as part of the
wider discourses of missionary politics. It presents a case study of
Venezuela and describes how its leaders use conspiracy theories as
political tools. Through quotes taken form Venezuelan president
Chavez-s public speeches and other sources, and through a short
analysis of the ideological basis of his discourses, it shows how
conspiracy theories are constructed and how they affect the local
political praxis. The article also describes how conspiracy theories
have been consistently used as an important part of the construction of
a political religion for the New Man of the Bolivarian Revolution. It
concludes that the use of conspiracy theories by political leaders
produces a sense of loss of political agency.
Abstract: The use and management of projects has risen to
a new prominence, with projects seen as critical to economic in
both the private and public sectors due challenging and dynamic
business environment. However, failure in managing project is
encountered regularly, which cause the waste of company
resources. The impacts of projects that failed to meet
stakeholders expectations have left behind long lasting negative
consequences in organization. Therefore, this research aims to
investigate on key success factors of project management in an
organization. It is believed that recognizing important factors
that contribute to successful project will help companies to
increase the overall profitability. 150 questionnaires were
distributed to respondents and 110 questionnaires were collected
and used in performing the data analysis. The result has strongly
supported the relationship between independent variables and
project performance.
Abstract: The purpose of this work is to identify the positive and negative aspects of parties- participation in the country-s modernization, which in turn, will help a country to determine the necessary steps to improve the social-economic development. The article considers a question of the role of the dominating party of Kazakhstan and ruling party of China in the country-s modernization. Using a comparative analysis reveals differences between the People's Democratic Party “Nur Otan" and the Communist Party of China. It is discussed the policy of carrying out of modernization, the main actions of political parties of both countries with a view of modernization implementation.
Abstract: The present paper aims to present the significant role that the concept of governance can play in order to combine naturals resources as useful funding basis for the formation of a stable and effective welfare state model. The combination of those two different fields aims to represent the modern trends of our era as the means to solve the severe financial and economic issues caused mostly due to the malfunction of the welfare state and its public sector. European Union and Asian countries (especially China) are the main areas of interest since EU experiences a fiscal and economic crisis while China rules the area of the natural resources exploiting 97% of rare earths elements worldwide.
Abstract: In the proposed method for Web page-ranking, a
novel theoretic model is introduced and tested by examples of order
relationships among IP addresses. Ranking is induced using a
convexity feature, which is learned according to these examples
using a self-organizing procedure. We consider the problem of selforganizing
learning from IP data to be represented by a semi-random
convex polygon procedure, in which the vertices correspond to IP
addresses. Based on recent developments in our regularization
theory for convex polygons and corresponding Euclidean distance
based methods for classification, we develop an algorithmic
framework for learning ranking functions based on a Computational
Geometric Theory. We show that our algorithm is generic, and
present experimental results explaining the potential of our approach.
In addition, we explain the generality of our approach by showing its
possible use as a visualization tool for data obtained from diverse
domains, such as Public Administration and Education.
Abstract: The protection of the contents of digital products is
referred to as content authentication. In some applications, to be able
to authenticate a digital product could be extremely essential. For
example, if a digital product is used as a piece of evidence in the
court, its integrity could mean life or death of the accused. Generally,
the problem of content authentication can be solved using semifragile
digital watermarking techniques. Recently many authors have
proposed Computer Generated Hologram Watermarking (CGHWatermarking)
techniques. Starting from these studies, in this paper
a semi-fragile Computer Generated Hologram coding technique is
proposed, which is able to detect malicious tampering while
tolerating some incidental distortions. The proposed technique uses
as watermark an encrypted image, and it is well suitable for digital
image authentication.
Abstract: Professions are concerned about the public image they
have, and this public image is represented by stereotypes. Research is
needed to understand how accountants are perceived by different
actors in the society in different contexts, which would allow
universities, professional bodies and employers to adjust their
strategies to attract the right people to the profession and their
organizations. We aim to develop in this paper a framework to be
used in empirical testing in different environments to determine and
analyze the accountant-s stereotype. This framework will be useful in
analyzing the nuances associated to the accountant-s image and in
understanding the factors that may lead to uniformity in the
profession and of those leading to diversity from one context
(country, type of countries, region) to another.
Abstract: This paper deals principally with the socio-economic impact on the local Iban community in Mukah Division, Sarawak; with the commencement of the open-cut coal mining industry since 2003. To-date there are no actual studies being carried out by either the public or private sector to truly analyze how the Iban community is coping with the advent of a large influx of cash into their society. The Iban community has traditionally been practicing shifting cultivation and farming of domesticated animals; with a portion of the younger generation working as laborers and professional. This paper represents the views and observations of the author supported by some statistical facts extracted from published articles and non-published reports. The paper deals primarily in the following areas: • Background of the coal mining industry in Mukah Division, Sarawak; • Benefits of the coal mining industry towards the Iban community; • Issues / Problems arise in the Iban community because of the presence of the coal mining industry; and • Possible actions that need to be taken to overcome these issues/ problems.
Abstract: This paper investigated the organizational
innovativeness of public listed housing developers in Malaysia. We
conceptualized organizational innovativeness as a multi-dimensional
construct consisting of 5 dimensions: market innovativeness, product
innovativeness, process innovativeness, behavior innovativeness and
strategic innovativeness. We carried out questionnaire survey with all
accessible public listed developers in Malaysia and received a 56
percent response. We found that the innovativeness of public listed
housing developers is low. The study extends the knowledge on
innovativeness theory by using a multi-dimensional contructs to
conceptualize the innovativeness of public listed housing developers
in Malaysia where all this while most studies focused on single
dimensional construct of innovativeness. The paper ends by
providing some explanations for the results.
Abstract: Dengue fever is prevalent in Malaysia with numerous
cases including mortality recorded over the years. Public education
on the prevention of the desease through various means has been
carried out besides the enforcement of legal means to eradicate
Aedes mosquitoes, the dengue vector breeding ground. Hence, other
means need to be explored, such as predicting the seasonal peak
period of the dengue outbreak and identifying related climate factors
contributing to the increase in the number of mosquitoes. Simulation
model can be employed for this purpose. In this study, we created a
simulation of system dynamic to predict the spread of dengue
outbreak in Hulu Langat, Selangor Malaysia. The prototype was
developed using STELLA 9.1.2 software. The main data input are
rainfall, temperature and denggue cases. Data analysis from the graph
showed that denggue cases can be predicted accurately using these
two main variables- rainfall and temperature. However, the model
will be further tested over a longer time period to ensure its
accuracy, reliability and efficiency as a prediction tool for dengue
outbreak.
Abstract: In the paper it is questioned whether effective state
social policy provides happiness and social progress. For this purpose
selected correlations between Human Development Index (HDI),
share of public social expenditures in GDP, the Happy Planet Index
(HPI), GDP per capita, and Government Effectiveness are examined
and the results are graphically presented. It is shown how a
government can affect well-being and happiness in different countries
of modern world. Also, it is tested the hypothesis about existence of a
certain optimum of well-being and public social expenditures, which
affect direction of social progress. It is concluded that efficient social
policy and wealth are not the only factors determining human
happiness.
Abstract: This study examines perception of environmental
approach in small and medium-sized enterprises (SMEs) – the
process by which firms integrate environmental concern into
business. Based on a review of the literature, the paper synthesizes
focus on environmental issues with the reflection in a case study in
the Czech Republic. Two themes of corporate environmentalism are
discussed – corporate environmental orientation and corporate
stances toward environmental concerns. It provides theoretical
material on greening organizational culture that is helpful in
understanding the response of contemporary business to
environmental problems. We integrate theoretical predictions with
empirical findings confronted with reality. Scales to measure these
themes are tested in a survey of managers in 229 Czech firms. We
used the process of in-depth questioning. The research question was
derived and answered in the context of the corresponding literature
and conducted research. A case study showed us that environmental
approach is variety different (depending on the size of the firm) in
SMEs sector. The results of the empirical mapping demonstrate
Czech company’s approach to environment and define the problem
areas and pinpoint the main limitation in the expansion of
environmental aspects. We contribute to the debate for recognition of
the particular role of environmental issues in business reality.
Abstract: During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Abstract: As the majority of faults are found in a few of its
modules so there is a need to investigate the modules that are
affected severely as compared to other modules and proper
maintenance need to be done in time especially for the critical
applications. As, Neural networks, which have been already applied
in software engineering applications to build reliability growth
models predict the gross change or reusability metrics. Neural
networks are non-linear sophisticated modeling techniques that are
able to model complex functions. Neural network techniques are
used when exact nature of input and outputs is not known. A key
feature is that they learn the relationship between input and output
through training. In this present work, various Neural Network Based
techniques are explored and comparative analysis is performed for
the prediction of level of need of maintenance by predicting level
severity of faults present in NASA-s public domain defect dataset.
The comparison of different algorithms is made on the basis of Mean
Absolute Error, Root Mean Square Error and Accuracy Values. It is
concluded that Generalized Regression Networks is the best
algorithm for classification of the software components into different
level of severity of impact of the faults. The algorithm can be used to
develop model that can be used for identifying modules that are
heavily affected by the faults.
Abstract: Pattern recognition and image recognition methods are commonly developed and tested using testbeds, which contain known responses to a query set. Until now, testbeds available for image analysis and content-based image retrieval (CBIR) have been scarce and small-scale. Here we present the one million images CEA-List Image Collection (CLIC) testbed that we have produced, and report on our use of this testbed to evaluate image analysis merging techniques. This testbed will soon be made publicly available through the EU MUSCLE Network of Excellence.
Abstract: The purpose of the study is to determine the primary mathematics student teachers- views related to use instructional technology tools in course of the learning process and to reveal how the sample presentations towards different mathematical concepts affect their views. This is a qualitative study involving twelve mathematics students from a public university. The data gathered from two semi-structural interviews. The first one was realized in the beginning of the study. After that the representations prepared by the researchers were showed to the participants. These representations contain animations, Geometer-s Sketchpad activities, video-clips, spreadsheets, and power-point presentations. The last interview was realized at the end of these representations. The data from the interviews and content analyses were transcribed and read and reread to explore the major themes. Findings revealed that the views of the students changed in this process and they believed that the instructional technology tools should be used in their classroom.