Abstract: Data mining has been integrated into application systems to enhance the quality of the decision-making process. This study aims to focus on the integration of data mining technology and Knowledge Management System (KMS), due to the ability of data mining technology to create useful knowledge from large volumes of data. Meanwhile, KMS vitally support the creation and use of knowledge. The integration of data mining technology and KMS are popularly used in business for enhancing and sustaining organizational performance. However, there is a lack of studies that applied data mining technology and KMS in the education sector; particularly students- academic performance since this could reflect the IHL performance. Realizing its importance, this study seeks to integrate data mining technology and KMS to promote an effective management of knowledge within IHLs. Several concepts from literature are adapted, for proposing the new integrative data mining technology and KMS framework to an IHL.
Abstract: Open and distance learning is a fairly new concept in
Malawi. The major public provider, the Malawi College of Distance
Education, rolled out its activities only about 40 years ago. Over the
years, the demand for distance education has tremendously increased.
The present government has displayed positive political will to uplift
ODL as outlined in the Malawi Growth and Development Strategy as
well as the National Education Sector Plan. A growing national
interest in education coupled with political stability and a booming
ICT industry also raise hope for success. However, a fragile economy
with a GNI per capita of -US$ 200 over the last decade, poor public
funding, erratic power supply and lack of expertise put strain on
efforts towards the promotion of ODL initiatives. Despite the
challenges, the nation appears determined to go flat out and explore
all possible avenues that could revolutionise education access and
equity through ODL.
Abstract: The communication networks development and
advancement during two last decades has been toward a single goal
and that is gradual change from circuit-switched networks to packed
switched ones. Today a lot of networks operates are trying to
transform the public telephone networks to multipurpose packed
switch. This new achievement is generally called "next generation
networks". In fact, the next generation networks enable the operators
to transfer every kind of services (sound, data and video) on a
network. First, in this report the definition, characteristics and next
generation networks services and then ad-hoc networks role in the
next generation networks are studied.
Abstract: Energy generated by the force of water in hydropower
can provide a more sustainable, non-polluting alternative to fossil
fuels, along with other renewable sources of energy, such as wind,
solar and tidal power, bio energy and geothermal energy. Small scale
hydroelectricity in Iran is well suited for “off-grid" rural electricity
applications, while other renewable energy sources, such as wind,
solar and biomass, can be beneficially used as fuel for pumping
groundwater for drinking and small scale irrigation in remote rural
areas or small villages. Small Hydro Power plants in Iran have very
low operating and maintenance costs because they consume no fossil
or nuclear fuel and do not involve high temperature processes. The
equipment is relatively simple to operate and maintain. Hydropower
equipment can adjust rapidly to load changes. The extended
equipment life provides significant economic advantages. Some
hydroelectric plants installed 100 years ago still operate reliably. The
Polkolo river is located on Karun basin at southwest of Iran. Situation
and conditions of Polkolo river are evaluated for construction of
small hydropower in this article. The topographical conditions and
the existence of permanent water from springs provide the suitability
to install hydroelectric power plants on the river Polkolo. The
cascade plant consists of 9 power plants connected with each other
and is having the total head as 1100m and discharge about 2.5cubic
meter per second. The annual production of energy is 105.5 million
kwh.
Abstract: This research aims to study the preferable tourism and
the elements of choosing tourist destination from domestic tourist in
Bangkok and the nearby areas in Thailand.The data were collected by
using 1249 set of questionnaires, in mid-August 2012. The result
illustrates that religious destinations are the most preferable places
for the tourist. The average expense per travel is approximately 47
USD a time. Travellers travel based on the advertisement in the
television and internet and their decisions is based on the reputation
of the destinations.
The result on a place dimension demonstrates the neatness and
well managed location play a crucial role on tourist destination.
Gender, age, marriage status and their origins are affecting their
spending and travelling behaviour. The researcher reckon that
providing the area of arcade, selling the souvenir and promoting
tourism among a young professional group would be an important
key follow the income distribution policy, including managing the
destination to welcome the family group, which the result is to
identified as the highest spending.
Abstract: The purpose of this study is to suggest energy efficient
routing for ad hoc networks which are composed of nodes with limited
energy. There are diverse problems including limitation of energy
supply of node, and the node energy management problem has been
presented. And a number of protocols have been proposed for energy
conservation and energy efficiency. In this study, the critical point of
the EA-MPDSR, that is the type of energy efficient routing using only
two paths, is improved and developed. The proposed TP-MESR uses
multi-path routing technique and traffic prediction function to increase
number of path more than 2. It also verifies its efficiency compared to
EA-MPDSR using network simulator (NS-2). Also, To give a
academic value and explain protocol systematically, research
guidelines which the Hevner(2004) suggests are applied. This
proposed TP-MESR solved the existing multi-path routing problem
related to overhead, radio interference, packet reassembly and it
confirmed its contribution to effective use of energy in ad hoc
networks.
Abstract: In this paper a PID control strategy using neural
network adaptive RASP1 wavelet for WECS-s control is proposed.
It is based on single layer feedforward neural networks with hidden
nodes of adaptive RASP1 wavelet functions controller and an infinite
impulse response (IIR) recurrent structure. The IIR is combined by
cascading to the network to provide double local structure resulting
in improving speed of learning. This particular neuro PID controller
assumes a certain model structure to approximately identify the
system dynamics of the unknown plant (WECS-s) and generate the
control signal. The results are applied to a typical turbine/generator
pair, showing the feasibility of the proposed solution.
Abstract: This study aims to analyze the effect of e-learning on
photonics technology and daily livings among college students. The
course contents of photonics technology and daily livings are first
drafted based on research discussions and expert interviews. Having
expert questionnaires with Delphi Technique for three times, the
knowledge units and items for the course of photonics technology and
daily livings are established. The e-learning materials and the drafts of
instructional strategies, academic achievement, and learning attitude
scales are then developed. With expert inspection, reliability and
validity test, and experimental instructions, the scales and the material
are further revised. Finally, the formal instructions are implemented to
test the effect of different instructional methods on the academic
achievement of photonics technology and daily livings among students
in universities of technology. The research results show that e-learning
could effectively promote academic achievement and learning
attitude, and the students with e-learning obviously outperform the
ones with trandition instructions.
Abstract: An important task in solving second order linear ordinary differential equations by the finite difference is to choose a suitable stepsize h. In this paper, by using the stochastic arithmetic, the CESTAC method and the CADNA library we present a procedure to estimate the optimal stepsize hopt, the stepsize which minimizes the global error consisting of truncation and round-off error.
Abstract: This study describes the relationship between motivation factors and academic performance among distance education students enrolled in a postgraduate nursing course. Students (n=96) participated in a survey that assesses student's motivational orientations from a cognitive perspective using a selfadministered questionnaire based on Pintrich-s Motivation Strategies for Learning Questionnaire (MLSQ). Results showed students- motivational factors are highest on task value (6.44, 0.71); followed by intrinsic goal orientation (6.20, 0.76), control beliefs (6.02, 0.89); extrinsic goal orientation (5.85, 1.13); self-efficacy for learning and performance (5.62, 0.84), and finally, test anxiety (4.21, 1.37). Weak positive correlations were found between academic performance and intrinsic goal orientation (r=0.13), extrinsic goal orientation (r=0.04), task value (r=0.09), control beliefs (r=0.02), and self-efficacy (r=0.05), while there was weak negative correlation with test anxiety (r=-0.04). Conclusions from the study indicate the need to focus on improving tasks and targeting intrinsic goal orientations of students to courses since these were positively correlated with academic performance and downplay the use of tests since these were negatively correlated with academic performance.
Abstract: This paper proposes a novel methodology for enabling
debugging and tracing of production web applications without
affecting its normal flow and functionality. This method of debugging
enables developers and maintenance engineers to replace a set of
existing resources such as images, server side scripts, cascading
style sheets with another set of resources per web session. The new
resources will only be active in the debug session and other sessions
will not be affected. This methodology will help developers in tracing
defects, especially those that appear only in production environments
and in exploring the behaviour of the system. A realization of the
proposed methodology has been implemented in Java.
Abstract: As increasing importance of symbiosis and cooperation among mobile communication industries, the mobile ecosystem has been especially highlighted in academia and practice. The structure of mobile ecosystem is quite complex and the ecological role of actors is important to understand that structure. In this respect, this study aims to explore structure of mobile ecosystem in the case of Korea using inter-industry network analysis. Then, the ecological roles in mobile ecosystem are identified using centrality measures as a result of network analysis: degree of centrality, closeness, and betweenness. The result shows that the manufacturing and service industries are separate. Also, the ecological roles of some actors are identified based on the characteristics of ecological terms: keystone, niche, and dominator. Based on the result of this paper, we expect that the policy makers can formulate the future of mobile industry and healthier mobile ecosystem can be constructed.
Abstract: This paper presents a method for the detection of OD in the retina which takes advantage of the powerful preprocessing techniques such as the contrast enhancement, Gabor wavelet transform for vessel segmentation, mathematical morphology and Earth Mover-s distance (EMD) as the matching process. The OD detection algorithm is based on matching the expected directional pattern of the retinal blood vessels. Vessel segmentation method produces segmentations by classifying each image pixel as vessel or nonvessel, based on the pixel-s feature vector. Feature vectors are composed of the pixel-s intensity and 2D Gabor wavelet transform responses taken at multiple scales. A simple matched filter is proposed to roughly match the direction of the vessels at the OD vicinity using the EMD. The minimum distance provides an estimate of the OD center coordinates. The method-s performance is evaluated on publicly available DRIVE and STARE databases. On the DRIVE database the OD center was detected correctly in all of the 40 images (100%) and on the STARE database the OD was detected correctly in 76 out of the 81 images, even in rather difficult pathological situations.
Abstract: Clusters of microcalcifications in mammograms are an
important sign of breast cancer. This paper presents a complete
Computer Aided Detection (CAD) scheme for automatic detection of
clustered microcalcifications in digital mammograms. The proposed
system, MammoScan μCaD, consists of three main steps. Firstly
all potential microcalcifications are detected using a a method for
feature extraction, VarMet, and adaptive thresholding. This will also
give a number of false detections. The goal of the second step,
Classifier level 1, is to remove everything but microcalcifications.
The last step, Classifier level 2, uses learned dictionaries and sparse
representations as a texture classification technique to distinguish
single, benign microcalcifications from clustered microcalcifications,
in addition to remove some remaining false detections. The system
is trained and tested on true digital data from Stavanger University
Hospital, and the results are evaluated by radiologists. The overall
results are promising, with a sensitivity > 90 % and a low false
detection rate (approx 1 unwanted pr. image, or 0.3 false pr. image).
Abstract: This paper presents the results related to the
interference reduction technique in multistage multiuser detector for
asynchronous DS-CDMA system. To meet the real-time
requirements for asynchronous multiuser detection, a bit streaming,
cascade architecture is used. An asynchronous multiuser detection
involves block-based computations and matrix inversions. The paper
covers iterative-based suboptimal schemes that have been studied to
decrease the computational complexity, eliminate the need for matrix
inversions, decreases the execution time, reduces the memory
requirements and uses joint estimation and detection process that
gives better performance than the independent parameter estimation
method. The stages of the iteration use cascaded and bits processed
in a streaming fashion. The simulation has been carried out for
asynchronous DS-CDMA system by varying one parameter, i.e.,
number of users. The simulation result exhibits that system gives
optimum bit error rate (BER) at 3rd stage for 15-users.
Abstract: Skip cycle is a working strategy for spark ignition
engines, which allows changing the effective stroke of an engine
through skipping some of the four stroke cycles. This study proposes
a new mechanism to achieve the desired skip-cycle strategy for
internal combustion engines. The air and fuel leakage, which occurs
through the gas exchange, negatively affects the efficiency of the
engine at high speeds and loads. An absolute sealing is assured by
direct use of poppet valves, which are kept in fully closed position
during the skipped mode. All the components of the mechanism were
designed according to the real dimensions of the Anadolu Motor's
gasoline engine and modeled in 3D by means of CAD software. As
the mechanism operates in two modes, two dynamically equivalent
models are established to obtain the force and strength analysis for
critical components.
Abstract: The given work is devoted to the description of
Information Technologies NAS of Azerbaijan created and
successfully maintained in Institute. On the basis of the decision of
board of the Supreme Certifying commission at the President of the
Azerbaijan Republic and Presidium of National Academy of
Sciences of the Azerbaijan Republic, the organization of training
courses on Computer Sciences for all post-graduate students and
dissertators of the republic, taking of examinations of candidate
minima, it was on-line entrusted to Institute of Information
Technologies of the National Academy of Sciences of Azerbaijan.
Therefore, teaching the computer sciences to post-graduate
students and dissertators a scientific - methodological manual on
effective application of new information technologies for research
works by post-graduate students and dissertators and taking of
candidate minima is carried out in the Educational Center.
Information and communication technologies offer new
opportunities and prospects of their application for teaching and
training. The new level of literacy demands creation of essentially
new technology of obtaining of scientific knowledge. Methods of
training and development, social and professional requirements,
globalization of the communicative economic and political projects
connected with construction of a new society, depends on a level of
application of information and communication technologies in the
educational process. Computer technologies develop ideas of
programmed training, open completely new, not investigated
technological ways of training connected to unique opportunities of
modern computers and telecommunications. Computer technologies
of training are processes of preparation and transfer of the
information to the trainee by means of computer. Scientific and
technical progress as well as global spread of the technologies
created in the most developed countries of the world is the main
proof of the leading role of education in XXI century. Information
society needs individuals having modern knowledge. In practice, all
technologies, using special technical information means (computer,
audio, video) are called information technologies of education.
Abstract: A virtualized and virtual approach is presented on
academically preparing students to successfully engage at a strategic
perspective to understand those concerns and measures that are both
structured and not structured in the area of cyber security and
information assurance. The Master of Science in Cyber Security and
Information Assurance (MSCSIA) is a professional degree for those
who endeavor through technical and managerial measures to ensure
the security, confidentiality, integrity, authenticity, control,
availability and utility of the world-s computing and information
systems infrastructure. The National University Cyber Security and
Information Assurance program is offered as a Master-s degree. The
emphasis of the MSCSIA program uniquely includes hands-on
academic instruction using virtual computers. This past year, 2011,
the NU facility has become fully operational using system
architecture to provide a Virtual Education Laboratory (VEL)
accessible to both onsite and online students. The first student cohort
completed their MSCSIA training this past March 2, 2012 after
fulfilling 12 courses, for a total of 54 units of college credits. The
rapid pace scheduling of one course per month is immensely
challenging, perpetually changing, and virtually multifaceted. This
paper analyses these descriptive terms in consideration of those
globalization penetration breaches as present in today-s world of
cyber security. In addition, we present current NU practices to
mitigate risks.
Abstract: Hidden failure in a protection system has been
recognized as one of the main reasons which may cause to a power
system instability leading to a system cascading collapse. This paper
presents a computationally systematic approach used to obtain the
estimated average probability of a system cascading collapse by
considering the effect of probability hidden failure in a protection
system. The estimated average probability of a system cascading
collapse is then used to determine the severe loading condition
contributing to the higher risk of critical system cascading collapse.
This information is essential to the system utility since it will assist
the operator to determine the highest point of increased system
loading condition prior to the event of critical system cascading
collapse.
Abstract: Thermoacoustic instabilities in combustors have
remained a topic of investigation for over a few decades due to the
challenges it posses to the operation of low emission gas turbines.
For combustors burning liquid fuel, understanding the cause-andeffect
relationship between spray combustion dynamics and
thermoacoustic oscillations is imperative for the successful
development of any control methodology for its mitigation. The
paper presents some very unique operating characteristics of a
kerosene-fueled diffusion type combustor undergoing limit-cycle
oscillations. Combustor stability limits were mapped using three
different-sized injectors. The results show that combustor instability
depends on the characteristics of the fuel spray. A simple analytic
analysis is also reported in support of a plausible explanation for the
unique combustor behavior. The study indicates that high amplitude
acoustic pressure in the combustor may cause secondary breakdown
of fuel droplets resulting in premixed pre-vaporized type burning of
the diffusion type combustor.