Abstract: The focus of this research is in the area of the soviet period and the mission of the Russian Orthodox Church in Kazakhstan in the XIX century. There was close connection of national customs and traditions with religious practices, outlooks and attitudes. In particular, such an approach has alleged estimation by Kazakh historians of the process of Christianization of the local population. Some of them are inclined to consider the small number of Christening Kazakhs as evidence that the Russian Orthodox Church didn’t achieve its mission. The number of historians who think that the church didn’t achieve its mission has thousand over the last centuries, however our calculations of the number of Kazakhs who became Orthodox Christian is much more than other historians think. Such Christians can be divided into 3 groups: Some remained Christian until their deaths, others had two faiths and the third hid their true religions, having returned to their former belief. Therefore, to define the exact amount of Christening Kazakhs represented a challenge. Some data does not create a clear picture of the level of Christianization, constant and accurate was not collected. The data appearing in reports of spiritual attendants and civil authorities is not always authentic. Article purpose is illumination and the analysis missionary activity of Russian Orthodox Church in Kazakhstan.
Abstract: Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
Abstract: The growing problem of youth unemployment in
Egypt after the 25th January Revolution has directed the attention of
some human resource experts towards considering remote
employment as a partial remedy for the unemployed youth instead of
the unavailable traditional jobs, a trend which will also help with the
congested offices and unsolved traffic problem in Cairo and spread
a flexible work culture, but despite of that, the main issue remains
unresolved for these organizations to deal with the system challenges.
In the past few years, in developed countries, there has been a
growing trend for many companies to shift to remote employment
instead of the traditional office employment for many reasons: due to
the growing technological advances that helped some employees do
their work from home on a part time basis, the need for achieving an
employee-s work balance in the middle of unbalanced complicated
life, top management focus on employee-s productivity rather their
time spent at work. The objective of this paper is to study and analyze
the advantages and challenges that Egypt-s labor force will be facing
in their implementation of remote or virtual employment in both
government and private organizations after the 25th January
revolution. Therefore, the research question will be: What are the
advantages and different challenges that Egyptian organizations
might face in their implementation for remote employment system
and how can they manage these challenges for the system to work
effectively? The study is divided into six main parts: the introduction,
objective and importance of the study, research problem,
methodology, experience of some countries that implemented remote
employment, advantages and challenges of implementing remote
employment in Egypt and then the conclusion which discuses the
results and recommendations of the study.
Abstract: It is claimed that a new style of urban planning and
policy intertwined with ICT is emerging and urban planning and ICT
policy are no longer considered as separate disciplines. The
interactions between electronic spaces and urban spaces are so
complex and uncertain that confront urban planners and policy makers
with great challenges. However, the assumption about the relationship
between ICT and urban planning is mainly based on North American
and European experiences. In the light of empirical evidence from
Taipei City, this paper shows that this new type of urban planning and
policy intertwined with ICT has existed in Asian city for a decade as
well. Based on these results, this paper further reviews how the Taipei
City government implements this new type of urban ICT planning and
the validity and realism of its underlying assumptions. Finally, it also
explores the extent to which urban ICT planning could promote
positive synergies between physical and electronic developments.
Abstract: One of the main challenges for one phase anaerobic digestion processes is the high concentration of NH4+ and PO4 3- ions
in the digested sludge supernatant. This project focuses on enhancing the removal of nutrients during the anaerobic digestion process through fixing both NH4+ and PO4 3- ions in the form of struvite (magnesium ammonium phosphate, MAP, MgNH4PO4.6H2O) within the anaerobic sludge. Batch anaerobic digestion tests showed that Mg2+ concentration in the range 279 – 812 mg/L had insignificant effect on CGP but incurred a slight increase in COD removal. The reactor that had soluble Mg2+:NH4+:PO43- at a molar ratio of 1.28:1:00:1:00 achieved the best performance enhancement of 8% increase in COD removal and 32% reduction in NH4+ in the reactor supernatant. Overall, the results show that there is a potential to optimise conventional anaerobic digestion such that supernatant lean in P and N, and sludge rich in nutrients are obtained.
Abstract: Bythe development of the Internet, e-commerce has
got very popular between organizations. E-commerce means buying
and selling products and services over the Internet. One of the
challenging issues in e-commerce is how to attract the customers and
how to satisfy them. Therefore, it is important to keep good
relationship with the customers. This paper proposes a new model to
increase the customer satisfaction by introducing live-operator.
Live-operator is a system which is involved both with the customers
and the organization.In this system the customers feelthatthey receive
the service directly from the organization. This model decreases the
response time and the customer loss. Moreover, it increases customer
trust and the ability of organizations.
Abstract: When acid is pumped into damaged reservoirs for
damage removal/stimulation, distorted inflow of acid into the
formation occurs caused by acid preferentially traveling into highly
permeable regions over low permeable regions, or (in general) into
the path of least resistance. This can lead to poor zonal coverage and
hence warrants diversion to carry out an effective placement of acid.
Diversion is desirably a reversible technique of temporarily reducing
the permeability of high perm zones, thereby forcing the acid into
lower perm zones.
The uniqueness of each reservoir can pose several challenges to
engineers attempting to devise optimum and effective diversion
strategies. Diversion techniques include mechanical placement and/or
chemical diversion of treatment fluids, further sub-classified into ball
sealers, bridge plugs, packers, particulate diverters, viscous gels,
crosslinked gels, relative permeability modifiers (RPMs), foams,
and/or the use of placement techniques, such as coiled tubing (CT)
and the maximum pressure difference and injection rate (MAPDIR)
methodology.
It is not always realized that the effectiveness of diverters greatly
depends on reservoir properties, such as formation type, temperature,
reservoir permeability, heterogeneity, and physical well
characteristics (e.g., completion type, well deviation, length of
treatment interval, multiple intervals, etc.). This paper reviews the
mechanisms by which each variety of diverter functions and
discusses the effect of various reservoir properties on the efficiency
of diversion techniques. Guidelines are recommended to help
enhance productivity from zones of interest by choosing the best
methods of diversion while pumping an optimized amount of
treatment fluid. The success of an overall acid treatment often
depends on the effectiveness of the diverting agents.
Abstract: The request for a sustainable development challenges
both managers and consumers to rethink habitual practices and
activities. While consumers are challenged to develop sustainable
consumption patterns, companies are asked to establish managerial
systems and structures considering economical, ecological, and social
issues. As this is in particular true for housing associations, this paper
aims first, at providing an understanding of sustainability strategy in
residential trade and industry (RTI) by identifying relevant facets of
this construct and second, at conceptually analyzing the impact of
sustainability strategy in RTI on operational efficiency and
performance of municipal housing companies. The author develops a
model of sustainability strategy in RTI and its effects and further,
sheds light in priorities for future research.
Abstract: Introducing Electromagnetic Interference and Electromagnetic Compatibility, or “The Art of Black Magic", for engineering students might be a terrifying experience both for students and tutors. Removing the obstacle of large, expensive facilities like a fully fitted EMC laboratory and hours of complex theory, this paper demonstrates a design of a laboratory setup for student exercises, giving students experience in the basics of EMC/EMI problems that may challenge the functionality and stability of embedded system designs. This is done using a simple laboratory installation and basic measurement equipment such as a medium cost digital storage oscilloscope, at the cost of not knowing the exact magnitude of the noise components, but rather if the noise is significant or not, as well as the source of the noise. A group of students have performed a trial exercise with good results and feedback.
Abstract: Knowledge is renowned as a significant component
for sustaining competitive advantage and gives leading edge in
business. This study emphasizes towards proper and effectuate
utilization of internal and external (both either explicit or tacit)
knowledge comes from stakeholders, highly supportive to combat
with the challenges and enhance organizational productivity.
Furthermore, it proposed a model under context of IRSA framework
which facilitates the organization including flow of knowledge and
experience sharing among employees. In discussion section an
innovative model which indulges all functionality as mentioned in
analysis section.
Abstract: Coordinated supply chain represents major challenges
for the different actors involved in it, because each agent responds to
individual interests. The paper presents a framework with the
reviewed literature regarding the system's decision structure and
nature of demand. Later, it characterizes an agri food supply chain in
the Central Region of Colombia, it responds to a decentralized
distribution system and a stochastic demand. Finally, the paper
recommends coordinating the chain based on shared information, and
mechanisms for each agent, as VMI (vendor-managed inventory)
strategy for farmer-buyer relationship, information system for
farmers and contracts for transportation service providers.
Abstract: Many studies have focused on the nonlinear analysis
of electroencephalography (EEG) mainly for the characterization of
epileptic brain states. It is assumed that at least two states of the
epileptic brain are possible: the interictal state characterized by a
normal apparently random, steady-state EEG ongoing activity; and
the ictal state that is characterized by paroxysmal occurrence of
synchronous oscillations and is generally called in neurology, a
seizure.
The spatial and temporal dynamics of the epileptogenic process is
still not clear completely especially the most challenging aspects of
epileptology which is the anticipation of the seizure. Despite all the
efforts we still don-t know how and when and why the seizure
occurs. However actual studies bring strong evidence that the
interictal-ictal state transition is not an abrupt phenomena. Findings
also indicate that it is possible to detect a preseizure phase.
Our approach is to use the neural network tool to detect interictal
states and to predict from those states the upcoming seizure ( ictal
state). Analysis of the EEG signal based on neural networks is used
for the classification of EEG as either seizure or non-seizure. By
applying prediction methods it will be possible to predict the
upcoming seizure from non-seizure EEG.
We will study the patients admitted to the epilepsy monitoring
unit for the purpose of recording their seizures. Preictal, ictal, and
post ictal EEG recordings are available on such patients for analysis
The system will be induced by taking a body of samples then
validate it using another. Distinct from the two first ones a third body
of samples is taken to test the network for the achievement of
optimum prediction. Several methods will be tried 'Backpropagation
ANN' and 'RBF'.
Abstract: Till date, English as a Second Language (ESL) educators involved in teaching language and communication to engineering students face an uphill task in developing graduate communicative competency. This challenge is accentuated by the apparent lack of English for Specific Purposes (ESP) materials for engineering students in the engineering curriculum. As such, most ESL educators are forced to play multiple roles. They don tasks such as curriculum designers, material writers and teachers with limited knowledge of the disciplinary content. Previous research indicates that prospective professional engineers should possess some sub-sets of competency: technical, linguistic oral immediacy, meta-cognitive and rhetorical explanatory competence. Another study revealed that engineering students need to be equipped with technical and linguistic oral immediacy competence. However, little is known whether these competency needs are in line with the educators- perceptions of communicative competence. This paper examines the best mix of communicative competence subsets that create the magic for engineering students in technical oral presentations. For the purpose of this study, two groups of educators were interviewed. These educators were language and communication lecturers involved in teaching a speaking course and content experts who assess students- technical oral presentations at tertiary level. The findings indicate that these two groups differ in their perceptions
Abstract: This paper provides an introduction into the evolution
of information and communication technology and illustrates its
usage in the work domain. The paper is sub-divided into two parts.
The first part gives an overview over the different phases of
information processing in the work domain. It starts by charting the
past and present usage of computers in work environments and shows
current technological trends, which are likely to influence future
business applications. The second part starts by briefly describing,
how the usage of computers changed business processes in the past,
and presents first Ambient Intelligence applications based on
identification and localization information, which are already used in
the production and retail sector. Based on current systems and
prototype applications, the paper gives an outlook of how Ambient
Intelligence technologies could change business processes in the
future.
Abstract: As mobile ad hoc networks (MANET) have different
characteristics from wired networks and even from standard wireless
networks, there are new challenges related to security issues that
need to be addressed. Due to its unique features such as open nature,
lack of infrastructure and central management, node mobility and
change of dynamic topology, prevention methods from attacks on
them are not enough. Therefore intrusion detection is one of the
possible ways in recognizing a possible attack before the system
could be penetrated. All in all, techniques for intrusion detection in
old wireless networks are not suitable for MANET. In this paper, we
classify the architecture for Intrusion detection systems that have so
far been introduced for MANETs, and then existing intrusion
detection techniques in MANET presented and compared. We then
indicate important future research directions.
Abstract: Innovations in technology have created new ethical
challenges. Essential use of electronic communication in the
workplace has escalated at an astronomical rate over the past decade.
As such, legal and ethical dilemmas confronted by both the employer
and the employee concerning managerial control and ownership of einformation
have increased dramatically in the USA. From the
employer-s perspective, ownership and control of all information
created for the workplace is an undeniable source of economic
advantage and must be monitored zealously. From the perspective of
the employee, individual rights, such as privacy, freedom of speech,
and freedom from unreasonable search and seizure, continue to be
stalwart legal guarantees that employers are not legally or ethically
entitled to abridge in the workplace. These issues have been the
source of great debate and the catalyst for legal reform. The fine line
between ethical and legal has been complicated by emerging
technologies. This manuscript will identify and discuss a number of
specific legal and ethical issues raised by the dynamic electronic
workplace and conclude with suggestions that employers should
follow to respect the delicate balance between employees- legal
rights to privacy and the employer's right to protect its knowledge
systems and infrastructure.
Abstract: Increase in globalization of capital markets brings the
higher requirements on financial information provided for investors
who look for a highly comparable information. Paper deals with the
advantages and limitations of applying International Financial
Reporting Standards (IFRS) in the Czech Republic and Ukraine. As a
greatest limit for full adoption of IFRS shall be acknowledged the
strong connection of continental accounting to tax system and
enormous high administrative burden for IFRS appliers.
Abstract: Only recently have water ethics received focused interest in the international water community. Because water is metabolically basic to life, an ethical dimension persists in every decision related to water. Water ethics at once express human society-s approach to water and act as guidelines for behaviour. Ideas around water are often implicit and embedded as assumptions. They can be entrenched in behaviour and difficult to contest because they are difficult to “see". By explicitly revealing the ethical ideas underlying water-related decisions, human society-s relationship with water, and with natural systems of which water is part, can be contested and shifted or be accepted with conscious intention by human society. In recent decades, improved understanding of water-s importance for ecosystem functioning and ecological services for human survival is moving us beyond this growth-driven, supplyfocused management paradigm. Environmental ethics challenge this paradigm by extending the ethical sphere to the environment and thus water or water Resources management per se. An ethical approach is a legitimate, important, and often ignored approach to effect change in environmental decision making. This qualitative research explores principles of water ethics and examines the underlying ethical precepts of selected water policy examples. The constructed water ethic principles act as a set of criteria against which a policy comparison can be established. This study shows that water Resources management is a progressive issue by embracing full public participation and a new planning model, and knowledgegeneration initiatives.
Abstract: During recent years, attention in 'Green Computing'
has moved research into energy-saving techniques for home
computers to enterprise systems' Client and Server machines. Saving
energy or reduction of carbon footprints is one of the aspects of
Green Computing. The research in the direction of Green Computing
is more than just saving energy and reducing carbon foot prints. This
study provides a brief account of Green Computing. The emphasis of
this study is on current trends in Green Computing; challenges in the
field of Green Computing and the future trends of Green Computing.