Abstract: The emergence of information technology has
resulted in an ever-increasing demand to use computers for the
efficient management and dissemination of information. Keeping in
view the strong need of farmers to collect important and updated
information for interactive, flexible and quick decision-making, a
model of Decision Support System for Farm Management is
developed. The paper discusses the use of Internet technology for the
farmers to take decisions. A model is developed for the farmers to
access online interactive and flexible information for their farm
management. The workflow of the model is presented highlighting
the information transfer between different modules.
Abstract: Inadequate curriculum for software engineering is considered to be one of the most common software risks. A number of solutions, on improving Software Engineering Education (SEE) have been reported in literature but there is a need to collectively present these solutions at one place. We have performed a mapping study to present a broad view of literature; published on improving the current state of SEE. Our aim is to give academicians, practitioners and researchers an international view of the current state of SEE. Our study has identified 70 primary studies that met our selection criteria, which we further classified and categorized in a well-defined Software Engineering educational framework. We found that the most researched category within the SE educational framework is Innovative Teaching Methods whereas the least amount of research was found in Student Learning and Assessment category. Our future work is to conduct a Systematic Literature Review on SEE.
Abstract: Malaysian corporations going global increased
many folds. The shift from domestic to international operations
requires increased expatriation to achieve global business goals.
Therefore, this study aims to identify the determinants for success
in expatriation of Malaysian international corporations. There are
certain attributes necessary for a global employee to succeed in
international assignment. Self-administered questionnaires were
sent to 327 respondents with a response rate of 35.2 percent. The
results indicated that most Malaysian manufacturers are involved
in expatriation. For a global employee to succeed in an
international assignment, the ability to work in international teams
was identified and ranked as the most important factor in
determining the effectiveness of expatriation followed by language
proficiency, adaptability to the international assignment and
expatriate sensitivity to cultural elements. The results support
previous research with regard to the importance of an effective
expatriation selection process in order for a company-s
international expansion strategy to succeed.
Abstract: Since the 1990s the American furniture industry faces a transition period. Manufacturers, one of its most important actors made its entrance into the retail industry. This shift has had deep consequences not only for the American furniture industry as a whole, but also for other international furniture industries, especially the Chinese. The present work aims to analyze this actor based on the distinction provided by the Global Commodity Chain Theory. It stresses its characteristics, structure, operational way and importance for both the U.S. and the Chinese furniture industries.
Abstract: This paper explains how mobile learning assures sustainable e-education for multicultural group of students. This paper reports the impact of mobile learning on distance education in multicultural environment. The emergence of learning technologies through CD, internet, and mobile is increasingly adopted by distance institutes for quick delivery and cost-effective purposes. Their sustainability is conditioned by the structure of learners as well as the teaching community. The experimental study was conducted among the distant learners of Vinayaka Missions University located at Salem in India. Students were drawn from multicultural environment based on different languages, religions, class and communities. During the mobile learning sessions, the students, who are divided on language, religion, class and community, were dominated by play impulse rather than study anxiety or cultural inhibitions. This study confirmed that mobile learning improved the performance of the students despite their division based on region, language or culture. In other words, technology was able to transcend the relative deprivation in the multicultural groups. It also confirms sustainable e-education through mobile learning and cost-effective system of instruction. Mobile learning appropriates the self-motivation and play impulse of the young learners in providing sustainable e-education to multicultural social groups of students.
Abstract: In a none-super-competitive environment the concepts
of closed system, management control remains to be the dominant
guiding concept to management. The merits of closed loop have been
the sources of most of the management literature and culture for
many decades. It is a useful exercise to investigate and poke into the
dynamics of the control loop phenomenon and draws some lessons to
use for refining the practice of management. This paper examines the
multitude of lessons abstracted from the behavior of the Input /output
/feedback control loop model, which is the core of control theory.
There are numerous lessons that can be learned from the insights this
model would provide and how it parallels the management dynamics
of the organization. It is assumed that an organization is basically a
living system that interacts with the internal and external variables. A
viable control loop is the one that reacts to the variation in the
environment and provide or exert a corrective action. In managing
organizations this is reflected in organizational structure and
management control practices. This paper will report findings that
were a result of examining several abstract scenarios that are
exhibited in the design, operation, and dynamics of the control loop
and how they are projected on the functioning of the organization.
Valuable lessons are drawn in trying to find parallels and new
paradigms, and how the control theory science is reflected in the
design of the organizational structure and management practices. The
paper is structured in a logical and perceptive format. Further
research is needed to extend these findings.
Abstract: Post cracking behavior and load –bearing capacity of
the steel fiber reinforced high-strength concrete (SFRHSC) are
dependent on the number of fibers are crossing the weakest crack
(bridged the crack) and their orientation to the crack surface. Filling
the mould by SFRHSC, fibers are moving and rotating with the
concrete matrix flow till the motion stops in each internal point of the
concrete body. Filling the same mould from the different ends
SFRHSC samples with the different internal structures (and different
strength) can be obtained. Numerical flow simulations (using Newton
and Bingham flow models) were realized, as well as single fiber
planar motion and rotation numerical and experimental investigation
(in viscous flow) was performed. X-ray pictures for prismatic
samples were obtained and internal fiber positions and orientations
were analyzed. Similarly fiber positions and orientations in cracked
cross-section were recognized and were compared with numerically
simulated. Structural SFRHSC fracture model was created based on
single fiber pull-out laws, which were determined experimentally.
Model predictions were validated by 15x15x60cm prisms 4 point
bending tests.
Abstract: Use of the Internet and the World-Wide-Web
(WWW) has become widespread in recent years and mobile agent
technology has proliferated at an equally rapid rate. In this scenario
load balancing becomes important for P2P systems. Beside P2P
systems can be highly heterogeneous, i.e., they may consists of peers
that range from old desktops to powerful servers connected to
internet through high-bandwidth lines. There are various loads
balancing policies came into picture. Primitive one is Message
Passing Interface (MPI). Its wide availability and portability make it
an attractive choice; however the communication requirements are
sometimes inefficient when implementing the primitives provided by
MPI. In this scenario we use the concept of mobile agent because
Mobile agent (MA) based approach have the merits of high
flexibility, efficiency, low network traffic, less communication
latency as well as highly asynchronous. In this study we present
decentralized load balancing scheme using mobile agent technology
in which when a node is overloaded, task migrates to less utilized
nodes so as to share the workload. However, the decision of which
nodes receive migrating task is made in real-time by defining certain
load balancing policies. These policies are executed on PMADE (A
Platform for Mobile Agent Distribution and Execution) in
decentralized manner using JuxtaNet and various load balancing
metrics are discussed.
Abstract: This paper describes a system, in which various methods of text summarizing can be adapted to Polish. A structure of the system is presented. A modular construction of the system and access to the system via the Internet are signaled.
Abstract: Tasks of the work were study the possible E.coli
contamination in red deer meat, identify pathogenic strains from
isolated E.coli, determine their incidence in red deer meat and
determine the presence of VT1, VT2 and eaeA genes for the
pathogenic E.coli. 8 (10%) samples were randomly selected from 80
analysed isolates of E.coli and PCR reaction was performed on them.
PCR was done both on initial materials – samples of red deer meat -
and for already isolated liqueurs. Two of analysed venison samples
contain verotoxin-producing strains of E. coli. It means that this meat
is not safe to consumer. It was proven by the sequestration reaction of
E. coli and by comparison of the obtained results with the database of
microorganism genome available on the internet that the isolated
culture corresponds to region 16S rDNS of E. coli thus presenting
correctness of the microbiological methods.
Abstract: As a multicultural country, Indonesia has many subcultures
with unique performing arts. Some of them are well-known
to international tourists, such as music ensemble (known as gamelan)
in Bali and Java, shadow puppet play (wayang) in Java, and martial
arts (known as pencak silat) in Sumatra. Some examples of famous
traditional dances in Indonesia are Srimpi from Yogyakarta and Solo,
Legong from Bali, and Gong dance from Kalimantan. Performing arts
show the identity of a nation. However, they are a complex subject,
especially when they are addressed to children. The performing arts,
e.g. music, dance theatre, and opera are experiential, experimental,
and emotionally charged. Therefore, the right strategy and promotion
need to be developed to engage children to appreciate and preserve
traditional dances. This study aims to explore and identify
possibilities of internet usage as a medium to promote traditional
dances, especially to children in Indonesia.
Abstract: The aim of this paper is to study the internal
stabilization of the Bernoulli-Euler equation numerically. For this,
we consider a square plate subjected to a feedback/damping force
distributed only in a subdomain. An algorithm for obtaining an
approximate solution to this problem was proposed and implemented.
The numerical method used was the Finite Difference Method.
Numerical simulations were performed and showed the behavior of
the solution, confirming the theoretical results that have already been
proved in the literature. In addition, we studied the validation of the
numerical scheme proposed, followed by an analysis of the numerical
error; and we conducted a study on the decay of the energy associated.
Abstract: The purpose of this study was to explore the
demographic differences of international tourists according to three
main factors, including the value of time, shopping behavior and
shopping motivation. The Chatuchak Weekend Market is known as
one of the biggest weekend markets in the world. Too little academic
studies had been conducted in this area of weekend market, despite its
growth and continuous development. In general, both domestic
visitors and international tourists are attracted to the perception of
cheap and bargaining prices the weekend market. However, systematic
research study can provide reliable understanding of the perception of
the visitors.
This study focused on the group of international tourists who visited
the market and aimed to provide better insights based on the
differences in their demographic factors. Findings indicated that
several differences in value of time, shopping behavior, and shopping
motivation were identified by gender, income and age. Research
implications and directions for further studies were discussed.
Abstract: This paper deals with the experimental investigations
of the in-cylinder tumble flows in an unfired internal combustion
engine with a flat piston at the engine speeds ranging from 400 to
1000 rev/min., and also with the dome and dome-cavity pistons at an
engine speed of 1000 rev/min., using particle image velocimetry.
From the two-dimensional in-cylinder flow measurements, tumble
flow analysis is carried out in the combustion space on a vertical
plane passing through cylinder axis. To analyze the tumble flows,
ensemble average velocity vectors are used and to characterize it,
tumble ratio is estimated. From the results, generally, we have found
that tumble ratio varies mainly with crank angle position. Also, at the
end of compression stroke, average turbulent kinetic energy is more
at higher engine speeds. We have also found that, at 330 crank angle
position, flat piston shows an improvement of about 85 and 23% in
tumble ratio, and about 24 and 2.5% in average turbulent kinetic
energy compared to dome and dome-cavity pistons respectively
Abstract: In cryptography, confusion and diffusion are very
important to get confidentiality and privacy of message in block
ciphers and stream ciphers. There are two types of network to provide
confusion and diffusion properties of message in block ciphers. They
are Substitution- Permutation network (S-P network), and Feistel
network. NLFS (Non-Linear feedback stream cipher) is a fast and
secure stream cipher for software application. NLFS have two modes
basic mode that is synchronous mode and self synchronous mode.
Real random numbers are non-deterministic. R-box (random box)
based on the dynamic properties and it performs the stochastic
transformation of data that can be used effectively meet the
challenges of information is protected from international destructive
impacts. In this paper, a new implementation of stochastic
transformation will be proposed.
Abstract: The work presented in this study is related to an
energy system analysis based on passive cooling system for
dwellings. It consists to solar chimney energy performances
determination versus geometrical and environmental considerations
as the size and inlet width conditions of the chimney. Adrar site
located in the southern region of Algeria is chosen for this study
according to ambient temperature and solar irradiance technical data
availability. Obtained results are related to the glazing temperature
distributions, the chimney air flow and internal wall temperatures.
The air room change per hour (ACH) parameter, the outlet air
velocity and mass air flow rate are also determined. It is shown that
the chimney width has a significant effect on energy performances
compared to its entry size. A good agreement is observed between
these results and those obtained by others from the literature.
Abstract: Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
Abstract: Research papers are usually evaluated via peer
review. However, peer review has limitations in evaluating research
papers. In this paper, Scienstein and the new idea of 'collaborative
document evaluation' are presented. Scienstein is a project to
evaluate scientific papers collaboratively based on ratings, links,
annotations and classifications by the scientific community using the
internet. In this paper, critical success factors of collaborative
document evaluation are analyzed. That is the scientists- motivation
to participate as reviewers, the reviewers- competence and the
reviewers- trustworthiness. It is shown that if these factors are
ensured, collaborative document evaluation may prove to be a more
objective, faster and less resource intensive approach to scientific
document evaluation in comparison to the classical peer review
process. It is shown that additional advantages exist as collaborative
document evaluation supports interdisciplinary work, allows
continuous post-publishing quality assessments and enables the
implementation of academic recommendation engines. In the long
term, it seems possible that collaborative document evaluation will
successively substitute peer review and decrease the need for
journals.
Abstract: This paper describes the results of an extensive study
and comparison of popular hash functions SHA-1, SHA-256,
RIPEMD-160 and RIPEMD-320 with JERIM-320, a 320-bit hash
function. The compression functions of hash functions like SHA-1
and SHA-256 are designed using serial successive iteration whereas
those like RIPEMD-160 and RIPEMD-320 are designed using two
parallel lines of message processing. JERIM-320 uses four parallel
lines of message processing resulting in higher level of security than
other hash functions at comparable speed and memory requirement.
The performance evaluation of these methods has been done by using
practical implementation and also by using step computation
methods. JERIM-320 proves to be secure and ensures the integrity of
messages at a higher degree. The focus of this work is to establish
JERIM-320 as an alternative of the present day hash functions for the
fast growing internet applications.
Abstract: A known iterative computational procedure is used for
internal normal ball loads calculation in statically loaded single-row,
angular-contact ball bearings, subjected to a known thrust load,
which is applied in the inner ring at the geometric bearing center line.
Numerical aspects of the iterative procedure are discussed.
Numerical examples results for a 218 angular-contact ball bearing
have been compared with those from the literature. Twenty figures
are presented showing the geometrical features, the behavior of the
convergence variables and the following parameters as functions of
the thrust load: normal ball loads, contact angle, distance between
curvature centers, and normal ball and axial deflections between the
raceways.