Abstract: A pilot field study was conducted at the Jagjeetpur
Municipal Sewage treatment plant situated in the Haridwar town in
Uttarakhand state, India. The objectives of the present study were to
study the effect of treated wastewater on the production of various
paddy varieties (Sharbati, PR-114, PB-1, Menaka, PB1121 and PB
1509) and the emission of GHG gases (CO2, CH4 and N2O) as
compared to the same varieties grown in the control plots irrigated
with fresh water. Of late, the concept of water footprint assessment
has emerged, which explains enumeration of various types of water
footprints of an agricultural entity from its production to processing
stages. Paddy, the most water demanding staple crop of Uttarakhand
state, displayed a high green water footprint value of 2474.12 m3/
Ton. Most of the wastewater irrigated varieties displayed up to 6%
increase in production, except Menaka and PB-1121, which showed a
reduction in production (6% and 3% respectively), due to pest and
insect infestation. The treated wastewater was observed to be rich in
Nitrogen (55.94 mg/ml Nitrate), Phosphorus (54.24 mg/ml) and
Potassium (9.78 mg/ml), thus rejuvenating the soil quality and not
requiring any external nutritional supplements. A Percentage increase
of GHG gases of irrigation with treated municipal wastewater as
compared to control plots was observed as 0.4% - 8.6% (CH4), 1.1%
- 9.2% (CO2), and 0.07% - 5.8% (N2O). The variety, Sharbati,
displayed maximum production (5.5 ton/ha) and emerged as the most
resistant variety against pests and insects. The emission values of
CH4, CO2 and N2O were 729.31 mg/m2/d, 322.10 mg/m2/d and
400.21 mg/m2/d in water stagnant condition.
This study highlighted a successful possibility of reuse of
wastewater for non-potable purposes offering the potential for
exploiting this resource that can replace or reduce the existing use of
fresh water sources in agriculture sector.
Abstract: Durian is the flagship fruit of Mindanao and there is
an abundance of several cultivars with many confusing identities/
names.
The project was conducted to develop procedure for reliable and
rapid detection and sorting of durian planting materials. Moreover, it
is also aimed to establish specific genetic or DNA markers for routine
testing and authentication of durian cultivars in question.
The project developed molecular procedures for routine testing.
SSR primers were also screened and identified for their utility in
discriminating durian cultivars collected.
Results of the study showed the following accomplishments:
1. Twenty (29) SSR primers were selected and identified based on
their ability to discriminate durian cultivars,
2. Optimized and established standard procedure for identification
and authentication of Durian cultivars
3. Genetic profile of durian is now available at Biotech Unit
Our results demonstrate the relevance of using molecular
techniques in evaluating and identifying durian clones. The most
polymorphic primers tested in this study could be useful tools for
detecting variation even at the early stage of the plant especially for
commercial purposes. The process developed combines the efficiency
of the microsatellites development process with the optimization of
non-radioactive detection process resulting in a user-friendly protocol
that can be performed in two (2) weeks and easily incorporated into
laboratories about to start microsatellite development projects. This
can be of great importance to extend microsatellite analyses to other
crop species where minimal genetic information is currently
available. With this, the University can now be a service laboratory
for routine testing and authentication of durian clones.
Abstract: With the flourishing development of online shopping,
an increasing number of customers see online shopping as an
entertaining experience. Because the online consumer has a double
identity as a shopper and an Internet user, online shopping should offer
hedonic values of shopping and Internet usage. The purpose of this
study is to investigate hedonic online shopping motivations from the
perspectives of traditional hedonic value and flow theory.
The study adopted a focus group interview method, including two
online and two offline interviews. Four focus groups of shoppers
consisted of online professionals, online college students, offline
professionals and offline college students. The results of the study
indicate that traditional hedonic values and dimensions of flow theory
exist in the online shopping environment. The study indicated that
online shoppers seem to appreciate being able to learn things and grow
to become competitive achievers online. Comparisons of online
hedonic motivations between groups are conducted. This study serves
as a basis for the future growth of Internet marketing.
Abstract: In this paper we describe one critical research
program within a complex, ongoing multi-year project (2010 to 2014
inclusive) with the overall goal to improve the learning outcomes for
first year undergraduate commerce/business students within an
Information Systems (IS) subject with very large enrolment. The
single research program described in this paper is the analysis of
student attitudes and decision making in relation to the availability of
formative assessment feedback via Web-based real time conferencing
and document exchange software (Adobe Connect). The formative
assessment feedback between teaching staff and students is in respect
of an authentic problem-based, team-completed assignment. The
analysis of student attitudes and decision making is investigated via
both qualitative (firstly) and quantitative (secondly) application of the
Theory of Planned Behavior (TPB) with a two statistically-significant
and separate trial samples of the enrolled students. The initial
qualitative TPB investigation revealed that perceived self-efficacy,
improved time-management, and lecturer-student relationship
building were the major factors in shaping an overall favorable
student attitude to online feedback, whilst some students expressed
valid concerns with perceived control limitations identified within the
online feedback protocols. The subsequent quantitative TPB
investigation then confirmed that attitude towards usage, subjective
norms surrounding usage, and perceived behavioral control of usage
were all significant in shaping student intention to use the online
feedback protocol, with these three variables explaining 63 percent of
the variance in the behavioral intention to use the online feedback
protocol. The identification in this research of perceived behavioral
control as a significant determinant in student usage of a specific
technology component within a virtual learning environment (VLE)
suggests that VLEs could now be viewed not as a single, atomic
entity, but as a spectrum of technology offerings ranging from the
mature and simple (e.g., email, Web downloads) to the cutting-edge
and challenging (e.g., Web conferencing and real-time document
exchange). That is, that all VLEs should not be considered the same.
The results of this research suggest that tertiary students have the
technological sophistication to assess a VLE in this more selective
manner.
Abstract: Mahasweta Devi and Toni Morrison are the two
stalwarts of the Indian English and the Afro-American literature
respectively. The writings of these two novelists are authentic and
powerful records of the lives of the people because much of their
personal experiences have gone into the making of their works. Devi,
a representative force of the Indian English literature, is also a social
activist working with the tribals of Bihar, Jharkhand, Orissa and West
Bengal. Most of her works echo the lives and struggles of the
subalterns as is evident in her “best beloved book” Chotti Munda and
His Arrow. The novelist focuses on the struggle of the tribals against
the colonial and the feudal powers to create their own identity,
thereby, embarking on the ideological project of ‘setting the record
straight’. The Nobel Laureate Toni Morrison, on the other hand,
brings to the fore the crucial issues of gender, race and class in many
of her significant works. In one of her representative works Sula, the
protagonist emerges as a non- conformist and directly confronts the
notion of a ‘good woman’ nurtured by the community of the Blacks.
In addition to this, the struggle of the Blacks against the White
domination, also become an important theme of the text. The thrust
of the paper lies in making a critical analysis of the portrayal of the
heroic attempts of the subaltern protagonist and the artistic endeavor
of the novelists in challenging the stereotypes.
Abstract: In the last few decades, many southeast-Asia women
migrate to Taiwan by marriage, and it usually takes several years for
them to acquire Taiwanese citizenship. This study investigates the
relationship between their citizenship acquisition and whether they
develop Taiwanese identities, and how does it affect their ethnical
identity towards their original ethnics. Furthermore, the present study
also explores that whether citizenship acquisition help the immigrant
women to explore the host society further and make commitment to it,
or the identification towards mainstream Taiwanese society is only
symbolic and superficial? One hundred and ninety-two immigrant
women were measured using Multigroup Ethnic Identity
Measure-Revised and a global 10-point ethnic identity question.
Correlation tests, t-test, and hierarchical regression were performed to
answer the above questions. The results revealed that citizenship
acquisition does help immigrant women to identify with Taiwanese
society, but it does not affect how they identify with their own ethnics.
Furthermore, the results also indicated that acquiring citizenship
would not help these immigrant women become involved in deeper
cultural exploration of Taiwan nor would it encourage them to make
commitments to the host society.
Abstract: Validity, integrity, and impacts of the IT systems of
the US federal courts have been studied as part of the Human Rights
Alert-NGO (HRA) submission for the 2015 Universal Periodic
Review (UPR) of human rights in the United States by the Human
Rights Council (HRC) of the United Nations (UN). The current
report includes overview of IT system analysis, data-mining and case
studies. System analysis and data-mining show: Development and
implementation with no lawful authority, servers of unverified
identity, invalidity in implementation of electronic signatures,
authentication instruments and procedures, authorities and
permissions; discrimination in access against the public and
unrepresented (pro se) parties and in favor of attorneys; widespread
publication of invalid judicial records and dockets, leading to their
false representation and false enforcement. A series of case studies
documents the impacts on individuals' human rights, on banking
regulation, and on international matters. Significance is discussed in
the context of various media and expert reports, which opine
unprecedented corruption of the US justice system today, and which
question, whether the US Constitution was in fact suspended. Similar
findings were previously reported in IT systems of the State of
California and the State of Israel, which were incorporated, subject to
professional HRC staff review, into the UN UPR reports (2010 and
2013). Solutions are proposed, based on the principles of publicity of
the law and the separation of power: Reliance on US IT and legal
experts under accountability to the legislative branch, enhancing
transparency, ongoing vigilance by human rights and internet
activists. IT experts should assume more prominent civic duties in the
safeguard of civil society in our era.
Abstract: The problematic of gender and socioeconomic status
biased differences in academic motivation patterns is discussed.
Gender identity is understood according to symbolic interactionism
perspective: as a result of reflected appraisals, social comparisons,
self-attributions, and identifications, shaped by social environment
and family context. The effects of socioeconomic status on academic
motivation are conceptualized according to Bourdieu’s habitus
concept, reflecting the role of unconscious and internalized cultural
signals, proper to low and high socioeconomic status family contexts.
Since families differ by various socioeconomic features, the
hypothesis about possible impact of parents’ socioeconomic status on
their children’s academic motivation interfering with gender
socialization effects is held. The survey, aiming to seize gender
differences in academic motivation and self-recorded improvementoriented
efforts as a result of socialization processes operating in the
families of low and high socioeconomic status, was designed. The
results of Lithuanian higher education students’ survey are presented
and discussed.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: Accounting policies are a set of solutions compliant
with legal regulations that an entity selects and adopts, and which
guarantee a proper quality of financial statements. Those solutions
may differ depending on whether the entity adopts national or
international accounting standards.
The aim of this article is to present accounting principles (policies)
in Polish and international legal regulations and their adoption in
selected Polish companies listed on the Warsaw Stock Exchange. The
research method adopted in this work is the analysis and evaluation
of legal conditions in Polish companies.
Abstract: This paper describes a logical method to enhance
security on the grid computing to restrict the misuse of the grid
resources. This method is an economic and efficient one to avoid the
usage of the special devices. The security issues, techniques and
solutions needed to provide a secure grid computing environment are
described. A well defined process for security management among
the resource accesses and key holding algorithm is also proposed. In
this method, the identity management, access control and
authorization and authentication are effectively handled.
Abstract: Inland Waterway Transportation (IWT) is playing an
important role in national transport systems, water transportation is
considered to be safe, energy efficient and environmentally friendly
mode of transport, all benefits of IWT cause national awareness
increase, for instance the Colombian government is planning to
restore the navigability of the most important river of the country, the
Magdalena’s River navigability, embrace waterway transportation in
Colombia could strength competitiveness while reduce most of the
transport externalities. However, the current situation of the
Magdalena is deplorable, the most important river of Colombia has
been abandoned for decades and the solution is beyond of a single
administrative entity. This paper analyzes the outcomes of the
Navigation And Inland Waterway Action and Development in
Europe program (NAIADES) as a prospective to develop a similar
program in Colombia with similar objectives and guidelines,
considering sustainability, guarantying the long-term future results
and adaptability of the program. Identifying stakeholders and policy
experts, a set of individual interviews were carried out; findings
support the idea of lack of integration within governmental
institutions and lack of importance in marketing promotion as
possible drawbacks on the implementation of IWT projects.
Abstract: The use of information and communication
technologies such as computers, mobile phones and the Internet is
becoming prevalent in today’s world; and it is facilitating access to a
vast amount of data, services and applications for the improvement of
people’s lives. However, this prevalence of ICTs is hampered by the
problem of low income levels in developing countries to the point
where people cannot timeously replace or repair their ICT devices
when damaged or lost; and this problem serves as a motivation for
this study whose aim is to examine the perceptions of teachers on the
reliability of cellphones when used for teaching and learning
purposes. The research objectives unfolding this aim are of two
types: Objectives on the selection and design of theories and models,
and objectives on the empirical testing of these theories and models.
The first type of objectives is achieved using content analysis in an
extensive literature survey: and the second type of objectives is
achieved through a survey of high school teachers from the ILembe
and UMgungundlovu districts in the KwaZulu-Natal province of
South Africa. Data collected from this questionnaire based survey is
analysed in SPSS using descriptive statistics and Pearson correlations
after checking the reliability and validity of the questionnaires. The
main hypothesis driving this study is that there is a relationship
between the demographics and the attribution identity of teachers on
one hand, and their perceptions on the reliability of cellphones on the
other hand, as suggested by existing literature; except that attribution
identities are considered in this study under three angles: intention,
knowledge and ability, and action. The results of this study confirm
that the perceptions of teachers on the reliability of cellphones for
teaching and learning are affected by the school location of these
teachers, and by their perceptions on learners’ cellphones usage
intentions and actual use.
Abstract: This study discovers a novel framework of individual
level technology adoption known as I-P (Individual- Privacy) towards
health information application in Smart National Identity Card. Many
countries introduced smart national identity card (SNIC) with various
applications such as health information application embedded inside
it. However, the degree to which citizens accept and use some of the
embedded applications in smart national identity remains unknown to
many governments and application providers as well. Moreover, the
factors of trust, perceived risk, Privacy concern and perceived
credibility need to be incorporated into more comprehensive models
such as extended Unified Theory of Acceptance and Use of
Technology known as UTAUT2. UTAUT2 is a mainly widespread
and leading theory up to now. This research identifies factors
affecting the citizens’ behavioural intention to use health information
application embedded in SNIC and extends better understanding on
the relevant factors that the government and the application providers
would need to consider in predicting citizens’ new technology
acceptance in the future. We propose a conceptual framework by
combining the UTAUT2 and Privacy Calculus Model constructs and
also adding perceived credibility as a new variable. The proposed
framework may provide assistance to any government planning,
decision, and policy makers involving e-government projects.
Empirical study may be conducted in the future to provide proof and
empirically validate this I-P framework.
Abstract: As an entity of the tourism system, local communities
were considered have better understanding of their region as well as
influenced positively or negatively by the tourism activities in the
region. This paper aimed to study role of community involvement in
the development of ecotourism at Kintamani Bali from two
perspectives of view, i.e. participation in the process of initiatives and
participation in the utilizing the economic benefits of tourism.
Thorough participation as an antecedent of social capital form, the
sustainability of ecotourism at Kintamani could be expected.
Abstract: One of the major goals of Spoken Dialog Systems
(SDS) is to understand what the user utters.
In the SDS domain, the Spoken Language Understanding (SLU)
Module classifies user utterances by means of a pre-definite
conceptual knowledge. The SLU module is able to recognize only the
meaning previously included in its knowledge base. Due the vastity
of that knowledge, the information storing is a very expensive
process.
Updating and managing the knowledge base are time-consuming
and error-prone processes because of the rapidly growing number of
entities like proper nouns and domain-specific nouns. This paper
proposes a solution to the problem of Name Entity Recognition
(NER) applied to a SDS domain. The proposed solution attempts to
automatically recognize the meaning associated with an utterance by
using the PANKOW (Pattern based Annotation through Knowledge
On the Web) method at runtime.
The method being proposed extracts information from the Web to
increase the SLU knowledge module and reduces the development
effort. In particular, the Google Search Engine is used to extract
information from the Facebook social network.
Abstract: Bangnoi Floating Market located at Bangkhonthi
Districts Samut Songkhram Province is a valuable architectural
market. The lifestyle of the community's relationship with the living
space and the relationship between the architectural style of the area's
residential waterfront communities of Bangnoi Floating Bangkhonthi
Districts Samut Songkhram Province, which deserves to be
preserved.
Therefore, this research it helps to know the value of the
architectural style of the area's residential waterfront communities of
Bangnoi Floating Bangkhonthi Districts SamutSongkhram Province,
which deserves to be preserved.
Abstract: The research about Formal Thai National Costume in the reign of King Bhumibol Adulyadej is an applied research that aimed to study the accurate knowledge concerning to Thai national costume in the reign of King Rama IX, also to study origin of all costumes in the reign of King Rama IX and to study the style, material used, and using accasion. This research methodology which are collect quanlitative data through observation, document, and photograph from key informant of costume in the reign of King Rama IX and from another who related to this field.
The formal Thai national costume of the reign of King Bhumibol Adulyadej originated from the visit of His Majesty the King to Europe and America in 1960. Since Thailand had no traditional national costume; Her Majesty the Queen initiated the idea to create formal Thai national costumes. In 1964, Her Majesty the Queen selected 8 styles of formal Thai national costume. Later, Her Majesty the Queen confered another 3 formal Thai national costume for men. There are 8 styles of formal Thai national costume for women: Thai Ruean Ton, Thai Chit Lada, Thai Amarin, Thai Borom Phiman, Thai Siwalia, Thai Chakkri, Thai Dusit, and Thai Chakkraphat. There are 3 styles of formal Thai national costume for men: short-sleeve shirt, long-sleeve shirt, and long-sleeve shirt with breechcloth. The costume is widely used in formal ceremony such as greeting ceremony for official foreign visitors, wedding ceremony, or other auspicious ceremonies. Now a day, they are always used as a bridal gown as well. The formal Thai national costume is valuable art that shows Thai identity and, should be preserved for the next generation.
Abstract: In the world of modern communications, visual identity has predominant influence on the overall success of tourist destinations, but despite of these, the problem of designing thriving tourist destination visual identity and their components are hardly addressed. This study highlights the importance of building and managing the visual identity of tourist destination, and based on the empirical study of well-known Mediterranean destination of Croatia analyses three main components of tourist destination visual identity; name, slogan, and logo. Moreover, the paper shows how respondents perceive each component of Croatia’s visual identity. According to study, logo is the most important, followed by the name and slogan. Research also reveals that Croatian economy lags behind developed countries in understanding the importance of visual identity, and its influence on marketing goal achievements.
Abstract: The main aim of this article is to give the information about life and social and diplomatic work of Zhou Enlai, to prove his identity in his impact to the history of the world; to show his place in the organization of internal and foreign policy and in the peaceful international relationships of China with other countries.