Abstract: When consistently innovative business-models can
give companies a competitive advantage, longitudinal empirical
research, which can reflect dynamic business-model changes, has yet
to prove a definitive connection. This study consequently employs a
dynamic perspective in conjunction with innovation theory to examine
the relationship between the types of business-model innovation and
firm value. This study tries to examine various types of
business-model innovation in high-end and low-end technology
industries such as HTC and the 7-Eleven chain stores with research
periods of 14 years and 32 years, respectively. The empirical results
suggest that adopting radical business-model innovation in addition to
expanding new target markets can successfully lead to a competitive
advantage. Sustained advanced technological competences and
service/product innovation are the key successful factors in high-end
and low-end technology industry business-models respectively. In
sum up, the business-model innovation can yield a higher market value
and financial value in high-end technology industries than low-end
ones.
Abstract: Social media has led to paradigm shifts in ways
people work and do business, interact and socialize, learn and obtain
knowledge. So much so that social media has established itself as an
important spatial extension of this nation-s historicity and challenges.
Regardless of the enabling reputation and recommendation features
through social networks embedded in the social media system, the
overflow of broadcasted and publicized media contents turns the
table around from engendering trust to doubting the trust system.
When the trust is at doubt, the effects include deactivation of
accounts and creation of multiple profiles, which lead to the overflow
of 'ghost' contents (i.e. “the abundance of abandoned ships"). In
most literature, the study of trust can be related to culture; hence the
difference between Western-s “openness" and Eastern-s “blue-chip"
concepts in networking and relationships. From a survey on issues
and challenges among Malaysian social media users, 'authenticity'
emerges as one of the main factors that causes and is caused by other
factors. The other issue that has surfaced is credibility either in terms
of message/content and source. Another is the quality of the
knowledge that is shared. This paper explores the terrains of this
critical space which in recent years has been dominated increasingly
by, arguably, social networks embedded in the social media system,
the overflow of broadcasted and publicized media content.
Abstract: Seemingly simple probabilities in the m-player game bingo have never been calculated. These probabilities include expected game length and the expected number of winners on a given turn. The difficulty in probabilistic analysis lies in the subtle interdependence among the m-many bingo game cards in play. In this paper, the game i got it!, a bingo variant, is considered. This variation provides enough weakening of the inter-player dependence to allow probabilistic analysis not possible for traditional bingo. The probability of winning in exactly k turns is calculated for a one-player game. Given a game of m-many players, the expected game length and tie probability are calculated. With these calculations, the game-s interesting payout scheme is considered.
Abstract: In this article, we propose a new surgical device for
circumferentially excision of high anal fistulas in a minimally
invasive manner. The new apparatus works on the basis of axially
rotating and moving a tubular blade along a fistulous tract
straightened using a rigid straight guidewire. As the blade moves
along the tract, its sharp circular cutting edge circumferentially
separates approximately 2.25 mm thickness of tract encircling the
rigid guidewire. We used the new set to excise two anal fistulas in a
62-year-old male patient, an extrasphincteric type and a long tract
with no internal opening. With regard to the results of this test, the
new device can be considered as a sphincter preserving mechanism
for treatment of high anal fistulas. Consequently, a major reduction
in the risk of fecal incontinence, recurrence rate, convalescence
period and patient morbidity may be achieved using the new device
for treatment of fistula-in-ano.
Abstract: Text categorization is the problem of classifying text documents into a set of predefined classes. After a preprocessing step the documents are typically represented as large sparse vectors. When training classifiers on large collections of documents, both the time and memory restrictions can be quite prohibitive. This justifies the application of features selection methods to reduce the dimensionality of the document-representation vector. Four feature selection methods are evaluated: Random Selection, Information Gain (IG), Support Vector Machine (called SVM_FS) and Genetic Algorithm with SVM (GA_FS). We showed that the best results were obtained with SVM_FS and GA_FS methods for a relatively small dimension of the features vector comparative with the IG method that involves longer vectors, for quite similar classification accuracies. Also we present a novel method to better correlate SVM kernel-s parameters (Polynomial or Gaussian kernel).
Abstract: It is well recognized that the green house gases such
as Chlorofluoro Carbon (CFC), CH4, CO2 etc. are responsible
directly or indirectly for the increase in the average global temperature
of the Earth. The presence of CFC is responsible for
the depletion of ozone concentration in the atmosphere due to
which the heat accompanied with the sun rays are less absorbed
causing increase in the atmospheric temperature of the Earth. The
gases like CH4 and CO2 are also responsible for the increase in
the atmospheric temperature. The increase in the temperature level
directly or indirectly affects the dynamics of interacting species
systems. Therefore, in this paper a mathematical model is proposed
and analysed using stability theory to asses the effects of increasing
temperature due to greenhouse gases on the survival or extinction of
populations in a prey-predator system. A threshold value in terms
of a stress parameter is obtained which determines the extinction or
existence of populations in the underlying system.
Abstract: This study focuses on examining why the range of
experience with respect to HIV infection is so diverse, especially in
regard to the latency period. An agent-based approach in modelling
the infection is used to extract high-level behaviour which cannot be
obtained analytically from the set of interaction rules at the cellular
level. A prototype model encompasses local variation in baseline
properties, contributing to the individual disease experience, and is
included in a network which mimics the chain of lymph nodes. The
model also accounts for stochastic events such as viral mutations.
The size and complexity of the model require major computational
effort and parallelisation methods are used.
Abstract: This study was conducted to determine the
objectivity, reliability and validity of the 90º push-ups test protocol
among male and female students of Sports Science Program, Faculty
of Sports Science and Coaching Sultan Idris University of Education.
Samples (n = 300), consisted of males (n = 168) and females (n =
132) students were randomly selected for this study. Researchers
tested the 90º push-ups on the sample twice in a single trial, test and
re-test protocol in the bench press test. Pearson-Product Moment
Correlation method's was used to determine the value of objectivity,
reliability and validity testing. The findings showed that the 900 pushups
test protocol showed high consistency between the two testers
with a value of r = .99. Likewise, The reliability value between test
and re-test for the 90º push-ups test for the male (r=.93) and female
(r=.93) students was also high. The results showed a correlation
between 90º push-ups test and bench press test for boys was r = .64
and girls was r = .28. This finding indicates that the use of the 90º
push-ups to test muscular strength and endurance in the upper body
of males has a higher validity values than female students.
Abstract: Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.
Abstract: As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.
Abstract: Ultra-low-power (ULP) circuits have received
widespread attention due to the rapid growth of biomedical
applications and Battery-less Electronics. Subthreshold region of
transistor operation is used in ULP circuits. Major research challenge
in the subthreshold operating region is to extract the ULP benefits
with minimal degradation in speed and robustness. Process, Voltage
and Temperature (PVT) variations significantly affect the
performance of subthreshold circuits. Designed performance
parameters of ULP circuits may vary largely due to temperature
variations. Hence, this paper investigates the effect of temperature
variation on device and circuit performance parameters at different
biasing voltages in the subthreshold region. Simulation results clearly
demonstrate that in deep subthreshold and near threshold voltage
regions, performance parameters are significantly affected whereas in
moderate subthreshold region, subthreshold circuits are more
immune to temperature variations. This establishes that moderate
subthreshold region is ideal for temperature immune circuits.
Abstract: A Positron Emission Tomography (PET) is a radioisotope imaging technique that illustrates the organs and the metabolisms of the human body. This technique is based on the simultaneous detection of 511 keV annihilation photons, annihilated as a result of electrons annihilating positrons that radiate from positron-emitting radioisotopes that enter biological active molecules in the body. This study was conducted on ten patients in an effort to conduct patient-related experimental studies. Dosage monitoring for the bladder, which was the organ that received the highest dose during PET applications, was conducted for 24 hours. Assessment based on measuring urination activities after injecting patients was also a part of this study. The MIRD method was used to conduct dosage calculations for results obtained from experimental studies. Results obtained experimentally and theoretically were assessed comparatively.
Abstract: Academic digital libraries emerged as a result of advances in computing and information systems technologies, and had been introduced in universities and to public. As results, moving in parallel with current technology in learning and researching environment indeed offers myriad of advantages especially to students and academicians, as well as researchers. This is due to dramatic changes in learning environment through the use of digital library system which giving spectacular impact on these societies- way of performing their study/research. This paper presents a survey of current criteria for evaluating academic digital libraries- performance. The goal is to discuss criteria being applied so far for academic digital libraries evaluation in the context of user-centered design. Although this paper does not comprehensively take into account all previous researches in evaluating academic digital libraries but at least it can be a guide in understanding the evaluation criteria being widely applied.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: Educational institutions often implement policies with
the intention of influencing how learning and teaching occur.
Generally, such policies are not as effective as their makers would
like; changing the behavior of third-level teachers proves difficult.
Nevertheless, a policy instituted in 2006 at the Dublin Institute of
Technology has met with success: each newly hired faculty member
must have a post-graduate qualification in “Learning and Teaching"
or successfully complete one within the first two years of
employment. The intention is to build teachers- knowledge about
student-centered pedagogies and their capacity to implement them.
As a result of this policy (and associated programs that support it),
positive outcomes are readily apparent. Individual teachers who have
completed the programs have implemented significant change at the
course and program levels. This paper introduces the policy,
identifies outcomes in relation to existing theory, describes research
underway, and pinpoints areas where organizational learning has
occurred.
Abstract: Primary studies are being carried out in Turkey for
expanding information and communication technologies (ICT) aided instruction activities. Subject of the present study is to identify
whether those studies achieved their goals in the application. Information technologies (IT) formative teachers in the primary
schools, and academicians in the faculties of education were interviewed to investigate the process and results of implementing
computer-aided instruction methods whose basis is strengthened in theory. Analysis of the results gained from two separate surveys
demonstrated that capability of the teachers in elementary education institutions for carrying into effect computer-aided instruction and
technical infrastructure has not been established for computer-aided instruction practices yet. Prospective teachers must be well-equipped in ICT to duly fulfill requirements of modern education and also
must be self-confident. Finally, scope and intensity of the courses given in connection with teaching of the ICT in faculties of education needs to be revised.
Abstract: This study presents an exact general solution for
steady-state conductive heat transfer in cylindrical composite
laminates. Appropriate Fourier transformation has been obtained
using Sturm-Liouville theorem. Series coefficients are achieved by
solving a set of equations that related to thermal boundary conditions
at inner and outer of the cylinder, also related to temperature
continuity and heat flux continuity between each layer. The solution
of this set of equations are obtained using Thomas algorithm. In this
paper, the effect of fibers- angle on temperature distribution of
composite laminate is investigated under general boundary
conditions. Here, we show that the temperature distribution for any
composite laminates is between temperature distribution for
laminates with θ = 0° and θ = 90° .
Abstract: Analyse of locally manufactured Low Density Polyethylene (LDPE) durability, used within lining systems at bottom of Municipal Solid Waste (landfill), is done in the present work. For this end, short and middle time creep behavior under tension of the analyzed material is carried out. The locally manufactured material is tested and compared to the European one (LDPE-CE). Both materials was tested in 03 various mediums: ambient and two aggressive (salty water and foam water), using three specimens in each case. A testing campaign is carried out using an especially designed and achieved testing bench. Moreover, characterisation tests were carried out to evaluate the medium effect on the mechanical properties of the tested material (LDPE). Furthermore, experimental results have been used to establish a law regression which can be used to predict creep behaviour of the analyzed material. As a result, the analyzed LDPE material has showed a good stability in different ambient and aggressive mediums; as well, locally manufactured LDPE seems more flexible, compared with the European one. This makes it more useful to the desired application.
Abstract: In this paper a multi-objective nonlinear programming
model of cellular manufacturing system is presented which minimize
the intercell movements and maximize the sum of reliability of cells.
We present a genetic approach for finding efficient solutions to the
problem of cell formation for products having multiple routings.
These methods find the non-dominated solutions and according to
decision makers prefer, the best solution will be chosen.
Abstract: Urinary Tract Infections (UTI) account for an estimated 25-40% nosocomial infection, out of which 90% are associated with urinary catheter, called Catheter associated urinary tract infection (CAUTI). The microbial populations within CAUTI frequently develop as biofilms. In the present study, microbial contamination of indwelling urinary catheters was investigated. Biofilm forming ability of the isolates was determined by tissue culture plate method. Prevention of biofilm formation in the urinary catheter by Pseudomonas aeruginosa was also determined by coating the catheter with some enzymes, gentamycin and EDTA. It was found that 64% of the urinary catheters get contaminated during the course of catheterization. Of the total 6 isolates, biofilm formation was seen in 100% Pseudomonas aeruginosa and E. coli, 90% in Enterococci, 80% in Klebsiella and 66% in S. aureus. It was noted that the biofilm production by Pseudomonas was prolonged by 7 days in amylase, 8 days in protease, 6 days in lysozyme, 7days in gentamycin and 5 days in EDTA treated catheter.