Abstract: The purpose of this research is to determine the
knowledge and skills possessed by instructional design (ID)
practitioners in Malaysia. As ID is a relatively new field in the
country and there seems to be an absence of any studies on its
community of practice, the main objective of this research is to
discover the tasks and activities performed by ID practitioners in
educational and corporate organizations as suggested by the
International Board of Standards for Training, Performance and
Instruction. This includes finding out the ID models applied in the
course of their work. This research also attempts to identify the
barriers and issues as to why some ID tasks and activities are rarely
or never conducted. The methodology employed in this descriptive
study was a survey questionnaire sent to 30 instructional designers
nationwide. The results showed that majority of the tasks and
activities are carried out frequently enough but omissions do occur
due to reasons such as it being out of job scope, the decision was
already made at a higher level, and the lack of knowledge and skills.
Further investigations of a qualitative manner should be conducted
to achieve a more in-depth understanding of ID practices in
Malaysia
Abstract: European Union candidate status provides a
strong motivation for decision-making in the candidate
countries in shaping the regional development policy where
there is an envisioned transfer of power from center to the
periphery. The process of Europeanization anticipates the
candidate countries configure their regional institutional
templates in the context of the requirements of the European
Union policies and introduces new instruments of incentive
framework of enlargement to be employed in regional
development schemes. It is observed that the contribution of
the local actors to the decision making in the design of the
allocation architectures enhances the efficiency of the funds
and increases the positive effects of the projects funded under
the regional development objectives. This study aims at
exploring the performances of the three regional development
grant schemes in Turkey, established and allocated under the
pre-accession process with a special emphasis given to the
roles of the national and local actors in decision-making for
regional development. Efficiency analyses have been
conducted using the DEA methodology which has proved to
be a superior method in comparative efficiency and
benchmarking measurements. The findings of this study as
parallel to similar international studies, provides that the
participation of the local actors to the decision-making in
funding contributes both to the quality and the efficiency of
the projects funded under the EU schemes.
Abstract: This research contribution is drafted to present the
orbit design, orbit propagator and geomagnetic field estimator for the
nanosatellites specifically for the upcoming CUBESAT, ICUBE-1 of
the Institute of Space Technology (IST), Islamabad, Pakistan. The
ICUBE mission is designed for the low earth orbit at the approximate
height of 700KM. The presented research endeavor designs the
Keplarian elements for ICUBE-1 orbit while incorporating the
mission requirements and propagates the orbit using J2 perturbations,
The attitude determination system of the ICUBE-1 consists of
attitude determination sensors like magnetometer and sun sensor. The
Geomagnetic field estimator is developed according to the model of
International Geomagnetic Reference Field (IGRF) for comparing the
magnetic field measurements by the magnetometer for attitude
determination. The output of the propagator namely the Keplarians
position and velocity vectors and the magnetic field vectors are
compared and verified with the same scenario generated in the
Satellite Tool Kit (STK).
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.
Abstract: The last Assessment Report of the Intergovernmental
Panel on Climate Change, stating that the greatest risk in climate
change affects sustainability is now widely known and accepted.
However, it has not provoked substantial reaction and attention in
Hungary, while international and national efforts have also not
achieved expected results so far. Still, there are numerous examples
on different levels (national, regional, local, household) making
considerable progress in limiting their own emissions and making
steps toward mitigation of and adaptation to climate change. The
local level is exceptionally important in sustainability adaptation, as
local communities are often able to adapt more flexibly to changes in
the natural environment.The aim of this paper is to attempt a review
of the national climate policy and the local climate change strategies
in Hungary considering sustainable development.
Abstract: Baltic competitiveness is quite controversial. In a
situation with the rapid structural changes, economy develops in
balance very rarely - in different fields will always be more rapid
changes in another more stagnation.
Analyzing different economic indices developed by international
organizations the situation in three Baltic countries are described
from a different competitiveness positions highlighting strengths and
weaknesses of each country.
Exploring the openness of the economy, it is possible to observe
certain risks included in the reports describing situation of
competitiveness where government policies competing in the tax
system, the rates of labour market policies, investment environment,
etc. This is a very important factor resulting in competitive
advantage.
Baltic countries are still at a weak position from a technological
perspective, and need to borrow the knowledge and technology from
more developed countries.
Abstract: The challenge for software development house in
Bangladesh is to find a path of using minimum process rather than CMMI or ISO type gigantic practice and process area. The small and medium size organization in Bangladesh wants to ensure minimum
basic Software Process Improvement (SPI) in day to day operational
activities. Perhaps, the basic practices will ensure to realize their company's improvement goals. This paper focuses on the key issues in basic software practices for small and medium size software
organizations, who are unable to effort the CMMI, ISO, ITIL etc. compliance certifications. This research also suggests a basic software process practices model for Bangladesh and it will show the mapping of our suggestions with international best practice. In this IT
competitive world for software process improvement, Small and medium size software companies that require collaboration and
strengthening to transform their current perspective into inseparable global IT scenario. This research performed some investigations and analysis on some projects- life cycle, current good practice, effective approach, reality and pain area of practitioners, etc. We did some
reasoning, root cause analysis, comparative analysis of various
approach, method, practice and justifications of CMMI and real life. We did avoid reinventing the wheel, where our focus is for minimal
practice, which will ensure a dignified satisfaction between
organizations and software customer.
Abstract: In the recent years multimedia traffic and in particular
VoIP services are growing dramatically. We present a new algorithm
to control the resource utilization and to optimize the voice codec
selection during SIP call setup on behalf of the traffic condition
estimated on the network path.
The most suitable methodologies and the tools that perform realtime
evaluation of the available bandwidth on a network path have
been integrated with our proposed algorithm: this selects the best
codec for a VoIP call in function of the instantaneous available
bandwidth on the path. The algorithm does not require any explicit
feedback from the network, and this makes it easily deployable over
the Internet. We have also performed intensive tests on real network
scenarios with a software prototype, verifying the algorithm
efficiency with different network topologies and traffic patterns
between two SIP PBXs.
The promising results obtained during the experimental validation
of the algorithm are now the basis for the extension towards a larger
set of multimedia services and the integration of our methodology
with existing PBX appliances.
Abstract: The evolution of technology and construction techniques has enabled the upgrading of transport networks. In particular, the high-speed rail networks allow convoys to peak at above 300 km/h. These structures, however, often significantly impact the surrounding environment. Among the effects of greater importance are the ones provoked by the soundwave connected to train transit. The wave propagation affects the quality of life in areas surrounding the tracks, often for several hundred metres. There are substantial damages to properties (buildings and land), in terms of market depreciation. The present study, integrating expertise in acoustics, computering and evaluation fields, outlines a useful model to select project paths so as to minimize the noise impact and reduce the causes of possible litigation. It also facilitates the rational selection of initiatives to contain the environmental damage to the already existing railway tracks. The research is developed with reference to the Italian regulatory framework (usually more stringent than European and international standards) and refers to a case study concerning the high speed network in Italy.
Abstract: In this article, we propose a new surgical device for
circumferentially excision of high anal fistulas in a minimally
invasive manner. The new apparatus works on the basis of axially
rotating and moving a tubular blade along a fistulous tract
straightened using a rigid straight guidewire. As the blade moves
along the tract, its sharp circular cutting edge circumferentially
separates approximately 2.25 mm thickness of tract encircling the
rigid guidewire. We used the new set to excise two anal fistulas in a
62-year-old male patient, an extrasphincteric type and a long tract
with no internal opening. With regard to the results of this test, the
new device can be considered as a sphincter preserving mechanism
for treatment of high anal fistulas. Consequently, a major reduction
in the risk of fecal incontinence, recurrence rate, convalescence
period and patient morbidity may be achieved using the new device
for treatment of fistula-in-ano.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: The Internet has become an indispensable part of our lives. Witnessing recent web-based mass collaboration, e.g. Wikipedia, people are questioning whether the Internet has made fundamental changes to the society or whether it is merely a hyperbolic fad. It has long been assumed that collective action for a certain goal yields the problem of free-riding, due to its non-exclusive and non-rival characteristics. Then, thanks to recent technological advances, the on-line space experienced the following changes that enabled it to produce public goods: 1) decrease in the cost of production or coordination 2) externality from networked structure 3) production function which integrates both self-interest and altruism. However, this research doubts the homogeneity of on-line mass collaboration and argues that a more sophisticated and systematical approach is required. The alternative that we suggest is to connect the characteristics of the goal to the motivation. Despite various approaches, previous literature fails to recognize that motivation can be structurally restricted by the characteristic of the goal. First we draw a typology of on-line mass collaboration with 'the extent of expected beneficiary' and 'the existence of externality', and then we examine each combination of motivation using Benkler-s framework. Finally, we explore and connect such typology with its possible dominant participating motivation.
Abstract: The study of the variability of the postural strategies
in low back pain patients, as a criterion in evaluation of the
adaptability of this system to the environmental demands is the
purpose of this study. A cross-sectional case-control study was
performed on 21 recurrent non-specific low back pain patients and 21
healthy volunteers. The electromyography activity of Deltoid,
External Oblique (EO), Transverse Abdominis/Internal Oblique
(TrA/IO) and Erector Spine (ES) muscles of each person was
recorded in 75 rapid arm flexion with maximum acceleration.
Standard deviation of trunk muscles onset relative to deltoid muscle
onset were statistically analyzed by MANOVA . The results show
that chronic low back pain patients exhibit less variability in their
anticipatory postural adjustments (APAs) in comparison with the
control group. There is a decrease in variability of postural control
system of recurrent non-specific low back pain patients that can
result in the persistence of pain and chronicity by decreasing the
adaptability to environmental demands.
Abstract: Numerous concrete structures projects are currently running in Libya as part of a US$50 billion government funding. The
quality of concrete used in 20 different construction projects were assessed based mainly on the concrete compressive strength achieved. The projects are scattered all over the country and are at
various levels of completeness. For most of these projects, the
concrete compressive strength was obtained from test results of a
150mm standard cube mold. Statistical analysis of collected concrete
compressive strengths reveals that the data in general followed a
normal distribution pattern. The study covers comparison and assessment of concrete quality aspects such as: quality control, strength range, data standard deviation, data scatter, and ratio of minimum strength to design strength. Site quality control for these projects ranged from very good to poor according to ACI214 criteria [1]. The ranges (Rg) of the strength (max. strength – min. strength) divided by average strength are from (34% to 160%). Data scatter is
measured as the range (Rg) divided by standard deviation () and is
found to be (1.82 to 11.04), indicating that the range is ±3σ.
International construction companies working in Libya follow
different assessment criteria for concrete compressive strength in lieu
of national unified procedure. The study reveals that assessments of
concrete quality conducted by these construction companies usually
meet their adopted (internal) standards, but sometimes fail to meet
internationally known standard requirements. The assessment of
concrete presented in this paper is based on ACI, British standards
and proposed Libyan concrete strength assessment criteria.
Abstract: Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Abstract: This paper shows that the economy of any country
can be presented as three different shells such as: economic shell of a
big, a medium and a small business. The new concepts were
introduced such as: volume of an economic shell, coefficient of
shell-s expansion (compression) etc. These shells can expansion or
compress under action by internal or external powers and when shell
expansions - it means the rising of a business activity and
compression shows us that economy goes on recession. This process
of an expansion or a compression can develop in the various ways
like linear, logarithm or any other mathematical laws.
Abstract: Orthogonal frequency division multiplexing (OFDM)
has developed into a popular scheme for wideband digital
communications used in consumer applications such as digital broadcasting, wireless networking and broadband internet access. In
the OFDM system, carrier frequency offset (CFO) causes intercarrier
interference (ICI) which significantly degrades the system error performance. In this paper we provide an exact evaluation method for error performance analysis of arbitrary 2-D modulation OFDM systems with CFO, and analyze the effect of CFO on error performance.
Abstract: Designing modern machine tools is a complex task. A
simulation tool to aid the design work, a virtual machine, has
therefore been developed in earlier work. The virtual machine
considers the interaction between the mechanics of the machine
(including structural flexibility) and the control system. This paper
exemplifies the usefulness of the virtual machine as a tool for product
development. An optimisation study is conducted aiming at
improving the existing design of a machine tool regarding weight and
manufacturing accuracy at maintained manufacturing speed. The
problem can be categorised as constrained multidisciplinary multiobjective
multivariable optimisation. Parameters of the control and
geometric quantities of the machine are used as design variables. This
results in a mix of continuous and discrete variables and an
optimisation approach using a genetic algorithm is therefore
deployed. The accuracy objective is evaluated according to
international standards. The complete systems model shows nondeterministic
behaviour. A strategy to handle this based on statistical
analysis is suggested. The weight of the main moving parts is reduced
by more than 30 per cent and the manufacturing accuracy is
improvement by more than 60 per cent compared to the original
design, with no reduction in manufacturing speed. It is also shown
that interaction effects exist between the mechanics and the control,
i.e. this improvement would most likely not been possible with a
conventional sequential design approach within the same time, cost
and general resource frame. This indicates the potential of the virtual
machine concept for contributing to improved efficiency of both
complex products and the development process for such products.
Companies incorporating such advanced simulation tools in their
product development could thus improve its own competitiveness as
well as contribute to improved resource efficiency of society at large.
Abstract: The purposes of this research were 1) to investigate
behavior of media exposure and participation in environmental
activities of King Mongkut-s University of Technology Thonburi
(KMUTT) dormitory students, 2) to compare the correlation between
faculties and participation in environmental activities of KMUTT
dormitory students, and 3) to compare the correlation between media
exposure and participation in environmental activities of KMUTT
dormitory students. The tool used for collecting data was
questionnaire. The research findings revealed that dormitory students
were mostly exposed to the environmental media via public relations
boards for general media and KMUTT dormitory media. Dormitory
students were daily exposed to media via websites on the internet and
weekly for other media. Dormitory students participation in the
environmental activities was at high level (x = 3.65) on an
individual basis and was at medium level (x = 2.76) on a collective
basis. Faculties did not correlate with the participation in
environmental activities of dormitory students at the .01 statistical
level and media exposure via various media correlated with
participation in environmental activities of dormitory students at the
.01 statistical level.
Abstract: This paper presents an environmental and technoeconomic
evaluation of light duty vehicles in Iran. A comprehensive
well-to-wheel (WTW) analysis is applied to compare different
automotive fuel chains, conventional internal combustion engines and
innovative vehicle powertrains. The study examines the
competitiveness of 15 various pathways in terms of energy
efficiencies, GHG emissions, and levelized cost of different energy
carriers. The results indicate that electric vehicles including battery
electric vehicles (BEV), fuel cell vehicles (FCV) and plug-in hybrid
electric vehicles (PHEV) increase the WTW energy efficiency by
54%, 51% and 46%, respectively, compared to common internal
combustion engines powered by gasoline. On the other hand,
greenhouse gas (GHG) emissions per kilometer of FCV and BEV
would be 48% lower than that of gasoline engines. It is concluded
that BEV has the lowest total cost of energy consumption and
external cost of emission, followed by internal combustion engines
(ICE) fueled by CNG. Conventional internal combustion engines
fueled by gasoline, on the other hand, would have the highest costs.