Abstract: Weblog is an Internet tool that is believed to possess
great potential to facilitate learning in education. This study wants to
know if weblog can be used to promote students- critical thinking. It
used a group of secondary two students from a Singapore school to
write weblogs as a means of substitution for their traditional
handwritten assignments. The topics for the weblogging are taken
from History syllabus but modified to suit the purpose of this study.
Weblogs from the students were collected and analysed using a
known coding system for measuring critical thinking. Results show
that the topic for blogging is crucial in determining the types of
critical thinking employed by the students. Students are seen to
display critical thinking traits in the areas of information sourcing,
linking information to arguments and viewpoints justification.
Students- criticalness is more profound when the information for
writing a topic is readily available. Otherwise, they tend to be less
critical and subjective. The study also found that students lack the
ability to source for external information suggesting that students
may need to be taught information literacy in order to widen their use
of critical thinking skills.
Abstract: According as the Architecture, Engineering and Construction (AEC) Industry projects have grown more complex and larger, the number of utilization of BIM for 3D design and simulation is increasing significantly. Therefore, typical applications of BIM such as clash detection and alternative measures based on 3-dimenstional planning are expanded to process management, cost and quantity management, structural analysis, check for regulation, and various domains for virtual design and construction. Presently, commercial BIM software is operated on single-user environment, so initial cost is so high and the investment may be wasted frequently. Cloud computing that is a next-generation internet technology enables simple internet devices (such as PC, Tablet, Smart phone etc) to use services and resources of BIM software. In this paper, we suggested developing method of the BIM software based on cloud computing environment in order to expand utilization of BIM and reduce cost of BIM software. First, for the benchmarking, we surveyed successful case of BIM and cloud computing. And we analyzed needs and opportunities of BIM and cloud computing in AEC Industry. Finally, we suggested main functions of BIM software based on cloud computing environment and developed a simple prototype of cloud computing BIM software for basic BIM model viewing.
Abstract: The financial crisis has decreased the opportunities of
small businesses to acquire financing through conventional financial
actors, such as commercial banks. This credit constraint is partly the
reason for the emergence of new alternatives of financing, in addition
to the spreading opportunities for communication and secure
financial transfer through Internet. One of the most interesting venues
for finance is termed “crowdfunding". As the term suggests
crowdfunding is an appeal to prospective customers and investors to
form a crowd that will finance projects that otherwise would find it
hard to generate support through the most common financial actors.
Crowdfunding is in this paper divided into different models; the
threshold model, the microfinance model, the micro loan model and
the equity model. All these models add to the financial possibilities of
emerging entrepreneurs.
Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.
Abstract: Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Abstract: The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.
Abstract: In this paper, we propose a chaotic cipher system consisting of Improved Volterra Filters and the mapping that is created from the actual voice by using Radial Basis Function Network. In order to achieve a practical system, the system supposes to use the digital communication line, such as the Internet, to maintain the parameter matching between the transmitter and receiver sides. Therefore, in order to withstand the attack from outside, it is necessary that complicate the internal state and improve the sensitivity coefficient. In this paper, we validate the robustness of proposed method from three perspectives of "Chaotic properties", "Randomness", "Coefficient sensitivity".
Abstract: Despite the fact that B2c eCommerce has become
important in numerous economies, its adoption varies from country to
country. This paper aims to identify the factors affecting (enabling or
inhibiting) B2c eCommerce and to determine their quantitative
impact on the diffusion of online sales across countries. A dynamic
panel model analyzing the relationship between 13 factors
(Macroeconomic, Demographic, Socio-Cultural, Infrastructural and
Offer related) stemming from a complete literature analysis and the
B2c eCommerce value in 45 countries over 9 years has been
developed. Having a positive correlation coefficient, GDP, mobile
penetration, Internet user penetration and credit card penetration
resulted as enabling drivers of the B2c eCommerce value across
countries, whereas, having a negative correlation coefficient,equal
distribution of income and the development of traditional retailing
network act as inhibiting factors.
Abstract: Cloud Computing (CC) has become one of the most
talked about emerging technologies that provides powerful
computing and large storage environments through the use of the
Internet. Cloud computing provides different dynamically scalable
computing resources as a service. It brings economic benefits to
individuals and businesses that adopt the technology. In theory
adoption of cloud computing reduces capital and operational
expenditure on information technology. For this to be a reality there
is need to solve some challenges and at the same time addressing
concerns that consumers have about cloud computing. This paper
looks at Cloud Computing in general then highlights the challenges
of Cloud Computing and finally suggests solutions to some of the
challenges.