Abstract: Space exploration is a highly visible endeavour of
humankind to seek profound answers to questions about the origins
of our solar system, whether life exists beyond Earth, and how we
could live on other worlds. Different platforms have been utilized in
planetary exploration missions, such as orbiters, landers, rovers, and
penetrators.
Having low mass, good mechanical contact with the surface,
ability to acquire high quality scientific subsurface data, and ability to
be deployed in areas that may not be conducive to landers or rovers,
Penetrators provide an alternative and complimentary solution that
makes possible scientific exploration of hardly accessible sites (icy
areas, gully sites, highlands etc.).
The Canadian Space Agency (CSA) has put space exploration as
one of the pillars of its space program, and established ExCo program
to prepare Canada for future international planetary exploration.
ExCo sets surface mobility as its focus and priority, and invests
mainly in the development of rovers because of Canada's niche space
robotics technology. Meanwhile, CSA is also investigating how
micro-penetrators can help Canada to fulfill its scientific objectives
for planetary exploration.
This paper presents a review of the micro-penetrator technologies,
past missions, and lessons learned. It gives a detailed analysis of the
technical challenges of micro-penetrators, such as high impact
survivability, high precision guidance navigation and control, thermal
protection, communications, and etc. Then, a Canadian perspective of
a possible micro-penetrator mission is given, including Canadian
scientific objectives and priorities, potential instruments, and flight
opportunities.
Abstract: This paper describes vibration analysis using the finite
element method for a small earphone, especially for the diaphragm
shape with a low-rigidity. The viscoelastic diaphragm is supported by
multiple nonlinear concentrated springs with linear hysteresis
damping. The restoring forces of the nonlinear springs have cubic
nonlinearity. The finite elements for the nonlinear springs with
hysteresis are expressed and are connected to the diaphragm that is
modeled by linear solid finite elements in consideration of a complex
modulus of elasticity. Further, the discretized equations in physical
coordinates are transformed into the nonlinear ordinary coupled
equations using normal coordinates corresponding to the linear natural
modes. We computed the nonlinear stationary and non-stationary
responses due to the internal resonance between modes with large
amplitude in the nonlinear springs and elastic modes in the diaphragm.
The non-stationary motions are confirmed as the chaos due to the
maximum Lyapunov exponents with a positive number. From the time
histories of the deformation distribution in the chaotic vibration, we
identified nonlinear modal couplings.
Abstract: Transferring information developed by other peoples is an ordinary event that happens during daily conversations, for example when employees sea each other in the organization, or when they are having lunch together, or attending a meeting, they use to talk about their experience, and discuss about their current projects, and talk about their successes over some specific problems. Despite the potential value of leveraging organizational memory and expertise by using OMS and ER, still small organizations haven-t been able to capitalize on its promised value. Each organization has its internal knowledge management system, in some of organizations the system face the lack of expert people to save their experience in the repository and in another hand on some other organizations there are lots of expert people but the organization doesn-t have the maximum use of their knowledge.
Abstract: There are little subjects in macroeconomics that are so
widely discussed, but at the same time controversial and without a
clear solution such as the choice of exchange rate regime. National
authorities need to take into consideration numerous fundamentals,
trying to fulfil goals of economic growth, low and stable inflation
and international stability. This paper focuses on the countries of ex-
Yugoslavia and their exchange rate history as independent states. We
follow the development of the regimes in 6 countries during the
transition through the financial crisis of the second part of the 2000s
to the prospects of their final goal: full membership in the European
Union. Main question is to what extent has the exchange regime
contributed to their economic success, considering other objective
factors.
Abstract: This paper presents the findings of two experiments that were performed on the Redundancy in Wireless Connection Model (RiWC) using the 802.11b standard. The experiments were simulated using OPNET 11.5 Modeler software. The first was aimed at finding the maximum number of simultaneous Voice over Internet Protocol (VoIP) users the model would support under the G.711 and G.729 codec standards when the packetization interval was 10 milliseconds (ms). The second experiment examined the model?s VoIP user capacity using the G.729 codec standard along with background traffic using the same packetization interval as in the first experiment. To determine the capacity of the model under various experiments, we checked three metrics: jitter, delay and data loss. When background traffic was added, we checked the response time in addition to the previous three metrics. The findings of the first experiment indicated that the maximum number of simultaneous VoIP users the model was able to support was 5, which is consistent with recent research findings. When using the G.729 codec, the model was able to support up to 16 VoIP users; similar experiments in current literature have indicated a maximum of 7 users. The finding of the second experiment demonstrated that the maximum number of VoIP users the model was able to support was 12, with the existence of background traffic.
Abstract: Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. The result is that it is not resistance of denial of service attacks because two denial of service attacks are found. Finally we give the method against the denial of service attacks.
Abstract: This study aims at investigating the empirical
relationships between risk preference, internet preference, and
internet knowledge which are known as user characteristics, in
addition to perceived risk of the customers on the internet purchase
intention. In order to test the relationships between the variables of
model 174, a questionnaire was collected from the students with
previous online experience. For the purpose of data analysis,
confirmatory factor analysis (CFA) and structural equation model
(SEM) was used.
Test results show that the perceived risk affects the internet
purchase intention, and increase or decrease of perceived risk
influences the purchase intention when the customer does the internet
shopping. Other factors such as internet preference, knowledge of the
internet, and risk preference affect the internet purchase intention.
Abstract: Corporate Social Responsibility (CSR) has become a
new trend of business governance. Few research studies on CSR
published in Taiwanese academia, especially for medical settings, we
were interested in probing the relationship of CSR and financial
performance in medical settings in Taiwan. The results illustrate that:
(1) a time delay effect exists with a lag between CSR effort and its
performance in the hospital foundation, (2) input into the internal
domains of CSR will be helpful to improve employee productivity in
the hospital foundation, and (3) input into the external domains of CSR
will be helpful in improving financial performance in the hospital
foundation. This study overviews CSR in the medical industry in
Taiwan and the relationship of CSR and financial performance.
Discussions of possible implications from the study results are applied
to consult the CSR concept that will be transferred into a business
strategy for the organization manager.
Abstract: Wireless LAN (WLAN) access in public hotspot areas
becomes popular in the recent years. Since more and more multimedia
information is available in the Internet, there is an increasing demand
for accessing multimedia information through WLAN hotspots.
Currently, the bandwidth offered by an IEEE 802.11 WLAN cannot
afford many simultaneous real-time video accesses. A possible way to
increase the offered bandwidth in a hotspot is the use of multiple access
points (APs). However, a mobile station is usually connected to the
WLAN AP with the strongest received signal strength indicator (RSSI).
The total consumed bandwidth cannot be fairly allocated among those
APs. In this paper, we will propose an effective load-balancing scheme
via the support of the IAPP and SNMP in APs. The proposed scheme is
an open solution and doesn-t need any changes in both wireless stations
and APs. This makes load balancing possible in WLAN hotspots,
where a variety of heterogeneous mobile devices are employed.
Abstract: This paper studies, maps and explains the interactions between downloaders and uploaders pertaining to the Internet film piracy. This study also covers several motivational factors that influence users to upload or download movies, and thus to engage in film piracy over the Internet. The essay also proposes a model that describes user behavior including their relationships and influences. Moreover, proposed theoretical interactions and motivational factors are applied to the real world scenario, using examples of a data storage webpage server Ulozto.net and webpage Piratebay.org gathering information about downloadable BitTorrents. Moreover, the theory is further supported by description of behavior of real Internet uploaders.
Abstract: In this paper, we give an overview of an online elearning
tool which has been developed for kids aged from nine to
eleven years old in Mauritius for the self-study of Mathematics in
order to prepare them for the CPE examination. The software does
not intend to render obsolete the existing pedagogical approaches.
Nowadays, the teaching-learning process is mainly focused towards
the class-room model. Moreover, most of the e-learning platforms
that exist are simply static ways of delivering resources using the
internet. There is nearly no interaction between the learner and the
tool. Our application will enable students to practice exercises online
and also work out sample examination papers. Another interesting
feature is that the kid will not have to wait for someone to correct the
work as the correction will be done online and on the spot. Additional
feedback is also provided for some exercises.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: Because of its global reach, reduction of time
restraints, and ability to reduce costs and increase sales, use of the
Internet, the World Wide Web (WWW), and related technologies
can be a competitive tool in the arsenal of small and medium-sized
enterprises (SMEs). Countries the world over are interested in the
successful adoption of the Internet by SMEs. Because a vast
majority of jobs come from that sector, greater financial success of
SMEs translates into greater job growth and, subsequently, higher
tax revenue to the government. This research investigated the level
of Internet usage for business solutions by small and medium
enterprises in Jordan. Through the survey of a random sample of
100 firms with less than 500 employees and from data obtained
from this survey that formed the basis for our study, we found that
a majority of respondents use the Internet in business activities ,
the adoption of the Internet as a business tool is limited to a
brochure where Web site which primarily provides one way. As
such, there wasn't interactive information about the company and
its products and services.
Abstract: This study proposes novel hybrid social network analysis and collaborative filtering approach to enhance the performance of recommender systems. The proposed model selects subgroups of users in Internet community through social network analysis (SNA), and then performs clustering analysis using the information about subgroups. Finally, it makes recommendations using cluster-indexing CF based on the clustering results. This study tries to use the cores in subgroups as an initial seed for a conventional clustering algorithm. This model chooses five cores which have the highest value of degree centrality from SNA, and then performs clustering analysis by using the cores as initial centroids (cluster centers). Then, the model amplifies the impact of friends in social network in the process of cluster-indexing CF.
Abstract: This study attempts to investigate the relationship
between internal CSR practices and organizational commitment
based on the social exchange theory (SET). Specifically, we examine
the impact of five dimensions of internal CSR practices on
organizational commitment: health and safety, human rights, training
and education, work life balance and workplace diversity. The
proposed model was tested on a sample of 336 frontline employees
within the banking sector in Jordan. Results showed that all internal
CSR dimensions are significantly and positively related to affective
and normative commitment. In addition, the findings of this study
indicate that all internal CSR dimensions did not have a significant
relationship with continuance commitment. Limitations of the study,
directions for future research, and implications of the findings are
discussed.
Abstract: The effects of global warming on India vary from the
submergence of low-lying islands and coastal lands to the melting of
glaciers in the Indian Himalayas, threatening the volumetric flow rate
of many of the most important rivers of India and South Asia. In
India, such effects are projected to impact millions of lives. As a
result of ongoing climate change, the climate of India has become
increasingly volatile over the past several decades; this trend is
expected to continue.
Climate change is one of the most important global environmental
challenges, with implications for food production, water supply,
health, energy, etc. Addressing climate change requires a good
scientific understanding as well as coordinated action at national and
global level. The climate change issue is part of the larger challenge
of sustainable development. As a result, climate policies can be more
effective when consistently embedded within broader strategies
designed to make national and regional development paths more
sustainable. The impact of climate variability and change, climate
policy responses, and associated socio-economic development will
affect the ability of countries to achieve sustainable development
goals.
A very well calibrated Soil and Water Assessment Tool (R2 =
0.9968, NSE = 0.91) was exercised over the Khatra sub basin of the
Kangsabati River watershed in Bankura district of West Bengal,
India, in order to evaluate projected parameters for agricultural
activities. Evapotranspiration, Transmission Losses, Potential
Evapotranspiration and Lateral Flow to reach are evaluated from the
years 2041-2050 in order to generate a picture for sustainable
development of the river basin and its inhabitants.
India has a significant stake in scientific advancement as well as
an international understanding to promote mitigation and adaptation.
This requires improved scientific understanding, capacity building,
networking and broad consultation processes. This paper is a
commitment towards the planning, management and development of
the water resources of the Kangsabati River by presenting detailed
future scenarios of the Kangsabati river basin, Khatra sub basin, over
the mentioned time period.
India-s economy and societal infrastructures are finely tuned to the
remarkable stability of the Indian monsoon, with the consequence
that vulnerability to small changes in monsoon rainfall is very high.
In 2002 the monsoon rains failed during July, causing profound loss
of agricultural production with a drop of over 3% in India-s GDP.
Neither the prolonged break in the monsoon nor the seasonal rainfall
deficit was predicted. While the general features of monsoon
variability and change are fairly well-documented, the causal
mechanisms and the role of regional ecosystems in modulating the
changes are still not clear. Current climate models are very poor at
modelling the Asian monsoon: this is a challenging and critical
region where the ocean, atmosphere, land surface and mountains all
interact. The impact of climate change on regional ecosystems is
likewise unknown. The potential for the monsoon to become more
volatile has major implications for India itself and for economies
worldwide. Knowledge of future variability of the monsoon system,
particularly in the context of global climate change, is of great
concern for regional water and food security.
The major findings of this paper were that of all the chosen
projected parameters, transmission losses, soil water content,
potential evapotranspiration, evapotranspiration and lateral flow to
reach, display an increasing trend over the time period of years 2041-
2050.
Abstract: Circular tubes have been widely used as structural
members in engineering application. Therefore, its collapse behavior
has been studied for many decades, focusing on its energy absorption
characteristics. In order to predict the collapse behavior of members,
one could rely on the use of finite element codes or experiments.
These tools are helpful and high accuracy but costly and require
extensive running time. Therefore, an approximating model of tubes
collapse mechanism is an alternative for early step of design. This
paper is also aimed to develop a closed-form solution of thin-walled
circular tube subjected to bending. It has extended the Elchalakani et
al.-s model (Int. J. Mech. Sci.2002; 44:1117-1143) to include the
rate of energy dissipation of rolling hinge in the circumferential
direction. The 3-D geometrical collapse mechanism was analyzed by
adding the oblique hinge lines along the longitudinal tube within the
length of plastically deforming zone. The model was based on the
principal of energy rate conservation. Therefore, the rates of internal
energy dissipation were calculated for each hinge lines which are
defined in term of velocity field. Inextensional deformation and
perfect plastic material behavior was assumed in the derivation of
deformation energy rate. The analytical result was compared with
experimental result. The experiment was conducted with a number of
tubes having various D/t ratios. Good agreement between analytical
and experiment was achieved.
Abstract: Databases have become ubiquitous. Almost all IT applications are storing into and retrieving information from databases. Retrieving information from the database requires knowledge of technical languages such as Structured Query Language (SQL). However majority of the users who interact with the databases do not have a technical background and are intimidated by the idea of using languages such as SQL. This has led to the development of a few Natural Language Database Interfaces (NLDBIs). A NLDBI allows the user to query the database in a natural language. This paper highlights on architecture of new NLDBI system, its implementation and discusses on results obtained. In most of the typical NLDBI systems the natural language statement is converted into an internal representation based on the syntactic and semantic knowledge of the natural language. This representation is then converted into queries using a representation converter. A natural language query is translated to an equivalent SQL query after processing through various stages. The work has been experimented on primitive database queries with certain constraints.
Abstract: Today-s business has inevitably been set in the global supply chain management environment. International transportation has never played such an important role in the global supply chain network, because movement of shipments from one country to another tends to be more frequent than ever before. This paper studies international transportation problems experienced by an international transportation company. Because of the limited fleet capacity, the transportation company has to hire additional trucks from two countries in advance. However, customer-s shipment information is uncertain, and decisions have to be made before accurate information can be obtained. This paper proposes a stochastic mixed 0-1 programming model to solve the international transportation problems under uncertain demand. A series of experiments demonstrate the effectiveness of the proposed stochastic model.
Abstract: With the rapid growth in business size, today-s businesses orient Throughout thirty years local, national and international experience in medicine as a medical student, junior doctor and eventually Consultant and Professor in Anaesthesia, Intensive Care and Pain Management, I note significant generalised dissatisfaction among medical students and doctors regarding their medical education and practice. We repeatedly hear complaints from patients about the dysfunctional health care system they are dealing with and subsequently the poor medical service that they are receiving. Medical students are bombarded with lectures, tutorials, clinical rounds and various exams. Clinicians are weighed down with a never-ending array of competing duties. Patients are extremely unhappy about the long waiting lists, loss of their records and the continuous deterioration of the health care service. This problem has been reported in different countries by several authors [1,2,3]. In a trial to solve this dilemma, a genuine idea has been suggested implementing computer technology in medicine [2,3]. Computers in medicine are a medium of international communication of the revolutionary advances being made in the application of the computer to the fields of bioscience and medicine [4,5]. The awareness about using computers in medicine has recently increased all over the world. In Misr University for Science & Technology (MUST), Egypt, medical students are now given hand-held computers (Laptop) with Internet facility making their medical education accessible, convenient and up to date. However, this trial still needs to be validated. Helping the readers to catch up with the on going fast development in this interesting field, the author has decided to continue reviewing the literature, exploring the state-of-art in computer based medicine and up dating the medical professionals especially the local trainee Doctors in Egypt. In part I of this review article we will give a general background discussing the potential use of computer technology in the various aspects of the medical field including education, research, clinical practice and the health care service given to patients. Hope this will help starting changing the culture, promoting the awareness about the importance of implementing information technology (IT) in medicine, which is a field in which such help is needed. An international collaboration is recommended supporting the emerging countries achieving this target.