Abstract: An exploration of the related literature reveals that all
instruction methods aim at training autonomous learners. After the
turn of second language pedagogy toward learner-oriented strategies,
learners’ needs were more focused. Yet; the historical, social and
political aspects of learning were still neglected. The present study
investigates the notion of autonomous learning and explains its
various facets from a pedagogical point of view. Furthermore;
different elements, fields and scopes of autonomous learning will be
explored. After exploring different aspects of autonomy, it is
postulated that liberatory autonomy is highlighted since it not only
covers social autonomy but also reveals learners’ capabilities and
human potentials. It is also recommended that learners consider
different elements of autonomy such as motivation, knowledge,
confidence, and skills.
Abstract: The purpose of this study is to examine the possible
link between employee and customer satisfaction. The service
provided by employees, help to build a good relationship with
customers and can help at increasing their loyalty. Published data for
job satisfaction and indicators of customer services of banks were
gathered from relevant published works which included data from
five different countries. The scores of customers and employees
satisfaction of the different published works were transformed and
normalized to the scale of 1 to 100. The data were analyzed and a
regression analysis of the two parameters was used to describe the
link between employee’s satisfaction and customer’s satisfaction.
Assuming that employee satisfaction has a significant influence on
customer’s service and the resulting customer satisfaction, the
reviewed data indicate that employee’s satisfaction contributes
significantly on the level of customer satisfaction in the Banking
sector. There was a significant correlation between the two
parameters (Pearson correlation R2=0.52 P
Abstract: In previous study, technique to estimate a self-location by using a lunar image is proposed.We consider the improvement of the conventional method in consideration of FPGA implementationin this paper. Specifically, we introduce Artificial Bee Colony algorithm for reduction of search time.In addition, we use fixed point arithmetic to enable high-speed operation on FPGA.
Abstract: In this article, we have elaborated a study over the
nature of financial intermediation in Islamic banks by comparison to
those of conventional ones. We have found a striking difference
between two kinds of intermediation. We tried, from another side, to
study the relationship between the capital level and deficiency risk
relying on econometric model, and we have obtained a positive and
significant relation between the capital and the deficiency risk for the
conventional banks. This means that when the capital of these banks
increases, the deficiency risk increases as well. In return, since the
Islamic banks are constrained to respect the Sharia Committee as well
as customers’ demands that may, in certain contracts, choose to
invest their capitals in projects they are interested in. These
constraints have as effects to reduce the deficiency risk even when
the capital increases.
Abstract: Factors affecting construction unit cost vary
depending on a country’s political, economic, social and
technological inclinations. Factors affecting construction costs have
been studied from various perspectives. Analysis of cost factors
requires an appreciation of a country’s practices. Identified cost
factors provide an indication of a country’s construction economic
strata. The purpose of this paper is to identify the essential factors
that affect unit cost estimation and their breakdown using artificial
neural networks. Twenty five (25) identified cost factors in road
construction were subjected to a questionnaire survey and employing
SPSS factor analysis the factors were reduced to eight. The 8 factors
were analysed using neural network (NN) to determine the
proportionate breakdown of the cost factors in a given construction
unit rate. NN predicted that political environment accounted 44% of
the unit rate followed by contractor capacity at 22% and financial
delays, project feasibility and overhead & profit each at 11%. Project
location, material availability and corruption perception index had
minimal impact on the unit cost from the training data provided.
Quantified cost factors can be incorporated in unit cost estimation
models (UCEM) to produce more accurate estimates. This can create
improvements in the cost estimation of infrastructure projects and
establish a benchmark standard to assist the process of alignment of
work practises and training of new staff, permitting the on-going
development of best practises in cost estimation to become more
effective.
Abstract: In this study, attempt has been made to investigate the
relationship specifically the causal relation between fund unit prices
of Islamic equity unit trust fund which measure by fund NAV and the
selected macro-economic variables of Malaysian economy by using
VECM causality test and Granger causality test. Monthly data has
been used from Jan, 2006 to Dec, 2012 for all the variables. The
findings of the study showed that industrial production index,
political election and financial crisis are the only variables having
unidirectional causal relationship with fund unit price. However the
global oil price is having bidirectional causality with fund NAV.
Thus, it is concluded that the equity unit trust fund industry in
Malaysia is an inefficient market with respect to the industrial
production index, global oil prices, political election and financial
crisis. However the market is approaching towards informational
efficiency at least with respect to four macroeconomic variables,
treasury bill rate, money supply, foreign exchange rate, and
corruption index.
Abstract: In this study the instability problem of a modified
Taylor-Couette flow between two vertical coaxial cylinders of radius
R1, R2 is considered. The modification is based on the wavy shape of
the inner cylinder surface, where inner cylinders with different
surface amplitude and wavelength are used. The study aims to
discover the effect of the inner surface geometry on the instability
phenomenon that undergoes Taylor-Couette flow. The study reveals
that the transition processes depends strongly on the amplitude and
wavelength of the inner cylinder surface and resulting in flow
instabilities that are strongly different from that encountered in the
case of the classical Taylor-Couette flow.
Abstract: In this study which has been conducted in Akçasu
Forest Range District of Devrek Forest Directorate; 3 methods (weed
control with labourer power, cover removal with Hitachi F20
Excavator, and weed control with agricultural equipment mounted on
a Ferguson 240S agriculture tractor) were utilized in weed control
efforts in regeneration of degraded oriental beech forests have been
compared. In this respect, 3 methods have been compared by
determining certain work hours and standard durations of unit areas
(1 hectare). For this purpose, evaluating the tasks made with human
and machine force from the aspects of duration, productivity and
costs, it has been aimed to determine the most productive method in
accordance with the actual ecological conditions of research field.
Within the scope of the study, the time studies have been conducted
for 3 methods used in weed control efforts. While carrying out those
studies, the performed implementations have been evaluated by
dividing them into business stages. Also, the actual data have been
used while calculating the cost accounts. In those calculations, the
latest formulas and equations which are also used in developed
countries have been utilized. The variance of analysis (ANOVA) was
used in order to determine whether there is any statistically
significant difference among obtained results, and the Duncan test
was used for grouping if there is significant difference. According to
the measurements and findings carried out within the scope of this
study, it has been found during living cover removal efforts in
regeneration efforts in demolished oriental beech forests that the
removal of weed layer in 1 hectare of field has taken 920 hours with
labourer force, 15.1 hours with excavator and 60 hours with an
equipment mounted on a tractor. On the other hand, it has been
determined that the cost of removal of living cover in unit area (1
hectare) was 3220.00 TL for labourer power, 1250 TL for excavator
and 1825 TL for equipment mounted on a tractor.
According to the obtained results, it has been found that the
utilization of excavator in weed control effort in regeneration of
degraded oriental beech regions under actual ecological conditions of
research field has been found to be more productive from both of
aspects of duration and costs. These determinations carried out
should be repeated in weed control efforts in degraded forest fields
with different ecological conditions, it is compulsory for finding the
most efficient weed control method. These findings will light the way
of technical staff of forestry directorate in determination of the most
effective and economic weed control method. Thus, the more actual
data will be used while preparing the weed control budgets, and there
will be significant contributions to national economy. Also the results of this and similar studies are very important for developing the policies for our forestry in short and long term.
Abstract: The problematic of gender and socioeconomic status
biased differences in academic motivation patterns is discussed.
Gender identity is understood according to symbolic interactionism
perspective: as a result of reflected appraisals, social comparisons,
self-attributions, and identifications, shaped by social environment
and family context. The effects of socioeconomic status on academic
motivation are conceptualized according to Bourdieu’s habitus
concept, reflecting the role of unconscious and internalized cultural
signals, proper to low and high socioeconomic status family contexts.
Since families differ by various socioeconomic features, the
hypothesis about possible impact of parents’ socioeconomic status on
their children’s academic motivation interfering with gender
socialization effects is held. The survey, aiming to seize gender
differences in academic motivation and self-recorded improvementoriented
efforts as a result of socialization processes operating in the
families of low and high socioeconomic status, was designed. The
results of Lithuanian higher education students’ survey are presented
and discussed.
Abstract: Endowed of renewable energy sources (RES) are the
advantages of ASEAN, but they are using a low amount of RES only
to generate electricity because their primary energy sources are fossil
and coal. The cost of purchasing fossil and coal is cheaper now, but it
might be expensive soon, as it will be depleted sooner and after.
ASEAN showed that the RES are convenient to be implemented.
Some country in ASEAN has huge renewable energy sources
potential and use. The primary aim of this project is to assist ASEAN
countries in preparing the renewable energy and to guide the policies
for RES in the more upright direction. The Green-Y model will help
ASEAN government to study and forecast the economic concept,
including feed-in tariff.
Abstract: The tomato is a very important crop, whose
cultivation in the Mediterranean basin is severely affected by the
phytoparasitic weed Phelipanche ramosa. The semiarid regions of
the world are considered the main areas where this parasitic weed is
established causing heavy infestation as it is able to produce high
numbers of seeds (up to 500,000 per plant), which remain viable for
extended period (more than 20 years). In this paper the results
obtained from eleven treatments in order to control this parasitic
weed including chemical, agronomic, biological and biotechnological
methods compared with the untreated test under two plowing depths
(30 and 50 cm) are reported. The split-plot design with 3 replicates
was adopted. In 2014 a trial was performed in Foggia province
(southern Italy) on processing tomato (cv Docet) grown in the field
infested by Phelipanche ramosa. Tomato seedlings were transplant
on May 5, on a clay-loam soil. During the growing cycle of the
tomato crop, at 56-78 and 92 days after transplantation, the number
of parasitic shoots emerged in each plot was detected. At tomato
harvesting, on August 18, the major quantity-quality yield parameters
were determined (marketable yield, mean weight, dry matter, pH,
soluble solids and color of fruits). All data were subjected to analysis
of variance (ANOVA) and the means were compared by Tukey's test.
Each treatment studied did not provide complete control against
Phelipanche ramosa. However, among the different methods tested,
some of them which Fusarium, gliphosate, radicon biostimulant and
Red Setter tomato cv (improved genotypes obtained by Tilling
technology) under deeper plowing (50 cm depth) proved to mitigate
the virulence of the Phelipanche ramose attacks. It is assumed that
these effects can be improved combining some of these treatments
each other, especially for a gradual and continuing reduction of the
“seed bank” of the parasite in the soil.
Abstract: We present a trigonometric scheme to approximate a
circular arc with its two end points and two end tangents/unit
tangents. A rational cubic trigonometric Bézier curve is constructed
whose end control points are defined by the end points of the circular
arc. Weight functions and the remaining control points of the cubic
trigonometric Bézier curve are estimated by variational approach to
reproduce a circular arc. The radius error is calculated and found less
than the existing techniques.
Abstract: Supply chain (SC) is an operational research (OR)
approach and technique which acts as catalyst within central nervous
system of business today. Without SC, any type of business is at
doldrums, hence entropy. SC is the lifeblood of business today
because it is the pivotal hub which provides imperative competitive
advantage. The paper present a conceptual framework dubbed as
Homomorphic Conceptual Framework for Effective Supply Chain
Strategy (HCEFSC).The term Homomorphic is derived from abstract
algebraic mathematical term homomorphism (same shape) which
also embeds the following mathematical application sets:
monomorphisms, isomorphism, automorphisms, and endomorphism.
The HCFESC is intertwined and integrated with wide and broad sets
of elements.
Abstract: We study the anomalous WWγ and WWZ couplings by
calculating total cross sections of two processes at the LHeC with
electron beam energy Ee=140 GeV and the proton beam energy Ep=7
TeV, and at the FCC-ep collider with the polarized electron beam
energy Ee=80 GeV and the proton beam energy Ep=50 TeV. At the
LHeC with electron beam polarization, we obtain the results for the
difference of upper and lower bounds as (0.975, 0.118) and (0.285,
0.009) for the anomalous (Δκγ, λγ) and (Δκz, λz) couplings,
respectively. As for FCC-ep collider, these bounds are obtained as
(1.101, 0.065) and (0.320, 0.002) at an integrated luminosity of
Lint=100 fb^-1.
Abstract: In this work, we propose and analyze a model of
Phytoplankton-Zooplankton interaction with harvesting considering
that some species are exploited commercially for food. Criteria for
local stability, instability and global stability are derived and some
threshold harvesting levels are explored to maintain the population
at an appropriate equilibrium level even if the species are exploited
continuously.Further,biological and bionomic equilibria of the system
are obtained and an optimal harvesting policy is also analysed using
the Pantryagin’s Maximum Principle.Finally analytical findings are
also supported by some numerical simulations.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: Now-a-days autonomous mobile robots have found
applications in diverse fields. An autonomous robot system must be
able to behave in an intelligent manner to deal with complex and
changing environment. This work proposes the performance of path
planning and navigation of autonomous mobile robot using
Gravitational Search Algorithm (GSA), Simulated Annealing (SA)
and Particle Swarm optimization (PSO) based intelligent controllers
in an unstructured environment. The approach not only finds a valid
collision free path but also optimal one. The main aim of the work is
to minimize the length of the path and duration of travel from a
starting point to a target while moving in an unknown environment
with obstacles without collision. Finally, a comparison is made
between the three controllers, it is found that the path length and time
duration made by the robot using GSA is better than SA and PSO
based controllers for the same work.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: Environmental management implementation is
presently one of the ways of organization success and value
improvement. Increasing an organization motivation to
environmental measures introduction is caused primarily by the rising
pressure of the society that generates various incentives to endeavor
for the environmental performance improvement.
The aim of the paper is to identify and characterize the key
incentives and expectations leading organizations to the
environmental management implementation. The author focuses on
five businesses of different size and field, operating in the Czech
Republic. The qualitative approach and grounded theory procedure
are used in research.
The results point out that the significant incentives for
environmental management implementation represent primarily
demands of customers, the opportunity to declare the environmental
commitment and image improvement. The researched enterprises less
commonly expect the economical contribution, competitive
advantage increase or export rate improvement. The results show that
marketing contributions are primarily expected from the
environmental management implementation.
Abstract: This paper reports a structured literature review of the
application of Health Information Technology in developing
countries, defined as the World Bank categories Low-income
countries, Lower-middle-income, and Upper-middle-income
countries. The aim was to identify and classify the various
applications of health information technology to assess its current
state in developing countries and explore potential areas of research.
We offer specific analysis and application of HIT in Libya as one of
the developing countries. A structured literature review was
conducted using the following online databases: IEEE, Science
Direct, PubMed, and Google Scholar. Publication dates were set for
2000-2013. For the PubMed search, publications in English, French,
and Arabic were specified. Using a content analysis approach, 159
papers were analyzed and a total number of 26 factors were identified
that affect the adoption of health information technology. Of the 2681
retrieved articles, 159 met the inclusion criteria which were carefully
analyzed and classified. The implementation of health information
technology across developing countries is varied. Whilst it was
initially expected financial constraints would have severely limited
health information technology implementation, some developing
countries like India have nevertheless dominated the literature and
taken the lead in conducting scientific research. Comparing the
number of studies to the number of countries in each category, we
found that Low-income countries and Lower-middle-income had
more studies carried out than Upper-middle-income countries.
However, whilst IT has been used in various sectors of the economy,
the healthcare sector in developing countries is still failing to benefit
fully from the potential advantages that IT can offer.