Abstract: The use of new technologies such internet (e-mail, chat
rooms) and cell phones has steeply increased in recent years.
Especially among children and young people, use of technological
tools and equipments is widespread. Although many teachers and
administrators now recognize the problem of school bullying, few are
aware that students are being harassed through electronic
communication. Referred to as electronic bullying, cyber bullying, or
online social cruelty, this phenomenon includes bullying through email,
instant messaging, in a chat room, on a website, or through
digital messages or images sent to a cell phone. Cyber bullying is
defined as causing deliberate/intentional harm to others using internet
or other digital technologies. It has a quantitative research design nd
uses relational survey as its method. The participants consisted of
300 secondary school students in the city of Konya, Turkey. 195
(64.8%) participants were female and 105 (35.2%) were male. 39
(13%) students were at grade 1, 187 (62.1%) were at grade 2 and 74
(24.6%) were at grade 3. The “Cyber Bullying Question List"
developed by Ar─▒cak (2009) was given to students. Following
questions about demographics, a functional definition of cyber
bullying was provided. In order to specify students- human values,
“Human Values Scale (HVS)" developed by Dilmaç (2007) for
secondary school students was administered. The scale consists of 42
items in six dimensions. Data analysis was conducted by the primary
investigator of the study using SPSS 14.00 statistical analysis
software. Descriptive statistics were calculated for the analysis of
students- cyber bullying behaviour and simple regression analysis was
conducted in order to test whether each value in the scale could
explain cyber bullying behaviour.
Abstract: The concept of privacy, seen in connection to the consumer's private space and personalization, has recently gained a higher importance as a consequence of the increasing marketing efforts of the organizations based on the capturing, processing and usage of consumer-s personal data.Paper intends to provide a definition of the consumer-s private space based on the types of personal data the consumer is willing to disclose, to assess the attitude toward personalization and to identify the means preferred by consumers to control their personal data and defend their private space. Several implications generated through the definition of the consumer-s private space are identified and weighted from both the consumers- and organizations- perspectives.
Abstract: In this paper two mathematical models for definition of gas accidental escape localization in the gas pipelines are suggested. The first model was created for leak localization in the horizontal branched pipeline and second one for leak detection in inclined section of the main gas pipeline. The algorithm of leak localization in the branched pipeline did not demand on knowledge of corresponding initial hydraulic parameters at entrance and ending points of each sections of pipeline. For detection of the damaged section and then leak localization in this section special functions and equations have been constructed. Some results of calculations for compound pipelines having two, four and five sections are presented. Also a method and formula for the leak localization in the simple inclined section of the main gas pipeline are suggested. Some results of numerical calculations defining localization of gas escape for the inclined pipeline are presented.
Abstract: Thirty six samples from each (aerobic and anoxic)
activated sludge were collected from two wastewater treatment plants
with MBRs in Berlin, Germany. The samples were prepared for count
and definition of fungal isolates; these isolates were purified by
conventional techniques and identified by microscopic examination.
Sixty tow species belonging to 28 genera were isolated from
activated sludge samples under aerobic conditions (28 genera and 58
species) and anoxic conditions (26 genera and 52 species). The
obtained data show that, Aspergillus was found at 94.4% followed by
Penicillium 61.1 %, Fusarium (61.1 %), Trichoderma (44.4 %) and
Geotrichum candidum (41.6 %) species were the most prevalent in all
activated sludge samples. The study confirmed that fungi can thrive
in activated sludge and sporulation, but isolated in different numbers
depending on the effect of aeration system. Some fungal species in
our study are saprophytic, and other a pathogenic to plants and
animals.
Abstract: The aim of this qualitative case study is to examine how school principals perform their new roles and responsibilities defined in accordance with the new curriculum. Of ten primary schools that the new curriculum was piloted in Istanbul in school year of 2004-2005, one school was randomly selected as the sample of the study. The participants of the study were comprised of randomly-selected 26 teachers working in the case school. To collect data, an interview schedule was developed based on the new role definitions for school principals by the National Ministry of Education. Participants were interviewed on one-to-one basis in February and March 2007. Overall results showed that the school principal was perceived to be successful in terms of the application of the new curriculum in school. According to the majority of teachers, the principal has done his best to establish the infrastructure that is necessary for successful application of the new program. In addition to these, the principal was reported to adopt a collegial and participatory leadership style by creating a positive school atmosphere that enables the school community (teachers, parents and students) to involve school more than before. Keywordscase study, curriculum implementation, school principals and curriculum
Abstract: In this paper the Differential Quadrature Method (DQM) is employed to study the coupled lateral-torsional free vibration behavior of the laminated composite beams. In such structures due to the fiber orientations in various layers, the lateral displacement leads to a twisting moment. The coupling of lateral and torsional vibrations is modeled by the bending-twisting material coupling rigidity. In the present study, in addition to the material coupling, the effects of shear deformation and rotary inertia are taken into account in the definition of the potential and kinetic energies of the beam. The governing differential equations of motion which form a system of three coupled PDEs are solved numerically using DQ procedure under different boundary conditions consist of the combinations of simply, clamped, free and other end conditions. The resulting natural frequencies and mode shapes for cantilever beam are compared with similar results in the literature and good agreement is achieved.
Abstract: After the development of the Internet a suitable
discipline for trading goods electronically has been emerged.
However, this type of markets is not still mature enough in order to
become independent and get closer to seller/buyer-s needs.
Furthermore, the buyable and sellable goods in these markets still
don-t have essential standards for being well-defined. In this paper,
we will present a model for development of a market which can
contain goods with variable definitions and we will also investigate
its characteristics. Besides, by noticing the fact that people have
different discriminations, it-s figured out that the significance of each
attribute of a specific product may vary from different people-s view
points. Consequently we-ll present a model for weighting and
accordingly different people-s view points could be satisfied. These
two aspects will be discussed completely throughout this paper.
Abstract: The article presents the whole model of IS/IT
architecture exception governance. As first, the assumptions of
presented model are set. As next, there is defined a generic
governance model that serves as a basis for the architecture exception
governance. The architecture exception definition and its attributes
follow. The model respects well known approaches to the area that
are described in the text, but it adopts higher granularity in
description and expands the process view with all the next necessary
governance components as roles, principles and policies, tools to
enable the implementation of the model into organizations. The
architecture exception process is decomposed into a set of processes
related to the architecture exception lifecycle consisting of set of
phases and architecture exception states. Finally, there is information
about my future research related to this area.
Abstract: Software organizations are constantly looking for
better solutions when designing and using well-defined software
processes for the development of their products and services.
However, while the technical aspects are virtually easier to arrange,
many software development processes lack more support on project
management issues. When adopting such processes, an organization
needs to apply good project management skills along with technical
views provided by those models. This research proposes the
definition of a new model that integrates the concepts of PMBOK
and those available on the OPEN metamodel, helping not only
process integration but also building the steps towards a more
comprehensive and automatable model.
Abstract: Perceptions of quality from both designers and users
perspective have now stretched beyond the traditional usability,
incorporating abstract and subjective concepts. This has led to a shift
in human computer interaction research communities- focus; a shift
that focuses on achieving user experience (UX) by not only fulfilling
conventional usability needs but also those that go beyond them. The
term UX, although widely spread and given significant importance,
lacks consensus in its unified definition. In this paper, we survey
various UX definitions and modeling frameworks and examine them
as the foundation for proposing a UX evolution lifecycle framework
for understanding UX in detail. In the proposed framework we identify
the building blocks of UX and discuss how UX evolves in various
phases. The framework can be used as a tool to understand experience
requirements and evaluate them, resulting in better UX design and
hence improved user satisfaction.
Abstract: Covering-based rough sets is an extension of rough
sets and it is based on a covering instead of a partition of the
universe. Therefore it is more powerful in describing some practical
problems than rough sets. However, by extending the rough sets,
covering-based rough sets can increase the roughness of each model
in recognizing objects. How to obtain better approximations from
the models of a covering-based rough sets is an important issue.
In this paper, two concepts, determinate elements and indeterminate
elements in a universe, are proposed and given precise definitions
respectively. This research makes a reasonable refinement of the
covering-element from a new viewpoint. And the refinement may
generate better approximations of covering-based rough sets models.
To prove the theory above, it is applied to eight major coveringbased
rough sets models which are adapted from other literature.
The result is, in all these models, the lower approximation increases
effectively. Correspondingly, in all models, the upper approximation
decreases with exceptions of two models in some special situations.
Therefore, the roughness of recognizing objects is reduced. This
research provides a new approach to the study and application of
covering-based rough sets.
Abstract: The impact of noise upon live quality has become an
important aspect to make both urban and environmental policythroughout
Europe and in Turkey. Concern over the quality of urban
environments, including noise levels and declining quality of green
space, is over the past decade with increasing emphasis on designing
livable and sustainable communities. According to the World Health
Organization, noise pollution is the third most hazardous
environmental type of pollution which proceeded by only air (gas
emission) and water pollution. The research carried out in two
phases, the first stage of the research noise and plant types providing
the suction of noise was evaluated through literature study and at the
second stage, definite types (Juniperus horizontalis L., Spirea
vanhouetti Briot., Cotoneaster dammerii C.K., Berberis thunbergii
D.C., Pyracantha coccinea M. etc.) were selected for the city of
Konya. Trials were conducted on the highway of Konya. The biggest
value of noise reduction was 6.3 dB(A), 4.9 dB(A), 6.2 dB(A) value
with compared to the control which includes the group that formed
by the bushes at the distance of 7m, 11m, 20m from the source and
5m, 9m, 20m of plant width, respectively. In this paper, definitions
regarding to noise and its sources were made and the precautions
were taken against to noise that mentioned earlier with the adverse
effects of noise. Plantation design approaches and suggestions
concerning to the diversity to be used, which are peculiar to roadside,
were developed to discuss the role and the function of plant material
to reduce the noise of the traffic.
Abstract: Online news websites are one of the main and wide areas of Mass Media. Since the nineties several Jordanian newspapers were introduced to the World Wide Web to reach various and large numbers of audiances. Examples of these newspapers that have online version are Al-Rai, Ad-Dustor and AlGhad. Other pure online news websites include Ammon and Rum. The main aim of this study is to evaluate online newspaper websites using two assessment measures; usability and web content. This aim is achieved by using a questionnaire based evaluation which is based on the definition of usability and web content in the ISO document as the standard number 9241-part 11. The results are obtained based on 204 audiences- responses. The results of the research showed that the usability factor is relatively good for all Jordanian online newspapers whereas the web content factor is moderate.
Abstract: The present paper discusses the basic concepts and the underlying principles of Multi-Agent Systems (MAS) along with an interdisciplinary exploitation of these principles. It has been found that they have been utilized for lots of research and studies on various systems spanning across diverse engineering and scientific realms showing the need of development of a proper generalized framework. Such framework has been developed for the Multi-Agent Systems and it has been generalized keeping in mind the diverse areas where they find application. All the related aspects have been categorized and a general definition has been given where ever possible.
Abstract: This paper presents an optimal design of linear phase
digital high pass finite impulse response (FIR) filter using Improved
Particle Swarm Optimization (IPSO). In the design process, the filter
length, pass band and stop band frequencies, feasible pass band and
stop band ripple sizes are specified. FIR filter design is a multi-modal
optimization problem. An iterative method is introduced to find the
optimal solution of FIR filter design problem. Evolutionary
algorithms like real code genetic algorithm (RGA), particle swarm
optimization (PSO), improved particle swarm optimization (IPSO)
have been used in this work for the design of linear phase high pass
FIR filter. IPSO is an improved PSO that proposes a new definition
for the velocity vector and swarm updating and hence the solution
quality is improved. A comparison of simulation results reveals the
optimization efficacy of the algorithm over the prevailing
optimization techniques for the solution of the multimodal, nondifferentiable,
highly non-linear, and constrained FIR filter design
problems.
Abstract: We develop new nonlinear methods of
immunofluorescence analysis for a sensitive technology of
respiratory burst reaction of DNA fluorescence due to oxidative
activity in the peripheral blood neutrophils. Histograms in flow
cytometry experiments represent a fluorescence flashes frequency as
functions of fluorescence intensity. We used the Shannon-Weaver
index for definition of neutrophils- biodiversity and Hurst index for
definition of fractal-s correlations in immunofluorescence for
different donors, as the basic quantitative criteria for medical
diagnostics of health status. We analyze frequencies of flashes,
information, Shannon entropies and their fractals in
immunofluorescence networks due to reduction of histogram range.
We found the number of simplest universal correlations for
biodiversity, information and Hurst index in diagnostics and
classification of pathologies for wide spectra of diseases. In addition
is determined the clear criterion of a common immunity and human
health status in a form of yes/no answers type. These answers based
on peculiarities of information in immunofluorescence networks and
biodiversity of neutrophils. Experimental data analysis has shown the
existence of homeostasis for information entropy in oxidative activity
of DNA in neutrophil nuclei for all donors.
Abstract: In this paper we introduce a novel method for
the characterization of synchronziation and coupling effects
in multivariate time series that can be used for the analysis
of EEG or ECoG signals recorded during epileptic seizures.
The method allows to visualize the spatio-temporal evolution
of synchronization and coupling effects that are characteristic
for epileptic seizures. Similar to other methods proposed for
this purpose our method is based on a regression analysis.
However, a more general definition of the regression together
with an effective channel selection procedure allows to use the
method even for time series that are highly correlated, which
is commonly the case in EEG/ECoG recordings with large
numbers of electrodes. The method was experimentally tested
on ECoG recordings of epileptic seizures from patients with
temporal lobe epilepsies. A comparision with the results from
a independent visual inspection by clinical experts showed
an excellent agreement with the patterns obtained with the
proposed method.
Abstract: This paper presents three new methodologies for the
basic operations, which aim at finding new ways of computing union
(maximum) and intersection (minimum) membership values by
taking into effect the entire membership values in a fuzzy set. The
new methodologies are conceptually simple and easy from the
application point of view and are illustrated with a variety of
problems such as Cartesian product of two fuzzy sets, max –min
composition of two fuzzy sets in different product spaces and an
application of an inverted pendulum to determine the impact of the
new methodologies. The results clearly indicate a difference based on
the nature of the fuzzy sets under consideration and hence will be
highly useful in quite a few applications where different values have
significant impact on the behavior of the system.
Abstract: Web services provide significant new benefits for SOAbased
applications, but they also expose significant new security
risks. There are huge number of WS security standards and
processes. At present, there is still a lack of a comprehensive
approach which offers a methodical development in the construction
of secure WS-based SOA. Thus, the main objective of this paper is
to address this needs, presenting a comprehensive method for Web
Services Security guaranty in SOA. The proposed method defines
three stages, Initial Security Analysis, Architectural Security
Guaranty and WS Security Standards Identification. These facilitate,
respectively, the definition and analysis of WS-specific security
requirements, the development of a WS-based security architecture
and the identification of the related WS security standards that the
security architecture must articulate in order to implement the
security services.
Abstract: Governments around the world are expending
considerable time and resources framing strategies and policies to
deliver energy security. The term 'energy security' has quietly
slipped into the energy lexicon without any meaningful discourse
about its meaning or assumptions. An examination of explicit and
inferred definitions finds that the concept is inherently slippery
because it is polysemic in nature having multiple dimensions and
taking on different specificities depending on the country (or
continent), timeframe or energy source to which it is applied. But
what does this mean for policymakers? Can traditional policy
approaches be used to address the problem of energy security or does
its- polysemic qualities mean that it should be treated as a 'wicked'
problem? To answer this question, the paper assesses energy security
against nine commonly cited characteristics of wicked policy
problems and finds strong evidence of 'wickedness'.