Abstract: With the proliferation of Weblogs (blogs) use in
educational contexts, gaining a better understanding of why
students are willing to utilize blog systems has become an
important topic for practitioners and academics. While perceived
enjoyment has been found to have a significant influence on
behavioral intentions to use blogs or hedonic systems, few studies
have investigated the antecedents of perceived enjoyment in the
acceptance of blogging. The main purpose of the present study is to
explore the individual difference antecedents of perceived
enjoyment and examine how they influence behavioral intention to
blog through the mediation of perceived enjoyment. Based on the
previous literature, the Big Five personality traits (i.e.,
extraversion, agreeableness, conscientiousness, neuroticism, and
openness to experience), as well as computer self-efficacy and
personal innovation in information technology (PIIT), are
hypothesized as potential antecedents of perceived enjoyment in
the acceptance of blogging. Data collected from 358 respondents in
Taiwan are tested against the research model using the structural
equation modeling approach. The results indicate that extraversion,
agreeableness, conscientiousness, and PIIT have a significant
influence on perceived enjoyment, which in turn significantly
influences the behavioral intention to blog. These findings lead to
several important implications for future research.
Abstract: The study is based on the assumption that media products are appropriate subjects for the exploration of social and cultural identities as a keystone of value orientations of their authors, producers and target audiences. The research object of the study is the title page of the book cover of a professional publication that serves as a medium of marketing, scientific and intercultural communication, which is the result of semiotic and intercultural transfer. The study aims to answer the question whether the book cover is an expression of conceptualization and tool for social identity construction. It attempts to determine what value orientations and what concepts of social and cultural identities are hidden in the narrative structures of the book cover of the Czech translation of the book by G. Ritzer The McDonaldization of Society (1993), issued after the fall of the iron curtain in 1996 in the Czech Republic.
Abstract: For the purpose of finding the quotient structure of multiple algebras such as groups, Abelian groups and rings, we will state concepts of ( strong or weak ) equalities on multiple algebras, which will lead us to research on how ( strong or weak) are equalities defined on a multiple algebra over the quotients obtained from it. In order to find a quotient structure of multiple algebras such as groups, Abelian groups and loops, a part of this article has been allocated to the concepts of equalities (strong and weak) of the defined multiple functions on multiple algebras. This leads us to do research on how defined equalities (strong and weak) are made in the multiple algebra on its resulted quotient.
Abstract: Classification of Persian printed numeral characters
has been considered and a proposed system has been introduced. In
representation stage, for the first time in Persian optical character
recognition, extended moment invariants has been utilized as
characters image descriptor. In classification stage, four different
classifiers namely minimum mean distance, nearest neighbor rule,
multi layer perceptron, and fuzzy min-max neural network has been
used, which first and second are traditional nonparametric statistical
classifier. Third is a well-known neural network and forth is a kind of
fuzzy neural network that is based on utilizing hyperbox fuzzy sets.
Set of different experiments has been done and variety of results has
been presented. The results showed that extended moment invariants
are qualified as features to classify Persian printed numeral
characters.
Abstract: It has been shown that a load discontinuity at the end of
an impulse will result in an extra impulse and hence an extra amplitude
distortion if a step-by-step integration method is employed to yield the
shock response. In order to overcome this difficulty, three remedies
are proposed to reduce the extra amplitude distortion. The first remedy
is to solve the momentum equation of motion instead of the force
equation of motion in the step-by-step solution of the shock response,
where an external momentum is used in the solution of the momentum
equation of motion. Since the external momentum is a resultant of the
time integration of external force, the problem of load discontinuity
will automatically disappear. The second remedy is to perform a single
small time step immediately upon termination of the applied impulse
while the other time steps can still be conducted by using the time step
determined from general considerations. This is because that the extra
impulse caused by a load discontinuity at the end of an impulse is
almost linearly proportional to the step size. Finally, the third remedy
is to use the average value of the two different values at the integration
point of the load discontinuity to replace the use of one of them for
loading input. The basic motivation of this remedy originates from the
concept of no loading input error associated with the integration point
of load discontinuity. The feasibility of the three remedies are
analytically explained and numerically illustrated.
Abstract: Persian (Farsi) script is totally cursive and each character is written in several different forms depending on its former and later characters in the word. These complexities make automatic handwriting recognition of Persian a very hard problem and there are few contributions trying to work it out. This paper presents a novel practical approach to online recognition of Persian handwriting which is based on representation of inputs and patterns with very simple visual features and comparison of these simple terms. This recognition approach is tested over a set of Persian words and the results have been quite acceptable when the possible words where unknown and they were almost all correct in cases that the words where chosen from a prespecified list.
Abstract: In this paper a combination approach of two heuristic-based algorithms: genetic algorithm and tabu search is proposed. It has been developed to obtain the least cost based on the split-pipe design of looped water distribution network. The proposed combination algorithm has been applied to solve the three well-known water distribution networks taken from the literature. The development of the combination of these two heuristic-based algorithms for optimization is aimed at enhancing their strengths and compensating their weaknesses. Tabu search is rather systematic and deterministic that uses adaptive memory in search process, while genetic algorithm is probabilistic and stochastic optimization technique in which the solution space is explored by generating candidate solutions. Split-pipe design may not be realistic in practice but in optimization purpose, optimal solutions are always achieved with split-pipe design. The solutions obtained in this study have proved that the least cost solutions obtained from the split-pipe design are always better than those obtained from the single pipe design. The results obtained from the combination approach show its ability and effectiveness to solve combinatorial optimization problems. The solutions obtained are very satisfactory and high quality in which the solutions of two networks are found to be the lowest-cost solutions yet presented in the literature. The concept of combination approach proposed in this study is expected to contribute some useful benefits in diverse problems.
Abstract: During last decades, developing multi-objective
evolutionary algorithms for optimization problems has found
considerable attention. Flexible job shop scheduling problem, as an
important scheduling optimization problem, has found this attention
too. However, most of the multi-objective algorithms that are
developed for this problem use nonprofessional approaches. In
another words, most of them combine their objectives and then solve
multi-objective problem through single objective approaches. Of
course, except some scarce researches that uses Pareto-based
algorithms. Therefore, in this paper, a new Pareto-based algorithm
called controlled elitism non-dominated sorting genetic algorithm
(CENSGA) is proposed for the multi-objective FJSP (MOFJSP). Our
considered objectives are makespan, critical machine work load, and
total work load of machines. The proposed algorithm is also
compared with one the best Pareto-based algorithms of the literature
on some multi-objective criteria, statistically.
Abstract: In this paper a deterministic polynomial-time
algorithm is presented for the Clique problem. The case is considered
as the problem of omitting the minimum number of vertices from the
input graph so that none of the zeroes on the graph-s adjacency
matrix (except the main diagonal entries) would remain on the
adjacency matrix of the resulting subgraph. The existence of a
deterministic polynomial-time algorithm for the Clique problem, as
an NP-complete problem will prove the equality of P and NP
complexity classes.
Abstract: In this paper three basic approaches and different
methods under each of them for extracting region of interest (ROI)
from stationary images are explored. The results obtained for each of
the proposed methods are shown, and it is demonstrated where each
method outperforms the other. Two main problems in ROI
extraction: the channel selection problem and the saliency reversal
problem are discussed and how best these two are addressed by
various methods is also seen. The basic approaches are 1) Saliency
based approach 2) Wavelet based approach 3) Clustering based
approach. The saliency approach performs well on images containing
objects of high saturation and brightness. The wavelet based
approach performs well on natural scene images that contain regions
of distinct textures. The mean shift clustering approach partitions the
image into regions according to the density distribution of pixel
intensities. The experimental results of various methodologies show
that each technique performs at different acceptable levels for
various types of images.
Abstract: People have always needed to believe in some
supernatural power, which could explain nature phenomena.
Different kinds of religions like Christianity, Hinduism, Islam,
Buddhism have thought believers in all world, how to behave
themselves. We think the most important role of religion in modern
society most important role of religion in modern society is safety of
the People. World and traditional religion played a prominent role in
the socio-cultural progress, and in the development of man as a
spiritual being. At the heart of religious morals the belief in god and
responsibility before it lies and specifies religious and ethical values
and categories . The religion is based on ethical standards historically
developed by society, requirements and concepts, but it puts all
social and moral relations of the person in dependence on religious
values. For everything that the believer makes on a debt or a duty, he
bears moral responsibility before conscience, people and god. The
concept of value of religious morals takes the central place because
the religion from all forms of public consciousness most values is
painted as it is urged to answer vital questions. Any religion not only
considers questions of creation of the world, sense of human
existence, relationship of god and the person, but also offers the
ethical concept, develops rules of behavior of people. The religion a
long time dominated in the history of culture, and during this time
created a set of cultural and material values. The identity of Kazakh
culture can be defined as a Cultural identity traditional ,national
identity and the identity values developed by Kazakh people in
process of cultural-historical development, promoting formation of
Kazakh culture identity on public consciousness. Identity is the
historical process but always the tradition exists in it as a component
of stability, as a component of self that what this identity formed .
Abstract: Entrepreneurship has become an important and
extensively researched concept in business studies. Research on
foreign direct investment (FDI) has become widespread due to the
growth of FDI and its importance in globalization. Most
entrepreneurship studies examined the importance and influence of
entrepreneurial orientation in a micro-level context. On the other
hand, studies and research concerning FDI used statistical techniques
to analyze the effect, determinants, and motives of FDI on a
macroeconomic level, ignoring empirical studies on other noneconomic
determinants. In order to bridge the gap between the theory
and empirical evidence on FDI and the theory and research on
entrepreneurship, this study examines the impact of entrepreneurship
on inward foreign direct investment. The relationship between
entrepreneurship and foreign direct investment is investigated
through regression analysis of pooled time-series and cross-sectional
data. The results suggest that entrepreneurship has a significant effect
on FDI.
Abstract: This paper presents an economic game for sybil
detection in a distributed computing environment. Cost parameters
reflecting impacts of different sybil attacks are introduced in the sybil
detection game. The optimal strategies for this game in which both
sybil and non-sybil identities are expected to participate are devised.
A cost sharing economic mechanism called Discriminatory
Rewarding Mechanism for Sybil Detection is proposed based on this
game. A detective accepts a security deposit from each active agent,
negotiates with the agents and offers rewards to the sybils if the latter
disclose their identity. The basic objective of the detective is to
determine the optimum reward amount for each sybil which will
encourage the maximum possible number of sybils to reveal
themselves. Maintaining privacy is an important issue for the
mechanism since the participants involved in the negotiation are
generally reluctant to share their private information. The mechanism
has been applied to Tor by introducing a reputation scoring function.
Abstract: There is inadequate information on the practice of
female genital mutilation (FGM) in the UK, and there are often
myths and perceptions within communities that influence the
effectiveness of prevention programmes. This means it is difficult to
address the trends and changes in the practice in the UK.
To this end, FORWARD undertook novel and innovative research
using the Participatory Ethnographic and Evaluative Research
(PEER) method to explore the views of women from Eritrea, Sudan,
Somalia and Ethiopia that live in London and Bristol (two UK cities).
Women-s views, taken from PEER interviews, reflected reasons for
continued practice of FGM: marriageability, the harnessing and
control of female sexuality, and upholding traditions from their
countries of origin. It was also clear that the main supporters of the
practice were believed to be older women within families and
communities.
Women described the impact FGM was having on their lives as
isolating. And although it was clearly considered a private and
personal matter, they developed a real sense of connection with their
peers within the research process.
The women were overwhelmingly positive about combating the
practice, although they believed it would probably take a while
before it ends completely. They also made concrete
recommendations on how to improve support services for women
affected by FGM: Training for professionals (particularly in
healthcare), increased engagement with, and outreach to,
communities, culturally appropriate materials and information made
available and accessible to communities, and more consequent
implementation of legislation.
Finally, the women asked for more empathy and understanding,
particularly from health professionals. Rather than presenting FGM
as a completely alien and inconceivable practice, it may help for
those looking into these women-s lives and working with them to
understand the social and economic context in which the practice
takes place.
Abstract: This paper describes the design concepts and
implementation of a 5-Joint mechanical arm for a rescue robot named
CEO Mission II. The multi-joint arm is a five degree of freedom
mechanical arm with a four bar linkage, which can be stretched to
125 cm. long. It is controlled by a teleoperator via the user-friendly
control and monitoring GUI program. With Inverse Kinematics
principle, we developed the method to control the servo angles of all
arm joints to get the desired tip position. By clicking the determined
tip position or dragging the tip of the mechanical arm on the
computer screen to the desired target point, the robot will compute
and move its multi-joint arm to the pose as seen on the GUI screen.
The angles of each joint are calculated and sent to all joint servos
simultaneously in order to move the mechanical arm to the desired
pose at once. The operator can also use a joystick to control the
movement of this mechanical arm and the locomotion of the robot.
Many sensors are installed at the tip of this mechanical arm for
surveillance from the high level and getting the vital signs of victims
easier and faster in the urban search and rescue tasks. It works very
effectively and easy to control. This mechanical arm and its software
were developed as a part of the CEO Mission II Rescue Robot that
won the First Runner Up award and the Best Technique award from
the Thailand Rescue Robot Championship 2006. It is a low cost,
simple, but functioning 5-Jiont mechanical arm which is built from
scratch, and controlled via wireless LAN 802.11b/g. This 5-Jiont
mechanical arm hardware concept and its software can also be used
as the basic mechatronics to many real applications.
Abstract: The significant effects of the interactions between the
system boundaries and the near wall molecules in miniaturized
gaseous devices lead to the formation of the Knudsen layer in which
the Navier-Stokes-Fourier (NSF) equations fail to predict the correct
associated phenomena. In this paper, the well-known lattice
Boltzmann method (LBM) is employed to simulate the fluid flow and
heat transfer processes in rarefied gaseous micro media. Persuaded
by the problematic deficiency of the LBM in capturing the Knudsen
layer phenomena, present study tends to concentrate on the effective
molecular mean free path concept the main essence of which is to
compensate the incapability of this mesoscopic method in dealing
with the momentum and energy transport within the above mentioned
kinetic boundary layer. The results show qualitative and quantitative
accuracy comparable to the solutions of the linearized Boltzmann
equation or the DSMC data for the Knudsen numbers of O (1) .
Abstract: The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.
Abstract: This study reports results of a meta-analytic path analysis e-learning Acceptance Model with k = 27 studies, Databases searched included Information Sciences Institute (ISI) website. Variables recorded included perceived usefulness, perceived ease of use, attitude toward behavior, and behavioral intention to use e-learning. A correlation matrix of these variables was derived from meta-analytic data and then analyzed by using structural path analysis to test the fitness of the e-learning acceptance model to the observed aggregated data. Results showed the revised hypothesized model to be a reasonable, good fit to aggregated data. Furthermore, discussions and implications are given in this article.
Abstract: This paper details a new concept of using compressed air as a potential zero pollution power source for motorbikes. In place of an internal combustion engine, the motorbike is equipped with an air turbine transforms the energy of the compressed air into shaft work. The mathematical modeling and performance evaluation of a small capacity compressed air driven vaned type novel air turbine is presented in this paper. The effect of isobaric admission and adiabatic expansion of high pressure air for different rotor diameters, casing diameters and ratio of rotor to casing diameters of the turbine have been considered and analyzed. It is concluded that the work output is found optimum for some typical values of rotor / casing diameter ratios. In this study, the maximum power works out to 3.825 kW (5.20 HP) for casing diameter of 200 mm and rotor to casing diameter ratio of 0.65 to 0.60 which is sufficient to run motorbike.
Abstract: The main criteria of designing in the most hydraulic
constructions essentially are based on runoff or discharge of water. Two of those important criteria are runoff and return period. Mostly,
these measures are calculated or estimated by stochastic data.
Another feature in hydrological data is their impreciseness.
Therefore, in order to deal with uncertainty and impreciseness, based
on Buckley-s estimation method, a new fuzzy method of evaluating hydrological measures are developed. The method introduces
triangular shape fuzzy numbers for different measures in which both
of the uncertainty and impreciseness concepts are considered. Besides, since another important consideration in most of the
hydrological studies is comparison of a measure during different
months or years, a new fuzzy method which is consistent with special form of proposed fuzzy numbers, is also developed. Finally, to
illustrate the methods more explicitly, the two algorithms are tested on one simple example and a real case study.