Abstract: Weblog is an Internet tool that is believed to possess
great potential to facilitate learning in education. This study wants to
know if weblog can be used to promote students- critical thinking. It
used a group of secondary two students from a Singapore school to
write weblogs as a means of substitution for their traditional
handwritten assignments. The topics for the weblogging are taken
from History syllabus but modified to suit the purpose of this study.
Weblogs from the students were collected and analysed using a
known coding system for measuring critical thinking. Results show
that the topic for blogging is crucial in determining the types of
critical thinking employed by the students. Students are seen to
display critical thinking traits in the areas of information sourcing,
linking information to arguments and viewpoints justification.
Students- criticalness is more profound when the information for
writing a topic is readily available. Otherwise, they tend to be less
critical and subjective. The study also found that students lack the
ability to source for external information suggesting that students
may need to be taught information literacy in order to widen their use
of critical thinking skills.
Abstract: Routing places an important role in determining the
quality of service in wireless networks. The routing methods adopted
in wireless networks have many drawbacks. This paper aims to
review the current routing methods used in wireless networks. This
paper proposes an innovative solution to overcome the problems in
routing. This solution is aimed at improving the Quality of Service.
This solution is different from others as it involves the resuage of the
part of the virtual circuits. This improvement in quality of service is
important especially in propagation of multimedia applications like
video, animations etc. So it is the dire need to propose a new solution
to improve the quality of service in ATM wireless networks for
multimedia applications especially during this era of multimedia
based applications.
Abstract: The increasing interest on processing data created by
sensor networks has evolved into approaches to implement sensor
networks as databases. The aggregation operator, which calculates a
value from a large group of data such as computing averages or sums,
etc. is an essential function that needs to be provided when
implementing such sensor network databases. This work proposes to
add the DURING clause into TinySQL to calculate values during a
specific long period and suggests a way to implement the aggregation
service in sensor networks by applying materialized view and
incremental view maintenance techniques that is used in data
warehouses. In sensor networks, data values are passed from child
nodes to parent nodes and an aggregation value is computed at the root
node. As such root nodes need to be memory efficient and low
powered, it becomes a problem to recompute aggregate values from all
past and current data. Therefore, applying incremental view
maintenance techniques can reduce the memory consumption and
support fast computation of aggregate values.
Abstract: With the exponential progress of technological
development comes a strong sense that events are moving too quickly
for our schools and that teachers may be losing control of them in the
process. This paper examines the impact of e-learning and e-teaching
in universities, from both the student and teacher perspective. In
particular, it is shown that e-teachers should focus not only on the
technical capacities and functions of IT materials and activities, but
must attempt to more fully understand how their e-learners perceive
the learning environment. From the e-learner perspective, this paper
indicates that simply having IT tools available does not automatically
translate into all students becoming effective learners. More
evidence-based evaluative research is needed to allow e-learning and
e-teaching to reach full potential.
Abstract: According as the Architecture, Engineering and Construction (AEC) Industry projects have grown more complex and larger, the number of utilization of BIM for 3D design and simulation is increasing significantly. Therefore, typical applications of BIM such as clash detection and alternative measures based on 3-dimenstional planning are expanded to process management, cost and quantity management, structural analysis, check for regulation, and various domains for virtual design and construction. Presently, commercial BIM software is operated on single-user environment, so initial cost is so high and the investment may be wasted frequently. Cloud computing that is a next-generation internet technology enables simple internet devices (such as PC, Tablet, Smart phone etc) to use services and resources of BIM software. In this paper, we suggested developing method of the BIM software based on cloud computing environment in order to expand utilization of BIM and reduce cost of BIM software. First, for the benchmarking, we surveyed successful case of BIM and cloud computing. And we analyzed needs and opportunities of BIM and cloud computing in AEC Industry. Finally, we suggested main functions of BIM software based on cloud computing environment and developed a simple prototype of cloud computing BIM software for basic BIM model viewing.
Abstract: As business environments are rapidly changing,
the manufacturing system must be reconfigured to adapt to
various customer needs. In order to cope with this challenge, it
is quintessential to test industrial control logic rapidly and
easily in the design time, and monitor operational behavior in
the run time of automated manufacturing system. Proposed
integrated model for virtual prototyping and operational
monitoring of industrial control logic is to improve limitations
of current ladder programming practices and general discrete
event simulation method. Each plant layout model using HMI
package and object-oriented control logic model is designed
independently and is executed simultaneously in integrated
manner to reflect design practices of automation system in the
design time. Control logic is designed and executed using UML
activity diagram without considering complicated control
behavior to deal with current trend of reconfigurable
manufacturing. After the physical installation, layout model of
virtual prototype constructed in the design time is reused for
operational monitoring of system behavior during run time.
Abstract: Electrocardiogram (ECG) is considered to be the
backbone of cardiology. ECG is composed of P, QRS & T waves and
information related to cardiac diseases can be extracted from the
intervals and amplitudes of these waves. The first step in extracting
ECG features starts from the accurate detection of R peaks in the
QRS complex. We have developed a robust R wave detector using
wavelets. The wavelets used for detection are Daubechies and
Symmetric. The method does not require any preprocessing therefore,
only needs the ECG correct recordings while implementing the
detection. The database has been collected from MIT-BIH arrhythmia
database and the signals from Lead-II have been analyzed. MatLab
7.0 has been used to develop the algorithm. The ECG signal under
test has been decomposed to the required level using the selected
wavelet and the selection of detail coefficient d4 has been done based
on energy, frequency and cross-correlation analysis of decomposition
structure of ECG signal. The robustness of the method is apparent
from the obtained results.
Abstract: During this day a considerable amount of Leachate is produced with high amounts of organic material and nutrients needed plants. This study has done in order to scrutinize the effect of Leachate compost on the pH, EC and organic matter percentage in the form of statistical Factorial plan through randomizing block design with three main and two minor treatments and also three replications during three six month periods. Major treatments include N: Irrigation with the region-s well water as a control, I: Frequent irrigation with well water and Leachate, C: Mixing Leachate and water well (25 percent leachate + 75 percent ordinary well water) and secondary treatments, include DI: surface drip irrigation and SDI: sub surface drip irrigation. Results of this study indicated significant differences between treatments and also there were mixing up with the control treatment in the reduction of pH, increasing soluble salts and also increasing the organic matter percentage. This increase is proportional to the amount of added Leachate and in the treatment also proportional to higher mixture of frequent treatment. Therefore, since creating an acidic pH increases the ability to absorb some nutrient elements such as phosphorus, iron, zinc, copper and manganese are increased and the other hand, organic materials also improve many physical and chemical properties of soil are used in Leachate trash Consider health issues as refined in the green belts around cities as a liquid fertilizer recommended.
Abstract: Car failure detection is a complicated process and
requires high level of expertise. Any attempt of developing an expert
system dealing with car failure detection has to overcome various
difficulties. This paper describes a proposed knowledge-based
system for car failure detection. The paper explains the need for an
expert system and the some issues on developing knowledge-based
systems, the car failure detection process and the difficulties involved
in developing the system. The system structure and its components
and their functions are described. The system has about 150 rules for
different types of failures and causes. It can detect over 100 types of
failures. The system has been tested and gave promising results.
Abstract: In today-s turbulent environment, companies are faced with two principal challenges. On the one hand, it is necessary to produce ever more cost-effectively to remain competitive. On the other hand, factories need to be transformable in order to manage unpredictable changes in the corporate environment. To deal with these different challenges, companies use the philosophy of lean production in the first case, in the second case the philosophy of transformability. To a certain extent these two approaches follow different directions. This can cause conflicts when designing factories. Therefore, the Institute of Production Systems and Logistics (IFA) of the Leibniz University of Hanover has developed a procedure to allow companies to evaluate and design their factories with respect to the requirements of both philosophies.
Abstract: The emergence of mobile application services and App
Store has led to the explosive growth of user innovation, which users
voluntarily contribute to. User innovation communities where end
users freely reveal innovative ideas and needs with other community
members are becoming increasingly influential in this area. However,
user-s ideas in user innovation community are not enough to be new
service opportunity, because some of them can already developed as
existing services in App Store. Moreover, the existing services similar
to new service opportunity can be significant references to apply
analogy to develop service concept. In response, this research
proposes Case-Based Reasoning approach to matching the user needs
and existing services, identifying unmet opportunistic user needs, and
retrieving similar services with opportunity. Due to its intuitive and
transparent algorithm, users related to App Store innovation
communities can easily employ Case-Based Reasoning based
approach to their innovation.
Abstract: By employing BS (Base Station) cooperation we can
increase substantially the spectral efficiency and capacity of cellular
systems. The signals received at each BS are sent to a central unit that
performs the separation of the different MT (Mobile Terminal) using
the same physical channel. However, we need accurate sampling and
quantization of those signals so as to reduce the backhaul
communication requirements.
In this paper we consider the optimization of the quantizers for BS
cooperation systems. Four different quantizer types are analyzed and
optimized to allow better SQNR (Signal-to-Quantization Noise
Ratio) and BER (Bit Error Rate) performance.
Abstract: Since the world printing industry has to confront
globalization with a constant change, the Thai printing industry, as a
small but increasingly significant part of the world printing industry,
cannot inevitably escape but has to encounter with the similar change
and also the need to revamp its production processes, designs and
technology to make them more appealing to both international and
domestic market. The essential question is what is the Thai
competitive edge in the printing industry in changing environment?
This research is aimed to study the Thai level of competitive edge in
terms of marketing, technology, environment friendly, and the level
of satisfaction of the process of using printing machines. To access
the extent to which is the trends in competitiveness of Thai printing
industry, both quantitative and qualitative study were conducted. The
quantitative analysis was restricted to 100 respondents. The
qualitative analysis was restricted to a focus group of 10 individuals
from various backgrounds in the Thai printing industry. The findings
from the quantitative analysis revealed that the overall mean scores
are 4.53, 4.10, and 3.50 for the competitiveness of marketing, the
competitiveness of technology, and the competitiveness of being
environment friendly respectively. However, the level of satisfaction
for the process of using machines has a mean score only 3.20. The
findings from the qualitative analysis have revealed that target
customers have increasingly reordered due to their contentment in
both low prices and the acceptable quality of the products. Moreover,
the Thai printing industry has a tendency to convert to ambient green
technology which is friendly to the environment. The Thai printing
industry is choosing to produce or substitute with products that are
less damaging to the environment. It is also found that the Thai
printing industry has been transformed into a very competitive
industry which bargaining power rests on consumers who have a
variety of choices.
Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.
Abstract: Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Abstract: The purpose of this paper is to examine the current
state of corporate social responsibility statements on corporate
websites of Malaysian and Singaporean corporations and analyze
how the CSR statements contribute in building a unique corporate
identity of corporations. Content analysis is employed to examine the
websites of Malaysian and Singaporean consumer corporations. It is
believed that generally most companies tend to publish and
communicate their CSR statements visibly to general stakeholders.
However, there is a significantly different outcome of the articulation
of CSR on practices on websites between Malaysian and Singaporean
consumer corporations. A number of Singaporean organizations were
found less concerned with CSR practices as compared to Malaysian
organizations. The findings indicate a need for corporations in
Malaysia and Singapore to orchestrate their core competence of CSR
activities in order to develop a unique corporate identity in a global
business environment.
Abstract: Artificial Neural Network (ANN) has been
extensively used for classification of heart sounds for its
discriminative training ability and easy implementation. However, it
suffers from overparameterization if the number of nodes is not
chosen properly. In such cases, when the dataset has redundancy
within it, ANN is trained along with this redundant information that
results in poor validation. Also a larger network means more
computational expense resulting more hardware and time related
cost. Therefore, an optimum design of neural network is needed
towards real-time detection of pathological patterns, if any from heart
sound signal. The aims of this work are to (i) select a set of input
features that are effective for identification of heart sound signals and
(ii) make certain optimum selection of nodes in the hidden layer for a
more effective ANN structure. Here, we present an optimization
technique that involves Singular Value Decomposition (SVD) and
QR factorization with column pivoting (QRcp) methodology to
optimize empirically chosen over-parameterized ANN structure.
Input nodes present in ANN structure is optimized by SVD followed
by QRcp while only SVD is required to prune undesirable hidden
nodes. The result is presented for classifying 12 common
pathological cases and normal heart sound.
Abstract: A wireless Ad-hoc network consists of wireless nodes
communicating without the need for a centralized administration, in
which all nodes potentially contribute to the routing process.In this
paper, we report the simulation results of four different scenarios for
wireless ad hoc networks having thirty nodes. The performances of
proposed networks are evaluated in terms of number of hops per
route, delay and throughput with the help of OPNET simulator.
Channel speed 1 Mbps and simulation time 600 sim-seconds were
taken for all scenarios. For the above analysis DSR routing protocols
has been used. The throughput obtained from the above analysis
(four scenario) are compared as shown in Figure 3. The average
media access delay at node_20 for two routes and at node_20 for four
different scenario are compared as shown in Figures 4 and 5. It is
observed that the throughput will degrade when it will follow
different hops for same source to destination (i.e. it has dropped from
1.55 Mbps to 1.43 Mbps which is around 9.7%, and then dropped to
0.48Mbps which is around 35%).
Abstract: Time full of changes which is associated with globalization, tougher competition, changes in the structures of markets and economic downturn, that all force companies to think about their competitive advantages. These changes can bring the company a competitive advantage and that can help improve competitive position in the market. Policy of the European Union is focused on the fast growing innovative companies which quickly respond to market demands and consequently increase its competitiveness. To meet those objectives companies need the right conditions and support of their state.
Abstract: Cloud Computing (CC) has become one of the most
talked about emerging technologies that provides powerful
computing and large storage environments through the use of the
Internet. Cloud computing provides different dynamically scalable
computing resources as a service. It brings economic benefits to
individuals and businesses that adopt the technology. In theory
adoption of cloud computing reduces capital and operational
expenditure on information technology. For this to be a reality there
is need to solve some challenges and at the same time addressing
concerns that consumers have about cloud computing. This paper
looks at Cloud Computing in general then highlights the challenges
of Cloud Computing and finally suggests solutions to some of the
challenges.