Abstract: The paper attempts to elucidate the columnar structure
of the cortex by answering the following questions. (1) Why the
cortical neurons with similar interests tend to be vertically arrayed
forming what is known as cortical columns? (2) How to describe the
cortex as a whole in concise mathematical terms? (3) How to design
efficient digital models of the cortex?
Abstract: The purpose of this paper is to develop a typology
based on market orientation (MO) and innovation orientation (IO),
and to illustrate to what extent housing companies in Sweden fit
within this framework. A qualitative study on 11 public housing
companies in the central part of Sweden has been conducted by the
help of open and semi-structured questions for data collection. Four
public housing company types- i.e. reactive prospector, proactive
prospector, reactive defender and proactive defender have been
identified by the combination of MO-IO dimensions. Future research
can include other dimensions like entrepreneurship and network to
observe how it particularly affects MO. An empirical study can
compare public and private housing companies on the basis of MO
and IO dimensions. One major contribution of the paper is the
proposition of typology which can be used to describe public housing
companies and deciding their future course of actions.
Abstract: Although Model Driven Architecture has taken
successful steps toward model-based software development, this
approach still faces complex situations and ambiguous questions
while applying to real world software systems. One of these
questions - which has taken the most interest and focus - is how
model transforms between different abstraction levels, MDA
proposes. In this paper, we propose an approach based on Story
Driven Modeling and Aspect Oriented Programming to ease these
transformations. Service Oriented Architecture is taken as the target
model to test the proposed mechanism in a functional system.
Service Oriented Architecture and Model Driven Architecture [1]
are both considered as the frontiers of their own domain in the
software world. Following components - which was the greatest step
after object oriented - SOA is introduced, focusing on more
integrated and automated software solutions. On the other hand - and
from the designers' point of view - MDA is just initiating another
evolution. MDA is considered as the next big step after UML in
designing domain.
Abstract: Chest pain is one of the most prevalent complaints
among adults that cause the people to attend to medical centers. The
aim was to determine the prevalence and risk factors of chest pain
among over 30 years old people in Tehran. In this cross-sectional
study, 787 adults took part from Apr 2005 until Apr 2006. The
sampling method was random cluster sampling and there were 25
clusters. In each cluster, interviews were performed with 32 over 30
years old, people lived in those houses. In cases with chest pain, extra
questions asked. The prevalence of CP was 9% (71 cases). Of them
21 cases (6.5%) were in 41-60 year age ranges and the remainders
were over 61 year old. 19 cases (26.8%) mentioned CP in resting
state and all of the cases had exertion onset CP. The CP duration was
10 minutes or less in all of the cases and in most of them (84.5%), the
location of pain mentioned left anterior part of chest, left anterior part
of sternum and or left arm. There was positive history of myocardial
infarction in 12 cases (17%). There was significant relation between
CP and age, sex and between history of myocardial infarction and
marital state of study people. Our results are similar to other studies-
results in most parts, however it is necessary to perform
supplementary tests and follow up studies to differentiate between
cardiac and non-cardiac CP exactly.
Abstract: The most reliable and accurate description of the actual behavior of a software system is its source code. However, not all questions about the system can be answered directly by resorting to this repository of information. What the reverse engineering methodology aims at is the extraction of abstract, goal-oriented “views" of the system, able to summarize relevant properties of the computation performed by the program. While concentrating on reverse engineering we had modeled the C++ files by designing the translator.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: The Expert Witness Testimony in the Battered
Woman Syndrome Expert witness testimony (EWT) is a kind of
information given by an expert specialized in the field (here in BWS)
to the jury in order to help the court better understand the case. EWT
does not always work in favor of the battered women. Two main
decision-making models are discussed in the paper: the Mathematical
model and the Explanation model. In the first model, the jurors
calculate ″the importance and strength of each piece of evidence″
whereas in the second model they try to integrate the EWT with the
evidence and create a coherent story that would describe the crime.
The jury often misunderstands and misjudges battered women for
their action (or in this case inaction). They assume that these women
are masochists and accept being mistreated for if a man abuses a
woman constantly, she should and could divorce him or simply leave
at any time. The research in the domain found that indeed, expert
witness testimony has a powerful influence on juror’s decisions thus
its quality needs to be further explored. One of the important factors
that need further studies is a bias called the dispositionist worldview
(a belief that what happens to people is of their own doing). This
kind of attributional bias represents a tendency to think that a
person’s behavior is due to his or her disposition, even when the
behavior is clearly attributed to the situation. Hypothesis The
hypothesis of this paper is that if a juror has a dispositionist
worldview then he or she will blame the rape victim for triggering the
assault. The juror would therefore commit the fundamental
attribution error and believe that the victim’s disposition caused the
rape and not the situation she was in. Methods The subjects in the
study were 500 randomly sampled undergraduate students from
McGill, Concordia, Université de Montréal and UQAM.
Dispositional Worldview was scored on the Dispositionist
Worldview Questionnaire. After reading the Rape Scenarios, each
student was asked to play the role of a juror and answer a
questionnaire consisting of 7 questions about the responsibility,
causality and fault of the victim. Results The results confirm the
hypothesis which states that if a juror has a dispositionist worldview
then he or she will blame the rape victim for triggering the assault.
By doing so, the juror commits the fundamental attribution error
because he will believe that the victim’s disposition, and not the
constraints or opportunities of the situation, caused the rape scenario.
Abstract: One of the main consequences of the ubiquitous usage of Internet as a means to conduct business has been the progressive internationalization of contracts created to support such transactions. As electronic commerce becomes International commerce, the reality is that commercial disputes will occur creating such questions as: "In which country do I bring proceedings?" and "Which law is to be applied to solve disputes?" The decentralized and global structure of the Internet and its decentralized operation have given e-commerce a transnational element that affects two questions essential to any transaction: applicable law and jurisdiction in the event of dispute. The sharing of applicable law and jurisdiction among States in respect of international transactions traditionally has been based on the use of contact factors generally of a territorial nature (the place where real estate is located, customary residence, principal establishment, place of shipping goods). The characteristics of the Internet as a new space sometimes make it difficult to apply these rules, and may make them inoperative or lead to results that are surprising or totally foreign to the contracting parties and other elements and circumstances of the case.
Abstract: Longitudinal data typically have the characteristics of
changes over time, nonlinear growth patterns, between-subjects
variability, and the within errors exhibiting heteroscedasticity and
dependence. The data exploration is more complicated than that of
cross-sectional data. The purpose of this paper is to organize/integrate
of various visual-graphical techniques to explore longitudinal data.
From the application of the proposed methods, investigators can
answer the research questions include characterizing or describing the
growth patterns at both group and individual level, identifying the time
points where important changes occur and unusual subjects, selecting
suitable statistical models, and suggesting possible within-error
variance.
Abstract: Students often adopt routine practicing as learning
strategy for mathematics. The reason is they are often bound and
trained to solving conventional-typed questions in Mathematics in
high school. This will be problematic if students further consolidate
this practice in university. Therefore, the Department of Mathematics
emphasized and integrated the Discovery-enriched approach in the
undergraduate curriculum. This paper presents the details of
implementing the Discovery-enriched Curriculum by providing
adequate platform for project-learning, expertise for guidance and
internship opportunities for students majoring in Mathematics. The
Department also provided project-learning opportunities to
mathematics courses targeted for students majoring in other science or
engineering disciplines. The outcome is promising: the research
ability and problem solving skills of students are enhanced.
Abstract: This article presents a method for elections between the members of a group that is founded by fuzzy logic. Linguistic variables are objects for decision on election cards and deduction is based on t-norms and s-norms. In this election-s method election cards are questionnaire. The questionnaires are comprised of some questions with some choices. The choices are words from natural language. Presented method is accompanied by center of gravity (COG) defuzzification added up to a computer program by MATLAB. Finally the method is illustrated by solving two examples; choose a head for a research group-s members and a representative for students.
Abstract: IT consultants often take over an important role as an
interface between technological, organizational and managerial
structures. As a result, the services offered are in many cases
assigned to different disciplines which can cause a lack of
transparency on the market for consulting services. However, not all
consulting products are suitable for every company because of
different frameworks and business processes. In this context the
questions arises as to what consulting products are currently offered
and how they can be compared as well as how the market for IT
consulting services is structured on the supply side. The presented
study aims to shed light on the IT consulting market by giving an
overview of the current structure of the supply-side for IT consulting
services as well as proposing a categorization of the currently
available consulting services (consulting fields) in order to provide a
theoretical background for the empirical study. Apart from these
theoretical considerations, the empirical results of field surveys on
the Austrian IT consulting market are presented and analyzed.
Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: In this paper our aim is to explore the construction of schoolgirl femininities, drawing on the results of an ethnographic study conducted in a high school in Ankara, Turkey. In this case study which tries to explore the complexities of gender discourses, we were initially motivated by the questions that have been put forward by critical and feminist literature on education which emphasize the necessarily conflicting and partial nature of both reproduction and resistance and the importance of gendered power relations in the school context. Drawing on this paradigm our research tries to address to a more specific question: how are multiple schoolgirl femininities constructed within the context of gendered school culture, and especially in relation to hegemonic masculinity? Our study reveals that the general framework of multiple femininities is engendered by a tension between two inter-related positions. The first one is different strategies of accommodation and resistance to the gender-related problems of education. The second one is the school experience of girls which is conditioned by their differential position vis-à-vis the masculine resistance culture that is dominant in the school.
Abstract: Successful intelligence (SI) is the integrated set of the
ability needed to attain success in life, within individual-s sociocultural
context. People are successfully intelligent by recognizing
their strengths and weaknesses. They will find ways to strengthen
their weakness and maintain their strength or even improve it. SI
people can shape, select, and adapt to the environments by using
balance of higher-ordered thinking abilities including; critical,
creative, and applicative. Aims: The purposes of this study were to;
1) develop curriculum that promotes SI for nursing students, and 2)
study the effectiveness of the curriculum development. Method:
Research and Development was a method used for this study. The
design was divided into two phases; 1) the curriculum development
which composed of three steps (needs assessment, curriculum
development and curriculum field trail), and 2) the curriculum
implementation. In this phase, a pre-experimental research design
(one group pretest-posttest design) was conducted. The sample
composed of 49 sophomore nursing students of Boromarajonani
College of Nursing, Surin, Thailand who enrolled in Nursing care of
Health problem course I in 2011 academic year. Data were carefully
collected using 4 instruments; 1) Modified essay questions test
(MEQ) 2) Nursing Care Plan evaluation form 3) Group processing
observation form (α = 0.74) and 4) Satisfied evaluation form of
learning (α = 0.82). Data were analyzed using descriptive statistics
and content analysis. Results: The results revealed that the sample
had post-test average score of SI higher than pre-test average score
(mean difference was 5.03, S.D. = 2.84). Fifty seven percentages of
the sample passed the MEQ posttest at the criteria of 60 percentages.
Students demonstrated the strategies of how to develop nursing care
plan. Overall, students- satisfaction on teaching performance was at
high level (mean = 4.35, S.D. = 0.46). Conclusion: This curriculum
can promote the attribute of characteristic of SI person and was
highly required to be continued.
Abstract: This paper deals with automatic sentence modality
recognition in French. In this work, only prosodic features are
considered. The sentences are recognized according to the three
following modalities: declarative, interrogative and exclamatory
sentences. This information will be used to animate a talking head for
deaf and hearing-impaired children. We first statistically study a real
radio corpus in order to assess the feasibility of the automatic
modeling of sentence types. Then, we test two sets of prosodic
features as well as two different classifiers and their combination. We
further focus our attention on questions recognition, as this modality
is certainly the most important one for the target application.
Abstract: An attempt has been made several times to identify
and discuss the U.S. experience on the formation of political nation in
political science. The purpose of this research paper is to identify the
main aspects of the formation of civic identity in the United States
and Kazakhstan, through the identification of similarities and
differences that can get practical application in making decisions of
national policy issues in the context of globalization, as well as to
answer the questions “What should unite the citizens of Kazakhstan
to the nation?" and “What should be the dominant identity: civil or
ethnic (national) one?"
Can Kazakhstan being multiethnic country like America, adopt its
experience in the formation of a civic nation? Since it is believed that
the “multi-ethnic state of the population is a characteristic feature of
most modern countries in the world," it states that “inter-ethnic
integration is one of the most important aspects of the problem of
forming a new social community (metaetnic - Kazakh people,
Kazakh nation" [1].
Abstract: Space exploration is a highly visible endeavour of
humankind to seek profound answers to questions about the origins
of our solar system, whether life exists beyond Earth, and how we
could live on other worlds. Different platforms have been utilized in
planetary exploration missions, such as orbiters, landers, rovers, and
penetrators.
Having low mass, good mechanical contact with the surface,
ability to acquire high quality scientific subsurface data, and ability to
be deployed in areas that may not be conducive to landers or rovers,
Penetrators provide an alternative and complimentary solution that
makes possible scientific exploration of hardly accessible sites (icy
areas, gully sites, highlands etc.).
The Canadian Space Agency (CSA) has put space exploration as
one of the pillars of its space program, and established ExCo program
to prepare Canada for future international planetary exploration.
ExCo sets surface mobility as its focus and priority, and invests
mainly in the development of rovers because of Canada's niche space
robotics technology. Meanwhile, CSA is also investigating how
micro-penetrators can help Canada to fulfill its scientific objectives
for planetary exploration.
This paper presents a review of the micro-penetrator technologies,
past missions, and lessons learned. It gives a detailed analysis of the
technical challenges of micro-penetrators, such as high impact
survivability, high precision guidance navigation and control, thermal
protection, communications, and etc. Then, a Canadian perspective of
a possible micro-penetrator mission is given, including Canadian
scientific objectives and priorities, potential instruments, and flight
opportunities.
Abstract: During recent years wind turbine technology has
undergone rapid developments. Growth in size and the optimization
of wind turbines has enabled wind energy to become increasingly
competitive with conventional energy sources. As a result today-s
wind turbines participate actively in the power production of several
countries around the world. These developments raise a number of
challenges to be dealt with now and in the future. The penetration of
wind energy in the grid raises questions about the compatibility of the
wind turbine power production with the grid. In particular, the
contribution to grid stability, power quality and behavior during fault
situations plays therefore as important a role as the reliability. In the
present work, we addressed two fault situations that have shown their
influence on the generator and the behavior of the wind over the
defects which are briefly discussed based on simulation results.