Abstract: Suburban area is an important area to the development of a city and a country. Russias economy is going through major transitions. These transitions are rapidly changing the relationship between cities (urban areas), countryside (rural areas) and the development, growth, and popularity of suburbia. The process of suburbanization takes place in biggest cities of Russia, including Krasnoyarsk City. The modern Krasnoyarsk with a population of about 1mln people occupies the territory of 34115 ha. This article examines the analysis of functions of suburban area and connects these functions with zoning of the suburban territory. The author uses the method of hierarchy to select the best conditions to each function in connection with nature component, transportation and distance from the city. The result of this research is the map of the functional zoning of suburban area of Krasnoyarsk City. The author uses a variety of factors, which have an influence on suburban area, to compare and choose the best conditions. KeywordsSuburban area, zoning of territory, Krasnoyarsk City.
Abstract: This paper examines the impact of information and
communication technology (ICT) usage, internal relationship,
supplier-retailer relationship, logistics services and inventory
management on convenience store suppliers- performance. Data was
collected from 275 convenience store managers in Malaysia using a
set of questionnaire. The multiple linear regression results indicate
that inventory management, supplier-retailer relationship, logistics
services and internal relationship are predictors of supplier
performance as perceived by convenience store managers. However,
ICT usage is not a predictor of supplier performance. The study
focuses only on convenience stores and petrol station convenience
stores and concentrates only on managers. The results provide
insights to suppliers who serve convenience stores and possibly
similar retail format on factors to consider in improving their service
to retailers. The results also provide insights to government in its
aspiration to improve business operations of convenience store to
consider ways to enhance the adoption of ICT by retailers and
suppliers.
Abstract: Housebuilders in England have been the target of numerous government policies in recent years promoting increased productivity and affordability. As a result, the housebuilding industry is currently faced with objectives to improve the affordability and sustainability of new homes whilst also increasing production rates to 240,000 per year by 2016.Yet amidst a faltering economic climate, the UK Government is forging ahead with the 'Code for Sustainable Homes', which includes stringent sustainable standards for all new homes and sets ambitious targets for the housebuilding industry, the culmination of which is the production of zero carbon homes by 2016.Great uncertainty exists amongst housebuilders as to the costs, benefits and risks of building zero carbon homes. This paper examines the key barriers to zero carbon homes from housebuilders- perspective. A comprehensive opinion on the challenges to deliver zero carbon homes is gathered through a questionnaire survey issued to the major housing developers in England. The study found that a number of cultural, legislative, and financial barriers stand in the way of the widespread construction of zero carbon homes. The study concludes with several recommendations to both the Government and the housebuilding industry to address the barriers that hinder a successful delivery of zero carbon homes in England.
Abstract: This paper examines two policy spaces–the ARC and TVA–and their spatialized politics. The research observes that the regional concept informs public policy and can contribute to the formation of stable policy initiatives. Using the subsystem framework to understand the political viability of policy regimes, the authors conclude policy geographies that appeal to traditional definitions of regions are more stable over time. In contrast, geographies that fail to reflect pre-existing representations of space are engaged in more competitive subsystem politics. The paper demonstrates that the spatial practices of policy regions and their directional politics influence the political viability of programs. The paper concludes that policy spaces should institutionalize pre-existing geographies–not manufacture new ones.
Abstract: This study examines the possibility to apply the theory of multidimensional accounting (momentum accounting) in a Brazilian Navy-s Services Provider Military Organization (Organização Militar Prestadora de Serviços - OMPS). In general, the core of the said theory is the fact that Accounting does not recognize the inertia of transactions occurring in an entity, and that occur repeatedly in some cases, regardless of the implementation of new actions by its managers. The study evaluates the possibility of greater use of information recorded in the financial statements of the unit of analysis, within the strategic decisions of the organization. As a research strategy, we adopted the case study. The results infer that it is possible to use the theory in the context of a multidimensional OMPS, promoting useful information for decision-making and thereby contributing to the strengthening of the necessary alignment of its administration with the current desires of the Brazilian society.
Abstract: This Paper proposes a new facial feature extraction approach, Wash-Hadamard Transform (WHT). This approach is based on correlation between local pixels of the face image. Its primary advantage is the simplicity of its computation. The paper compares the proposed approach, WHT, which was traditionally used in data compression with two other known approaches: the Principal Component Analysis (PCA) and the Discrete Cosine Transform (DCT) using the face database of Olivetti Research Laboratory (ORL). In spite of its simple computation, the proposed algorithm (WHT) gave very close results to those obtained by the PCA and DCT. This paper initiates the research into WHT and the family of frequency transforms and examines their suitability for feature extraction in face recognition applications.
Abstract: This study examines the issue of recommendation
sources from the perspectives of gender and consumers- perceived
risk, and validates a model for the antecedents of consumer online
purchases. The method of obtaining quantitative data was that of the
instrument of a survey questionnaire. Data were collected via
questionnaires from 396 undergraduate students aged 18-24, and a
multiple regression analysis was conducted to identify causal
relationships. Empirical findings established the link between
recommendation sources (word-of-mouth, advertising, and
recommendation systems) and the likelihood of making online
purchases and demonstrated the role of gender and perceived risk as
moderators in this context. The results showed that the effects of
word-of-mouth on online purchase intentions were stronger than those
of advertising and recommendation systems. In addition, female
consumers have less experience with online purchases, so they may be
more likely than males to refer to recommendations during the
decision-making process. The findings of the study will help
marketers to address the recommendation factor which influences
consumers- intention to purchase and to improve firm performances to
meet consumer needs.
Abstract: This paper discusses a curriculum approach that will
give emphasis on practical portions of teaching network security
subjects in information and communication technology courses. As
we are well aware, the need to use a practice and application oriented
approach in education is paramount. Research on active learning and
cooperative groups have shown that students grasps more and have
more tendency towards obtaining and realizing soft skills like
leadership, communication and team work as opposed to the more
traditional theory and exam based teaching and learning. While this
teaching and learning paradigm is relatively new in Malaysia, it has
been practiced widely in the West. This paper examines a certain
approach whereby students learning wireless security are divided into
and work in small and manageable groups where there will be 2
teams which consist of black hat and white hat teams. The former
will try to find and expose vulnerabilities in a wireless network while
the latter will try their best to prevent such attacks on their wireless
networks using hardware, software, design and enforcement of
security policy and etc. This paper will try to show that the approach
taken plus the use of relevant and up to date software and hardware
and with suitable environment setting will hopefully expose students
to a more fruitful outcome in terms of understanding of concepts,
theories and their motivation to learn.
Abstract: This study examines whether contrived success on a
task closely related to school subjects would promote students-
self-efficacy. In our previous study, junior high school students who
experienced contrived success on anagram tasks raised their sense of
self-efficacy and kept it high for a year.We tried to replicate that study,
substituting calculation tasks for the anagrams. One hundred eighteen
junior high school students participated in this study, 18 of whom were
surreptitiously given easier tasks than their classmates. Those students
with easier tasks outperformed their peers and thereby raised their
sense of self-efficacy. However, elevated self-efficacy did not persist,
falling to the starting level after only three months.
Abstract: Business rules are widely used within the services
sector. They provide consistency and allow relatively unskilled staff
to process complex transactions correctly. But there are many
examples where the rules themselves have an impact on the costs and
profits of an organisation. Financial services, transport and human
services are areas where the rules themselves can impact the bottom
line in a predictable way. If this is the case, how can we find that set
of rules that maximise profit, performance or customer service, or
any other key performance indicators? The manufacturing, energy
and process industries have embraced mathematical optimisation
techniques to improve efficiency, increase production and so on. This
paper explores several real world (but simplified) problems in the
services sector and shows how business rules can be optimised. It
also examines the similarities and differences between the service
and other sectors, and how optimisation techniques could be used to
deliver similar benefits.
Abstract: This study examines the relationships between foreign
aid, levels of schooling and democracy for Pakistan using the ARDL
cointegration approach. The results of study provide strong evidence
for fairly robust long run as well as short run relationships among
these variables for the period 1973-2008. The results state that
foreign aid and primary school enrollments have negative impact on
democracy index and high school enrollments have positive impact
on democracy index in Pakistan. The study suggests for promotion of
education levels and relies on local resources instead of foreign aid
for a good quality of political institutions in Pakistan.
Abstract: This paper examines the concept of simulation from
a modelling viewpoint. How can one Mealy machine simulate the other one? We create formalism for simulation of Mealy machines.
The injective s–morphism of the machine semigroups induces the simulation of machines [1]. We present the example of s–morphism
such that it is not a homomorphism of semigroups. The story for the
surjective s–morphisms is quite different. These are homomorphisms
of semigroups but there exists the surjective s–morphism such that it does not induce the simulation.
Abstract: This study examines the relevance of disclosure
practices in improving the accountability and transparency of
religious nonprofit organizations (RNPOs). The assessment of
disclosure is based on the annual returns of RNPOs for the financial
year 2010. In order to quantify the information disclosed in the
annual returns, partial disclosure indexes of basic information (BI)
disclosure index, financial information (FI) disclosure index and
governance information (GI) disclosure index have been built which
takes into account the content of information items in the annual
returns. The empirical evidence obtained revealed low disclosure
practices among RNPOs in the sample. The multiple regression
results showed that the organizational attribute of the board size
appeared to be the most significant predictor for both partial index on
the extent of BI disclosure index, and FI disclosure index. On the
other hand, the extent of financial information disclosure is related to
the amount of donation received by RNPOs. On GI disclosure index,
the existence of an external audit appeared to be significant variable.
This study has contributed to the academic literature in providing
empirical evidence of the disclosure practices among RNPOs.
Abstract: This study analyses store layout among the many
factors that underlie supermarket store design, this; in terms of what to
display in a shop and where to place the items. This report examines
newly-opened stores and evaluates their interior shop floor layouts,
which we then attempt to categorize by various styles. We then
consider the interaction between shop floor layout and customer
behavior from the perspective of the supermarket as the seller. At this
point, we focus on the “store magnets"–the main sections within the
shop likely to attract customers into the store.
Abstract: The selective wet-etching of amorphous and
crystalline region of Sb20Se80 thin films was carried out using organic
based solution e.g. amines. We report the development of an in situ
real-time method to study the wet chemical etching process of thin
films. Characterization of the structure and surface of films studied
by X-ray diffraction, SEM and EBSD methods has been done and
potential application suggested.
Abstract: This paper contributes to the field of Environmental
Awareness Training (EAT) evaluation in terms of military activities.
Environmental management of military activities is a growing concern
for defence forces worldwide and the importance of EAT is becoming
widely recognized. As one of Australia-s largest landowners, the
Australian Defence Force (ADF) is extremely mindful of its duty as a
joint environmental manager. It has an integrated Environmental
Management System (EMS) to assist environmental management and
EAT is an essential part of the ADF EMS model. This paper examines
how EAT was conducted during the exercise Talisman Saber in 2009
(TS09) and evaluates its effectiveness, using Shoalwater Bay Training
Area (SWBTA), one of the most significant military training areas and
a significant protected area in Australia, as a case study. A
questionnaire survey conducted showed, overall, that EAT was
effective from the perspective of a sample of participants.
Recommendations are made for the ADF to refine EAT for future
exercises.
Abstract: This paper examines the issues, the dangers and the
saving graces of life in a transparent global community where there is
truly “no place to hide". In recent years, social networks and online
groups have transformed issues of privacy and the ways in which we
perceive and interact with others. The idea of reputation is critical to
this dynamic. The discussion begins with a brief etymological history
of the concept of reputation and moves to an exploration of how and
why online communication changes our basic nature, our various
selves and the Bakhtin idea of the polyphonic nature of truth. The
discussion considers the damaging effects of bullying and gossip,
both of which constitute an assault on reputation and the latter of
which is not limited to the lifetime of the person. It concludes with
guidelines and specific recommendations.
Abstract: In view of current IT integration development of SOA, this paper examines AIS design based on SOA, including information sources collection, accounting business process integration and real-time financial reports. The main objective of this exploratory paper is to facilitate AIS research combing the Web Service, which is often ignored in accounting and computer research. It provides a conceptual framework that clarifies the interdependency between SOA and AIS, and also presents the major SOA functions in different areas of AIS
Abstract: One of the main concerns in the Information Technology field is adoption with new technologies in organizations which may result in increasing the usage paste of these technologies.This study aims to look at the issue of culture-s role in accepting and using new technologies in organizations. The study examines the effect of culture on accepting and intention to use new technology in organizations. Studies show culture is one of the most important barriers in adoption new technologies. The model used for accepting and using new technology is Technology Acceptance Model (TAM), while for culture and dimensions a well-known theory by Hofsted was used. Results of the study show significant effect of culture on intention to use new technologies. All four dimensions of culture were tested to find the strength of relationship with behavioral intention to use new technologies. Findings indicate the important role of culture in the level of intention to use new technologies and different role of each dimension to improve adaptation process. The study suggests that transferring of new technologies efforts are most likely to be successful if the parties are culturally aligned.
Abstract: This paper examines the implementation of RC5 block cipher for digital images along with its detailed security analysis. A complete specification for the method of application of the RC5 block cipher to digital images is given. The security analysis of RC5 block cipher for digital images against entropy attack, bruteforce, statistical, and differential attacks is explored from strict cryptographic viewpoint. Experiments and results verify and prove that RC5 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC5 block cipher algorithm.