Emerging Wireless Standards - WiFi, ZigBee and WiMAX

The world of wireless telecommunications is rapidly evolving. Technologies under research and development promise to deliver more services to more users in less time. This paper presents the emerging technologies helping wireless systems grow from where we are today into our visions of the future. This paper will cover the applications and characteristics of emerging wireless technologies: Wireless Local Area Networks (WiFi-802.11n), Wireless Personal Area Networks (ZigBee) and Wireless Metropolitan Area Networks (WiMAX). The purpose of this paper is to explain the impending 802.11n standard and how it will enable WLANs to support emerging media-rich applications. The paper will also detail how 802.11n compares with existing WLAN standards and offer strategies for users considering higher-bandwidth alternatives. The emerging IEEE 802.15.4 (ZigBee) standard aims to provide low data rate wireless communications with high-precision ranging and localization, by employing UWB technologies for a low-power and low cost solution. WiMAX (Worldwide Interoperability for Microwave Access) is a standard for wireless data transmission covering a range similar to cellular phone towers. With high performance in both distance and throughput, WiMAX technology could be a boon to current Internet providers seeking to become the leader of next generation wireless Internet access. This paper also explores how these emerging technologies differ from one another.

How Herding Bias Could be Derived from Individual Investor Types and Risk Tolerance?

This paper is to clarify the relationship of individual investor types, risk tolerance and herding bias. The questionnaire survey investigation is conducted to collect 389 valid and voluntary individual investors and to examine how the risk tolerance plays as a mediator between four types of personality and herding bias. Based on featuring BB&K model and reviewing the prior literature of psychology, a linear structural model are constructed and further used to evaluate the path of herding formation through the analysis of Structural Equation Modeling (SEM). The results showed that more impetuous investors would be prone to herding bias directly, but rather exhibit higher risk tolerance. However, risk tolerance would fully mediate between the level of confidence (i.e., confident or anxious) and herding bias, but not mediate between the method of action (careful or impetuous) for individual investors.

Comparison of Nutritional and Chemical Parameters of Soymilk and Cow milk

Cow milk, is a product of the mammary gland and soymilk is a beverage made from soybeans; it is the liquid that remains after soybeans are soaked. In this research effort, we compared nutritional parameters of this two kind milk such as total fat, fiber, protein, minerals (Ca, Fe and P), fatty acids, carbohydrate, lactose, water, total solids, ash, pH, acidity and calories content in one cup (245 g). Results showed soymilk contains 4.67 grams of fat, 0.52 of fatty acids, 3.18 of fiber, 6.73 of protein, 4.43 of carbohydrate, 0.00 of lactose, 228.51 of water, 10.40 of total solids and 0.66 of ash, also 9.80 milligrams of Ca, 1.42 of Fe, and 120.05 of P, 79 Kcal of calories, pH=6.74 and acidity was 0.24%. Cow milk contains 8.15 grams of fat, 5.07 of fatty acids, 0.00 of fiber, 8.02 of protein, 11.37 of carbohydrate, ´Çá4.27 of lactose, 214.69 of water, 12.90 of total solids, 1.75 of ash, 290.36 milligrams of Ca, 0.12 of Fe, and 226.92 of P, 150 Kcal of calories, pH=6.90 and acidity was 0.21% . Soy milk is one of plant-based complete proteins and cow milk is a rich source of nutrients as well. Cow milk is containing near twice as much fat as and ten times more fatty acids do soymilk. Cow milk contains greater amounts of mineral (except Fe) it contain more than three hundred times the amount of Ca and nearly twice the amount of P as does soymilk but soymilk contains more Fe (ten time more) than does cow milk. Cow milk and soy milk contain nearly identical amounts of protein and water and fiber is a big plus, dairy has none. Although what we choose to drink is really a mater of personal preference and our health objectives but looking at the comparison, soy looks like healthier choices.

Web Traffic Mining using Neural Networks

With the explosive growth of data available on the Internet, personalization of this information space become a necessity. At present time with the rapid increasing popularity of the WWW, Websites are playing a crucial role to convey knowledge and information to the end users. Discovering hidden and meaningful information about Web users usage patterns is critical to determine effective marketing strategies to optimize the Web server usage for accommodating future growth. The task of mining useful information becomes more challenging when the Web traffic volume is enormous and keeps on growing. In this paper, we propose a intelligent model to discover and analyze useful knowledge from the available Web log data.

How to Connect User Research and not so Forthcoming Technology Scenarios – The Extended Home Environment Case Study

This paper draws a methodological framework adopted within an internal Telecomitalia project aimed to identify, on a user centred base, the potential interest towards a technological scenario aimed to extend on a personal bubble the typical communication and media fruition home environment. The problem is that involving user in the early stage of the development of such disruptive technology scenario asking users opinions on something that users actually do not manage even in a rough manner could lead to wrong or distorted results. For that reason we chose an approach that indirectly aim to understand users hidden needs in order to obtain a meaningful picture of the possible interest for a technological proposition non yet easily understandable.

130 nm CMOS Mixer and VCO for 2.4 GHz Low-power Wireless Personal Area Networks

This paper describes a 2.4 GHz passive switch mixer and a 5/2.5 GHz voltage-controlled negative Gm oscillator (VCO) with an inversion-mode MOS varactor. Both circuits are implemented using a 1P8M 0.13 μm process. The switch mixer has an input referred 1 dB compression point of -3.89 dBm and a conversion gain of -0.96 dB when the local oscillator power is +2.5 dBm. The VCO consumes only 1.75 mW, while drawing 1.45 mA from a 1.2 V supply voltage. In order to reduce the passives size, the VCO natural oscillation frequency is 5 GHz. A clocked CMOS divideby- two circuit is used for frequency division and quadrature phase generation. The VCO has a -109 dBc/Hz phase noise at 1 MHz frequency offset and a 2.35-2.5 GHz tuning range (after the frequency division), thus complying with ZigBee requirements.

The Features of Organizing a Master Preparation in Kazakhstan

In this article has been analyzed Kazakhstani experience in organizing the system after the institute of higher education, legislative-regulative assurance of master preparation, and statistic data in the republic. Have been the features of projecting the master programs, a condition of realization of studying credit system, have been analyzed the technologies of research teaching masters. In conclusion have been given some recommendation on creating personal-oriented environment of research teaching masters.

Visualizing Transit Through a Web Based Geographic Information System

Currently in many major cities, public transit schedules are disseminated through lists of routes, grids of stop times and static maps. This paper describes a web based geographic information system which disseminates the same schedule information through intuitive GIS techniques. Using data from Calgary, Canada, an map based interface has been created to allow users to see routes, stops and moving buses all at once. Zoom and pan controls as well as satellite imagery allows users to apply their personal knowledge about the local geography to achieve faster, and more pertinent transit results. Using asynchronous requests to web services, users are immersed in an application where buses and stops can be added and removed interactively, without the need to wait for responses to HTTP requests.

Secure Secret Recovery by using Weighted Personal Entropy

Authentication plays a vital role in many secure systems. Most of these systems require user to log in with his or her secret password or pass phrase before entering it. This is to ensure all the valuables information is kept confidential guaranteeing also its integrity and availability. However, to achieve this goal, users are required to memorize high entropy passwords or pass phrases. Unfortunately, this sometimes causes difficulty for user to remember meaningless strings of data. This paper presents a new scheme which assigns a weight to each personal question given to the user in revealing the encrypted secrets or password. Concentration of this scheme is to offer fault tolerance to users by allowing them to forget the specific password to a subset of questions and still recover the secret and achieve successful authentication. Comparison on level of security for weight-based and weightless secret recovery scheme is also discussed. The paper concludes with the few areas that requires more investigation in this research.

Personal Knowledge Management among Adult Learners: Behind the Scene of Social Network

The burst of Web 2.0 technology and social networking tools manifest different styles of learning and managing knowledge among both knowledge workers and adult learners. In the Western countries, open-learning concept has been made popular due to the ease of use and the reach that the technology provides. In Malaysia, there are still some gaps between the learners- acceptance of technology and the full implementation of the technology in the education system. There is a need to understand how adult learners, who are knowledge workers, manage their personal knowledge via social networking tools, especially in their learning process. Four processes of personal knowledge management (PKM) and four cognitive enablers are proposed supported by analysed data on adult learners in a university. The model derived from these processes and enablers is tested and presented, with recommendations on features to be included in adult learners- learning environment.

Analysing of Indoor Radio Wave Propagation on Ad-hoc Network by Using TP-LINK Router

This paper presents results of measurements campaign carried out at a carrier frequency of 24GHz with the help of TPLINK router in indoor line-of-sight (LOS) scenarios. Firstly, the radio wave propagation strategies are analyzed in some rooms with router of point to point Ad hoc network. Then floor attenuation is defined for 3 floors in experimental region. The free space model and dual slope models are modified by considering the influence of corridor conditions on each floor. Using these models, indoor signal attenuation can be estimated in modeling of indoor radio wave propagation. These results and modified models can also be used in planning the networks of future personal communications services.

Ideological Tendencies of the Teachers about the Causes of Vandalism in Schools and Solution Proposals

Aggression is a behavior that cannot be approved by the society. Vandalism which is aggression towards objects is an action that tends to damage public or personal property. The behaviors that are described as vandalism can often be observed in the schools as well. According to Zwier and Vaughan (1) previous research about the reasons of and precautionary measures for vandalism in schools can be grouped in three tendency categories: conservative, liberal and radical. In this context, the main aim of this study is to discover which ideological tendency of the reasons of school vandalism is adopted by the teachers and what are their physical, environmental, school system and societal solutions for vandalism. A total of 200 teachers participated in this study, and the mean age was 34.20 years (SD = 6.54). The sample was made up of 109 females and 91 males. For the analysis of the data, SPSS 15.00, frequency, percentage, and t-test were used. The research showed that the teachers have tendencies in the order of conservative, liberal and radical for the reasons of vandalism. The research also showed that the teachers do not have any tendency for eliminating vandalism physically and general solutions on the level of society; on the other hand they mostly adopt a conservative tendency in terms of precautions against vandalism in the school system. Second most, they adopt the liberal tendency in terms of precautions against vandalism in the school system. . It is observed that the findings of this study are comparable to the existing literature on the subject. Future studies should be conducted with multiple variants and bigger sampling.

Bandwidth, Area Efficient and Target Device Independent DDR SDRAM Controller

The application of the synchronous dynamic random access memory (SDRAM) has gone beyond the scope of personal computers for quite a long time. It comes into hand whenever a big amount of low price and still high speed memory is needed. Most of the newly developed stand alone embedded devices in the field of image, video and sound processing take more and more use of it. The big amount of low price memory has its trade off – the speed. In order to take use of the full potential of the memory, an efficient controller is needed. Efficient stands for maximum random accesses to the memory both for reading and writing and less area after implementation. This paper proposes a target device independent DDR SDRAM pipelined controller and provides performance comparison with available solutions.

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

In the last couple of years Bluetooth has gained a large share in the market of home and personal appliances. It is now a well established technology a short range supplement to the wireless world of 802.11. The two main trends of research that have sprung from these developments are directed towards the coexistence and performance issues of Bluetooth and 802.11 as well as the co-existence in the very short range of multiple Bluetooth devices. Our work aims at thoroughly investigating different aspects of co-channel interference and effects of transmission power, distance and 802.11 interference on Bluetooth connections.

Using the Semantic Web in Ubiquitous and Mobile Computing: the Morfeo Experience

With the advent of emerging personal computing paradigms such as ubiquitous and mobile computing, Web contents are becoming accessible from a wide range of mobile devices. Since these devices do not have the same rendering capabilities, Web contents need to be adapted for transparent access from a variety of client agents. Such content adaptation results in better rendering and faster delivery to the client device. Nevertheless, Web content adaptation sets new challenges for semantic markup. This paper presents an advanced components platform, called MorfeoSMC, enabling the development of mobility applications and services according to a channel model based on Services Oriented Architecture (SOA) principles. It then goes on to describe the potential for integration with the Semantic Web through a novel framework of external semantic annotation of mobile Web contents. The role of semantic annotation in this framework is to describe the contents of individual documents themselves, assuring the preservation of the semantics during the process of adapting content rendering, as well as to exploit these semantic annotations in a novel user profile-aware content adaptation process. Semantic Web content adaptation is a way of adding value to and facilitates repurposing of Web contents (enhanced browsing, Web Services location and access, etc).

Technology Enhanced Learning: Fostering Cooperative Learning Through the Integration of Online Communication as Part of Teaching and Learning Experience

This paper discusses ways to foster cooperative learning through the integration of online communication technology. While the education experts believe constructivism produces a more positive learning experience, the educators are still facing problems in getting students to participate due to numerous reasons such as shy personality, language and cultural barriers. This paper will look into the factors that lead to lack of participations among students and how technology can be implemented to overcome these issues.

Employee Motivation Factors That Affect Job Performance of Suan Sunandha Rajabhat University Employee

The purpose of this research is to study motivation factors and also to study factors relation to job performance to compare motivation factors under the personal factor classification such as gender, age, income, educational level, marital status, and working duration; and to study the relationship between Motivation Factors and Job Performance with job satisfactions. The sample groups utilized in this research were 400 Suan Sunandha Rajabhat University employees. This research is a quantitative research using questionnaires as research instrument. The statistics applied for data analysis including percentage, mean, and standard deviation. In addition, the difference analysis was conducted by t value computing, one-way analysis of variance and Pearson’s correlation coefficient computing. The findings of the study results were as follows the findings showed that the aspects of job promotion and salary were at the moderate levels. Additionally, the findings also showed that the motivations that affected the revenue branch chiefs’ job performance were job security, job accomplishment, policy and management, job promotion, and interpersonal relation.

Understanding the Silence: When Courts Don-t Speak About Religion

India recognizes the personal laws of the various religious communities that reside in the country. At the same time all the institutions of the state in India are committed to the value of secularism. This paper has been developed on the basis of a case study that indicates the dynamics of religion in the working of the lower judiciary in India. Majority of the commentary on religion and the judiciary has focused on debates surrounding the existence and application of personal laws. This paper, through a case study in the lower judiciary, makes an attempt to examine whether the interface between religion and the judiciary goes beyond personal laws. The first part of this paper explains the history and application of personal laws in social, political and legal contexts in India. The second part examines the case study located in two courts of first instance, following into the third part which provides an analysis of the empirical evidence. The fourth part focuses on preliminary observations about why there is a hesitancy to speak about religion in relation to the working of the judicial system.

Employees- Perceptions and Expectations toward Corporate Social Responsibility: A Case Study of Private Company Employees in Bangkok Metropolitan Area

This research aimed to study employees- perceptions and expectations toward their organization-s corporate social responsibility (CSR), to study the differences between employees- personal factors and level of perceptions and expectations toward CSR, and to study the relationship between employees- perceptions and expectations toward CSR. Purposive sampling and questionnaire were applied to collect information from 400 private company employees in Bangkok metropolitan area. The results revealed that employees had “high" level of perceptions and expectations toward CSR, of which the highest level were given on the area of “corporate governance and transparency". It was found that there was different level of expectations of employees with different period of employment, position and employment (by listed and non-listed companies). Employees of different age and period of employment also had different level of expectations. Employees- perceptions were correlated with their expectations toward CSR.

Authentic Leadership, Trust and Work Engagement

The issue of leadership has been investigated from several perspectives; however, very less from ethical perspective. With the growing number of corporate scandals and unethical roles played by business leaders in several parts of the world, the need to examine leadership from ethical perspective cannot be over emphasized. The importance of leadership credibility has been discussed in the authentic model of leadership. Authentic leaders display high degree of integrity, have deep sense of purpose, and committed to their core values. As a result they promote a more trusting relationship in their work groups that translates into several positive outcomes. The present study examined how authentic leadership contribute to subordinates- trust in leadership and how this trust, in turn, predicts subordinates- work engagement. A sample of 395 employees was randomly selected from several local banks operating in Malaysia. Standardized tools such as ALQ, OTI, and EEQ were employed. Results indicated that authentic leadership promoted subordinates- trust in leader, and contributed to work engagement. Also, interpersonal trust predicted employees- work engagement as well as mediated the relationship between this style of leadership and employees- work engagement.