Abstract: The world of wireless telecommunications is rapidly evolving. Technologies under research and development promise to deliver more services to more users in less time. This paper presents the emerging technologies helping wireless systems grow from where we are today into our visions of the future. This paper will cover the applications and characteristics of emerging wireless technologies: Wireless Local Area Networks (WiFi-802.11n), Wireless Personal Area Networks (ZigBee) and Wireless Metropolitan Area Networks (WiMAX). The purpose of this paper is to explain the impending 802.11n standard and how it will enable WLANs to support emerging media-rich applications. The paper will also detail how 802.11n compares with existing WLAN standards and offer strategies for users considering higher-bandwidth alternatives. The emerging IEEE 802.15.4 (ZigBee) standard aims to provide low data rate wireless communications with high-precision ranging and localization, by employing UWB technologies for a low-power and low cost solution. WiMAX (Worldwide Interoperability for Microwave Access) is a standard for wireless data transmission covering a range similar to cellular phone towers. With high performance in both distance and throughput, WiMAX technology could be a boon to current Internet providers seeking to become the leader of next generation wireless Internet access. This paper also explores how these emerging technologies differ from one another.
Abstract: This paper is to clarify the relationship of individual investor types, risk tolerance and herding bias. The questionnaire survey investigation is conducted to collect 389 valid and voluntary individual investors and to examine how the risk tolerance plays as a mediator between four types of personality and herding bias. Based on featuring BB&K model and reviewing the prior literature of psychology, a linear structural model are constructed and further used to evaluate the path of herding formation through the analysis of Structural Equation Modeling (SEM). The results showed that more impetuous investors would be prone to herding bias directly, but rather exhibit higher risk tolerance. However, risk tolerance would fully mediate between the level of confidence (i.e., confident or anxious) and herding bias, but not mediate between the method of action (careful or impetuous) for individual investors.
Abstract: Cow milk, is a product of the mammary gland and
soymilk is a beverage made from soybeans; it is the liquid that
remains after soybeans are soaked. In this research effort, we
compared nutritional parameters of this two kind milk such as total
fat, fiber, protein, minerals (Ca, Fe and P), fatty acids, carbohydrate,
lactose, water, total solids, ash, pH, acidity and calories content in
one cup (245 g). Results showed soymilk contains 4.67 grams of fat,
0.52 of fatty acids, 3.18 of fiber, 6.73 of protein, 4.43 of
carbohydrate, 0.00 of lactose, 228.51 of water, 10.40 of total solids
and 0.66 of ash, also 9.80 milligrams of Ca, 1.42 of Fe, and 120.05 of
P, 79 Kcal of calories, pH=6.74 and acidity was 0.24%. Cow milk
contains 8.15 grams of fat, 5.07 of fatty acids, 0.00 of fiber, 8.02 of
protein, 11.37 of carbohydrate, ´Çá4.27 of lactose, 214.69 of water,
12.90 of total solids, 1.75 of ash, 290.36 milligrams of Ca, 0.12 of
Fe, and 226.92 of P, 150 Kcal of calories, pH=6.90 and acidity was
0.21% . Soy milk is one of plant-based complete proteins and cow
milk is a rich source of nutrients as well. Cow milk is containing near
twice as much fat as and ten times more fatty acids do soymilk. Cow
milk contains greater amounts of mineral (except Fe) it contain more
than three hundred times the amount of Ca and nearly twice the
amount of P as does soymilk but soymilk contains more Fe (ten time
more) than does cow milk. Cow milk and soy milk contain nearly
identical amounts of protein and water and fiber is a big plus, dairy
has none. Although what we choose to drink is really a mater of
personal preference and our health objectives but looking at the
comparison, soy looks like healthier choices.
Abstract: With the explosive growth of data available on the
Internet, personalization of this information space become a
necessity. At present time with the rapid increasing popularity of the
WWW, Websites are playing a crucial role to convey knowledge and
information to the end users. Discovering hidden and meaningful
information about Web users usage patterns is critical to determine
effective marketing strategies to optimize the Web server usage for
accommodating future growth. The task of mining useful information
becomes more challenging when the Web traffic volume is enormous
and keeps on growing. In this paper, we propose a intelligent model
to discover and analyze useful knowledge from the available Web
log data.
Abstract: This paper draws a methodological framework adopted within an internal Telecomitalia project aimed to identify, on a user centred base, the potential interest towards a technological scenario aimed to extend on a personal bubble the typical communication and media fruition home environment. The problem is that involving user in the early stage of the development of such disruptive technology scenario asking users opinions on something that users actually do not manage even in a rough manner could lead to wrong or distorted results. For that reason we chose an approach that indirectly aim to understand users hidden needs in order to obtain a meaningful picture of the possible interest for a technological proposition non yet easily understandable.
Abstract: This paper describes a 2.4 GHz passive switch mixer
and a 5/2.5 GHz voltage-controlled negative Gm oscillator (VCO)
with an inversion-mode MOS varactor. Both circuits are implemented
using a 1P8M 0.13 μm process. The switch mixer has an input
referred 1 dB compression point of -3.89 dBm and a conversion
gain of -0.96 dB when the local oscillator power is +2.5 dBm.
The VCO consumes only 1.75 mW, while drawing 1.45 mA from a
1.2 V supply voltage. In order to reduce the passives size, the VCO
natural oscillation frequency is 5 GHz. A clocked CMOS divideby-
two circuit is used for frequency division and quadrature phase
generation. The VCO has a -109 dBc/Hz phase noise at 1 MHz
frequency offset and a 2.35-2.5 GHz tuning range (after the frequency
division), thus complying with ZigBee requirements.
Abstract: In this article has been analyzed Kazakhstani
experience in organizing the system after the institute of higher education, legislative-regulative assurance of master preparation, and
statistic data in the republic. Have been the features of projecting the master programs, a condition of realization of studying credit system, have been analyzed the technologies of research teaching masters. In
conclusion have been given some recommendation on creating personal-oriented environment of research teaching masters.
Abstract: Currently in many major cities, public transit schedules
are disseminated through lists of routes, grids of stop times and
static maps. This paper describes a web based geographic information
system which disseminates the same schedule information through
intuitive GIS techniques. Using data from Calgary, Canada, an map
based interface has been created to allow users to see routes, stops and
moving buses all at once. Zoom and pan controls as well as satellite
imagery allows users to apply their personal knowledge about the
local geography to achieve faster, and more pertinent transit results.
Using asynchronous requests to web services, users are immersed
in an application where buses and stops can be added and removed
interactively, without the need to wait for responses to HTTP requests.
Abstract: Authentication plays a vital role in many secure
systems. Most of these systems require user to log in with his or her
secret password or pass phrase before entering it. This is to ensure all
the valuables information is kept confidential guaranteeing also its
integrity and availability. However, to achieve this goal, users are
required to memorize high entropy passwords or pass phrases.
Unfortunately, this sometimes causes difficulty for user to remember
meaningless strings of data. This paper presents a new scheme which
assigns a weight to each personal question given to the user in
revealing the encrypted secrets or password. Concentration of this
scheme is to offer fault tolerance to users by allowing them to forget
the specific password to a subset of questions and still recover the
secret and achieve successful authentication. Comparison on level of
security for weight-based and weightless secret recovery scheme is
also discussed. The paper concludes with the few areas that requires
more investigation in this research.
Abstract: The burst of Web 2.0 technology and social
networking tools manifest different styles of learning and managing
knowledge among both knowledge workers and adult learners. In the
Western countries, open-learning concept has been made popular due
to the ease of use and the reach that the technology provides. In
Malaysia, there are still some gaps between the learners- acceptance
of technology and the full implementation of the technology in the
education system. There is a need to understand how adult learners,
who are knowledge workers, manage their personal knowledge via
social networking tools, especially in their learning process. Four
processes of personal knowledge management (PKM) and four
cognitive enablers are proposed supported by analysed data on adult
learners in a university. The model derived from these processes and
enablers is tested and presented, with recommendations on features to be included in adult learners- learning environment.
Abstract: This paper presents results of measurements campaign
carried out at a carrier frequency of 24GHz with the help of TPLINK
router in indoor line-of-sight (LOS) scenarios. Firstly, the
radio wave propagation strategies are analyzed in some rooms with
router of point to point Ad hoc network. Then floor attenuation is
defined for 3 floors in experimental region. The free space model and
dual slope models are modified by considering the influence of
corridor conditions on each floor. Using these models, indoor signal
attenuation can be estimated in modeling of indoor radio wave
propagation. These results and modified models can also be used in
planning the networks of future personal communications services.
Abstract: Aggression is a behavior that cannot be approved by
the society. Vandalism which is aggression towards objects is an
action that tends to damage public or personal property. The
behaviors that are described as vandalism can often be observed in
the schools as well. According to Zwier and Vaughan (1)
previous research about the reasons of and precautionary measures
for vandalism in schools can be grouped in three tendency categories:
conservative, liberal and radical. In this context, the main aim of this
study is to discover which ideological tendency of the reasons of
school vandalism is adopted by the teachers and what are their
physical, environmental, school system and societal solutions for
vandalism. A total of 200 teachers participated in this study, and the
mean age was 34.20 years (SD = 6.54). The sample was made up of
109 females and 91 males. For the analysis of the data, SPSS 15.00,
frequency, percentage, and t-test were used. The research showed
that the teachers have tendencies in the order of conservative, liberal
and radical for the reasons of vandalism. The research also showed
that the teachers do not have any tendency for eliminating vandalism
physically and general solutions on the level of society; on the other
hand they mostly adopt a conservative tendency in terms of
precautions against vandalism in the school system. Second most,
they adopt the liberal tendency in terms of precautions against
vandalism in the school system. . It is observed that the findings of
this study are comparable to the existing literature on the subject.
Future studies should be conducted with multiple variants and
bigger sampling.
Abstract: The application of the synchronous dynamic random
access memory (SDRAM) has gone beyond the scope of personal
computers for quite a long time. It comes into hand whenever a big
amount of low price and still high speed memory is needed. Most of
the newly developed stand alone embedded devices in the field of
image, video and sound processing take more and more use of it. The
big amount of low price memory has its trade off – the speed. In
order to take use of the full potential of the memory, an efficient
controller is needed. Efficient stands for maximum random accesses
to the memory both for reading and writing and less area after
implementation. This paper proposes a target device independent
DDR SDRAM pipelined controller and provides performance
comparison with available solutions.
Abstract: In the last couple of years Bluetooth has gained a large share in the market of home and personal appliances. It is now a well established technology a short range supplement to the wireless world of 802.11. The two main trends of research that have sprung from these developments are directed towards the coexistence and performance issues of Bluetooth and 802.11 as well as the co-existence in the very short range of multiple Bluetooth devices. Our work aims at thoroughly investigating different aspects of co-channel interference and effects of transmission power, distance and 802.11 interference on Bluetooth connections.
Abstract: With the advent of emerging personal computing paradigms such as ubiquitous and mobile computing, Web contents are becoming accessible from a wide range of mobile devices. Since these devices do not have the same rendering capabilities, Web contents need to be adapted for transparent access from a variety of client agents. Such content adaptation results in better rendering and faster delivery to the client device. Nevertheless, Web content adaptation sets new challenges for semantic markup. This paper presents an advanced components platform, called MorfeoSMC, enabling the development of mobility applications and services according to a channel model based on Services Oriented Architecture (SOA) principles. It then goes on to describe the potential for integration with the Semantic Web through a novel framework of external semantic annotation of mobile Web contents. The role of semantic annotation in this framework is to describe the contents of individual documents themselves, assuring the preservation of the semantics during the process of adapting content rendering, as well as to exploit these semantic annotations in a novel user profile-aware content adaptation process. Semantic Web content adaptation is a way of adding value to and facilitates repurposing of Web contents (enhanced browsing, Web Services location and access, etc).
Abstract: This paper discusses ways to foster cooperative learning through the integration of online communication technology. While the education experts believe constructivism produces a more positive learning experience, the educators are still facing problems in getting students to participate due to numerous reasons such as shy personality, language and cultural barriers. This paper will look into the factors that lead to lack of participations among students and how technology can be implemented to overcome these issues.
Abstract: The purpose of this research is to study motivation
factors and also to study factors relation to job performance to
compare motivation factors under the personal factor classification
such as gender, age, income, educational level, marital status, and
working duration; and to study the relationship between Motivation
Factors and Job Performance with job satisfactions. The sample
groups utilized in this research were 400 Suan Sunandha Rajabhat
University employees. This research is a quantitative research using
questionnaires as research instrument. The statistics applied for data
analysis including percentage, mean, and standard deviation. In
addition, the difference analysis was conducted by t value computing,
one-way analysis of variance and Pearson’s correlation coefficient
computing. The findings of the study results were as follows the
findings showed that the aspects of job promotion and salary were at
the moderate levels. Additionally, the findings also showed that the
motivations that affected the revenue branch chiefs’ job performance
were job security, job accomplishment, policy and management, job
promotion, and interpersonal relation.
Abstract: India recognizes the personal laws of the various
religious communities that reside in the country. At the same time all
the institutions of the state in India are committed to the value of
secularism. This paper has been developed on the basis of a case
study that indicates the dynamics of religion in the working of the
lower judiciary in India. Majority of the commentary on religion and
the judiciary has focused on debates surrounding the existence and
application of personal laws. This paper, through a case study in the
lower judiciary, makes an attempt to examine whether the interface
between religion and the judiciary goes beyond personal laws.
The first part of this paper explains the history and application of
personal laws in social, political and legal contexts in India. The
second part examines the case study located in two courts of first
instance, following into the third part which provides an analysis of
the empirical evidence. The fourth part focuses on preliminary
observations about why there is a hesitancy to speak about religion in
relation to the working of the judicial system.
Abstract: This research aimed to study employees- perceptions and expectations toward their organization-s corporate social responsibility (CSR), to study the differences between employees- personal factors and level of perceptions and expectations toward CSR, and to study the relationship between employees- perceptions and expectations toward CSR. Purposive sampling and questionnaire were applied to collect information from 400 private company employees in Bangkok metropolitan area. The results revealed that employees had “high" level of perceptions and expectations toward CSR, of which the highest level were given on the area of “corporate governance and transparency". It was found that there was different level of expectations of employees with different period of employment, position and employment (by listed and non-listed companies). Employees of different age and period of employment also had different level of expectations. Employees- perceptions were correlated with their expectations toward CSR.
Abstract: The issue of leadership has been investigated from
several perspectives; however, very less from ethical perspective.
With the growing number of corporate scandals and unethical roles
played by business leaders in several parts of the world, the need to
examine leadership from ethical perspective cannot be over
emphasized. The importance of leadership credibility has been
discussed in the authentic model of leadership. Authentic leaders
display high degree of integrity, have deep sense of purpose, and
committed to their core values. As a result they promote a more
trusting relationship in their work groups that translates into several
positive outcomes. The present study examined how authentic
leadership contribute to subordinates- trust in leadership and how this
trust, in turn, predicts subordinates- work engagement. A sample of
395 employees was randomly selected from several local banks
operating in Malaysia. Standardized tools such as ALQ, OTI, and
EEQ were employed. Results indicated that authentic leadership
promoted subordinates- trust in leader, and contributed to work
engagement. Also, interpersonal trust predicted employees- work
engagement as well as mediated the relationship between this style of
leadership and employees- work engagement.