Abstract: The transition period of Kosovo society brought
fundamental changes in all the spheres of organizing life. This was
the period when also in the cultural tradition the biggest movement
and an emerging from ‘isolation’ or from the ‘shell’ occurred.
Transformation of the traditional and embracing of the modern began
here. The same was experienced and is currently being experienced
also by Gjakova and its surrounding which is historically renowned
for its great tradition and culture.
The population of this region is actually facing a transition from
the traditional system into the modern one and quite often with huge
leaps.
These ‘movements’ or ‘evolutions’ of the society of this region,
besides the numerous positive things it ‘harvested’, also brought
things that do not at all correspond with their tradition as well as new
criminal occurrences which in the past were not present in this area.
Furthermore, some of the ‘new’ behaviors that are embraced from
other ‘cultures’ and ‘civilizations’, and which are often exceeded, are
quite perturbing. The security situation is also worrying, particularly
following the appearance of some new criminal occurrences.
Therefore, with this research paper we will strive to analyze the
new cultural “intersections” as well as the nature of the origin of
some new very worrying criminal occurrences. We will present there
also some factors inciting into these occurrences, which were
confessed by the persons involved in these criminal occurrences and
who come from this very region.
Abstract: Welfare may be considered to be a subjective
experience; it has a biological function that is related to the fitness
and survival of the animal accordingly, researches have suggested
that welfare is compromised when the animal's evolutionary fitness is
reduced. This study was carried out to explain the effect of some
managerial stressors as handling and restraint on behavioral patterns
and biochemical parameters of rats. A total of 24 (12 males & 12
females) Sprague-Dawley rats (12 months & 150-180g) were allotted
into 3 groups, handled group (4 male & 4 female), restrained group (4
male & 4 female) and control group (4 males & 4 females).
The obtained results revealed that time spent feeding, drinking,
movement and cage exploration frequencies increased significantly in
handled rats than other groups, while lying time and licking increased
significantly in restrained rats than handled and controls. Moreover,
social behavior decreased in both stressed groups than control.
Triglycerides were significantly increased in handled rats than
other groups, while total lipid, total protein and globulin significantly
increased in both treated groups than control. Corticosterone
increased in restrained and handled rats than control ones. Moreover,
there was an increment in packed cell volume significantly in
restrained rats than others. These deducted that if we want to study
the effect of stress on animal welfare it is necessary to study the
effect of such stressors on animal’s behavior and physiological
responses.
Abstract: This paper focuses on the assessment of the air
pollution and morbidity relationship in Tunisia. Air pollution is
measured by ozone air concentration and the morbidity is measured
by the number of respiratory-related restricted activity days during
the 2-week period prior to the interview. Socioeconomic data are also
collected in order to adjust for any confounding covariates. Our
sample is composed by 407 Tunisian respondents; 44.7% are women,
the average age is 35.2, near 69% are living in a house built after
1980, and 27.8% have reported at least one day of respiratory-related
restricted activity. The model consists on the regression of the
number of respiratory-related restricted activity days on the air
quality measure and the socioeconomic covariates. In order to correct
for zero-inflation and heterogeneity, we estimate several models
(Poisson, negative binomial, zero inflated Poisson, Poisson hurdle,
negative binomial hurdle and finite mixture Poisson models).
Bootstrapping and post-stratification techniques are used in order to
correct for any sample bias. According to the Akaike information
criteria, the hurdle negative binomial model has the greatest goodness
of fit. The main result indicates that, after adjusting for
socioeconomic data, the ozone concentration increases the probability
of positive number of restricted activity days.
Abstract: The objective of this research is to design and
construct the PV-Wind hybrid autonomous system for the greenhouse
plantation, and analyze the technical performance of the PV-Wind
energy system. This design depends on the water consumption in the
greenhouse by using 24 of the fogging mist each with the capability
of 24 liter/min. The operating time is 4 times per day, each round for
15 min. The fogging system is being driven by water pump with AC
motor rating 0.5 hp. The load energy consumed is around 1.125
kWh/d. The designing results of the PV-Wind hybrid energy system
is that sufficient energy could be generated by this system. The
results of this study can be applied as a technical data reference for
other areas in the central part of Thailand.
Abstract: Given the dynamic nature of the higher education
landscape, induction programmes for new academics has become the
norm nowadays to support academics negotiate these rough terrain.
This study investigates an induction programme for new academics
in a higher education institution to establish what difference it has
made to participants. The findings revealed that the benefits ranged
from creating safe spaces for collaboration and networking to
fostering reflective practice and contributing to the scholarship of
teaching and learning. The study also revealed that some of the
intentions of the programme may not have been achieved, for
example transformative learning. This led to questioning whether this
intention is an appropriate one given the short duration of the
programme and the long, drawn out process of transformation. It may
be concluded that the academic induction programme in this study
serves to sow the seeds for transformative learning through fostering
critically reflective practice. Recommendations for further study
could include long term impact of the programme on student learning
and success, these being the core business of higher education. It is
also recommended that in addition to an induction programme, the
university invests in a mentoring programme for new staff and extend
the support for academics in order to sustain critical reflection and
which may contribute to transformative educational practice.
Abstract: Photonic Crystal Fibers (PCFs) can be used in optical
communications as transmission lines. For this reason, the PCFs with
low confinement loss, low chromatic dispersion, and low nonlinear
effects are highly suitable transmission media. In this paper, we
introduce a new design of index-guiding nanostructured photonic
crystal fiber (IG-NPCF) with ultra-low chromatic dispersion, low
nonlinearity effects, and low confinement loss. Relatively low
dispersion is achieved in the wavelength range of 1200 to 1600nm
using the proposed design. According to the new structure of
nanostructured PCF presented in this study, the chromatic dispersion
slope is -30(ps/km.nm) and the confinement loss reaches below 10-7
dB/km. While in the wavelength range mentioned above at the same
time an effective area of more than 50.2μm2 is obtained.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: Worldwide, most PILC MV underground cables in use
are approaching the end of their design life; hence, failures are likely
to increase. This paper studies the electric field and potential
distributions within the PILC insulted cable containing common
void-defect. The finite element model of the performance of the
belted PILC MV underground cable is presented. The variation of the
electric field stress within the cable using the Finite Element Method
(FEM) is concentrated. The effects of the void-defect within the
insulation are given. Outcomes will lead to deeper understanding of
the modeling of Paper Insulated Lead Covered (PILC) and electric
field response of belted PILC insulted cable containing void defect.
Abstract: The main aim of a communication system is to
achieve maximum performance. In Cognitive Radio any user or
transceiver has ability to sense best suitable channel, while channel is
not in use. It means an unlicensed user can share the spectrum of a
licensed user without any interference. Though, the spectrum sensing
consumes a large amount of energy and it can reduce by applying
various artificial intelligent methods for determining proper spectrum
holes. It also increases the efficiency of Cognitive Radio Network
(CRN). In this survey paper we discuss the use of different learning
models and implementation of Artificial Neural Network (ANN) to
increase the learning and decision making capacity of CRN without
affecting bandwidth, cost and signal rate.
Abstract: Spam is any unwanted electronic message or material
in any form posted too many people. As the world is growing as
global world, social networking sites play an important role in
making world global providing people from different parts of the
world a platform to meet and express their views. Among different
social networking sites Facebook become the leading one. With
increase in usage different users start abusive use of Facebook by
posting or creating ways to post spam. This paper highlights the
potential spam types nowadays Facebook users’ faces. This paper
also provide the reason how user become victim to spam attack. A
methodology is proposed in the end discusses how to handle different
types of spam.
Abstract: In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Abstract: Given a graph G. A cycle of G is a sequence of
vertices of G such that the first and the last vertices are the same.
A hamiltonian cycle of G is a cycle containing all vertices of G.
The graph G is k-ordered (resp. k-ordered hamiltonian) if for any
sequence of k distinct vertices of G, there exists a cycle (resp.
hamiltonian cycle) in G containing these k vertices in the specified
order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-
ordered. Thus the study of any graph being k-ordered (resp. k-ordered
hamiltonian) always starts with k = 4. Most studies about this topic
work on graphs with no real applications. To our knowledge, the
chordal ring families were the first one utilized as the underlying
topology in interconnection networks and shown to be 4-ordered.
Furthermore, based on our computer experimental results, it was
conjectured that some of them are 4-ordered hamiltonian. In this
paper, we intend to give some possible directions in proving the
conjecture.
Abstract: Locating Radio Controlled (RC) devices using their
unintended emissions has a great interest considering security
concerns. Weak nature of these emissions requires near field
localization approach since it is hard to detect these signals in far
field region of array. Instead of only angle estimation, near field
localization also requires range estimation of the source which makes
this method more complicated than far field models. Challenges of
locating such devices in a near field region and real time environment
are analyzed in this paper. An ESPRIT like near field localization
scheme is utilized for both angle and range estimation. 1-D search
with symmetric subarrays is provided. Two 7 element uniform linear
antenna arrays (ULA) are employed for locating RC source.
Experiment results of location estimation for one unintended emitting
walkie-talkie for different positions are given.
Abstract: Testing the first year students of Informatics at the
University of Debrecen revealed that students start their tertiary
studies in programming with a low level of programming knowledge
and algorithmic skills. The possible reasons which lead the students
to this very unfortunate result were examined. The results of the test
were compared to the students’ results in the school leaving exams
and to their self-assessment values. It was found that there is only a
slight connection between the students’ results in the test and in the
school leaving exams, especially at intermediate level. Beyond this,
the school leaving exams do not seem to enable students to evaluate
their own abilities.
Abstract: In-memory database systems are becoming popular
due to the availability and affordability of sufficiently large RAM and
processors in modern high-end servers with the capacity to manage
large in-memory database transactions. While fast and reliable inmemory
systems are still being developed to overcome cache misses,
CPU/IO bottlenecks and distributed transaction costs, disk-based data
stores still serve as the primary persistence. In addition, with the
recent growth in multi-tenancy cloud applications and associated
security concerns, many organisations consider the trade-offs and
continue to require fast and reliable transaction processing of diskbased
database systems as an available choice. For these
organizations, the only way of increasing throughput is by improving
the performance of disk-based concurrency control. This warrants a
hybrid database system with the ability to selectively apply an
enhanced disk-based data management within the context of inmemory
systems that would help improve overall throughput.
The general view is that in-memory systems substantially
outperform disk-based systems. We question this assumption and
examine how a modified variation of access invariance that we call
enhanced memory access, (EMA) can be used to allow very high
levels of concurrency in the pre-fetching of data in disk-based
systems. We demonstrate how this prefetching in disk-based systems
can yield close to in-memory performance, which paves the way for
improved hybrid database systems. This paper proposes a novel EMA
technique and presents a comparative study between disk-based EMA
systems and in-memory systems running on hardware configurations
of equivalent power in terms of the number of processors and their
speeds. The results of the experiments conducted clearly substantiate
that when used in conjunction with all concurrency control
mechanisms, EMA can increase the throughput of disk-based systems
to levels quite close to those achieved by in-memory system. The
promising results of this work show that enhanced disk-based
systems facilitate in improving hybrid data management within the
broader context of in-memory systems.
Abstract: Proof of controlling crack width is a basic condition
for securing suitable performance in serviceability limit state. The
cracking in concrete can occur at any time from the casting of time to
the years after the concrete has been set in place. Most codes struggle
with offering procedure for crack width calculation. There is lack in
availability of design charts for designers to compute crack width
with ease. The focus of the study is to utilize design charts and
parametric equations in calculating crack width with minimum error.
The paper contains a simplified procedure to calculate crack width
for reinforced concrete (RC) sections subjected to bending with axial
tensile force following the guidelines of Euro code [DS EN-1992-1-1
& DS EN-1992-1-2]. Numerical examples demonstrate the
application of the suggested procedure. Comparison with parallel
analytical tools supports the validity of result and show the
percentage deviation of crack width in both the procedures. The
technique is simple, user friendly and ready to evolve for a greater
spectrum of section sizes and materials.
Abstract: In this study, we propose a novel technique for acoustic
echo suppression (AES) during speech recognition under barge-in
conditions. Conventional AES methods based on spectral subtraction
apply fixed weights to the estimated echo path transfer function
(EPTF) at the current signal segment and to the EPTF estimated until
the previous time interval. However, the effects of echo path changes
should be considered for eliminating the undesired echoes. We
describe a new approach that adaptively updates weight parameters in
response to abrupt changes in the acoustic environment due to
background noises or double-talk. Furthermore, we devised a voice
activity detector and an initial time-delay estimator for barge-in speech
recognition in communication networks. The initial time delay is
estimated using log-spectral distance measure, as well as
cross-correlation coefficients. The experimental results show that the
developed techniques can be successfully applied in barge-in speech
recognition systems.
Abstract: The purpose of this study is to examine the possible
link between employee and customer satisfaction. The service
provided by employees, help to build a good relationship with
customers and can help at increasing their loyalty. Published data for
job satisfaction and indicators of customer services of banks were
gathered from relevant published works which included data from
five different countries. The scores of customers and employees
satisfaction of the different published works were transformed and
normalized to the scale of 1 to 100. The data were analyzed and a
regression analysis of the two parameters was used to describe the
link between employee’s satisfaction and customer’s satisfaction.
Assuming that employee satisfaction has a significant influence on
customer’s service and the resulting customer satisfaction, the
reviewed data indicate that employee’s satisfaction contributes
significantly on the level of customer satisfaction in the Banking
sector. There was a significant correlation between the two
parameters (Pearson correlation R2=0.52 P
Abstract: Wet scrubbers have found widespread use in cleaning
contaminated gas streams because of their ability to remove
particulates and based on the applications of scrubbing of marine
engine exhaust gases by spraying sea-water. In order to examine the
flow characteristics inside the scrubber, the model is designated with
flow properties of hot air and water sprayer. The flow dynamics of
evaporation of hot air by the injection of water droplets is the key
factor considered in this paper. The flow behavior inside the scrubber
was investigated from the previous works and to sum up the
evaporation rate with respect to the concentration of water droplets are
predicted to bring out the competent modelling. The numerical
analysis using CFD facilitates in understanding the problem better and
empathies the behavior of the model over its entire operating envelope.
Abstract: In this paper we describe the Levenvberg-Marquardt
(LM) algorithm for identification and equalization of CDMA
signals received by an antenna array in communication channels.
The synthesis explains the digital separation and equalization of
signals after propagation through multipath generating intersymbol
interference (ISI). Exploiting discrete data transmitted and three
diversities induced at the reception, the problem can be composed
by the Block Component Decomposition (BCD) of a tensor of
order 3 which is a new tensor decomposition generalizing the
PARAFAC decomposition. We optimize the BCD decomposition by
Levenvberg-Marquardt method gives encouraging results compared to
classical alternating least squares algorithm (ALS). In the equalization
part, we use the Minimum Mean Square Error (MMSE) to perform
the presented method. The simulation results using the LM algorithm
are important.