Abstract: The Expert Witness Testimony in the Battered
Woman Syndrome Expert witness testimony (EWT) is a kind of
information given by an expert specialized in the field (here in BWS)
to the jury in order to help the court better understand the case. EWT
does not always work in favor of the battered women. Two main
decision-making models are discussed in the paper: the Mathematical
model and the Explanation model. In the first model, the jurors
calculate ″the importance and strength of each piece of evidence″
whereas in the second model they try to integrate the EWT with the
evidence and create a coherent story that would describe the crime.
The jury often misunderstands and misjudges battered women for
their action (or in this case inaction). They assume that these women
are masochists and accept being mistreated for if a man abuses a
woman constantly, she should and could divorce him or simply leave
at any time. The research in the domain found that indeed, expert
witness testimony has a powerful influence on juror’s decisions thus
its quality needs to be further explored. One of the important factors
that need further studies is a bias called the dispositionist worldview
(a belief that what happens to people is of their own doing). This
kind of attributional bias represents a tendency to think that a
person’s behavior is due to his or her disposition, even when the
behavior is clearly attributed to the situation. Hypothesis The
hypothesis of this paper is that if a juror has a dispositionist
worldview then he or she will blame the rape victim for triggering the
assault. The juror would therefore commit the fundamental
attribution error and believe that the victim’s disposition caused the
rape and not the situation she was in. Methods The subjects in the
study were 500 randomly sampled undergraduate students from
McGill, Concordia, Université de Montréal and UQAM.
Dispositional Worldview was scored on the Dispositionist
Worldview Questionnaire. After reading the Rape Scenarios, each
student was asked to play the role of a juror and answer a
questionnaire consisting of 7 questions about the responsibility,
causality and fault of the victim. Results The results confirm the
hypothesis which states that if a juror has a dispositionist worldview
then he or she will blame the rape victim for triggering the assault.
By doing so, the juror commits the fundamental attribution error
because he will believe that the victim’s disposition, and not the
constraints or opportunities of the situation, caused the rape scenario.
Abstract: The evolution in project management was triggered by
the changes in management philosophy and practices in order to
maintain competitive advantage and continuous success in the field.
The purpose of this paper is to highlight the practicality of cognitive
style and unlearning approach in influencing the achievement of
project success by project managers. It introduces the concept of
planning, knowing and creating style from cognitive style field in the
light of achieving time, cost, quality and stakeholders appreciation in
project success context. Further it takes up a discussion of the
unlearning approach as a moderator in enhancing the relationship
between cognitive style and project success. The paper bases itself on
literature review from established disciplines like psychology,
sociology and philosophy regarding cognitive style, unlearning and
project success in general. The analysis and synthesis of literature in
the subject area a conceptual paper is utilized as the basis of future
research to form a comprehensive framework for project managers in
enhancing the project management competency.
Abstract: Social learning network analysis has drawn attention
for most researcher on e-learning research domain. This is due to the
fact that it has the capability to identify the behavior of student
during their social interaction inside e-learning. Normally, the social
network analysis (SNA) is treating the students' interaction merely as
node and edge with less meaning. This paper focuses on providing an
ontology structure of e-learning Moodle that can enrich the
relationships among students, as well as between the students and the
teacher. This ontology structure brings great benefit to the future
development of e-learning system.
Abstract: The current study aims at investigating the
relationship between the learners- integrative and instrumental
motivation and English proficiency among Iranian EFL learners. The
participants in this study consisted of 128 undergraduate university
students including 64 males and 64 females, majoring in English as a
foreign language, from Shiraz Azad University. Two research
instruments were used to gather the needed data for this study: 1)
Language Proficiency Test. 2) A scale on motivation which
determines the type of the EFL learners- motivation. Correlatin
coefficient and t-test were used to analyze the collected data and the
main result was found as follows: There is a significant relationship
between the integrative motivation and instrumental motivation with
English proficiency among EFL learners of Shiraz Azad University.
Abstract: This research is intended to develop a raw material allocation model in timber processing industry in Perum Perhutani Unit I, Central Java, Indonesia. The model can be used to determine the quantity of allocation of timber between chain in the supply chain to select supplier considering factors that are log price and the distance. In determining the quantity of allocation of timber between chains in the supply chain, the model considers the optimal inventory in each chain. Whilst the optimal inventory is determined based on demand forecast, the capacity and safety stock. Problem solving allocation is conducted by developing linear programming model that aims to minimize the total cost of the purchase, transportation cost and storage costs at each chain. The results of numerical examples show that the proposed model can generate savings of the purchase cost of 20.84% and select suppliers with mileage closer.
Abstract: This study was carried out to evaluate concentration
of micro minerals (Zn, Fe, Mn, Cu and Se) of forages and their
distribution in fiber fraction (neutral detergent fiber/NDF and acid
detergent fiber/ADF) in South Sumatra during dry and rainy seasons.
Seven species of commonly forages namely Axonopus compressus,
Panicum maximum, Pennisetum purpuphoides, Leucaena
leucocephala, Centrocema pubescens, Calopogonium mucunoides
and Acacia mangium were collected at native pasture during rainy
and dry seasons. The results showed that micro minerals
concentration of forages and their distribution in fiber fraction varied
among species and season. In general, concentration of micro
minerals was slightly higher in rainy season compared to dry season
either in grass or legumes forages. In grass, concentration of Fe and
Mn were above the critical level, while 33.3 %, 100 % and 16.7 % of
evaluated grass were deficient in Zn, Cu and Se. Data on legume
forages show that 75 % of legumes were deficient in Zn and Mn, 62.5
% deficient in Cu and 50 % deficient in Se. There was no species of
legume deficient in Fe. Distribution of micro minerals in NDF and
ADF were also significantly affected by species and season and
depends on the kinds of element measured. Generally, micro minerals
were associated in fiber fractions much higher during dry season
compared to rainy season. Iron (Fe) and selenium (Se) in forages
were the highest elements associated in NDF and ADF, while the
lowest was found in Copper (Cu).
Abstract: Two seperate experiments by barley and alfalfa were
conducted to a 2×8 factorial completely randomised design, with four
replicates. Factors were inoculation (M) with Gomus mosseae or uninoculation
(M0) and seven levels of contaminants (Co, Cd, Pb and
combinations) plus an uncontaminated control treatment (C). Heavy
metals in plant tissues and soil were quantified by Inductively
Coupled Plasma Optical Emission Spectrometer (ICP-OES) (Variant-
Liberty 150AX Turbo). Phytoextraction coefficient of contaminants
calculated by concentration of heavy metals in the shoot (mgkg-1) /
concentration of heavy metals in soil (mgkg-1). In the barley, the
highest rate of phytoextraction coefficient of Pb, Cd and Co was in
M0Pb, M0PbCoCd and MCo, respectively (P
Abstract: This research evaluated and compared the thermodynamic performance of heat pump systems which can be run under two different modes as air to air and air to water by using only one compressor. To achieve this comparison an experimental performance study was made on a traditional vapor compressed heat pump system that can be run air to air mode and air to water mode by help of a valve. The experiments made under different thermal conditions. Thermodynamic performance of the systems are presented and compared with each other for different working conditions.
Abstract: The purposes of this research were 1) to investigate
behavior of media exposure and participation in environmental
activities of King Mongkut-s University of Technology Thonburi
(KMUTT) dormitory students, 2) to compare the correlation between
faculties and participation in environmental activities of KMUTT
dormitory students, and 3) to compare the correlation between media
exposure and participation in environmental activities of KMUTT
dormitory students. The tool used for collecting data was
questionnaire. The research findings revealed that dormitory students
were mostly exposed to the environmental media via public relations
boards for general media and KMUTT dormitory media. Dormitory
students were daily exposed to media via websites on the internet and
weekly for other media. Dormitory students participation in the
environmental activities was at high level (x = 3.65) on an
individual basis and was at medium level (x = 2.76) on a collective
basis. Faculties did not correlate with the participation in
environmental activities of dormitory students at the .01 statistical
level and media exposure via various media correlated with
participation in environmental activities of dormitory students at the
.01 statistical level.
Abstract: MicroRNAs (miRNAs) are a class of non-coding
RNAs that hybridize to mRNAs and induce either translation
repression or mRNA cleavage. Recently, it has been reported that
miRNAs could possibly play an important role in human diseases. By
integrating miRNA target genes, cancer genes, miRNA and mRNA
expression profiles information, a database is developed to link
miRNAs to cancer target genes. The database provides experimentally
verified human miRNA target genes information, including oncogenes
and tumor suppressor genes. In addition, fragile sites information for
miRNAs, and the strength of the correlation of miRNA and its target
mRNA expression level for nine tissue types are computed, which
serve as an indicator for suggesting miRNAs could play a role in
human cancer. The database is freely accessible at
http://ppi.bioinfo.asia.edu.tw/mirna_target/index.html.
Abstract: The purpose of this study was to survey the effect of
organizational communication system on the conflict in physical
education offices of Isfahan province. The research methodology of
this research was a descriptive study. All employees working in
physical education offices of Isfahan province were included in the
sample for this study (N= 236). Researcher made questionnaire and
demographic questionnaire were used as investigation instruments.
Based on the result of chi square test, there is significant difference
between organizational communication system and interpersonal
conflict. The most of participants evaluate communication in an
informal way and pointed out that the communication channels were
not open. Based on the result of binomial test, interpersonal conflict
exists in physical education offices of Isfahan.
Abstract: Previous studies have indicated that one of the most
critical failure reasons of enterprise systems is the lack of knowledge
sharing and utilization across organizations. As a consequence, many
information systems researchers have paid attention to examining the
effect of absorptive capacity closely associated with knowledge
sharing and transferring on IS usage performance. A lack of
communications and interactions due to a lack of organizational
citizenship behavior might lead to weak absorptive capacity and thus
negatively influence knowledge sharing across organizations. In this
study, a theoretical model which delves into the relationship between
usage performance of enterprise systems and its determinants was
established.
Abstract: In the present paper, we-ll explore how social media tools provide an opportunity for new developments of the e-Learning in the context of managing personal knowledge. There will be a discussion how social media tools provide a possibility for helping knowledge workersand students to gather, organize and manage their personal information as a part of the e-learning process. At the centre of this social software driven approach to e-learning environments are the challenges of personalization and collaboration. We-ll share concepts of how organizations are using social media for e-Learning and believe that integration of these tools into traditional e-Learning is probably not a choice, but inevitability. Students- Survey of use of web technologies and social networking tools is presented. Newly developed framework for semantic blogging capable of organizing results relevant to user requirements is implemented at Varna Free University (VFU) to provide more effective navigation and search.
Abstract: Dengue, a disease found in most tropical and
subtropical areas of the world. It has become the most common
arboviral disease of humans. This disease is caused by any of four
serotypes of dengue virus (DEN1-DEN4). In many endemic
countries, the average age of getting dengue infection is shifting
upwards, dengue in pregnancy and infancy are likely to be
encountered more frequently. The dynamics of the disease is studied
by a compartmental model involving ordinary differential equations
for the pregnant, infant human and the vector populations. The
stability of each equilibrium point is given. The epidemic dynamic is
discussed. Moreover, the numerical results are shown for difference
values of dengue antibody.
Abstract: The present research was focused to investigate the
role of investment in the course of economic growth with reference to
Pakistan. The study analyzed the role of the public and private
investment and impact of the political and macroeconomic
uncertainty on economic growth of Pakistan by using the vector
autoregressive approach (VAR). In long-run both public and private
investment showed a positive impact on economic growth but the
growth was largely driven by private investment as compared to
public investment. Government consumption expenditure, economic
uncertainty and political instability hampered the economic growth of
Pakistan. In short-run the private investment positively influences the
growth but there was negative and insignificant effect of the public
investment and government consumption expenditure on the growth.
There was a positive relationship found between economic
uncertainty (proxy for inflation) and GDP in short run.
Abstract: In this paper, some new nonlinear generalized
Gronwall-Bellman-Type integral inequalities with mixed time delays
are established. These inequalities can be used as handy tools
to research stability problems of delayed differential and integral
dynamic systems. As applications, based on these new established
inequalities, some p-stable results of a integro-differential equation
are also given. Two numerical examples are presented to illustrate
the validity of the main results.
Abstract: It is not a secret that, IT management has become
more and more and integrated part of almost all organizations. IT
managers posses an enormous amount of knowledge within both
organizational knowledge and general IT knowledge. This article
investigates how IT managers keep themselves updated on IT
knowledge in general and looks into how much time IT managers
spend on weekly basis searching the net for new or problem solving
IT knowledge. The theory used in this paper is used to investigate the
current role of IT managers and what issues they are facing.
Furthermore a research is conducted where 7 IT managers in medium
sized and large Danish companies are interviewed to add further
focus on the role of the IT manager and to focus on how they keep
themselves updated. Beside finding substantial need for more
research, IT managers – generalists or specialists – only have limited
knowledge resources at hand in updating their own knowledge –
leaving much initiative to vendors.
Abstract: The purpose of this study was to explore the
relationship between knowledge sharing and innovation capability,
by examining the influence of individual, organizational and
technological factors on knowledge sharing. The research is based
on a survey of 103 employees from different organizations in the
United Arab Emirates. The study is based on a model and a
questionnaire that was previously tested by Lin [1]. Thus, the study
aims at examining the validity of that model in UAE context. The
results of the research show varying degrees of correlation between
the different variables, with ICT use having the strongest relationship
with the innovation capabilities of organizations. The study also
revealed little evidence of knowledge collecting and knowledge
sharing among UAE employees.
Abstract: Eye localization is necessary for face recognition and
related application areas. Most of eye localization algorithms reported
so far still need to be improved about precision and computational
time for successful applications. In this paper, we propose an eye
location method based on multi-scale Gabor feature vectors, which is
more robust with respect to initial points. The eye localization based
on Gabor feature vectors first needs to constructs an Eye Model Bunch
for each eye (left or right eye) which consists of n Gabor jets and
average eye coordinates of each eyes obtained from n model face
images, and then tries to localize eyes in an incoming face image by
utilizing the fact that the true eye coordinates is most likely to be very
close to the position where the Gabor jet will have the best Gabor jet
similarity matching with a Gabor jet in the Eye Model Bunch. Similar
ideas have been already proposed in such as EBGM (Elastic Bunch
Graph Matching). However, the method used in EBGM is known to be
not robust with respect to initial values and may need extensive search
range for achieving the required performance, but extensive search
ranges will cause much more computational burden. In this paper, we
propose a multi-scale approach with a little increased computational
burden where one first tries to localize eyes based on Gabor feature
vectors in a coarse face image obtained from down sampling of the
original face image, and then localize eyes based on Gabor feature
vectors in the original resolution face image by using the eye
coordinates localized in the coarse scaled image as initial points.
Several experiments and comparisons with other eye localization
methods reported in the other papers show the efficiency of our
proposed method.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.