Abstract: The inability to implement the principles of good
corporate governance (GCG) as demonstrated in the surveys is due to
a number of constraints which can be classified into three; namely internal constraints, external constraints, and constraints coming
from the structure of ownership. The issues in the internal constraints
mentioned are related to the function of several elements of the company. As a business organization, corporation is unable to
achieve its goal to successfully implement GCG principles since it is
not support by its internal elements- functions. Two of several numbers of internal elements of a company are ethical work climate
and leadership style of the top management.
To prove the correlation between internal function of organization
(in this case ethical work climate and transformational leadership)
and the successful implementation of GCG principles, this study
proposes two hypotheses to be empirically tested on thirty surveyed organizations; eleven of which are state-owned companies and
nineteen are private companies. These thirty corporations are listed in
the Jakarta Stock Exchange. All state-owned companies in the
samples are those which have been privatized.
The research showed that internal function of organization give
support to the successful implementation of GCG principle. In this
research we can prove that : (i) ethical work climate has positive
significance of correlation with the successful implementation of
social awareness principle (one of principles on GCG) and, (ii) only
at the state-owned companies, transformational leadership have
positive significance effect to forming the ethical work climate.
Abstract: Lurking behavior is common in information-seeking oriented communities. Transferring users with lurking behavior to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behavior in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behavior. This study offers an approach to understanding the determinants of lurking behavior in online contexts.
Abstract: This paper proposes view-point insensitive human
pose recognition system using neural network. Recognition system
consists of silhouette image capturing module, data driven database,
and neural network. The advantages of our system are first, it is
possible to capture multiple view-point silhouette images of 3D human
model automatically. This automatic capture module is helpful to
reduce time consuming task of database construction. Second, we
develop huge feature database to offer view-point insensitivity at pose
recognition. Third, we use neural network to recognize human pose
from multiple-view because every pose from each model have similar
feature patterns, even though each model has different appearance and
view-point. To construct database, we need to create 3D human model
using 3D manipulate tools. Contour shape is used to convert silhouette
image to feature vector of 12 degree. This extraction task is processed
semi-automatically, which benefits in that capturing images and
converting to silhouette images from the real capturing environment is
needless. We demonstrate the effectiveness of our approach with
experiments on virtual environment.
Abstract: There are many researches to detect collision between real object and virtual object in 3D space. In general, these techniques are need to huge computing power. So, many research and study are constructed by using cloud computing, network computing, and distribute computing. As a reason of these, this paper proposed a novel fast 3D collision detection algorithm between real and virtual object using 2D intersection area. Proposed algorithm uses 4 multiple cameras and coarse-and-fine method to improve accuracy and speed performance of collision detection. In the coarse step, this system examines the intersection area between real and virtual object silhouettes from all camera views. The result of this step is the index of virtual sensors which has a possibility of collision in 3D space. To decide collision accurately, at the fine step, this system examines the collision detection in 3D space by using the visual hull algorithm. Performance of the algorithm is verified by comparing with existing algorithm. We believe proposed algorithm help many other research, study and application fields such as HCI, augmented reality, intelligent space, and so on.
Abstract: Aims of this research were to study Thai Buddhist temple festivals and Balinese Hindu temple festivals, to compare Thai Buddhist temple festival dress with Balinese Hindu temple festival dress, and to create the knowledge which can be useful for Thai attitudes and cultural perceptions, especially for Thai children and youth. The findings of the research disclosed that there are four temple festivals of Thai Buddhists in Thailand, namely Songkran Festival, Buddhist Lent Festival, Sart Thai Festival and End of Buddhist Lent Festival. In island of Bali, Indonesia, there are three Balinese Hindu temple festivals, namely Odalan Festival, Galungan Festival and Nyepi Festival. Thai Songkran Festival is similar to New Year Celebration in Balinese Nyepi Festival. Thai Songkran Festival and Sart Thai Festival have the same purpose as that of Balinese Galungan Festival in practice of dedicating merit to the spirits of deceased relatives. In these temple festivals, Thai Buddhist men will wear round collar outerwear and wide leg trousers or loincloths but will never wear headdresses, while Balinese Hindu men wear turbans or fabric headbands, shirts and Sarong, which are similar to Sarong of Thai Buddhist men in central and northern part of Thailand. Most of Thai Buddhist women wear Sarong like Balinese Hindu women but wear only round collar outerwear, while Balinese Hindu women wear diamond neck camisole as inner wear and shawl collar as outerwear.
Abstract: This study analyzed the creativity of student teams
participating in an exploratory information system development
project (ISDP) and examined antecedents of their creativity. By using
partial least squares (PLS) to analyze a sample of thirty-six teams
enrolled in an information system department project training course
that required three semesters of project-based lessons, the results
found social capitals (structural, relational and cognitive social capital)
positively influence knowledge integration. However, relational social
capital does not significantly influence knowledge integration.
Knowledge integration positively affects team creativity. This study
also demonstrated that social capitals significantly influence team
creativity through knowledge integration. The implications of our
findings for future research are discussed.
Abstract: In this paper we present high performance
dynamically allocated multi-queue (DAMQ) buffer schemes for fault
tolerance systems on chip applications that require an interconnection
network. Two virtual channels shared the same buffer space. Fault
tolerant mechanisms for interconnection networks are becoming a
critical design issue for large massively parallel computers. It is also
important to high performance SoCs as the system complexity keeps
increasing rapidly. On the message switching layer, we make
improvement to boost system performance when there are faults
involved in the components communication. The proposed scheme is
when a node or a physical channel is deemed as faulty, the previous
hop node will terminate the buffer occupancy of messages destined
to the failed link. The buffer usage decisions are made at switching
layer without interactions with higher abstract layer, thus buffer
space will be released to messages destined to other healthy nodes
quickly. Therefore, the buffer space will be efficiently used in case
fault occurs at some nodes.
Abstract: The project describes the modeling of various
architectures mechatronics specifically morphologies of robots in an educational environment. Each structure developed by students of
pre-school, primary and secondary was created using the concept of
reverse engineering in a constructivist environment, to later be integrated in educational software that promotes the teaching of
educational Robotics in a virtual and economic environment.
Abstract: Trust is essential for further and wider acceptance of
contemporary e-services. It was first addressed almost thirty years
ago in Trusted Computer System Evaluation Criteria standard by
the US DoD. But this and other proposed approaches of that
period were actually solving security. Roughly some ten years ago,
methodologies followed that addressed trust phenomenon at its core,
and they were based on Bayesian statistics and its derivatives, while
some approaches were based on game theory. However, trust is a
manifestation of judgment and reasoning processes. It has to be dealt
with in accordance with this fact and adequately supported in cyber
environment. On the basis of the results in the field of psychology
and our own findings, a methodology called qualitative algebra has
been developed, which deals with so far overlooked elements of trust
phenomenon. It complements existing methodologies and provides a
basis for a practical technical solution that supports management of
trust in contemporary computing environments. Such solution is also
presented at the end of this paper.
Abstract: This paper presents the outcomes of a qualitative
study which aims to investigate the pedagogical potentials of serious
games in the preparation of future teachers. The authors discuss the
existing problems and barriers associated with the organization of
teaching practices in Bulgaria as part of the pre-service teacher
training, as well as the attitudes and perceptions of the interviewed
academics, teachers and trainees concerning the integration of serious
games in the teaching practicum. The study outcomes strongly
confirm the positive attitudes of the respondents to the introduction
of virtual learning environments for the development of professional
skills of future teachers as a supplement to the traditional forms of
education. Through the inclusion of serious games it is expected to
improve the quality of practical training of pre-service teachers as
they overcome many of the problems identified in the existing
teaching practices. The outcomes of the study will inform the design
of the educational simulation software which is part of the project
SimAula Tomorrow's Teachers Training.
Abstract: The effect of shearing date on behaviors and performances of 20 pregnant Rahmani ewes was evaluated in four groups (5each). Ewes were shorn at 70, 100 and 130 days of pregnancy in the first three groups respectively, while the fourth group was maintained unshorn as a control. Some behavioral and physiological data related to ewes in addition, blood cortisol level were recorded. Results revealed a significant increase in the frequencies of comfort and eating behaviors, respiratory rate, pulse rate, lamb birth weight and blood cortisol level in early and mid pregnancy shorn ewes. Also, a slight increase in pregnancy period was observed for those ewes. On the other hand, social behaviors, and core temperature were not affected by shearing. These results conclude that prenatal shearing (early and mid-pregnancy) of ewes increases the frequencies of comfort and eating behaviors, and improves the survival rates of lambs by increasing their birth weights.
Abstract: The purpose of this study was to investigate the effect
of combining Real Experimentation (RE) With Virtual
Experimentation (VE) on students- conceptual understanding of
photo electric effect. To achieve this, a pre–post comparison study
design was used that involved 46 undergraduate students. Two
groups were set up for this study. Participants in the control group
used RE to learn photo electric effect, whereas, participants in the
experimental group used RE in the first part of the curriculum and
VE in another part. Achievement test was given to the groups
before and after the application as pre-test and post test. The
independent samples t- test, one way Anova and Tukey HSD test
were used for testing the data obtained from the study.
According to the results of analyzes, the experimental group
was found more successful than the control group.
Abstract: Tacit knowledge has been one of the most discussed
and contradictory concepts in the field of knowledge management
since the mid 1990s. The concept is used relatively vaguely to refer
to any type of information that is difficult to articulate, which has led
to discussions about the original meaning of the concept (adopted
from Polanyi-s philosophy) and the nature of tacit knowing. It is
proposed that the subject should be approached from the perspective
of cognitive science in order to connect tacit knowledge to
empirically studied cognitive phenomena. Some of the most
important examples of tacit knowing presented by Polanyi are
analyzed in order to trace the cognitive mechanisms of tacit knowing
and to promote better understanding of the nature of tacit knowledge.
The cognitive approach to Polanyi-s theory reveals that the
tacit/explicit typology of knowledge often presented in the
knowledge management literature is not only artificial but totally
opposite approach compared to Polanyi-s thinking.
Abstract: Money laundering has been described by many as the lifeblood of crime and is a major threat to the economic and social well-being of societies. It has been recognized that the banking system has long been the central element of money laundering. This is in part due to the complexity and confidentiality of the banking system itself. It is generally accepted that effective anti-money laundering (AML) measures adopted by banks will make it tougher for criminals to get their "dirty money" into the financial system. In fact, for law enforcement agencies, banks are considered to be an important source of valuable information for the detection of money laundering. However, from the banks- perspective, the main reason for their existence is to make as much profits as possible. Hence their cultural and commercial interests are totally distinct from that of the law enforcement authorities. Undoubtedly, AML laws create a major dilemma for banks as they produce a significant shift in the way banks interact with their customers. Furthermore, the implementation of the laws not only creates significant compliance problems for banks, but also has the potential to adversely affect the operations of banks. As such, it is legitimate to ask whether these laws are effective in preventing money launderers from using banks, or whether they simply put an unreasonable burden on banks and their customers. This paper attempts to address these issues and analyze them against the background of the Malaysian AML laws. It must be said that effective coordination between AML regulator and the banking industry is vital to minimize problems faced by the banks and thereby to ensure effective implementation of the laws in combating money laundering.
Abstract: Medical Surgical Nursing is one of the major subjects
in nursing. This study examined the validity and reliability of the
achievement examination utilizing the Classical Test Theory and
Item Response Theory. The study answered the following objectives
specifically : ( a) To establish the validity and reliability of the
achievement examination utilizing Classical Test Theory and Item
Response Theory ; ( b ) To determine the dimensionality measure of
items and ( c ) to compare the item difficulty and item discrimination
of the Medical Surgical Nursing Achievement examination using
Classical Test Theory ( CTT ) and Item Response Theory ( IRT ).
The developed instrument was administered to fourth year nursing
students (N= 136) of a private university in Manila. The findings
yielded the following results: The achievement examination is
reliable both using CTT and IRT. The findings indicate person and
item statistics from two frameworks are quite alike. The achievement
examination formed a unidimensional construct.
Abstract: Most scientific programs have large input and output
data sets that require out-of-core programming or use virtual memory
management (VMM). Out-of-core programming is very error-prone
and tedious; as a result, it is generally avoided. However, in many
instance, VMM is not an effective approach because it often results
in substantial performance reduction. In contrast, compiler driven I/O
management will allow a program-s data sets to be retrieved in parts,
called blocks or tiles. Comanche (COmpiler MANaged caCHE) is a
compiler combined with a user level runtime system that can be used
to replace standard VMM for out-of-core programs. We describe
Comanche and demonstrate on a number of representative problems
that it substantially out-performs VMM. Significantly our system
does not require any special services from the operating system and
does not require modification of the operating system kernel.
Abstract: Proxy signature helps the proxy signer to sign
messages on behalf of the original signer. It is very useful when
the original signer (e.g. the president of a company) is not
available to sign a specific document. If the original signer can
not forge valid proxy signatures through impersonating the proxy
signer, it will be robust in a virtual environment; thus the original
signer can not shift any illegal action initiated by herself to the
proxy signer. In this paper, we propose a new proxy signature
scheme. The new scheme can prevent the original signer from
impersonating the proxy signer to sign messages. The proposed
scheme is based on the regular ElGamal signature. In addition,
the fair privacy of the proxy signer is maintained. That means,
the privacy of the proxy signer is preserved; and the privacy can
be revealed when it is necessary.
Abstract: Panoramic view generation has always offered
novel and distinct challenges in the field of image processing.
Panoramic view generation is nothing but construction of bigger
view mosaic image from set of partial images of the desired view.
The paper presents a solution to one of the problems of image
seascape formation where some of the partial images are color and
others are grayscale. The simplest solution could be to convert all
image parts into grayscale images and fusing them to get grayscale
image panorama. But in the multihued world, obtaining the colored
seascape will always be preferred. This could be achieved by picking
colors from the color parts and squirting them in grayscale parts of
the seascape. So firstly the grayscale image parts should be colored
with help of color image parts and then these parts should be fused to
construct the seascape image.
The problem of coloring grayscale images has no exact solution.
In the proposed technique of panoramic view generation, the job of
transferring color traits from reference color image to grayscale
image is done by palette based method. In this technique, the color
palette is prepared using pixel windows of some degrees taken from
color image parts. Then the grayscale image part is divided into pixel
windows with same degrees. For every window of grayscale image
part the palette is searched and equivalent color values are found,
which could be used to color grayscale window. For palette
preparation we have used RGB color space and Kekre-s LUV color
space. Kekre-s LUV color space gives better quality of coloring. The
searching time through color palette is improved over the exhaustive
search using Kekre-s fast search technique.
After coloring the grayscale image pieces the next job is fusion of
all these pieces to obtain panoramic view. For similarity estimation
between partial images correlation coefficient is used.
Abstract: The paper presents an investigation into the role of virtual reality and web technologies in the field of distance education. Within this frame, special emphasis is given on the building of web-based virtual learning environments so as to successfully fulfill their educational objectives. In particular, basic pedagogical methods are studied, focusing mainly on the efficient preparation, approach and presentation of learning content, and specific designing rules are presented considering the hypermedia, virtual and educational nature of this kind of applications. The paper also aims to highlight the educational benefits arising from the use of virtual reality technology in medicine and study the emerging area of web-based medical simulations. Finally, an innovative virtual reality environment for distance education in medicine is demonstrated. The proposed environment reproduces conditions of the real learning process and enhances learning through a real-time interactive simulator.
Abstract: Networked schools have become a feature of
education systems in countries that seek to provide learning
opportunities in schools located beyond major centres of population.
The internet and e-learning have facilitated the development of
virtual educational structures that complement traditional schools,
encouraging collaborative teaching and learning to proceed. In rural
New Zealand and in the Atlantic Canadian province of
Newfoundland and Labrador, e-learning is able to provide new ways
of organizing teaching, learning and the management of educational
opportunities. However, the future of e-teaching and e-learning in
networked schools depends on the development of professional
education programs that prepare teachers for collaborative teaching
and learning environments in which both virtual and traditional face
to face instruction co-exist.