Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: In this content analysis research note the aim was to explore to how sustainability and especially environmental issues are conveyed into environmental items in annual reports and disclosures. As The Global Reporting Initiative (GRI) is a globally wide multistakeholder process, the enterprises using voluntarily GRI framework are considered to be aware of sustainability and environmental concerns. The findings were that although these enterprises included in an environmentally sensitive industry sector and had special capabilities to consider environmental issues there were few GRIreporting enterprises presented substantially detailed environmental items in audited financial statements. There were only slight differences between publishing years 2008 and 2009 - the beginning years of economic turmoil. The environmental issues seemed not to be considered substantial enough for financial reporting as a basis for concerning investment or voting decisions.
Abstract: The present study is concerned with the free
convective two dimensional flow and heat transfer, within the
framework of Boussinesq approximation, in anisotropic fluid filled
porous rectangular enclosure subjected to end-to-end temperature
difference have been investigated using Lattice Boltzmann method
fornon-Darcy flow model. Effects of the moving lid direction (top,
bottom, left, and right wall moving in the negative and positive x&ydirections),
number of moving walls (one or two opposite walls), the
sliding wall velocity, and four different constant temperatures
opposite walls cases (two surfaces are being insulated and the
twoother surfaces areimposed to be at constant hot and cold
temperature)have been conducted. The results obtained are discussed
in terms of the Nusselt number, vectors, contours, and isotherms.
Abstract: The development of information and communication
technology, the increased use of the internet, as well as the effects of
the recession within the last years, have lead to the increased use of
cloud computing based solutions, also called on-demand solutions.
These solutions offer a large number of benefits to organizations as
well as challenges and risks, mainly determined by data visualization
in different geographic locations on the internet. As far as the specific
risks of cloud environment are concerned, data security is still
considered a peak barrier in adopting cloud computing. The present
study offers an approach upon ensuring the security of cloud data,
oriented towards the whole data life cycle. The final part of the study
focuses on the assessment of data security in the cloud, this
representing the bases in determining the potential losses and the
premise for subsequent improvements and continuous learning.
Abstract: The cup method is applied for the measurement of water vapor transport properties of porous materials worldwide. However, in practical applications the experimental results are often used without taking into account some secondary effects which can play an important role under specific conditions. In this paper, the effect of temperature on water vapor transport properties of cellular concrete is studied, together with the influence of sample thickness. At first, the bulk density, matrix density, total open porosity and sorption and desorption isotherms are measured for material characterization purposes. Then, the steady state cup method is used for determination of water vapor transport properties, whereas the measurements are performed at several temperatures and for three different sample thicknesses.
Abstract: Intrusion Detection System is significant in network
security. It detects and identifies intrusion behavior or intrusion
attempts in a computer system by monitoring and analyzing the
network packets in real time. In the recent year, intelligent algorithms
applied in the intrusion detection system (IDS) have been an
increasing concern with the rapid growth of the network security.
IDS data deals with a huge amount of data which contains irrelevant
and redundant features causing slow training and testing process,
higher resource consumption as well as poor detection rate. Since the
amount of audit data that an IDS needs to examine is very large even
for a small network, classification by hand is impossible. Hence, the
primary objective of this review is to review the techniques prior to
classification process suit to IDS data.
Abstract: In this paper, we are concerned with the further study for system of nonlinear equations. Since systems with inaccurate function values or problems with high computational cost arise frequently in science and engineering, recently such systems have attracted researcher-s interest. In this work we present a new method which is independent of function evolutions and has a quadratic convergence. This method can be viewed as a extension of some recent methods for solving mentioned systems of nonlinear equations. Numerical results of applying this method to some test problems show the efficiently and reliability of method.
Abstract: Due to a high unemployment rate among local people
and a high reliance on expatriate workers, the governments in the
Gulf Co-operation Council (GCC) countries have been implementing
programmes of localisation (replacing foreign workers with GCC
nationals). These programmes have been successful in the public
sector but much less so in the private sector. However, there are now
insufficient jobs for locals in the public sector and the onus to provide
employment has fallen on the private sector. This paper is concerned
with a study, which is a work in progress (certain elements are
complete but not the whole study), investigating the effective
implementation of localisation policies in four- and five-star hotels in
the Kingdom of Saudi Arabia (KSA) and the United Arab Emirates
(UAE). The purpose of the paper is to identify the research gap, and
to present the need for the research. Further, it will explain how this
research was conducted.
Studies of localisation in the GCC countries are under-represented
in scholarly literature. Currently, the hotel sectors in KSA and UAE
play an important part in the countries’ economies. However, the
total proportion of Saudis working in the hotel sector in KSA is
slightly under 8%, and in the UAE, the hotel sector remains highly
reliant on expatriates. There is therefore a need for research on
strategies to enhance the implementation of the localisation policies
in general and in the hotel sector in particular.
Further, despite the importance of the hotel sector to their
economies, there remains a dearth of research into the
implementation of localisation policies in this sector. Indeed, as far as
the researchers are aware, there is no study examining localisation in
the hotel sector in KSA, and few in the UAE. This represents a
considerable research gap.
Regarding how the research was carried out, a multiple case study
strategy was used. The four- and five-star hotel sector in KSA is one
of the cases, while the four- and five-star hotel sector in the UAE is
the other case. Four- and five-star hotels in KSA and the UAE were
chosen as these countries have the longest established localisation
policies of all the GCC states and there are more hotels of these
classifications in these countries than in any of the other Gulf
countries. A literature review was carried out to underpin the
research. The empirical data were gathered in three phases. In order
to gain a pre-understanding of the issues pertaining to the research
context, Phase I involved eight unstructured interviews with officials
from the Saudi Commission for Tourism and Antiquities (three
interviewees); the Saudi Human Resources Development Fund (one);
the Abu Dhabi Tourism and Culture Authority (three); and the Abu
Dhabi Development Fund (one).
In Phase II, a questionnaire was administered to 24 managers and
24 employees in four- and five-star hotels in each country to obtain
their beliefs, attitudes, opinions, preferences and practices concerning
localisation.
Unstructured interviews were carried out in Phase III with six
managers in each country in order to allow them to express opinions
that may not have been explored in sufficient depth in the
questionnaire. The interviews in Phases I and III were analysed using
thematic analysis and SPSS will be used to analyse the questionnaire
data.
It is recommended that future research be undertaken on a larger
scale, with a larger sample taken from all over KSA and the UAE
rather than from only four cities (i.e., Riyadh and Jeddah in KSA and
Abu Dhabi and Sharjah in the UAE), as was the case in this research.
Abstract: The success of IT-projects concerning the
implementation of business application Software is strongly
depending upon the application of an efficient requirements
management, to understand the business requirements and to realize
them in the IT. But in fact, the Potentials of the requirements
management are not fully exhausted by small and medium sized
enterprises (SME) of the IT sector. To work out recommendations for
action and furthermore a possible solution, allowing a better exhaust
of potentials, it shall be examined in a scientific research project,
which problems occur out of which causes. In the same place, the
storage of knowledge from the requirements management, and its
later reuse are important, to achieve sustainable improvements of the
competitive of the IT-SMEs. Requirements Engineering is one of the
most important topics in Product Management for Software to
achieve the goal of optimizing the success of the software product.
Abstract: A cart-ball system is a challenging system from the
control engineering point of view. This is due to the nonlinearities,
multivariable, and non-minimum phase behavior present in this
system. This paper is concerned with the problem of modeling and
control of such system. The objective of control strategy is to place
the cart at a desired position while balancing the ball on the top of the
arc-shaped track fixed on the cart. A State-Feedback Controller
(SFC) with a pole-placement method will be designed in order to
control the system. At first, the mathematical model of a cart-ball
system in the state-space form is developed. Then, the linearization of
a model will be established in order to design a SFC. The integral
control strategy will be performed as to control the cart position of a
system. Simulation work is then performed using
MATLAB/SIMULINK software in order to study the performance of
SFC when applied to the system.
Abstract: The article presents test results on the changes
occurring in sewage sludge during the process of its storage. Tests
were conducted on mechanically dehydrated sewage sludge derived
from large municipal sewage treatment plants equipped with
biological sewage treatment systems. In testing presented in the paper
the focus was on the basic fuel properties of sewage sludge: moisture
content, heat of combustion, carbon share. In the first part of the
article the overview of the issues concerning the sewage sludge
management is presented and the genesis of tests is explained.
Further in the paper, selected results of conducted tests are discussed.
Changes in tested parameters were determined in the period of a 10-
month sewage storage.
Abstract: In this report, an OTA which is used in fully
differential pipelined ADC was described. Using gain-boost
architecture with difference-ended amplifier, this OTA achieve
high-gain and high-speed. Besides, the CMFB circuit is also used, and
some methods are concerned to improve the performance. Then, by
optimization the layout design, OTA-s mismatch was reduced. This
design was using TSMC 0.18um CMOS process and simulation both
schematic and layout in Cadence. The result of the simulation shows
that the OTA has a gain up to 80dB,a unity gain bandwidth of about
1.437GHz for a 2pF load, a slew rate is about 428V/μs, a output swing
is 0.2V~1.35V, with the power supply of 1.8V, the power
consumption is 88mW. This amplifier was used in a 10bit 150MHz
pipelined ADC.
Abstract: In the present paper the results of a numerical study are presented, numerical models were developed to simulate the behaviour of vertical massive dikes. The proposed models were developed according to the geometry, boundary conditions, loading conditions and initial conditions of a physical model taken as reference. The results obtained were compared to the experimental data. As far as the overall behaviour, the displacements and the failure mechanisms of the dikes is concerned, the numerical results were in good agreement with the experimental results, which clearly indicates a good quality of numerical modelling. The validated numerical models were used in a parametric study were the displacements and failure mechanisms were fully investigated. Out of the results obtained, some conclusions and recommendations related to the design of massive dikes are proposed.
Abstract: In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Abstract: Our study is concerned with the development of an Emergency Medical Services (EMS) ambulance location and allocation model called the Time-based Ambulance Zoning Optimization Model (TAZ_OPT). This paper presents the framework of the study. The model is formulated using the goal programming (GP), where the goals are to determine the satellite locations of ambulances and the number of ambulances to be allocated at these locations. The model aims at maximizing the expected demand coverage based on probability of reaching the emergency location within targetted time, and minimizing the ambulance busyness likelihood value. Among the benefits of the model is the increased accessibility and availability of ambulances, thus, enhanced quality of the EMS ambulance services.
Abstract: Research in distributed artificial intelligence and multiagent systems consider how a set of distributed entities can interact and coordinate their actions in order to solve a given problem. In this paper an overview of this concept and its evolution is presented particularly its application in the design of intelligent tutoring systems. An intelligent tutor based on the concept of agent and centered specifically on the design of a pedagogue agent is illustrated. Our work has two goals: the first one concerns the architecture aspect and the design of a tutor using multiagent approach. The second one deals particularly with the design of a part of a tutor system: the pedagogue agent.
Abstract: Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.
Abstract: The Norwegian Military Academy (Army) has been
using a tactical simulator for the last two years. During this time
there has been some discussion concerning how to use the simulator
most efficiently and what type of learning one achieves by using the
simulator. The problem that is addressed in this paper is how
simulators can be used as a learning resource for students concerned
with developing their military profession. The aim of this article is to
create a wider consciousness regarding the use of a simulator while
educating officers in a military profession. The article discusses the
use of simulators from two different perspectives. The first
perspective deals with using the simulator as a computer game, and
the second perspective looks at the simulator as a socio-cultural
artefact. Furthermore the article discusses four different ways the
simulator can be looked upon as a useful learning resource when
educating students of a military profession.
Abstract: The tubes in an Ammonia primary reformer furnace
operate close to the limits of materials technology in terms of the
stress induced as a result of very high temperatures, combined with
large differential pressures across the tube wall. Operation at tube
wall temperatures significantly above design can result in a rapid
increase in the number of tube failures, since tube life is very
sensitive to the absolute operating temperature of the tube. Clearly it
is important to measure tube wall temperatures accurately in order to
prevent premature tube failure by overheating.. In the present study,
the catalyst tubes in an Ammonia primary reformer has been modeled
taking into consideration heat, mass and momentum transfer as well
as reformer characteristics.. The investigations concern the effects of
tube characteristics and superficial tube wall temperatures on of the
percentage of heat flux, unconverted methane and production of
Hydrogen for various values of steam to carbon ratios. The results
show the impact of catalyst tubes length and diameters on the
performance of operating parameters in ammonia primary reformers.
Abstract: A two-parameter fatigue model explicitly accounting for the cyclic as well as the mean stress was used to fit static and fatigue data available in literature concerning carbon fiber reinforced composite laminates subjected tension-tension fatigue. The model confirms the strength–life equal rank assumption and predicts reasonably the probability of failure under cyclic loading. The model parameters were found by best fitting procedures and required a minimum of experimental tests.