Effectiveness of ICT Training Workshop for Tutors of Allama Iqbal Open University, Pakistan

The purpose of the study was to investigate the effectiveness of ICT training workshop of tutors of Allama Iqbal Open University Pakistan. The study was delimited to tutors of Multan region. The total sample comprised of 100 tutors. All the tutors who participated in ICT training workshop in Multan region were taken as sample in the study. A questionnaire having two parts, based on five point rating scale was developed by the researcher. Part one was about the competency level of computer skills while Part two was based on items related to training delivery, structure and content. Part One of questionnaire had five levels of competency about computer skills. The questionnaire was personally administered and collected back by the researcher himself on the last day of workshop. The collected data were analyzed by using descriptive statistics. Through this study it was found that majority of the tutors strongly agreed that training enhanced their computer skills. Majority of the respondents consider themselves to be generally competent in the use of computer. They also agreed that there was appropriate infrastructure and technical support in lab during training workshop. Moreover, it was found that the training imparted the knowledge of pedagogy of using computers for distance education.

Bed Site Selection by Wild Boar (Sus scrofa) in Baghshadi Protected Area, Yazd Province, Iran

Populations of wild boar present in semi-arid of central Iran. We studied features influencing bed site selection by this species in semi-arid central steppe of Iran. Habitat features of the detected bed site were compared with randomly selected by quantifying number of habitat variables in semi- arid area in Iran. The results revealed that the most important influencing factors in bed site selection were vegetation cover, number of Artemisia sieberi, percentage cover and height of Acer cinerascens, percentage cover and height of Amygdalus scoparia. This is the first ecological study of the wild boar in a protected area of the semi desert biome of Iran. Sustainability of wild boar populations in this area dependent to shrubs of Amygdalus scoparia and Acer cinerascens for thermal and camouflage cover.

Traditionally Sustainability Analyses of Hydraulic-Architectural Bridge Construction in Iran

Bridge is an architectural symbol in Iran as Badgir (wind catcher); fire temples and arch are vaults are such. Therefore, from the very old ages, construction of bridges in Iran has mixed with architecture, social customs, alms and charity and holiness. Since long ago, from Mad, Achaemenid, Parthian and Sassanid times which construction of bridges got an inseparable relation with social dependency and architecture, based on those dependency bridges and dams got holy names; as Dokhtar castle and Dokhtar bridges were constructed. This method continued even after Islam and whenever Iranians got free from political fights and the immunity of roads were established the bridge construction did also prospered. In ancient times bridge construction passes through it growing and completion process and in Sassanid time in some way it reached to the peak of art and glory; as after Islam especially during 4th. century (Arab calendar) it put behind a period of glory and in Safavid time it reached to an exceptional glory and magnificence by constructing glorious bridges on Zayandeh Roud River in Isfahan. Having a combined style and changeability into bridge barrier, some of these bridges develop into magnificent constructions. The sustainable structures, mentioned above, are constructed for various reasons as follows: connecting two sides of a river, storing water, controlling floods, using water energy to operate water windmills, making lanes of streams for farms- use, and building recreational places for people, etc. These studies carried in bridges reveals the fact that in construction and designing mentioned above, lots of technological factors have been taken into consideration such as exceeding floods in the rives, hydraulic and hydrology of the rivers and bridges, geology, foundation, structure, construction material, and adopting appropriate executing methods, all of which are being analyzed in this article.

Advanced Geolocation of IP Addresses

Tracing and locating the geographical location of users (Geolocation) is used extensively in todays Internet. Whenever we, e.g., request a page from google we are - unless there was a specific configuration made - automatically forwarded to the page with the relevant language and amongst others, dependent on our location identified, specific commercials are presented. Especially within the area of Network Security, Geolocation has a significant impact. Because of the way the Internet works, attacks can be executed from almost everywhere. Therefore, for an attribution, knowledge of the origination of an attack - and thus Geolocation - is mandatory in order to be able to trace back an attacker. In addition, Geolocation can also be used very successfully to increase the security of a network during operation (i.e. before an intrusion actually has taken place). Similar to greylisting in emails, Geolocation allows to (i) correlate attacks detected with new connections and (ii) as a consequence to classify traffic a priori as more suspicious (thus particularly allowing to inspect this traffic in more detail). Although numerous techniques for Geolocation are existing, each strategy is subject to certain restrictions. Following the ideas of Endo et al., this publication tries to overcome these shortcomings with a combined solution of different methods to allow improved and optimized Geolocation. Thus, we present our architecture for improved Geolocation, by designing a new algorithm, which combines several Geolocation techniques to increase the accuracy.

A Multi-Phase Methodology for Investigating Localisation Policies within the GCC: The Hotel Industry in the KSA and the UAE

Due to a high unemployment rate among local people and a high reliance on expatriate workers, the governments in the Gulf Co-operation Council (GCC) countries have been implementing programmes of localisation (replacing foreign workers with GCC nationals). These programmes have been successful in the public sector but much less so in the private sector. However, there are now insufficient jobs for locals in the public sector and the onus to provide employment has fallen on the private sector. This paper is concerned with a study, which is a work in progress (certain elements are complete but not the whole study), investigating the effective implementation of localisation policies in four- and five-star hotels in the Kingdom of Saudi Arabia (KSA) and the United Arab Emirates (UAE). The purpose of the paper is to identify the research gap, and to present the need for the research. Further, it will explain how this research was conducted. Studies of localisation in the GCC countries are under-represented in scholarly literature. Currently, the hotel sectors in KSA and UAE play an important part in the countries’ economies. However, the total proportion of Saudis working in the hotel sector in KSA is slightly under 8%, and in the UAE, the hotel sector remains highly reliant on expatriates. There is therefore a need for research on strategies to enhance the implementation of the localisation policies in general and in the hotel sector in particular. Further, despite the importance of the hotel sector to their economies, there remains a dearth of research into the implementation of localisation policies in this sector. Indeed, as far as the researchers are aware, there is no study examining localisation in the hotel sector in KSA, and few in the UAE. This represents a considerable research gap. Regarding how the research was carried out, a multiple case study strategy was used. The four- and five-star hotel sector in KSA is one of the cases, while the four- and five-star hotel sector in the UAE is the other case. Four- and five-star hotels in KSA and the UAE were chosen as these countries have the longest established localisation policies of all the GCC states and there are more hotels of these classifications in these countries than in any of the other Gulf countries. A literature review was carried out to underpin the research. The empirical data were gathered in three phases. In order to gain a pre-understanding of the issues pertaining to the research context, Phase I involved eight unstructured interviews with officials from the Saudi Commission for Tourism and Antiquities (three interviewees); the Saudi Human Resources Development Fund (one); the Abu Dhabi Tourism and Culture Authority (three); and the Abu Dhabi Development Fund (one). In Phase II, a questionnaire was administered to 24 managers and 24 employees in four- and five-star hotels in each country to obtain their beliefs, attitudes, opinions, preferences and practices concerning localisation. Unstructured interviews were carried out in Phase III with six managers in each country in order to allow them to express opinions that may not have been explored in sufficient depth in the questionnaire. The interviews in Phases I and III were analysed using thematic analysis and SPSS will be used to analyse the questionnaire data. It is recommended that future research be undertaken on a larger scale, with a larger sample taken from all over KSA and the UAE rather than from only four cities (i.e., Riyadh and Jeddah in KSA and Abu Dhabi and Sharjah in the UAE), as was the case in this research.

FPGA Based Longitudinal and Lateral Controller Implementation for a Small UAV

This paper presents implementation of attitude controller for a small UAV using field programmable gate array (FPGA). Due to the small size constrain a miniature more compact and computationally extensive; autopilot platform is needed for such systems. More over UAV autopilot has to deal with extremely adverse situations in the shortest possible time, while accomplishing its mission. FPGAs in the recent past have rendered themselves as fast, parallel, real time, processing devices in a compact size. This work utilizes this fact and implements different attitude controllers for a small UAV in FPGA, using its parallel processing capabilities. Attitude controller is designed in MATLAB/Simulink environment. The discrete version of this controller is implemented using pipelining followed by retiming, to reduce the critical path and thereby clock period of the controller datapath. Pipelined, retimed, parallel PID controller implementation is done using rapidprototyping and testing efficient development tool of “system generator", which has been developed by Xilinx for FPGA implementation. The improved timing performance enables the controller to react abruptly to any changes made to the attitudes of UAV.

Effect of Gamma Irradiation on the Microhardness of Polymer Blends of Poly (Ethyl Methacrylate)(Pema) and Poly (Ethylene Oxide) (Peo)

The effect of gamma irradiation on micro-hardness of polymer blends of poly (ethyl methacrylate)(PEMA) and poly (ethylene oxide) (PEO) has been investigated to detect the radiation induced crosslinking. The blend system comprises a noncrystallizable polymer, PEMA and a crystallizable polymer, PEO. On irradiation, the overall hardness of the blend specimens for different dose levels infers occurrence of a crosslinking process. The radiation-induced crosslinking was greater for blends having lower concentration of PEO. However, increase in radiation dose causes softening of blend system due to radiation induced scissioning of the chains

The Small Scale Effect on Nonlinear Vibration of Single Layer Graphene Sheets

In the present article, nonlinear vibration analysis of single layer graphene sheets is presented and the effect of small length scale is investigated. Using the Hamilton's principle, the three coupled nonlinear equations of motion are obtained based on the von Karman geometrical model and Eringen theory of nonlocal continuum. The solutions of Free nonlinear vibration, based on a one term mode shape, are found for both simply supported and clamped graphene sheets. A complete analysis of graphene sheets with movable as well as immovable in-plane conditions is also carried out. The results obtained herein are compared with those available in the literature for classical isotropic rectangular plates and excellent agreement is seen. Also, the nonlinear effects are presented as functions of geometric properties and small scale parameter.

Intelligent System for Breast Cancer Prognosis using Multiwavelet Packets and Neural Network

This paper presents an approach for early breast cancer diagnostic by employing combination of artificial neural networks (ANN) and multiwaveletpacket based subband image decomposition. The microcalcifications correspond to high-frequency components of the image spectrum, detection of microcalcifications is achieved by decomposing the mammograms into different frequency subbands,, reconstructing the mammograms from the subbands containing only high frequencies. For this approach we employed different types of multiwaveletpacket. We used the result as an input of neural network for classification. The proposed methodology is tested using the Nijmegen and the Mammographic Image Analysis Society (MIAS) mammographic databases and images collected from local hospitals. Results are presented as the receiver operating characteristic (ROC) performance and are quantified by the area under the ROC curve.

Image Compression Using Multiwavelet and Multi-Stage Vector Quantization

The existing image coding standards generally degrades at low bit-rates because of the underlying block based Discrete Cosine Transform scheme. Over the past decade, the success of wavelets in solving many different problems has contributed to its unprecedented popularity. Due to implementation constraints scalar wavelets do not posses all the properties such as orthogonality, short support, linear phase symmetry, and a high order of approximation through vanishing moments simultaneously, which are very much essential for signal processing. New class of wavelets called 'Multiwavelets' which posses more than one scaling function overcomes this problem. This paper presents a new image coding scheme based on non linear approximation of multiwavelet coefficients along with multistage vector quantization. The performance of the proposed scheme is compared with the results obtained from scalar wavelets.

A New Image Encryption Approach using Combinational Permutation Techniques

This paper proposes a new approach for image encryption using a combination of different permutation techniques. The main idea behind the present work is that an image can be viewed as an arrangement of bits, pixels and blocks. The intelligible information present in an image is due to the correlations among the bits, pixels and blocks in a given arrangement. This perceivable information can be reduced by decreasing the correlation among the bits, pixels and blocks using certain permutation techniques. This paper presents an approach for a random combination of the aforementioned permutations for image encryption. From the results, it is observed that the permutation of bits is effective in significantly reducing the correlation thereby decreasing the perceptual information, whereas the permutation of pixels and blocks are good at producing higher level security compared to bit permutation. A random combination method employing all the three techniques thus is observed to be useful for tactical security applications, where protection is needed only against a casual observer.

A Numerical Model for Studying Convectional Lifting Processes in the Tropics

A simple model for studying convectional lifting processes in the tropics is described in this paper with some tests of the model in dry air. The model consists of the density equation, the wind equation, the vertical velocity equation, and the temperature equation. The model domain is two-dimensional with length 100 km and height 17.5 km. Plan for experiments to investigate the effects of the heating surface, the deep convection approximation and the treatment of velocities at the boundaries are discussed. Equations for the simplified treatment of moisture in the atmosphere in future numerical experiments are also given.

Online Learning: Custom Design to Promote Learning for Multiple Disciplines

Today-s Wi Fi generation utilize the latest technology in their daily lives. Instructors at National University, the second largest non profit private institution of higher learning in California, are incorporating these new tools to modify their Online class formats to better accommodate these new skills in their distance education delivery modes. The University provides accelerated learning in a one-course per month format both Onsite and Online. Since there has been such a significant increase in Online classes over the past three years, and it is expected to grow even more over the over the next five years, Instructors cannot afford to maintain the status quo and not take advantage of these new options. It is at the discretion of the instructors which accessory they use and how comfortable and familiar they are with the technology. This paper explores the effects and summarizes students- comments of some of these new technological options which have been recently provided in order to make students- online learning experience more exciting and meaningful.

Low-MAC FEC Controller for JPEG2000 Image Transmission Over IEEE 802.15.4

In this paper, we propose the low-MAC FEC controller for practical implementation of JPEG2000 image transmission using IEEE 802.15.4. The proposed low-MAC FEC controller has very small HW size and spends little computation to estimate channel state. Because of this advantage, it is acceptable to apply IEEE 802.15.4 which has to operate more than 1 year with battery. For the image transmission, we integrate the low-MAC FEC controller and RCPC coder in sensor node of LR-WPAN. The modified sensor node has increase of 3% hardware size than conventional zigbee sensor node.

New Class of Chaotic Mappings in Symbol Space

Symbolic dynamics studies dynamical systems on the basis of the symbol sequences obtained for a suitable partition of the state space. This approach exploits the property that system dynamics reduce to a shift operation in symbol space. This shift operator is a chaotic mapping. In this article we show that in the symbol space exist other chaotic mappings.

Hotel Design and Energy Consumption

A hotel mainly uses its energy on water heating, space heating, refrigeration, space cooling, cooking, lighting and other building services. A number of 4-5 stars hotels in Auckland city are selected for this study. Comparing with the energy used for others, the energy used for the internal space thermal control (e.g. internal space heating) is more closely related to the hotel building itself. This study not only investigates relationship between annual energy (and winter energy) consumptions and building design data but also relationships between winter extra energy consumption and building design data. This study is to identify the major design factors that significantly impact hotel energy consumption for improving the future hotel design for energy efficient.

Phenomenological and Theoretical Analysis of Relativistic Temperature Transformation and Relativistic Entropy

There are three possible effects of Special Theory of Relativity (STR) on a thermodynamic system. Planck and Einstein looked upon this process as isobaric; on the other hand Ott saw it as an adiabatic process. However plenty of logical reasons show that the process is isotherm. Our phenomenological consideration demonstrates that the temperature is invariant with Lorenz transformation. In that case process is isotherm, so volume and pressure are Lorentz covariant. If the process is isotherm the Boyles law is Lorentz invariant. Also equilibrium constant and Gibbs energy, activation energy, enthalpy entropy and extent of the reaction became Lorentz invariant.

Low Power and Less Area Architecture for Integer Motion Estimation

Full search block matching algorithm is widely used for hardware implementation of motion estimators in video compression algorithms. In this paper we are proposing a new architecture, which consists of a 2D parallel processing unit and a 1D unit both working in parallel. The proposed architecture reduces both data access power and computational power which are the main causes of power consumption in integer motion estimation. It also completes the operations with nearly the same number of clock cycles as compared to a 2D systolic array architecture. In this work sum of absolute difference (SAD)-the most repeated operation in block matching, is calculated in two steps. The first step is to calculate the SAD for alternate rows by a 2D parallel unit. If the SAD calculated by the parallel unit is less than the stored minimum SAD, the SAD of the remaining rows is calculated by the 1D unit. Early termination, which stops avoidable computations has been achieved with the help of alternate rows method proposed in this paper and by finding a low initial SAD value based on motion vector prediction. Data reuse has been applied to the reference blocks in the same search area which significantly reduced the memory access.

Implementation of Security Algorithms for u-Health Monitoring System

Data security in u-Health system can be an important issue because wireless network is vulnerable to hacking. However, it is not easy to implement a proper security algorithm in an embedded u-health monitoring because of hardware constraints such as low performance, power consumption and limited memory size and etc. To secure data that contain personal and biosignal information, we implemented several security algorithms such as Blowfish, data encryption standard (DES), advanced encryption standard (AES) and Rivest Cipher 4 (RC4) for our u-Health monitoring system and the results were successful. Under the same experimental conditions, we compared these algorithms. RC4 had the fastest execution time. Memory usage was the most efficient for DES. However, considering performance and safety capability, however, we concluded that AES was the most appropriate algorithm for a personal u-Health monitoring system.