Abstract: With the introduction of cash-less society policy by
the Central Bank of Nigeria, the concept of e-banking services have
over the years’ experience a significant improvement. Today quite a
number of people are embracing e-banking activities especially
ATM, thereby moving away from the conventional banking system.
This paper presents a review of the underlying Architectural Layout
of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The
paper further investigates and discusses factors affecting the Intra-
Bank and Inter-Bank ATM connectivity in Nigeria. In addition, as
well possible solutions to these factors affecting ATM Connectivity
and Operations are proposed.
Abstract: In 2009, the new HRM policy was implemented in
Qatar for public sector organisations. The purpose of this research is
to examine how Qatar’s 2009 HRM policy was significant in
influencing employee retention in public organisations. The
conducted study utilised quantitative methodology to analyse the data
on employees’ perceptions of such HRM practices as Performance
Management, Rewards and Promotion, Training and Development
associated with the HRM policy in public organisations in
comparison to semi-private organisations. Employees of seven public
and semi-private organisations filled in the questionnaire based on
the 5-point Likert scale to present quantitative results. The data was
analysed with the correlation and multiple regression statistical
analyses. It was found that Performance Management had the
relationship with Employee Retention, and Rewards and Promotion
influenced Job Satisfaction in public organisations. Relationship
between Job Satisfaction and Employee Retention was also observed.
However, no significant differences were observed in the role of
HRM practices in public and semi-private organisations.
Abstract: Prosecution of sexual violence in international
criminal law requires not only an understanding of the mechanisms
employed to prosecute sexual violence but also a critical analysis of
the factors facilitating perpetuation of such crimes in armed conflicts.
The extrapolations laid out in this essay delve into the jurisprudence
of international criminal law pertaining to sexual and gender based
violence followed by the core question of this essay – has the
entrenchment of sexual violence as international crimes in the Rome
Statute been successful to address such violence in armed conflicts?
Abstract: Frozen shrimp industry plays an important role in the
development of production industry of the country. There has been a
continuing development to response the increasing demand; however,
there have been some problems in running the enterprises. The
purposes of this study are to: 1) investigate problems related to basic
factors in operating frozen shrimp industry based on the
entrepreneurs’ points of view. The enterprises involved in this study
were small and medium industry receiving Thai Frozen Foods
Association. 2) Compare the problems of the frozen shrimp industry
according to their sizes of operation in 3 provinces of the central
region Thailand. Population in this study consisted of 148 managers
from 148 frozen shrimp enterprises Thai Frozen Foods Association
which 77 were small size and 71 were medium size. The data were
analyzed to find percentage, arithmetic mean, standard deviation, and
independent sample T-test with the significant hypothesis at .05. The
results revealed that the problems of the frozen shrimp industries of
both size were in high level. The needs for government supporting
were in high level. The comparison of the problems and the basic
factors between the small and medium size enterprises showed no
statistically significant level. The problems that they mentioned
included raw materials, labors, production, marketing, and the need
for academic supporting from the government sector.
Abstract: The Haussmannization plan of Cairo in 1867 formed a
regular network of roundabout spaces, though deteriorated at present.
The method of identifying the spatial structure of roundabout Cairo
for conservation matches the voronoi diagram with the space syntax
through their geometrical property of spatial convexity. In this
initiative, the primary convex hull of first-order voronoi adopts the
integral and control measurements of space syntax on Cairo’s
roundabout generators. The functional essence of royal palaces
optimizes the roundabout structure in terms of spatial measurements
and the symbolic voronoi projection of 'Tahrir Roundabout' over the
Giza Nile and Pyramids. Some roundabouts of major public and
commercial landmarks surround the pole of 'Ezbekia Garden' with a
higher control than integral measurements, which filter the new
spatial structure from the adjacent traditional town. Nevertheless, the
least integral and control measures correspond to the voronoi
contents of pollutant workshops and the plateau of old Cairo Citadel
with the visual compensation of new royal landmarks on top.
Meanwhile, the extended suburbs of infinite voronoi polygons
arrange high control generators of chateaux housing in 'garden city'
environs. The point pattern of roundabouts determines the
geometrical characteristics of voronoi polygons. The measured
lengths of voronoi edges alternate between the zoned short range at
the new poles of Cairo and the distributed structure of longer range.
Nevertheless, the shortest range of generator-vertex geometry
concentrates at 'Ezbekia Garden' where the crossways of vast Cairo
intersect, which maximizes the variety of choice at different spatial
resolutions. However, the symbolic 'Hippodrome' which is the largest
public landmark forms exclusive geometrical measurements, while
structuring a most integrative roundabout to parallel the royal syntax.
Overview of the symbolic convex hull of voronoi with space syntax
interconnects Parisian Cairo with the spatial chronology of scattered
monuments to conceive one universal Cairo structure. Accordingly,
the approached methodology of 'voronoi-syntax' prospects the future
conservation of roundabout Cairo at the inferred city-level concept.
Abstract: The ASEAN Economic Community (AEC) is the goal
of regional economic integration by 2015. In the region, tourism is an
activity that is important, especially as a source of foreign currency, a
source of employment creation and a source of income bringing to the
region. Given the complexity of the issues entailing the concept of
sustainable tourism, this paper tries to assess tourism sustainability
with the ASEAN, based on a number of quantitative indicators for all
the ten economies, Thailand, Myanmar, Laos, Vietnam, Malaysia,
Singapore, Indonesia, Philippines, Cambodia, and Brunei. The
methodological framework will provide a number of benchmarks of
tourism activities in these countries. They include identification of the
dimensions; for example, economic, socio-ecologic, infrastructure
and indicators, method of scaling, chart representation and evaluation
on Asian countries. This specification shows that a similar level of
tourism activity might introduce different implementation in the
tourism activity and might have different consequences for the socioecological
environment and sustainability. The heterogeneity of
developing countries exposed briefly here would be useful to detect
and prepare for coping with the main problems of each country in
their tourism activities, as well as competitiveness and value creation
of tourism for ASEAN economic community, and will compare with
other parts of the world.
Abstract: Ensuring of continuity of business is basic strategy of
every company. Continuity of organization activities includes
comprehensive procedures that help in solving unexpected situations
of natural and anthropogenic character (for example flood, blaze,
economic situations). Planning of continuity operations is a process
that helps identify critical processes and implement plans for the
security and recovery of key processes. The aim of this article is to
demonstrate application of system approach to managing business
continuity called business continuity management systems in military
issues. This article describes the life cycle of business continuity
management which is based on the established cycle PDCA (Plan-
Do-Check-Act). After this is carried out by activities which are
making by University of Defence during activation of forces and
means of the integrated rescue system in case of emergencies -
accidents at a nuclear power plant in Czech Republic. Activities of
various stages of deployment earmarked forces and resources are
managed and evaluated by using MCMS application (Military
Continuity Management System).
Abstract: The myocardium is composed of specialized muscle
which relies mainly on fatty acid and sugar metabolism and it is
widely contribute to the heart functioning. The changes of the cardiac
energy-producing system during heart failure have been proved using
autoradiography techniques. This study focused on evaluating sugar
and fatty acid metabolism in myocardium as cardiac energy getting
system using heart-accumulated radiopharmaceuticals. Two sets of
autoradiographs of heart cross sections of Lewis male rats were
analyzed and the time- accumulation curve obtained with use of the
MATLAB image processing software to evaluate fatty acid and sugar
metabolic functions.
Abstract: Present empirical paper investigates the relationship
between FDI and economic growth by 10 selected industries in 10
Central and Eastern European countries from the period 1995 to
2012. Different estimation approaches were used to explore the
connection between FDI and economic growth, for example OLS,
RE, FE with and without time dummies. Obtained empirical results
leads to some main consequences: First, the Central and East
European countries (CEEC) attracted foreign direct investment,
which raised the productivity of industries they entered in. It should
be concluded that the linkage between FDI and output growth by
industries is positive and significant enough to suggest that foreign
firm’s participation enhanced the productivity of the industries they
occupied. There had been an endogeneity problem in the regression
and fixed effects estimation approach was used which partially
corrected the regression analysis in order to make the results less
biased. Second, it should be stressed that the results show that time
has an important role in making FDI operational for enhancing output
growth by industries via total factor productivity. Third, R&D
positively affected economic growth and at the same time, it should
take some time for research and development to influence economic
growth. Fourth, the general trends masked crucial differences at the
country level: over the last 20 years, the analysis of the tables and
figures at the country level show that the main recipients of FDI of
the 11 Central and Eastern European countries were Hungary, Poland
and the Czech Republic. The main reason was that these countries
had more open door policies for attracting the FDI. Fifth, according
to the graphical analysis, while Hungary had the highest FDI inflow
in this region, it was not reflected in the GDP growth as much as in
other Central and Eastern European countries.
Abstract: In this paper, approach to incoherent signal detection
in multi-element antenna array are researched and modeled. Two
types of useful signals with unknown wavefront were considered:
first one, deterministic (Barker code), and second one, random
(Gaussian distribution). The derivation of the sufficient statistics took
into account the linearity of the antenna array. The performance
characteristics and detecting curves are modeled and compared for
different useful signals parameters and for different number of
elements of the antenna array. Results of researches in case of some
additional conditions can be applied to a digital communications
systems.
Abstract: Privacy is sacred and would normally be expected and preserved by an individual. Online privacy is no longer about the right to be left alone, but also includes the right not to be monitored. However, with the revelations made by United States National Security Agency former employee Edward Snowden that the government is spying on internet communications, individuals’ privacy can no longer be expected. Therefore, this paper is intended to evaluate law related to privacy protection in the digital domain, who should govern it and whether invasion to a person’s privacy is a necessary justification to preserve national security.
Abstract: Password authentication is one of the widely used
methods to achieve authentication for legal users of computers and
defense against attackers. There are many different ways to
authenticate users of a system and there are many password cracking
methods also developed. This paper proposes how best password
cracking can be performed on a CPU-GPGPU based system. The
main objective of this work is to project how quickly a password can
be cracked with some knowledge about the computer security and
password cracking if sufficient security is not incorporated to the
system.
Abstract: We have studied the temporal characteristics of
bistable perception of the stimuli of two types: one involves
alterations in a perceived depth and another one has an ambiguous
content. We used the Necker lattice and lines of shadowed circles
ambiguously perceived either as spheres or holes as stimuli of the
first type. The Winson figure (the Eskimo/Indian picture) was a
stimulus of the second type. We have analyzed how often the
reversals occurred (reversal rate) and for how long each of the two
interpretations, or percepts, was observed during one presentation
(stability durations). For all three ambiguous images the reversal rate
and the stability durations had similar values, which provide another
evidence for a significant role of top-down processes in multistable
perception.
Abstract: Global economy today is full of sophistication. All
over the world, business and marketing practices are undergoing
unprecedented transformation. In realization of this fact, the federal
government of Nigeria has put in place a robust transformation
agenda in order to put Nigeria in a better position to be a competitive
player and in the process transform all sectors of its economy. New
technologies, especially the Internet, are the driving force behind this
transformation. However, technology has inadvertently affected the
way businesses are done thus necessitating the acquisition of new
skills. In developing countries like Nigeria, citizens are still battling
with effective application of those technologies. Obviously, students
of business education need to acquire relevant business knowledge to
be able to transit into the world of work on graduation from school
and compete favorably in the labor market. Therefore, effective
utilization of social media by both teachers and students can help
extensively in empowering students with the needed skills. Social
media which is a group of Internet-based applications built on the
ideological foundations of Web 2.0, that allow the creation and
exchange of user generated content, and if incorporated into the
classroom experience may be the needed answer to unemployment
and poverty in Nigeria as beneficiaries can easily connect with
existing and potential enterprises and customers, engage with them
and reinforce mutual business benefits. Challenges and benefits of
social media use in education in Nigeria universities were revealed in
this study.
Abstract: Education and practical training crisis management
members are a topical issue nowadays. The paper deals with the
perspectives and possibilities of "smart solutions" to education for
crisis management staff. Currently, there is a large number of
simulation tools, which notes that they are suitable for practical
training of crisis management staff. The first part of the paper is focused on the introduction of the
technology simulation tools. The simulators aim is to create a
realistic environment for the practical training of extending units of
crisis staff. The second part of the paper concerns the possibilities of using the
simulation technology to the education process. The aim of this
section is to introduce the practical capabilities and potential of the
simulation programs for practical training of crisis management staff.
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.
Abstract: With the increasing dependence of countries on the
critical infrastructure, it increases their vulnerability. Big threat is
primarily in the human factor (personnel of the critical infrastructure)
and in terrorist attacks. It emphasizes the development of
methodology for searching of weak points and their subsequent
elimination. This article discusses methods for the analysis of safety
in the objects of critical infrastructure. It also contains proposal for
methodology for training employees of security services in the
objects of the critical infrastructure and developing scenarios of
attacks on selected objects of the critical infrastructure.
Abstract: In this paper, we propose the variational EM inference
algorithm for the multi-class Gaussian process classification model
that can be used in the field of human behavior recognition. This
algorithm can drive simultaneously both a posterior distribution of a
latent function and estimators of hyper-parameters in a Gaussian
process classification model with multiclass. Our algorithm is based
on the Laplace approximation (LA) technique and variational EM
framework. This is performed in two steps: called expectation and
maximization steps. First, in the expectation step, using the Bayesian
formula and LA technique, we derive approximately the posterior
distribution of the latent function indicating the possibility that each
observation belongs to a certain class in the Gaussian process
classification model. Second, in the maximization step, using a derived
posterior distribution of latent function, we compute the maximum
likelihood estimator for hyper-parameters of a covariance matrix
necessary to define prior distribution for latent function. These two
steps iteratively repeat until a convergence condition satisfies.
Moreover, we apply the proposed algorithm with human action
classification problem using a public database, namely, the KTH
human action data set. Experimental results reveal that the proposed
algorithm shows good performance on this data set.
Abstract: The present research aimed at studying the awareness
and attitudes of teachers towards inclusive education. The sample
consisted of 60 teachers, teaching in the primary section (1st – 4th) of
regular schools affiliated to the SSC board in Mumbai. Sample was
selected by Multi-stage cluster sampling technique. A semi-structured
self-constructed interview schedule and a self-constructed attitude
scale was used to study the awareness of teachers about disability and
Inclusive education, and their attitudes towards inclusive education
respectively. Themes were extracted from the interview data and
quantitative data was analyzed using SPSS package. Results revealed
that teachers had some amount of awareness but an inadequate
amount of information on disabilities and inclusive education.
Disability to most (37) teachers meant “an inability to do something”.
The difference between disability and handicap was stated by most as
former being cognitive while handicap being physical in nature. With
regard to Inclusive education, a large number (46) stated that they
were unaware of the term and did not know what it meant. Majority
(52) of them perceived maximum challenges for themselves in an
inclusive set up, and emphasized on the role of teacher training
courses in the area of providing knowledge (49) and training in
teaching methodology (53). Although, 83.3% of teachers held a
moderately positive attitude towards inclusive education, a large
percentage (61.6%) of participants felt that being in inclusive set up
would be very challenging for both children with special needs and
without special needs. Though, most (49) of the teachers stated that
children with special needs should be educated in regular classroom
but they further clarified that only those should be in a regular
classroom who have physical impairments of mild or moderate
degree.
Abstract: The research explored the effect of morphemic analysis
awareness on ESL secondary school students’ vocabulary acquisition.
The quasi-experimental study was conducted with 100 ESL
secondary school students in two experimental groups (inflectional
and derivational) and one control group. The students’ vocabulary
acquisition was assessed through two measures: Morph-Analysis Test
and Morph-Vocabulary Test in the pretest and posttest before and
after an intervention programme. Results of ANCOVA revealed that
both the experimental groups achieved a significant score in Morph-
Analysis Test and Vocabulary-Morphemic Test. However, the
inflectional group obtained a fairly higher score than the derivational
group. Thus, the findings of the research are discussed in two main
areas. First, individual instructions of two types of morphemic
awareness have contributed significant results on inflectional and
derivational awareness among the ESL secondary school students.
Nevertheless, derivational morphology achieved a significant but
relatively smaller amount of effect on secondary school students’
morphological awareness compared to inflectional morphology in
this research. Second finding showed that the awareness of
inflectional and derivational morphology was found significantly
related to vocabulary achievement of ESL secondary school students.
Nevertheless, inflectional morphemic awareness had higher
significant effect on ESL secondary school students’ vocabulary
acquisition. Despite these findings, the study implies that morphemic
analysis awareness can serve as an alternative strategy for ESL
secondary school students in acquiring English vocabulary.