Abstract: In higher education, a great degree of importance is placed on the internationalisation of the student experience. This is seen as a valuable contributor to elements such as building confidence, broadening knowledge, creating networks, and connections and enhancing employability for current students who will become the next generation of managers in technology and business. The COVID-19 pandemic has affected all areas of people’s lives. The limitations of travel coupled with the fears and concerns generated by the health risks have dramatically reduced the opportunity for students to engage with this agenda. Institutions of higher education have been required to rethink fundamental aspects of their business model from recruitment and enrolment, through learning approaches, assessment methods and the pathway to employment. This paper presents a case study which focuses on student mobility and how the physical experience of being in another country either to study, to work, to volunteer or to gain cultural and social enhancement has of necessity been replaced by alternative approaches. It considers trans-national education as an alternative to physical study overseas, virtual mobility and internships as an alternative to international work experience and adopting collaborative on-line projects as an alternative to in-person encounters. The paper concludes that although these elements have been adopted to address the current situation, the lessons learnt and the feedback gained suggests that they have contributed successfully in new and sometimes unexpected ways, and that they will persist beyond the present to become part of the "new normal" for the future. That being the case, senior leaders of institutions of higher education will be required to revisit their international plans and to rewrite their international strategies to take account of and build upon these changes.
Abstract: Empathy has been an important issue in psychology, education, as well as cognitive neuroscience. Empathy has two major components: cognitive and emotional. Cognitive component refers to the ability to understand others’ perspectives, thoughts, and actions, whereas emotional component refers to understand how others feel. Empathy can be induced, attitude can then be changed, and with enough attitude change, helping behavior can occur. This finding leads us to two questions: is attitude change really necessary for prosocial behavior? And, what roles cognitive and affective empathy play? For the second question, participants with different psychopathic personality (PP) traits are critical because high PP people were found to suffer only affective empathy deficit. Their cognitive empathy shows no significant difference from the control group. 132 college students voluntarily participated in the current three-stage study. Stage 1 was to collect basic information including Interpersonal Reactivity Index (IRI), Psychopathic Personality Inventory-Revised (PPI-R), Attitude Scale, Visual Analogue Scale (VAS), and demographic data. Stage two was for empathy induction with three controversial scenarios, namely domestic violence, depression with a suicide attempt, and an ex-offender. Participants read all three stories and then rewrite the stories by one of two perspectives (empathetic vs. objective). They would then complete the VAS and Attitude Scale one more time for their post-attitude and emotional status. Three IVs were introduced for data analysis: PP (High vs. Low), Responsibility (whether or not the character is responsible for what happened), and Perspective-taking (Empathic vs. Objective). Stage 3 was for the action. Participants were instructed to freely use the 17 tokens they received as donations. They were debriefed and interviewed at the end of the experiment. The major findings were people with higher empathy tend to take more action in helping. Attitude change is not necessary for prosocial behavior. The controversy of the scenarios and how familiar participants are towards target groups play very important roles. Finally, people with high PP tend to show more public prosocial behavior due to their affective empathy deficit. Pre-existing value and belief as well as recent dramatic social events seem to have a big impact and possibly reduce the effect of the independent variables (IV) in our paradigm.
Abstract: Modeling dam-break flows over non-flat beds requires
an accurate representation of the topography which is the main
source of uncertainty in the model. Therefore, developing robust
and accurate techniques for reconstructing topography in this class
of problems would reduce the uncertainty in the flow system. In
many hydraulic applications, experimental techniques have been
widely used to measure the bed topography. In practice, experimental
work in hydraulics may be very demanding in both time and cost.
Meanwhile, computational hydraulics have served as an alternative
for laboratory and field experiments. Unlike the forward problem,
the inverse problem is used to identify the bed parameters from the
given experimental data. In this case, the shallow water equations
used for modeling the hydraulics need to be rearranged in a way
that the model parameters can be evaluated from measured data.
However, this approach is not always possible and it suffers from
stability restrictions. In the present work, we propose an adaptive
optimal control technique to numerically identify the underlying bed
topography from a given set of free-surface observation data. In this
approach, a minimization function is defined to iteratively determine
the model parameters. The proposed technique can be interpreted
as a fractional-stage scheme. In the first stage, the forward problem
is solved to determine the measurable parameters from known data.
In the second stage, the adaptive control Ensemble Kalman Filter is
implemented to combine the optimality of observation data in order to
obtain the accurate estimation of the topography. The main features
of this method are on one hand, the ability to solve for different
complex geometries with no need for any rearrangements in the
original model to rewrite it in an explicit form. On the other hand, its
achievement of strong stability for simulations of flows in different
regimes containing shocks or discontinuities over any geometry.
Numerical results are presented for a dam-break flow problem over
non-flat bed using different solvers for the shallow water equations.
The robustness of the proposed method is investigated using different
numbers of loops, sensitivity parameters, initial samples and location
of observations. The obtained results demonstrate high reliability and
accuracy of the proposed techniques.
Abstract: This paper focuses on how the government-led language policies and the political changes in Taiwan manipulate the languages choice in translations and what translation strategies are employed by the translator to show his or her language ideology behind the power struggles and decision-making. Therefore, framed by Lefevere’s theoretical concept of translating as rewriting, and carried out a diachronic and chronological study, this paper specifically sets out to investigate the language ideology and translator’s idiolect of Chinese language translations of Anglo-American novels. The examples drawn to explore these issues were taken from different versions of Chinese renditions of Mark Twain’s English-language novel The Adventures of Huckleberry Finn in which there are several different dialogues originally written in the colloquial language and dialect used in the American state of Mississippi and reproduced in Mark Twain’s works. Also, adapted corpus methodology, many examples are extracted as instances from the translated texts and source text, to illuminate how the translators in Taiwan deal with the dialectal features encoded in Twain’s works, and how different versions of Chinese translations are employed by Taiwanese translators to confirm the language polices and to express their language identity textually in different periods of the past five decades, from the 1960s onward. The finding of this study suggests that the use of Taiwanese dialect and language patterns in translations does relate to the movement of the mother-tongue language and language ideology of the translator as well as to the issue of language identity raised in the island of Taiwan. Furthermore, this study confirms that the change of political power in Taiwan does bring significantly impact in language policy-- assimilationism, pluralism or multiculturalism, which also makes Taiwan from a monolingual to multilingual society, where the language ideology and identity can be revealed not only in people’s daily communication but also in written translations.
Abstract: A fast finite volume solver for multi-layered shallow
water flows with mass exchange and an erodible bed is developed.
This enables the user to solve a number of complex sediment-based
problems including (but not limited to), dam-break over an erodible
bed, recirculation currents and bed evolution as well as levy and
dyke failure. This research develops methodologies crucial to the
under-standing of multi-sediment fluvial mechanics and waterway
design. In this model mass exchange between the layers is allowed
and, in contrast to previous models, sediment and fluid are able
to transfer between layers. In the current study we use a two-step
finite volume method to avoid the solution of the Riemann problem.
Entrainment and deposition rates are calculated for the first time in
a model of this nature. In the first step the governing equations are
rewritten in a non-conservative form and the intermediate solutions
are calculated using the method of characteristics. In the second stage,
the numerical fluxes are reconstructed in conservative form and are
used to calculate a solution that satisfies the conservation property.
This method is found to be considerably faster than other comparative
finite volume methods, it also exhibits good shock capturing. For most
entrainment and deposition equations a bed level concentration factor
is used. This leads to inaccuracies in both near bed level concentration
and total scour. To account for diffusion, as no vertical velocities
are calculated, a capacity limited diffusion coefficient is used. The
additional advantage of this multilayer approach is that there is a
variation (from single layer models) in bottom layer fluid velocity:
this dramatically reduces erosion, which is often overestimated in
simulations of this nature using single layer flows. The model is
used to simulate a standard dam break. In the dam break simulation,
as expected, the number of fluid layers utilised creates variation in
the resultant bed profile, with more layers offering a higher deviation
in fluid velocity . These results showed a marked variation in erosion
profiles from standard models. The overall the model provides new
insight into the problems presented at minimal computational cost.
Abstract: Active learning strategies have completely rewritten the concept of teaching and learning. Academicians have clocked back to Socratic approaches of questioning. Educators have started implementing active learning strategies for effective learning with the help of tools and technology. As Generation-Y learners are mostly visual, engaging them using visualization techniques play a vital role in their learning process. The facilitator has an important role in intrinsically motivating the learners using different approaches to create self-learning interests. Different visualization techniques were used along with lectures to help students understand and appreciate the concepts. Anonymous feedback was collected from learners. The consolidated report shows that majority of learners accepted the usage of visualization techniques was helpful in understanding concepts as well as create interest in learning the course. This study helps to understand, how the use of visualization techniques help the facilitator to engage learners effectively as well create and intrinsic motivation for their learning.
Abstract: The McEliece cryptosystem is an asymmetric type of
cryptography based on error correction code. The classical McEliece
used irreducible binary Goppa code which considered unbreakable
until now especially with parameter [1024, 524, and 101], but it is
suffering from large public key matrix which leads to be difficult to
be used practically. In this work Irreducible and Separable Goppa
codes have been introduced. The Irreducible and Separable Goppa
codes used are with flexible parameters and dynamic error vectors. A
Comparison between Separable and Irreducible Goppa code in
McEliece Cryptosystem has been done. For encryption stage, to get
better result for comparison, two types of testing have been chosen;
in the first one the random message is constant while the parameters
of Goppa code have been changed. But for the second test, the
parameters of Goppa code are constant (m=8 and t=10) while the
random message have been changed. The results show that the time
needed to calculate parity check matrix in separable are higher than
the one for irreducible McEliece cryptosystem, which is considered
expected results due to calculate extra parity check matrix in
decryption process for g2(z) in separable type, and the time needed to
execute error locator in decryption stage in separable type is better
than the time needed to calculate it in irreducible type. The proposed
implementation has been done by Visual studio C#.
Abstract: Graphene was dispersed using a tip sonicator and the
effect of surfactants were analysed. Sodium Dodecyl Sulphate (SDS)
and Polyvinyl Alcohol (PVA) were compared to observe whether or
not they had any effect on any de-wrinkling, and secondly whether
they aided to achieve better dispersions. There is a huge demand for
wrinkle free graphene as this will greatly increase its usefulness in
various engineering applications. A comprehensive literature on dewrinkling
graphene has been discussed. Low magnification Scanning
Electronic Microscopy (SEM) was conducted to assess the quality of
graphene de-wrinkling. The utilization of the PVA has significant
effect on de-wrinkling whereas SDS had minimal effect on the dewrinkling
of graphene.
Abstract: Nowadays, several research studies point up that an
active lifestyle is essential for physical and mental health benefits.
Mobile phones have greatly influenced people’s habits and attitudes
also in the way they exercise. Our research work is mainly focused on
investigating how to exploit mobile technologies to favour people’s
exertion experience. To this end, we developed an exertion framework
users can exploit through a real world mobile application, called
EverywhereSport Run (EWRun), designed to act as a virtual personal
trainer to support runners during their trainings. In this work, inspired
by both previous findings in the field of interaction design for people
with visual impairments, feedback gathered from real users of our
framework, and positive results obtained from two experimentations,
we present some new interaction facilities we designed to enhance
the interaction experience during a training. The positive obtained
results helped us to derive some interaction design recommendations
we believe will be a valid support for designers of future mobile
systems conceived to be used in circumstances where there are limited
possibilities of interaction.
Abstract: In this study, out-of-plane free vibrations of a circular
rods is investigated theoretically. The governing equations for
naturally twisted and curved spatial rods are obtained using
Timoshenko beam theory and rewritten for circular rods. Effects of
the axial and shear deformations are considered in the formulations.
Ordinary differential equations in scalar form are solved analytically
by using transfer matrix method. The circular rods of the mass matrix
are obtained by using straight rod of consistent mass matrix. Free
vibrations frequencies obtained by solving eigenvalue problem. A
computer program coded in MATHEMATICA language is prepared.
Circular beams are analyzed through various examples for free
vibrations analysis. Results are compared with ANSYS results based
on finite element method and available in the literature.
Abstract: This paper discusses E-government, in particular the challenges that face its development and widespread adoption in Saudi Arabia. E-government can be defined based on an existing set of requirements. E-government has been implemented for a considerable time in developed countries. However, E-government services still face many challenges in their implementation and general adoption in Saudi Arabia. In addition, the literature review and the discussion identify the influential factors, such as quality of service, diffusion of innovation, computer and information literacy, culture, lack of awareness, technical infrastructure, website design, and security, that affect the citizens’ intention to adopt E-government services in Saudi Arabia. Consequently, these factors have been integrated in a new model that would influence citizen to adopt E- government services. Therefore, this research presents an integrated model for ascertaining the intention to adopt E-government services and thereby aiding governments in accessing what is required to increase adoption.
Abstract: A property is persistent if for any many-sorted term rewriting system , has the property if and only if term rewriting system , which results from by omitting its sort information, has the property. Zantema showed that termination is persistent for term rewriting systems without collapsing or duplicating rules. In this paper, we show that the Zantema's result can be extended to term rewriting systems on ordered sorts, i.e., termination is persistent for term rewriting systems on ordered sorts without collapsing, decreasing or duplicating rules. Furthermore we give the example as application of this result. Also we obtain that completeness is persistent for this class of term rewriting systems.
Abstract: One major difficulty that faces developers of
concurrent and distributed software is analysis for concurrency based
faults like deadlocks. Petri nets are used extensively in the
verification of correctness of concurrent programs. ECATNets [2] are
a category of algebraic Petri nets based on a sound combination of
algebraic abstract types and high-level Petri nets. ECATNets have
'sound' and 'complete' semantics because of their integration in
rewriting logic [12] and its programming language Maude [13].
Rewriting logic is considered as one of very powerful logics in terms
of description, verification and programming of concurrent systems.
We proposed in [4] a method for translating Ada-95 tasking
programs to ECATNets formalism (Ada-ECATNet). In this paper,
we show that ECATNets formalism provides a more compact
translation for Ada programs compared to the other approaches based
on simple Petri nets or Colored Petri nets (CPNs). Such translation
doesn-t reduce only the size of program, but reduces also the number
of program states. We show also, how this compact Ada-ECATNet
may be reduced again by applying reduction rules on it. This double
reduction of Ada-ECATNet permits a considerable minimization of
the memory space and run time of corresponding Maude program.
Abstract: A property is called persistent if for any many-sorted term rewriting system , has the property if and only if term rewriting system , which results from by omitting its sort information, has the property. In this paper,we show that termination is persistent for non-overlapping term rewriting systems and we give the example as application of this result. Furthermore we obtain that completeness is persistent for non-overlapping term rewriting systems.
Abstract: Nowadays, computer worms, viruses and Trojan horse
become popular, and they are collectively called malware. Those
malware just spoiled computers by deleting or rewriting important
files a decade ago. However, recent malware seems to be born to earn
money. Some of malware work for collecting personal information so
that malicious people can find secret information such as password for
online banking, evidence for a scandal or contact address which relates
with the target. Moreover, relation between money and malware
becomes more complex. Many kinds of malware bear bots to get
springboards. Meanwhile, for ordinary internet users,
countermeasures against malware come up against a blank wall.
Pattern matching becomes too much waste of computer resources,
since matching tools have to deal with a lot of patterns derived from
subspecies. Virus making tools can automatically bear subspecies of
malware. Moreover, metamorphic and polymorphic malware are no
longer special. Recently there appears malware checking sites that
check contents in place of users' PC. However, there appears a new
type of malicious sites that avoids check by malware checking sites. In
this paper, existing protocols and methods related with the web are
reconsidered in terms of protection from current attacks, and new
protocol and method are indicated for the purpose of security of the
web.
Abstract: The building of a factory can be a strategic investment
owing to its long service life. An evaluation that only focuses, for
example, on payments for the building, the technical equipment of
the factory, and the personnel for the enterprise is – considering the
complexity of the system factory – not sufficient for this long-term
view. The success of an investment is secured, among other things,
by the attainment of nonmonetary goals, too, like transformability.
Such aspects are not considered in traditional investment calculations
like the net present value method. This paper closes this gap with the
enhanced economic evaluation (EWR) for factory planning. The
procedure and the first results of an application in a project are
presented.
Abstract: Graph rewriting-based visual model processing is a
widely used technique for model transformation. Visual model
transformations often need to follow an algorithm that requires a
strict control over the execution sequence of the transformation steps.
Therefore, in Visual Model Processors (VMPs) the execution order
of the transformation steps is crucial. This paper presents the visual
control flow support of Visual Modeling and Transformation System
(VMTS), which facilitates composing complex model
transformations of simple transformation steps and executing them.
The VMTS Visual Control Flow Language (VCFL) uses stereotyped
activity diagrams to specify control flow structures and OCL
constraints to choose between different control flow branches. This
paper introduces VCFL, discusses its termination properties and
provides an algorithm to support the termination analysis of VCFL
transformations.
Abstract: To analyze the behavior of Petri nets, the accessibility
graph and Model Checking are widely used. However, if the
analyzed Petri net is unbounded then the accessibility graph becomes
infinite and Model Checking can not be used even for small Petri
nets. ECATNets [2] are a category of algebraic Petri nets. The main
feature of ECATNets is their sound and complete semantics based on
rewriting logic [8] and its language Maude [9]. ECATNets analysis
may be done by using techniques of accessibility analysis and Model
Checking defined in Maude. But, these two techniques supported by
Maude do not work also with infinite-states systems. As a category
of Petri nets, ECATNets can be unbounded and so infinite systems.
In order to know if we can apply accessibility analysis and Model
Checking of Maude to an ECATNet, we propose in this paper an
algorithm allowing the detection if the ECATNet is bounded or not.
Moreover, we propose a rewriting logic based tool implementing this
algorithm. We show that the development of this tool using the
Maude system is facilitated thanks to the reflectivity of the rewriting
logic. Indeed, the self-interpretation of this logic allows us both the
modelling of an ECATNet and acting on it.
Abstract: Colored Petri Nets (CPN) are very known kind of
high level Petri nets. With sound and complete semantics, rewriting
logic is one of very powerful logics in description and verification of
non-deterministic concurrent systems. Recently, CPN semantics are
defined in terms of rewriting logic, allowing us to built models by
formal reasoning. In this paper, we propose an automatic translation
of CPN to the rewriting logic language Maude. This tool allows
graphical editing and simulating CPN. The tool allows the user
drawing a CPN graphically and automatic translating the graphical
representation of the drawn CPN to Maude specification. Then,
Maude language is used to perform the simulation of the resulted
Maude specification. It is the first rewriting logic based environment
for this category of Petri Nets.
Abstract: In this paper we study the transformation of Euler equations 1 , u u u Pf t (ρ ∂) + ⋅∇ = − ∇ + ∂ G G G G ∇⋅ = u 0, G where (ux, t) G G is the velocity of a fluid, P(x, t) G is the pressure of a fluid andρ (x, t) G is density. First of all, we rewrite the Euler equations in terms of new unknown functions. Then, we introduce new independent variables and transform it to a new curvilinear coordinate system. We obtain the Euler equations in the new dependent and independent variables. The governing equations into two subsystems, one is hyperbolic and another is elliptic.