Abstract: This paper presents the development of a mobile
application for students at the Faculty of Information Technology,
Rangsit University (RSU), Thailand. RSU upgrades an enrollment
process by improving its information systems. Students can
download the RSU APP easily in order to access the RSU substantial
information. The reason of having a mobile application is to help
students to access the system regardless of time and place. The objectives of this paper include: 1. To develop an application
on iOS platform for those students at the Faculty of Information
Technology, Rangsit University, Thailand. 2. To obtain the students’
perception towards the new mobile app. The target group is those
from the freshman year till the senior year of the faculty of
Information Technology, Rangsit University. The new mobile application, called as RSU APP, is developed by
the department of Information Technology, Rangsit University. It
contains useful features and various functionalities particularly on
those that can give support to students. The core contents of the app
consist of RSU’s announcement, calendar, events, activities, and ebook.
The mobile app is developed on the iOS platform. The user
satisfaction is analyzed from the interview data from 81 interviewees
as well as a Google application like a Google form which 122
interviewees are involved. The result shows that users are satisfied
with the application as they score it the most satisfaction level at 4.67
SD 0.52. The score for the question if users can learn and use the
application quickly is high which is 4.82 SD 0.71. On the other hand,
the lowest satisfaction rating is in the app’s form, apps lists, with the
satisfaction level as 4.01 SD 0.45.
Abstract: For the last decade, researchers have started to focus
their interest on Multicast Group Key Management Framework. The
central research challenge is secure and efficient group key
distribution. The present paper is based on the Bit model based
Secure Multicast Group key distribution scheme using the most
popular absolute encoder output type code named Gray Code. The
focus is of two folds. The first fold deals with the reduction of
computation complexity which is achieved in our scheme by
performing fewer multiplication operations during the key updating
process. To optimize the number of multiplication operations, an
O(1) time algorithm to multiply two N-bit binary numbers which
could be used in an N x N bit-model of reconfigurable mesh is used
in this proposed work. The second fold aims at reducing the amount
of information stored in the Group Center and group members while
performing the update operation in the key content. Comparative
analysis to illustrate the performance of various key distribution
schemes is shown in this paper and it has been observed that this
proposed algorithm reduces the computation and storage complexity
significantly. Our proposed algorithm is suitable for high
performance computing environment.
Abstract: The paper will focus on the strategic development
deriving from the evolution of the traditional courtyard spatial
organization towards a new, contemporary sustainable way of living.
New sustainable approaches that engulf the social issues, the notion
of place, the understanding of weather architecture blended together
with the bioclimatic behavior will be seen through a series of
experimental case studies in the island of Cyprus, inspired and
originated from its traditional wisdom, ranging from small scale of
living to urban interventions. Weather and nature will be seen as co-architectural authors with
architects. Furthermore, the building will be seen not as an object but
rather as a vessel of human activities. This will further enhance the
notion of merging the material and immaterial, the built and unbuilt,
subject-human, and the object-building. This eventually will enable
to generate the discussion of the understanding of the building in
relation to the place and its inhabitants, where the human topography
is more important than the material topography. The specificities of
the divided island and the dealing with sites that are in vicinity with
the diving Green Line will further trigger explorations dealing with
the regeneration issues and the social sustainability offering
unprecedented opportunities for innovative sustainable ways of
living. Opening up a discourse with premises of weather-nature, materialimmaterial,
human-material topographies in relation to the contested
sites of the borders will lead us to develop innovative strategies for a
profound, both technical and social sustainability, which fruitfully
yields to innovative living built environments, responding to the ever
changing environmental and social needs. As a starting point, a case study in Kaimakli in Nicosia, a
refurbishment with an extension of a traditional house, already
engulfs all the traditional/ vernacular wisdom of the bioclimatic
architecture. The project focusses on the direct and quite obvious
bioclimatic features such as south orientation and cross ventilation.
Furthermore, it tries to reinvent the adaptation of these parameters in
order to turn the whole house to a contemporary living environment.
In order to succeed this, evolutions of traditional architectural
elements and spatial conditions are integrated in a way that does not
only respond to some certain weather conditions, but they integrate
and blend the weather within the built environment. A series of
innovations aiming at maximum flexibility is proposed. The house
can finally be transformed into a winter enclosure, while for the most
part of the year it turns into a ‘camping’ living environment. Parallel to experimental interventions in existing traditional units,
we will proceed examining the implementation of the same
developed methodology in designing living units and complexes.
Malleable courtyard organizations that attempt to blend the
traditional wisdom with the contemporary needs for living, the
weather and nature with the built environment will be seen tested in
both horizontal and vertical developments. Social activities are seen as directly affected and forged by the
weather conditions thus generating a new social identity of people where people are directly involved and interacting with the weather.
The human actions and interaction with the built, material
environment in order to respond to weather will be seen as the result
of balancing the social with the technological sustainability, the
immaterial, and the material aspects of the living environment.
Abstract: Non-linear dynamic time history analysis is
considered as the most advanced and comprehensive analytical
method for evaluating the seismic response and performance of
multi-degree-of-freedom building structures under the influence of
earthquake ground motions. However, effective and accurate
application of the method requires the implementation of advanced
hysteretic constitutive models of the various structural components
including masonry infill panels. Sophisticated computational research
tools that incorporate realistic hysteresis models for non-linear
dynamic time-history analysis are not popular among the professional
engineers as they are not only difficult to access but also complex and
time-consuming to use. In addition, commercial computer programs
for structural analysis and design that are acceptable to practicing
engineers do not generally integrate advanced hysteretic models
which can accurately simulate the hysteresis behavior of structural
elements with a realistic representation of strength degradation,
stiffness deterioration, energy dissipation and ‘pinching’ under cyclic
load reversals in the inelastic range of behavior. In this scenario,
push-over or non-linear static analysis methods have gained
significant popularity, as they can be employed to assess the seismic
performance of building structures while avoiding the complexities
and difficulties associated with non-linear dynamic time-history
analysis. “Push-over” or non-linear static analysis offers a practical
and efficient alternative to non-linear dynamic time-history analysis
for rationally evaluating the seismic demands. The present paper is
based on the analytical investigation of the effect of distribution of
masonry infill panels over the elevation of planar masonry infilled
reinforced concrete [R/C] frames on the seismic demands using the
capacity spectrum procedures implementing nonlinear static analysis
[pushover analysis] in conjunction with the response spectrum
concept. An important objective of the present study is to numerically
evaluate the adequacy of the capacity spectrum method using
pushover analysis for performance based design of masonry infilled
R/C frames for near-field earthquake ground motions.
Abstract: Digital cameras to reduce cost, use an image sensor to
capture color images. Color Filter Array (CFA) in digital cameras
permits only one of the three primary (red-green-blue) colors to be
sensed in a pixel and interpolates the two missing components
through a method named demosaicking. Captured data is interpolated
into a full color image and compressed in applications. Color
interpolation before compression leads to data redundancy. This
paper proposes a new Vector Quantization (VQ) technique to
construct a VQ codebook with Differential Evolution (DE)
Algorithm. The new technique is compared to conventional Linde-
Buzo-Gray (LBG) method.
Abstract: The aim of this study was to determine the factor
structure and psychometric properties (i.e., reliability and convergent
validity) of the Employee Trust Scale, a newly created instrument by
the researchers. The Employee Trust Scale initially contained 82
items to measure employees’ trust toward their supervisors. A sample
of 818 (343 females, 449 males) employees were selected randomly
from public and private organization sectors in Kota Kinabalu,
Sabah, Malaysia. Their ages ranged from 19 to 67 years old with a
mean of 34.55 years old. Their average tenure with their current
employer was 11.2 years (s.d. = 7.5 years). The respondents were
asked to complete the Employee Trust Scale, as well as a managerial
trust questionnaire from Mishra. The exploratory factor analysis on
employees’ trust toward their supervisor’s extracted three factors,
labeled ‘trustworthiness’ (32 items), ‘position status’ (11 items) and
‘relationship’ (6 items) which accounted for 62.49% of the total
variance. Trustworthiness factors were re-categorized into three sub
factors: competency (11 items), benevolence (8 items) and integrity
(13 items). All factors and sub factors of the scales demonstrated
clear reliability with internal consistency of Cronbach’s Alpha above
.85. The convergent validity of the Scale was supported by an
expected pattern of correlations (positive and significant correlation)
between the score of all factors and sub factors of the scale and the
score on the managerial trust questionnaire, which measured the same
construct. The convergent validity of Employee Trust Scale was
further supported by the significant and positive inter-correlation
between the factors and sub factors of the scale. The results suggest
that the Employee Trust Scale is a reliable and valid measure.
However, further studies need to be carried out in other groups of
sample as to further validate the Scale.
Abstract: Automated Teller Machines (ATMs) can be
considered among one of the most important service facilities in the
banking industry. The investment in ATMs and the impact on the
banking industry is growing steadily in every part of the world. The
banks take into consideration many factors like safety, convenience,
visibility, and cost in order to determine the optimum locations of
ATMs. Today, ATMs are not only available in bank branches but
also at retail locations. Another important factor is the cash
management in ATMs. A cash demand model for every ATM is
needed in order to have an efficient cash management system. This
forecasting model is based on historical cash demand data which is
highly related to the ATMs location. So, the location and the cash
management problem should be considered together. This paper
provides a general review on studies, efforts and development in
ATMs location and cash management problem.
Abstract: Networked environments which provide platforms for
business organizations are configured in different forms depending
on many factors including life time, member characteristics,
communication structure, and business objectives, among others.
With continuing advances in digital technologies the distance has
become a less barrier for business minded collaboration among
organizations. With the need and ease to make business collaborate
nowadays organizations are sometimes forced to co-work with others
that are either unknown or less known to them in terms of history and
performance. A promising approach for sustaining established
collaboration has been establishment of trust relationship among
organizations based on assessed trustworthiness for each participating
organization. It has been stated in research that trust in organization is
dynamic and thus assessment of trust level must address such
dynamic nature. This paper assesses relevant aspects of trust and
applies the assessed concepts to propose a semi-automated system for
the management of Sustainability and Evolution of trust in
organizations participating in specific objective in a networked
organizations environment.
Abstract: Leishmaniasis is the collective name for a number of
diseases caused by protozoan flagellates of the genus Leishmania,
which is transmitted by Phlebotomine sandfly, the disease has diverse
clinical manifestations and found in many areas of the world,
particularly in Africa, Latin America, South and Central Asia, the
Mediterranean basin and the Middle East. This study was done to
assess primary health care physicians’ knowledge (PHP) and attitude
about leishmaniasis and to assess awareness of local inhabitants
about the disease and its vector in four areas in west Alexandria,
Egypt. It is a cross sectional survey that was conducted in four PHC
units in west Alexandria. All physicians currently working in these
units during the study period were invited to participate in the study;
only 20 PHP completed the questionnaire. 60 local inhabitants were
selected randomly from the four areas of the study, 15 from each
area; Data was collected through two different specially designed
questionnaires. Results showed that 11 (55%) percent of the
physicians had satisfactory knowledge; they answered more than 9
(60%) questions out of a total 14 questions about leishmaniasis and
sandfly. On the other hand when attitude of the primary health care
physicians about leishmaniasis was measured, results showed that 17
(85%) had good attitude and 3 (15%) had poor attitude. The second
questionnaire showed that the awareness of local inhabitants about
leishmaniasis and sandfly as a vector of the disease is poor and needs
to be corrected. (90%) of the interviewed inhabitants had not heard
about leishmaniasis, Only 3 (5%) of them said they know sandfly and
its role in transmission of leishmaniasis. Thus we conclude that
knowledge and attitudes of physicians are acceptable. However, there
is, room for improvement and could be done through formal training
courses and distribution of guidelines. In addition to raising the
awareness of primary health care physicians about the importance of
early detection and notification of cases of leishmaniasis, health
education for raising awareness of the public regarding the vector and
the disease is necessary because related studies have demonstrated
that for inhabitants to take enough protective measures against the
vector, they should perceive that it is responsible for causing a
disease.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: By enhancing the applicatıon of grounds for
establishment and due to the lack of appropriate sites, engineers
attempt to seek out a new method to reduce the weakness of soils. İn
aspect of economic situation, various ways have been used to
decrease the weak grounds. Because of the rapid development of
infrastructural facilities, spreading the construction operation is an
obligation. Furthermore, in various sites with the really bad soil
situation, engineers have considered obvious problems. One of the
most essential ways for developing the weak soils is stone column.
Obviously, the method was introduced in France in 1830 to improve
a native soil initially. Stone columns have an expanding range of
usage in different rough foundation sites all over the world to
increase the bearing capacity, to reduce the whole and differential
settlements, to enhance the rate of consolidation, to stabilize slopes
stability of embankments and to increase the liquefaction resistance
as well. A recent procedure called installing vertical nails along the
round stone columns in order to make better the performance of
considered columns is offered. Moreover, thanks to the enhancing the
nail diameter, number and embedment nail depth, the positive points
of vertical circumferential nails increases. Based on the result of this
study, load caring capacity will be develop with enhancing the length
and the power of reinforcements in vertical encasement stone column
(CESC). In this study, the main purpose is comparing two methods of
stone columns (installed a nail surrounding the stone columns and
using geogrid on clay) for enhancing the bearing capacity, decreasing
the whole and various settlements.
Abstract: There is currently a gap in the technology covering the
rapid establishment of control after a reconfiguration in a
Reconfigurable Manufacturing System. This gap involves the
detection of the factory floor state and the communication link
between the factory floor and the high-level software. In this paper, a
thin, hardware-supported Middleware Management System (MMS) is
proposed and its design and implementation are discussed. The
research found that a cost-effective localization technique can be
combined with intelligent software to speed up the ramp-up of a
reconfigured system. The MMS makes the process more intelligent,
more efficient and less time-consuming, thus supporting the
industrial implementation of the RMS paradigm.
Abstract: Based on application requirements, nodes are static or
mobile in Wireless Sensor Networks (WSNs). Mobility poses
challenges in protocol design, especially at the link layer requiring
mobility adaptation algorithms to localize mobile nodes and predict
link quality to be established with them. This study implements
XMAC and Berkeley Media Access Control (BMAC) routing
protocols to evaluate performance under WSN’s static and mobility
conditions. This paper gives a comparative study of mobility-aware
MAC protocols. Routing protocol performance, based on Average
End to End Delay, Average Packet Delivery Ratio, Average Number
of hops, and Jitter is evaluated.
Abstract: The environmental, cultural, social, and technological
changes have led higher education institutes to question their
traditional roles. Many declarations and frameworks highlight the
importance of fulfilling social responsibility of higher education
institutes. The study aims at developing a framework of university
social responsibility and sustainability (USR&S) with focus on South
Valley University (SVU) as a case study of Egyptian Universities.
The study used meetings with 12 vice deans of community services
and environmental affairs on social responsibility and environmental
issues. The proposed framework integrates social responsibility with
strategic management through the establishment and maintenance of
the vision, mission, values, goals and management systems;
elaboration of policies; provision of actions; evaluation of services
and development of social collaboration with stakeholders to meet
current and future needs of the community and environment. The
framework links between different stakeholders internally and
externally using communication and reporting tools. The results show
that SVU integrates social responsibility and sustainability in its
strategic plans. It has policies and actions however fragmented and
lack of appropriate structure and budgeting. The proposed framework
could be valuable for researchers and decision makers of the
Egyptian Universities. The study proposed recommendations and
highlighted building on the results and conducting future research.
Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.
Abstract: Aim of this research study is to investigate and
establish the characteristics of brain dominances (BD) and multiple
intelligences (MI). This experimentation has been conducted for the
sample size of 552 undergraduate computer-engineering students. In
addition, mathematical formulation has been established to exhibit
the relation between thinking and intelligence, and its correlation has
been analyzed. Correlation analysis has been statistically measured
using Pearson’s coefficient. Analysis of the results proves that there
is a strong relational existence between thinking and intelligence.
This research is carried to improve the didactic methods in
engineering learning and also to improve e-learning strategies.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: This paper addresses a cutting edge method of
business demand forecasting, based on an empirical probability
function when the historical behavior of the data is random.
Additionally, it presents error determination based on the numerical
method technique ‘propagation of errors.’ The methodology was
conducted characterization and process diagnostics demand planning
as part of the production management, then new ways to predict its
value through techniques of probability and to calculate their mistake
investigated, it was tools used numerical methods. All this based on
the behavior of the data. This analysis was determined considering
the specific business circumstances of a company in the sector of
communications, located in the city of Bogota, Colombia. In
conclusion, using this application it was possible to obtain the
adequate stock of the products required by the company to provide its
services, helping the company reduce its service time, increase the
client satisfaction rate, reduce stock which has not been in rotation
for a long time, code its inventory, and plan reorder points for the
replenishment of stock.
Abstract: Reticence is a prominent and complex phenomenon
which occurs in foreign language classrooms and influences students’
oral passivity. The present study investigated the extent in which
students experience reticence in the EFL classrooms and explored the
underlying factors triggering reticence. The participants were 104
Iranian freshmen undergraduate male and female EFL students, who
enrolled in listening and speaking courses, all majoring in English
studying at Islamic Azad University Isfahan (Khorasgan) Branch and
University of Isfahan, Isfahan, Iran. To collect the data, the Reticence
Scale-12 (RS-12) questionnaire which measures the level of reticence
consisting of six dimensions (anxiety, knowledge, timing,
organization, skills, and memory) was administered to the
participants. The statistical analyses showed that the reticent level
was high among the Iranian EFL undergraduate students, and their
major problems were feelings of anxiety and delivery skills.
Moreover, the results revealed that factors such as low English
proficiency, the teaching method, and lack of confidence contributed
to the students’ reticence in Iranian EFL classrooms. It can be
implied that language teachers’ awareness of learners’ reticence can
help them choose more appropriate activities and provide a friendly
environment enhancing hopefully more effective participation of EFL
learners. The findings can have implications for EFL teachers,
learners and policy makers.
Abstract: Durian is the flagship fruit of Mindanao and there is
an abundance of several cultivars with many confusing identities/
names.
The project was conducted to develop procedure for reliable and
rapid detection and sorting of durian planting materials. Moreover, it
is also aimed to establish specific genetic or DNA markers for routine
testing and authentication of durian cultivars in question.
The project developed molecular procedures for routine testing.
SSR primers were also screened and identified for their utility in
discriminating durian cultivars collected.
Results of the study showed the following accomplishments:
1. Twenty (29) SSR primers were selected and identified based on
their ability to discriminate durian cultivars,
2. Optimized and established standard procedure for identification
and authentication of Durian cultivars
3. Genetic profile of durian is now available at Biotech Unit
Our results demonstrate the relevance of using molecular
techniques in evaluating and identifying durian clones. The most
polymorphic primers tested in this study could be useful tools for
detecting variation even at the early stage of the plant especially for
commercial purposes. The process developed combines the efficiency
of the microsatellites development process with the optimization of
non-radioactive detection process resulting in a user-friendly protocol
that can be performed in two (2) weeks and easily incorporated into
laboratories about to start microsatellite development projects. This
can be of great importance to extend microsatellite analyses to other
crop species where minimal genetic information is currently
available. With this, the University can now be a service laboratory
for routine testing and authentication of durian clones.