Abstract: New and more powerful communications technologies
continue to emerge at a rapid pace and their uses in education are
widespread and the impact remarkable in the developing societies.
This study investigates Mobile Collaboration Learning Technique
(MCLT) on learners’ outcome among students in tertiary institutions
of developing nations (a case of Nigeria students). It examines the
significance of retention achievement scores of students taught using
mobile collaboration and conventional method. The sample consisted
of 120 students using Stratified random sampling method. Five
research questions and hypotheses were formulated, and tested at
0.05 level of significance. A student achievement test (SAT) was
made of 40 items of multiple-choice objective type, developed and
validated for data collection by professionals. The SAT was
administered to students as pre-test and post-test. The data were
analyzed using t-test statistic to test the hypotheses. The result
indicated that students taught using MCLT performed significantly
better than their counterparts using the conventional method of
instruction. Also, there was no significant difference in the post-test
performance scores of male and female students taught using MCLT.
Based on the findings, the following submissions was made that:
Mobile collaboration system be encouraged in the institutions to
boost knowledge sharing among learners, workshop and training
should be organized to train teachers on the use of this technique,
schools and government should consistently align curriculum
standard to trends of technological dictates and formulate policies
and procedures towards responsible use of MCLT.
Abstract: This work explores the inter-region investment
behaviors of Integrated Circuit (IC) design industry from Taiwan to
China using the amount of foreign direct investment (FDI). According
to the mutual dependence among different IC design industrial
locations, Lotka-Volterra model is utilized to explore the FDI
interactions between South and East China. Effects of inter-regional
collaborations on FDI flows into China are considered. The analysis
results show that FDIs into South China for IC design industry
significantly inspire the subsequent FDIs into East China, while FDIs
into East China for Taiwan’s IC design industry significantly hinder
the subsequent FDIs into South China. Because the supply chain along
IC industry includes upstream IC design, midstream manufacturing, as
well as downstream packing and testing enterprises, IC design industry
has to cooperate with IC manufacturing, packaging and testing
industries in the same area to form a strong IC industrial cluster.
Taiwan’s IC design industry implement the largest FDI amount into
East China and the second largest FDI amount into South China
among the four regions: North, East, Mid-West and South China. If IC
design houses undertake more FDIs in South China, those in East
China are urged to incrementally implement more FDIs into East
China to maintain the competitive advantages of the IC supply chain in
East China. On the other hand, as the FDIs in East China rise, the FDIs
in South China will successively decline since capitals have
concentrated in East China. In addition, this investigation proves that
the prediction of Lotka-Volterra model in FDI trends is accurate
because the industrial interactions between the two regions are
included. Finally, this work confirms that the FDI flows cannot reach a
stable equilibrium point, so the FDI inflows into East and South China
will expand in the future.
Abstract: Networked environments which provide platforms for
business organizations are configured in different forms depending
on many factors including life time, member characteristics,
communication structure, and business objectives, among others.
With continuing advances in digital technologies the distance has
become a less barrier for business minded collaboration among
organizations. With the need and ease to make business collaborate
nowadays organizations are sometimes forced to co-work with others
that are either unknown or less known to them in terms of history and
performance. A promising approach for sustaining established
collaboration has been establishment of trust relationship among
organizations based on assessed trustworthiness for each participating
organization. It has been stated in research that trust in organization is
dynamic and thus assessment of trust level must address such
dynamic nature. This paper assesses relevant aspects of trust and
applies the assessed concepts to propose a semi-automated system for
the management of Sustainability and Evolution of trust in
organizations participating in specific objective in a networked
organizations environment.
Abstract: This study presents a hybrid metaheuristic algorithm
to obtain optimum designs for steel space buildings. The optimum
design problem of three-dimensional steel frames is mathematically
formulated according to provisions of LRFD-AISC (Load and
Resistance factor design of American Institute of Steel Construction).
Design constraints such as the strength requirements of structural
members, the displacement limitations, the inter-story drift and the
other structural constraints are derived from LRFD-AISC
specification. In this study, a hybrid algorithm by using teachinglearning
based optimization (TLBO) and harmony search (HS)
algorithms is employed to solve the stated optimum design problem.
These algorithms are two of the recent additions to metaheuristic
techniques of numerical optimization and have been an efficient tool
for solving discrete programming problems. Using these two
algorithms in collaboration creates a more powerful tool and
mitigates each other’s weaknesses. To demonstrate the powerful
performance of presented hybrid algorithm, the optimum design of a
large scale steel building is presented and the results are compared to
the previously obtained results available in the literature.
Abstract: The teaching of computer programming for beginners
has been generally considered as a difficult and challenging task.
Several methodologies and research tools have been developed,
however, the difficulty of teaching still remains. Our work integrates
the state of the art in teaching programming with game software and
further provides metrics for the evaluation of student performance in
a collaborative activity of playing games. This paper aims to present a
multi-agent system architecture to be incorporated to the educational
collaborative game software for teaching programming that monitors,
evaluates and encourages collaboration by the participants. A
literature review has been made on the concepts of Collaborative
Learning, Multi-agents systems, collaborative games and techniques
to teach programming using these concepts simultaneously.
Abstract: This research paper presents guiding on how to design
social media into higher education courses. The research
methodology used a survey approach. The research instrument was a
questionnaire about guiding on how to design social media into
higher education courses. Thirty-one lecturers completed the
questionnaire. The data were scored by frequency and percentage.
The research results were the lecturers’ opinions concerning the
designing social media into higher education courses as follows: 1)
Lecturers deem that the most suitable learning theory is Collaborative
Learning. 2) Lecturers consider that the most important learning and
innovation Skill in the 21st century is communication and
collaboration skills. 3) Lecturers think that the most suitable
evaluation technique is authentic assessment. 4) Lecturers consider
that the most appropriate portion used as blended learning should be
70% in the classroom setting and 30% online.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: In this paper, we provided a literature survey on the
artificial stock problem (ASM). The paper began by exploring the
complexity of the stock market and the needs for ASM. ASM
aims to investigate the link between individual behaviors (micro
level) and financial market dynamics (macro level). The variety of
patterns at the macro level is a function of the AFM complexity. The
financial market system is a complex system where the relationship
between the micro and macro level cannot be captured analytically.
Computational approaches, such as simulation, are expected to
comprehend this connection. Agent-based simulation is a simulation
technique commonly used to build AFMs. The paper proceeds by
discussing the components of the ASM. We consider the roles
of behavioral finance (BF) alongside the traditionally risk-averse
assumption in the construction of agent’s attributes. Also, the
influence of social networks in the developing of agents interactions is
addressed. Network topologies such as a small world, distance-based,
and scale-free networks may be utilized to outline economic
collaborations. In addition, the primary methods for developing
agents learning and adaptive abilities have been summarized.
These incorporated approach such as Genetic Algorithm, Genetic
Programming, Artificial neural network and Reinforcement Learning.
In addition, the most common statistical properties (the stylized facts)
of stock that are used for calibration and validation of ASM are
discussed. Besides, we have reviewed the major related previous
studies and categorize the utilized approaches as a part of these
studies. Finally, research directions and potential research questions
are argued. The research directions of ASM may focus on the macro
level by analyzing the market dynamic or on the micro level by
investigating the wealth distributions of the agents.
Abstract: Cyber exercises used to assess the preparedness of a
community against cyber crises, technology failures and Critical
Information Infrastructure (CII) incidents. The cyber exercises also
called cyber crisis exercise or cyber drill, involved partnerships or
collaboration of public and private agencies from several sectors.
This study investigates Organisation Cyber Resilience (OCR) of
participation sectors in cyber exercise called X Maya in Malaysia.
This study used a principal based cyber resilience survey called CSuite
Executive checklist developed by World Economic Forum in
2012. To ensure suitability of the survey to investigate the OCR, the
reliability test was conducted on C-Suite Executive checklist items.
The research further investigates the differences of OCR in ten
Critical National Infrastructure Information (CNII) sectors
participated in the cyber exercise. The One Way ANOVA test result
showed a statistically significant difference of OCR among ten CNII
sectors participated in the cyber exercise.
Abstract: The environmental, cultural, social, and technological
changes have led higher education institutes to question their
traditional roles. Many declarations and frameworks highlight the
importance of fulfilling social responsibility of higher education
institutes. The study aims at developing a framework of university
social responsibility and sustainability (USR&S) with focus on South
Valley University (SVU) as a case study of Egyptian Universities.
The study used meetings with 12 vice deans of community services
and environmental affairs on social responsibility and environmental
issues. The proposed framework integrates social responsibility with
strategic management through the establishment and maintenance of
the vision, mission, values, goals and management systems;
elaboration of policies; provision of actions; evaluation of services
and development of social collaboration with stakeholders to meet
current and future needs of the community and environment. The
framework links between different stakeholders internally and
externally using communication and reporting tools. The results show
that SVU integrates social responsibility and sustainability in its
strategic plans. It has policies and actions however fragmented and
lack of appropriate structure and budgeting. The proposed framework
could be valuable for researchers and decision makers of the
Egyptian Universities. The study proposed recommendations and
highlighted building on the results and conducting future research.
Abstract: This study found that most corporate personnel are
using social media to communicate with colleagues to make the
process of working more efficient. Complete satisfaction occurred on
the use of security within the University’s computer network. The
social network usage for communication, collaboration,
entertainment and demonstrating concerns accounted for fifty percent
of variance to predict interpersonal relationships of corporate
personnel. This evaluation on the effectiveness of social networking
involved 213 corporate personnel’s. The data was collected by
questionnaires. This data was analyzed by using percentage, mean,
and standard deviation.
The results from the analysis and the effectiveness of using online
social networks were derived from the attitude of private users and
safety data within the security system. The results showed that the
effectiveness on the use of an online social network for corporate
personnel of Suan Sunandha Rajabhat University was specifically at
a good level, and the overall effects of each aspect was (Ẋ=3.11).
Abstract: Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having her own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.
Abstract: In this paper, a summary of analytical and
experimental studies into the behavior of a new hysteretic damper,
designed for seismic protection of structures is presented. The Multidirectional
Torsional Hysteretic Damper (MRSD) is a patented
invention in which a symmetrical arrangement of identical cylindrical
steel cores is so configured as to yield in torsion while the structure
experiences planar movements due to earthquake shakings. The new
device has certain desirable properties. Notably, it is characterized by
a variable and controllable-via-design post-elastic stiffness. The
mentioned property is a result of MRSD’s kinematic configuration
which produces this geometric hardening, rather than being a
secondary large-displacement effect. Additionally, the new system is
capable of reaching high force and displacement capacities, shows
high levels of damping, and very stable cyclic response. The device
has gone through many stages of design refinement, multiple
prototype verification tests and development of design guide-lines
and computer codes to facilitate its implementation in practice.
Practicality of the new device, as offspring of an academic sphere, is
assured through extensive collaboration with industry in its final
design stages, prototyping and verification test programs.
Abstract: This work is the first dowel in a rather wide research
activity in collaboration with Euro Mediterranean Center for Climate
Changes, aimed at introducing scalable approaches in Ocean
Circulation Models. We discuss designing and implementation of
a parallel algorithm for solving the Variational Data Assimilation
(DA) problem on Graphics Processing Units (GPUs). The algorithm
is based on the fully scalable 3DVar DA model, previously proposed
by the authors, which uses a Domain Decomposition approach
(we refer to this model as the DD-DA model). We proceed with
an incremental porting process consisting of 3 distinct stages:
requirements and source code analysis, incremental development of
CUDA kernels, testing and optimization. Experiments confirm the
theoretic performance analysis based on the so-called scale up factor
demonstrating that the DD-DA model can be suitably mapped on
GPU architectures.
Abstract: Every year, a considerable amount of money is being
invested on research, mainly in the form of funding allocated to
universities and research institutes. To better distribute the available
funds and to set the most proper R&D investment strategies for the
future, evaluation of the productivity of the funded researchers and
the impact of such funding is crucial. In this paper, using the data on
15 years of journal publications of the NSERC (Natural Sciences and
Engineering research Council of Canada) funded researchers and by
means of bibliometric analysis, the scientific development of the
funded researchers and their scientific collaboration patterns will be
investigated in the period of 1996-2010. According to the results it
seems that there is a positive relation between the average level of
funding and quantity and quality of the scientific output. In addition,
whenever funding allocated to the researchers has increased, the
number of co-authors per paper has also augmented. Hence, the
increase in the level of funding may enable researchers to get
involved in larger projects and/or scientific teams and increase their
scientific output respectively.
Abstract: Introduction: Researchers globally have strived to explore diverse factors that augment the continuation and uptake of family planning methods. Clients’ satisfaction is one of the core determinants facilitating continuation of family planning methods. There is a major debate yet scanty evidence to contrast public and private sectors with respect to client satisfaction. The objective of this study is to compare quality-of-care provided by public and private sectors of Pakistan through a client satisfaction lens. Methods: We used Pakistan Demographic Heath Survey 2012-13 dataset on 3133 women. Ten different multivariate models were made. to explore the relationship between client satisfaction and dependent outcome after adjusting for all known confounding factors and results are presented as OR and AOR (95% CI). Results: Multivariate analyses showed that clients were less satisfied in contraceptive provision from private sector as compared to public sector (AOR 0.92, 95% CI 0.63-1.68) even though the result was not statistically significant. Clients were more satisfied from private sector as compared to the public sector with respect to other determinants of quality-of-care follow-up care (AOR 3.29, 95% CI 1.95-5.55), infection prevention (AOR 2.41, 95% CI 1.60-3.62), counseling services (AOR 2.01, 95% CI 1.27-3.18, timely treatment (AOR 3.37, 95% CI 2.20-5.15), attitude of staff (AOR 2.23, 95% CI 1.50-3.33), punctuality of staff (AOR 2.28, 95% CI 1.92-4.13), timely referring (AOR 2.34, 95% CI 1.63-3.35), staff cooperation (AOR 1.75, 95% CI 1.22-2.51) and complications handling (AOR 2.27, 95% CI 1.56-3.29). Discussion: Public sector has successfully attained substantial satisfaction levels with respect to provision of contraceptives, but it contrasts previous literature from a multi country studies. Our study though in is concordance with a study from Tanzania where public sector was more likely to offer family planning services to clients as compared to private facilities. Conclusion: In majority of the developing countries, public sector is more involved in FP service provision; however, in Pakistan clients’ satisfaction in private sector is more, which opens doors for public-private partnerships and collaboration in the near future.
Abstract: If teamwork is the key to organizational learning,
productivity and growth, then, why do some teams succeed in
achieving these, while others falter at different stages? Building
teams in higher education institutions has been a challenge and an
open-ended constructivist approach was considered on an
experimental basis for this study to address this challenge. For this
research, teams of students from the MBA program were chosen to
study the effect of teamwork in learning, the motivation levels among
student team members, and the effect of collaboration in achieving
team goals. The teams were built on shared vision and goals,
cohesion was ensured, positive induction in the form of faculty
mentoring was provided for each participating team and the results
have been presented with conclusions and suggestions.
Abstract: There is a trend in development discourse to
understand and explain the level of corruption in Nigeria, its anticorruption
crusade and why it is failing, as well as its level of
compliance with International standards of United Nations
Convention against Corruption (UNCAC) & African Union
Convention on Converting and Preventing Corruption) to which
Nigeria is a signatory. This paper discusses the legal and
Constitutional provisions relating to corrupt practices and safeguards
in Nigeria, as well as the obstacles to the implementation of these
Conventions.
The paper highlights the challenges posed to the Anti-Corruption
crusade by analysing the loopholes that exist both in administrative
structure and in scope of the relevant laws. The paper argues that
Nigerian Constitution did not make adequate provisions for the
implementation of the conventions, hence a proposal which will
ensure adequate provision for implementing the conventions to better
the lives of Nigerians. The paper concludes that there is the need to
build institutional parameters, adequate constitutional and structural
safeguards, as well as to synergise strategies, collaborations and
alliances to facilitate the timely domestication and implementation of
the conventions.
Abstract: In its efforts to utilize the information and
communication technology to enhance the quality of public service
delivery, national and local governments around the world are
competing to introduce more ICT applications as tools to automate
processes related to law enforcement or policy execution, increase
citizen orientation, trust, and satisfaction, and create one-stop-shops
for public services. In its implementation, e-Government ICTs need
to maintain transparency, participation, and collaboration. Due to this
diverse of mixed goals and requirements, e-Government systems
need to be designed based on special design considerations in order
to eliminate the risks of failure to compliance to government
regulations, citizen dissatisfaction, or market repulsion.
In this article we suggest a framework with guidelines for
designing government information systems that takes into
consideration the special requirements of the public sector. Then we
introduce two case studies and show how applying those guidelines
would result in a more solid system design.
Abstract: Collaborative technologies or software known as
groupware are key enabling tools for communication, collaboration
and co-ordination among individuals, work groups and businesses.
Available reviews of the groupware literature are very few,
and mostly neither systematic nor recent.
This paper is an effort to fill this gap, and to provide researchers,
with a more up-to-date and wide systematic literature review. For this
purpose, 1087 scholarly articles, published from 1990 to 2013, on the
topic of groupware, were collected by the literature search. The study
here adopted the systematic approach of lexical analysis for the
analysis of those articles.