Abstract: This research aimed to study the characteristics of a
community in the social, economic and cultural context. This
research used interviews and surveys of the members in the Patthana
Soi Ranongklang community, Dusit District, Bangkok. The results
are as follows: In terms of overall conditions and characteristics, the
Patthana Soi Ranongklang community is located on the property of
the Treasury Department. 50 years ago, the location of this
community consisted of paddy fields with limited convenience in
terms of transportation. Rama V Road was only a small narrow road
accessed only by three-wheelers there were no buses. The majority of
community members moved in from Mak Khawan Rangsan Bridge.
Thus, most community members were either workers or government
officials as they were routers not the owners of the land. Therefore,
there were no primary occupations within the 7 acres of this
community. The development of the community started in 1981. At
present, the community is continuously being developed and
modernization is rapidly flowing in. One of the reasons was because
the main roads were widened, especially Rama V Road that allows
more convenient transportation, leading to heightened citizens’
convenience. In terms of the economy and society, Rama V Road
causes the research to find out the development and expansion of
change in the conditions of the area and buildings. Some buildings
were improved and changed along the time, as well as the
development of new facilities that caused the community members to
continually become more materialistic. In the community, it has well
organized and managed jobs to each part of community members,
and areas were improved to allow the new buildings and apartments.
The trend of jobs became more varied, in terms of both jobs at home,
such as workers, merchandizing and small own businesses, and the
community jobs outside, which became much more convenient to car
drivers as they got used to the narrow roads inside the community.
The location of the community next to Rama V Road also allows
assistance from government agencies to reach the community with
ease. Moreover, the welfare of the community was well taken care of
by the community committee. In terms of education, the research
found that there are two schools: Wat Pracharabuedham School and
Wat Noi Noppakun School that are providing education within the
community. The majority in the community have received Bachelor
degrees. In areas of culture, the research found that the culture,
traditions and beliefs of people in the community were mainly
transferred from the old community: the majorities are Buddhists, so
especially beliefs in Buddhism; the main reason for this is because
the old community was situated near Wat Makut Kasattriyaram.
Therefore, the community members have always had Buddhist
temples as the centre of the community. Later years, more citizens
moved along culture in and bring traditions and beliefs with them.
The community members also took part in building a Dharma hall
named Wat Duang Jai which is 72 year old.
Abstract: Moodle is an open source learning management
system that enables creation of a powerful and flexible learning
environment. Many organizations, especially learning institutions
have customized Moodle open source LMS for their own use. In
general open source LMSs are of great interest due to many
advantages they offer in terms of cost, usage and freedom to
customize to fit a particular context. Tanzania Secondary School e-
Learning (TanSSe-L) system is the learning management system for
Tanzania secondary schools. TanSSe-L system was developed using
a number of methods, one of them being customization of Moodle
Open Source LMS. This paper presents few areas on the way Moodle
OS LMS was customized to produce a functional TanSSe-L system
fitted to the requirements and specifications of Tanzania secondary
schools’ context.
Abstract: The legends about “user-friendly” and “easy-to-use”
birotical tools (computer-related office tools) have been spreading
and misleading end-users. This approach has led us to the extremely
high number of incorrect documents, causing serious financial losses
in the creating, modifying, and retrieving processes. Our research
proved that there are at least two sources of this underachievement:
(1) The lack of the definition of the correctly edited, formatted
documents. Consequently, end-users do not know whether their
methods and results are correct or not. They are not aware of their
ignorance. They are so ignorant that their ignorance does not allow
them to realize their lack of knowledge. (2) The end-users’ problem
solving methods. We have found that in non-traditional programming
environments end-users apply, almost exclusively, surface approach
metacognitive methods to carry out their computer related activities,
which are proved less effective than deep approach methods.
Based on these findings we have developed deep approach
methods which are based on and adapted from traditional
programming languages. In this study, we focus on the most popular
type of birotical documents, the text based documents. We have
provided the definition of the correctly edited text, and based on this
definition, adapted the debugging method known in programming.
According to the method, before the realization of text editing, a
thorough debugging of already existing texts and the categorization
of errors are carried out. With this method in advance to real text
editing users learn the requirements of text based documents and also
of the correctly formatted text.
The method has been proved much more effective than the
previously applied surface approach methods. The advantages of the
method are that the real text handling requires much less human and
computer sources than clicking aimlessly in the GUI (Graphical User
Interface), and the data retrieval is much more effective than from
error-prone documents.
Abstract: Mahasweta Devi and Toni Morrison are the two
stalwarts of the Indian English and the Afro-American literature
respectively. The writings of these two novelists are authentic and
powerful records of the lives of the people because much of their
personal experiences have gone into the making of their works. Devi,
a representative force of the Indian English literature, is also a social
activist working with the tribals of Bihar, Jharkhand, Orissa and West
Bengal. Most of her works echo the lives and struggles of the
subalterns as is evident in her “best beloved book” Chotti Munda and
His Arrow. The novelist focuses on the struggle of the tribals against
the colonial and the feudal powers to create their own identity,
thereby, embarking on the ideological project of ‘setting the record
straight’. The Nobel Laureate Toni Morrison, on the other hand,
brings to the fore the crucial issues of gender, race and class in many
of her significant works. In one of her representative works Sula, the
protagonist emerges as a non- conformist and directly confronts the
notion of a ‘good woman’ nurtured by the community of the Blacks.
In addition to this, the struggle of the Blacks against the White
domination, also become an important theme of the text. The thrust
of the paper lies in making a critical analysis of the portrayal of the
heroic attempts of the subaltern protagonist and the artistic endeavor
of the novelists in challenging the stereotypes.
Abstract: The problematic of gender and socioeconomic status
biased differences in academic motivation patterns is discussed.
Gender identity is understood according to symbolic interactionism
perspective: as a result of reflected appraisals, social comparisons,
self-attributions, and identifications, shaped by social environment
and family context. The effects of socioeconomic status on academic
motivation are conceptualized according to Bourdieu’s habitus
concept, reflecting the role of unconscious and internalized cultural
signals, proper to low and high socioeconomic status family contexts.
Since families differ by various socioeconomic features, the
hypothesis about possible impact of parents’ socioeconomic status on
their children’s academic motivation interfering with gender
socialization effects is held. The survey, aiming to seize gender
differences in academic motivation and self-recorded improvementoriented
efforts as a result of socialization processes operating in the
families of low and high socioeconomic status, was designed. The
results of Lithuanian higher education students’ survey are presented
and discussed.
Abstract: The Quad Tree Decomposition based performance
analysis of compressed image data communication for lossy and
lossless through wireless sensor network is presented. Images have
considerably higher storage requirement than text. While transmitting
a multimedia content there is chance of the packets being dropped
due to noise and interference. At the receiver end the packets that
carry valuable information might be damaged or lost due to noise,
interference and congestion. In order to avoid the valuable
information from being dropped various retransmission schemes have
been proposed. In this proposed scheme QTD is used. QTD is an
image segmentation method that divides the image into homogeneous
areas. In this proposed scheme involves analysis of parameters such
as compression ratio, peak signal to noise ratio, mean square error,
bits per pixel in compressed image and analysis of difficulties during
data packet communication in Wireless Sensor Networks. By
considering the above, this paper is to use the QTD to improve the
compression ratio as well as visual quality and the algorithm in
MATLAB 7.1 and NS2 Simulator software tool.
Abstract: Due to growing concern about environmental and
social consequences throughout the world, a need has been felt to
incorporate sustainability concepts in conventional manufacturing.
This paper is an attempt to identify and evaluate drivers in
implementing sustainable manufacturing in Indian context. Nine
possible drivers for successful implementation of sustainable
manufacturing have been identified from extensive review. Further,
Decision Making Trial and Evaluation Laboratory (DEMATEL)
approach has been utilized to evaluate and categorize these identified
drivers for implementing sustainable manufacturing in to the cause
and effect groups. Five drivers (Societal Pressure and Public
Concerns; Regulations and Government Policies; Top Management
Involvement, Commitment and Support; Effective Strategies and
Activities towards Socially Responsible Manufacturing and Market
Trends) have been categorized into the cause group and four drivers
(Holistic View in Manufacturing Systems; Supplier Participation;
Building Sustainable culture in Organization; and Corporate Image
and Benefits) have been categorized into the effect group. “Societal
Pressure and Public Concerns” has been found the most critical driver
and “Corporate Image and Benefits” as least critical or the most
easily influenced driver to implementing sustainable manufacturing
in Indian context. This paper may surely help practitioners in better
understanding of these drivers and their priorities towards effective
implementation of sustainable manufacturing.
Abstract: In an increasingly connected world, where speed of communication attempts to match the speed of thought and thus intentions; conflict gets actioned faster using media like the internet and telecommunication technology. This has led to a new form of aggression: “cyber bullying”. The present paper attempts to integrate existing theory on bullying, and the dark triad personality traits in a work environment and extrapolate it to the cyber context.
Abstract: Constuctivism learning theory lays emphasis on the
learners' active learning, such as learning initiative, sociality and
context. By analyzing the relationship between constructivism
learning theory and learner autonomy, this paper explores how to
cultivate learners' learner autonomy under the guidance of
constructivism learning theory.
Abstract: The objectives of memorabilia of Suan Sunandha are to develop a general knowledge presentation about the historical royal garden through interactive graphic simulation technique and to employ high-functionality context in enhancing interactive user navigation. The approach infers non-intrusive display of relevant history in response to situational context. User’s navigation runs through the virtual reality campus, consisting of new and restored buildings. A flash back presentation of information pertaining to the history in the form of photos, paintings, and textual descriptions are displayed along each passing-by building. To keep the presentation lively, graphical simulation is created in a serendipity game play so that the user can both learn and enjoy the educational tour. The benefits of this human-computer interaction development are two folds. First, lively presentation technique and situational context modeling are developed that entail a usable paradigm of knowledge and information presentation combinations. Second, cost effective training and promotion for both internal personnel and public visitors to learn and keep informed of this historical royal garden can be furnished without the need for a dedicated public relations service. Future improvement on graphic simulation and ability based display can extend this work to be more realistic, user-friendly, and informative for all.
Abstract: In the view of current requirements of power generation and the increased interest on renewable energy sources, many options are available for generation of clean power. Solar power generation would be one of the best options in this context. The solar pond uses the principle of conversion of solar energy into heat energy, and also has the capability of storing this energy for certain period of time. The solar ponds could be best option for the regions with high solar radiation throughout the day, and also has free land availability. The paper depicts the significance of solar pond for conversion of solar energy into heat energy with a sight towards the parameters like thermal efficiency, working conditions and cost of construction. The simulation of solar pond system has been carried out for understanding the trends of the thermal efficiencies with respect to time.
Abstract: Affordable housing delivery for low and lower middle income families is a prominent problem in many developing countries; governments alone are unable to address this challenge due to diverse financial and regulatory constraints, and the private sector's contribution is rare and assists only middle-income households even when institutional and legal reforms are conducted to persuade it to go down market. Also, the market-enabling policy measures advocated by the World Bank since the early nineties have been strongly criticized and proven to be inappropriate to developing country contexts, where it is highly unlikely that the formal private sector can reach low income population. In addition to governments and private developers, affordable housing delivery systems involve an intricate network of relationships between a diverse range of actors. Collaboration between them was proven to be vital, and hence, an approach towards partnership schemes for affordable housing delivery has emerged. The basic premise of this paper is that addressing housing affordability challenges in Egypt demands direct public support, as markets and market actors alone would never succeed in delivering decent affordable housing to low and lower middle income groups. It argues that this support would ideally be through local level partnership schemes, with a leading decentralized local government role, and partners being identified according to specific local conditions. It attempts to identify major attributes that would ensure the fulfillment of the goals of such schemes in the Egyptian context. This is based upon evidence from diversified worldwide experiences, in addition to the main outcomes of a questionnaire that was conducted to specialists and chief actors in the field.
Abstract: Information Security is the most describing problem in present times. To cop up with the security of the information, the passwords were introduced. The alphanumeric passwords are the most popular authentication method and still used up to now. However, text based passwords suffer from various drawbacks such as they are easy to crack through dictionary attacks, brute force attacks, keylogger, social engineering etc. Graphical Password is a good replacement for text password. Psychological studies say that human can remember pictures better than text. So this is the fact that graphical passwords are easy to remember. But at the same time due to this reason most of the graphical passwords are prone to shoulder surfing. In this paper, we have suggested a shoulder-surfing resistant graphical password authentication method. The system is a combination of recognition and pure recall based techniques. Proposed scheme can be useful for smart hand held devices (like smart phones i.e. PDAs, iPod, iPhone, etc) which are more handy and convenient to use than traditional desktop computer systems.
Abstract: A Mobile Ad-hoc Network (MANET) is a self managing network consists of versatile nodes that are capable of communicating with each other without having any fixed infrastructure. These nodes may be routers and/or hosts. Due to this dynamic nature of the network, routing protocols are vulnerable to various kinds of attacks. The black hole attack is one of the conspicuous security threats in MANETs. As the route discovery process is obligatory and customary, attackers make use of this loophole to get success in their motives to destruct the network. In Black hole attack the packet is redirected to a node that actually does not exist in the network. Many researchers have proposed different techniques to detect and prevent this type of attack. In this paper, we have analyzed various routing protocols in this context. Further we have shown a critical comparison among various protocols. We have shown various routing metrics are required proper and significant analysis of the protocol.
Abstract: This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: 1) the supermarket profile (volume, location, standard and type of the store), 2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), 3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first, is "the well distributing of the duties and responsibilities between the employees especially for security purposes". Second "Installation of strong security system" and "Making well-designed store layout". Third is "giving training for general employees" and "to give periodically security skills training of employees". There are other suggestions in the study can be looked up in the text.
Abstract: Information retrieval has become an important field of study and research under computer science due to explosive growth of information available in the form of full text, hypertext, administrative text, directory, numeric or bibliographic text. The research work is going on various aspects of information retrieval systems so as to improve its efficiency and reliability. This paper presents a comprehensive study, which discusses not only emergence and evolution of information retrieval but also includes different information retrieval models and some important aspects such as document representation, similarity measure and query expansion.
Abstract: The internet is growing larger and becoming the most popular platform for the people to share their opinion in different interests. We choose the education domain specifically comparing some Malaysian universities against each other. This comparison produces benchmark based on different criteria shared by the online users in various online resources including Twitter, Facebook and web pages. The comparison is accomplished using opinion mining framework to extract, process the unstructured text and classify the result to positive, negative or neutral (polarity). Hence, we divide our framework to three main stages; opinion collection (extraction), unstructured text processing and polarity classification. The extraction stage includes web crawling, HTML parsing, Sentence segmentation for punctuation classification, Part of Speech (POS) tagging, the second stage processes the unstructured text with stemming and stop words removal and finally prepare the raw text for classification using Named Entity Recognition (NER). Last phase is to classify the polarity and present overall result for the comparison among the Malaysian universities. The final result is useful for those who are interested to study in Malaysia, in which our final output declares clear winners based on the public opinions all over the web.
Abstract: MARS is a shared-key (symmetric) block cipher algorithm supporting 128-bit block size and a variable key size of between 128 and 448 bits. MARS has a several rounds of cryptographic core that is designed to take advantage of the powerful results for improving security/performance tradeoff over existing ciphers. In this work, a new function added to improve the ciphering process it is called, Meta-Morphic function. This function use XOR, Rotating, Inverting and No-Operation logical operations before and after encryption process. The aim of these operations is to improve MARS cipher process and makes a high confusion criterion for the Ciphertext.
Abstract: Recently, the interest of globalization in the field of
teacher education has increased. In the U.S., the government is trying
to enhance the quality of education through a global approach in
education. To do so, the schools in the U.S. are recruiting teachers with
global capability from countries like Korea where competent teachers
are being trained. Meanwhile, in the case of Korea, although excellent
teachers have been cultivated every year, due to a low birth rate it is
not easy to become a domestic teacher. To solve the trouble that the
two countries are facing, the study first examines the demand and
necessity of globalization in the field of teacher education between
Korea and the U.S. Second, we propose a new project, called the
‘Global Teachers University (GTU)’ program to satisfy the demands
of both countries. Finally, we provide its implications to build the
future educational cooperation for teacher training in a global context.
Abstract: This paper aims to introduce the allopatry of national college entrance examination which allow migrant students enter senior high schools and take college entrance exam where they live, identifies the reasons affect the implementation of this policy in the Chinese context. Most of China’s provinces and municipalities recently have announced new policies regarding national college entrance exams for non-local students. The paper conducts SWOT analysis reveals the opportunities, strength, weakness and challenges of the scheme, so as to discuss the implementation strategies from the perspectives of idea and institution. The research findings imply that the government should take a more positive attitude toward relaxing the allopatry of NCEE policy restrictions, and promote the reform household registration policy and NCEE policy with synchronous operations. Higher education institutions should explore the diversification of enrollment model; the government should issue the authority of universities and colleges to select elite migrant students beyond the restrictions of NCEE. To suit reform policies to local conditions, the big cities such as Beijing, Shanghai and Guangzhou should publish related compensate measures for children of migrant workers access to higher vocational colleges with tuition fee waivered.