Global

Security has been an important issue in the smart phone applications. Here, a security system has been developed that uses a sensor to detect a security violation and informs the owner by calling to his mobile. The system consists of a sensor, microcontroller IC, some relays and a mobile phone that operates when the sensor sense some unwanted breaking of doors, lockers etc. As soon as this occurs the system automatically calls the owner through the mobile phone used in the security system. The system has been designed and developed using locally available components and its performance has been studied. A program has been developed using Flow Code software to drive the system.
From the beginning of time, leadership has been one of the most sought after feature in human civilization. A strong leader makes the difference between simple existence and excellence. They inspired others, create vision among the followers, communicate what they want to communicate, show openness, and listen what their followers want to say. These people not only create actual value in others, but also change the society in a holistic way. Now, it is becoming a passion to get an authentic, effective leader in higher educational sector, where students do not want to see their teacher as a teacher only rather they ask for something more. The objective of this research was to identify a number of attributes/qualities of a teacher perceived as most important by students at tertiary level. These attributes/qualities will make him a leader of a group of followers, a group of students, which then make him an excellent teacher. Data of 280 students were assimilated to come to the findings. The authors found 15 most important qualities identified by students among 111 qualities identified by the authors, which should be poses by all teachers to be a good leader. As leadership is not science, part of social science, there is further scope for research in private tertiary level, as well as other educational sector to make it more authenticate.
Optimized utilization of resources is the need of the hour in any manufacturing system. A properly planned schedule is often required to facilitate optimization. This makes scheduling a significant phase in any manufacturing scenario. The Job Shop Scheduling Problem is an operation sequencing problem on multiple machines with some operation and machine precedence constraints, aimed to find the best sequence of operations on each machine in order to optimize a set of objectives. Bacterial Foraging algorithm is a relatively new biologically inspired optimization technique proposed based on the foraging behaviour of E.coli bacteria. Harmony Search is a phenomenon mimicking algorithm devised by the improvisation process of musicians. In this research paper, Harmony Search is hybridized with bacterial foraging to improve its scheduling strategies. A proposed Harmony Bacterial Swarming Algorithm is developed and tested with benchmark Job Shop instances. Computational results have clearly shown the competence of our method in obtaining the best schedule.
Cultural heritage is in a bad position in some countries, especially in Iran. Thus there is not any restoration and reservation program for repair of Cultural heritage in some developing countries as Iran. In this paper, I apply contingent valuation (CV) to estimate Kakh sadabad visitor’s willingness to pay and factors which effect on it. At least I use from results of a questionnaire for calculate the average willingness to pay of Kakh sadabad visitors.
In recent times, discourse on drug abuse and addiction has taken an upward trend globally; and this might not be unconnected with the phenomenal increase in the rate of drug dependence and its associated problems. As a matter of fact in recent years, the problem of drug abuse and addiction has received a considerable attention especially among Governments, Non Governmental Organizations, International Agencies, Health Workers, Academics and Researchers just to mention few. More recent scholarship has shown that studies on drug abuse and addiction have yielded important insights into both the causes and consequences of drug dependence. Often, the works in the addiction field usually use the pharmacological/medical model, psychological theories of behavior, or operate within the confines of a criminal justice perspective. Perusal of literature has shown that contributions from the field of sociology are not only scarce but also limited to the use of methods of sociological Investigations. However, this explains reasons many people are yet to term with reality about sociological understanding and explanations of drug dependence. Building on this premise, this work’s purpose is to review relevant sociological theories as discussed in the literature, identify their appropriateness to the understanding of drug abuse and dependence.
In any information system intrusions are the activities that damage the security and integrity of the system. In this paper we focus on wireless network, intrusions in wireless network (WLAN) and different Distributed Intrusion Detection Systems which are used to detect these attacks or intrusions. The rapid enhancement in wireless network has changed the level of network security. So, past of protecting the network with the firewalls are not sufficient to maintain network security in wireless local area network. There are different intrusion detection techniques which are used for identifying the various types of intrusions in wireless local area network. In this paper, we compare the various Distributed intrusion detection Systems used for detecting attacks in wireless network and also make a comparison table of these DIDS depending upon the performance. This comparison table will very helpful in designing better intrusion detection systems for detecting and preventing of vulnerabilities in wireless network.
This paper has attempted to compare some macro indicators of Vietnamese economy such as supply size, demand size, incremental capital – output ratio, (ICOR), total factor productivity (TFP), saving, output multipliers and import multipliers between two stages 2000- 2005 and 2006-2010.
This paper discusses ism al-‘adad wa al-ma’dud in the teaching and learning of grammar knowledge. The core of discussion revolves around Arabic language educators of various levels in institutions implementing the teaching of grammar knowledge for the topic ism al-‘adad wa al-ma’dud. A unique and interesting topic, it is frequently mentioned in verses of the Quran and Hadith. The target audience for ism al-‘adad wa al-ma’dud is students of all levels of education, be it in institutions of higher learning or schools. Educators and students of Arabic language in Malaysia are not native speakers of the language or ghair al-natiq bi al-‘arabiyyah. On that basis, misconceptions and confusion regarding ism al-‘adad wa al-ma’dud are bound to occur, especially among students and involving the issue of gender - muannath (feminine) and muzakkar (masculine). This paper attempts to uncover the concepts and operations of ism al- ‘adad wa al-ma’dud and the common misconceptions among students.
In previous decades, decision making in water management problems and selection of better option among suggested options to solve a watershed problems was only done based on economical criteria - profit in relation to cost- and on changing social and environmental criteria in to the economical criterion. However, today using Multi criteria decision making, it is not necessary to use financial equivalent of social and environmental criteria to select the best option. In fact, various qualitative and quantitative criteria can be used to prioritize and select the best options for water resources management. The purpose of this study is ranking the water resources potential in Zarand-Saveh watershed by two methods; ELECTRE method and Linear Assignment. ELECTRE method is one of the Multi criteria decision making which can compound the quantitative and qualitative criteria, weight each criterion based on its importance and help decision makers to select the best option at the same time. Electrical method is one of the available methods in compensatory methods. In this method, all options are analyzed and evaluated by non-ranked comparisons. Whole stages of this method are based on coordinated and uncoordinated sets and thus it is called ‘‘coordination analysis’’.
Nowadays, shortage and decrease in fresh water is approximately under increased all over the world. Based on the statistics published by FAO (Food and Agriculture organization), need for fresh water has almost become double per 21 years, while useful water resources have been reduced by half in relation to 30 years ago. It seems that useful water resources will become one fourth up to 2025 than useful water resources in 1960. Meanwhile, danger of various pollutions for water resources frequently increased the value and importance of them. Due to mentioned cases, if water resources aren’t managed in better way, the life of human being will be threatened by the shortage of water. Thus, it is necessary to acquire the exact and up to date information about the condition of water resources and prediction of their situation in future in order to achieve optimum management for water resources.