Wednesday, January 14, 2009

 Comparison of Web and Telephone Survey Response Rates in Saudi Arabia

Ali A. Al-Subaihi
Taibah University, Madinah, Monawwarh, Saudi Arabia

A study was conducted to compare the response rate of telephone interview and Web Survey in Saudi Arabia utilizing Internet usage statistics, as well as experimental design. Official data shows that the reason that led the majority of Saudi people to choose not to interact with Web Survey similarly to the telephone interview is not technical due to the lack of Internet coverage, but rather cultural. Furthermore, the experimental part demonstrates three main findings. First, the response rate to the Web Survey is significantly lower than to the telephone interview.

Second, Saudi males participated significantly more than females especially with the Web Survey though both had the same level of Internet access. Third, the average response rate of telephone interview is significantly above 95% for both genders, whereas the average response rate of the Web Survey is about 30%.

Keywords: web survey; telephone survey; response rate; Saudi Arabia.

Download Full Paper


read more ...

Tuesday, January 6, 2009

 HURRICANE! - A SIMULATION-BASED PROGRAM FOR SCIENCE EDUCATION

Jia Luo
Alpesh P. Makwana
Dezhi Liao
J. Peter Kincaid

Institute for Simulation and Training
3100 Technology Parkway
University of Central Florida
Orlando, FL 32826 USA

ABSTRACT
We describe the development, testing and fielding of a PC-based instructional program, Hurricane!. This program educates students about the effects of hurricane winds on different kinds of residential structures.The effects on the residential structures are physics-based. The program has been developed both for schools and science museums. The format is game-based with realistic graphics and sounds and students see different degrees of damage depending
on choices that make. For example, a one story masonry house built to current Florida building code standards, is much less vulnerable than a two story wood structure built before 1985. Therefore, students who make the first choice see less damage. Several tests in middle school science classes have demonstrated that the game is highly interesting and effectively teaches concepts central to understanding how to prepare for a hurricane.

Full paper as pdf file


read more ...

Sunday, January 4, 2009

 Distortion-Free Steganography for Polygonal Meshes

Alexander Bogomjakov Craig Gotsman Martin Isenburg

Center for Graphics and Geometric Computing - Technion - Israel Institute of Technology Center for Applied Scientific Computing - Lawrence Livermore National Labs

Abstract

We present a technique for steganography in polygonal meshes. Our method hides a message in the indexed representation of a mesh by permuting the order in which faces and vertices are stored. The permutation is relative to a reference ordering that encoder and decoder derive from the mesh connectivity in a consistent manner. Our method is distortion-free because it does not modify the geometry of the mesh. Compared to previous steganographic methods for polygonal meshes our capacity is up to an order of magnitude better. Our steganography algorithm is universal and can be used instead of the standard permutation steganography algorithm on arbitrary datasets. The standard algorithm runs in O(n2 log2 n loglog n) time and achieves optimal O(nlogn) bit capacity on datasets with n elements. In contrast, our algorithm runs in O(n) time, achieves a capacity that is only one bit per element less than optimal, and is extremely simple to implement.


Categories and Subject Descriptors (according to ACM CCS): I.3.m [Computer Graphics]: Miscellaneous

1. Introduction
Steganography (or, more simply, data-hiding) is the science of hiding messages in media in such a way that even the existence of the message remains undetected to all but the recipient. This is in contrast with cryptography, where the fact that a message is hidden in the data is not disguised, but it may be retrieved only by the use of a secret key, typically known only to the recipient. Thus, steganographic messages do not attract attention to themselves, to messengers, or to recipients. A classic example is invisible ink that turns brown when the paper is heated. An inconspicuous cover message is important as a blank sheet of paper can arouse suspicion.

Download full journal : pdf

read more ...

Friday, January 2, 2009

 Evolution of the Internet AS-Level Ecosystem

Srinivas Shakkottai
Texas A&M University
College Station, USA

Marina Fomenkov
Cooperative Association for Internet Data Analysis - CAIDA
San Diego Supercomputer Center,
University of California, San Diego

Ryan Koga
Cooperative Association for Internet Data Analysis - CAIDA
San Diego Supercomputer Center,
University of California, San Diego

Dmitri Krioukov
Cooperative Association for Internet Data Analysis - CAIDA
San Diego Supercomputer Center,
University of California, San Diego

kc claffy
Cooperative Association for Internet Data Analysis - CAIDA
San Diego Supercomputer Center,
University of California, San Diego


Abstract. We present an analytically tractable model of Internet evolution at the level of Autonomous Systems (ASs). We call our model the multiclass preferential attachment (MPA) model. As its name suggests, it is based on preferential attachment. All of its parameters are measurable from available Internet topology data. Given the estimated values of these parameters, our analytic results predict a defnitive set of statistics characterizing the AS topology structure. These statistics are not part of model formulation. The MPA model thus closes the \measure-modelvalidate-predict" loop, and provides further evidence that preferential attachment is the main driving force behind Internet evolution.


Key words: Preferential attachment, Internet evolution, AS-level topology, Internet measurement

Download full paper : pdf

read more ...

Recent Posts

Recent Comments

Free Journal For You © Layout By Hugo Meira.

TOPO