Abstract: In this study it is aimed to determine the level of preservice teachers- computer phobia. Whether or not computer phobia meaningfully varies statistically according to gender and computer experience has been tested in the study. The study was performed on 430 pre-service teachers at the Education Faculty in Rize/Turkey. Data in the study were collected through the Computer Phobia Scale consisting of the “Personal Knowledge Questionnaire", “Computer Anxiety Rating Scale", and “Computer Thought Survey". In this study, data were analyzed with statistical processes such as t test, and correlation analysis. According to results of statistical analyses, computer phobia of male pre-service teachers does not statistically vary depending on their gender. Although male preservice teachers have higher computer anxiety scores, they have lower computer thought scores. It was also observed that there is a negative and intensive relation between computer experience and computer anxiety. Meanwhile it was found out that pre-service teachers using computer regularly indicated lower computer anxiety. Obtained results were tried to be discussed in terms of the number of computer classes in the Education Faculty curriculum, hours of computer class and the computer availability of student teachers.
Abstract: Mechanical buckling analysis of rectangular plates
with central circular cutout is performed in this paper. The finiteelement
method is used to study the effects of plate-support
conditions, aspect ratio, and hole size on the mechanical buckling
strength of the perforated plates subjected to linearly varying loading.
Results show that increasing the hole size does not necessarily reduce
the mechanical buckling strength of the perforated plates. It is also
concluded that the clamped boundary condition increases the
mechanical buckling strength of the perforated plates more than the
simply-supported boundary condition and the free boundary
conditions enhance the mechanical buckling strength of the
perforated plates more effectively than the fixed boundary conditions.
Furthermore, for the bending cases, the critical buckling load of
perforated plates with free edges is less than perforated plates with
fixed edges.
Abstract: Static analysis of source code is used for auditing web
applications to detect the vulnerabilities. In this paper, we propose a
new algorithm to analyze the PHP source code for detecting LFI and
RFI potential vulnerabilities. In our approach, we first define some
patterns for finding some functions which have potential to be abused
because of unhandled user inputs. More precisely, we use regular
expression as a fast and simple method to define some patterns for
detection of vulnerabilities. As inclusion functions could be also used
in a safe way, there could occur many false positives (FP). The first
cause of these FP-s could be that the function does not use a usersupplied
variable as an argument. So, we extract a list of usersupplied
variables to be used for detecting vulnerable lines of code.
On the other side, as vulnerability could spread among the variables
like by multi-level assignment, we also try to extract the hidden usersupplied
variables. We use the resulted list to decrease the false
positives of our method. Finally, as there exist some ways to prevent
the vulnerability of inclusion functions, we define also some patterns
to detect them and decrease our false positives.
Abstract: The objective of this study is to examine the validity of Wagner-s law and relationship between economic growth, population and export for Pakistan. The ARDL Bounds cointegration and ECM are utilized for long and short run equilibrium for the period of 1972-2007. Population has considerable role in an economy and exports are the main source to raise the GDP. With the increase in GDP, the government expenditures may or may not increase. The empirical results indicate that the Wagner-s Law does hold, as economic growth is significantly and positively correlated with government expenditures. However, population and exports have also significant and positive impact on government expenditures both in short and long run. The significant and negative coefficient of error correction term in ECM indicates that after a shock, the long rum equilibrium will again converge towards equilibrium about 70.82 percent within a year.
Abstract: South Africa is facing a crisis with not being able to produce enough graduates in the scarce skills areas to sustain economic growth. The crisis is fuelled by a school system that does not produce enough potential students with Mathematics, Accounting and Science. Since the introduction of the new school curriculum in 2008, there is no longer an option to take pure maths on a standard grade level. Instead, only two mathematical subjects are offered: pure maths (which is on par with higher grade maths) and mathematical literacy. It is compulsory to take one or the other. As a result, lees student finishes Grade 12 with pure mathematics every year. This national problem needs urgent attention if South Africa is to make any headway in critical skills development as mathematics is a gateway to scarce skills professions. Higher education institutions initiated several initiatives in an attempt to address the above, including preparatory courses, bridging programmes and extended curricula with foundation provisions. In view of the above, and government policy directives to broaden access in the scarce skills areas to increase student throughput, foundation provision was introduced for Commerce and Information Technology programmes at the Vaal Triangle Campus (VTC) of North-West University (NWU) in 2010. Students enrolling for extended programmes do not comply with the minimum prerequisites for the normal programmes. The question then arises as to whether these programmes have the intended impact? This paper reports the results of a two year longitudinal study, tracking the first year academic achievement of the two cohorts of enrolments since 2010. The results provide valuable insight into the structuring of an extended programme and its potential impact.
Abstract: There is a general feeling that Internet crime is an
advanced type of crime that has not yet infiltrated developing
countries like Uganda. The carefree nature of the Internet in which
anybody publishes anything at anytime poses a serious security threat
for any nation. Unfortunately, there are no formal records about this
type of crime for Uganda. Could this mean that it does not exist
there? The author conducted an independent research to ascertain
whether cyber crimes have affected people in Uganda and if so, to
discover where they are reported. This paper highlights the findings.
Abstract: The medical studies often require different methods
for parameters selection, as a second step of processing, after the
database-s designing and filling with information. One common
task is the selection of fields that act as risk factors using wellknown
methods, in order to find the most relevant risk factors and
to establish a possible hierarchy between them. Different methods
are available in this purpose, one of the most known being the
binary logistic regression. We will present the mathematical
principles of this method and a practical example of using it in the
analysis of the influence of 10 different psychiatric diagnostics
over 4 different types of offences (in a database made from 289
psychiatric patients involved in different types of offences).
Finally, we will make some observations about the relation
between the risk factors hierarchy established through binary
logistic regression and the individual risks, as well as the results of
Chi-squared test. We will show that the hierarchy built using the
binary logistic regression doesn-t agree with the direct order of risk
factors, even if it was naturally to assume this hypothesis as being
always true.
Abstract: A CFD software was employed to analyze the
characteristics of the flat round porous aerostatic bearings. The effects
of gap between the bearing and the guide way and the porosity of the
porous material on the load capacity of the bearing were studied. The
adequacy of the simulation model and the approach was verified. From
the parametric study, it is found that the depth of the flow path does not
influence the load capacity of the bearing; the load capacity of the
bearing will decrease if the thickness of the porous material increases
or the porous material protrudes above the bearing housing; the
variation of the chamfer at the edge of the bearing does not affect the
bearing load capacity. For a bearing with an air gap of 5μm and a
porosity of 0.1, the average load capacity and the pressure distribution
of the bearing are nearly unchanged no matter the bearing moves at a
constant or a varying speed.
Abstract: This paper describes the two stage control using a disturbance observer and a Kalman filter. The system feedback uses the estimated state when it controls the speed. After the change-over point, its feedback uses the controlled plant output when it controls the position. To change the system continually, a change-over point has to be determined pertinently, and the controlled plant input has to be adjusted by the addition of the appropriate value. The proposed method has noise-reduction effect. It changes the system continually, even if the controlled plant identification has the error. Although the conventional method needs a speed sensor, the proposed method does not need it. The proposed method has a superior robustness compared with the conventional two stage control.
Abstract: At any point of time, a power system operating
condition should be stable, meeting various operational criteria and it
should also be secure in the event of any credible contingency. Present
day power systems are being operated closer to their stability limits
due to economic and environmental constraints. Maintaining a stable
and secure operation of a power system is therefore a very important
and challenging issue. Voltage instability has been given much
attention by power system researchers and planners in recent years,
and is being regarded as one of the major sources of power system
insecurity. Voltage instability phenomena are the ones in which the
receiving end voltage decreases well below its normal value and does
not come back even after setting restoring mechanisms such as VAR
compensators, or continues to oscillate for lack of damping against the
disturbances. Reactive power limit of power system is one of the major
causes of voltage instability. This paper investigates the effects of
coordinated series capacitors (SC) with static VAR compensators
(SVC) on steady-state voltage stability of a power system. Also, the
influence of the presence of series capacitor on static VAR
compensator controller parameters and ratings required to stabilize
load voltages at certain values are highlighted.
Abstract: Micro droplet formation is considered as a growing
emerging area of research due to its wide-range application in
chemistry as well as biology. The mechanism of micro droplet
formation using two immiscible liquids running through a T-junction
has been widely studied.
We believe that the flow of these two immiscible phases can be of
greater important factor that could have an impact on out-flow
hydrodynamic behavior, the droplets generated and the size of the
droplets. In this study, the type of the capillary tubes used also
represents another important factor that can have an impact on the
generation of micro droplets.
The tygon capillary tubing with hydrophilic inner surface doesn't
allow regular out-flows due to the fact that the continuous phase
doesn't adhere to the wall of the capillary inner surface.
Teflon capillary tubing, presents better wettability than tygon
tubing, and allows to obtain steady and regular regimes of out-flow,
and the micro droplets are homogeneoussize.
The size of the droplets is directly dependent on the flows of the
continuous and dispersed phases. Thus, as increasing the flow of the
continuous phase, to flow of the dispersed phase stationary, the size
of the drops decreases. Inversely, while increasing the flow of the
dispersed phase, to flow of the continuous phase stationary, the size
of the droplet increases.
Abstract: Collateralized Debt Obligations are not as widely used
nowadays as they were before 2007 Subprime crisis. Nonetheless
there remains an enthralling challenge to optimize cash flows
associated with synthetic CDOs. A Gaussian-based model is used
here in which default correlation and unconditional probabilities of
default are highlighted. Then numerous simulations are performed
based on this model for different scenarios in order to evaluate the
associated cash flows given a specific number of defaults at different
periods of time. Cash flows are not solely calculated on a single
bought or sold tranche but rather on a combination of bought and
sold tranches. With some assumptions, the simplex algorithm gives
a way to find the maximum cash flow according to correlation of
defaults and maturities. The used Gaussian model is not realistic in
crisis situations. Besides present system does not handle buying or
selling a portion of a tranche but only the whole tranche. However the
work provides the investor with relevant elements on how to know
what and when to buy and sell.
Abstract: Today global warming, climate change and energy supply are of greater concern as it is widely realized that the planet earth does not provide an infinite capacity for absorbing human industrialization in the 21st century. The aim of this paper is to analyze upstream and downstream electricity production in selected case studies: a coal power plant, a pump system and a microwave oven covering and consumption to explore the position of energy efficiency in engineering sustainability. Collectively, the analysis presents energy efficiency as a major pathway towards sustainability that requires an inclusive and a holistic supply chain response in the engineering design process.
Abstract: In literatures, many researches proposed various
methods to reduce PAPR (Peak to Average Power Ratio). Among
those, DSI (Dummy Sequence Insertion) is one of the most attractive
methods for WiMAX systems because it does not require side
information transmitted along with user data. However, the
conventional DSI methods find dummy sequence by performing an
iterative procedure until achieving PAPR under a desired threshold.
This causes a significant delay on finding dummy sequence and also
effects to the overall performances in WiMAX systems. In this paper,
the new method based on DSI is proposed by finding dummy
sequence without the need of iterative procedure. The fast DSI
method can reduce PAPR without either delays or required side
information. The simulation results confirm that the proposed method
is able to carry out PAPR performances as similar to the other
methods without any delays. In addition, the simulations of WiMAX
system with adaptive modulations are also investigated to realize the
use of proposed methods on various fading schemes. The results
suggest the WiMAX designers to modify a new Signal to Noise Ratio
(SNR) criteria for adaptation.
Abstract: The speech signal conveys information about the
identity of the speaker. The area of speaker identification is
concerned with extracting the identity of the person speaking the
utterance. As speech interaction with computers becomes more
pervasive in activities such as the telephone, financial transactions
and information retrieval from speech databases, the utility of
automatically identifying a speaker is based solely on vocal
characteristic. This paper emphasizes on text dependent speaker
identification, which deals with detecting a particular speaker from a
known population. The system prompts the user to provide speech
utterance. System identifies the user by comparing the codebook of
speech utterance with those of the stored in the database and lists,
which contain the most likely speakers, could have given that speech
utterance. The speech signal is recorded for N speakers further the
features are extracted. Feature extraction is done by means of LPC
coefficients, calculating AMDF, and DFT. The neural network is
trained by applying these features as input parameters. The features
are stored in templates for further comparison. The features for the
speaker who has to be identified are extracted and compared with the
stored templates using Back Propogation Algorithm. Here, the
trained network corresponds to the output; the input is the extracted
features of the speaker to be identified. The network does the weight
adjustment and the best match is found to identify the speaker. The
number of epochs required to get the target decides the network
performance.
Abstract: Investment in a constructed facility represents a cost in
the short term that returns benefits only over the long term use of the
facility. Thus, the costs occur earlier than the benefits, and the owners
of facilities must obtain the capital resources to finance the costs of
construction. A project cannot proceed without an adequate
financing, and the cost of providing an adequate financing can be
quite large. For these reasons, the attention to the project finance is an
important aspect of project management. Finance is also a concern to
the other organizations involved in a project such as the general
contractor and material suppliers. Unless an owner immediately and
completely covers the costs incurred by each participant, these
organizations face financing problems of their own. At a more
general level, the project finance is the only one aspect of the general
problem of corporate finance. If numerous projects are considered
and financed together, then the net cash flow requirements constitute
the corporate financing problem for capital investment. Whether
project finance is performed at the project or at the corporate level
does not alter the basic financing problem .In this paper, we will first
consider facility financing from the owner's perspective, with due
consideration for its interaction with other organizations involved in a
project. Later, we discuss the problems of construction financing
which are crucial to the profitability and solvency of construction
contractors. The objective of this paper is to present the steps utilized
to determine the best combination of minimum project financing.
The proposed model considers financing; schedule and maximum net
area .The proposed model is called Project Financing and Schedule
Integration using Genetic Algorithms "PFSIGA". This model
intended to determine more steps (maximum net area) for any project
with a subproject. An illustrative example will demonstrate the
feature of this technique. The model verification and testing are put
into consideration.
Abstract: Due to the increasing and varying risks that economic units face with, derivative instruments gain substantial importance, and trading volumes of derivatives have reached very significant level. Parallel with these high trading volumes, researchers have developed many different models. Some are parametric, some are nonparametric. In this study, the aim is to analyse the success of artificial neural network in pricing of options with S&P 100 index options data. Generally, the previous studies cover the data of European type call options. This study includes not only European call option but also American call and put options and European put options. Three data sets are used to perform three different ANN models. One only includes data that are directly observed from the economic environment, i.e. strike price, spot price, interest rate, maturity, type of the contract. The others include an extra input that is not an observable data but a parameter, i.e. volatility. With these detail data, the performance of ANN in put/call dimension, American/European dimension, moneyness dimension is analyzed and whether the contribution of the volatility in neural network analysis make improvement in prediction performance or not is examined. The most striking results revealed by the study is that ANN shows better performance when pricing call options compared to put options; and the use of volatility parameter as an input does not improve the performance.
Abstract: In this paper, a tooth shape optimization method for
cogging torque reduction in Permanent Magnet (PM) motors is
developed by using the Reduced Basis Technique (RBT) coupled by
Finite Element Analysis (FEA) and Design of Experiments (DOE)
methods. The primary objective of the method is to reduce the
enormous number of design variables required to define the tooth
shape. RBT is a weighted combination of several basis shapes. The
aim of the method is to find the best combination using the weights
for each tooth shape as the design variables. A multi-level design
process is developed to find suitable basis shapes or trial shapes at
each level that can be used in the reduced basis technique. Each level
is treated as a separated optimization problem until the required
objective – minimum cogging torque – is achieved. The process is
started with geometrically simple basis shapes that are defined by
their shape co-ordinates. The experimental design of Taguchi method
is used to build the approximation model and to perform
optimization. This method is demonstrated on the tooth shape
optimization of a 8-poles/12-slots PM motor.
Abstract: In a particular case of behavioural model reduction by ANNs, a validity domain shortening has been found. In mechanics, as in other domains, the notion of validity domain allows the engineer to choose a valid model for a particular analysis or simulation. In the study of mechanical behaviour for a cantilever beam (using linear and non-linear models), Multi-Layer Perceptron (MLP) Backpropagation (BP) networks have been applied as model reduction technique. This reduced model is constructed to be more efficient than the non-reduced model. Within a less extended domain, the ANN reduced model estimates correctly the non-linear response, with a lower computational cost. It has been found that the neural network model is not able to approximate the linear behaviour while it does approximate the non-linear behaviour very well. The details of the case are provided with an example of the cantilever beam behaviour modelling.
Abstract: Since Cloud environment has appeared as the most powerful
keyword in the computing industry, the growth in VDI (Virtual Desktop
Infrastructure) became remarkable in domestic market. In recent years, with the trend
that mobile devices such as smartphones and pads spread so rapidly, the strengths of
VDI that allows people to access and perform business on the move along with
companies' office needs expedite more rapid spread of VDI.
In this paper, mobile OTP (One-Time Password) authentication method is proposed
to secure mobile device portability through rapid and secure authentication using
mobile devices such as mobile phones or pads, which does not require additional
purchase or possession of OTP tokens of users. To facilitate diverse and wide use of
Services in the future, service should be continuous and stable, and above all, security
should be considered the most important to meet advanced portability and user
accessibility, the strengths of VDI.