Abstract: South Africa is facing a crisis with not being able to produce enough graduates in the scarce skills areas to sustain economic growth. The crisis is fuelled by a school system that does not produce enough potential students with Mathematics, Accounting and Science. Since the introduction of the new school curriculum in 2008, there is no longer an option to take pure maths on a standard grade level. Instead, only two mathematical subjects are offered: pure maths (which is on par with higher grade maths) and mathematical literacy. It is compulsory to take one or the other. As a result, lees student finishes Grade 12 with pure mathematics every year. This national problem needs urgent attention if South Africa is to make any headway in critical skills development as mathematics is a gateway to scarce skills professions. Higher education institutions initiated several initiatives in an attempt to address the above, including preparatory courses, bridging programmes and extended curricula with foundation provisions. In view of the above, and government policy directives to broaden access in the scarce skills areas to increase student throughput, foundation provision was introduced for Commerce and Information Technology programmes at the Vaal Triangle Campus (VTC) of North-West University (NWU) in 2010. Students enrolling for extended programmes do not comply with the minimum prerequisites for the normal programmes. The question then arises as to whether these programmes have the intended impact? This paper reports the results of a two year longitudinal study, tracking the first year academic achievement of the two cohorts of enrolments since 2010. The results provide valuable insight into the structuring of an extended programme and its potential impact.
Abstract: There is a general feeling that Internet crime is an
advanced type of crime that has not yet infiltrated developing
countries like Uganda. The carefree nature of the Internet in which
anybody publishes anything at anytime poses a serious security threat
for any nation. Unfortunately, there are no formal records about this
type of crime for Uganda. Could this mean that it does not exist
there? The author conducted an independent research to ascertain
whether cyber crimes have affected people in Uganda and if so, to
discover where they are reported. This paper highlights the findings.
Abstract: In this paper a numerical simulation of electric and
hydrodynamic fields distribution in an electrofilter for dielectric
liquids cell is made. The simulation is made with the purpose to
determine the trajectory of particles that moves under the action of
external force in an electric and hydrodynamic field created inside of
an electrofilter for dielectric liquids. Particle trajectory is analyzed
for a dielectric liquid-solid particles suspension.
Abstract: The medical studies often require different methods
for parameters selection, as a second step of processing, after the
database-s designing and filling with information. One common
task is the selection of fields that act as risk factors using wellknown
methods, in order to find the most relevant risk factors and
to establish a possible hierarchy between them. Different methods
are available in this purpose, one of the most known being the
binary logistic regression. We will present the mathematical
principles of this method and a practical example of using it in the
analysis of the influence of 10 different psychiatric diagnostics
over 4 different types of offences (in a database made from 289
psychiatric patients involved in different types of offences).
Finally, we will make some observations about the relation
between the risk factors hierarchy established through binary
logistic regression and the individual risks, as well as the results of
Chi-squared test. We will show that the hierarchy built using the
binary logistic regression doesn-t agree with the direct order of risk
factors, even if it was naturally to assume this hypothesis as being
always true.
Abstract: Attachment theory focuses on the bond that develops between child and caretaker and the consequences that this bond has on the childs future relationships. Adolescents attempt to define their identity by experiencing various risky behaviors. The first aim of the study was whether risk taking behavior differs according to attachment styles. The second was to examine risk taking behavior differences according to gender. The third aim of this study was to examine attachment X gender interaction effect for risk taking behavior. And final was to investigate attachment styles differences according to gender. Data were collected from 218 participants (114 female and 104 male) who are university students. The results of this study showed that attachment styles differentiated by risk taking behavior and males had higher risk taking score than females. It was also found out that there was significant attachment X gender interaction effect for risk taking behavior. And finally, the results showed that attachment styles differentiated according to gender.KeywordsAttachment style, risk taking
Abstract: A CFD software was employed to analyze the
characteristics of the flat round porous aerostatic bearings. The effects
of gap between the bearing and the guide way and the porosity of the
porous material on the load capacity of the bearing were studied. The
adequacy of the simulation model and the approach was verified. From
the parametric study, it is found that the depth of the flow path does not
influence the load capacity of the bearing; the load capacity of the
bearing will decrease if the thickness of the porous material increases
or the porous material protrudes above the bearing housing; the
variation of the chamfer at the edge of the bearing does not affect the
bearing load capacity. For a bearing with an air gap of 5μm and a
porosity of 0.1, the average load capacity and the pressure distribution
of the bearing are nearly unchanged no matter the bearing moves at a
constant or a varying speed.
Abstract: Throughout the world, the Islamic way of banking and
financing is increasing. The same trend is also visible in Pakistan, where the Islamic banking sector is increasing in size and volume
each year. The question immediately arises as why the Pakistanis patronize the Islamic banking system? This study was carried out to
find whether following the Islamic rules in finance is the main factor for such selection or whether other factors such as customer service,
location, banking hour, physical facilities of the bank etc also have
importance. The study was carried by distributing questionnaire and
200 responses were collected from the clients of Islamic banks. The result showed that the service quality and other factors are as
important as following the Islamic rules for finance to retain old ustomers and catch new customers. The result is important and
Islamic banks can take actions accordingly to look after both the factors
Abstract: In this work, an organic compound 5,10,15,20-
Tetrakis(3,5-di-tertbutylphenyl)porphyrinatocopper(II) (TDTBPPCu)
is studied as an active material for thin film electronic devices. To
investigate the electrical properties of TDTBPPCu, junction of
TDTBPPCu with heavily doped n-Si and Al is fabricated.
TDTBPPCu film was sandwiched between Al and n-Si electrodes.
Various electrical parameters of TDTBPPCu are determined. The
current-voltage characteristics of the junction are nonlinear,
asymmetric and show rectification behavior, which gives the clue of
formation of depletion region. This behavior indicates the potential
of TDTBPPCu for electronics applications. The current-voltage and
capacitance-voltage techniques are used to find the different
electronic parameters.
Abstract: This paper describes the two stage control using a disturbance observer and a Kalman filter. The system feedback uses the estimated state when it controls the speed. After the change-over point, its feedback uses the controlled plant output when it controls the position. To change the system continually, a change-over point has to be determined pertinently, and the controlled plant input has to be adjusted by the addition of the appropriate value. The proposed method has noise-reduction effect. It changes the system continually, even if the controlled plant identification has the error. Although the conventional method needs a speed sensor, the proposed method does not need it. The proposed method has a superior robustness compared with the conventional two stage control.
Abstract: An ontology is widely used in many kinds of applications as a knowledge representation tool for domain knowledge. However, even though an ontology schema is well prepared by domain experts, it is tedious and cost-intensive to add instances into the ontology. The most confident and trust-worthy way to add instances into the ontology is to gather instances from tables in the related Web pages. In automatic populating of instances, the primary task is to find the most proper concept among all possible concepts within the ontology for a given table. This paper proposes a novel method for this problem by defining the similarity between the table and the concept using the overlap of their properties. According to a series of experiments, the proposed method achieves 76.98% of accuracy. This implies that the proposed method is a plausible way for automatic ontology population from Web tables.
Abstract: At any point of time, a power system operating
condition should be stable, meeting various operational criteria and it
should also be secure in the event of any credible contingency. Present
day power systems are being operated closer to their stability limits
due to economic and environmental constraints. Maintaining a stable
and secure operation of a power system is therefore a very important
and challenging issue. Voltage instability has been given much
attention by power system researchers and planners in recent years,
and is being regarded as one of the major sources of power system
insecurity. Voltage instability phenomena are the ones in which the
receiving end voltage decreases well below its normal value and does
not come back even after setting restoring mechanisms such as VAR
compensators, or continues to oscillate for lack of damping against the
disturbances. Reactive power limit of power system is one of the major
causes of voltage instability. This paper investigates the effects of
coordinated series capacitors (SC) with static VAR compensators
(SVC) on steady-state voltage stability of a power system. Also, the
influence of the presence of series capacitor on static VAR
compensator controller parameters and ratings required to stabilize
load voltages at certain values are highlighted.
Abstract: A Ground Control System (GCS), which controls Unmanned Aerial Vehicles (UAVs) and monitors their missionrelated data, is one of the major components of UAVs. In fact, some traditional GCSs were built on an expensive, complicated hardware infrastructure with workstations and PCs. In contrast, a GCS on a portable device – such as an Android phone or tablet – takes advantage of its light-weight hardware and the rich User Interface supported by the Android Operating System. We implemented that kind of GCS and called it Ground System Software (GSS) in this paper. In operation, our GSS communicates with UAVs or other GSS via TCP/IP connection to get mission-related data, visualizes it on the device-s screen, and saves the data in its own database. Our study showed that this kind of system will become a potential instrument in UAV-related systems and this kind of topic will appear in many research studies in the near future.
Abstract: The reluctance motor is an electric motor in which
torque is produced by the tendency of its moveable part to move to a
position where the inductance of the excited winding is maximized.
In this paper switched reluctance motors (SRMs) with two different
configurations(3-phase SRM with 4rotor poles and 6 stator poles, 4-
phase SRM with 6rotor poles and 8 stator poles) is designed by
RMxprt, and performance of them is analyzed. Efficiency and torque
of SRM for different configurations in full-load condition have been
presented. The results indicate that with correct choosing of motor
applications, maximum efficiency can be found.
Abstract: In this paper a combined feature selection method is
proposed which takes advantages of sample domain filtering,
resampling and feature subset evaluation methods to reduce
dimensions of huge datasets and select reliable features. This method
utilizes both feature space and sample domain to improve the process
of feature selection and uses a combination of Chi squared with
Consistency attribute evaluation methods to seek reliable features.
This method consists of two phases. The first phase filters and
resamples the sample domain and the second phase adopts a hybrid
procedure to find the optimal feature space by applying Chi squared,
Consistency subset evaluation methods and genetic search.
Experiments on various sized datasets from UCI Repository of
Machine Learning databases show that the performance of five
classifiers (Naïve Bayes, Logistic, Multilayer Perceptron, Best First
Decision Tree and JRIP) improves simultaneously and the
classification error for these classifiers decreases considerably. The
experiments also show that this method outperforms other feature
selection methods.
Abstract: Study of soil properties like field capacity (F.C.) and permanent wilting point (P.W.P.) play important roles in study of soil moisture retention curve. Although these parameters can be measured directly, their measurement is difficult and expensive. Pedotransfer functions (PTFs) provide an alternative by estimating soil parameters from more readily available soil data. In this investigation, 70 soil samples were collected from different horizons of 15 soil profiles located in the Ziaran region, Qazvin province, Iran. The data set was divided into two subsets for calibration (80%) and testing (20%) of the models and their normality were tested by Kolmogorov-Smirnov method. Both multivariate regression and artificial neural network (ANN) techniques were employed to develop the appropriate PTFs for predicting soil parameters using easily measurable characteristics of clay, silt, O.C, S.P, B.D and CaCO3. The performance of the multivariate regression and ANN models was evaluated using an independent test data set. In order to evaluate the models, root mean square error (RMSE) and R2 were used. The comparison of RSME for two mentioned models showed that the ANN model gives better estimates of F.C and P.W.P than the multivariate regression model. The value of RMSE and R2 derived by ANN model for F.C and P.W.P were (2.35, 0.77) and (2.83, 0.72), respectively. The corresponding values for multivariate regression model were (4.46, 0.68) and (5.21, 0.64), respectively. Results showed that ANN with five neurons in hidden layer had better performance in predicting soil properties than multivariate regression.
Abstract: Land use change, if not based on proper scientific
investigation affects other physical, chemical, and biological
properties of soil and leading to increased destruction and erosion. It
was imperative to study the effects of changing rangelands to
farmlands on some Soil quality indexes. Undisturbed soil samples
were collected from the depths of 0-10 and 10-30 centimeter in
pasture with good vegetation cover(GP), pasture with medium
vegetation cover(MP), abandoned dry land farming(ADF) and
degraded dry land farming(DDF) land uses in Ghareh Aghaj
watershed of Isfahan province. The results revealed that organic
matter(OM), cation exchange capacity(CEC) and available
potassium(AK) decreasing in the depth of 0-10 centimeter were 66.6,
38.8 and 70 percent and in the depth of 10-30 centimeter were 58,
61.4 and 83.5 percent respectively in DDF comparison with GP.
Concerning to the results, it seems that land use change can decrease
soil quality and increase soil degradation and lead in undesirable
consequences.
Abstract: Many new experimental films which were free from conventional movie forms have appeared since Nubellbak Movement in the late 1950s. Forty years after the movement started, on March 13th, 1995, on the 100th anniversary of the birth of film, the declaration called Dogme 95, was issued in Copenhagen, Denmark. It aimed to create a new style of avant-garde film, and showed a tendency toward being anti-Hollywood and anti-genre, which were against the highly popular Hollywood trend of movies based on large-scale investment. The main idea of Dogme 95 is the opposition to 'the writer's doctrine' that a film should be the artist's individual work and to 'the overuse of technology' in film. The key figures declared ten principles called 'Vow of Chastity', by which new movie forms were to be produced. Interview (2000), directed by Byunhyuk, was made in 2000, five years after Dogme 95 was declared. This movie was dedicated as the first Asian Dogme. This study will survey the relationship between Korean film and the Vow of Chastity through the Korean films released in theaters from a viewpoint of technology and content. It also will call attention to its effects on and significance to Korean film in modern society.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set of risks. This research aims to reinforce SC risk management by proposing an integrated approach. SC risks are identified and a risk index classification structure is created. Then we develop a SC risk assessment approach based on the analytic network process (ANP) and the VIKOR methods under the fuzzy environment where the vagueness and subjectivity are handled with linguistic terms parameterized by triangular fuzzy numbers. By using FANP, risks weights are calculated and then inserted to the FVIKOR to rank the SC members and find the most risky partner.
Abstract: The essence of the 21st century is knowledge economy. Knowledge has become the key resource of economic growth and social development. Construction industry is no exception. Because of the characteristic of complexity, project manager can't depend only on information management. The only way to improve the level of construction project management is to set up a kind of effective knowledge accumulation mechanism. This paper first introduced the IFC standard and the concept of ontology. Then put forward the construction method of the architectural engineering domain ontology based on IFC. And finally build up the concepts, properties and the relationship between the concepts of the ontology. The deficiency of this paper is also pointed out.