Abstract: The problem of psychologist training remains a key
priority in Armenia. During the Soviet period, the notion of a
psychologist was obscure not only in Armenia but also in other
Soviet republics. The breakup of the Soviet Union triggered a gradual
change in this area activating the cooperation with specialists from
other countries. The need for recovery from the psychological trauma
caused by the 1988 earthquake pushed forward the development of
practical psychology in Armenia. This phenomenon led to positive
changes in perception of and interest to a psychologist
profession.Armenian universities started designing special programs
for psychologists’ preparation. Armenian psychologists combined
their efforts in the field of training relevant specialists.
During the recent years, the Bologna educational system was
introduced in Armenia which led to implementation of education
quality improvement programs. Nevertheless, even today the issue of
psychologists’ training is not yet settled in Armenian universities. So
far graduate psychologists haven’t got a clear idea of personal and
professional qualities of a psychologist. Recently, as a result of
educational reforms, the psychology curricula underwent changes,
but so far they have not led to a desired outcome. Almost all curricula
in certain specialties are aimed to form professional competencies
and strengthen practical skills.
A survey conducted in Armenia aimed to identify what are the
ideas of young psychology specialists on the image of a psychologist.
The survey respondents were 45 specialists holding bachelor’s degree
as well as 30 master degree graduates, who have not been working
yet. The research reveals that we need to change the approach of
preparing psychology practitioners in the universities of Armenia.
Such an approach to psychologist training will make it possible to
train qualified specialists for enhancement of modern psychology
theory and practice.
Abstract: Early pre-code reinforced concrete structures present
undetermined resistance to earthquakes. This situation is particularly
unacceptable in the case of essential structures, such as healthcare
structures and pilgrims' houses. Amongst these, an existing old RC
building in Madinah city (KSA) is seismically evaluated with and
without infill wall and their dynamic characteristics are compared
with measured values in the field using ambient vibration
measurements (AVM). After updating the mathematical models for
this building with the experimental results, three dimensional
pushover analysis (Nonlinear static analysis) was carried out using
commercial structural analysis software incorporating inelastic
material properties for concrete, infill and steel. The purpose of this
analysis is to evaluate the expected performance of structural systems
by estimating, strength and deformation demands in design, and
comparing these demands to available capacities at the performance
levels of interest. The results summarized and discussed.
Abstract: A capacity spectrum method (CSM), one of methodologies to evaluate seismic fragilities of building structures, has been long recognized as the most convenient method, even if it contains several limitations to predict the seismic response of structures of interest. This paper proposes the procedure to estimate seismic fragility curves using an incremental dynamic analysis (IDA) rather than the method adopting a CSM. To achieve the research purpose, this study compares the seismic fragility curves of a 5-story reinforced concrete (RC) moment frame obtained from both methods; an IDA method and aCSM. Both seismic fragility curves are similar in slight and moderate damage states whereas the fragility curve obtained from the IDA method presents less variation (or uncertainties) in extensive and complete damage states. This is due to the fact that the IDA method can properly capture the structural response beyond yielding rather than the CSM and can directly calculate higher mode effects. From these observations, the CSM could overestimate seismic vulnerabilities of the studied structure in extensive or complete damage states.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: Welfare may be considered to be a subjective
experience; it has a biological function that is related to the fitness
and survival of the animal accordingly, researches have suggested
that welfare is compromised when the animal's evolutionary fitness is
reduced. This study was carried out to explain the effect of some
managerial stressors as handling and restraint on behavioral patterns
and biochemical parameters of rats. A total of 24 (12 males & 12
females) Sprague-Dawley rats (12 months & 150-180g) were allotted
into 3 groups, handled group (4 male & 4 female), restrained group (4
male & 4 female) and control group (4 males & 4 females).
The obtained results revealed that time spent feeding, drinking,
movement and cage exploration frequencies increased significantly in
handled rats than other groups, while lying time and licking increased
significantly in restrained rats than handled and controls. Moreover,
social behavior decreased in both stressed groups than control.
Triglycerides were significantly increased in handled rats than
other groups, while total lipid, total protein and globulin significantly
increased in both treated groups than control. Corticosterone
increased in restrained and handled rats than control ones. Moreover,
there was an increment in packed cell volume significantly in
restrained rats than others. These deducted that if we want to study
the effect of stress on animal welfare it is necessary to study the
effect of such stressors on animal’s behavior and physiological
responses.
Abstract: This paper focuses on the assessment of the air
pollution and morbidity relationship in Tunisia. Air pollution is
measured by ozone air concentration and the morbidity is measured
by the number of respiratory-related restricted activity days during
the 2-week period prior to the interview. Socioeconomic data are also
collected in order to adjust for any confounding covariates. Our
sample is composed by 407 Tunisian respondents; 44.7% are women,
the average age is 35.2, near 69% are living in a house built after
1980, and 27.8% have reported at least one day of respiratory-related
restricted activity. The model consists on the regression of the
number of respiratory-related restricted activity days on the air
quality measure and the socioeconomic covariates. In order to correct
for zero-inflation and heterogeneity, we estimate several models
(Poisson, negative binomial, zero inflated Poisson, Poisson hurdle,
negative binomial hurdle and finite mixture Poisson models).
Bootstrapping and post-stratification techniques are used in order to
correct for any sample bias. According to the Akaike information
criteria, the hurdle negative binomial model has the greatest goodness
of fit. The main result indicates that, after adjusting for
socioeconomic data, the ozone concentration increases the probability
of positive number of restricted activity days.
Abstract: Karst term is the determiner of a variety of areas or
landforms and unique perspectives that have been formed in result of
the of the ingredients dissolution of rocks constituter by natural
waters. Shiraz area with an area of 5322km2 is located in the simple
folded belt in the southern part of Zagros Mountain of Fars, and is
surrounded with Limestone Mountains (Asmari formation). Shiraz
area is located in Calcareous areas. The infrastructure of this city is
lime and absorbing wells that the city can influence the Limestone
dissolution and those accelerate its rate and increase the cavitation
below the surface. Dasht-e Arjan is a graben, which has been created
as the result of activity of two normal faults in its east and west sides.
It is a complete sample of Karst plains (Polje) which has been created
with the help of tectonic forces (fault) and dissolution process of
water in Asmari limestone formation. It is located 60km. off south
west of Shiraz (on Kazeroon-Shiraz road). In 1971, UNESCO has
recognized this plain as a reserve of biosphere. It is considered as one
of the world’s most beautiful geological phenomena, so that most of
the world’s geologists are interested in visiting this place. The
purpose of this paper is to identify and introduce landscapes of Karst
features shiraz city and Dasht-e Arjan including Karst dissolution
features (Lapiez, Karst springs, dolines, caves, underground caves,
ponors, and Karst valleys), anticlines and synclines, and Arjan Lake.
Abstract: Examining existing experimental results for shallow
rigid foundations subjected to vertical centric load (N), accompanied
or not with a bending moment (M), two main non-linear mechanisms
governing the cyclic response of the soil-foundation system can be
distinguished: foundation uplift and soil yielding. A soil-foundation
failure limit, is defined as a domain of resistance in the two
dimensional (2D) load space (N, M) inside of which lie all the
admissible combinations of loads; these latter correspond to a pure
elastic, non-linear elastic or plastic behavior of the soil-foundation
system, while the points lying on the failure limit correspond to a
combination of loads leading to a failure of the soil-foundation
system. In this study, the proposed resistance domain is constructed
analytically based on mechanics. Original elastic limit, uplift
initiation limit and iso-uplift limits are constructed inside this
domain. These limits give a prediction of the mechanisms activated
for each combination of loads applied to the foundation. A
comparison of the proposed failure limit with experimental tests
existing in the literature shows interesting results. Also, the
developed uplift initiation limit and iso-uplift curves are confronted
with others already proposed in the literature and widely used due to
the absence of other alternatives, and remarkable differences are
noted, showing evident errors in the past proposals and relevant
accuracy for those given in the present work.
Abstract: Locating Radio Controlled (RC) devices using their
unintended emissions has a great interest considering security
concerns. Weak nature of these emissions requires near field
localization approach since it is hard to detect these signals in far
field region of array. Instead of only angle estimation, near field
localization also requires range estimation of the source which makes
this method more complicated than far field models. Challenges of
locating such devices in a near field region and real time environment
are analyzed in this paper. An ESPRIT like near field localization
scheme is utilized for both angle and range estimation. 1-D search
with symmetric subarrays is provided. Two 7 element uniform linear
antenna arrays (ULA) are employed for locating RC source.
Experiment results of location estimation for one unintended emitting
walkie-talkie for different positions are given.
Abstract: Cost of governance in Nigeria has become a challenge
to development and concern to practitioners and scholars alike in the
field of business and social science research. In the 2010 national
budget of NGN4.6 trillion or USD28.75billion for instance, only a
pantry sum of NGN1.8trillion or USD11.15billion was earmarked for
capital expenditure. Similarly, in 2013, out of a total national budget
of NGN4.92trillion or USD30.75billion, only the sum of
NGN1.50trllion or USD9.38billion was voted for capital expenditure.
Therefore, based on the data sourced from the Nigerian Office of
Statistics, Central bank of Nigeria Statistical Bulletin as well as from
the United Nations Development Programme, this study examined
the causes of high cost of governance in Nigeria. It found out that the
high cost of governance in the country is in the interest of the ruling
class, arising from their unethical behaviour – corrupt practices and
the poor management of public resources. As a result, the study
recommends the need to intensify the war against corruption and
mismanagement of public resources by government officials as
possible solution to overcome the high cost of governance in Nigeria.
This could be achieved by strengthening the constitutional powers of
the various anti-corruption agencies in the area of arrest, investigation
and prosecution of offenders without the interference of the executive
arm of government either at the local, state or federal level.
Abstract: In this article, we have elaborated a study over the
nature of financial intermediation in Islamic banks by comparison to
those of conventional ones. We have found a striking difference
between two kinds of intermediation. We tried, from another side, to
study the relationship between the capital level and deficiency risk
relying on econometric model, and we have obtained a positive and
significant relation between the capital and the deficiency risk for the
conventional banks. This means that when the capital of these banks
increases, the deficiency risk increases as well. In return, since the
Islamic banks are constrained to respect the Sharia Committee as well
as customers’ demands that may, in certain contracts, choose to
invest their capitals in projects they are interested in. These
constraints have as effects to reduce the deficiency risk even when
the capital increases.
Abstract: This paper presents optimization of makespan for ‘n’
jobs and ‘m’ machines flexible job shop scheduling problem with
sequence dependent setup time using genetic algorithm (GA)
approach. A restart scheme has also been applied to prevent the
premature convergence. Two case studies are taken into
consideration. Results are obtained by considering crossover
probability (pc = 0.85) and mutation probability (pm = 0.15). Five
simulation runs for each case study are taken and minimum value
among them is taken as optimal makespan. Results indicate that
optimal makespan can be achieved with more than one sequence of
jobs in a production order.
Abstract: In this study which has been conducted in Akçasu
Forest Range District of Devrek Forest Directorate; 3 methods (weed
control with labourer power, cover removal with Hitachi F20
Excavator, and weed control with agricultural equipment mounted on
a Ferguson 240S agriculture tractor) were utilized in weed control
efforts in regeneration of degraded oriental beech forests have been
compared. In this respect, 3 methods have been compared by
determining certain work hours and standard durations of unit areas
(1 hectare). For this purpose, evaluating the tasks made with human
and machine force from the aspects of duration, productivity and
costs, it has been aimed to determine the most productive method in
accordance with the actual ecological conditions of research field.
Within the scope of the study, the time studies have been conducted
for 3 methods used in weed control efforts. While carrying out those
studies, the performed implementations have been evaluated by
dividing them into business stages. Also, the actual data have been
used while calculating the cost accounts. In those calculations, the
latest formulas and equations which are also used in developed
countries have been utilized. The variance of analysis (ANOVA) was
used in order to determine whether there is any statistically
significant difference among obtained results, and the Duncan test
was used for grouping if there is significant difference. According to
the measurements and findings carried out within the scope of this
study, it has been found during living cover removal efforts in
regeneration efforts in demolished oriental beech forests that the
removal of weed layer in 1 hectare of field has taken 920 hours with
labourer force, 15.1 hours with excavator and 60 hours with an
equipment mounted on a tractor. On the other hand, it has been
determined that the cost of removal of living cover in unit area (1
hectare) was 3220.00 TL for labourer power, 1250 TL for excavator
and 1825 TL for equipment mounted on a tractor.
According to the obtained results, it has been found that the
utilization of excavator in weed control effort in regeneration of
degraded oriental beech regions under actual ecological conditions of
research field has been found to be more productive from both of
aspects of duration and costs. These determinations carried out
should be repeated in weed control efforts in degraded forest fields
with different ecological conditions, it is compulsory for finding the
most efficient weed control method. These findings will light the way
of technical staff of forestry directorate in determination of the most
effective and economic weed control method. Thus, the more actual
data will be used while preparing the weed control budgets, and there
will be significant contributions to national economy. Also the results of this and similar studies are very important for developing the policies for our forestry in short and long term.
Abstract: In order to manufacture short gap single Si nanowire
(NW) field effect transistor (FET) by imprinting and transferring
method, we introduce the method using Al2O3 sacrificial layer. The
diameters of cylindrical Si NW addressed between Au electrodes by
dielectrophoretic (DEP) alignment method are controlled to 106, 128,
and 148 nm. After imprinting and transfer process, cylindrical Si NW
is embedded in PVP adhesive and dielectric layer. By curing
transferred cylindrical Si NW and Au electrodes on PVP-coated p++ Si
substrate with 200nm-thick SiO2, 3μm gap Si NW FET fabrication
was completed. As the diameter of embedded Si NW increases, the
mobility of FET increases from 80.51 to 121.24 cm2/V·s and the
threshold voltage moves from –7.17 to –2.44 V because the ratio of
surface to volume gets reduced.
Abstract: In this study, we are interested in a species of the
family of Asteraceae (Tagetes erecta). This family is considered as a
source of antimicrobial extracts with strong capacity. The extraction
of the flavonoids is carried out by the method of liquid/liquid with the
use of successive solvents. Afterwards, we evaluated the biological
activity of the flavonoids on five pathogenic bacterial stocks such as
Escherichia coli, Bacillus subtilis, Klebsiella pneumoniae,
Pseudomonas aeruginosa and Staphylococcus aureus and two stocks
of yeasts to knowing Candida albicans) and Saccharomyces
cerevisiae, by employing the method of the aromatogramme starting
from a solid disc. The result of the antimicrobial activity shows an
action and a variable degree of sensitivity according to bacterial
stocks tested. It will be noted that the flavonoids have an inhibiting
effect on E. coli, B. subtilis, K. pneumoniae and S. aureus. But a
resistance with respect to the extract by P. aeruginosa, C. albicans
and S. cerevisiae is to be mentioned.
Abstract: The IEEE 802.22 working group aims to drive the
Digital Video Broadcasting-Terrestrial (DVB-T) bands for data
communication to the rural area without interfering the TV broadcast.
In this paper, we arrive at a closed-form expression for average
detection probability of Fusion center (FC) with multiple antenna
over the κ − μ fading channel model. We consider a centralized
cooperative multiple antenna network for reporting. The DVB-T
samples forwarded by the secondary user (SU) were combined using
Maximum ratio combiner at FC, an energy detection is performed
to make the decision. The fading effects of the channel degrades
the detection probability of the FC, a generalized independent and
identically distributed (IID) κ − μ and an additive white Gaussian
noise (AWGN) channel is considered for reporting and sensing
respectively. The proposed system performance is verified through
simulation results.
Abstract: At present, the evaluation of voltage stability
assessment experiences sizeable anxiety in the safe operation of
power systems. This is due to the complications of a strain power
system. With the snowballing of power demand by the consumers
and also the restricted amount of power sources, therefore, the system
has to perform at its maximum proficiency. Consequently, the
noteworthy to discover the maximum ability boundary prior to
voltage collapse should be undertaken. A preliminary warning can be
perceived to evade the interruption of power system’s capacity. The
effectiveness of line voltage stability indices (LVSI) is differentiated
in this paper. The main purpose of the indices used is to predict the
proximity of voltage instability of the electric power system. On the
other hand, the indices are also able to decide the weakest load buses
which are close to voltage collapse in the power system. The line
stability indices are assessed using the IEEE 14 bus test system to
validate its practicability. Results demonstrated that the implemented
indices are practically relevant in predicting the manifestation of
voltage collapse in the system. Therefore, essential actions can be
taken to dodge the incident from arising.
Abstract: Near infrared (NIR) spectroscopy has always been of
great interest in the food and agriculture industries. The development
of prediction models has facilitated the estimation process in recent
years. In this study, 110 crude palm oil (CPO) samples were used to
build a free fatty acid (FFA) prediction model. 60% of the collected
data were used for training purposes and the remaining 40% used for
testing. The visible peaks on the NIR spectrum were at 1725 nm and
1760 nm, indicating the existence of the first overtone of C-H bands.
Principal component regression (PCR) was applied to the data in
order to build this mathematical prediction model. The optimal
number of principal components was 10. The results showed
R2=0.7147 for the training set and R2=0.6404 for the testing set.
Abstract: Safety is one of the most important considerations
when buying a new car. While active safety aims at avoiding
accidents, passive safety systems such as airbags and seat belts
protect the occupant in case of an accident. In addition to legal
regulations, organizations like Euro NCAP provide consumers with
an independent assessment of the safety performance of cars and
drive the development of safety systems in automobile industry.
Those ratings are mainly based on injury assessment reference values
derived from physical parameters measured in dummies during a car
crash test.
The components and sub-systems of a safety system are designed
to achieve the required restraint performance. Sled tests and other
types of tests are then carried out by car makers and their suppliers
to confirm the protection level of the safety system. A Knowledge
Discovery in Databases (KDD) process is proposed in order to
minimize the number of tests. The KDD process is based on the
data emerging from sled tests according to Euro NCAP specifications.
About 30 parameters of the passive safety systems from different data
sources (crash data, dummy protocol) are first analysed together with
experts opinions. A procedure is proposed to manage missing data
and validated on real data sets. Finally, a procedure is developed to
estimate a set of rough initial parameters of the passive system before
testing aiming at reducing the number of tests.