Abstract: Physics Education Research (PER) results have shown
that students do not achieve the expected level of competency in
understanding the concepts of different domains of Physics learning
when taught by the traditional teaching methods, the concepts of
Electricity and Magnetism (E&M) being one among them.
Simulation being one of the valuable instructional tools renders an
opportunity to visualize varied experiences with such concepts.
Considering the electric force concept which requires extensive use
of vector representations, we report here the outcome of the research
results pertaining to the student understanding of this concept and the
role of simulation in using vector representation. The simulation
platform provides a positive impact on the use of vector
representation.
The first stage of this study involves eliciting and analyzing
student responses to questions that probe their understanding of the
concept of electrostatic force and this is followed by four stages of
student interviews as they use the interactive simulations of electric
force in one dimension. Student responses to the questions are
recorded in real time using electronic pad. A validation test interview
is conducted to evaluate students' understanding of the electric force
concept after using interactive simulation. Results indicate lack of
procedural knowledge of the vector representation. The study
emphasizes the need for the choice of appropriate simulation and
mode of induction for learning.
Abstract: The Ising ferromagnet, consisting of magnetic spins, is
the simplest system showing phase transitions and critical phenomena
at finite temperatures. The Ising ferromagnet has played a central role
in our understanding of phase transitions and critical phenomena.
Also, the Ising ferromagnet explains the gas-liquid phase transitions
accurately. In particular, the Ising ferromagnet in a nonzero magnetic
field has been one of the most intriguing and outstanding unsolved
problems. We study analytically the partition function zeros in the
complex magnetic-field plane and the Yang-Lee edge singularity of
the infinite-range Ising ferromagnet in an external magnetic field.
In addition, we compare the Yang-Lee edge singularity of the
infinite-range Ising ferromagnet with that of the square-lattice Ising
ferromagnet in an external magnetic field.
Abstract: Text mining techniques are generally applied for
classifying the text, finding fuzzy relations and structures in data
sets. This research provides plenty text mining capabilities. One
common application is text classification and event extraction,
which encompass deducing specific knowledge concerning incidents
referred to in texts. The main contribution of this paper is the
clarification of a concept graph generation mechanism, which is based
on a text classification and optimal fuzzy relationship extraction.
Furthermore, the work presented in this paper explains the application
of fuzzy relationship extraction and branch and bound (BB) method
to simplify the texts.
Abstract: The research was conducted to empirically validate
the proposed maturity model of e-Government implementation,
composed of four dimensions, further specified by 54 success factors
as attributes. To do so, there are two steps were performed. First,
expert’s judgment was conducted to test its content validity. The
second, reliability study was performed to evaluate inter-rater
agreement by using Fleiss Kappa approach. The kappa statistic
(kappa coefficient) is the most commonly used method for testing the
consistency among raters. Fleiss Kappa was a generalization of
Kappa in extensions to the case of more than two raters (multiple
raters) with multi-categorical ratings. Our findings show that most
attributes of the proposed model were related to their corresponding
dimensions. According to our results, The percentage of agree
answers given by the experts was 73.69% in dimension A, 89.76% in
B, 81.5% in C and 60.37% in D. This means that more than half of
the attributes of each dimensions were appropriate or relevant to the
dimensions they were supposed to measure, while 85% of attributes
were relevant enough to their corresponding dimensions. Inter-rater
reliability coefficient also showed satisfactory result and interpreted
as substantial agreement among raters. Therefore, the proposed
model in this paper was valid and reliable to measure the maturity of
e-Government implementation.
Abstract: Reverse Logistics (RL) Network is considered as
complex and dynamic network that involves many stakeholders such
as: suppliers, manufactures, warehouse, retails and costumers, this
complexity is inherent in such process due to lack of perfect
knowledge or conflicting information. Ontologies on the other hand
can be considered as an approach to overcome the problem of sharing
knowledge and communication among the various reverse logistics
partners. In this paper we propose a semantic representation based on
hybrid architecture for building the Ontologies in ascendant way, this
method facilitates the semantic reconciliation between the
heterogeneous information systems that support reverse logistics
processes and product data.
Abstract: Recently, increasing the quality of experience (QoE) is
an important issue. Since performance degradation at cell edge
extremely reduces the QoE, several techniques are defined at
LTE/LTE-A standard to remove inter-cell interference (ICI). However,
the conventional techniques have disadvantage because there is a
trade-off between resource allocation and reliable communication.
The proposed scheme reduces the ICI more efficiently by using
channel state information (CSI) smartly. It is shown that the proposed
scheme can reduce the ICI with fewer resources.
Abstract: In this paper a new algorithm to generate random
simple polygons from a given set of points in a two dimensional
plane is designed. The proposed algorithm uses a genetic algorithm to
generate polygons with few vertices. A new merge algorithm is
presented which converts any two polygons into a simple polygon.
This algorithm at first changes two polygons into a polygonal chain
and then the polygonal chain is converted into a simple polygon. The
process of converting a polygonal chain into a simple polygon is
based on the removal of intersecting edges. The experiments results
show that the proposed algorithm has the ability to generate a great
number of different simple polygons and has better performance in
comparison to celebrated algorithms such as space partitioning and
steady growth.
Abstract: In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Abstract: Given a graph G. A cycle of G is a sequence of
vertices of G such that the first and the last vertices are the same.
A hamiltonian cycle of G is a cycle containing all vertices of G.
The graph G is k-ordered (resp. k-ordered hamiltonian) if for any
sequence of k distinct vertices of G, there exists a cycle (resp.
hamiltonian cycle) in G containing these k vertices in the specified
order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-
ordered. Thus the study of any graph being k-ordered (resp. k-ordered
hamiltonian) always starts with k = 4. Most studies about this topic
work on graphs with no real applications. To our knowledge, the
chordal ring families were the first one utilized as the underlying
topology in interconnection networks and shown to be 4-ordered.
Furthermore, based on our computer experimental results, it was
conjectured that some of them are 4-ordered hamiltonian. In this
paper, we intend to give some possible directions in proving the
conjecture.
Abstract: Testing the first year students of Informatics at the
University of Debrecen revealed that students start their tertiary
studies in programming with a low level of programming knowledge
and algorithmic skills. The possible reasons which lead the students
to this very unfortunate result were examined. The results of the test
were compared to the students’ results in the school leaving exams
and to their self-assessment values. It was found that there is only a
slight connection between the students’ results in the test and in the
school leaving exams, especially at intermediate level. Beyond this,
the school leaving exams do not seem to enable students to evaluate
their own abilities.
Abstract: An exploration of the related literature reveals that all
instruction methods aim at training autonomous learners. After the
turn of second language pedagogy toward learner-oriented strategies,
learners’ needs were more focused. Yet; the historical, social and
political aspects of learning were still neglected. The present study
investigates the notion of autonomous learning and explains its
various facets from a pedagogical point of view. Furthermore;
different elements, fields and scopes of autonomous learning will be
explored. After exploring different aspects of autonomy, it is
postulated that liberatory autonomy is highlighted since it not only
covers social autonomy but also reveals learners’ capabilities and
human potentials. It is also recommended that learners consider
different elements of autonomy such as motivation, knowledge,
confidence, and skills.
Abstract: Proof of controlling crack width is a basic condition
for securing suitable performance in serviceability limit state. The
cracking in concrete can occur at any time from the casting of time to
the years after the concrete has been set in place. Most codes struggle
with offering procedure for crack width calculation. There is lack in
availability of design charts for designers to compute crack width
with ease. The focus of the study is to utilize design charts and
parametric equations in calculating crack width with minimum error.
The paper contains a simplified procedure to calculate crack width
for reinforced concrete (RC) sections subjected to bending with axial
tensile force following the guidelines of Euro code [DS EN-1992-1-1
& DS EN-1992-1-2]. Numerical examples demonstrate the
application of the suggested procedure. Comparison with parallel
analytical tools supports the validity of result and show the
percentage deviation of crack width in both the procedures. The
technique is simple, user friendly and ready to evolve for a greater
spectrum of section sizes and materials.
Abstract: Cost of governance in Nigeria has become a challenge
to development and concern to practitioners and scholars alike in the
field of business and social science research. In the 2010 national
budget of NGN4.6 trillion or USD28.75billion for instance, only a
pantry sum of NGN1.8trillion or USD11.15billion was earmarked for
capital expenditure. Similarly, in 2013, out of a total national budget
of NGN4.92trillion or USD30.75billion, only the sum of
NGN1.50trllion or USD9.38billion was voted for capital expenditure.
Therefore, based on the data sourced from the Nigerian Office of
Statistics, Central bank of Nigeria Statistical Bulletin as well as from
the United Nations Development Programme, this study examined
the causes of high cost of governance in Nigeria. It found out that the
high cost of governance in the country is in the interest of the ruling
class, arising from their unethical behaviour – corrupt practices and
the poor management of public resources. As a result, the study
recommends the need to intensify the war against corruption and
mismanagement of public resources by government officials as
possible solution to overcome the high cost of governance in Nigeria.
This could be achieved by strengthening the constitutional powers of
the various anti-corruption agencies in the area of arrest, investigation
and prosecution of offenders without the interference of the executive
arm of government either at the local, state or federal level.
Abstract: There is decagram of strategic decisions of operations
and production/service management (POSM) within operational
research (OR) which must collate, namely: design, inventory, quality,
location, process and capacity, layout, scheduling, maintain ace, and
supply chain. This paper presents an architectural configuration
conceptual framework of a decagram of sets decisions in a form of
mathematical complete graph and abelian graph.
Mathematically, a complete graph is undirected (UDG), and
directed (DG) a relationship where every pair of vertices is
connected, collated, confluent, and holomorphic.
There has not been any study conducted which, however,
prioritizes the holomorphic sets which of POMS within OR field of
study. The study utilizes OR structured technique known as The
Analytic Hierarchy Process (AHP) analysis for organizing, sorting
and prioritizing(ranking) the sets within the decagram of POMS
according to their attribution (propensity), and provides an analysis
how the prioritization has real-world application within the 21st
century.
Abstract: This paper impart the design and testing of
Nanotechnology based sequential circuits using multiplexer
conservative QCA (MX-CQCA) logic gates, which is easily testable
using only two vectors. This method has great prospective in the
design of sequential circuits based on reversible conservative logic
gates and also smashes the sequential circuits implemented in
traditional gates in terms of testability. Reversible circuits are similar
to usual logic circuits except that they are built from reversible gates.
Designs of multiplexer conservative QCA logic based two vectors
testable double edge triggered (DET) sequential circuits in VHDL
language are also accessible here; it will also diminish intricacy in
testing side. Also other types of sequential circuits such as D, SR, JK
latches are designed using this MX-CQCA logic gate. The objective
behind the proposed design methodologies is to amalgamate
arithmetic and logic functional units optimizing key metrics such as
garbage outputs, delay, area and power. The projected MX-CQCA
gate outshines other reversible gates in terms of the intricacy, delay.
Abstract: Alkylated silicon nanocrystals (C11-SiNCs) were
prepared successfully by galvanostatic etching of p-Si(100) wafers
followed by a thermal hydrosilation reaction of 1-undecene in
refluxing toluene in order to extract C11-SiNCs from porous silicon.
Erbium trichloride was added to alkylated SiNCs using a simple
mixing chemical route. To the best of our knowledge, this is the first
investigation on mixing SiNCs with erbium ions (III) by this
chemical method. The chemical characterization of C11-SiNCs and
their mixtures with Er3+(Er/C11-SiNCs) were carried out using X-ray
photoemission spectroscopy (XPS). The optical properties of C11-
SiNCs and their mixtures with Er3+ were investigated using Raman
spectroscopy and photoluminescence (PL). The erbium mixed
alkylated SiNCs shows an orange PL emission peak at around 595
nm that originates from radiative recombination of Si. Er/C11-SiNCs
mixture also exhibits a weak PL emission peak at 1536 nm that
originates from the intra-4f transition in erbium ions (Er3+). The PL
peak of Si in Er/C11-SiNCs mixture is increased in the intensity up to
three times as compared to pure C11-SiNCs. The collected data
suggest that this chemical mixing route leads instead to a transfer of
energy from erbium ions to alkylated SiNCs.
Abstract: Developing young people’s employability is a key
policy issue for ensuring their successful transition to the labour
market and their access to career oriented employment. The youths of
today irrespective of their gender need to acquire the knowledge,
skills and attitudes that will enable them to create or find jobs as well
as cope with unpredictable labour market changes throughout their
working lives. In a study carried out to determine the influence of
gender on job-competencies requirements of chemical-based
industries and undergraduate-competencies acquisition by chemists
working in the industries, all chemistry graduates working in twenty
(20) chemical-based industries that were randomly selected from six
sectors of chemical-based industries in Lagos and Ogun States of
Nigeria were administered with Job-competencies required and
undergraduate-competencies acquired assessment questionnaire. The
data were analysed using means and independent sample t-test. The
findings revealed that the population of female chemists working in
chemical-based industries is low compared with the number of male
chemists; furthermore, job-competencies requirements are found not
to be gender biased while there is no significant difference in
undergraduate-competencies acquisition of male and female
chemists. This suggests that females should be given the same
opportunity of employment in chemical-based industries as their male
counterparts. The study also revealed the level of acquisition of
undergraduate competencies as related to the needs of chemicalbased
industries.
Abstract: In this study which has been conducted in Akçasu
Forest Range District of Devrek Forest Directorate; 3 methods (weed
control with labourer power, cover removal with Hitachi F20
Excavator, and weed control with agricultural equipment mounted on
a Ferguson 240S agriculture tractor) were utilized in weed control
efforts in regeneration of degraded oriental beech forests have been
compared. In this respect, 3 methods have been compared by
determining certain work hours and standard durations of unit areas
(1 hectare). For this purpose, evaluating the tasks made with human
and machine force from the aspects of duration, productivity and
costs, it has been aimed to determine the most productive method in
accordance with the actual ecological conditions of research field.
Within the scope of the study, the time studies have been conducted
for 3 methods used in weed control efforts. While carrying out those
studies, the performed implementations have been evaluated by
dividing them into business stages. Also, the actual data have been
used while calculating the cost accounts. In those calculations, the
latest formulas and equations which are also used in developed
countries have been utilized. The variance of analysis (ANOVA) was
used in order to determine whether there is any statistically
significant difference among obtained results, and the Duncan test
was used for grouping if there is significant difference. According to
the measurements and findings carried out within the scope of this
study, it has been found during living cover removal efforts in
regeneration efforts in demolished oriental beech forests that the
removal of weed layer in 1 hectare of field has taken 920 hours with
labourer force, 15.1 hours with excavator and 60 hours with an
equipment mounted on a tractor. On the other hand, it has been
determined that the cost of removal of living cover in unit area (1
hectare) was 3220.00 TL for labourer power, 1250 TL for excavator
and 1825 TL for equipment mounted on a tractor.
According to the obtained results, it has been found that the
utilization of excavator in weed control effort in regeneration of
degraded oriental beech regions under actual ecological conditions of
research field has been found to be more productive from both of
aspects of duration and costs. These determinations carried out
should be repeated in weed control efforts in degraded forest fields
with different ecological conditions, it is compulsory for finding the
most efficient weed control method. These findings will light the way
of technical staff of forestry directorate in determination of the most
effective and economic weed control method. Thus, the more actual
data will be used while preparing the weed control budgets, and there
will be significant contributions to national economy. Also the results of this and similar studies are very important for developing the policies for our forestry in short and long term.
Abstract: Systems Engineering plays a key role during industrial
product development of complex technical systems. The need for
systems engineers in industry is growing. But there is a gap between
the industrial need and the academic education. Normally the
academic education is focused on the domain specific design,
implementation and testing of technical systems. Necessary systems
engineering expertise like knowledge about requirements analysis,
product cost estimation, management or social skills are poorly
taught. Thus there is the need of new academic concepts for teaching
systems engineering skills. This paper presents a project-orientated
training concept to prepare students from different technical degree
programs for systems engineering activities. The training concept has
been initially implemented and applied in the industrial engineering
master program of the University of Applied Sciences Offenburg.
Abstract: In this paper, we present a robust algorithm to recognize extracted text from grocery product images captured by mobile phone cameras. Recognition of such text is challenging since text in grocery product images varies in its size, orientation,
style, illumination, and can suffer from perspective distortion.
Pre-processing is performed to make the characters scale and
rotation invariant. Since text degradations can not be appropriately
defined using well-known geometric transformations such
as translation, rotation, affine transformation and shearing, we
use the whole character black pixels as our feature vector.
Classification is performed with minimum distance classifier
using the maximum likelihood criterion, which delivers very
promising Character Recognition Rate (CRR) of 89%. We
achieve considerably higher Word Recognition Rate (WRR) of
99% when using lower level linguistic knowledge about product
words during the recognition process.