Abstract: Computer education is referred to as the knowledge
and ability to use computers and related technology efficiently, with a
range of skills covering levels from basic use to advance. Computer
continues to make an ever-increasing impact on all aspect of human
endeavours such as education. With numerous benefits of computer
education, what are the insights of students on computer education?
This study investigated the perception of senior secondary school
students on computer education in Federal Capital Territory (FCT),
Abuja, Nigeria. A sample of 7500 senior secondary schools students
was involved in the study, one hundred (100) private and fifty (50)
public schools within FCT. They were selected by using simple
random sampling technique. A questionnaire [PSSSCEQ] was
developed and validated through expert judgement and reliability coefficient
of 0.84 was obtained. It was used to gather relevant data on
computer education. Findings confirmed that the students in the FCT
had positive perception on computer education. Some factors were
identified that affect students’ perception on computer education. The
null hypotheses were tested using t-test and ANOVA statistical
analyses at 0.05 level of significance. Based on these findings, some
recommendations were made which include competent teachers
should be employed into all secondary schools. This will help
students to acquire relevant knowledge in computer education,
technological supports should be provided to all secondary schools;
this will help the users (students) to solve specific problems in
computer education and financial supports should be provided to
procure computer facilities that will enhance the teaching and the
learning of computer education.
Abstract: Issues relating to the destructive phenomena that can
damage people and goods have returned to the centre of debate in
Italy with the increase in catastrophic episodes in recent years in a
country which is highly vulnerable to hydrological risk.
Environmental factors and geological and geomorphological
territorial characteristics play an important role in determining the
level of vulnerability and the natural tendency to risk. However, a
territory has also been subjected to the requirements of and
transformations of society and this brings other relevant factors. The
reasons for the increase in destructive phenomena are often to be
found in the territorial development models adopted. Stewardship of
the landscape and management of risk are related issues. This study aims to summarize the most relevant elements about
this connection and at the same time to clarify the role of
environmental risk assessment as a tool to aid in the sustainable
management of landscape. Finally, the study reflects on how regional
and urban planners deal with environmental risk and which aspects
should be monitored in order to adopt responsible and useful
interventions.
Abstract: The aim of this work is to study the numerical
implementation of the Hilbert Uniqueness Method for the exact
boundary controllability of Euler-Bernoulli beam equation. This study
may be difficult. This will depend on the problem under consideration
(geometry, control and dimension) and the numerical method used.
Knowledge of the asymptotic behaviour of the control governing the
system at time T may be useful for its calculation. This idea will
be developed in this study. We have characterized as a first step, the
solution by a minimization principle and proposed secondly a method
for its resolution to approximate the control steering the considered
system to rest at time T.
Abstract: The aim of this paper is to introduce the notion of
intuitionistic fuzzy positive implicative ideals with thresholds (λ, μ) of
BCI-algebras and to investigate its properties and characterizations.
Abstract: Green and renewable energy is getting extraordinary
consideration today, because of ecological concerns made by blazing
of fossil powers. Photovoltaic and wind power generation are the
basic decisions for delivering power in this respects. Producing
power by the sun based photovoltaic systems is known to the world,
yet control makers may get confounded to pick between on-grid and
off-grid systems. In this exploration work, an endeavor is made to
compare the off-grid (stand-alone) and on-grid (grid-connected)
frameworks. The work presents relative examination, between two
distinctive PV frameworks situated at V.V.P. Engineering College,
Rajkot. The first framework is 100 kW remain solitary and the
second is 60 kW network joined. The real-time parameters compared
are; output voltage, load current, power in-flow, power output,
performance ratio, yield factor, and capacity factor. The voltage
changes and the power variances in both frameworks are given
exceptional consideration and the examination is made between the
two frameworks to judge the focal points and confinements of both
the frameworks.
Abstract: The increase in electric power demand in face of
environmental issues has intensified the participation of renewable
energy sources such as photovoltaics, in the energy matrix of various
countries. Due to their operational characteristics, they can generate
time-varying harmonic and inter-harmonic distortions. For this
reason, the application of methods of measurement based on
traditional Fourier analysis, as proposed by IEC 61000-4-7, can
provide inaccurate results. Considering the aspects mentioned herein,
came the idea of the development of this work which aims to present
the results of a comparative evaluation between a methodology
arising from the combination of the Prony method with the Kalman
filter and another method based on the IEC 61000-4-30 and IEC
61000-4-7 standards. Employed in this study were synthetic signals
and data acquired through measurements in a 50kWp photovoltaic
installation.
Abstract: Dengue is a mosquito-borne viral disease endemic in
many countries in the tropics and sub-tropics. The state of Punjab in
India shows cyclical and seasonal variation in dengue cases. The
Case Fatality Rate of Dengue has ranged from 0.6 to 1.0 in the past
years. The department has initiated review of the cases that have died
due to dengue in order to know the exact cause of the death in a case
of dengue. The study has been undertaken to know the other
associated co-morbidities and factors causing death in a case of
dengue. The study used the predesigned proforma on which the
records (medical and Lab) were recorded and reviewed by the expert
committee of the doctors. This study has revealed that cases of
dengue having co-morbidities have longer stay in hospital. Fluid
overload and co-morbidities have been found as major factors leading
to death, however, in a confirmed case of dengue hepatorenal
shutdown was found to be major cause of mortality. The data
obtained will help in sensitizing the treating physicians in order to
decrease the mortality due to dengue in future.
Abstract: This paper deals with using of prevailing operation
system MS Office (SmartArt...) for mathematical models, using
DYVELOP (Dynamic Vector Logistics of Processes) method. It
serves for crisis situations investigation and modelling within the
organizations of critical infrastructure. In first part of paper, it will be
introduced entities, operators, and actors of DYVELOP method. It
uses just three operators of Boolean algebra and four types of the
entities: the Environments, the Process Systems, the Cases, and the
Controlling. The Process Systems (PrS) have five “brothers”:
Management PrS, Transformation PrS, Logistic PrS, Event PrS and
Operation PrS. The Cases have three “sisters”: Process Cell Case,
Use Case, and Activity Case. They all need for the controlling of
their functions special Ctrl actors, except ENV – it can do without
Ctrl. Model´s maps are named the Blazons and they are able
mathematically - graphically express the relationships among entities,
actors and processes. In second part of this paper, the rich blazons of
DYVELOP method will be used for the discovering and modelling of
the cycling cases and their phases. The blazons need live PowerPoint
presentation for better comprehension of this paper mission. The
crisis management of energetic crisis infrastructure organization is
obliged to use the cycles for successful coping of crisis situations.
Several times cycling of these cases is necessary condition for the
encompassment for both emergency events and the mitigation of
organization´s damages. Uninterrupted and continuous cycling
process brings for crisis management fruitfulness and it is good
indicator and controlling actor of organizational continuity and its
sustainable development advanced possibilities. The research reliable
rules are derived for the safety and reliable continuity of energetic
critical infrastructure organization in the crisis situation.
Abstract: Customer’ needs, quality, and value creation while
reducing costs through supply chain management provides challenges
and opportunities for companies and researchers. In the light of these
challenges, modern ideas must contribute to counter these challenges
and exploit opportunities. Therefore, this paper discusses the impact
of the quality cost on revenue sharing as a most important incentive
to configure business networks. This paper develops the quality cost approach to align with the
modern era. It develops a model to measure quality costs which
might enable firms to manage revenue sharing in a supply chain. The
developed model includes five categories; besides the well-known
four categories (namely prevention costs, appraisal costs, internal
failure costs, and external failure costs), a new category has been
developed in this research as a new vision of the relationship between
quality costs and innovations in industry. This new category is
Recycle Cost. This paper also examines whether such quality costs in
supply chains influence the revenue sharing between partners. Using the author's quality cost model, the relationship between
quality costs and revenue sharing among partners is examined using a
case study in an Egyptian manufacturing company which is a part of
a supply chain. This paper argues that the revenue-sharing proportion
allocated to supplier increases as the recycle cost of supplier
increases, and the revenue-sharing proportion allocated to
manufacturer increases as the prevention and appraisal costs increase,
as well as the failure costs, the recycle costs of manufacturer, and the
recycle costs of suppliers decrease. However, the results present
surprising findings. The purposes of this study are developing quality cost approach
and understanding the relationships between quality costs and
revenue sharing in supply chains. Therefore, the present study
contributes to theory and practice by explaining how the cost of
recycling can be combined in quality cost model to better
understanding the revenue sharing among partners in supply chains.
Abstract: Rivers have transient storage or dead zones where
injected pollutants or solutes are entrapped for considerable period of
time, known as residence time, before being released into the main
flowing zones of rivers. In this study, a new empirical expression for
residence time, implementing genetic programming on published
dispersion data, has been derived. The proposed expression uses few
hydraulic and geometric characteristics of rivers which are normally
known to the authorities. When compared with some reported
expressions, based on various statistical indices, it can be concluded
that the proposed expression predicts the residence time of pollutants
in natural rivers more accurately.
Abstract: The article deals with the personality of military
professionals (commanders) and their way of leading and
commanding today and in historical context. The first part focuses on
the leadership skills of Alexander the Great, who introduced strategic
innovations and even from today's perspective; he excelled in
efficient work with people. This paper focuses on the way which he
achieved his goals. Further attention is paid to approaches to
commander´s personality by other great generals. The paper is also
focused on personality traits of military professionals necessary for
successful management and leadership in today's variable and
challenging environment. Finally, attention is paid to the effective
and ineffective ways of behavior of commanders and determining
what styles of leadership is appropriate for a given situation, whether
in peacetime or on deployment.
Abstract: Increase of emergency incidents and crisis situations
requires proactive crisis management of authorities and for its
solution. Application Business Continuity Management helps the
crisis management authorities to quickly and responsibly respond to
threats. It also helps effectively and efficiently planning powers and
resources. The main goal of this article is describing Military
Continuity Management System (MCMS) based on the principles of
Business Continuity Management System (BCMS) for dealing with
floods in the territory of the selected municipalities. There are
explained steps of loading, running and evaluating activities in the
software application MCMS. Software MCMS provides complete
control over the tasks, contribute a comprehensive and responsible
approach solutions to solution floods in the municipality.
Abstract: This paper introduces a signal monitoring program
developed with a view to helping electrical engineering students get
familiar with sensors with digital output. Because the output of digital
sensors cannot be simply monitored by a measuring instrument such as
an oscilloscope, students tend to have a hard time dealing with digital
sensors. The monitoring program runs on a PC and communicates with
an MCU that reads the output of digital sensors via an asynchronous
communication interface. Receiving the sensor data from the MCU,
the monitoring program shows time and/or frequency domain plots of
the data in real time. In addition, the monitoring program provides a
serial terminal that enables the user to exchange text information with
the MCU while the received data is plotted. The user can easily
observe the output of digital sensors and configure the digital sensors
in real time, which helps students who do not have enough experiences
with digital sensors. Though the monitoring program was programmed
in the Matlab programming language, it runs without the Matlab since
it was compiled as a standalone executable.
Abstract: The goal of this paper is to identify the main
differences in the way men and women perceive TV ads. This paper
is based on a research project conducted partly as a review of relevant
papers, which deals with gender influence on the cognitive process
and postmodern perception of advertising. In addition to that,
qualitative research was conducted by means of interviews and
structured questionnaires. Furthermore, data acquired from the
research were used to evaluate our objectives and hypotheses. The
goal of this paper is to compare women's and men's perception of
advertisement. Although women are able to perceive more details
than men, men are more susceptible to sexual appeals in advertising.
Significant differences were also found in the perception of sexual
appeals in the context of gender.
Abstract: The modelling of physical phenomena, such as the
earth’s free oscillations, the vibration of strings, the interaction of
atomic particles, or the steady state flow in a bar give rise to Sturm-
Liouville (SL) eigenvalue problems. The boundary applications of
some systems like the convection-diffusion equation, electromagnetic
and heat transfer problems requires the combination of Dirichlet and
Neumann boundary conditions. Hence, the incorporation of Robin
boundary condition in the analyses of Sturm-Liouville problem. This
paper deals with the computation of the eigenvalues and
eigenfunction of generalized Sturm-Liouville problems with Robin
boundary condition using the finite element method. Numerical
solution of classical Sturm–Liouville problem is presented. The
results show an agreement with the exact solution. High results
precision is achieved with higher number of elements.
Abstract: Wind energy is rapidly emerging as the primary
source of electricity in the Philippines, although developing an
accurate wind resource model is difficult. In this study, Weather
Research and Forecasting (WRF) Model, an open source mesoscale
Numerical Weather Prediction (NWP) model, was used to produce a
1-year atmospheric simulation with 4 km resolution on the Ilocos
Region of the Philippines. The WRF output (netCDF) extracts the
annual mean wind speed data using a Python-based Graphical User
Interface. Lastly, wind resource assessment was produced using a
GIS software. Results of the study showed that it is more flexible to
use Python scripts than using other post-processing tools in dealing
with netCDF files. Using WRF Model, Python, and Geographic
Information Systems, a reliable wind resource map is produced.
Abstract: Education and practical training crisis management
members are a topical issue nowadays. The paper deals with the
perspectives and possibilities of "smart solutions" to education for
crisis management staff. Currently, there is a large number of
simulation tools, which notes that they are suitable for practical
training of crisis management staff. The first part of the paper is focused on the introduction of the
technology simulation tools. The simulators aim is to create a
realistic environment for the practical training of extending units of
crisis staff. The second part of the paper concerns the possibilities of using the
simulation technology to the education process. The aim of this
section is to introduce the practical capabilities and potential of the
simulation programs for practical training of crisis management staff.
Abstract: Finding the optimal 3D path of an aerial vehicle under
flight mechanics constraints is a major challenge, especially when
the algorithm has to produce real time results in flight. Kinematics
models and Pythagorian Hodograph curves have been widely used
in mobile robotics to solve this problematic. The level of difficulty
is mainly driven by the number of constraints to be saturated at the
same time while minimizing the total length of the path. In this paper,
we suggest a pragmatic algorithm capable of saturating at the same
time most of dimensioning helicopter 3D trajectories’ constraints
like: curvature, curvature derivative, torsion, torsion derivative, climb
angle, climb angle derivative, positions. The trajectories generation
algorithm is able to generate versatile complex 3D motion primitives
feasible by a helicopter with parameterization of the curvature and the
climb angle. An upper ”motion primitives’ concatenation” algorithm
is presented based. In this article we introduce a new way of designing
three-dimensional trajectories based on what we call the ”Dubins
gliding symmetry conjecture”. This extremely performing algorithm
will be soon integrated to a real-time decisional system dealing with
inflight safety issues.
Abstract: Gastric Cancer (GC) has high morbidity and fatality
rate in various countries. It is still one of the most frequent and
deadly diseases. Gastrokine1 (GKN1) and gastrokine2 (GKN2) genes
are highly expressed in the normal stomach epithelium and play
important roles in maintaining the integrity and homeostasis of
stomach mucosal epithelial cells. In this study, 47 paired samples that
were grouped according to the types of gastric cancer and the clinical
characteristics of the patients, including gender and average of age.
They were investigated with gene expression analysis and mutation
screening by monitoring RT-PCR, SSCP and nucleotide sequencing
techniques. Both GKN1 and GKN2 genes were observed significantly
reduced found by (Wilcoxon signed rank test; p
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.