Abstract: After the internet explosion in the 90’s, technology
was immediately integrated into the school system. Technology
which symbolizes advancement in human knowledge was seen as a
setback by many educators. Efforts have been made to help stem this
erroneous believes and help educators realize the benefits of
technology and ways of implementing it in the classrooms especially
in the sciences. This advancement created a constantly expanding gap
between the pupil’s perception on the use of technology within the
learning atmosphere and the teacher’s perception and limitations
hence, the focus of this paper is on the need to refocus on the use of
Science and Technology in enhancing children’s potentials in
learning at school especially in Science for sustainable development
in Nigeria. The paper recommended measures for facilitating the
sustenance of science and technology in Nigerian schools so as to
enhance the potentials of our children in Science and Technology for
a better tomorrow.
Abstract: The aim of software maintenance is to maintain
the software system in accordance with advancement in software
and hardware technology. One of the early works on software
maintenance is to extract information at higher level of abstraction. In
this paper, we present the process of how to design an information
extraction tool for software maintenance. The tool can extract the
basic information from old programs such as about variables, based
classes, derived classes, objects of classes, and functions. The tool
have two main parts; the lexical analyzer module that can read the
input file character by character, and the searching module which
users can get the basic information from the existing programs. We
implemented this tool for a patterned sub-C++ language as an input
file.
Abstract: We have been grouping and developing various kinds
of practical, promising sensing applied systems concerning
agricultural advancement and technical tradition (guidance). These
include advanced devices to secure real-time data related to worker
motion, and we analyze by methods of various advanced statistics and
human dynamics (e.g. primary component analysis, Ward system
based cluster analysis, and mapping). What is more, we have been
considering worker daily health and safety issues. Targeted fields are
mainly common farms, meadows, and gardens. After then, we
observed and discussed time-line style, changing data. And, we made
some suggestions. The entire plan makes it possible to improve both
the aforementioned applied systems and farms.
Abstract: Unmanned aircraft systems (UAS) are playing
increasingly prominent roles in defense programs and defense
strategies around the world. Technology advancements have
enabled the development of it to do many excellent jobs as
reconnaissance, surveillance, battle fighters, and communications
relays. Simulating a small unmanned aerial vehicle (SUAV)
dynamics and analyzing its behavior at the preflight stage is too
important and more efficient. The first step in the UAV design is
the mathematical modeling of the nonlinear equations of motion. .
In this paper, a survey with a standard method to obtain the full
non-linear equations of motion is utilized, and then the
linearization of the equations according to a steady state flight
condition (trimming) is derived. This modeling technique is
applied to an Ultrastick-25e fixed wing UAV to obtain the valued
linear longitudinal and lateral models. At the end the model is
checked by matching between the behavior of the states of the nonlinear
UAV and the resulted linear model with doublet at the
control surfaces.
Abstract: Batteries of electric vehicles (BEV) are becoming
more attractive with the advancement of new battery technologies
and promotion of electric vehicles. BEV batteries are recharged on
board vehicles using either the grid (G2V for Grid to Vehicle) or
renewable energies in a stand-alone application (H2V for Home to
Vehicle). This paper deals with the modeling, sizing and control of a
photovoltaic stand-alone application that can charge the BEV at
home. The modeling approach and developed mathematical models
describing the system components are detailed. Simulation and
experimental results are presented and commented.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: Due to the advancement of Internet technology, online
learning is widely used in higher education institutions. Online
learning offers several means of communication, including online
forum. Through online forum, students and instructors are able to
discuss and share their knowledge and expertise without having a
need to attend the face-to-face, ordinary classroom session. The
purposes of this study are to analyze the students’ levels of
participation and critical thinking, types of action and factors
influencing their participation in online forum. A total of 41
postgraduate students undertaking a course in educational technology
from a public university in Malaysia were involved in this study. In
this course, the students participated in a weekly online forum as part
of the course requirement. Based on the log data file extracted from
the online forum, the students’ type of actions (view, add, update,
delete posts) and their levels of participation (passive, moderate or
active) were identified. In addition, the messages posted in the forum
were analyzed to gauge their level of critical thinking. Meanwhile,
the factors that might influence their online forum participation were
measured using a 24-items questionnaire. Based on the log data, a
total of 105 posts were sent by the participants. In addition, the
findings show that (i) majority of the students are moderate
participants, with an average of two to three posts per person, (ii)
viewing posts are the most frequent type of action (85.1%), and
followed by adding post (9.7%). Furthermore, based on the posts
they made, the most frequent type of critical thinking observed was
justification (50 input or 19.0%), followed by linking ideas and
interpretation (47 input or 18%), and novelty (38 input or 14.4%).
The findings indicate that online forum allows for social interaction
and can be used to measure the students’ critical thinking skills. In
order to achieve this, monitoring students’ activities in the online
forum is recommended.
Abstract: This study aims to examine the role of career
advancement and job security as predictors of employee commitment
to their organization. Data was collected from 580 frontline
employees attached to two departments of 29 luxury hotels in
Peninsular Malaysia. Statistical results using Partial Least Squares
technique provided support for the proposed hypotheses. In view of
the findings, theoretical and practical implications are discussed.
Abstract: Attractive and creative advertisement displays are
often in high demand as they are known to have profound impact on
the commercial market. In the fast advancement of technology,
advertising trend has taken a great leap in attracting more and more
demanding consumers. A low-cost and low-power consumption
flipping advertisement board has been developed in this paper. The
design of the electrical circuit and the controller of the advertisement
board are presented. A microcontroller, a Darlington Pair driver and a
unipolar stepper motor were used to operate the electrical flipping
advertisement board. The proposed system has been implemented
and the hardware has been tested to demonstrate the capability of
displaying multiple advertisements in a panel.
Abstract: Current transformers (CTs) are used to transform large primary currents to a small secondary current. Since most standard equipment’s are not designed to handle large primary currents the CTs have an important part in any electrical system for the purpose of Metering and Protection both of which are integral in Power system. Now a days due to advancement in solid state technology, the operation times of the protective relays have come to a few cycles from few seconds. Thus, in such a scenario it becomes important to study the transient response of the current transformers as it will play a vital role in the operating of the protective devices.
This paper shows the steady state and transient behavior of current transformers and how it changes with change in connected burden. The transient and steady state response will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer characteristics with changes in burden will be discussed.
Abstract: Today, the means of following the developments in
the area of science and technology is to keep up with the pace of the
advancements in this area. As is in every profession, apart from their
personal efforts, the training of teachers in the period after they start
their careers is only possible through in-service training. The aim of
the present study is to determine the views of Information
Technologies (IT) teachers regarding the in-service training courses
organized by the Ministry of National Education. In this study, in
which quantitative research methods and techniques were employed,
the views of 196 IT teachers were collected by using the “Views on
In-service Training” questionnaire developed by the authors of the
paper. Independent groups t-test was used to determine whether the
views of IT teachers regarding in-service training differed depending
on gender, age and professional seniority. One-way analysis of
variance (ANOVA) was used to investigate whether the views of IT
teachers regarding in-service training differed depending on the
number of in-service training courses they joined and the type of inservice
training course they wanted to take. According to the findings
obtained in the study, the views of IT teachers on in-service training
did not show a significant difference depending on gender and age,
whereas those views differed depending on professional seniority, the
number of in-service training courses they joined and the type of inservice
training course they wanted to take.
Abstract: There is a great advancement towards the All-Electric Aircraft (AEA) technology. The AEA concept assumes that all aircraft systems will be integrated into one electrical power source in the future. The principle of the electro-thermal system is to transfer the energy required for anti/de-icing to the protected areas in electrical form. However, powering a large aircraft anti-icing system electrically could be quite excessive in cost and system weight. Hence, maximising the anti/de-icing efficiency of the electro-thermal system in order to minimise its power demand has become crucial to electro-thermal de-icing system sizing. In this work, an enhanced methodology has been developed for conceptual sizing of aircraft electro-thermal de-icing System. The work factored those critical terms overlooked in previous studies which were critical to de-icing energy consumption. A case study of a typical large aircraft wing de-icing was used to test and validate the model. The model was used to optimise the system performance by a trade-off between the de-icing peak power and system energy consumption. The optimum melting surface temperatures and energy flux predicted enabled the reduction in the power required for de-icing. The weight penalty associated with electro-thermal anti-icing/de-icing method could be eliminated using this method without under estimating the de-icing power requirement.
Abstract: In this era of globalization, adoption of technology is quite difficult for people with physical disabilities compared to people with normal abilities. The advancement in mobile based accessible applications have opened up several different avenues for the visually challenged across the globe. Smartphones applications are not very common for blind people, but they access and use these applications in their daily lives to some extent. Several smartphone applications have a number of usability issues for the visually impaired. In this paper, we evaluate the usability of various android & iPhone applications for blind people through analysis and surveys. This paper aspires to provide guidance in order to increase smartphone application accessibility for the visually impaired. An abstract application design is also proposed to overcome usability issues in smartphone applications for visually challenged people.
Abstract: The availability of powerful eye-safe laser sources and the recent advancements in electro-optical and mechanical beam-steering components have allowed laser-based Light Detection and Ranging (LIDAR) to become a promising technology for obstacle warning and avoidance in a variety of manned and unmanned aircraft applications. LIDAR outstanding angular resolution and accuracy characteristics are coupled to its good detection performance in a wide range of incidence angles and weather conditions, providing an ideal obstacle avoidance solution, which is especially attractive in low-level flying platforms such as helicopters and small-to-medium size Unmanned Aircraft (UA). The Laser Obstacle Avoidance Marconi (LOAM) system is one of such systems, which was jointly developed and tested by SELEX-ES and the Italian Air Force Research and Flight Test Centre. The system was originally conceived for military rotorcraft platforms and, in this paper, we briefly review the previous work and discuss in more details some of the key development activities required for integration of LOAM on UA platforms. The main hardware and software design features of this LOAM variant are presented, including a brief description of the system interfaces and sensor characteristics, together with the system performance models and data processing algorithms for obstacle detection, classification and avoidance. In particular, the paper focuses on the algorithm proposed for optimal avoidance trajectory generation in UA applications.
Abstract: There are various modes of transport in metro cities in India, auto-rickshaws being one of them. Auto-rickshaws provide connectivity to all the places in the city offering last mile connectivity. Among all the modes of transport the auto-rickshaw industry is the most unorganized and inefficient. Although unions exist in different cities they aren’t good enough to cope up with the upcoming advancements in the field of technology. An introduction of simple technology in this field may do wonders and help increase the revenues. This paper aims to organize this segment under a single umbrella using GPS devices and mobile phones. The paper includes surveys of about 300 auto-rickshaw drivers and 1000 plus commuters across 6 metro cities in India. Carrying out research and analysis provides a base for the development of this model and implementation of this innovative technique, which is discussed in this paper in detail with ample emphasis given on the implementation of this model.
Abstract: Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors, such as information leaks, using the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection, and discusses applications of this method in BYOD environment.
Abstract: In all his novels, Hawthorne, the American writer, created settings in which his moral concerns could be presented through the actions of his characters. He illustrated his concern over the moral fall of man in the nineteenth century obsession for technological advancement. In “The Blithedale Romance” and “The House of Seven Gable” quite vividly, he pictured individualistic moral vices as the result of outside forces which caused social immorality. “The Marble Faun”, in its own turn, has the same type of social moral concerns to present: the story of nineteenth century modern man and his individualistic moral issues which lead to his social moral fall. He depicted the dominant themes of individualistic moral vices which all lead to social alienation and rejection. He showed hypocrisy and evil intentions as leading to social immoral atmosphere.
Abstract: Demand response is getting increased attention these days due to the increase in electricity demand and introduction of renewable resources in the existing power grid. Traditionally demand response programs involve large industrial consumers but with technological advancement, demand response is being implemented for small residential and commercial consumers also. In this paper, demand response program aims to reduce the peak demand as well as overall energy consumption of the residential customers. Air conditioners are the major reason of peak load in residential sector in summer, so a dynamic model of air conditioning load with thermostat action has been considered for applying demand response programs. A programmable communicating thermostat (PCT) is a device that uses real time pricing (RTP) signals to control the thermostat setting. A new model incorporating PCT in air conditioning load has been proposed in this paper. Results show that introduction of PCT in air conditioner is useful in reducing the electricity payments of customers as well as reducing the peak demand.
Abstract: Networking solutions, particularly wireless local area networks have revolutionized the technological advancement. Wireless Local Area Networks (WLANs) have gained a lot of popularity as they provide location-independent network access between computing devices. There are a number of access methods used in Wireless Networks among which DCF and PCF are the fundamental access methods. This paper emphasizes on the impact of DCF and PCF access mechanisms on the performance of the IEEE 802.11a, 802.11b and 802.11g standards. On the basis of various parameters viz. throughput, delay, load etc performance is evaluated between these three standards using above mentioned access mechanisms. Analysis revealed a superior throughput performance with low delays for 802.11g standard as compared to 802.11 a/b standard using both DCF and PCF access methods.
Abstract: In this paper, we propose a general mandatory access framework for distributed systems. The framework can be applied into multiple operating systems and can handle multiple stakeholders. Despite considerable advancements in the area of mandatory access control, a certain approach to enforcing mandatory access control can only be applied in a specific operating system. Other than PC market in which windows captures the overwhelming shares, there are a number of popular operating systems in the emerging smart phone environment, i.e. Android, Windows mobile, Symbian, RIM. It should be noted that more and more stakeholders are involved in smartphone software, such as devices owners, service providers and application providers. Our framework includes three parts—local decision layer, the middle layer and the remote decision layer. The middle layer takes charge of managing security contexts, OS API, operations and policy combination. The design of the remote decision layer doesn’t depend on certain operating systems because of the middle layer’s existence. We implement the framework in windows, linux and other popular embedded systems.