Existence of solutions for nabla Caputo left fractional boundary value |
Author : Xiaoying Dong, Xili Tan |
Abstract | Full Text |
Abstract :In this paper, we investigate the existence of solutions for nabla
Caputo Left fractional boundary value problems with a
|
|
Modeling Heat Transfer Coeficient Of Air Using Buckingham PiTheory |
Author : E. N. Wami, E. O. Ehirim, M.O. Ibrahim |
Abstract | Full Text |
Abstract :Heat transfer coefficients of dryers are useful tools for correlation formulation and performance
evaluation of process design of dryers as well as derivation of analytical model for predicting drying rates. A
model equation for predicting heat transfer coefficient of air in a batch dryer using Buckingham Pi-theorem and
dimensional analysis at various velocities has been formulated. The model was validated by drying unripe
plantain chips in a batch dryer at air velocities of 0.66, 0.92 and 1.20m/s at temperatures of 42, 54.45 and 66°C,
respectively. Based on the analogy of heat and mass transfer rate equations for constant drying period, the
prediction from the developed model reasonably agreed with the experimental data |
|
Activity of credit intermediation and factoring companies in Poland |
Author : Dorota Gaudyn |
Abstract | Full Text |
Abstract :The article discusses the changes taking place in the method of financing Polish enterprises and
the analysis of economic entities in the financial services sector. Concepts related to this topic were presented
and forecasts for the development of the financial services market in Poland were included. Factors influencing
the development of credit and factoring enterprises were indicated. The two types of financing methods for
enterprises were compared and their advantages and disadvantages as well as opportunities and threats
appearing in the economic environment were shown. The article also presents reflections on the direction of the
ongoing economic changes.
|
|
On Interpersonal Meaning in Business English Negotiations |
Author : Fanyu Mao |
Abstract | Full Text |
Abstract :Being the main channel to establish and develop trade relations, international business negotiations
play a significant role in company businesses and foreign trade environment. On the basis of the interpersonal
grammatical metaphor theory, the paper gives an analysis of interpersonal meaning in business English
negotiations through examples. It illustrates the metaphorical expressions of mood and modality in business
English negotiations and explores the textual function of interpersonal grammatical metaphor in business English
negotiation with the purpose to observe and study how interpersonal grammatical metaphor help establish and
coordinate interpersonal relationship with the allocation of grammatical resources in order to help negotiators
achieve communicative purposes |
|
Preliminary Study of Synthesis of Polyvinyl Alcohol (PVA) / Hydroxyapatite (HA) Composite Nanofiber with Electrospinning Technique |
Author : Sudirman Habibiea , Denis Yanuari, Muslim E. Harahap, Yuwana Pradana, Lukmana , Henny Purwati |
Abstract | Full Text |
Abstract :Polyvinyl alcohol (PVA)/hydroxyapatite (HAp) composite fiber is obtained using hydroxyapatite
made from limestone. Fiber making is done by electrospinning technique using PVA solution with each HAp
concentration of 1% and 5%. The polarization images microscope shows that the average diameter of the
composite fiber PVA / HAp varies depending on the concentration of HAp in the solution and the voltage
applied to electrospinning. At 1% HAp concentration with a voltage of 15kV, the average fiber size was 9.83
µm and with a voltage of 17kV, the average size of the fiber was 14.46 µm. Whereas at a voltage of 20 kV, fiber
yield cannot be observed. At the 5% HAp concentration with 5kV the average fiber size was 10.45 µm, with a
voltage of 15 kV, the average fiber size was 10.84 µm and with a voltage of 20 kV, the average fiber size was
11.9 µm. It can be concluded that the concentration of HAp and the magnitude of the voltage affect the size of
the fiber produced. For this reason, it needs to be investigated further to obtain optimal conditions.
|
|
Determinants Of Implementation Of County Water And Sanitation Programme In Maseno Division Of Kisumu West SubCounty, Kisumu County, Kenya |
Author : Babu Karan Charles, Dr. Raphael Nyonje, Kwama Leonard Ogweno, Professor Peter Anyang Nyongo |
Abstract | Full Text |
Abstract :The provision of water and sanitation globally, is threatened by climate change
and pollution. Many industrialized and developing countries alike are struggling to achieve universal safe water
coverage of 100% piped water connection to households and adequate sanitation. Water scarcity has imposed
burden on women in their daily lives. Inadequate sanitation and outbreaks of infections have affected the health
of the general population in Africa, Kenya in particular. Further to the above background, this study
endeavored to establish the overall influence of determinants of implementation of water and sanitation
programme in Maseno Division of Kisumu West Sub-county. Anchored on the role’s theory, the target
population for the study was 31600 households. From this, a sample size of 380 respondents plus one water
company manager and two field officers was drawn for Maseno division under study. Data was collected
through questionnaire forms administered by research assistants. Pilot testing of the study was administered at
Manyatta slums in Kisumu Central Sub-county. To uphold the content validity, the contents of qualitative data
was discussed with the supervisors before conclusions and generalizations were made. Reliability was tested by
Kunder-Richardson(K-R)20 formula based on the split half reliabilities of data from all possible halves of
instruments. Quantitative approaches using statistical package namely frequencies, means and percentages
were analyzed and presented in tables.
|
|
Information Security Adherence in Institutions of Higher Education: A Case Study of American University of Nigeria |
Author : Odegbesan Omobolaji Ayomide, Kolapo Ridwan Olayinka |
Abstract | Full Text |
Abstract :Institutions of higher education face a higher level of information security incidence and
compromise such as data and information theft, malicious program infection, attack on the information systems
infrastructure and computer network. The antagonistic impact of information security incidence includes
compromise of confidential data and intellectual property, massive financial losses and increased level of
information security vulnerability and threat. This study aims to determine the predictors of students’ adherence
to safe information security behavior in institutions of higher education. In this study, we integrate variables
from the Protection motivation theory (PMT) and the Unified theory of acceptance and use of technology
(UTAUT) theory in other to understand the willingness of students to practice safe information security
behavior. This study utilized the quantitative research method for data gathering and analysis. A total of 276
responses were gotten from the respondents |
|