169 research outputs found

    Contra continuity on weak structure spaces

    Get PDF
    We introduce some contra continuous functions in weak structure spaces such as contra (M,w)-continuous functions, contra (alpha(m),w)-continuous functions, contra (sigma(m),w)-continuous functions, contra (pi(m),w)-continuous functions and contra (beta(m),w)-continuous functions. We investigate their characterization and relationships among such functions

    Towards Semantic Clone Detection, Benchmarking, and Evaluation

    Get PDF
    Developers copy and paste their code to speed up the development process. Sometimes, they copy code from other systems or look up code online to solve a complex problem. Developers reuse copied code with or without modifications. The resulting similar or identical code fragments are called code clones. Sometimes clones are unintentionally written when a developer implements the same or similar functionality. Even when the resulting code fragments are not textually similar but implement the same functionality they are still considered to be clones and are classified as semantic clones. Semantic clones are defined as code fragments that perform the exact same computation and are implemented using different syntax. Software cloning research indicates that code clones exist in all software systems; on average, 5% to 20% of software code is cloned. Due to the potential impact of clones, whether positive or negative, it is essential to locate, track, and manage clones in the source code. Considerable research has been conducted on all types of code clones, including clone detection, analysis, management, and evaluation. Despite the great interest in code clones, there has been considerably less work conducted on semantic clones. As described in this thesis, I advance the state-of-the-art in semantic clone research in several ways. First, I conducted an empirical study to investigate the status of code cloning in and across open-source game systems and the effectiveness of different normalization, filtering, and transformation techniques for detecting semantic clones. Second, I developed an approach to detect clones across .NET programming languages using an intermediate language. Third, I developed a technique using an intermediate language and an ontology to detect semantic clones. Fourth, I mined Stack Overflow answers to build a semantic code clone benchmark that represents real semantic code clones in four programming languages, C, C#, Java, and Python. Fifth, I defined a comprehensive taxonomy that identifies semantic clone types. Finally, I implemented an injection framework that uses the benchmark to compare and evaluate semantic code clone detectors by automatically measuring recall

    The Role Of Corporate Governance In Achieving The Quality Of Accounting Information In Jordan

    Get PDF
    In this study was trying to explain how the application of corporate governance in Jordan helps to maximize the performance of companies. Also, the application of corporate governance was trying to find laws and regulations that help to reduce conflicts of interest of others, materially and morally unacceptable. This study argues that there were moral link between the application of corporate governance and the quality of accounting information. And there was a moral link between the quality of accounting information for companies that applied corporate governance movement and trading in the stock market, share prices of these companies. The importance of study to emphasize the importance of expanding the application of the concept of corporate governance in the economic environment and benefit from Jordan in the development of accounting practice and development of the audit profession and thus achieve the quality of accounting information in environmental accounting of Jordan, which reflected the decisions of investors and the Jordanian stock market. Finally the results of the study showed that the accounting information variables were important in determining the factors influencing the company corporate governance

    Self-translation: a faithful rendition or a rewriting process? Haikal’s Autumn of Fury as an example

    Get PDF
    This study aims to investigate if self-translation is a true interpretation of a Source Text (ST) into a Target Text (TT), or if it is in fact a rewriting process. The study examines Haikal’s self-translation of a book titled ‘Autumn of Fury: The Assassination of Sadat’. This self-translation is used as an example due to the modifications and changes made by Haikal, and examines to what extent the translator is faithful to his ST (English version). For the purpose of this study, fifteen examples have been selected from Haikal's version of Autumn of Fury. They are then analysed and compared to their Arabic translations (TT), and the differences are highlighted and discussed. The selected examples include words, phrases, sentences, and sometimes whole paragraphs. The study relies on Critical Discourse Analysis (CDA) as a theoretical framework to uncover the hidden ideologies and attitudes behind the modification, manipulation, or rewriting of the ST into Arabic. These examples are analysed from linguistic, political and ideological perspectives. The study finds that Haikal’s self-translation of Autumn of Fury into Arabic was actually a rewriting process rather than a translation process, and that a new book is almost recreated out of the original

    Dielectric characteristics of spin-coated dielectric films using on-wafer parallel-plate capacitors at microwave frequencies

    Get PDF
    Includes bibliographical references.Dielectric properties of spin-coated dielectric insulators suitable for high-speed device fabrication are investigated. Complex dielectric permittivities and tangential losses of two polyimides, bisbenzocyclobutene (BCB), and a spin-on-glass (SOG) were extracted from the measured microwave reflection coefficient, S11, of parallel-plate capacitors over a frequency range of 50 MHz to 40 GHz. A model for the dielectric permittivity as a function of frequency is developed based on measured data with a minimum square error of less than 10-4 between measured and modeled microwave reflection coefficients. A circuit model for the pad capacitance is obtained based on geometrical and physical considerations. The relationship between the dielectric loss and its thickness is considered. Experimental results are fitted to Debye and Cole-Cole models.This work has been supported in part by the Defense Advanced Research Projects Agency under contract number DAAD19-03-1-0059 and by Yarmouk University in Irbid, Jordan

    Obstacles to the Application of Total Quality Management in the College of Princess Rahma University of Al- Balqa Applied University from the Point of View of Faculty Members and Ways to Overcome Them

    Get PDF
    The study aimed at identifying the obstacles to the application of TQM at Al-Balqa Applied University from the point of view of the faculty members. Specifically, this study attempts to answer the following questions: - What are the obstacles to applying TQM at Al-Balqa Applied University from the point of view of faculty members? - Are there any differences in the application of TQM in BQU (gender, academic level)? - What are the ways to overcome obstacles to the application of TQM in Al-Balqa Applied University from the point of view of faculty members? The study sample consisted of (51) faculty members The results indicated that the main obstacles to the application of TQM include the following: lack of financial resources to implement quality management, failure to develop and renew the organizational structure in line with the principles of quality management The study also showed that there are no significant differences in the constraints of applying TQM according to the variables (gender and academic level). One of the most important ways to overcome obstacles to the application of TQM: Holding seminars and workshops to develop the capabilities of the employees towards the total quality management system, providing the classrooms with modern educational means. The study presented a number of recommendations, the most important of which is the establishment of a new structure for the college that adapts the educational quality applications. Keywords: Obstacles , Total Quality Management ,College of Princess Rahma University ,Al-Balqa Applied Universit

    Factorial validity of the organizational health inventory among Omani teachers: Invariance across gender

    Get PDF
    This study examined the factor structure of the Organizational Health Inventory (OHI) scale among Omani teachers. There were four factors assumed to represent the OHI (principal influence, academic emphasis, morale, and initiating integrity). Testing the scale reliability was another aim of this study. A random sample (n=458) of Omani teachers was considered. The short version of the scale has 30 items. Exploratory and confirmatory factor analysis was performed on the sample data. The model is good fitted to the data. Across gender, the invariance of the structure was tested, and the parameters of the model were invariant. Consequently, the two genders were compared via multivariate analysis of variance (MANOVA) with gender as an independent variable and subscales. The female teachers were found to more likely show principal influence, academic emphasis, and morale than the male teachers, who instead, were more efficacious than the female teachers in dealing with institutional integrity

    Information Security Policy Compliance: The Role of Information Security Awareness

    Get PDF
    Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Theory of Planned Behavior, we investigated the role of users’ self-learning and knowledge of security issues in shaping their attitudes toward compliance with information security policies (ISPs). We collected data from nine financial organizations to test the proposed research model. Results show that employees’ previous knowledge of security issues and technologies have significant positive impact on their attitudes toward compliance with ISPs. This study sheds light on the importance of users’ general awareness of security issues and technologies in shaping their attitudes to comply with ISPs
    • …
    corecore