Volume-7 Issue-1
- Version
- Download 14
- File Size 4.00 KB
- File Count 1
- Create Date August 28, 2017
- Last Updated July 27, 2018
Volume-7 Issue-1
S. No |
Volume-7 Issue-1, March 2017, ISSN: 2231-2307 (Online)
|
Page No. |
|
1. |
Authors: |
Samir Khudhir Al-ani, Nada Abdulfatah Khattab |
|
Paper Title: |
|||
Abstract: In this researcher has been studied to design an einzel lens and this present researcher, Which concerted about the design of electrostatic potential lens for focused charge particle beam by using inverse method in designing to electrostatic lens ,the paraxial ray equation was solved using Rung - Kutta method ,The spherical and chromatic aberration coefficient Cs and Cc, respectively have been computed using Simpsons rule. The shape of the electrode of the electrostatic lens were determined by solving Laplace's equation, in this research, the results showed low values of spherical and chromatic aberrations which are considered as good criteria for good design Electron Optics, einzel Lens. |
|||
2. |
Authors: |
Poorva Khemaria, Shiv Kumar, Babita Pathik |
|
Paper Title: |
Implementation of Fog Computing in Cloud Enterprise for Data Security and Privacy Management |
||
Abstract: advancement of cloud technology named as fog computing. The process of fog computing faced a problem of latency and internet connectivity. The access of data over the fog computing need some trust based authentication and authorization process. In fog computing environment two major issue one is data leakage and other is location privacy. The location privacy preserve the user access and authentication process. The location privacy in fog computing is major issue. For the location privacy used various authentication and authorization process. To address these dangers, auditable information stockpiling administration has been proposed with regards to distributed computing to secure the information. Strategies, for example, holomorphic encryption and searchable encryption are consolidated to give uprightness, confidentiality and variability for distributed storage framework to permit a customer to check its information put away on untrusted servers. In this paper used Bloom filter data structure for the location privacy in fog computing model. The fog computing model work very efficiently in terms of low latency and high speed. |
|||
3. |
Authors: |
Ratnesh Kumar Jain, Shiv Kumar, Babita Pathik |
|
Paper Title: |
An Enhancement on Block Cipher Key for Advanced Encryption Standard |
||
Abstract: The United State Government has standardized algorithm for encrypting and decrypting data which is known as AES (Advanced Encryption Standard). Information security is becoming very essential in data storage and transmission with the rapid growth of digital data exchange in an electronic way Cryptography play a vital role in information security system against different attacks which uses algorithms to scramble data into unreadable text which is only decrypted by those who has the associated key. It is of two types one for Symmetric and Asymmetric. Symmetric system has 288 bit block 128 bit commotional AES algorithm for 288 bit using 6x6 matrixes after implementation these points system is throughput at both sites encryption and decryption.
|
|||
4. |
Authors: |
Vikash Kumar, Sanjay Sharma |
|
Paper Title: |
|||
Abstract: Images include information about human body which is used for different purpose such as medical examination security and other plans Compression of images is used in some applications such as profiling information and transmission systems. Regard to importance of images information, lossless or loss compression is preferred. Lossless compressions are JPEG, JPEG-LS and JPEG2000 are few well-known methods for lossless compression. We will use differential pulse code modulation for image compression with Huffman encoder, which is one of the latest and provides good compression ratio, peak signal to noise ratio and minimum mean square error. . In this paper we try to answer the following question. Which entropy coding, Huffman, is more suitable compared to other from the compression ratio, performance, and implementation points of view? We have implemented and tested Huffman algorithms. Also we compare it with other existing methods with respect to parameter compression ratio, peak signal noise ratio.
|
|||
5. |
Authors: |
Kanos Matyokurehwa, Nehemiah Mavetera, Osden Jokonya |
|
Paper Title: |
Requirements Engineering Techniques: A Systematic Literature Review |
||
Abstract: Requirements engineering is a torrid task to requirements engineers because requirements keep changing and this affect the project’s delivery schedule and cost. Although various authors proposed numerous techniques to be used in requirements engineering, software projects still fail. The issue now lies on which technique to use to minimize project failures. The aim of the study was to identify gaps in requirements engineering techniques used. The paper used a systematic literature review of requirements engineering techniques used from January 2000 to July 2016. The study found out that a lot of techniques are used in requirements engineering and some of the techniques used are not adequately addressing the problem space but the solution space. The study identified some gaps in requirements engineering techniques that need further research in order to solve those gaps.
|
|||
6. |
Authors: |
N. Nachammai, R. Kayalvizhi |
|
Paper Title: |
Dragonfly Algorithm Based Fuzzy Logic Controller for Power Electronic Converter |
||
Abstract: Due to the time varying and switching nature of the Luo converters, their dynamic behavior becomes highly non-linear. Conventional controllers require a good knowledge of the system and accurate tuning in order to obtain the desired performances. A fuzzy logic controller neither requires a precise mathematical model of the system nor complex computations. Swarm Intelligence [SI] is a branch of evolutionary computing that inspired by the behavior of swarms in real life to search or optimizean objective function. The Dragonfly Algorithm [DA] is a global optimization technique based on swarm intelligence. Two essential phases of optimization, exploration and exploitation, are designed by modelling the social interaction of dragonflies in navigating, searching for foods, and avoiding enemies when swarming dynamically or statistically. The drawback of fuzzy controller has the tendency to oscillate around the final operating point. Proper selection of the normalizing gains for the inputs avoids oscillations. Hence Dragonfly Algorithm, an optimization technique is required to tune the fuzzy parameters. An attempt has been made in this work to design, simulate and implement, fuzzy logic and DA-fuzzy logic controllers for regulating the output voltage. The performances of the Luo converter with Fuzzy and DA-Fuzzy controllers are evaluated under line and load disturbances using Matlab-Simulink based simulation and compared. Comparison clearly shows the superiority of the proposed Dragonfly Algorithm over fuzzy controller applied for the control of Luo converter.
|
|||
7. |
Authors: |
Silpa Rajan, Minu Lalitha Madhavu |
|
Paper Title: |
Survey on Reversible Data Hiding in Encrypted Images by Reversible Image Transformation (RIT) |
||
Abstract: To increase the security of the data, an image is in taken in an encrypted format. This process is followed in earlier techniques like RRBE, VRAE etc. In RIT, instead of converting it into an encrypted format, it is converted into another image. Hence this image appears simply an anotherimage which is difficult for other users to decrypt. Using contrast – enhancement RDH method, data is then hidden in to the image. The advantage of using RDH is that there occurs no loss of data and contrast of the image is highly enhanced. Hence visual quality of the image is increased. The embedded data is extracted after which it is decrypted to recover the original data.
|
|||
8. |
Authors: |
Naveen Pathak, Anand Bisen |
|
Paper Title: |
A Review on MANET using Soft Computing and Dempster-Shafer Theory |
||
Abstract: Mobile ad hoc networks (MANETs) is an substructure-less, dynamic network include of a sets of wirelessly mobility nodes which communicate with all different without the exploit of any centralized authority. Because of its fundamental characteristics, like as wireless medium, dynamic topology, distributed cooperation. In this paper we study MANET and its characteristics, application, security goals and different types security attacks, soft computing approach and dempster-shafer theory of evidence.
|
|||
9. |
Authors: |
Nor Azlina Abd Rahman, Vinothini Kasinathan, Rajasvaran Logeswaran, Nurwahida Faradila Taharim |
|
Paper Title: |
Edutainment for Effective Teaching and Learning of Digital Natives |
||
Abstract: This paper studies an effort to enhance the teaching and learning of Digital Natives (ages below 36 years old or born after the year 1980). It explores the concept and current meaning of Edutainment with a focus on a game called QR IT Seek, developed with consideration of the specific characteristics of Digital Native learners who are the future workforce of a nation. The paper endeavors to respond to the demands of the Digital Natives who are distinctly different from the previous generations. The pressure exists for teaching and delivering concepts to the younger generation due to these characteristics. Hence, it is vital for educators of higher learning to develop innovative methods of teaching tertiary education materials and rediscover the concept and application of Edutainment. The need for this study and its findings is enhanced because without attention given to the specific needs of these students at institutions of higher education today, there would be significant impact on the achievement of learning outcomes and result in long term global consequences in this borderless world.
|
|||
10. |
Authors: |
Shadrack Mutungi Simon, Abednego Gwaya, Stephen Diang’a |
|
Paper Title: |
|||
Abstract: The performance of construction projects depends to a great extent on how best resources are managed. Resource planning and leveling are critical aspects of resource management which need to be fully incorporated and practised in any site. Failure to manage the resources available through planning and leveling is likely to result in increased project costs, time overruns and poor quality. This assertion is supported by Tarek, (2010) who argues that proper resource planning and leveling helps resolve resource conflicts, which cause numerous challenges to the organization, such as: delay in completion of certain tasks, challenges in assigning a different resource to a certain task, inability to alter task dependencies, addition or removal of certain tasks and overall time and cost overruns of projects. He further argues that the aim of resource leveling is to increase efficiency when undertaking projects by maximizing on the resources available at hand. While it would be true to say that quite a number of authors have addressed the issue of resource management, the author feels that the subject of resource planning and leveling in the Kenyan construction industry is not well covered. This is due to a number of reasons which create a gap to be researched on. Authors such as Abeyasinghe et al., (2001); Ballard, (2000); Bandelloni et al., (1994) among others have covered different aspects of resource planning and leveling. It is however important to note that all these authors address the topic in developed countries. Some of the literature found on the topic is based on the manufacturing industry. This therefore creates the need to study the Kenyan construction industry and establish the underlying factors behind the practice of resource planning and leveling among construction industry players. The purpose of this research was to explore the practice of resource planning and leveling (RP&L) adopted by contractors within the Kenyan construction industry and the factors influencing the adoption of such techniques. This research mainly adopted a case study design where questionnaires were used to collect data from respondents. The research site was Nairobi and the target population was NCA 1-3 contractors. Random sampling was used to identify the 106 respondents. A response rate of 76% was achieved. Data obtained was analyzed using descriptive statistics, relative importance index analysis and spearman’s correlation analysis. The study concluded that: though there is a high level of usage of RP&L in the Kenyan construction industry much of which is non-structured, construction projects’ progress continue to be affected by delayed materials, lack of labour and lack of equipment at the points of need; RP&L is practised more in older contracting firms and where there is support from top management; and finally a high degree of RP is associated with reduced negative impact of construction project progress
|
|||
11. |
Authors: |
Jerry Chong Chean Fuh, Khalida Shajaratuddur Harun, Nor Azlina Abd Rahman, Sandra A. P Gerald |
|
Paper Title: |
|||
Abstract: This paper proposed a prototype of an electronic learning system for slow learning children to enable the kindergarten education to create a better learning environment for children between the ages of four to six years old. The purpose is to enable the slow learning children to learn in more effectively and independently at anytime. In general, the term 'slow learning children' is referring to children who tend to take longer time to understand certain information when compared to other children with similar age. To elaborate further, kids who require multiple explanations before they are able to grasp a concept. The system should help children improve their ability to be flexible and creative as well as encourage slow learning children to gain confidence in their daily life. The prototype developed after considering several elements that is suitable for slow learner that focusing more on multimedia elements which are images, sounds and interactive activities. The prototype is not just focusing on learning but also enable the teachers to share the children progress with the parents. This paper presented a workable E-learning software prototype which is MENTOR system for young age users for self-improvement and learning. The prototype has 3 users; slow learner children, tutors and parents. In other words the parents able to monitor their child progress using this MENTOR system. The technologies used to develop the prototype and advantages of MENTOR system are also highlighted.
|
|||
12. |
Authors: |
Monicah Wairimu Chonge |
|
Paper Title: |
An Investigation of the Performance of Local Contractors in Kenya |
||
Abstract: The performance of contractors is a great determinant of their success or failure. Poor performance is linked to failure whereas good performance is linked to success. Despite of this, contractors in most industries of the world, and most especially the developing countries, have been accused of poor performance. In Kenya, the situation is not different as the performance of the contractors has been termed as poor as far as time, cost and quality is concerned. This study therefore sought to validate this accusation by finding out the level of the performance of contractors in Kenya. Thirteen performance measures as identified in the literature review were used as the scale of measure. These were: time, cost, quality, client satisfaction, health and safety, environment protection, participants’ satisfaction, community satisfaction, sustainability of the development, functionality of the development, communication, profitability and productivity. The study employed the quantitative strategy as well as the cross-sectional research design. Quantitative data was collected through the use of structured questionnaires which were administered to local contractors of category NCA 1, 2 and 3. The contractors were sampled using the stratified random sampling and the systematic random sampling techniques. The data was analyzed using the Statistical Package for Social Sciences (SPSS for windows version 20). The method used for data analysis was descriptive statistics. The analysis revealed that the local contractors are average performers when all the performance measures are used to gauge their performance. But when these performance measures are considered separately, they performed poorly on time, cost, profitability, productivity and client satisfaction. They have an average performance on health and safety, participants’ satisfaction, community satisfaction, environmental protection, sustainability, communication, quality and functionality. This study therefore concludes that local contractors in Kenya of category NCA 1, 2 and 3 can be termed as average performers rather than poor performers. |
|||
13. |
Authors: |
Maha Abdul Ameer Kadhum |
|
Paper Title: |
|||
Abstract: In this research has been studying and analyzing some types of properties antennas normal, then been improved characteristics after conversion to efficient antennas with compared to the old characteristics of antennas and new characteristics which distinguish solving Maxwell's equations have . Allantij showed an antenna model improved the overall value of the proportion of the voltage wave, increase bandwidth In addition to giving him a more stable long distance. Study antenna adaptive, which is the best levels used in smart antennas and signal systems with different levels of intelligence and work simulation using (demand) to one of the levels in the system and analyze its results were used algorithm less square error rate high Astaqraratha and simplicity mathematically was a simulation of the system operation.
|
|||
14. |
Authors: |
Rucha Dilip Patil, C. M. Jadhav |
|
Paper Title: |
|||
Abstract: Multi-hop wireless mesh network experience link-fail due to channel interference (i/f), dynamic obstacles etc. which causes performance degradation of the network in Wireless Mesh Networks. The paper proposes “The base of Autonomously Reconfigurable Wireless Mesh Networks system is IEEE 802.11” for mr-WMN to recover autonomously when the network failure occurs & to improve the performance of network. The paper uses an autonomously network reconfiguration system (ARS) algorithm to maintain network performance that allows a multi radio WMN to own recover from local link failure. ARS generates needful changes in local radio and channel assignments in order to recover from failures by using channels and radio variability in WMN's. Next, the system cooperatively reconfigures network setting among local mesh routers based on the generated configuration changes.
|
|||
15. |
Authors: |
Issa Y. S. Ali, Sedat Nazlibilek |
|
Paper Title: |
|||
Abstract: Due to the rapid growing demand for electricity, power systems nowadays have become operating under continually changing in loads and operating conditions which is a major cause of instabilities and could potentially result in serious consequences. This paper presents a novel design approach by employing a robust damping control of power systems based on ‘Active Disturbance Rejection Control’ (ADRC) algorithm in order to improve system stability. The advantage of this algorithm is that it requires little information from the plant model since the relative order of open loop transfer function information is quite sufficient to design a robust controller. This makes the power system more robust against a wide range of disturbances that are commonly encountered in such systems. Here, the proposed ADRC control algorithm is developed for a synchronous machine connected to infinite bus (SMIB) through external reactance under small-disturbance condition. The effectiveness of the proposed algorithm has been verified by comparing it with an optimally tuned Conventional Power System Stabilizer (CPSS) under various loading conditions. The comparison shows that the proposed approach guarantees system stability and exhibits higher performance than CPSS which lacks robustness at some severe operating points despite being optimally tuned.
|
|||
17. |
Authors: |
Pankaj Agarwal, Shreeya Sharma, Lavanya Gupta, B. Manideep |
|
Paper Title: |
|||
Abstract: This paper aims to provide an overview of the voluntary approaches towards enhancing the design of a smart dustbin for the implementation of advanced waste management systems. In most of the places, the Municipal garbage bins are overflowing and they are not cleaned at proper time. As a result of which the consequences are severe. It includes overflow of garbage which results in land pollution, spread of diseases, also it creates unhygienic conditions for people, and ugliness to that place. There needs to be system that gives prior information of the filling of the bin that alerts the municipality so that they can clean the bin on time and safeguard the environment. To avoid all such situations we intend to propose a solution for this problem “Smart Garbage Bin”, which will alarm and inform the authorized person by buzzer and alert system when the garbage bin is about to fill. To avoid all such unhygienic circumstances we are going to implement a project based on iot called smart trash management by interfacing an trash bin with infrared sensors, lcd, buzzer, wifi modules via an arduino atmega .The current status of trash bin is depicted by sensors and automatically updates garbage level on html page with the help of a wifi module. The main objective of this paper is to propose a plan to reduce human effort and resources along with the enhancement of smart city vision and to maintain a pollution free environment around our homes and specially in public places
|
|||
18. |
Authors: |
V. Kanchana, M. Prabu |
|
Paper Title: |
An Implementation of Sensors based to Mitigate over Train-Elephant Conflicts |
||
Abstract: Animal accidents caused due to train are one of the major issues these days. “Train-Elephant Conflict” Causes difficulties for both the human and the elephants. It is very dangerous issues and this causes a vast reduction in the animal species. More over elephants are the species that are rare to see and this accident still reduces the population of elephants. Mostly at night times the forest officials and the train operator cannot so attentive due which accidents occur. In the proposed system, there is an acoustic sensor fixed at the path of elephant which would be sensed and an automatic message will be sent to the train operator, thereby minimizing the accidents occurring. |