January - 2015 (Volume-5 ~ Issue-1 ~ Part-1)

Paper Type

::

Research Paper

Title

::

Self Recharging Perpetual Paper Batteries

Country

::

India

Authors

::

B. Ravi Sankar ||, S. Alamelu Mangai

Page No.

::

01-03

aned
::
0.4/3021-05110103 aned
iosrjen   3021-0501-0103 iosrjen

In this paper we describe about a paper battery whose electrodes are made up of different metals. This battery is connected to the primary coil of a transformer. The secondary coil of the transformer is connected to full wave rectifier whose output is either connected to a super capacitor or a rechargeable battery. The whole of the setup is referred as Self Recharging Perpetual Paper Battery.


Keywords: - Paper Battery , Perpetual Battery, Self Recharging Battery.

[1] Isabel Ferraria, Bruno Bras, Nuno Correria, Pedro Barquinha, Elvira Fortunato and Rodrigo Martins, Self-Rechargeable Paper Thin-Film Batteries: Performance and Application, Journal of Display Technology, Vol. 6, No. 8, August 2010.
[2] Victor L. Pushparaj, Manikoth M. Shaijumon, Ashavani Kumar, Saravanababu Murugesan, Lijie Ci, Robert Vajtai, Robert J. Linhardt, Omkaram Nalamasu and Pulickel M. Ajayan, Flexible energy storage devices based on nanocomposite paper, 13574-13577 | PNAS | August 21, 2007 | vol. 104 | no. 34
[3] http://en.wikipedia.org/wiki/Gibbs_free_energy
[4] http://en.wikipedia.org/wiki/Vacuum_energy
[5] http://en.wikipedia.org/wiki/Volta_potential

 

Paper Type

::

Research Paper

Title

::

Disengagement Detection in Online Learning Using Quasi Framework

Country

::

India

Authors

::

P.V.Praveen Sundar || A.V.Senthil Kumar

Page No.

::

04-09

aned
::
0.4/3021-05110409 aned
iosrjen   3021-0501-0109 iosrjen

Online Learning enables to deliver both learning and information dynamically. It allows tapping the knowledge of experts and non-experts and catapulting those messages beyond classroom walls and into the workplace but it is more difficult to assess a learner's motivation. In traditional classroom learning, when a student shows signs of de-motivation, teachers know how to motivate their students and how to optimize their instruction. But in On-line learning it is difficult to measure their disengaged level. By tracing the disengaged learners in online learning, will help us to motivate the learners at proper time. Thus making an online learning to be a successful one. Thus we propose a new framework called Quasi Framework, which is trying to measure the significant relationship between disengagement level and their academic achievement. In this paper we compare our proposed framework with ihelp, a web based learning system.

 

Keywords: Disengagement Detection, Online Learning, EDM, Log File Analysis.

[1] Dille, B., & Mezack, M.: Identifying predictors of high risk among community college telecourse students. The American Journal of Distance Education, (1991) 5(1), 24-35.
[2] Mihaela Cocea and Stephan Weibelzahl ―Disengagement Detection in Online Learning: Validation Studies and Perspectives‖, IEEE Transactions on Learning Technologies, Vol. 4, NO. 2, April-June 2011,Page 114-124.
[3] Nussbaum & Steele, Situational disengagement and persistence in the face of adversity. Journal of Experimental Social Psychology, Volume 43, Issue-1, 2007, Page 127–134.
[4] Major & Schmader, ―Coping With Ethnic Stereotypes in the Academic Domain: Perceived Injustice and Psychological Disengagement‖, the Society for the Psychological Study of Social Issues, 1998.

 

Paper Type

::

Research Paper

Title

::

Assessment of Waste Stabilization Ponds for The Treatment of Municipal Wastewater in Upper Egypt

Country

::

Egypt

Authors

::

A. M. AbdEL-rahman, || Ahmed. AbdEL-halim || Ali. A. M. Gad ||, M. Hashem

Page No.

::

10-18

aned
::
0.4/3021-05111018 aned
iosrjen   3021-0501-0118 iosrjen
Sewage can be defined as discharges from domestic and sanitary appliances or simply a complex mixture of materials from varied sources. This complex mixture contains both soluble and insoluble materials. Waste stabilization ponds are recognized as the solution to domestic wastewater treatment in developing countries. The use of such natural systems is considered to be very important. This is because it is cheap, easy to construct and they do not require high skilled laborite. In this study, samples were taken from the raw wastewater and effluents of treatment ponds of Elzaraby waste stabilization ponds over a period of one year. The treated effluent is either discharged into surface waters or reused for agricultural irrigation. The samples were analyzed according to the standard methods. The results obtained from the samples taken in different seasons showed the maximum wastewater temperature were in the influent (350C) in summer season, and the minimum were (180C) in winter season. The values of hydrogen power (pH) and dissolved oxygen (DO) is increased along the ponds series. The average annual overall removal efficiency of TSS and TDS were 70% and 26%, while the maximum overall efficiency of BOD5 was in summer (88%) and minimum efficiency was (73%) in winter season.
[1] Mara, D. D. "Domestic Wastewater Treatment in Developing Countries", Earth scan, London , Sterling, VA, 2004
[2] Ramadan, H., Ponce, V. "Design and Performance of Waste Stabilization Ponds".info@virginglobe.com Version 081218, 2011
[3] Abdel- Kader, A.M., Abdel-Rassoul, S.M. (2010)., Prospects of water conservation in Egypt(special reference to wastewater reuse).Fourteenth international water technology conference, 25-27 March 2010.
[4] MWRI/USAID (2000): Policies and procedures for improved urban wastewater discharge and reuse. Appendix 2: Health impact and water quality standards in wastewater irrigation. Report No.34, Egyptian Ministry of Water Resources and Irrigation and US Agency for International Development, available online at http://pdf.usaid. gov/pdf_docs/PNACS687.pdf (last accessed 3 January 2013).
[5] APHA (2005). Standard methods for the examination of water and wastewater, 20th and 21st ed. American Public Health Association, Washington, DC.

 

Paper Type

::

Reveiw Paper

Title

::

Cold Store Remote Control Using X-BEE technology

Country

::

Sudan

Authors

::

Isam muhydeen || Abdelrasoul Jabar Alzubaidi

Page No.

::

19-23

aned
::
0.4/3021-05111923 aned
iosrjen   3021-0501-0123 iosrjen

The X-bee data transmission and reception module is basically used for wireless transmission and reception of data . The module use ASK technique in the transmission and reception of data. This paper focuses on using the X-bee module as a means of remote control. Therefore, it would be suitable to use this module as a tool of remote control. Here, the X-bee is used to serve as a remote control for a cold store . The remote control system consists of two X-bee modules , two microcontrollers connected to each module , a personal computer (PC) , a cold store, and a designed circuit. The (PC) is used to develop a program in order to download it in the microcontroller . One X-bee module serves as a remote control, while the other is used to receive commands from the first one. When a command is received the microcontroller in the reception site decodes the command. The decoded command is used to control the operations in the cold store . This remote control system can be used for any electronic or electrical device to operate it from anywhere using the X-bee technology.

 

Keywords: control system, remote control ,PC , X-bee , ASK , cold store.

[1] Manual on meat cold store operation and management By/Dr G. Cano-Muz ApriI.202008
http://www.fao.org/DOCREP/OO4/TOO98E/TOO98EOO.HTM
[2] Remote control http://en.wikipedia.org/wiki/Remotecontrol April.1O.2008.
[3] Radio control httpengineeringtalk.com/ March. 15.2008
[4] History of remote control http://www.modellbah nottcom/tqpage/ihistory.html March.5.2008

 

Paper Type

::

Research Paper

Title

::

Bulk Demand (S, s) Inventory System with PH Distributions

Country

::

India

Authors

::

Sundar. V || , Rama G ||, Ramshankar.R ||, Sandhya. R ||, Ramanarayanan. R𝑅

Page No.

::

24-33

aned
::
0.4/3021-05112433 aned
iosrjen   3021-0501-0133 iosrjen

This paper studies two stochastic bulk demand (S, s) inventory models A and B both with k1 phases PH demand occurrence and k2 phases PH lead time distributions respectively. In the models the maximum storing capacity of the inventory is S units and the order for filling up the inventory is placed when the inventory level falls to s or below. The demands occur when the absorption occurs in the demand arrival PH process. Its size is random and is bounded above with distribution function depending on the phase from which the absorption occurs. Lead time for an order realization has phase type distribution with the supply size ≥ S and is bounded above with bounds depending on the phase from which the absorption occurs in the PH lead time distribution. When the inventory has no stock, demands wait for supply forming a queue. Only after clearing the waiting demands, the inventory is filled up. When an order is placed only after its realization, the next order can be placed. When the inventory is filled up due to an order realization, units received in excess are returned. In model A, the maximum of the maximum demand sizes in the k1 phases is greater than the maximum of the k2supply sizes. In model B the maximum of the maximum demand sizes in the k1phases is less than the maximum of the k2supply sizes. Matrix partitioning method is used to study the inventory systems. The stationary probabilities of the inventory stock size, the probability of the waiting demand length, its expected values, its variances and probabilities of empty levels are derived for the two models using the iterated rate matrix. Numerical examples are presented for illustration.

 

Keywords: Block Partition, Bulk Demand, Matrix Geometric Method, Phase Type Distribution, Supply after Lead Time.

[1] Salah, Rachid, Abdelhakim and Hamid, On the Approximation of Arbitrary Distributions by Phase-Type Distributions, www.ise.ncsu.edu/faculty/docs/IETrans.pdf
[2] Thangaraj.V and Ramanarayanan.R, (1983), An operating policy in inventory system with random lead times and unit demands, Math.Oper and Stat.Series Optimization, Vol.1 p111-124.
[3] Jacob.K.D and Ramanarayanan.R, (1988) An (S,s) Inventory System with Rest Periods to the Server, Naval Research Logistic Q, Vol 35 (1) pp119-123.
[4] D. Bini, G. Latouche, and B. Meini. (2005). Numerical methods for structured Markov chains, Oxford Univ. Press, Oxford.
[5] Chakravarthy.S.R and Neuts. M.F.(2014). Analysis of a multi-server queueing model with MAP arrivals of customers, SMPT, Vol 43, 79-95,

 

Paper Type

::

Reveiw Paper

Title

::

Solution of Swing equation for Transient Stability Analysis in Dual-machine System

Country

::

India

Authors

::

S. Padhi || B.P.Mishra

Page No.

::

34-39

aned
::
0.4/3021-05113439 aned
iosrjen   3021-0501-0139 iosrjen

The stability of an interconnected power system is its ability to return to normal or stable operation after having been subjected to some form of disturbance. With interconnected systems continually growing in size and extending over vast geographical regions, it is becoming increasingly more difficult to maintain synchronism between various parts of the power system. Modern power systems have many interconnected generating stations, each with several generators and many loads. So our study is focused on multi-machine stability .

 

Keywords: – Stability, Swing Equation, Transient Stability, Synchronous machine, Numerical Methods

[1] Mathew & S.Chatterji "Transient Stability Analysis of Multi-Machine System Equipped with Hybrid Power Flow Controller "IJCEM International Journal of Computational Engineering & Management, Vol. 15 Issue 4, July 2012.
[2] Monchusi, Bessie Mitani , Yasunori Changsong, Li and Dechanupaprittha "The International Conference on Electrical Engineering 2008 " July 6-10, 2008, OKINAWA, JAPAN .
[3] Parsi-Feraidoonian, R.; Xian-Lin Sun; Wvong, M.D "Catastrophe theory model of multimachine power systems for transient stability studies " IEEE conference 1993 , Vol-5 PP 187-190 .
[4] Muyeen, S.M.; Ali, M.H.; Takahashi, R.; Murata, T.; Tamura, J.; Tomaki, Y.; Sakahara, A.; Sasano, E.; , "Comparative study on transient stability analysis of wind turbine generator system using different drive train models," Renewable Power Generation, IET , vol.1, no.2, pp.131-141, June 2007.
[5] Marc Bodson, and Oleh Kiselychnyk "Nonlinear Dynamic Model and Stability Analysis of Self-Excited Induction Generators "2011 American Control Conference on O'Farrell Street, San Francisco, CA, USA June 29 - July 01, 2011.

 

Paper Type

::

Research Paper

Title

::

Computerized network security and cryptography

Country

::

Sudan

Authors

::

Motea Abdelaziz Mohammed Noman || Saifeldeen Fatooh || Abdelrasoul Jabar Alzubaidi

Page No.

::

40-43

aned
::
0.4/3021-05114043 aned
iosrjen   3021-0501-0143 iosrjen

For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem .The requirements of information security within an organization have undergone major changes in the last several decades .With the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident .This is especially the case for a shared system, such as time sharing system and the need is even more acute for systems that can be accessed by any user . This paper deals with building a secured algorithm to ensure data security in the computer network.

 

Keywords: encryption, data, algorithm, computer network,

[1] C. Gentry, Fully homomorphic encryption using ideal lattices, Symposium on the Theory of Computing (STOC), 2009, pp. 169-178.
[2] P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Advances in Cryptology EUROCRYPT'99, LNCS 1592, pp. 223–238,
[3] Springer, New York, NY, USA, 1999.
[4] Josh Benaloh, Dense Probabilistic Encryption, SAC 94, pages 120–128, 1994.
[5] I. Damg˚ard and M. Jurik. A Length-Flexible Threshold Cryptosystem with Applications.ACISP '03, pp. 350–356.

 

Paper Type

::

Research Paper

Title

::

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm

Country

::

Sudan

Authors

::

Nadir M. Abd Elaziz || , Abdelrasoul Jabar Alzubaidi || , Mustafa A. Hassan

Page No.

::

44-57

aned
::
0.4/3021-05114457 aned
iosrjen   3021-0501-0157 iosrjen

this paper examines the performance of Minimum-Mean-Square-Error (MMSE) adaptive algorithm as a reception algorithm for the 6th derivative Ultra-wideband (UWB) Gaussian pulse shape signals compared to the performance of conventional Ultra-Wideband (UWB) Rake receiver with different number of Rake fingers. MMSE adaptive algorithm is more efficient and powerful because of its ability and features of adaptation to the substantial changes in the UWB multipath wireless communication channel model proposed by the IEEE 802.15.3a working group based on modified (S-V) channel model because it is the most realistic and practical channel model due to the nature of multipath wireless environment. The paper demonstrates the performance of two commonly used transmission schemes in UWB communications which are Direct- Sequence (DS-UWB) and Time-Hopping (TH-UWB) to compare between their performances over the previously mentioned UWB multipath channel model using also two reception techniques which are the UWB Rake receiver (with different number of Rake fingers) and the MMSE adaptive algorithm receiver to show the latter efficiency due to its distinctive adaptability. Moreover, the performance comparison between the two reception techniques presented in this paper is assumed to be performed in the presence of both; narrowband interference coming from other networks (e.g. IEEE 802.11a WLAN), and also the presence of Multiple- Access-Interference (MAI) coming from other UWB users in the proximity of the desired UWB user.

 

Index Terms: - Ultra-Wideband (UWB), Multiple-Access-Interference (MAI), Federal-Communication- Committee (FCC), Bit-Error-Rate (BER), Signal-to-Noise Ratio (SNR), Signal-to-Interference-Noise Ratio (SINR), Power-Spectral-Density (PSD), Minimum-Mean-Square-Error (MMSE), Channel-Model (CM).

[1] Ian Oppermann, Matti Hamalainen "UWB Theory and Applications," Book, pp. 15–80.
[2] M.Ghavami, L.B.Michael "Ultra-Wideband Signals and Systems in Communication Engineering," Book, pp. 26–113.
[3] B. M.Mezzour, "Direct Sequence UWB performance over STDL " paper Journal, vol.3.
[4] Nadir. Abd Elaziz, Abdelrasoul. Alzubaidi, "Performance of the 6th derivative Gaussian Pulse Shape in IEEE 802.15.3a Multipath Fading Channel" IOSR journal of Engineering, Vol3, Issue December 2014.
[5] Rashid A. Fayyadh, F. Malik "Adaptive Rake receiver using Matched Filter with Three Combining Techniques" Australian Journal of Basic and Applied Sciences, 7(5): 26-33, 2013 ISSN 1991-8178.

Paper Type

::

Research Paper

Title

::

Efficient Control of Information Brokerage Systems in Distributed Networks

Country

::

India

Authors

::

Mrs. Sindhuja M, Mr. S. Niresh Kumar, Mrs. Thaiyalnayaki S

Page No.

::

58-62

aned
::
0.4/3021-05115862 aned
iosrjen   3021-0501-0162 iosrjen

Information brokering systems (IBSs) are planned to connect many data sources via a brokering edge, that the brokers route their decisions to direct client queries to the requested data servers. Most of the prevailing brokering systems like global organization agency shares data through brokers and conjointly assumes that brokers square measure sure so exclusively agree server-side access control for information privacy. However, privacy of information location and client data can still be collected from information modified among the IBS. In this paper, we propose an approach to preserve privacy of multiple stakeholders involved at intervals in the data brokering system by using Personal Health Records as the case study. In the proposed system an encryption scheme known as Jasypt to provide the strong encryption and also providing the Load Balancing algorithm to avoid data loss and finally a new technique known as Proxy Re-Encryption to provide the double Encryption for the Sensitive data

[1]. Alexandra Boldyreva, Mihir Bellare, Adam O'Neill, (2007)"Deterministic And Efficiently Searchable Encryption", in Proc.Crypto.
[2]. Fengjun Li Bo Luo Peng Liu Dongwon Lee Prasenjit Mitra Wang-Chien Lee Chao-Hsien Chu. (2006 )"In-Broker Access Control: Towards Efficient End-To-End Performance Of Information Brokerage Systems", in Proc. IeeeSutc.
[3]. 3. L. M.Haas, E. T. Lin, andM.A. Roth, (2002) "Data Integration Through Database Federation" IBM Syst.
[4]. N. Koudas, M. Rabinovich, D. Srivastava, and T. Yu,( 2004)" Routing Xml Queries" in Proc. ICDE.
[5]. H. Y. S. Lu, (2004)"Commutative Cipher Based En-Route Filtering In Wireless Sensor Networks", in Proc. VTC.