January - 2015 (Volume-5 ~ Issue-1 ~ Part-2)

Paper Type

::

Research Paper

Title

::

Examination the role of technical information in the development of nursing education for the Iraqi Faculties of Nursing

Country

::

Baghdad,

Authors

::

Eqbal G. Ma΄ala, PhD ||, Ali D. Abbas, PhD

Page No.

::

01-06

aned
::
0.4/3021-05120106 aned
iosrjen   3021-0501-0206 iosrjen

The study objectives to examining the role of technical information used in nursing education, such as "the Internet, e-mail services, video, audio conferencing and other "in the Iraqi faculties of nursing.
Methodology: A descriptive and analytical study which was using the examination approach was conducted on a non-probability sample (purposive sample) of (150) members of the Iraqi Faculties of Nursing. A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first part which included the demographic characteristics of faculty members (such as age, sex, their qualification, scientific title, and the scientific department in college) and the second part includes (22) question about the technical information used in nursing education, Where it was built through the review of the literature related to technical information used in education. Data were collected through a self- administration method, from 4th to 30th September, 2014. Data were analyzed through use of descriptive analysis (frequencies and percentages), and inferential statistical measures which include the (ANOVA). Results: The results of the study indicated that the majority of faculty members are encouraged to use of various technical information in nursing education. Conclusion: The study concluded that the high qualification of faculty members led to a high familiarity with technical information and its importance in nursing education.
Recommendations: The study recommend the need to develop a database on the use of technical information in the Nursing college as well as for the other Nursing colleges in Iraqi Universities to facilitate the process of identifying needs, planning services for information systems and the optimal allocation of resources for technical information in nursing education.

 

Keywords: Technical Information, File Transmission Protocol, Video Conferencing, Grade default

[1] McNeil, B., et al.: Nursing information technology knowledge, skills, and preparation of student nurses, nursing faculty, and clinicians: a U.S. survey, J Nurs Educ. 2003 Aug; 42(8):P.P.341-9.
[2] Elizabeth, R.; Linda, M., and Carolyn, W.: Using Information Technology in Nursing Education, IGI Global, 2009, P.P. 8-10.
[3] Marilyn, F.: Curriculum Strategies to Improve Baccalaureate Nursing Information Technology Outcomes, Journal of Nursing Education, Feb., 2009, V. 48 · Issue 2: P.P.78-85.
[4] American Association of Colleges of Nursing, White Paper: Distance Technology in Nursing Education, available from: www. aacn .nche .edu/Publications/positions/whitepaper.htm. Accessed 9/2003. Last update on 13 Oct.1999.
[5] Wong, T., and Chung, J.: Diagnostic reasoning processes using patient simulation in different learning environments, Journal of Clinical Nursing, 2002, 11(1). P.P. 65-72.

 

Paper Type

::

Research Paper

Title

::

Microbial Assessment of Air In The Vicinity Of Some Dump Sites in Delta State

Country

::

Nigeria

Authors

::

Jude C. Igborgbor ||, Gideon I. Ogu

Page No.

::

07-15

aned
::
0.4/3021-05120715 aned
iosrjen   3021-0501-0215 iosrjen

The microbial loads of air in the vicinity of various dumpsites in Delta State, Nigeria, were conducted for a period of 6 months (July - December, 2012) using standard pour plate and spread plate microbiological techniques. Results showed that all the tested parameters decreased with distance away from the dumpsites and the microbial loads were higher than regulatory limits. The heterotrophic bacteria count ranged from 1.41 x 108 to 29.2 x 1014 cfu/ml, while fungal counts ranged from 1.12 x 108 to 1.39 x 1014 cfu/ml. Bacterial counts were higher in the months of July, August and September, while fungi were more in the months of October to December. The bacterial genera isolated were Staphylococcus, Streptococcus, Micrococcus, Bacillus, Pseudomonas, Escherichia coli, and Klebsiella species, while the fungal isolates were Penicillium, Aspergillus, Alternaria, Mucor, Curvularia, Rhizopus and Cladosporium sp. Statistical analysis showed that there were significant differences (P<0.05) between the microbial load of the various dumpsites, periods and distance of sampling sites. This study showed that potential airborne pathogens not only abound in the vicinity of waste dumpsites but also decreased with increasing distance from the dump sites. It is therefore recommended that dumpsites be located at a minimum 1km distance away from residential quarters.

 

Keywords: - Microbial loads, dumpsites, heterotrophic bacteria count, residential quarters

[1] F. C. Akharayi and F.O. Omoya. Microflora of Refuse Dumps and sites in five localities in Ondo state, Nigeria. Inter. J. Environ. 2(1-2), 2004, 27-32.
[2] R. Madhukar and S. Srikantaswamy. Assessment of Air Quality in Bidadi Industrial Area, Ramanagaram District, Karnataka, India. J. Environ. Sci., Comp. Sci. Eng. Technol. 2(4), 2013, 1135-1140.
[3] A. A. Jaffal, H. Nsanze, A. Benar, A. S. Ameen, I. M. Banat and A. A. EL-Moghett. Hospital airborne microbial pollution in a desert country. Environ. Inter., 1997, 23(2):67-172.
[4] T. T. Adebolu and K. J. Vhriterhire. Survey of the microbial flora of the Ondo State Specialist Hospital Environment, Akure, Nigeria. Nig. J. Microbiol., 16(112), 2002, 91-94.
[5] J. Dutkiewicz and M. Augustowska. Variability of airborne microflora in a hospital ward with a period of one year. Ann. Agric. Environ. Med., 13, 2006, 99-106.

 

Paper Type

::

Research Paper

Title

::

Dual Gain control of the helical feed parabolic Reflector antenna

Country

::

Sudan

Authors

::

Zohair Mohammed Elhassan Husein || Abdelrasoul jabar kizar alzubaidi

Page No.

::

16-21

aned
::
0.4/3021-05121621 aned
iosrjen   3021-0501-0221 iosrjen

A helical feed parabolic antenna is an antenna that uses a parabolic reflector with a helical feeder The curved surface of the parabola is to direct the radio waves. The most common form is shaped like a dish and is popularly called a dish antenna or parabolic dish. The main advantage of a parabolic antenna is that it is highly directive; it functions similarly to a searchlight or flashlight reflector to direct the radio waves in a narrow beam, or receive radio waves from one particular direction only. Parabolic antennas have some of the highest gains, that is they can produce the narrowest beam width angles, of any antenna type. In order to achieve narrow beam widths, the parabolic reflector must be much larger than the wavelength of the radio waves used, so parabolic antennas are used in the high frequency part of the radio spectrum, at UHF and microwave (SHF) frequencies, at which wavelengths are small enough that conveniently sized dishes can be used.
Parabolic antennas are used as high-gain antennas for point-to-point communication their other large use is in radar antennas, which need to emit a narrow beam of radio waves to locate objects like ships and airplanes. A helical antenna can be used as a feed for a parabolic dish for higher gains. The helical antenna can be an excellent feed for a dish, with the advantage of circular polarization This paper deals with applying an electronic technique to control the dimensions of the parabolic reflector plus controlling the helical feed position .The control of the parabolic reflector diameter and the helical feed lead to the control of the antenna gain .The proposed design is based on implementing a microcontrollers connected to an interface for the control of five stepper motors.

 

Keywords: - parabolic reflector, helical feed, antenna, antenna gain, microcontroller, interface, stepper motor

[1] Kraus, J.D., (W8JK), "A Helical-Beam Antenna Without a Ground Plane," IEEE Antennas and Propagation Magazine, April 1995, p. 45.
[2] Kraus, J.D. & Marhefka, R.J., Antennas: for All Applications, third edition, McGraw-Hill, 2002.
Emerson, D., AA7FV, "The Gain of the Axial-Mode Helix Antenna,"
[3] Antenna Compendium Volume 4, ARRL, 1995, pp. 64-68.
[4] Nakano, H., Yamauchi, J., & Mimaki, H., "Backfire Radiation from a
[5] Nakano, H., Mikawa, T., & Yamauchi, J., "Investigation of a ShortConical Helix Antenna," IEEE Transactions on Antennas and Propagation, October 1985, pp. 1157-1160.

 

Paper Type

::

Research Paper

Title

::

Distributed Beamforming Using Multi-Antenna Backscattering Network

Country

::

USA

Authors

::

Vikram Surendra || Maciej Zawodniok

Page No.

::

22-35

aned
::
0.4/3021-05122235 aned
iosrjen   3021-0501-0235 iosrjen

This paper proposes two novel beam-forming methodologies, which employ passive RF devices to enhance received signal through a passive, scattering based beam forming. Currently available backscattering systems, e.g. the radio frequency identification (RFID), suffer from a poor communication in an environment with multiple passive devices. The intermediate antennas create severe scattering environment with nulls. In contrast, the proposed approach changes the scattering properties of a subset of the multiple antennas such that the received signal strength and quality is maximized. The schemes employ Taguchi system and Learning Automaton to quickly identify such a suitable set of scattering intermediate devices. The theoretical limits of these schemes are studied mathematically and in simulations. For a 100-device network, the proposed schemes achieve power improvements over the line of sight equal to 37.5dB and 33dB for Taguchi and Learning Automaton-based schemes respectively. Moreover, the schemes are shown to perform well in an environment with the Rayleigh fading.

 

Keywords: - RFID networks, Beamforming, scattering, Learning automata, Taguchi method,

[1] Beiwei Zhang Kunyuan Hu Yunlong Zhu "Network architecture and energy analysis of the integration of RFID and Wireless Sensor Network", Control and Decision Conference (CCDC), May 2010, Page(s): 1379 – 1382.
[2] Oka, A., Lampe, L. , Distributed target tracking using signal strength measurements by a wireless sensor network, Selected Areas in Communications, IEEE Journal, September 2010, Volume 28 , Issue:7 , Page(s): 1006 – 1015.
[3] Jaekyu Cho ; Yoonbo Shim ; Taekyoung Kwon ; Yanghee Choi , "SARIF: A novel framework for integrating wireless sensor and RFID networks", IEEE Wireless Communications , December 2007 , Volume : 14 , Issue:6 , Page(s): 50 – 56. [4] C. U¨ nsal, "Intelligent Navigation of Autonomous Vehicles in an Automated Highway System: Learning Methods and Interacting Vehicles Approach," Ph.D. dissertation, Virginia Tech., Blacksburg, 1997.
[5] Learning Automata: An Introduction, Prentice Hall, 1989, Kumpati S. Narendra Mandayam A. L. Thathachar

 

Paper Type

::

Research Paper

Title

::

Numerical Approach to Predict the Strength of St. Peter Sandstone Pillars acted upon by Vertical Loads– A case study at Clayton, IA, USA

Country

::

USA

Authors

::

Francis Anohomah Arthur || Maochen Ge

Page No.

::

36-41

aned
::
0.4/3021-05123641 aned
iosrjen   3021-0501-0241 iosrjen
Estimation of pillar strength is an important part of assessing the stability of pillars used in mines. Previous studies conducted to estimate the strength of St. Peter Sandstone using empirical approach proved not adequateas a result of very little room and pillar underground development at the time. In this study, numerical models using finite difference code are used to predict the strength of St. Peter Sandstone pillars under varying overburden loads. A stable pillar case with dimension of 12.192 m × 12.192 m ×9.144 m, and room width of 10.3632 m is considered for this study.The relevant input parameters are discussed.Stress-strain behavior of the pillars acted upon by varying overburden loads are also presented. Based on the peak stress from the stress-strain plots, an empirical-based pillar strength formula is developed for St. Peter Sandstone. From this formula, a relationship has been established to define the maximum overburden depth for which a pillar will remain stable. For instance, for safety factors of 1.5 and 2, the maximum overburden covers should be no more than 80 mand 59 m respectively.The results is valid for a stable pillar case whose life is over 60 years.

[1] Petersen, David Lee. Estimating the strength of St. Peter sandstone pillars. Diss. University of Minnesota. 1978.

[2] Hoek, E., and E. T. Brown. "Practical estimates of rock mass strength."International Journal of Rock Mechanics and Mining Sciences 34.8 (1997): 1165-1186.

[3] Dittes, M., and J. F. Labuz. "Field and laboratory testing of St. Peter sandstone." Journal of geotechnical and geoenvironmental engineering 128.5 (2002): 372-380.

[4] Hoek, Evert, Carlos Carranza-Torres, and Brent Corkum. "Hoek-Brown failure criterion-2002 edition." Proceedings of NARMS-Tac (2002): 267-273.

[5] Brady, B. H. G. and Brown, E. T. (1985). Rock Mechanics for Underground Mining, London: George Allen and Unwin

 

Paper Type

::

Research Paper

Title

::

A design of Software Driver for A satellite Dish Antenna Positioning System

Country

::

Sudan

Authors

::

Emad A. Gabbar Moh. Alhasan || abdelrasoul jabar alzubaidi

Page No.

::

42-44

aned
::
0.4/3021-05124244 aned
iosrjen   3021-0501-0244 iosrjen

This paper deals with designing a Satellite Dish Antenna Positioning System using stepper motors. The system's software use longitude, latitude of the dish position (antenna site) and the satellite longitude as an input data. The software makes different calculations to transform this data to digits. The digits are then transformed to signals and fed to the stepper motors drivers to move the antenna adjusting azimuth, elevation and polarization angles to the intended satellite. The paper aims to describe the algorism and flow-chart of the system's software which allows users controlling and adjusting the antenna remotely. Also it aims to show the outputs of the software that will be transformed to signals to control the system's hardware drivers.

 

Keywords: Azimuth, Elevation, Look angle and Polarization

[1]. Michael O. Kolawole/ "Satellite Communication Engineering", 1st ed/ Marcel Dekker, Inc/ 2002.
[2]. Dennis Roddy/ "Satellite Communications", 3rd ed/ McGraw-Hill/ 2001.
[3]. Guide to Satellite Dish Installation/ http://www.practical-home-theater-guide.com/satellite-dish.html / 23th December 2014.
[4]. Matthew Grant/ Quick Start for Beginners to Drive a Stepper Motor, / Freescale Semiconductor, Inc.,/ AN2974 Ver.1/June.2005.
[5]. Paul E. Sandin/ "Robot Mechanisms and Mechanical Devices Illustrated", 1st ed/ McGraw-Hill/ 2003.
[6]. Paul Acarnley/"Stepping Motors: a guide to theory and practice", 4th Edition/Institution of Engineering and Technology/2007

 

Paper Type

::

Research Paper

Title

::

Optimized FPGA Hardware Encryption Implementation using Public Key Cryptography

Country

::

Sudan

Authors

::

Murtada Mohamed Abdelwahab|| Elsanosy M. Elamin|| , Abdul Rasoul Jabar Alzubaidi

Page No.

::

45-50

aned
::
0.4/3021-05124550 aned
iosrjen   3021-0501-0250 iosrjen

Public key algorithm is a popular algorithm that used to provide a secure transmission of information .The proposed implementation aims to provide a high level of security and correctness. The presented implementation is a public key algorithm based on Field Programmable Gate Array (FPGA). The design needs two keys to perform the process of decryption, one of the keys is a private key. The design is optimized in terms of the device hardware consumption compared to other related work shown in this paper. The targeted device is Xilinx Virtex 5. The obtained simulation results were correct and reliable. The results show that the implementation has an efficient utilization of the available resources of FPGA.

 

Keyword: - FPGA, Encryption, Decryption, Private Key

[1] Douglas.S,"Cryptography: Theory and Practice " ,CRC Press,1995.

[2] Dimitrios.M and Ioannis.P," Power consumption estimations vs measurements for FPGA-based security cores", in proceeding of International Conference on Reconfigurable Computing and FPGAs,pp 433- 437,Cancun ,Mexico,(2008).

[3] Gael.R, Francois.X.S, Jean.J. and Jean.D, "Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES", in Proceeding of International Conference on Information Technology: Coding and Computing, pp.339- 345, USA,(2004). [4] http://www.icommcorp.com/downloads/Comparison AES vs 3DES.

[5] Wenbo. M, "Modern Cryptography Theory and Practice", Packard Company, Prentice Hall PTR,(2003).