For many developing countries the importation of second-hand goods including used vehicles accounts for a large proportion of all machinery imports which sometimes shows double-digit rates of growth. However, there appears not to be a corresponding level of awareness on quality of the items and the techniques for assessing products/items appear not analytic. It is buy as seen. This work is an attempt to develop a framework to bridge this gap in knowledge. This work developed a composite index model for vehicle assessment. The performance of some used vehicles were determined and then compared with the performance of the benchmark. Data were collected from different vehicle types. The model was applied to three vehicle types A, B and C. For body exterior, the results are 0.563, 0.879 and 0.484 for A, B and C respectively, while engine performance gave 0.789, 0.766 and 0.759 for A, B and C respectively. The overall indices are 0.890, 0.7148 and 0.5414. and the results showed B has a better preference than A and then C. Appling this model would help a prospective buyer of a used vehicle to use an analytical approach in the intended purchase, and thus good value for money .
Keywords: - Composite index, Used equipment, Model.
Research was carried out to assess the damage caused by oil spills on agricultural land. In order to remove oil contamination in the soil, it was treated with lime for toxicity reduction. Soil pH was slightly acidic and ranged from 5.5 to 6.0. Fertilizer was applied for soil replenishment and to increase production.
Keywords: - Remediation, hydro-carbon, Lime, Oil, Soil.
Clouds Are Becoming An Interesting Alternative To Dedicated It Infrastructure. However, Cloud Computing Also Carries Certain Degree Of Risk For Both Customers And Cloud Service Providers. There Is A Lack Of Trust In Cloud Which Acts As A Barrier In Widespread Adoption Of Cloud Computing Technology. In Order To Increase Trust In Cloud ,We Need To Make Clouds More Transparent And Accountable For Both Enterprises And End User. Accountability And Transparency Can Be Achieved By Tracking Every Single Activities And Data Transfers Happening Within Cloud Environment.Current Systems Fail To Provide This. Thus, In This Paper We Propose A Framework Which Achieves Accountability By Generating Logs For Every User Activity, Further We Suggest A Kernel Level Encryption Mechanism For Encrypting Log And TTP For Storing And Accessing The Logs.
Keywords: - Cloud Computing, Logging, Accountability, Trusted Cloud, Detective Mechanism, Files Centric Logging, Cloud Forensics, Trusted Third Party (TTP).
Image encryption method prepared information unreadable. Therefore, no hacker or eavesdropper, including server administrators and others, have access to original message or any other type of transmitted information through public networks such as internet. This paper presented a secure encryption method for true image encryption, which gets the benefits of both methods (symmetric and asymmetric encryption methods); a hybrid technique is usually used. In this technique, asymmetric encryption (RSA) is used to encrypt the security message the resulting cipher text is converted to binary form then symmetric encryption designed to encrypt the resulted cipher bits by making XOR operation with it. The design of symmetric key provides good confusion and diffusion properties that ensures high security. The easiest way to do this is through the design of the strong threshold linear feedback shift register, where the R,G,B bytes is ciphered with a single distinct bit generated from making XOR operation between key generator and resulting binary cipher bits ,which made the ciphers are more complex, the key is said to be well designed and its size provides an upper bound of an algorithm's cryptographic strength ,which consist of four shift registers the length them are 12,10,7,5 respectively, three of them are linear and the other are non-linear,also the design of the linear feedback function very strong ,which provided maximum length period. The opposite operation is performed to reconstructed the original image and the original secure message .in addition to that different measured have been used to explain the range of the difference between the regional and cipher images and to show the power of the encryption methods, such as histogram, Calibrated area, Mean, Standard deviation, Median, Calibrated center of mass , Calibrated perimeter, and Calibrated ferret diameter.
Keyword: linear feedback shift register, RSA, symmetric cipher, asymmetric cipher.
[1] P.Shanmugam & C.Loganathan," Involuntary matrix in visual cryptography ", IJRRAS 6 (4) , March 2011.
[2] Varsha Bhatt, "Implementation of new advanced image encryption algorithm to enhance security of multimedia component ",IJATER, ISSN No: 2250-3536, Volume 2, Issue 4, July 2012.
[3] Fauzan Saeed and Mustafa Rashid, "Integrating Classical Encryption with Modern Technique" IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.5, May 2010.
[4] Kahate A., "Cryptography and network security", Tata-McGraw-Hill, 2nd edition , 2008.
[5] Mohammed Abbas Fadhil Al-Husainy, "A Novel Encryption Method for Image Security", International Journal of Security and Its Applications, Vol. 6, No. 1, January, 2012.
An analytical solution of the classical plate bi-harmonic equation for rectangular plates using isolated strip moment ratios SMR is herein presented. It is assumed that the load on the plate is supported by the joint effort of transverse x-x strips, longitudinal y–y strips and the two diagonal x–y strips, acting as isolated simple beams. With the knowledge that the sum of load fractions contributed by the strips equates to unity, the isolated strips are rationed and the load coefficient in each strip is obtained. This reduces the plate problem to a somewhat simple beam problem. The product of the load fraction of a strip and its primitive beam moment and deflection are the required plate moment and deflection respectively. The effect of Poisson ratio and serviceability criterion h (deflection to span ratio) on plates is also studied. The indication is that an increase in Poisson ratio brings about an increase in the longer span moments of the plate and has got no significant effect on the shorter span moment and deflection of the plate. When the Serviceability criterion is increased and the Poisson ratio kept constant, there is a significant effect on the deflection and moments of the plate. Based on the results of practical application, the SMR method is relatively easier and faster than other methods while the solutions show close agreement with the exact classical results.
Keywords: - Plate, strip moment ratio, SMR, load fraction, primitive deflection and moment, Corners held
[1] J. Votano, M. Parham and L. Hall, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications Magazine, vol. 6, no. 2, p. 46–55, Apr. 1999.
[2] T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Spray and wait: an efficient routing scheme for intermittently connected mobile networks," New York, 2005.
[3] A. Vahdat and D. Becker, "Epidemic Routing for Partially-Connected Ad Hoc Networks," Duke University, 2000.
[4] A. Lindgren, A. Doria and O. Schelen, "Probabilistic Routing in Intermittently Connected Networks," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 3, pp. 19 - 20, 2003.
[5] Barun, "The One," 2011. [Online]. Available: http://delay-tolerant-networks.blogspot.co.uk/p/one-tutorial.html. [Accessed 03 June 2012].
Emitter signals identification is one of the key procedures in signal processing of Electronic Intelligence (ELINT). Jitter is an unintentional form of modulation that can have a wide variety of sources. Timing-related data errors will occur if jitter is beyond acceptable limits. Designers need a fast and easy way to obtain a complete characterization of clock jitter in microprocessor controlled. To enhance the ability of emitter identification (EID) to meet the requirement of modern ELINT, a novel identification approach for radar emitter signals based on type-2 fuzzy classifier is presented in this paper. This work discusses the impact of unknown jitter sampling on signal estimation. Based on the ELINT feature extraction of radar emitter signals, the type-2 fuzzy classifier is applied to identification of highly jittered radar emitters effectively. Experiment results shows that the approach can achieve high accurate classification even at higher error deviation level, and has good characteristics of identification.
Keywords: - Signals identification, Fuzzy classifier, Electronic Intelligence
© 2019 All Rights Reserved | Design by iosrjen