October - 2013 (Volume-3 ~ Issue-10 ~ Part-1)

Paper Type

::

Research Paper

Title

::

A composite index model for evaluating used equipment

Country

::

Nigeria

Authors

::

C.O. Anyaeche ||, and E. B. Omoniyi

Page No.

::

01-04

::
10.9790/3021-031010104
aned
::
0.4/3021-031010104 aned
iosrjen   3021-0310-0104 iosrjen

For many developing countries the importation of second-hand goods including used vehicles accounts for a large proportion of all machinery imports which sometimes shows double-digit rates of growth. However, there appears not to be a corresponding level of awareness on quality of the items and the techniques for assessing products/items appear not analytic. It is buy as seen. This work is an attempt to develop a framework to bridge this gap in knowledge. This work developed a composite index model for vehicle assessment. The performance of some used vehicles were determined and then compared with the performance of the benchmark. Data were collected from different vehicle types. The model was applied to three vehicle types A, B and C. For body exterior, the results are 0.563, 0.879 and 0.484 for A, B and C respectively, while engine performance gave 0.789, 0.766 and 0.759 for A, B and C respectively. The overall indices are 0.890, 0.7148 and 0.5414. and the results showed B has a better preference than A and then C. Appling this model would help a prospective buyer of a used vehicle to use an analytical approach in the intended purchase, and thus good value for money .

 

Keywords: - Composite index, Used equipment, Model.

[1] Jorg Janischweski, Mikael P. Henzler and W. Kahlenborn. 2003. The Export of Second-hand Goods and the transfer of Technology.www.nachhaltigkeitsrat.de May 2007. Anindya Ghose . 2005. Used Good Trade Patterns: A Cross-Country Comparison of Electronic Secondary Markets, Stern School of Business, NYU
[2] Hendel, I. and Lizzeri 1999. Adverse Selection in Durable Goods Markets. American Information Search for Automobiles. Journal of Marketing Research 40(2), pp 193-209.
[3] Emons, W. and Sheldon G. 2002.The Market for Used Cars: A New Test of the Lemons Model
[4] Anyaeche, C. O. 2007, The Automobile Assembly Plants in Nigeria,: A Failed Dream and The Way Forward:
[5] Research Manuscripts in the Department of Industrial and Production Engineering, University of Ibadan.

 

Paper Type

::

Research Paper

Title

::

Remediation of Crude Oil-Polluted Soil with Lime

Country

::

Nigeria

Authors

::

Anyadike, C.C. ||, Akunne, I. ||, Ugwuishiwu, B.O. ||, Ajah, G.N. ||, Ogwo, V.I.

Page No.

::

05-07

::
10.9790/3021-031010507
aned
::
0.4/3021-031010507 aned
iosrjen   3021-0310-0107 iosrjen

Research was carried out to assess the damage caused by oil spills on agricultural land. In order to remove oil contamination in the soil, it was treated with lime for toxicity reduction. Soil pH was slightly acidic and ranged from 5.5 to 6.0. Fertilizer was applied for soil replenishment and to increase production.

 

Keywords: - Remediation, hydro-carbon, Lime, Oil, Soil.

[1] R.M. Oyem, "Cutting edge oil spill recovery technology and services since 1982," 2001.
[2] I. Akunne, "Effects of Oil Spillage on Farm Land (A Case Study of Uroboh)," Department of Agricultural and Bioresources Engineering, University of Nigeria., Nsukka, Nigeria., B.Eng Project Thesis 2007.
[3] P.R. Day, "Chapter 43 - Particle fractionation and particle-size analysis," in Methods of Soil Analysis, Part 1., C.A. Black, Ed. Madison: American Society of Agronomy., 1965, pp. 545-567.
[4] C.T.I. Odu, O.F. Esuruoso, L.C. Nwoboshi, and J.A. Ogunwale, "Environmental study of the Nigerian Agip Oil Company operational areas.," in Proceedings of the soils and fresh water vegetation conference., Milan, Italy, 1985.
[5] G.N. Smith and I.G.N. Smith, Element of Soil Mechanics, 7th ed. Oxford: Blackwell Science, 1998.

 

Paper Type

::

Research Paper

Title

::

Developing trustworthy Cloud with the Help of TTP

Country

::

India

Authors

::

Deepti Nikumbh ||, Manish Potey

Page No.

::

08-15

::
10.9790/3021-031010815
aned
::
0.4/3021-031010815 aned
iosrjen   3021-0310-0115 iosrjen

Clouds Are Becoming An Interesting Alternative To Dedicated It Infrastructure. However, Cloud Computing Also Carries Certain Degree Of Risk For Both Customers And Cloud Service Providers. There Is A Lack Of Trust In Cloud Which Acts As A Barrier In Widespread Adoption Of Cloud Computing Technology. In Order To Increase Trust In Cloud ,We Need To Make Clouds More Transparent And Accountable For Both Enterprises And End User. Accountability And Transparency Can Be Achieved By Tracking Every Single Activities And Data Transfers Happening Within Cloud Environment.Current Systems Fail To Provide This. Thus, In This Paper We Propose A Framework Which Achieves Accountability By Generating Logs For Every User Activity, Further We Suggest A Kernel Level Encryption Mechanism For Encrypting Log And TTP For Storing And Accessing The Logs.

 

Keywords: - Cloud Computing, Logging, Accountability, Trusted Cloud, Detective Mechanism, Files Centric Logging, Cloud Forensics, Trusted Third Party (TTP).

[1] A. Haeverlen, and, "A Case for the Accountable Cloud",ACM SIGOPS Operating System Review,vol.44,pp.52-57,2010.
[2] C. Cachin, I. Keidar, A. Shaer, "Trusting the Cloud", ACM SIGACT News, vol.40, No.2, June 2009.
[3] K. L. Ryan Ko, P. Jagadpramana, M. Mowbray, S. perasons, M. Kirchberg, Q. Liang, B. S. Lee "TrustCloud-A freamework for accountability and trust in cloud computing",IEEE 2nd Cloud Forum for Practitioners,IEEE Computer Society, Washington DC, USA, 7-8 July 2011.
[4] Cloud Security Alliance," Top Threats to Cloud Computing (V1.0)",2010; https://cloudsecurityalliance.org/topthreats /csathreats.v1.0.pdf.
[5] J. K. Muppala,D. Shukla,S. K. Patil, "Establishing Trust in Public Clouds", J Inform Tech Softw Eng,2012.

 

Paper Type

::

Research Paper

Title

::

Design and implementation proposed system for encryption true images

Country

::

Iraq

Authors

::

Asst. Prof. Dr.Baheja K.Shukur ||, Ala aldeen abbas Abdulhassan

Page No.

::

16-27

::
10.9790/3021-031011627
aned
::
0.4/3021-031011627 aned
iosrjen   3021-0310-0127 iosrjen

Image encryption method prepared information unreadable. Therefore, no hacker or eavesdropper, including server administrators and others, have access to original message or any other type of transmitted information through public networks such as internet. This paper presented a secure encryption method for true image encryption, which gets the benefits of both methods (symmetric and asymmetric encryption methods); a hybrid technique is usually used. In this technique, asymmetric encryption (RSA) is used to encrypt the security message the resulting cipher text is converted to binary form then symmetric encryption designed to encrypt the resulted cipher bits by making XOR operation with it. The design of symmetric key provides good confusion and diffusion properties that ensures high security. The easiest way to do this is through the design of the strong threshold linear feedback shift register, where the R,G,B bytes is ciphered with a single distinct bit generated from making XOR operation between key generator and resulting binary cipher bits ,which made the ciphers are more complex, the key is said to be well designed and its size provides an upper bound of an algorithm's cryptographic strength ,which consist of four shift registers the length them are 12,10,7,5 respectively, three of them are linear and the other are non-linear,also the design of the linear feedback function very strong ,which provided maximum length period. The opposite operation is performed to reconstructed the original image and the original secure message .in addition to that different measured have been used to explain the range of the difference between the regional and cipher images and to show the power of the encryption methods, such as histogram, Calibrated area, Mean, Standard deviation, Median, Calibrated center of mass , Calibrated perimeter, and Calibrated ferret diameter.

 

Keyword: linear feedback shift register, RSA, symmetric cipher, asymmetric cipher.

[1] P.Shanmugam & C.Loganathan," Involuntary matrix in visual cryptography ", IJRRAS 6 (4) , March 2011.

[2] Varsha Bhatt, "Implementation of new advanced image encryption algorithm to enhance security of multimedia component ",IJATER, ISSN No: 2250-3536, Volume 2, Issue 4, July 2012.

[3] Fauzan Saeed and Mustafa Rashid, "Integrating Classical Encryption with Modern Technique" IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.5, May 2010.

[4] Kahate A., "Cryptography and network security", Tata-McGraw-Hill, 2nd edition , 2008.

[5] Mohammed Abbas Fadhil Al-Husainy, "A Novel Encryption Method for Image Security", International Journal of Security and Its Applications, Vol. 6, No. 1, January, 2012.

 

Paper Type

::

Research Paper

Title

::

Strip Moment Ratio (SMR) Theory of Plate Analysis for Uniformly Loaded Simply Supported Rectangular Plates with Corners Held Down

Country

::

Nigeria

Authors

::

Orumu S.T. ||, Ephraim M.E.

Page No.

::

28-45

::
10.9790/3021-031012845
aned
::
0.4/3021-031012845 aned
iosrjen   3021-0310-0145 iosrjen

An analytical solution of the classical plate bi-harmonic equation for rectangular plates using isolated strip moment ratios SMR is herein presented. It is assumed that the load on the plate is supported by the joint effort of transverse x-x strips, longitudinal y–y strips and the two diagonal x–y strips, acting as isolated simple beams. With the knowledge that the sum of load fractions contributed by the strips equates to unity, the isolated strips are rationed and the load coefficient in each strip is obtained. This reduces the plate problem to a somewhat simple beam problem. The product of the load fraction of a strip and its primitive beam moment and deflection are the required plate moment and deflection respectively. The effect of Poisson ratio and serviceability criterion h (deflection to span ratio) on plates is also studied. The indication is that an increase in Poisson ratio brings about an increase in the longer span moments of the plate and has got no significant effect on the shorter span moment and deflection of the plate. When the Serviceability criterion is increased and the Poisson ratio kept constant, there is a significant effect on the deflection and moments of the plate. Based on the results of practical application, the SMR method is relatively easier and faster than other methods while the solutions show close agreement with the exact classical results.

 

Keywords: - Plate, strip moment ratio, SMR, load fraction, primitive deflection and moment, Corners held

[1] Zienkiewiez, O.C. Finite Element Method in Engineering Science. Second edition McGraw-Hill Publication Co. Ltd. London. (1971) Pp. 398
[2] Rocky, K.C. The Finite Element, Granada Publication Ltd. London. (1975) 45-80
[3] Iron, B. Techniques of Finite Element Ellis Horwood Ltd, England(1980) 1-100
[4] E. Hinton, O.C. zeinkiewicz, & J.D. Davies : A Simple Finite Element Solution for Plates of Homogeneous, Sandwich and Cellular Construction; Proc. Instn. Civil Engineers. Part 2 (1975), 43-65
[5] A.R. Cusens& Y.C. Loo. Application of the Finite Strip Method in the Analysis of Concrete Box Bridges; Proc. Instn. Civil Engineers part 2 59 (1975) 189-192

 

Paper Type

::

Research Paper

Title

::

Opportunistic Communication in Highly Congested and Dynamic Urban Areas

Country

::

Iraq

Authors

::

Hayder Al-Ghanimi ||, Milena Radenkovic ||, Alaa Hassan

Page No.

::

46-52

::
10.9790/3021-031014652
aned
::
0.4/3021-031014652 aned
iosrjen   3021-0310-0152 iosrjen
This paper explores feasibility and performance characteristics of delay tolerant data dissemination in highly congested and dynamic urban area. We look into London scenario during the Olympic Games as highly challenging as it has significantly increased traffic and communication demands added over a short period of time to the already saturated and densely populated city. We investigate two different mobility scenarios that we run on the map of London Olympic area, a Random Movement Scenario and Work Day Movement Scenario, to test how effective opportunistic data transmission can be. We focus on intelligent probabilistic forwarding mechanisms and compare them to other state of the art delay tolerant protocols across a range of metric such as the number of delivery success, latency and overheads. Our results show that Spray and Wait has the best performance with the Random Scenario but the worst performance with the Work Day Movement Scenario whereas the intelligent probabilistic protocols has the lowest with Random Scenario but it gives better performance than Spray and Wait in Work Day Movement Scenario.

[1] J. Votano, M. Parham and L. Hall, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications Magazine, vol. 6, no. 2, p. 46–55, Apr. 1999.

[2] T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Spray and wait: an efficient routing scheme for intermittently connected mobile networks," New York, 2005.

[3] A. Vahdat and D. Becker, "Epidemic Routing for Partially-Connected Ad Hoc Networks," Duke University, 2000.

[4] A. Lindgren, A. Doria and O. Schelen, "Probabilistic Routing in Intermittently Connected Networks," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 3, pp. 19 - 20, 2003.

[5] Barun, "The One," 2011. [Online]. Available: http://delay-tolerant-networks.blogspot.co.uk/p/one-tutorial.html. [Accessed 03 June 2012].

 

Paper Type

::

Research Paper

Title

::

Identification of Highly Jittered Radar Emitters Signals based on Fuzzy Classification

Country

::

Taiwan

Authors

::

Yee Ming Chen ||, Chih-Min Lin ||, and Chi-Shun Hsueh

Page No.

::

53-59

::
10.9790/3021-031015359
aned
::
0.4/3021-031015359 aned
iosrjen   3021-0310-0159 iosrjen

Emitter signals identification is one of the key procedures in signal processing of Electronic Intelligence (ELINT). Jitter is an unintentional form of modulation that can have a wide variety of sources. Timing-related data errors will occur if jitter is beyond acceptable limits. Designers need a fast and easy way to obtain a complete characterization of clock jitter in microprocessor controlled. To enhance the ability of emitter identification (EID) to meet the requirement of modern ELINT, a novel identification approach for radar emitter signals based on type-2 fuzzy classifier is presented in this paper. This work discusses the impact of unknown jitter sampling on signal estimation. Based on the ELINT feature extraction of radar emitter signals, the type-2 fuzzy classifier is applied to identification of highly jittered radar emitters effectively. Experiment results shows that the approach can achieve high accurate classification even at higher error deviation level, and has good characteristics of identification.

 

Keywords: - Signals identification, Fuzzy classifier, Electronic Intelligence

[1] J. Roe, S. Cussons, and A. Feltham: Knowledge-based signal processing for radar ESM systems, IEE Proceedings F, Radar and Signal Processing, 137(5), 1990, 293-301
[2] Y.J. Ryoo, K.H. Song, and W.W. Kim, Recognition of PRI modulation types of radar signals using the autocorrelation', IEICE Trans. Commun., E90-B(5),2007, 1290-1294
[3] A. K. Chang, J.O., Ryu and Y. Kim, Comparison of methods to estimate individual tree attributes using color aerial photographs and LiDAR data', WSEAS Trans. Signal Process., 4(1), 2008, 21-27
[4] J. Liu, J. Lee, L. Li, Z.Q. Luo, and K. Wong ,Online clustering algorithms for radar emitter classification, IEEE Trans. Pattern Anal. Mach. Intell., 27(8), 2005,1185-1196
[5] S.A. Hassan, A.I. Bhatti, and A. Latif, Emitter recognition using fuzzy inference system, IEEE Int. Conf. Emerging Technologies, 2005, 204-208