January - 2014 (Volume-4 ~ Issue-1 ~ Part-7)

Paper Type

::

Research Paper

Title

::

An Analytical Study of Flood Management in Bangladesh

Country

::

India

Authors

::

Dr. Md. Mizanur Rahman ||, Md. Amirul Hossain ||, Dr. Amartya Kumar Bhattacharya

Page No.

::

01-06

::
10.9790/3021-04170106
aned
::
0.4/3021-04170106 aned
iosrjen   3021-0401-0706 iosrjen
Bangladesh along with the state of West Bengal in India is situated in the lowest area of the Hindu Kush - Himalayan Region (HKH) and is famous as one of the highest flood prone countries in the world. Flood to some extent is an annual expected and well-come event for many reasons for this country. But extreme flood inundates more than half of the country's landmass causing immense suffering to the human life, damages properties and economy. Aim of the flood management in Bangladesh is to minimize damages or to avoid disastrous situation. Though the country is in the eastern part of the lowest ridge of HKH but geography and location of the country make hydrology of Bangladesh very diverse, complex and unique. The North-Eastern part of the country has the river networks with upper hilly catchments having one of the world's highest rainfall intensity and causes frequent flash floods. In the North-Western part rainfall intensity is lower, higher altitude and mighty perennial river network causes river flood. The South-Eastern part has moderate rainfall intensity, hilly as well as coastal plain land, flashy and tidal river network causes both the storm surge and flash flood. The South Western region has also moderate rainfall, coastal plain land and tidal rivers cause storm surge due to cyclone. Principles of flood management in the country based on these different types of floods and geographical conditions either by non-structural or structural measures. As a non-structural measure for flood loss minimization, flood forecasting and warning services has been emphasized. Structural measures began in late 60's by implementing number of flood control projects.
[1] Bangladesh Bureau of Statistics (BBS), 2002, Ministry of Planning, Bangladesh.
[2] Bangladesh Water Development Board, (BWDB), 2000-2001, Annual Report, Dhaka.
[3] Chowdhury, J.R., 2003, Technical Paper presented in the 47th Annual Convention of the Institution of Engineers Bangladesh (IEB), 5-7 January, 2003, Chittagong.
[4] FFWC, 2005, Consolidation and strengthening of flood forecasting and warning services, Final Report, Volume II – Monitoring and evaluation, Bangladesh Water Develoment Board, Dhaka.
[5] Flood Forecasting and Warning Centre (FFWC), 2005, Annual Flood Report, BWDB, Dhaka.

 

Paper Type

::

Research Paper

Title

::

Saline Water Intrusion in Coastal Aquifers: A Case Study from Bangladesh

Country

::

India

Authors

::

Dr. Md. Mizanur Rahman ||, Dr. Amartya Kumar Bhattacharya

Page No.

::

07-13

::
10.9790/3021-04170713
aned
::
0.4/3021-04170713 aned
iosrjen   3021-0401-0713 iosrjen
The magnitude of salinity intrusion in coastal areas depends on sensible balance between fresh water flow and saltwater from the sea. The interface between freshwater and saline water is influenced by geology, hydrogeology, ground water heads and groundwater well pumping rates. But fresh water is important issue to counterbalance salinity intrusion at the upstream water intake. To quantify that required fresh water, indeed detailed understanding of the physical phenomena (tidal motion, wind mixing etc, river flow) is a prerequisite. The coastal zone of Bangladesh comprises of part of the flat Ganga Delta, which is crisscrossed by large tidal rivers discharging into the Bay of Bengal. The estuaries and tidal river systems of coastal zone have been formed by long periodical deltaic accretion which was dominated by the historical morphological changes of Ganga and Brahmaputra. The major estuarial rivers of the south-central region are interlinked and fed by numerous smaller channels. The approximate population in the coastal area is 40 million and they are very much vulnerable to the natural disaster along the about 720 km coastline. Saline water intrusion is the main problem in the south-western zone. About 60 and 15 percent of arable land (total 1.0 mha croplands) of southwestern and southeastern respectively are affected by salinity in the dry period. This salinity is caused by cyclone and storm surges, high spring tide inundation and capillary actions. Its affect the soil surface and root zones, which decreases the crop production about 0.13 M.T. in every year. The increase of salinity intrusion and decrease of arability will be prevailing due to climate change effect and reducing of flood plain and it may propagate in all over the country. In this situation management of salinity intrusion is the vital issue for Bangladesh. With the mission of saline water proofing by structural management like coastal embankment projects, dam, sluices etc and coastal area zoning as non-structural management to change the land use and other activities can be the vision of sustainable livelihood and environment of Bangladesh.
[1] Ahmed, F., 1996, Coastal water supply in Bangladesh, Reaching the Unchanged: Challenges For The 21st Century, 22nd WEDC Conference, New Delhi, India.
[2] Ahmed, K.M., Hoque, M., Hasan, K., Ravenscroft, P., Chowdhury, L.R., 1998. Occurrence and origin of water well methane gas in Bangladesh. J. Geol. Soc. India 51, 697–708.
[3] BADC, 1992. Deep Tubewell II Project. Final Report. Mott MacDonald Ltd. and Hunting Technical Services. Report for Bangladesh Agricultural Development Corporation and Overseas Development Administration (UK).
[4] BWDB, DHV International, DDC, SWMC, 1998, Draft Master Plan, Volume 2: Morphological Processes
[5] DPHE, 1999. Groundwater Studies for Arsenic Contamination in Bangladesh. Final Report, Rapid Investigation Phase. Department of Public Health Engineering, Government of Bangladesh. Mott MacDonald and British Geological Survey.

 

Paper Type

::

Research Paper

Title

::

Encryption Implementation of Rock Cipher Based on FPGA

Country

::

Sudan

Authors

::

Murtada Mohamed Abdelwahab ||, , Abdul Rasoul Jabar Alzubaidi

Page No.

::

14-20

::
10.9790/3021-04171420
aned
::
0.4/3021-04171420 aned
iosrjen   3021-0401-0720 iosrjen
Information security systems must provide high levels of correctness, and reliability. The presented implementation is an application for symmetric encryption algorithm which developed by using two keys to encrypt an input block consist of 128 bit. This implementation is developed for the purpose of producing a powerful encryption data. The operation of encryption and decryption required to insert two keys together in order to access the system correctly. Each key expanded randomly to 128 bit and then it used in each round of encryption. The design is based on Field Programmable Gate Array (FPGA) and used VHDL code to implement the design. The simulation results are considered reliable and completely correct. Keywords: FPGA, Encryption, Decryption, Algorithm
[1] Dimitrios.M and Ioannis.P," Power consumption estimations vs measurements for FPGA-based security cores", in proceeding of International Conference on Reconfigurable Computing and FPGAs, pp 433- 437,Cancun ,Mexico,2008.
[2] Stephen.B and Zvonko.V,"Fundamental of Digital logic with VHDL Design",McGrow Hil,(2005).
[3] Prasun. G and Malabika.B," A Compact FPGA Implementation of Triple DES Encryption System with IP Core Generation and On-Chip Verification" , in Proceedings of International Conference on Industrial Engineering and Operations Management, Dhaka, Bangladesh, ,2010.
[4] Douglas.S,"Cryptography: Theory and Practice " ,CRC Press,1995.
[5] Gael.R, Francois.X.S, Jean.J. and Jean.D, "Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES", in Proceeding of International Conference on Information Technology: Coding and Computing, pp.339- 345, USA,2004.

 

Paper Type

::

Research Paper

Title

::

A Proposed System for Hiding Information In Portable Executable Files Based on Analyzing Import Section

Country

::

Iraq

Authors

::

Mohammad Hussein Jawwad

Page No.

::

21-30

::
10.9790/3021-04172130
aned
::
0.4/3021-04172130 aned
iosrjen   3021-0401-0730 iosrjen

Information-hiding techniques have newly become very important in a many application areas. Many cover mediums have been used to hide information like image, video, voice. Use of these mediums have been extensively studied. In this paper, we propose new system for hiding information in Portable Executable files (PE files). PE is a file format for executable file used in the 32-bit and 64-bit versions of the Windows operating system. This algorithm has higher security than some traditional ones because of the combination between encryption and hiding. We first encrypt the information before hiding it to ensure high security. After that we hide the information in the import table of PE file. This hiding depends on analyzing the import table characteristics of PE files that have been built under Borland turbo assembler. The testing result shows that the result file does not make any inconsistency with anti-virus programs and the PE file still function as normal after the hiding process.

 

Keywords: - PE File, Information Hiding, Cryptography.

[1] X.-X. Niu, Information Hiding and Digital Watermark, Beijing: Beijing University of Posts and Telecommunications Press, 2004, pp. 2–10.
[2] X. Li and Z.-P. Dai, "Digital watermarking technology in remote access control," Network and Computer Security, no.10, pp. 13–17, 2011.
[3] Alaa Taqa, A.A Zaidan, B.B Zaidan ,"New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm", International Journal of Computer and Electrical Engineering (IJCEE),Vol.1 ,No.5, ISSN: 1793-8198,2009, pp.589-595 .
[4] ASHOK J; RAJU Y; MUNISHANKARAIAH S; SRINIVAS K, STEGANOGRAPHY: AN OVERVIEW, International Journal of Engineering Science and Technology Vol. 2(10), 2010.
[5] AWNaji, AAZaidan, B.B.Zaidan, Shihab A, Othman O. Khalifu, " Novel Approach of Hidden Data in the (Unused Area 2 within EXE File) Using Computation Between Cryptography and Steganography ", International Joumal of Computer Science and NetwOIK Security (IJCSNS) , Vo1.9, No.5, ISSN : 1738-7906, pp. 294-300.

 

Paper Type

::

Research Paper

Title

::

Computational Approach for Promoter Identification with data Mining Techniques

Country

::

Bosnia

Authors

::

Günay Karl ||, Şenol Doğan ||, Adem Karadağ

Page No.

::

31-41

::
10.9790/3021-04173141
aned
::
0.4/3021-04173141 aned
iosrjen   3021-0401-0741 iosrjen

Recently, too much data is being produced in every field of our life. Especially in science, large amounts of data are needed to analyze in order to reveal valuable knowledge hidden in raw data. The number of DNA sequences has been growing fast since the beginning of the Human Genome Program (HGP) so it becomes increasingly important to automate the identification of functional elements in DNA. But human analysts with the traditional tools can no longer make sense. In this study, we employ data mining techniques including ANN, ANFIS and newly developed algorithms ke-REM and IREM to extract diamonds of knowledge from DNA sequences and evaluate their performances.

 

Keywords: -Promoter prediction, ANN, ANFIS, ke-REM, IREM,data mining, bioinformatics, DNA

[1] Abeel, T. S. (2008). Generic eukaryotic core promoter prediction using structural features of DNA. Genome Research , 18 (2), 310-323.
[2] Abeel, T., Saeys, Y., Bonnet, E., & Rouzé, P. (2008). Generic eukaryotic core promoter prediction using structural features of DNA. Genome Research , 18 (2), 310-323.
[3] Alverez, D. G. (2006). Artificial Neural Network. Spain: Edugila.
[4] Bujard, H., Brenner, M., & Kammerer, W. (1997). Structure-function relationship of Escherichia coli promoters. New York: Elsevier.
[5] Clancy, S. (2008). Nature Education. DNA transcription , 1 (1), 41.

 

Paper Type

::

Research Paper

Title

::

Risks in Supply Chain Management and its Mitigation

Country

::

India

Authors

::

Girish Gupta ||, Vinay Kumar Sahu ||, A.K.Khandelwal

Page No.

::

42-50

::
10.9790/3021-04174250
aned
::
0.4/3021-04174250 aned
iosrjen   3021-0401-0750 iosrjen

Supply chain risks, vulnerabilities, complexity and uncertainties have emerged as key challenges to supply chain management. Supply chain risk management assumes importance in making the organizations understand that their risk sensitivity is dependent on other constituents of their supply chain. These risks are prone to disruptions, Forecast inaccuracies, breakdowns, economic and political changes, and disasters leading to higher risks and making supply chain management difficult. The present study categorized and refined the supply chain risks sources and its mitigation strategies for dealing with these risks. Fuzzy Analytical hierarchical process was utilized to determine the relative weights of risks which are subsequently used to rank the risk on the basis of their impact on supply chain. Understanding the priorities would help the firm to accord importance and develop suitable strategies to manage supply chain risks.

 

Keywords: - Supply Chain Risk, AHP, Fuzzy AHP

[1] Adegoke Oke, Mohan Gopalakrishnan., ―Managing disruptions in supply chains: A case study of a retail supply chain‖. Int. J. Production Economics 118, 168–17. 2008.
[2] Albayrak, E., & Erensal, Y. C. ―Using analytic hierarchy process (AHP) to improve human performance. An application of multiple criteria decision Making problem‖. Journal of Intelligent Manufacturing, 15, 491–503, 2004.
[3] Anish Sachdeva , Dinesh Kumar. ―Multi-factor failure mode critically analysis using TOPSIS‖. Islamic Azad University, South Tehran Branch, January 2009, Vol. 5, No. 8, 1-9, 2009.
[4] Bimal Nepal Om P. Yadav , Alper Murat, ―A fuzzy-AHP approach to prioritization of CS attributes in target planning for automotive product development‖. Expert Systems with Applications 37 6775–6786, 2010.
[5] C.K.Kwong, H. Bai, ―A fuzzy approach to determine of importance weight of customer requirements in quality function deployment‖. Journal of Intelligent manufacturing, 13,367-377, 2002.

 

Paper Type

::

Research Paper

Title

::

Reliability of Cloud Computing Services

Country

::

India

Authors

::

anju Mishra ||, dr. Viresh Sharma ||, dr. Ashish Pandey

Page No.

::

51-60

::
10.9790/3021-04175160
aned
::
0.4/3021-04175160 aned
iosrjen   3021-0401-0760 iosrjen
Cloud computing is a recently developed new technology for complex systems with massive scale service sharing, which is different from the resource sharing of the grid computing systems. Despite the profound technical challenges involved, reliability is not, at its root, a technical problem, nor will merely technical solution be sufficient. Instead deep economic, political, and cultural adjustments will ultimately be required, along with a major, long-term commitment in each sphere to deploy the requisite technical solutions at scale. Nevertheless, technological advance and enablers have a clear role in supporting such change, and information technology (IT) is a natural bridge between technical and social solutions because it can offer improved communication and transparency for fostering the necessary economic, political, and cultural adjustments. Various types of failures are interleaved in the cloud computing environment, such as overflow failure, timeout failure, resource missing failure, network failure, hardware failure, software failure, and database failure. This paper systematically analyzes cloud computing and models the reliability of the cloud services. . It is a holistic approach that stretches from power to waste to purchasing to education and is a life-cycle management approach to the deployment of IT across an organization using Markov models, Queuing Theory and Graph Theory
[1] I. Foster, C. Kesselman. The Grid 2: Blueprint for a New Computing Infrastructure. Los Alios, Morgan-Kaufmann, 2003.
[2] C.S. Yeo, R. Buyya1, M.D. de Assunção, et al. Utility Computing on Global Grids. Technical Report, GRIDS-TR-2006-7, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, 2006.
[3] Y. Zhang, Y. Zhou. Transparent computing: A new paradigm for pervasive computing. Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06), LNCS 4145, 1–11, 2006.
[4] Y.S. Dai, Y. Pan, X.K. Zou. A hierarchical modeling and analysis for grid service reliability. IEEE Transactions on Computers, 56(5), 681-691, 2007.
[5] M.L. Shooman. Reliability of Computer Systems and Networks: Fault Tolerance, Analysis and Design. New York: John Wiley & Sons, Inc., 2002.