July - 2018 (Volume-8 ~ Issue-7 ~ Part-6)

Paper Type

::

Research Paper

Title

::

FPGA Realization of Autonomous Chaotic Generator using RK4-based Algorithm

Country

::

India

Authors

::

Subodh Kumar Pandey || Sanjeev Kumar Gupta

Page No.

::

01-06

Now a days chaotic systems have an important role in secure communication and cryptography. As FPGA implementation have certain advantages over analog one, different chaotic system like chaotic oscillator, True random number generators and chaotic systems used in image processing, optical circuits for secure communications were successfully realized in FPGA. This paper presents FPGA implementation of Autonomous Pandey-Baghel-Singh chaotic signal generators using RK 4 algorithm. Numerical solution of Differential equation system is obtained and coded in Verilog and tested withXilinx vivado 17.3 design suite in Artix-7 Nexus 4 DDR and Basys 3. Performance of the FPGA based chaotic generators is analyzed using 106 data sets with the maximum operating frequency achieved up to 359.71MHz.

 

Keywords: Chaotic Generators, RK 4 algorithm, FPGA.

[1]. Ismail K., A. Tuaran O, Ihsan Pehlivan, "Implementation of FPGA-based real time novel chaotic oscillator", Nonlinear dynamics (2014) ; pp. 49-59.
[2]. Murat Tunaa, Can Bülent Fidan, "Electronic circuit design, implementation and FPGA-basedrealization of a new 3D chaotic system with singleequilibrium point", Optic ElsevierOptik (2016) pp. 11786–11799.
[3]. S. Banerjee, J. Kurths, "Chaos and cryptography: a new dimension in secure communications", Eur. Phys. J. Spec. Top. , (2014) pp. 1441–1445.
[4]. I. Koyuncu, A.T. Ozcerit, I. Pehlivan, "An analog circuit design and FPGA-based implementation of the Burke-Shaw chaotic system", Optoelectron. Adv.Mater. Rapid Commun. (2013) pp. 635–638.
[5]. L. Merah, A. Ali-pacha, N.H. Said, "A pseudo random number generator based on the chaotic system of Chua's circuit and its real time", FPGA Implementation (2013) pp. 2719–2734.

 

Paper Type

::

Research Paper

Title

::

Design and Fabrication of Stair Climbing Wheelchair with Rocker Bogie Mechanism

Country

::

India

Authors

::

G.Shanmugasundar || S.Adithya || V.Nagappan || P.Jagadeeshwar || M.Bhaskar

Page No.

::

07-11

Rocker bogie finds a vital role in determining the scientific analysis of objectives separated by many distance apart. The mobility design at present is quite a bit complex with many legs or wheels. The wheeled rover which is capable of driving over the rough terrain provided with high degree of mobility suspension system.The drive provided by the rocker bogie is simple and it mainly operated by the means of two motors.The motors are kept inside in order to make it more reliable and efficient.In overcoming the bumps in the natural terrain the wheels are operated simultaneously.By implementing this mechanism the vehicle can come through any obstacles it faces during the travel in the terrain.We have tested it by conducting a series of mobility experiments on agricultureland,rough roads,inclined,stairsandobstaclessurfaces and concluded that it is possible to implement. This project mainly focuses how the mechanism finds its place in the wheel chair.

 

Keywords: Wheel Chair, Rocker Bogie Mechanism.

[1]. Daisuke Chugo,TaketoshiMishima., 2007, " Mechanical Design of Step-Climbing Vehicle with Passive Linkages", 8th International Conference on Climbing and Walking Robots, pp.287-294.
[2]. R.Rajasekar , K P Pranavkarthik,S.Senthilkuamr, A.Sivakumar, 2013 "Design and Fabrication of Stair climbing Wheel Chair", ISSN 2278 – 0149 Vol. 2, No. 2.
[3]. NitinYadav, BalRamBharadwaj, Suresh Bharadwaj., 2015 " DesignAnalysisof Rocker Bogie Suspension System and Access the possibility to implement in Front Loading Vehicles, " IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) Volume 12, Issue 3 Ver. III, PP 64-67.
[4]. ChinmayaSukhwal , 2016, "Conceptual Design of Stair Climbing Wheel chair using Catia," International Journal of Engineering Research & Technology (IJERT) Vol. 5 Issue 03, March-2016.
[5]. S FToha, ZakariyaZainol, 2015, "SystemModellingofRockerBogie Mechanism for Disaster Relief ",Procedia Computer SciencePages 243-249.

 

Paper Type

::

Research Paper

Title

::

Lean Service Concept Implementation InProvisioningProcess Improvement for Wifi Station Service in PT. X

Country

::

Indonesia

Authors

::

Ellen Safitri || Putu Dana Karningsih

Page No.

::

12-20

Significant internet penetration in Indonesia makes internet providers in Indonesia to compete, to win the Market. PT. X as one of Internet Provider in Indonesia has significantly transformed to anticipate the business dynamics. One of the main program is to focus in Small-Medium-Enteprise (SMEs) segment with Wifi Station service. Nevertheless, Wifi Station has problem that is in its long provisiong process thus causing many outstanding orders that have not been installed. as many as 69% of work orders are installed more than 14 days which means over standard time specified. This long provisioning process may cause customers to switch to competitors. Based on this problem, indicated that there is a waste process in Wifi Station provisioning. This research uses lean service concept with improvement network through Define-Measure-Analyze-Improve-Control (DMAIC). The tools used in this research are Value Stream Mapping (VSM), Process Activity Mapping (PAM), Borda Count Method (BCM), Root Cause Analyze (RCA), and risk management approach. Based on analysis, occured that high level of main waste caused by Duplication, Lack of Standardization and Delay.

 

Keywords: Operation Management, Lean Service,Risk Management, VSM, BCM.

[1]. Arif, Amirul M. (2017) Perbaikan Efisiensi Layanan Pengiriman CV. XYZ Dengan Pendekatan Lean Service. Surabaya: Institut Teknologi Sepuluh Nopember, MMT.
[2]. Asnan, R. Nordin, N & Othman, S.N. (2015) Managing Change on Lean Implementation in Service Sector. 2nd Global Conference on Business and Social Science-2015. Malaysia.
[3]. Asosiasi Penyelenggara Jasa Internet Indonesia. (2017) Infografis Survey Penetrasi dan Perilaku Pengguna Internet Indonesia. Diakses 7 Maret 2018, dari https://id.techinasia.com/penetrasi-internet-di-indonesia-2017.
[4]. Bonaccorsi, Andrea. Carmignani, Gionata & Zammori, Francesco. (2011) Service Value Stream Management (SVSM): Developing Lean Thinking in the Service Industry. Italia.
[5]. Carroll, B.J. (2008) Lean Performance ERP, Implementing the Virtual Lean Enterprise. 2nd Edition, Auerbach Publications, New York.

 

Paper Type

::

Research Paper

Title

::

Critical Factors of Success of Work Relationship between Main Contractor and Subcontractor in X Ltd. Steel Fabrication Company

Country

::

Indonesia

Authors

::

YelestyaAanval || BustanulArifinNoer

Page No.

::

21-27

Sub-contractor presence played an important part in the project success delivery of main contractors. Sub-contractor's work performance is often considered better than that of internal workforces. This fact was driving company's policy to handover bigger part of primary business process to sub-contractors. On the other hand, when subcontractor withdrew from the projects, meanwhile critical business parts were being handled by them, it would become very detrimental to the projects. This research will study further by analyzing variables based on construction projects. The variables are quality, time, cost, added by technical variables such as project execution and project management. This studyused primary data which have been collected using questionnaire method. The respondents of questionnaire are fabrication services, assembly and assembly trial subcontractor's chief executive. Results of thisworkhad revealed the most critical variables on this case about relationof the main contractor and service sub-contractor company. Improvement suggestions were given in orderto maintain work relationship with the current and any future subcontractors who will be working together with X Ltd.

[1]. Berdikari, AJ, Hartanto, AB, Andi, (2015), Fabrication and Erection Inspection on Steel Construction Building Project P1-P2 Univ. of Petra Surabaya, Magister Theses, Petra Christian University Surabaya.
[2]. Ervianto, WI, (2005), Construction Project Management (Revised Edition), Andi, Yogyakarta.
[3]. Hansen, S (2017), Construction's Contract Management "Practical Guidance on Managing Construction Projects", 3rd ed., Gramedia, Jakarta.
[4]. Hardianto, A., (2015), Analysis of Time Management and Cost Management of Hotel Development Project with Network CPM, Case Study of Batiqa Hotel Palembang, Muhammadiyah University of Surakarta.
[5]. Messiah, YA, Lona, LHP, Sina, DAT, (2013) Time and Cost Control of Construction Works as the Impact of Design Change, Case Study of Irrigation Oenaem, Biboki Selatan District, North Central Timor District, Journal of Civil Engineering Vol II No. 2, University of Nusa CendanaKupang.

 

Paper Type

::

Research Paper

Title

::

On the Bounds for the Zeros of a Polynomial

Country

::

India

Authors

::

M.H.Gulzar || Ajaz Wani || Rubia Akhter

Page No.

::

28-37

In this paper we find bounds for the zeros of a complex polynomial when the coefficients of the polynomial are restricted to certain conditions. Mathematics Subject Classification (2010): 30C10, 30C15.

 

Keywords: Coefficient, Open Disc, Polynomial, Zeros.

[1]. L. V. Ahlfors ,Complex Analysis, 3rd edition, Mc-Grawhill.,1979.
[2]. N.K.Govil and Q.I.Rahman, On the Enestrom-Kakeya Theorem, Tohuku Mathematics Journal, 20(1968),126-136.
[3]. M.H.Gulzar, Ajaz Wani and Rubia Akhtar, Zero-free Regions and Bounds for the Number of Zeros of a Polynomial in a Region, International Journal of
[4]. Advance Reseach in Science and Engineering, Vol.7 Issue 3,March 2018,77-87.

 

Paper Type

::

Research Paper

Title

::

A Study of Crimes on Cyberspace

Country

::

India

Authors

::

S.Arunpandian || S.S.Dhenakaran

Page No.

::

38-46

In spite of more advantages in information security, cybercrime has increased proportionately. Cybercrime is an illegal activity where a computer is used as a tool or target or both. Perpetrator takes any one of these activities for obtaining secured information from other systems. Ethical applications are available in the cyberspace like face book, twitter, and instant message etc. Devices are connected together in cyberspace to converse and share information using TCP/IP protocols. When such a way communication happens, perpetrator with current technology is prying secured information of others. To overcome the problems, nowadays biometric principles are used to secure information. Even though the approach of securing information by biometric is thought complicated, information are hacked without the knowledge of authorized person. This paper illustrates an overview of cybercrime; attacks of cybercrime in biometric and solutions to secure data from the cybercrime.

 

Keywords: Cybercrime, Authentication, Attacks, perpetrator, cloning, PUF.

[1]. Available at: https://www.legalindia.com/cyber-crimes- and-the law/
[2]. Available at: https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/cyber-terrorism.html [3]. Gunjan, Vinit Kumar, Amit Kumar, and Sharda Avdhanam. "A survey of cyber crime in India." Advanced Computing Technologies International Conference on. IEEE, 2013.
[4]. Available at: https://www.bayometric.com/biometrics-future-iot-security/
[5]. Available at: https://www.bbvaopenmind.com/en/iot-implementation-and-challenges/

 

Paper Type

::

Research Paper

Title

::

Satellite Impacts on Real Time Remote Sensing Applications– Technical Aspect

Country

::

India

Authors

::

KR.Sivabalan || E.Ramaraj

Page No.

::

47-53

Remote sensing is the effective and efficient field in the digital world. Global usage of application with the help of remote sensing is increasing consecutively. Remote sensing applications help to spy enemy satellite in warfare, Tsunami prediction, Global warming detection, Forest Monitoring and Water management. Satellite image classification helps to agriculture assessment, Sea level prediction, Weather forecasting and Soil moisturize. Basically, Classification methods come under Supervised, Unsupervised and Object based analysis method. These methods are selected based on the satellite imagery type. Imagery type categorized based on the sensor which is used to take the earth imagery from the satellite. There is a huge number of satellites takes the earth image from space. Countries are highly focused on technological advancement and are actively engaged in ensuring the growth and security of the country through satellite. This paper helps to analyze the current satellites behavior and its applications. Satellite sensor and sensor characterization also discussed in the technological aspect.

 

Keywords: Classification, Data Processing, Remote Sensing, Satellite Study, Satellite Sensor.

[1]. Available at http//earthobservatory.nasa.gov/eatures/RemoteSensing/remote_08.
[2]. Available at: http://en.wikipedia.or/wiki/Landsat_8.
[3]. Available at: http//landsat.usgs.gov/what-are-best-spectral-bands-use-my-study.
[4]. Available at: http// marine.rutgers.edu/cool/education/class/paul/AVHRR.html.
[5]. Nagesh Kumar D, Reshmidevi Tv, Remote Sensing Applications in Water Resources. Journal of the Indian Institute of Science. 2013;93(2):163-187.

 

Paper Type

::

Research Paper

Title

::

A Study and Analysis of IoT

Country

::

India

Authors

::

J.Latha || A.Rajalingam || M.Ramkumar Prabhu

Page No.

::

54-61

This paper is a general study of all the issues existing in the Internet of Things (IoT) with respect to the concern of the reliability along with an analysis of the state of being free from public attention issues that an end-user may face as a consequence of the spread of IoT. The majority of the examined data is focused on the safty lapses arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.

 

Keywords: Denial of Service, RFID, WSN, Internet of Things, DDoS Attack.

[1] Jason Pontin: "ETC: Bill Joy's Six Webs". In: MIT Technology Review, 29 September 2005. Retrieved 17 November 2013.
[2] Shen, Guicheng, and Bingwu Liu. "The visions, technologies, applications and security issues of Internet of Things." E-Business and E-Government (ICEE), 2011 International Conference on. IEEE, 2011.
[3] Akyildiz, I.F. ; Georgia Inst. of Technol., Atlanta, GA, USA ; Weilian Su ; Sankarasubramaniam, Y. ; Cayirci, E "A survey on sensor networks." Communications magazine, IEEE 40.8 (2002): 102-114.
[4] Z.G. Prodanoff, Optimal frame size analysis for framed slotted ALOHA based RFID networks, Computer Communications (2009), doi: 10. 1016/j.comcom.2009.11.007.
[5] Dey, Sandipan, Ajith Abraham, and Sugata Sanyal. "An LSB Data Hiding Technique Using Prime Numbers." Information Assurance and Security, 2007. IAS 2007. Third International Symposium on. IEEE, 2007.