博電競菠菜平臺 www.rrkuhedt.buzz Amin Y. Noaman and Nada M. Al-Mani

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

A Workflow is an automation of a business process. In general, the process model describes the activities performed and their relations. It could be defined by using the process definition tool, which is one of the Workflow Management System (WFMS) components. Technically, fixed workflow structure is a major problem that could be faced by any WFMS. It is lacking of reusability and flexibility needed during runtime, i.e. once a workflow has started; changes to system and process structure are no longer feasible. This research proposes a framework that supports designing and implementing of a general purpose process definition tool with a graphical user interface. The business process modeled by this tool presented internally in an XML schema file. The elements of this schema are the activities of the model which will be parsed and transformed to a graphical notation whenever loading the model. In addition, the defined process in whole could be used as an activity in other business model into the interface. Then, the process will be automated on process engine that has empowered with the required flexibility to dynamically modifying the structure of a running instance.

Hide Abstract

Views 
   PDF Download PDF Downloads: 415



Siamak Haghipour and Babak Sokouti*

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

RSA cryptosystem, the first public key cryptography presented in 1977. Neural networks are often used as a powerful discriminating estimator for tasks in function approximation. This paper describes a neural-network-based method relies on Radial Basis Function and Levenberg-Marquardt Backpropagation for estimating the behavior of the function used in RSA cryptosystem to calculate the function. The difficulty of the RSA cryptosystem relies on the difficulty of the factorization, to have the RSA cryptosystem broken, it suffices to factorize N which is the product of two prime numbers p, q (N=p.q). This will be equivalent to calculate the Euler function φ(N)=(p-1)(q-1) .

Hide Abstract

Views 
   PDF Download PDF Downloads: 422



S. S. Oluyamo and O. P. Faromika

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The study investigates the effects of surface area on the electronic parameters of bismuthsilicon junctions at room temperature. The desired samples were obtained using vacuum deposition technique. Electrical characteristics of the samples were carried out at electric field value 10 - 60V/m. The surface conductance, ideality factor and barrier height of the samples were determined at different surface areas. The result of the study showed that the surface areas of the junctions have effects on the surface conductance while the values of the ideality factor and the barrier height had no significant dependence on the surface area of the junctions. In addition, the values of the ideality factor range between 0.70 - 0.83, an indication that the junctions are close to being ideal. This also stresses the fact that vacuum deposition is an ideal method for making metal-semiconductor junctions.

Hide Abstract

Views 
   PDF Download PDF Downloads: 353



K.Rama Krishnaiah1*, B. Ramesh Babu2, T. Pavan Kumar1?and K.Rajasekhara Rao1

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

With the increasing use of wireless sensor networks in industrial settings, a new type of network topology, mesh networks, has emerged in today's market. The success of wireless networks in every field has made wireless networks, an emerging key technology for the next generation wireless networking. The various features of wireless mesh networks have attracted the research community, which led to the rapid growth of this technology, inspiring many applications. Many challenging technical issues still exist in this field. This paper compares the reliability and flexibility of the mesh network with other two traditional wireless network topologies, namely point-to-point and point-to-multipoint networks, and illustrates why and how the mesh network has advantages in these areas with the help of a case study.

Hide Abstract

Views 
   PDF Download PDF Downloads: 386



L.R. Arvind Babu* and B. Palaniappan

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Linear Programming Problems are mathematical models used to represent real life situations in the form of linear objective function and constraints various methods are available to solve linear programming problems. When formulating an LP model, systems analysts and researchers often include all possible constraints although some of them may not be binding at the optimal solution. The presence of redundant constraints does not alter the optimum solution(s), but may consume extra computational effort. Redundant constraints identification methods are applied for reducing computational effort in LP problems. But accuracy of the LP problems goes down due to this reduction of loops and constraints. To achieve optimality in accuracy and also in computational effort, we propose an algorithm, called, hybrid algorithm, it trains the constraint and parameter before applying the formal methodology

Hide Abstract

Views 
   PDF Download PDF Downloads: 358



M.K. Jeya Kumar1 and R.S. Rajesh2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Ad Hoc Networks is a multi - hop wireless network with dynamically changing network connectivity owing to mobility. It consists of a collection of wireless mobile nodes it will act without the use of any existing infrastructure or centralized administration. With this flexibility, networks can be formed anywhere, at any time, as long as two or more wireless users are willing to communicate. In such a dynamic network routing is a challenging problem Different routing protocols are designed assuming certain mobility patterns of the mobile nodes in the network. However the choice of mobility pattern may favor certain protocols over the others. Hence it is necessary to study the performance of different routing protocols under different mobility models. In this work two mobility models with high mobility and Low mobility constraints have been considered which mirror the realistic mobility patterns of the mobility nodes with high mobility and low mobility. The two reactive protocols AODV and DSR are examined based on the traces derived for each of these mobility models for various speed of the mobile nodes, Traffic and Node Density in the network. An analysis of the results obtained from the simulations shows that the AODV protocols in Boundless Simulation Area model performs better than DSR. Based on the observations, it is to suggest that AODV routing protocol can be used under high mobility since it outperforms DSR protocols.

Hide Abstract

Views 
   PDF Download PDF Downloads: 345



N. Subhash Chandra1, M. Bala Raju2, S. Mahaboob Basha3?and A. Govardhan4

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Digital Spatial Image Processing is a rapidly evolving field with growing applications in Science and Engineering. Spatial Image data requires considerable storage capacity and transmission bandwidth. Despite rapid progress in mass-storage density, processor speeds, and digital communication system performance, demand for data storage capacity and data-transmission bandwidth continues to outstrip the capabilities of available technologies. This is a crippling disadvantage during transmission & storage. So, there arises a need of efficient Image Compression Techniques for compression . This paper deals with Optimized Binary Merge Coding for data compression, which is a modification to the Binary merge coding. Like in BMC the Optimized Binary Merge Coding uses Huffman coding after the modified Binary Merge Coding. The results of the Optimized Binary Merge Coding are compared with Binary Merge Coding and JPEG. An experimental result shows that Optimized Binary Merge Coding improves compression rate compared to Binary Merge coding. The same algorithm can be extended to color images.

Hide Abstract

Views 
   PDF Download PDF Downloads: 366



Preeti Jain1, Mukata Rani Bhawsar2 and Jitendra Bhawsar3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The major objective of this paper is to build capacity of practitioners and decision makers to guide and handhold them to plan, design and implement E-waste management. It includes policy, collection, transportation and treatment in a city geographical area and country, here is a scope of further reduction of technology costs if the developing country has got infrastructure to for the local fabrication of machinery and equipment. A key recommendation is that the outstanding logistics issues are addressed in order to enable recyclers to define optimized processes for materials acquisition, processing and recovery. WEEE deposited at CA and other central collection sites should be segregated as far as possible into distinct streams that are compatible with subsequent transport and recycling technology choices. There is an ongoing need to educate designers regarding choices of materials and the implications of their choices on materials recycling.

Hide Abstract

Views 
   PDF Download PDF Downloads: 342



PNRL Chandra Sekhar1, D Rajya Lakshmi2, J.A. Chandulal3 and Mandava V. Basaveswara Rao4

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Retraction of: Content-Based Image Retrival in the World Wide Web, by PNRL Chandra Sekhar, D Rajya Lakshmi, J.A. Chandulal and Mandava V. Basaveswara Rao is?retracted due to multiple submission done by author.

Hide Abstract

Views 
   PDF Download PDF Downloads: 362



R.E. Shelke1* and L. B. Bhuyar2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Impinging jets on rough surfaces are important in many industrial applications. The surface may become rough for many reasons. Roughness may arise from manufacturing processes, a long time in service and/or natural occurrences such as rain, snow, frost etc. Prior research indicate that the average roughness height on in-service gas turbine blades may vary from 1.5um to 10um.This is very rough considering the thickness of the boundary layer is of the order of 1 mm.Similarly,there are some industrial applications like spray formed billet cooling by impinging jets where the target and the jet are not orthogonal but the oblique.Therefore, study of inclination of target plate on heat transfer between impinging jet and rough flat plate is important. In the present work, inclination effect is studied for the oblique angles of 45°, 60° and 75° at a given Z/D of 1 and Reynolds number of 23000. The rough surfaces are in the form of hexagonal prism of side 2.04 mm and height of 2 mm spaced at a pitch of 7.5 mm on the target plate.The experimental results are validated using Artificial Neural Network (ANN).It has been observed that the validation using ANN gives the correlation coefficient (R2) as 0.998 to 1.

Hide Abstract

Views 
   PDF Download PDF Downloads: 355



Rajshekhar M. Patil1, Mamitha R. Patil2 and K. V. Ramakrishnan3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection-a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) in computer network security are real-time software assessment by monitoring for suspicious activity at the network and system layer. Software scanner allows network administrator to audit the network for vulnerabilities and thus securing potential holes before attackers take advantage them. The network traffic datasets provided by the DARPA 1998 offline intrusion detection project are used in our empirical investigation, which demonstrates the feasibility and promise of unsupervised learning methods for network intrusion detection using UML diagrams. The goal of this paper is to place some characteristics of good IDS and examine the positioning of intrusion detection as part of an overall layered security strategy and a review of evaluation criteria for identifying and selecting IDS.

Hide Abstract

Views 
   PDF Download PDF Downloads: 350



R.E. Shelke1* and L.B. Bhuyar2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Impinging jets on curved surfaces are important in many industrial applications. Experimentation have been carried out for heat transfer evaluation between the impinging air jets and curved surfaces in the prior research. An attempt has been made towards the model development using Computational Fluid Dynamics (CFD) to validate the experimental results obtained for curved surface in the present study. This attempt is made because, the physical model experimentation is time consuming and cumbersome as well as costlier affair. Hence, if the CFD model is developed in accordance with the results obtained earlier and if it is in good agreement with the same then using the same procedure, the CFD models for flat and rough surface can also be formulated, thereby, reducing the efforts of actual experimentations in future.

Hide Abstract

Views 
   PDF Download PDF Downloads: 335



Sangeeta Yadav1, K.K. Pathak2 and Rajesh Shrivastava3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Numerical analysis of Partial Differential Equations (PDE's) of the solid mechanics using Finite Element Method (FEM) is very popular. One issue which is haunting the finite element solution is the computer time. Finite Element Analysis (FEA) using fine mesh and large number of nodes consumes lot of solution time. To overcome this difficulty, a hybrid Neuro-FEM is proposed. FEM solutions considering coarse mesh is used for training neural networks which is further employed for finer predictions. The proposed methodology is successfully employed on a cantilever beam problem.

Hide Abstract

Views 
   PDF Download PDF Downloads: 381



Tarun Kumar

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard as well as current GSM security system vulnerabilities. In this paper, we proposed two new security protocols for GSM using Elliptic Curve Public Key Cryptography (ECC) technique and a security analysis of the proposed protocol.

Hide Abstract

Views 
   PDF Download PDF Downloads: 345



K. Venkat Rao1,T. Jyothirmayi2 and M. V. Basaveswara Rao3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper aims at constructing the customer data warehouse which adopts an improved ID3 decision tree algorithm to implement data mining in order to predict the risk class of the customer. The obtained results are compared with experimental results in order to verify the validity and accuracy of the developed model.

Hide Abstract

Views 
   PDF Download PDF Downloads: 413