2024-06-19T05:39:00Z https://academicjournals.org/oai-pmh/handler
oai:academicjournals.org:IJCER:F7343C18032 2010-03-30T00:00:00Z AcademicJournals IJCER IJCER:2010
Modelling and simulation of electrical machines on the basis of experimental frequency response characteristics Abdesslem Lamari Full Length Research Paper The mathematical models of the Asynchronous electrical machines developed on the basis of the experimental frequency-response characteristics are proposed in this paper. The latter ones are recommended for investigating the transient processes occurring at short-circuits and connections of the electrical machines to the bus bars of electrical system taking into account of their rotor speed changes. Key words: Asynchronous machines, frequency-response, networks connections short-circuit. Academic Journals 2010 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/F7343C18032 http://dx.doi.org/10.5897/IJCER.9000009 en Copyright © 2010 Abdesslem Lamari
oai:academicjournals.org:IJCER:D8435B28011 2010-03-30T00:00:00Z AcademicJournals IJCER IJCER:2010
Using the OOPP method to analyze complex industrial systems Mohamed Najeh Lakhoua, and Taieb Ben Jouida, Full Length Research Paper The aim of this paper is to propose a methodology for the analysis and modeling of complex industrial systems and to validate it through a case study. In fact, an effective management of a complex industrial system can be only in systems whose activities are synchronized and enabling a good traceability. The development of a reliable Information System (IS) is primordial. The methodology is divided into five steps and it is based on the use of OOPP (objectives oriented project planning) method. In this research, a case study of a grain silo in Tunisia is presented. Key words: Analysis and modeling, information system, planning, OOPP method, grain silo. Academic Journals 2010 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/D8435B28011 http://dx.doi.org/10.5897/IJCER.9000013 en Copyright © 2010 Mohamed Najeh Lakhoua, and Taieb Ben Jouida,
oai:academicjournals.org:IJCER:FE0BEB08074 2010-04-30T00:00:00Z AcademicJournals IJCER IJCER:2010
A survey of agent-oriented software engineering paradigm: Towards its industrial acceptance O. Zohreh Akbari Full Length Research Paper Agent-oriented software engineering (AOSE) paradigm represents an interesting means of analyzing, designing and building complex software systems quite suitable to new software development requirements. Many scientific researches have been focused on this paradigm, yet its current state still reports relative lack of industrial acceptance compared to others. As a survey of AOSE paradigm, this paper outlines the overall state of this paradigm; and by identifying its weaknesses in detail, leads to a proposal solution to such shortcoming. This solution, in keeping with the existing approaches that aim to use situational method engineering (SME) in collaborative manner between agent-oriented methodology designers, suggests the use of a methodology evaluation framework in the process as well. This framework is a means to collect the best method fragment and evaluate consecutively the methodology during the development process for possible methodology improvements. The proposed solution is then readjusted to help software development organizations to reach the fifth level of capability maturity model (CMM). Key words: Agent-oriented software engineering (AOSE), capability maturity model (CMM), evaluation framework, methodology, project-specific, situational method engineering (SME). Academic Journals 2010 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/FE0BEB08074 http://dx.doi.org/10.5897/IJCER.9000004 en Copyright © 2010 O. Zohreh Akbari
oai:academicjournals.org:IJCER:30383CD8113 2010-04-30T00:00:00Z AcademicJournals IJCER IJCER:2010
Optimized mask selection for person identification and camera distance measurement based on interocular distance Khandaker Abir Rahman, Shafaeat Hossain, Al-Amin Bhuiyan, Tao Zhang, Md. Hasanuzzaman and H. Ueno Full Length Research Paper This paper presents a multi-resolution masks based pattern matching method for person identification. The system is commenced with the construction of multi-resolution mask cluster pyramid, where the mask size is chosen depending on the distance between two eyes, computed from the detected face. Experimental results show the effectiveness of the system with significantly higher precision, recall rates and matching probability comparing with conventional single resolution mask based person identification systems. This paper also presents a novel person to camera distance measuring system based on eye-distance. The distance between centers of two eyes (interocular distance) is used for measuring the person to camera distance. The variation in eye-distance (in pixels) with the changes in camera to person distance (in inches) is used to formulate the distance measuring system. Experimental results show the effectiveness of the distance measurement system with an average accuracy of 94.11%. Key words: Single resolution mask, multi-resolution masks, person to camera distance, person identification. Academic Journals 2010 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/30383CD8113 http://dx.doi.org/10.5897/IJCER.9000010 en Copyright © 2010 Khandaker Abir Rahman, Shafaeat Hossain, Al-Amin Bhuiyan, Tao Zhang, Md. Hasanuzzaman and H. Ueno
oai:academicjournals.org:IJCER:08452468212 2011-02-27T00:00:00Z AcademicJournals IJCER IJCER:2011
Blind signal separation based on generalized Laplace distribution M. EL-Sayed Waheed, Osama Abdo Mohamed and M. E. Abd El-Aziz Full Length Research Paper Blind Signal Separation is the task of separating signals when only their mixtures are observed. Recently, Independent Component Analysis has become a favorite method of researchers for attacking this problem. We propose a new score function based on Generalized Laplace Distribution for the problem of blind signal separation for supergaussian and subgaussian. To estimate the parameters of such score function we used Nelder-Mead algorithm for optimizing the maximum likelihood function of Generalized Laplace Distribution. To blindly extract the independent source signals, we resort to FastICA approach. Simulation results show that the proposed approach is capable of separating mixture of signals. Key words: Independent component analysis (ICA), generalized Laplace distribution (GLD), maximum likelihood (ML), Nelder-Mead (NM). Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/08452468212 http://dx.doi.org/10.5897/IJCER.9000005 en Copyright © 2011 M. EL-Sayed Waheed, Osama Abdo Mohamed and M. E. Abd El-Aziz
oai:academicjournals.org:IJCER:0430F558263 2011-02-27T00:00:00Z AcademicJournals IJCER IJCER:2011
Quality of service constrained task mapping and scheduling algorithm for wireless sensor networks Medhat H. A. Awadalla and Rania R. Darwish Full Length Research Paper Blind Signal Separation is the task of separating signals when only their mixtures are observed. Recently, Independent Component Analysis has become a favorite method of researchers for attacking this problem. We propose a new score function based on Generalized Laplace Distribution for the problem of blind signal separation for supergaussian and subgaussian. To estimate the parameters of such score function we used Nelder-Mead algorithm for optimizing the maximum likelihood function of Generalized Laplace Distribution. To blindly extract the independent source signals, we resort to FastICA approach. Simulation results show that the proposed approach is capable of separating mixture of signals. Key words: Independent component analysis (ICA), generalized laplace distribution (GLD), maximum likelihood (ML), Nelder-Mead (NM). Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/0430F558263 http://dx.doi.org/10.5897/IJCER.9000011 en Copyright © 2011 Medhat H. A. Awadalla and Rania R. Darwish
oai:academicjournals.org:IJCER:07355788323 2011-03-30T00:00:00Z AcademicJournals IJCER IJCER:2011
Towards auto-configuring routing protocols for wireless ad-hoc networks M. B. Mutanga, P. Mudali and M. O. Adigun Full Length Research Paper The importance of wireless ad-hoc networks in community and commercial connectivity cannot be underestimated because of the benefits associated with these networks. Self-organization will minimize the need for manual configuration. In essence, self-organization provides an out-of-the-box functionality such that very little technical expertise is required to setup a network. Providing unique IP addresses efficiently in ad-hoc networks is still an open research question. In general, nodes often are assumed to have addresses configured in advance, but in ad-hoc networks this is not the case and is not easily accomplished. Nodes require a unique address for packets to be delivered to the correct destination. Many protocols to address this problem have been proposed and most of them are independent from the routing protocol and hence fail to address this problem. Despite the interdependence of routing protocols and IP address auto-configuration, no much effort has been put in trying to investigate this. In this paper we argue that incorporating auto-configuration functionalities into routing protocols will address open issues in this area. We propose general solutions for use in proactive and reactive routing protocols. Key words: Ad-hoc network, IP address, routing protocols, auto-configuration. Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/07355788323 http://dx.doi.org/10.5897/IJCER.9000012 en Copyright © 2011 M. B. Mutanga, P. Mudali and M. O. Adigun
oai:academicjournals.org:IJCER:86693C28341 2011-03-30T00:00:00Z AcademicJournals IJCER IJCER:2011
Hidden markov model based Arabic morphological analyzer A. F. Alajmi, E. M. Saad and M. H. Awadalla Full Length Research Paper Natural language processing tasks includes summarization, machine translation, question understanding, part of speech tagging, etc. In order to achieve those tasks, a proper language representation must be defined. Roots and stems are considered as representations for some of those systems. A word needs to be processed to extract its root or stem. This paper presents a new technique that extracts word weights, by stripping of prefixes and suffixes from a given word. This technique is based on Hidden Markov Model (HMM). A path from a start state to the end state represents a word, each state constitute letters of a word. States are prefixes, weights, and suffixes. The best selected path should have the highest likelihood of a word. The approach results in a promising 95% performance. Key words: Natural language processing, morphology, hidden markov model, stem. Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/86693C28341 http://dx.doi.org/10.5897/IJCER.9000007 en Copyright © 2011 A. F. Alajmi, E. M. Saad and M. H. Awadalla
oai:academicjournals.org:IJCER:F3A445D8413 2011-03-30T00:00:00Z AcademicJournals IJCER IJCER:2011
Efficient power savings in wireless sensor networks with network coding and overhearing avoidance Hnin Yu Shwe and Xiaohong Jiang Full Length Research Paper Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/F3A445D8413 http://dx.doi.org/10.5897/IJCER.9000006 en Copyright © 2011 Hnin Yu Shwe and Xiaohong Jiang
oai:academicjournals.org:IJCER:0A082B48458 2011-04-30T00:00:00Z AcademicJournals IJCER IJCER:2011
A shift-add algorithm for computing Bezier curves GU Feng Full Length Research Paper A shift-add algorithm based on coordinate rotation digital computer algorithm for computing Bezier curves was presented in this paper. This algorithm can be implemented in basic computing system (which deals only with shift, add and logical operations) which exists in many areas. Convergence of the algorithm was proved. Error estimation was analyzed. A numerical experiment was carried out to validate algorithmrsquo;s effectiveness and efficiency. Key words: Bezier curve, shift-add algorithm, basic computing system, CORDIC; approximation. Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/0A082B48458 http://dx.doi.org/10.5897/IJCER.9000002 en Copyright © 2011 GU Feng
oai:academicjournals.org:IJCER:DA0CC098444 2011-09-09T00:00:00Z AcademicJournals IJCER IJCER:2011
Investigation in the deployment of a geographic information system M. N. Lakhoua Full Length Research Paper After a presentation of the cereal activities in Tunisia, we present a systemic analysis of project of deployment of a geographic information system (GIS). This analysis is based on the objective oriented project planning (OOPP) method. The exploitation of the systemic analysis method enables us not only to analysis and to identify the information of the cereal activities but also to lead to an efficient management of cereal transaction. This analysis enables us to identify the information needed for the deployment of a GIS in the Office des Cereales in Tunisia. Key words: Geographic information system, data analysis, objective oriented project planning method, specific objective, global objective. Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/DA0CC098444 http://dx.doi.org/10.5897/IJCER.9000008 en Copyright © 2011 M. N. Lakhoua
oai:academicjournals.org:IJCER:93261F58491 2011-10-31T00:00:00Z AcademicJournals IJCER IJCER:2011
A study of indoor positioning by using trigonometric and weight centroid localization techniques Hakan Koyuncu and Shuang Hua Yang Full Length Research Paper An indoor positioning system was developed to provide a fast and easy determination of unknown position coordinates. Wireless sensor nodes (WSN) are employed in a test area. Trigonometry techniques were employed to determine the position of the unknown objects by employing numerical analysis techniques on received signal link quality indicator (LQI) values. The distances between the unknown object position and the WSNs are calculated by using curve fitting techniques on received LQI values. Weight centroid localization (WCL) algorithm was introduced on the results of the trigonometry techniques to improve the position accuracy. An application program (AP) was developed to control and display all the results. Key words: Wireless sensor nodes (WSN), weight centroid localization (WCL), transmitter, receiver, received signal strengths (RSS), received signal strength indicator (RSSI), link quality indicator (LQI), application program (AP). Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/93261F58491 http://dx.doi.org/10.5897/IJCER.9000003 en Copyright © 2011 Hakan Koyuncu and Shuang Hua Yang
oai:academicjournals.org:IJCER:A2C5D2A8499 2011-10-31T00:00:00Z AcademicJournals IJCER IJCER:2011
A least square approach to analyze usage data for effective web personalization S. S. Patil Full Length Research Paper Web server logs have abundant information about the nature of users accessing it. The analysis of the userrsquo;s current interest based on the navigational behavior may help the organizations to guide the users in their browsing activity and obtain relevant information in a shorter span of time (Sumathi and Padmaja, 2010). Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving web sites/pages, making additional topic or product recommendations, user/customer behavior studies, etc (Ratanakumar, 2010). Web usage mining, in conjunction with standard approaches to personalization helps to address some of the shortcomings of these techniques, including reliance on subjective lack of scalability, poor performance, user ratings and sparse data (Mobasher et al., 2002; Eirinaki and Vazirgiannis, 2003; Khalil et al., 2008; Forsati et al., 2009; Mobasher et al., 2001). But, it is not sufficient to discover patterns from usage data for performing the personalization tasks. It is necessary to derive a good quality of aggregate usage profiles which indeed will help to devise efficient recommendation for web personalization (Cooley et al., 1997; Srivatsava et al., 2000; Agarwal and Srikant, 1994). Also, the unsupervised and competitive learning algorithms has help to efficiently cluster user based access patterns by mining web logs (Hartigan and Wong, 1979; Ng et al., 2007; Memon and Dagli, 2003). This paper presents and experimentally evaluates a technique for finely tuning user clusters based on similar web access patterns on their usage profiles by approximating through least square approach. Each cluster is having users with similar browsing patterns. These clusters are useful in web personalization so that it communicates better with its users. Experimental results indicate that using the generated aggregate usage profiles with approximating clusters through least square approach effectively personalize at early stages of user visits to a site without deeper knowledge about them. Key words: Aggregate usage profile, least square approach, web personalization, recommender systems, expectation maximization. Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/A2C5D2A8499 http://dx.doi.org/10.5897/IJCER.9000001 en Copyright © 2011 S. S. Patil
oai:academicjournals.org:IJCER:A6F82078536 2011-11-30T00:00:00Z AcademicJournals IJCER IJCER:2011
Cross layer based miss detection ratio under variable rate for intrusion detection in WLAN Ravneet Kaur Full Length Research Paper The emphasis for the use of wireless LAN in industry is on robustness, reliability and security. Almost any given single secruity mechanism (such as MAC filtering) alone may be easily overcome by attackers. However, proper configuration and implemetation of the maximum possible security mechanism must be used to form a multiple security layers, to provide the best possible wireless protection. The present paper deals with cross layer based miss detection ratio under variable rate for intrusion detection in WLAN. In cross layer based intrusions detection, the decision is based on the combine on weight value of two or more layer. So the decision is not based on single layer, it will reduce false positive rate. Two different layers, physical and MAC have been used in the present study and the results have been compared with existing technique. Key words: Reciever signal strength (RSS), time taken for RTS-CTS handshake (TT), radio frequency (RF). Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/A6F82078536 http://dx.doi.org/10.5897/IJCER11.038 en Copyright © 2011 Ravneet Kaur
oai:academicjournals.org:IJCER:0748FAB8561 2011-11-30T00:00:00Z AcademicJournals IJCER IJCER:2011
Managing distribution of national examinations using geospatial technologies: A case study of Pumwani and Central divisions David Ndegwa Kuria, Moses Murimi Ngigi, Josephine Wanjiru Wanjiku and Rachel Kavutha Kasumuni Full Length Research Paper Academic Journals 2011 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/0748FAB8561 http://dx.doi.org/10.5897/IJCER11.048 en Copyright © 2011 David Ndegwa Kuria, Moses Murimi Ngigi, Josephine Wanjiru Wanjiku and Rachel Kavutha Kasumuni
oai:academicjournals.org:IJCER:5AB88498603 2012-01-30T00:00:00Z AcademicJournals IJCER IJCER:2012
Fast matrix multiplication techniques based on the Adleman-Lipton model Aran Nayebi On distributed memory electronic computers, the implementation and association of fast parallel matrix multiplication algorithms has yielded astounding results and insights. In this discourse, we use the tools of molecular biology to demonstrate the theoretical encoding of Strassenrsquo;s fast matrix multiplication algorithm with DNA based on an n-moduli set in the residue number system, thereby demonstrating the viability of computational mathematics with DNA. As a result, a general scalable implementation of this model in the DNA computing paradigm is presented and can be generalized to the application of all fast matrix multiplication algorithms on a DNA computer. We also discuss the practical capabilities and issues of this scalable implementation. Fast methods of matrix computations with DNA are important because they also allow for the efficient implementation of other algorithms (that is inversion, computing determinants, and graph theory) with DNA. Key words: DNA computing, residue number system, logic and arithmetic operations, Strassen algorithm. Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/5AB88498603 http://dx.doi.org/10.5897/IJCER10.016 en Copyright © 2012 Aran Nayebi
oai:academicjournals.org:IJCER:30F9A638593 2012-01-30T00:00:00Z AcademicJournals IJCER IJCER:2012
A review on advances in iris recognition methods Fuad .M. Alkoot Review Iris recognition is one of the most accurate identity verification systems. Since its initial introduction by J. Daughman, many methods have been proposed to enhance the performance. We present an overview of the latest research on iris recognition by categorizing the research in four groups outlined as localization, segmentation, coding and recognition. We present the latest developments explaining advances to solve problems existing at each of iris recognition stages. Key words: Biometrics, identity verification, iris recognition, pattern recognition, iris segmentation, iris localization and iris code. Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/30F9A638593 http://dx.doi.org/0.5897/IJCER11.046 en Copyright © 2012 Fuad .M. Alkoot
oai:academicjournals.org:IJCER:47290318633 2012-04-30T00:00:00Z AcademicJournals IJCER IJCER:2012
Predicting shelf life of dairy product by using artificial neural networks (ANN) and statistical computerized methods Sumit Goyal and Gyanendra Kumar Goyal Full Length Research Paper Artificial neural networks (ANN) have been developed as generalizations of mathematical models of biological nervous systems. Generalized regression (GR) and multiple linear regression (MLR) models for shelf life prediction of dairy product were developed. Results of both the models were evaluated with three types of prediction performance measures viz., mean square error, root mean square error and coefficient of determination R2, and compared with each other. Based on these results, regression equations were developed. From the study, it is concluded that ANN and statistical computerized methods can be employed for predicting shelf life of dairy products. Key words: Artificial neural networks (ANN), shelf life, dairy product, prediction, generalized regression, multiple linear regression. Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/47290318633 http://dx.doi.org/10.5897/IJCER12.008 en Copyright © 2012 Sumit Goyal and Gyanendra Kumar Goyal
oai:academicjournals.org:IJCER:7555E388642 2012-04-30T00:00:00Z AcademicJournals IJCER IJCER:2012
High performance efficiency of distributed optical fiber Raman amplifiers for different pumping configurations in different fiber cable schemes Abd Elndash;Naser A. Mohamed, Ahmed Nabih Zaki Rashed and Mahmoud M. A. Eid Full Length Research Paper Fiber Raman amplifiers (FRAs) are attractive for ultra wide dense wavelength division multiplexing (UW-DWDM) transmission systems due to their advantages of broad amplification bandwidth and flexible central wavelength. With recent developments of optical pump sources with high power near 1.4 mu;m wavelength and highly nonlinear fiber having a peak effective Raman gain coefficient, more than ten times that of conventional single mode fiber, distributed FRAs (DFRAs) are emerging as a practical optical amplifier technology, especially for opening new wavelength windows such as the short and ultra long wavelength bands. Optical pump powers required for Raman amplification were significantly higher than that for erbium-doped fiber amplifier (EDFA), and the pump laser technology could not reliably deliver the required powers. However, with the improvement of pump laser technology, Raman amplification is now an important means of expanding span transmission reach and capacity. In the present paper, we have deeply investigated the proposed model for optical DFRAs in the transmission signal power and pump power within Raman amplification technique in co-pumped, counter-pumped and bi-directional pumping direction configurations through different types of fiber cable media. The validity of this model was confirmed by using experimental data and numerical simulations. Key words: Distributed fiber Raman amplifier, signal power, pumping power, forward pumping, different fiber media, backward pumping, bidirectional pumping configuration. Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/7555E388642 http://dx.doi.org/10.5897/IJCER12.010 en Copyright © 2012 Abd Elndash;Naser A. Mohamed, Ahmed Nabih Zaki Rashed and Mahmoud M. A. Eid
oai:academicjournals.org:IJCER:936EEC08649 2012-05-30T00:00:00Z AcademicJournals IJCER IJCER:2012
Design and simulation of an SMS driven microcontroller for home automation using proteus software Olusanya O. Olamide and Ayeni O. A. Joshua Full Length Research Paper Technology has moved from a level at which a user is always present in a place before he/she can control or do anything at the place. Imagine what television used to be before the inception of remote control. With the inception of remote control, the television can be controlled while lying on the bed or sitting down on the chair. You do not have to move towards it and press the button on it before you can control it. Now envision how it will be, being able to control your entire home appliances automatically and even remotely. Different types of technology are available to do this but this paper looks at designing and simulating the usage of an SMS from mobile phone together with microcontroller (PIC16F876) in communicating with and controlling home appliances. The firmware is written in C language and translated into a Hexadecimal file using Custom Computer Services (CCS) Compiler. The translated Hexadecimal file is loaded into the microcontroller and the microcontroller is then interfaced with the mobile phone such that when this phone receives SMS, it gives the detail of the state of the home appliances remotely. SMS can be sent to instruct the system to do some specific tasks like switching on or off of any of the appliances in the home, switching on the pumping machine to pump water and monitor it. Anytime one feels like stopping an invoked action, it can be done remotely without being in the vicinity of the equipment. Key words: Home automation, short message service, custom computer services compiler, simulation, microcontroller, general packet radio system networks, proteus software, firmware. Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/936EEC08649 http://dx.doi.org/10.5897/IJCER12.004 en Copyright © 2012 Olusanya O. Olamide and Ayeni O. A. Joshua
oai:academicjournals.org:IJCER:7C6247F8655 2012-05-31T00:00:00Z AcademicJournals IJCER IJCER:2012
New Holder-type inequalities for the Tracy-Singh and Khatri-Rao products of positive matrices Zeyad AL-Zhour Full Length Research Paper Recently, authors established a number of inequalities involving Khatri-Rao product of two positive matrices. Here, in this paper, the results are established in three ways. First, we find new Holder-type inequalities for Tracy-Singh and Khatri-Rao products of positive semi-definite matrices. Secondly, the results are extended to provide estimates of sums of the Khatri-Rao and Tracy-Singh products of any finite number of positive semi-definite matrices. Finally, the results lead to inequalities involving the Hadamard and Kronecker products, as a special case. Key words: Tracy-Singh products, Khatri-Rao products, positive (semi) definite matrices, Holder inequalities Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/7C6247F8655 http://dx.doi.org/10.5897/IJCER12.013 en Copyright © 2012 Zeyad AL-Zhour
oai:academicjournals.org:IJCER:39590068660 2012-11-30T00:00:00Z AcademicJournals IJCER IJCER:2012
An open source Geographic Information System (GIS) approach to water supply management, distribution and billing David Ndegwa Kuria, Douglas Engoke Musiega, Moses Murimi Ngigi and Simon Kibue Ngugi Full Length Research Paper In this work a comprehensive solution for the Gatanga Water Trust (GWT) has been developed to assist it in managing its water supply and distribution. The solution comprises two subcomponents: a mapping component and a billing component which are tightly coupled together. The proposed system uses stable open source products for the mapping component and the database. At present the GWT uses outdated maps and sketches for design and installation of a new water supply infrastructure. A billing system is in place which is used to manage client accounts, record meter readings, prepare bills and record payments made. This presents a somewhat disjointed approach to management of the water supply and its attendant infrastructure. The database that stores the account information is very different (softcopy) from that storing the spatial information (hardcopy/paper based). In the proposed solution, a single database is used, centralized or distributed. The mapping component provides an interface through which preliminary design of new and planned infrastructure can be done. After installation, these are reflected in the database and the information becomes available as soon as it is stored. The billing component uses the same database to manage account information. Since the information is managed in one system, there is a streamlined and orderly flow from data collection to the final products from the system. The proposed solution leverages advancement in technology by providing two approaches - a desktop application for users within the Trust#39;s intranet and a web mapping application for users utilizing the wider internet. Key words: Open source, Geographic Information Systems (GIS), water supply, billing, distribution. Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/39590068660 http://dx.doi.org/10.5897/IJCER12.015 en Copyright © 2012 David Ndegwa Kuria, Douglas Engoke Musiega, Moses Murimi Ngigi and Simon Kibue Ngugi
oai:academicjournals.org:IJCER:26610528663 2012-11-30T00:00:00Z AcademicJournals IJCER IJCER:2012
Simulation analysis of proactive, reactive and hybrid routing protocols in mobile ad hoc network using Qualnet simulator 5.0.2 Nitin Arora and Suresh Kumar Full Length Research Paper Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. All nodes are mobile and can be connected dynamically in an arbitrary manner. There is no static infrastructure such as base station. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network. There are various protocols for handling the routing problem in the ad hoc wireless network environment. In this paper, focus is given on studying the performance evaluation of various routing protocols using Qualnet simulator 5.0.2. The performance of the proactive, reactive and hybrid protocols are analyzed with different node densities for stationary nodes. The metrics used for the performance evaluation include throughput, packet delivery ratio and average end to end delay. Key words: Proactive, reactive, hybrid, performance evaluation, Qualnet, end-to-end delay, throughput, packets delivery ratio. Academic Journals 2012 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/26610528663 http://dx.doi.org/10.5897/IJCER12.022 en Copyright © 2012 Nitin Arora and Suresh Kumar
oai:academicjournals.org:IJCER:55D552146260 2014-07-31T00:00:00Z AcademicJournals IJCER IJCER:2014
The comparison of time division multiple access (TDMA) (global system for mobile communication, GSM) and wideband-code division multiple access (W-CDMA) (third generation, 3G) system based on their modulation techniques Olusanya Olamide O. and Ogunseye Abiodun A. Full Length Research Paper Mobile network communication system offers the users with seamless communication and this has caused wireless communication to increasingly become the preferred method of carrying multimedia traffic or messages such as voice, video, images, and data files. Time division multiple access (TDMA) is the multiple access scheme used in global system for mobile communication (GSM), while third generation (3G) system uses wideband-code division multiple access (W-CDMA). The former is designed majorly for voice and a little of data. Due to the increase in number of phone users and the services enjoyed by the users, there is higher demand for non-voice services, mobile extensions to fixed-line services and richer mobile content. This has caused the network operators to develop 3G system with the goal of providing a network infrastructure that can support a much broader range of services than existing systems in which its penetration level has reached market saturation. This paper presents a comparison of the two wireless systems performance based on their modulation techniques. From the constellation gotten, the two systems were analyzed and the analysis shows that W-CDMA (that is, 3G) provides a network infrastructure that can support a much broader range of services than existing systems (GSM) because the main forces behind development of the 3G have been driven by the second generation systemsrsquo; low performance data services, incompatible service in different parts of the world, and lack of capacity. Key words: Time division multiple access (TDMA), wideband-code division multiple access (W-CDMA), call drop rate, call set-up success rate (CSSR), handover rate, constellation. Academic Journals 2014 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/55D552146260 http://dx.doi.org/10.5897/IJCER2013.0197 en Copyright © 2014 Olusanya Olamide O. and Ogunseye Abiodun A.
oai:academicjournals.org:IJCER:195D6A948207 2014-10-31T00:00:00Z AcademicJournals IJCER IJCER:2014
Real-time operating system (RTOS) with application to play models Hiba Shahid, Wadee Alhalabi and John Reif Full Length Research Paper It is very important to improve the design of the real-time operating system (RTOS) especially if we want to use it in some special devices. Numerous researches have accepted conventional RTOS as being the customary approach for designing devices used by children. This is because these are able to facilitate the implementation different criteria such as clustering, stability and alternate programs. In this paper, numerous publications have been analyzed to observe the performance of the RTOS when it is subjected to varied constraints. The study focuses on a review of RTOS in relation to play models to analyze their capabilities on various computing platforms and OSs. The publications which we have collected have been sorted out to comprehensively review thereby leading to the configuration of several factors affecting the features within the system. Likewise, statistics and results have facilitated adoption of a more focused approach towards the development of RTOS. While this program ranks clustering and performance as being the highest RTOS criteria for all applications, alternate programs considered this to be the least important. Thus, criteria choice becomes an important issue to address. Key words: Operating system (OS), play model, real-time, real-time operating system (RTOS) performance, RTOS criteria. Academic Journals 2014 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/195D6A948207 http://dx.doi.org/10.5897/IJCER2013.0202 en Copyright © 2014 Hiba Shahid, Wadee Alhalabi and John Reif
oai:academicjournals.org:IJCER:43DC51758418 2016-02-29T00:00:00Z AcademicJournals IJCER IJCER:2016
Issues in a transactional database emanating from data warehouse project Joseacute; A. Z. M., Beatriz R. R., Hugo de la R. C. and Patricia R. A. Full Length Research Paper When a data warehouse (DW) is built, typical extraction, transformation, and loading operations are made, including cleaning tasks of the data, conflicts resolution, inconsistencies identification, and constrains checking, among others. In this work, two databases (DB) were combined to obtain indexes approved and failing course in basic sciences area (Mathematics, Physics, Chemistry) of the Institute of Technology of San Luis Potosiacute; (ITSLP for their initials in Spanish). The database table intermediate of the transactional database was used to calculate dimensions and fact database tables of one warehouse. Stored data in DW are the input to Data Mining Algorithms and validation information process. This benefit was not expected. At last, the combined database was divided into a transactional database and historical database, to avoid redundancy, inconsistency, incongruity, and other integrity issues and to prepare the historical database to update DW. This DW will be suitable to carry out statistical queries in diverse areas and faculties. The final divisions of mixed database and alternative uses of intermediate tables are some non-awaiting results of original planning of project. Key words: Data bases, data mining, basic sciences, data warehouse, inconsistency. Academic Journals 2016 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/43DC51758418 http://dx.doi.org/10.5897/IJCER2014.0220 en Copyright © 2016 Joseacute; A. Z. M., Beatriz R. R., Hugo de la R. C. and Patricia R. A.
oai:academicjournals.org:IJCER:0208F0359126 2016-05-31T00:00:00Z AcademicJournals IJCER IJCER:2016
In silico study in mitochondrial and chloroplast genomes of plants G. V. Padma Raju, P. Srinivasa Rao, V. Chandra Sekhar and C. Someswara Rao Full Length Research Paper Simple sequence repeats (SSRs) or microsatellites constitute a countable portion of genomes. However, the significance of SSRs in organelle genomes has not been completely understood. The availability of organelle genome sequences allows us to understand the organization of SSRs in their genic and intergenic regions. In the current study, the mitochondrial and chloroplast genomes of different taxa of plants were surveyed. The present study only focused on different authorsrsquo; investigations and conclusions made based on their results in relation to the different plants. This study helps the researchers to know the different structures of plant genomes, improves the understanding of existing genomes and helps to find newer genomes. Key words: Chloroplast, mitochondria, simple sequence repeats (SSRs), microsatellites, plants. Academic Journals 2016 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/0208F0359126 http://dx.doi.org/10.5897/IJCER2015.0235 en Copyright © 2016 G. V. Padma Raju, P. Srinivasa Rao, V. Chandra Sekhar and C. Someswara Rao
oai:academicjournals.org:IJCER:688B63E65262 2017-07-31T00:00:00Z AcademicJournals IJCER IJCER:2017
Framework for integrating fragmented information systems: Case of livestock information systems Abswaidi Ramadhani, Anael Sam and Khamisi Kalegele Full Length Research Paper Information System (IS) is used for information communication. But the problem with the existing Agro-ISs is that they are not integrated. To integrate it, we need to have an integration framework. Generally, much has been done on the designing framework for IS integration. However, there are credible things which can be added to improve these frameworks. A framework can be designed in such a way that it guides users on technologies to be used, skills needed for the task, goals, outcome and output of integration. This is what this study focused to contribute. To design the framework, guiding factors were established. These factors were the one which surround farmers and in one way or another hinder or support accessibility of information from integrated ISs. The factors were discussed and presented in the mapping matrix. Under each factor, viability of technology on the ground was established and compared against the available technology. From the mapping matrix, scenarios on possible applications were established. Guides on Technologies, skills, goals, output and outcome of integration were established to form a framework for integrating applications and ISs. Then the framework was demonstrated empirically and compared with the existing frameworks. Results show that the proposed framework is more comprehensive in terms of guides it provides, than the existing frameworks. Key words: Information System (IS), applications, framework, fragment, fragmented IS. Academic Journals 2017 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/688B63E65262 http://dx.doi.org/10.5897/IJCER2017.0273 en Copyright © 2017 Abswaidi Ramadhani, Anael Sam and Khamisi Kalegele
oai:academicjournals.org:IJCER:C9AC37C61384 2019-07-31T00:00:00Z AcademicJournals IJCER IJCER:2019
Analysis and result of classification algorithm on email classification Elifenesh Yitagesu Desta and Tekalign Tujo Gurmessa Full Length Research Paper In this time, one of the most and fastest forms of communication is electronic mail or what we call e-mail. However, the increase of e-mail users has resulted in the dramatic increase of spam emails in the past few years. Spam is the use of electronic messaging systems to send bulk data. In this paper, e-mail data were classified as ham email and spam email using supervised learning algorithms. Three different classifiers such as Naiuml;ve Bayesian (NB) classifier, K-nearest neighbor (KNN) classifier and Support Vector Machine (SVM) classifier were used. The experiment was performed by applying filtering on the classifiers. The result shows the difference between the classifier before and after applying filtering algorithm. To examine the performance of the selected classification methods or algorithms, namely Naiuml;ve Bayes, SVM and KNN, true positive, false positive, precision, recall and F-measure were validated. There was a time difference using those classification algorithms. KNN and SMO algorithms are almost the best classifiers among the three before applying filtering algorithm. Sequential minimal optimization (SMO) is an algorithm used to solve quadratic programming (QP) problem that arises during the training of support vector machines (SVM) and after applying filtering algorithm. SMO algorithm is the best classifier algorithm. For this experiment, the data mining tool called WEKA was used. Key words: WEKA, classifier, K-nearest neighbor (KNN), support vector machines (SVM), Naiuml;ve Bayesian (NB), boosting. Academic Journals 2019 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/C9AC37C61384 http://dx.doi.org/10.5897/IJCER2019.0281 en Copyright © 2019 Elifenesh Yitagesu Desta and Tekalign Tujo Gurmessa
oai:academicjournals.org:IJCER:0B513B771288 2023-09-30T00:00:00Z AcademicJournals IJCER IJCER:2023
Security threats affecting user-data on transit in mobile banking applications: A review Daniel Okari Orucho, Fredrick Mzee Awuor, Cyprian Ratemo and Collins Oduor Review Mobile banking technology is beneficial to customers because it is convenient for conducting bank services remotely. Newer channels used for mobile banking such as mobile banking applications have been developed as an innovation that is utilized to offer traditional banking services remotely such as money withdrawals, deposits, cheque book requests among others. This saves time and costs of going to physical banking halls and having to wait in long queues. However, utilization of mobile banking applications to access remote banking services is not immune from malicious attackers who steal usersrsquo; data such as login credentials and use them to access the usersrsquo; accounts and steal money. Securing user data on transit is important to mobile banking application users. It is also important to protect user data from online profile stealing which often leads to losing money from customers due to cyber thieves. This paper used descriptive research approach and desktop research and reviewed emerging security threats in mobile banking applications. It also identified and analyzed the cutting-edge mechanisms available to mitigate security threats, and lists some of the pertinent open research issues. Key words: Mobile banking applications, security threats. Academic Journals 2023 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/0B513B771288 http://dx.doi.org/10.5897/IJCER2023.0304 en Copyright © 2023 Daniel Okari Orucho, Fredrick Mzee Awuor, Cyprian Ratemo and Collins Oduor
oai:academicjournals.org:IJCER:DFC69D271971 2024-03-31T00:00:00Z AcademicJournals IJCER IJCER:2024
A practical guideline for implementing an extra security layer on an intra-cloud private MongoDB Database using encryption Kevin Tshimanga, Patrick Mukala, and Godwill Ilunga Review Cloud computing offers different deployment and distribution models for the outsourcing of the companyrsquo;s Information Technology (IT) infrastructure (applications and data). The wide adoption of this concept does not exclude permanent and unforeseen dangers. The company loses its guarantee of the confidentiality of its most sensitive information, and many legal and security questions remain unanswered. A large number of threats from different backgrounds flock, especially against the data. The confidentiality of sensitive database information stored on the cloud provider server is always a big issue for cloud customers. Because it is no longer just attackers or other cloud users the company is looking for to preserve the confidentiality of its sensitive information, it is also and above all the supplier cloud itself. To this end, cloud providers have deployed security mechanisms designed to protect user databases from external threats. However, these measures do not seem sufficient. In the absence of trust, security does not exist. In this thesis, we set out to define the main database security factors. We have made relevant arguments on the necessity of the client-side encryption model and evaluated its performance in an environment real cloud. In order to carry out these measurements, we propose a basic security model of data based on client-side encryption. Our proposal guarantees the confidentiality of data, thanks to the management of the encryption/decryption keys assigned to the client cloud. Key words: Cloud computing, database security, data encryption, confidentiality, integrity, trust. Academic Journals 2024 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/DFC69D271971 http://dx.doi.org/10.5897/IJCER2023.0308 en Copyright © 2024 Kevin Tshimanga, Patrick Mukala, and Godwill Ilunga
oai:academicjournals.org:IJCER:79D45BE71985 2024-03-31T00:00:00Z AcademicJournals IJCER IJCER:2024
Lessons learned and perspectives on constrained data collection and preparation for a predictive machine learning model applied to transportation industry in a non-digitalised environment Simon Isaac KABEYA MWEPU and Patrick MUKALA, Full Length Research Paper Machine learning algorithms are based on qualitative and quantitative historical data, to create predictive models for shape recognition, autonomous systems, etc., using classifiers like K-Nearest Neighbors (KNN), neural-network, etc. So, treatment of data is the undisputed fuel that powers any machine learning endeavour. A standard data collection methodology would comprise a few steps as data collection, cleaning, resampling, resizing, selecting variables, extracting features, transforming and projecting data, removing noise, and irrelevant information. In this paper, we report on a case study based on collection of data for predicting trains derailments in the context of spiking neural networks (SNNs), the rail carrier in the Democratic Republic of Congo. We share the lessons learned of a company, where pretty much everything is done manually on reliance on expertsrsquo; opinion. Our data collection approach at SNCC, concerns 117,473 vehicles including 15,280 derailed of which 111 come from networks outside SNCC. 25,727 vehicles were excluded for one of the reasons mentioned earlier. The remaining 86,463 vehicles were split into 2 blocks consisting, respectively of 69,170 vehicles for the learning data and 17,293 vehicles for the test data. KNN classifier predicts the (survenue) of derailments with 87% for 3-NN and 85% for 3-NN of rate. With this rate, it is possible to avoid derailments by predicting their (survenue). But we must perform it to avoid consequences of derailments on persons and materials. Key words: Machine learning, K-nearest neighbors (KNN), neural-network, spiking neural networks (SNNs), data constraints, predictive maintenance, train vehicles. Academic Journals 2024 TEXT text/html https://academicjournals.org/journal/IJCER/article-abstract/79D45BE71985 http://dx.doi.org/10.5897/IJCER2023.0310 en Copyright © 2024 Simon Isaac KABEYA MWEPU and Patrick MUKALA,