Home » Archive » Vol 1 Issue 2

Vol 1 Issue 2

Volume  1  Issue  2 

__________________________________________________________________________________________

J. Stephen Guffey, William C. Payne, Jessica Greenway, Ben Buchanan, Carly M. Dodson, Kristoffer Lancaster

Inhibition of Klebseilla pneumoniae by Visible and Near-IR Radiation

[Abstract] [Full-Text PDF] [html]

__________________________________________________________________________________________

Elsayed M. E. Zayed , Ahmed H. Arnous 

Exact Traveling Wave Solutions for Coupled Nonlinear Fractional pdes Using the -Expansion Method

[Abstract] [Full-Text PDF] [html]

Abstract: In this paper, the ( / ) G G -expansion method is extended to solve fractional differential equations in the sense of modified Riemann-Liouville derivative. Based on a nonlinear fractional complex transformation, certain fractional partial differential equations can be turned into ordinary differential equations of integer order. For illustrating the validity of this method, we apply it to find exact solutions with parameters for four fractional nonlinear partial differential equations namely, the time fractional nonlinear coupled Burgers equations, the time fractional nonlinear coupled KdV equations, the time fractional nonlinear Zoomeron equation and the time fractional nonlinear Klein-Gordon-Zakharov equations . When these parameters are taken to be special values, the solitary wave solutions are derived from the exact solutions. The proposed method is efficient and powerful in solving wide classes of nonlinear evolution fractional order equations.

__________________________________________________________________________________________

Arohunsoro, Segun Joseph, Owolabi, Jimoh Temitayo, Omotoba, Nathaniel Ileri

Watershed Management and Ecological Hazards in an Urban Environment: The Case of River Ajilosun in Ado Ekiti, Nigeria

[Abstract] [Full-Text PDF] [html]

Abstract: Vegetation growth/vegetal cover has played significant role in watershed management and its protection against ecological hazards in an urban environment. Urbanization plays a significant impact in the alteration of the ecological equilibrium of an environment. As city grows, watersheds are thrown into ecological entropy resulting to environmental disruptions. The paper demonstrates effect of deforestation and urban development on River Ajilosun drainage basin in AdoEkiti, Nigeria. The ecological impacts of flooding and erosion were studied by collecting direct field data on width of flooding and width of channel bank erosion. The basic equipment employed for the measurement are the tape, ranging pole and a piece of plank (tie rod). The data were analyzed with both the descriptive and inferential techniques. The result of the analysis revealed that ecological hazards caused by urbanization in the drainage basin included flooding and erosion which exhibited spatial variation across and along the profiles of the drainage basin. The study revealed further that deforestation and urban physical development affects the environment of the lower reaches of the drainage basin through flooding and also caused increased erosive effect of flooding in the downstream reaches of the Ajilosun drainage basin.

__________________________________________________________________________________________

Mohammad Assarian, Zohreh Azarbad, Hossein Bojari, Amin Assarian

Dropout in Computer Graduated Students in Islamic Azad University of Kashan

[Abstract] [Full-Text PDF[html]

__________________________________________________________________________________________

Ogundele Michael Olarewaju , Bello  Yekeen 

Financing Entrepreneurship Education Program in Kwara State Tertiary Institutions, Nigeria

[Abstract] [Full-Text PDF[html]

__________________________________________________________________________________________

Pattnaik Dr. Prasant Kumar, Kumar Raghvendra,  SharmaDr. Yogesh

Privacy Preservation in Distributed Database

[Abstract] [Full-Text PDF] [html]

Abstract: Data mining is a new era of technology of identifying patterns and trends from large quantities of large business data sets. Mining association rule is important data mining problem for finding the association between the different attributes in the given business data sets .To solve mining association rule problem have many different types of technique are available for example Apriori, FP tree. The privacy concept arises when the data is distributed in the distributed database environment, concept of security and privacy arises here so that no any unauthorized person not able to decrypt the data and see the result of the middle or unauthorized party. For providing the security to the distributed database we used hash based secure sum cryptography technique without trusted party and another concept is with trusted party when there are one of the middle party that will control all the details of the all the party presents in the distributed database environment because when the Party to find the global result may be that result is frequent or infrequent. In this paper we mainly compare the result privacy preserving technique with and without trusted party for horizontal partitioned data. And provide high security to data Parties with percentage of data leakage is zero percent by using the Apriori algorithm.

__________________________________________________________________________________________

Tiwari Rajinder, Singh R. K.

A Real Time Based Intelligent System Designed for the Process Automation & Control Applications

[Abstract] [Full-Text PDF] [html]

Abstract: LabVIEW is a graphical programming tool based on the dataflow language G. Recently, runtime support for a hard real time environment has become available for LabVIEW, which makes it an option for embedded system prototyping. Due to its characteristics, the environment presents itself as an ideal tool for both the design and implementation of embedded software. In this project we study the design and implementation of embedded software by using G as the specification language and the LabVIEW RT real time platform. One of the main advantages of this approach is that the environment leads itself to a very smooth transition from design to implementation, allowing for powerful co simulation strategies (e.g. hardware in the loop, runtime modeling). In order to evaluate the effectiveness and possible improvements on G as an embedded software description language we prove that, under certain conditions and semantic restrictions, a non-terminating G program is strictly bounded in memory. Home automation is an application of ubiquitous computing in which the home environment is monitored by ambient intelligence to provide context-aware services and facilitate remote home control. This paper discusses the approach of real-time system development using the data acquisition tool of LabVIEW. The system can monitor the temperature, humidity, lighting, fire & burglar alarm, gas density of the house and have infrared sensor to guarantees the family security. The approach combines hardware and software technologies. Virtual instrumentation uses a general-purpose computer to mimic real instruments with their controls and displays.

__________________________________________________________________________________________

Majid Khoshkroudian

A New Model for Freight Rail Access Charge in Iran Railway

[Abstract] [Full-Text PDF[html]

__________________________________________________________________________________________

 Balajee Maram, DrChalla Narasimham

Enormous Symmetric Cryptography Algorithm Using Image and Double Reflecting Data Perturbation Method

[Abstract] [Full-Text PDF] [html]

Abstract: Information Security plays a vital in Data Communication in Intra-Organization and Inter-Organization. Till now so many algorithms have been introduced for providing Security to Data. Most of the algorithms are belongs to Cryptography. In Data Communication, the Data is encrypted using Private-Key/Public-Key. Then the encrypted data (Cipher) will be decrypted in Receiver-Side. For Data hiding, the Steganography techniques are very useful. In Steganography, Images are very important for carrying data. But this research paper proposes an enormous algorithm for Cryptography using Images. In the proposed algorithm, Double-reflecting Data-Perturbation method plays a vital for Encryption and Decryption. The proposed paper using Cryptography algorithm and shuffling data is converted into a Image. From Receiver-side, the Image is converted into ASCII and then data.

__________________________________________________________________________________________

Chander Subhash, Agarwal  Pramod, Gupta Indra  

Fine-Tuned PID Controller for fast Transient Response of DC-DC Converter

[Abstract] [Full-Text PDF] [html]

Abstract: Ziegler-Nichols tuned PID controller’s performances usually are not acceptable for applications requiring precise control. In this paper a fine-tuned discrete PID control scheme aiming to improve the transient response of DC-DC Converter during the large load and source changes, is presented. This method is recommended particularly whenever large source/load changes are expected or there is a need of fast transient response time of the DC-DC converter, which is not presented by a simple PID Controller. The algorithm developed in this paper employed a simple logic to modify the PID controller parameters during load/source changes with a minimum computing complexity. The parameters of PID Controller are automatically modified whenever load/source change occur otherwise it will behaves like a normal PID Controller. First the algorithm is developed and is applied to buck converter to improve its performance. A MATLAB/Simulink model is developed and considered for a well designed Buck Converter with non-linear effects such as S/H, quantization, delay, and saturation are considered in the close loop model of the buck converter. The responses of this buck converter are obtained with proposed Fine-Tuned PID (FT-PID) and normal PID Controller and the comparison is presented. A significant improvement in the transient response and rise time of the Converter is observed with the FT-PID Controller. The detailed analysis, simulation results are presented to demonstrate the effectiveness of the developed algorithms.

__________________________________________________________________________________________

Amara Khaled , Bouazza Mokhtar,  Besseghier Abderahmane,  Tounsi Abedlouahed and Adda Bedia el Abbas

Thermal Effect on Wave Propagation in Double Walled Carbon Nanotubes Using Strain Gradient Elasticity

[Abstract] [Full-Text PDF] [html]

Abstract: The present paper examine the vibrational characteristics of double-walled carbon nanotubes (DWNTs) embedded in a polymer matrix based on the theory of strain gradient elasticity. The mechanical properties of carbon nanotubes and polymer matrix are treated as the functions of temperature change. The research work reveals the significance of the effect of small scale on wave propagation in DWNTs. It is demonstrated that some properties of transverse vibrations of DWNTs are dependent on the change of temperature

__________________________________________________________________________________________

Goswami Preeti , Yadav Yogesh, V Chakradhar

Morphological Study of Renal Vasculature in North India

[Abstract] [Full-Text PDF[html]

__________________________________________________________________________________________

Gholamreza Jandaghi , Mahmood Ramshini

A Performance Measurement Model for Automotive and Petrochemical Companies Using FAHP and CCR Method

[Abstract] [Full-Text PDF[html]

__________________________________________________________________________________________

Share on LinkedIn0Email this to someoneShare on Google+0Tweet about this on TwitterShare on Facebook0Share on Reddit0Pin on Pinterest0Digg thisPrint this page