ARPN Journal of Engineering and Applied Sciences                         ISSN 1819-6608 (Online)
   
Custom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences            February 2015 | Vol. 10  No. 2 
   
Title:

A Zigbee-based continuous online vital sign monitoring system

Author (s):

Hanita D., Nurul Fauzana I.G., Nursyarizal M.N. and Taib I.

Abstract:

Conventional method carried out by health professionals in measuring vital signs are conducted in every four hours interval in most hospitals in Malaysia. Amongst the wireless technology known to be deployed are Radio Frequency Identification (RFID) and Zigbee technology. They fit the purpose of healthcare application in terms of two ways communication, patient’s safety, higher number of nodes and etc. However, the current tag is seen to have setbacks in terms of inefficiency and inaccuracy of data transfer. Zigbee Network on the other hand is able to fulfill the stated criteria with an addition of larger number of nodes and stability during data transmission which is an added advantage to the application. This research is discussing on the development of two different real – time continuous wireless vital sign device which are heart rate and temperature monitoring to be used in hospitals as a medium of patient data transfer and data gathering. Readings obtained were benchmarked with the conventional handheld heart beat reader and a thermometer to fulfill the accuracy and stability criteria. Continuum of the study was multiple tests conducted to ensure stability, transmission range capability and reliability of device for various age groups and gender. Results obtained were impressive and comparable to the miniaturization of device for further testing in the hospital.

 
 
 
Full Text 

Title:

A flow-based mobility architecture in multihomed NEMO to minimize registration delay

Author (s):

Shayla Islam,  Aisha H. Abdalla, Wan H. Hassan, Mohamed Hadi Habaebi, Suhaimi A. Latif and M. K. Hasan

Abstract:

With the growing development of Different Access Technology Type (DATT), a serving Mobile Router (MR) is capable to connect with multiple interfaces concurrently during handoff among DATT. Correspondingly, a shared prefix-based based flow movement in multihomed Network Mobility (NEMO) can be achieved in order to transfer real time application flows among the most appropriate Access Technology Type (ATT) dynamically to provide better Quality of Service (QoS) for real time scenarios in NEMO. Although Multiple Care of Address (MCOA) registration between serving MR along with its Home Agent (HA) can overcomes some of the multihoming issues for NEMO, but still required a dynamic flow redirection mechanism leads to signaling overhead issues to support mobility management in NEMO. The aim of this paper is to propose a Shared Prefix-based Flow mobility scheme in multihomed NEMO (SPF-NEMO) which is based on PMIPv6 to reduce registration delay during inter mobility handoff as well. Moreover, numerical framework is formulated to evaluate the outcomes of the SPF-NEMO scheme. Through the performance analysis with results, it is confirmed that SPF-NEMO provides better solution related to extra registration delay during handoff among DATT.

 
 
 
Full Text 

Title:

Synonymous non-taxonomic relations extraction

Author (s):

N.F. Nabila, Nurlida Basir and A. Mamat

Abstract:

Construction of ontology is a difficult task, expensive and time-consuming. Concept, taxonomy and non-taxonomic relations, are the three important components in the development of ontology. These three components are used to represent the whole domain texts. Currently, most of studies focused on extracting the concept, the taxonomic relationships and the non-taxonomic relationships within the scope of single sentence. In order to enrich the domain ontology, we introduced a method to extract the non-taxonomic relations by using the similarities of relations that exist in more than one sentence. The most appropriate predicate are used as a reference to relate between concepts that occur not only in the same sentence, but also in different sentences. Here, the proposed method was tested using a collection of domain texts that described electronic voting machine and are evaluated based on the standard information retrieval performance metrics, i.e. precision and recall.

 
 
 
Full Text 

Title:

An investigation into accessible web navigation for the blind people

Author (s):

Ahmad Hisham Zainal Abidin, Hong Xie and Kok Wai Wong

Abstract:

Current screen-reader program used by the blind people to access the Internet inflicts navigation restrictions since the blind users can only perceive the content in serial mode. The serialized access using screen-reader program restricts the blind users from having the multi-dimensional effects required to fully understand the page layout. We believe that by accessing web pages using bi-modal interaction, a blind user would be able to perceive a two-dimensional perspective of a web page in his or her mental model. The purpose of this study is to investigate the differences in the mental models created by blind people from a two-dimensional web page using two different means: one using a screen-reader only and the other using a touch screen with audio feedback. Ten blind people and thirty sighted blindfolded participants participated in this study. This study employed within-subjects repeated measures experiments together with observations, verbal protocols and semi-structured questionnaires to achieve the objectives of the study. Besides, the influence of user’s spatial ability on the user’s performance was investigated using Tactual Performance Test (TPT). The study revealed that using touch screen with audio feedback, the blind people achieved more accurate orientation. However, the accuracy seems to be affected by page complexity. In addition, investigation of blind users’ spatial ability on users’ sense of position revealed that using touch screen with audio feedback, blind participants with lower spatial ability took longer time to locate information. Therefore, users’ spatial ability plays an important determinant for the Web navigability using touch screen with audio feedback.

 
 
 
Full Text 

Title:

Telemedicine supported by data warehouse architecture

Author (s):

Mohd Khanapi Abd Ghani, Mustafa Musa Jaber and Nanna Suryana

Abstract:

Telemedicine is the new way of delivering health services to patients and can be defined as the provision of medical services by using information technology and communication systems. Moreover, it emphasizes the interaction and collaboration with the increase of sharing information and knowledge between healthcare provider and patient. Healthcare information systems contain large volumes of information that include demographic and medical history of patients such as medication, lab test results, radiology information and procedures that are constantly growing. Thus, the need of complete medical data which supports video, audio and images has to be accomplished before implementing the telemedicine system. The aim of this research is to propose an integrated telemedicine framework supported by data warehouse technique.  The proposed framework is evaluated using test case technique and the result showed that data warehouse provides important elements of information to telemedicine system especially during consultation.

 
 
 
Full Text 

Title:

Database remodeling and implementing table partitioning as a solution to smart cable guard system

Author (s):

Humasak Tommy Argo Simanjuntak, Paul Wagenaars and Guido Bakema

Abstract:

One of the services that DNV GL Netherlands provides to its customers is to continuously monitor distribution cable circuits for upcoming defects. This system monitors over 100 circuits with an average of 5 discharges per circuit per minute. Regardless of the amount of circuits and pulse discharges per minute, the system should be able to complete all processes within one hour or even less. Meanwhile, the current database design using SQL Server cannot adapt to the new requirement of the user and low query performance for inserting and retrieving Partial Discharges (PD) data. Thus, to meet the new requirements, database remodeling should be done. To increase query performance for inserting and retrieving PD data, a new design to store PD data were introduced with remodel database structure and implementing partitioning.

 
 
 
Full Text 

Title:

Prevention of digital music file duplication

Author (s):

Hammuzamer Irwan Hamzah, Low Tan Jung  and Ariffin Abdul Mutalib

Abstract:

Current digital music file duplication software only detects the duplication of digital music file in the hard disk of a personal device. This study develops a biologically inspired model for storing audio data (BiMSAD) to prevent duplication of digital music files when the data are inserted into the hard disk. This paper presents the activities in developing of the theoretical and conceptual frameworks. Experiments testing are performed to show the usability of BiMSAD and the results are reported. The outcomes of BiMSAD indicate that it prevents duplication of digital music files in a personal device better than the existing methods which only detect duplication after it occurs. The hard disk of personal device can be controlled and optimized for extra digital music record collection by BiMSAD.

 
 
 
Full Text 

Title:

Facial emotion recognition based on two-dimensional empirical mode decomposition and PCA plus LDA

Author (s):

Hasimah Ali, Muthusamy Hariharan, Sazali Yaacob and Abdul Hamid Adom

Abstract:

This paper proposes a new approach of using nonlinear technique, two-dimensional empirical mode decomposition (2DEMD) and PCA plus LDA for facial emotion recognition. The EMD is a non-parametric data-driven analysis tools which decomposes any nonlinear and non-stationary signals into a number of intrinsic mode functions (IMFs). In this work we used the 2DEMD which is the extension of one dimensional EMD to extract the features at multiple scales or spatial frequencies from facial images. These features called IMFs that obtained by a sifting process. To reduce dimensional features, PCA plus LDA was applied on IMF features. The obtained features was classified using k-nearest neighbor classifier. To evaluate the effectiveness of the proposed method, Cohn-Kanade database was employed. A series of experiment shows that the proposed method achieves recognition rate of  98.28% thus demonstrates a promising result for classifying the facial emotions.

 
 
 
Full Text 

Title:

Preliminary study on semantic knowledge management model for collaborative learning

Author (s):

Zaihisma Che Cob, Rusli Abdullah, Hanim Risidi and Mohd Zali Mohd Nor

Abstract:

Knowledge management (KM) is about collecting, organizing, and storing the knowledge assets of an organization to make it accessible for future knowledge reuse and application. Effective knowledge management system (KMS) should be able to deliver relevant knowledge to the right knowledge user at the right time. Yet, existing KMS is limited in several ways, and still largely relies on human efforts to access, extract and filter information pertinent to their knowledge need. Successful KMS requires the identification of proper technology designed with the right system features to support the KM activities, hence achieve the goals of KM. Due to this motivation, this paper aims to discuss the application of semantic technology to enhance the KMS and propose a semantic KM model to support collaborative learning environment. This preliminary model has been proposed based on the review of the literatures on KM, KMS, semantic technology and collaborative learning environment and the verification of the model components will be done using a questionnaire survey. A pilot survey was conducted to several academicians in Higher Learning Institutions (HLIs) in Malaysia to validate the survey instruments before the actual survey is carried out. Rasch Unified Measurement Method (RUMM) is used to analyze the pilot data. As a result, Person reliability is found to be quite high, but Item reliability suggested fair data. A few respondents and items were identified as misfits with distorted measurements. Some problematic questions are revised and the negative questions are considered to be reworded into positive questions.

 
 
 
Full Text 

Title:

Islamic knowledge portal: An analysis on knowledge portal requirements

Author (s):

Zaihisma Che Cob, Nor’ashikin Ali, Hidayah Sulaiman and Wan Muhammad Ilya Wan Mazuri

Abstract:

In this paper, drawing upon the literature review and empirical data, we address the importance of knowledge sharing from Islamic perspective and the relevancy of Knowledge Management (KM) for sharing knowledge of Islam. We propose Islamic Knowledge Portal as a tool to effectively manage the knowledge of Islam to be a righteous and successful Muslim. In addition, this paper reviews successful implementation of KM portal in several organizations and identifies the important functional specifications to build such system. A survey results are used to empirically investigate the knowledge requirements for Islamic Knowledge Portal, and the findings from these activities are used to identify the required knowledge content and to design the important features for Islamic Knowledge Portal.

 
 
 
Full Text 

Title:

Analytical hierarchy process (AHP) electoral college majors in Indonesia based on android mobile

Author (s):

Rizal Bahaweres, Firgiawan Indra Kusuma budiyanto and Anna Antonyová

Abstract:

The development of the Android platform on mobile devices is experiencing rapid increase in Indonesia. This confirms that the Android mobile platform is still a favorite mobile system operation for Indonesia society. Along with this, nowadays almost all high school students in Indonesia wished to continue their education to university after graduation. However, not all this prospective students know the majors or courses that suit with them. Algorithm is one of the swarm intelligence that evolves fast for almost area of optimization and engineering. To solve this problem, we suggest building an application that can calculate several possible courses relevant to students based on certain matters. Based on the DSS (Decision Support System) and using the method of AHP (Analytical Hierarchy Process) as one of the methods of expert system, this application can be calculating and displays the results in the form of courses that correspond to users that the candidate based on  ideals, interests, values, academic advice, and their financial ability. These applications are built on the mobile platform Android which is being favored by Indonesian society, and society also aims to be a practical and easy to use anywhere and anytime. Based on the results of the questionnaire, the results obtained from the application can be accepted as input to select majors at university. Based on the data obtained in the questionnaires, the most important criteria is ideals. Ideals the most attention in choosing college majors with percentage of 48.9%, followed by interest (25.2%), the value of academic (11.6%), financial (8.7%), and the nearest person advice (5.7%).

 
 
 
Full Text 

Title:

Developing a small scale cyber defense competition

Author (s):

Albert Sagala and Deni P. Lumbantoruan

Abstract:

The growth of cyber security competition increases in Indonesia, it is organized by private institutions or university level. This cyber competition will encourage students and community to increase their level of knowledge in protecting the infrastructure by cracker. However, most institution do not prepare the infrastructure as an internship for students to learn ethical hacking. So, sometimes hacking activity will make the operational disturbed. Institution need to have an isolated network as an arena for study ethical hacking. In this paper, we design a lab for making lab simulation so that red team and blue team can join together in one network. The network topology model which we provide also support scoring automatic for judging the cyber competition. This scoring system will help the white team to control and monitor the competition.

 
 
 
Full Text 

Title:

Incorporating author’s activeness in online discussion in thread retrieval model

Author (s):

Zuriati Ismail, Atefeh Heydari, Mohamadali Tavakoli and Naomie Salim

Abstract:

Online forum is one of user-generated contents available on the Internet that provides platform for knowledge sharing. However, not all messages posted can be considered of high quality and as it increases in its availability, finding quality information becomes more important and challenging. Thread retrieval model is very important in helping users to find relevance information pertaining to their topic search. As quality of post messages depends upon the author, this study aims to look at how ranking threads based on author’s activeness in a forum could improve thread retrieval task compared to non-quality based ranked list. Voting models were used to convert message level quality features into thread level features and learning to rank method to combine nine features of activeness dimension for thread scoring. Different combinations of nine features under the activeness dimension with different ranking strategies are studied and its performances also compared using normalized discounted cumulative gain (NDCG) as performance measure. 2555 models were generated and 23 models are identified as among the best model.

 
 
 
Full Text 

Title:

A new biometric template protection based on secure data hiding approach

Author (s):

Emad Taha Khalaf and Norrozila Sulaiman

Abstract:

Biometrics is a technology that has been widely used in many official and commercial identification applications. The extracted features from the biometric sample is called biometric template which is used during a biometric authentication process. The security of templates is the critical part of biometric system and one of the most crucial issues in designing a secure system. The proposed approach focused on combining data hiding and biometrics to take advantage of the benefits of both fields and develop the hiding technique to find a secure solution for protecting biometric data. We deal with dental as a first biometric source and a user's speech as a second biometric source at same time it a reliable key from a user's speech for enhanced the security of the system. Two of the popular methods are combined DWT & DCT in the proposed security system (SDHA) for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, Wavelet Transform which use Dyadic Filters to decompose cover image into 4-Levels (HH, HL, LH and LL) and Discrete Cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components. Simply the proposed hiding method are summarized by dividing the secret data into three sections according to the percentages that have been entered by a user then distribute these sections into the three chosen coefficient sets (HH, HL and LH) of the cover image which is an excellent secure locations for data hiding. The results show the efficiency of the proposed method comparing with other method that used skin tone region of images, DWT method and simple LSB method.

 
 
 
Full Text 

Title:

Information technology systems of service process innovation

Author (s):

Chupun Gowanit, Natcha Thawesaengskulthai, Peraphon Sophatsathit and Thitivadee Chaiyawat

Abstract:

The existing architecture of Information technology system in service organization is designed as a modularity structure.  However, in fact, there is a concern about information technology interdependency especially data and processes linkage of each system. It is sustain that information flow can be constructed of the requirements from different users background, knowledge ability, own interest, and in different timeframe. Even though company put high investment in advance information technology systems, but there is a lack of relation interdependency among them which can be costly and caused ineffective resource utilization. The objective of this research is to develop holistic IT systems for a service process innovation by following 5D model. We began by studying the existing IT systems, process flows in case service organizations, followed by semi-structured in-depth interview with ten project members from the three case studies. Action research is conducted by a better and simpler techniques solution as an innovative 5D model of service innovation development process in claim motor insurance which we selected the leading top ten insurance firms in Thailand. The 5D model approach provides a comprehensive process with clear direction and useful tools and techniques at each step. The new developed IT systems of claim motor insurance re-engineering project took one year and two months which yield the result of approximately 79 percent time-consuming reduction at each claim. The new IT systems ensure the competitive advantage in terms of high effective process and cost efficient for insurance firms in long-term.

 
 
 
Full Text 

Title:

Task scheduling algorithm based on particle swarm optimization (PSO) and invasive weed optimization to execute tasks in overloaded situation for preemptive system

Author (s):

Amir Hatami Hardoroudi and Suriayati Bt Chuprat

Abstract:

A number of studies have been done in order to execute all the tasks in real-time scheduler systems. However, different researcher are tried to tackle overload situation in real-time systems by using swarm algorithm. These studies have been categorized based on the various parameters which are important in real-time systems. As an instance, system cost, processor waiting time, number of tasks, balance use of system and etc. By increasing number of the task in task set, process time will be increased. In this situation, processor waiting time will be high when the number of the task increased and as result system cost is raising. To solve mentioned issue the authors proposed a task scheduler which is used PSO algorithm in order to cover deficiencies of previous studies in overloaded situation. This algorithm is suggested for preemptive tasks in uniprocessor in real-time systems. The result of the research has been shown PSO perform better while other common scheduling algorithm same as EDF and ACO are being over loaded. The authors by combine PSO and Invasive Weed Optimization (IWO) suggest a new algorithm that is called HPI algorithm which can perform better than PSO and schedule more tasks in overload situation.

 
 
 
Full Text 

Title:

Handover trigger scheme for mobile communication in high speed mobile environment

Author (s):

Azita Laily Yusof, Mohd Nasrul Affendi Abu Hurairah,Norsuzila Ya’acob, Muhammad Aiman Zainali, Mastura Rosdi and Basyirah Abu Bakar

Abstract:

High speed rail has been developed rapidly in recent years. The passengers traveled by trains demand for higher data rate and service continuity in order for them to access the Internet. The realization to provide reliable communication for the users in high speed mobility is challenging due to the frequent request for handover since the trains moving in high speed which resulting heavy overhead implementation. Since the User Equipment (UE) in trains communicates directly to the outside of the Base Station (BS), it reduced handover successful rate and hence, degraded the service quality.  This research identified the system parameters to improve handover performance in high speed railway network. Moreover, mathematical equation has been derived by integrating the information of train speed and time traveled across the cell. This research has improved handover performances by reducing the probability of drop call rate and increasing the number of handover successful rate.

 
 
 
Full Text 

Title:

An artificial neural network modeling for pipeline corrosion growth prediction

Author (s):

Mazura Mat Din, Norafida Ithnin, Azlan Md. Zain, Norhazilan Md Noor, Maheyzah Md Siraj and Rosilawati Md. Rasol

Abstract:

Corrosion defect assessment becoming a forte issue in pipeline reliability assessment to accurately predict the severity of its condition. Due to the uncertainties inherit from the pipeline inspection at present, statistical model use to model the corrosion growth apply a correctional methods to reduce the gap (means and variation) between predicted values and the actual data. This study aims to develop a time dependent corrosion growth model for oil and gas pipeline using Artificial Neural Network (ANN) as an alternative to the current method and to evaluate its applicability without enforcing data correctional methods. This model is formulated based on parameters of defect extracted from in-line inspection data (ILI) and quantified by statistical analysis. The develop model gives the prediction of the corrosion depth and length of the defect that can be used to calculate the corrosion rate or growth. The results and outcome of the present study can help pipeline operators to predict the reliability of the pipeline structure in terms of its probability of failure or lifetime estimation.

 
 
 
Full Text 

Title:

Content-based direct access methods for face recognition biometric system: State of the art

Author (s):

Iwan Pahendra, Benhard Sitohang and Saiful Akbar

Abstract:

As a biometric component, the human face has a unique information and characteristics that are invariant, so this allows the system to do a face search by utilizing the original information that is attached to the face that is unique internal characteristics of the extraction face, no longer use alphanumeric keyword to search-based face. In the conventional method, the process of searching is dominated by the use of external attributes as keywords and as a basis for classification. The use of visual attributes as a keyword is the latest method in this field. In this research a short explanation about various face recognition methods and application are given. A state of the art of content-based direct access methods for face detection is also explored. A future work on these research areas are given as a guide for other researcher to make an advanced research in the future.

 
 
 
Full Text 

Title:

Hidden indexing based on syntactical approach for direct access method

Author (s):

Iwan Pahendra, Benhard Sitohang and Saiful Akbar

Abstract:

In this paper hidden indexing techniques that can be used in a face recognition system have been developed. This technique is based on the syntactic approach uses the development of octal chain code. As an initial step, a variety of multi-dimensional image is extracted to produce the desired binary value. Then syntactic approach is used to determine the patterns produced by the binary value. Binary pattern formed is set in such a way to generate a database index to form a sequential index that can facilitate direct access method. The proposed method is expected to reduce the time of data search process. Future work, better extraction methods will be tested in this study for 3D model.

 
 
 
Full Text 

Title:

Computer security factors effects towards online usage of internet banking system

Author (s):

Mahmoud Al-Shawabkeh, Madihah Mohd Saudi and Najwa Hayaati Mohd Alwi

Abstract:

Given an apparent lack of coherence and a paucity of computer system field of studies, research imitates and demonstrates non consensus in how computer security fits into the satisfaction, success, usage, efficiency, and effectiveness of computer system field. This study is a part of research aims to extend the Technology to Performance Chain model by including and examining the Computer Security Self-Efficacy construct, as recommend by several computer system field researchers. This paper used the statistical technique structural equation modeling and the partial least squares regression for estimating causal relations between computer security self-efficacy and internet banking usage. Outcomes confirm that confidentiality and availability effects computer security self-efficacy while in turn computer security self-efficacy impacts on usage. Computer security self-efficacy also partially mediates the impact of confidentiality, integrity, and availability on usage.

 
 
 
Full Text 

Title:

A systematic analysis on worm detection in cloud based systems

Author (s):

Hasan Mahmoud Kanaker, Madihah Mohd Saudi and Mohd Fadzli Marhusin

Abstract:

An innovative breakthrough in computer science is cloud computing and involves several computers which are connected via the Internet or it is dispersed over a network. A large database, services, applications, software and resources are an integral part of this technology. It has the capability to operate a program or applications on numerous connected computers simultaneously and permits the users to enter applications and resources through a web browser or web service via the Internet anytime and anywhere. Current susceptibility in elementary technologies gravitates to expose doors for intrusions. Cloud computing offers enormous advantages such as cost reduction, dynamic virtualized resources, significant data storage and enhanced productivity. At the same time, numerous risks occur regarding security and intrusions, for example, worm can intercept cloud computing services, impair service, application or virtual in the cloud formation. Worm attacks are now more complex and resourceful making intruders more difficult to detect than previously. The motivation of this research is founded on ramifications presented by the worms.  This paper presents different intrusion detection systems affecting cloud resources and service.  Moreover, this paper illustrates how genetic algorithm can be integrated in detecting worm attacks in cloud computing more efficiently.

 
 
 
Full Text 

Title:

Information integration in electronic health information systems using service oriented architecture approach

Author (s):

Muhamad Shahbani Abu Bakar, Azman Ta’a and Kamarul Faizal Hashim

Abstract:

Health Information System (HIS) integration constitutes one of the main challenges to the developers. Although current integration technologies are up to now quite mature, we confront several problems and challenges regarding the complexity of functions and database of the HIS. The efficiency and performance are the issues for the HIS implementation that related to information integration problems. This research proposed an approach using Service Oriented Architecture (SOA) through Web Services (WS) to integrate the information used by the HIS. This study explored the problems and issues of information integration in HIS and uses the WS and SOA to improve the performance of HIS. The performance of data integration is measured to evaluate the proposed approach. Moreover, benchmark with the current approach is carried out in order to describe the efficiency of the proposed solution.

 
 
 
Full Text 

Title:

P2P file sharing app for android devices sporting IEEE 802.15.4 Zigbee radios

Author (s):

Akmal Nurhananie Abd Rahman, Mohamed Hadi Habaebi and Mahamod Ismail

Abstract:

The peer-to-peer (P2P) file sharing protocol has evolved from depending on Internet connection provided by the cellular network, to free Internet connectivity through Wi-Fi technology. On the other hand, IEEE 802.15.4 is considered as today’s one of the top growing wireless protocol. This paper introduces ZigBee technology, which falls under this standard, into the mobile P2P environment, where it involves devices with Android 4.0 (Ice Cream Sandwich), which is the lowest version of the Android platform that can be found among mobile devices. This paper integrates ZigBee into Android P2P environment and preliminary results showed that it is possible to send and receive files over ZigBee radio, yet the time taken for complete file transfer depends on the file size.

 
 
 
Full Text 

Title:

CAEMON: Cloud access execution and monitoring for Big Data analytics of sensor system

Author (s):

R.S. Ponmagal, M.P. Chitra, P. Dineshkumar,V.N. Rajavarman and G. Dhineshkumar

Abstract:

This paper aims to implement an intelligent architectural system to analyze and access the sensor data using Big Data analytics. As cloud resources enable the Wireless Sensor Networks to store and analyze their vast amount of data, Sensor Cloud is designed using Service Oriented Sensor Architecture.  Sensor Cloud acts as an enabler for Big sensor Data analytics. In the current application these three become the compelling combination. It is proposed to use the Hadoop Distributed File Systems (HDFS) concept  to store the streaming sensor data on to sensor cloud for further analysis using MapReduce technique. This paper describes a public sensor cloud delivery model through cloud data analytics for sensor services. The proposed architecture acts as a Cloud Access Execution and Monitoring environment for sensor systems  and  is able to respond to the requested sensor client applications with greater intelligence.

 
 
 
Full Text 

Title:

TACIT requirements elicitation framework

Author (s):

Bashir M. Mohamed Geblawi, Nurlida Basir and Rosalina Abdul Salam

Abstract:

Requirements engineering (RE) is an integral and fundamental part of software development life cycle (SDLC). The most cited reason for software failure is the inability to fully capture and implement the exact user requirements in a timely, operationally and financially expected manner. Requirements can be categorized into two types; explicit and tacit. Explicit requirements usually expressed clearly and well-identified requirements in which the system must perform. In contrast, tacit requirements are considered as hidden or embedded requirements that incapability of getting such may caused a software failure. The importance of tacit requirements in requirements engineering (RE) has been acknowledged widely as characteristics for developing projects in software engineering (SE). Therefore, the aim of this paper is to construct a framework for tacit requirement elicitation process. The framework is design based on the integration of the tacit knowledge elicitation process of Nonaka and Takeuchi model with the tacit requirements elicitation process.

 
 
 
Full Text 

Title:

E-WayCool: embedding IxD theory and representation concepts in teaching mathematics

Author (s):

Jasni Ahmad and Zulikha Jamaludin

Abstract:

This paper introduces the use of the theory of interaction design (IxD) and the concept of representation in shadow play, known as Wayang Kulit (WK), to teach mathematics. Drawing from the facts that there is deficient in performance of primary school children in mathematics, we proposed the e-WayCool as a means for natural developmental progress in learning the subject. For teachers, e-WayCool provides options for a different version of a digital teaching tool to support teaching mathematical operations, namely addition, subtraction, multiplication and division whereby pre-algebraic concept is being introduced via the concept of representation. Ten actors of WK are utilized in delivering the teaching modules of the operations within the range of whole numbers ranging from 1-1000. Each operation is not mutually exclusive, but bound to a specific representation concept and activity scenarios. The results are discussed in terms of the interests and effectiveness of e-WayCool as a complementary digital tool for classroom instruction and, at the same time preserving the WK, one of the Malay endangered cultural heritages.

 
 
 
Full Text 

Title:

Significance of parameters in genetic algorithm, the strengths, its limitations and challenges in image recovery

Author (s):

Samer M. Shorman and Sakinah Ali Pitchay

Abstract:

The Genetic Algorithm (GA) is becoming very attractive and suitable for solving problems where high computational performance is required. This paper describes theoretical aspects of genetic algorithms which are parameters used to get a result such as crossover, mutation, selection and fitness. Likewise, GA performs efficient search spaces to get an optimal solution. This paper also highlights several issues in which GA as a tool for recovering the image in variety domain. Generally, however this approach has some limitations, strengths and challenges that are also discussed in this paper. Findings on a simple simulation of GA are also presented.

 
 
 
Full Text 

Title:

Compound binarization for degraded document images

Author (s):

Arwa Mahmoud AL-Khatatneh, Sakinah Ali Pitchay and Musab Kasim Al-qudah

Abstract:

In this paper, we propose a new binarization method for degraded document images. Hence, the existing work is focus on finding a good global or local method in order to remove smear, strains, uneven illumination etc. We propose a new compound method that combines the advantages of both global and local thresholding methods.  Our method is applicable for various types of degradation cases and the value of factors could be determined automatically. We compare our method with five state-of-the-art degraded document images. It also has been tested over the dataset that is obtained from the recent Document Image Binarization Contest (DIBCO) 2011 and 2013 for the experiments.  Experimental results prove the effectiveness of the proposed technique compared to previous methods.

 
 
 
Full Text 

Title:

Telecardiology system for fourth generation heterogeneous wireless networks

Author (s):

Hoe Tung Yew, Yudha Aditya and Haikal Satrial

Abstract:

Telecardiology allows healthcare professionals to monitor and interpret their patients’ electrocardiography (ECG) via information and communication technologies (ICT). It improves the cardiac patient’s life quality by bridging the gap between healthcare professionals and patients. With the rapid development of ICT, telecardiology systems now can support high quality medical image and video. However, the existing telecardiology systems are relying on a single wireless network. These systems are unable to guarantee that the users will be always connected to the wireless network. Furthermore, these systems are less reliable due to poor network quality will results an interruption on telecardiology application. Thus, a telecardiology system integrated with vertical handover algorithm for Fourth Generation (4G) heterogeneous wireless networks is proposed to compensate the imperfection of existing telecardiology systems. The proposed system allows users always connected to the best quality network at anytime and anywhere in seamless manner. The simulation result shows that the proposed system outperforms the existing telecardiology systems which rely on single network in term of network quality.

 
 
 
Full Text 

Title:

A detector generating algorithm for intrusion detection inspired by artificial immune system

Author (s):

Walid Mohamed Alsharafi and Mohd Nizam Omar

Abstract:

Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection. The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and nonself discrimination in intrusion detection system (IDS). In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection. Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. This leads to detecting the real-time intrusion with less false negative.

 
 
 
Full Text 

Title:

Choosing the right threshold for cross-entropy-based stopping criteria

Author (s):

Roslina Mohamad, Harlisya Harun, Makhfudzah Mokhtar, Wan Azizun Wan Adnan, Nuzli Mohamad Anas and Kaharudin Dimyati

Abstract:

Cross-entropy (CE)-based stopping criteria for turbo iterative decoding are known to outperform fixed-iteration stopping criteria at high signal-to-noise ratios (SNRs). While CE-based stopping criteria have a range of thresholds, a high-value threshold for small frame sizes, and vice versa, should be used. It is difficult to advocate the value that can be categorized as either a small or large frame size. Moreover, thresholds may be specific for different SNRs. Hence, this paper provides a systematic analysis of threshold selection for the respective frame sizes of well-known CE-based stopping criteria. In this work, a range of thresholds was simulated for their error performance and required average number of iterations. To reduce complexity in the average iteration number, these results are thoroughly analysed and a suitable threshold for each CE-based stopping criterion in the specific SNR region is proposed.

 
 
 
Full Text 

Title:

Service level agreement performance analysis on quality of service UPE-Metro Ethernet

Author (s):

Mat Ikram Yusof, Akmarul Nizam Zainudin, Ruhani Ab Rahman and Murizah Kassim

Abstract:

A Service Level Agreement (SLA) between a service provider and its customers is an assurance to customers in fulfills the best services. Customers can get the service they pay for which obligates the service provider to achieve its service promises. Failing to meet SLAs could result in serious financial consequences for a provider and lost customers trust. This paper presents an analysis on performance of Quality of Service (QoS) SLA on a User Provider Edge –Metro Ethernet (UPE-ME) network. A QoS SLA tested method called RFC 2544 is performed on four customers in one industrial area. Actual data on four of QoS parameters which are throughput, jitter, latency and frame loss are tested by using test gear VeEX Vepal MX-120. The customers are focus to the User Provider Edge (UPE) customer. A few measurement and techniques are presented on the tested method. Analysis result on the tested throughput, jitter, latency and frame loss performance are presented based on growth of bytes. Network performance tested is identified that it is qualify as a perform network link. Performance presented results on growth of throughput with growth of frame length and latency increased with growth of frame length. Analyzed on frames loss presented that there are no errors thus this proved good quality network. Some jitters presented that they are in a low value which means that less jitter presents system with a better operation. Identifications on parameter value are presented based on an analyzed QoS using Minitab16. The produce result shows the implemented of SLA QOS UPE-ME follow the QoS and this result is a better proved for customer satisfaction and good services from the service provider.

 
 
 
Full Text 

Title:

Exploration of natural immune system for multi-agent coalition formation

Author (s):

Martina Husáková

Abstract:

Coalition formation is used for cooperation of intelligent agents in the multi-agent systems. Coalition is composed of homogeneous or heterogeneous agents able to effectively solve complex problems requiring decomposition of the task into the subtasks. Various approaches can be used for multi-agent coalition formation, e. g. game theory, dynamic programming, graph theory or genetic algorithms. Natural immune system is complex system containing compartments where processes similar to the coalition formation appear. The paper identifies actual problems in multi-agent coalition formation and investigates properties and mechanisms of natural immune system as the source of inspiration for solving some of these problems. The paper establishes next steps in the research of multi-agent coalition formation with the aid of metaphors based on the behaviour of the natural immune system and principles of artificial immune systems.

 
 
 
Full Text 

Title:

Simultaneous computation of model order and parameter estimation of a heating system based on gravitational search algorithm for autoregressive with exogenous inputs

Author (s):

Kamil Zakwan Mohd Azmi, Zuwairie Ibrahim, Dwi Pebrianti, Sophan Wahyudi Nawawi and Nor Azlina Ab Aziz

Abstract:

System identification is a class of control system engineering that determines physical functionality of a plant and represents them in the form of mathematical expression by utilizing real experimental data. It is a process of acquiring, formatting, processing, and identifying mathematical models by considering raw data from the real-world system. Once the mathematical model is chosen, it can be characterized in terms of suitable descriptions such as transfer function that can be used for controller design. Most essential stages of model identification process can be summarized into four main stages. The first stage is collecting experimental data. Then, the model order and structure are chosen. The next stage is to estimate the parameters of the model and finally, the mathematical model is validated. Model order selection and parameter estimation are two significant aspects of determining the mathematical model for system identification. In this paper, an approach termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is basically based on Gravitational Search Algorithm (GSA), is proposed to combine these two parts into a simultaneous solution. In this technique, both the model order and the parameters of the system are computed simultaneously to obtain the best mathematical model of a system. According to heating system case study, it is proven that the proposed method is outstanding in comparison with some other approaches in literature.

 
 
 
Full Text 

Title:

SLA-based content adaptation framework for optimizing QoE and energy consumption

Author (s):

Mohd Norasri Ismail, Rosziati Ibrahim, Mohd Farhan Md. Fudzee and Muhammad Hanif Jofri

Abstract:

Mobile device advancement and popularity has changed the way we consumed web content. However, the heterogeneity properties of mobile devices, subscribed network as well as its users lead to mismatch problem. The content adaptation system is the most viable solution for this issue. Most previous works in ADTE adapt the MPEG-21 Digital Item Adaptation (DIA) specification. However, only few works on optimizing energy consumption as well as quality of experience as a vision in Universal Multimedia Experience (UME). This paper proposes a framework of an adaptation decision-taking engine based on Service Level Agreement (SLA) and uses MPEG-21 Digital Item Adaptation specification. The SLA mechanism is integrated in this framework to enable more flexible decision-making process in the content adaptation system. This flexibility will support optimum QoE based on device current property status.

 
 
 
Full Text 

Title:

Information security strategy on mobile device based eGovernment

Author (s):

Tri Kuntoro Priyambodo and Yudi Prayudi

Abstract:

Mobile devices today are an important equipment to support daily activities. Nowadays, people generally tend to use mobile devices as it has several advantages, namely: universality, usability, high efficiency, economy and individuation. Mobile devices will become a major channel for eGovernment implementation in the future. In line with the increasing number of information presented as well as the services offered by the government, the greater the challenges of information security are. The exchange of information that happens should be supported by a good security mechanism. However, when discussing on security issues, the opposite matters are matters related to convenience. This paper discusses some aspects of eGovernment as well as solutions to the challenges of information security issues when implementing a mobile device as a communication channel. There are four things that are offered as a solution to information security strategy to keep a balance between security and convenience, namely: selection of data and services, the appropriate policy, adoption of technology and the human education aspect.

 
 
 
Full Text 

Title:

An analysis of D-Band Gunn diode for millimeter wave application

Author (s):

Zaffrul Zulkarnain Aziz Masuaud, Mohd Azlishah Othman, Nadhirah Ali, Hamzah Asyrani Sulaiman and Mohamad Zoinol Abidin Abd. Aziz

Abstract:

A planar InP-based Gunn diode is designed for millimeter wave application. The SILVACO TCAD tool is utilized to   generate the structure and I-V characteristic of Gunn diode. The design specification mainly focuses on varying the diameter of cathode area in three different values which are 0.8um, 1.0um and 1.2um. It can be seen that the threshold voltage and current display their powerful dependences on the 0.8um diameter of cathode area. The threshold voltage precisely at 7V alongside the current value is approximate 1.6A. In this paper, the diameter of cathode area is optimized. The results greatly propose that lower cost and high reliable InP planar Gunn diode can be utilized as single chip terahertz sources.

 
 
 
Full Text 

Title:

2 km ground control range for UAV in disaster recovery

Author (s):

Duddy Soegiarto, Simon Siregar and Nina Hendrarini

Abstract:

Natural disasters are natural events that cannot be predicted. Each occurrence of natural disasters will cause damage can even eliminate human lives. The success of the recovery process and help victims of natural disasters (disaster recovery) depends on the accuracy of the information condition affected area. Currently has developed several technology tools that can provide information and direct assistance to victims of natural disasters, one of which is the Unmanned Aerial Vehicle (UAV). UAV is an aircraft type that has the ability to fly without a crew and pilots, process control is done directly by the operator or automatically by the device that has been standardized. So that UAVs can be applied for monitoring and search and rescue operations or special use in the military. Distance is one of the obstacles using UAVs, because when the magnitude of the distance exceeds the ability of the central control system will cause the UAV control process cannot be performed due to the loss of data communications. In this study, will be developed a control system for a UAV which has the capability of data communication up to 2 km. The process of research is concerned with the optimization of the ground control station consisting of the antenna and the transceiver system and the development of the type of UAV that will be used.

 
 
 
Full Text 

Title:

Literature review of battery-powered and solar-powered wireless sensor node

Author (s):

A.T.I. Fayeez, V.R. Gannapathy, Ida S. Md Isa, M.K. Nor and N.L. Azyze

Abstract:

Nowadays, sensor node networks are designed and increasingly used in various fields and sectors, such as in military (examples Battlefield surveillance, nuclear, biological and chemical attack detection and reconnaissance), in health (examples Tele-monitoring of human physiological data, monitoring patients and doctors inside a hospital), in environment (examples Forest fire detection, flood detection) and in other various applications. However, the power sources and supply of the nodes remains as challenge. Therefore, energy conservation plays an important role for this network. Usually the battery powered is used as power sources for sensor nodes, but energy harvesting offers an alternative, although it not able to avoid from the problem. In this paper, an analysis is performed to compares the use of batteries powered against solar cells powered. The basic parameter and characteristic for both of power supplies are studied in terms of capacity or volume, low self-discharge, shorter recharge time, energy density and power efficiency to generate power for the sensor nodes, the lower cost and also in terms of characteristics such as size and weight.

 
 
 
Full Text 

Title:

Investigation on the impedance modeling of combination circle for frequency selective surface

Author (s):

Noor Azamiah Md Fauzi, Mohamad Zoinol Abidin Abd Aziz, Maizatul Alice Meor Said,  Mohd Azlishah Othman, Badrul Hisham Ahmad, Hamzah Asyarani, Mohamad Kadim Suaidi and Mohd Fareq Abd Malek

Abstract:

This paper presents the investigation of a unit cell for combination of circle frequency selective surface (FSS). Two types of configuration for the simulation has been investigated and analyzed. The investigation has been done on the radius of circle FSS (a) and the spacing between the first and another circle (b) in order to analyze its effects towards the resistance and reactance of the circuit. The impedance mathematical modeling of the design FSS in terms of, resistance and reactance have been formulated from parameters a, b, c and d.  This model can be used to design the FSS at the ISM band application.  The bandwidth of the first configuration is 158.27 MHz which covered the frequency range from 2.3261 GHz until 2.4843 GHz. Meanwhile, the bandwidth for the second configuration is 297.17 MHz which covered the frequency range from 2.1515 GHz until 2.4486 GHz.

 
 
 
Full Text 

Title:

Investigation of SRR parameters on monopole antenna performance

Author (s):

T. K. Ong, B. H. Ahmad, M. Z. A. Abd. Aziz, M. A. Othman, M. K. Suaidi, H.A. Sulaiman and F. Abd. Malek

Abstract:

This paper presents an investigation of split ring resonator (SRR) parameters on a coaxial-fed monopole antenna. The adding of SRR slot can create a notch in the result of coaxial-fed monopole antenna design. Thus, this paper aims to investigate the effect of changes to the outer ring radius and slit cut width of the SRR slot. All antenna designs and simulations involved are drawn and simulated in Computer Simulation Technology (CST) Studio Suite software in an open space environment to prevent any interference within simulation range. The antenna design is printed on a FR4 epoxy board with dielectric constant, εr of 4.4, tangent loss, tan δ of 0.019, and thickness, h of 1.6mm. In the investigation, outer ring radius of SRR slot has been increased from 4mm to 10mm whereas the slit cut width of SRR slot has been increased from 1mm to 8mm. The result shows that the increment of outer ring radius can shift the notch and frequency band to lower frequency. In a contrary, the widening of slit cut width of SRR slot is able to shift the notch and frequency band back to higher frequency. These two characteristics can contribute to wideband or ultra wideband system to provide frequency tunable notch function.

 
 
 
Full Text 

Title:

Multiband planar printed monopole antenna with defected reflector for wireless communication system

Author (s):

Mohamad Hafize Ramli, Mohamad Zoinol Abidin Abd Aziz, Abdul Halim Dahalan, Mohd Azlishah Othman and Hamzah Asyarani

Abstract:

In this paper, a multi-band planar printed monopole antenna with defected reflector for wireless communication system is presented. The antenna has been designed based on meander lines monopole printed elements and the rectangular ground structure with defected reflector above the proposed antenna. The each element of meander lines is designed with a half wavelength to radiate at a frequency of 3.6 and 5.8 GHz for Wireless Local Area Network (WLAN) application. The 50 ohm probe feed SMA type is used to feed the signal into the antenna structure. The proposed antenna is designed and simulated by using Computer Simulation Technology (CST) software. The antenna performance is analyzed in term of the return loss, bandwidth, gain, directivity, and radiation pattern at the design frequency. The bandwidth of reflection coefficient which are less than – 10 dB can be seen at (305 and 125) MHz, (248 and 359) MHz and (267 and 197) MHz for 2.4, 3.6 and 5.8 GHz for with/out defected reflector. The additional defected reflector helps to improve the return loss, bandwidth, gain and directivity.

 
 
 
Full Text 

Title:

Review on narrow phase collision detection system in virtual environment

Author (s):

Hamzah Asyrani Bin Sulaiman, Mohd Azlishah Othman, Mohamad Zoinol Abidin Abd and Aziz Abdullah Bade

Abstract:

Collision detection is one of the most important tools that has been used widely in animation and simulation especially in computer games and medical simulation purpose. One of the critical issues in collision detection system is to actually prepare what kind of technique that is suitable for virtual environment to adapt collision detection system installed. Hence, this research paper described a detailed review on collision detection algorithm mainly in narrow phase collision detection phase.

 
 
 
Full Text 

Title:

Implementation of axis-aligned bounding box for OpenGL 3D virtual environment

Author (s):

Hamzah Asyrani Bin Sulaiman, Mohd Azlishah Othman, Mohamad Zoinol Abidin Abd and Aziz Abdullah Bade

Abstract:

This paper describes a simple and straight forward implementation of Axis-Aligned Bounding-Box (AABB) for OpenGL 3-Dimensional (3D) virtual environment for games and simulation purpose. The implementation of AABB is conducted in OpenGL graphic library version 1.2 with C++ programming language by using Visual C++. The implementation could help young and beginner computer graphics student to master the implementation of basic Bounding-Volume (BV) for collision detection and other fields with related to the Axis-Aligned Bounding-Box (AABB).

 
 
 
Full Text 

Title:

Solar cloth using TiO2 nanostructures based dye sensitized solar cell technique

Author (s):

Noor Faridah Amat, Mohd Azlishah Othman, Badrul Hisham Ahmad and Jose Rajan

Abstract:

Titanium dioxide (TiO2) nanostructures have been synthesized via hydrothermal method by manipulating some parameters to determine which condition show better performance.  In general, TiO2 Degussa, P25 dissolve in alkaline solution. The solution was mixed by stirring for 15-30 minutes and put into Teflon sealed into an autoclave stainless steel tank and put in an oven without shaking or stirring during heating. After that, the autoclave is cooled at room temperature, the obtained sample was stirred with dilute hydrochloric acid (HCl) aqueous solution for 24 hour and then the sample was washed by using deionized water for several times until the pH values decreased. TiO2 nanostructures act as network in solar cloth to perform the movement of electron in the device to generate electricity. Solar cloth is describe as non-woven fiber cloth in which a dye-anchored wide band gap semiconductor, which is the electron conductor forms a percolating network in polymeric medium. Because of principles in dye sensitized solar cell is same as solar cloth where dye sensitized solar cell consists of dye-anchored metal oxide in the presence of electrolyte and two conducting glass plates (such as fluorine-doped indium tin oxide (FTO)). Dye sensitized solar cell (DSSC) will be used TiO2 nanostructures to fabricate the device. Moreover, the electrical conductivity of TiO2 nanostructures in the present of polymeric medium will be measured.

 
 
 
Full Text 

Title:

3.5GHz of ice cream cone with bow tie antenna for microwave imaging application

Author (s):

Khairussakinah Nordin, Nadhirah Ali, Mohd Azlishah Othman, Mohamad Zoinol Abidin  Abd. Aziz and Hamzah Asyrani Sulaiman

Abstract:

The objectives of this paper are to design, simulate, fabricate and examine Ice Cream Cone with Bow Tie Antenna for microwave imaging application. This antenna is designed for frequency 3.5GHz and simulated using CST Microwave Studio Simulation. The antenna was fabricated on FR4 substrate with relative permittivity of dielectric constant (Ɛr), 4.6.  The result of return loss, bandwidth, gain, directivity and radiation pattern are discussed in this paper. To achieve the best antenna performance, the return loss must below than -10dB and gain at 3dB.  Ice Cream Cone with Bow Tie antenna is one of the designs for microwave imaging application in the span of breast cancer imaging.

 
 
 
Full Text 

Title:

An analysis of d band Schottky Diode for millimeter wave application

Author (s):

Nur Hazirah Binti Jamil, Nadhirah Ali, Mohd Azlishah Othman, Mohamad Zoinol Abidin  Abd. Aziz and Hamzah Asyrani Sulaiman

Abstract:

A Schottky Diode for millimeter wave application proposed in this paper. The proposed model includes the n-well thickness as a variable to explain the operational behavior of a planar Schottky Barrier Diode which is firstly introduced in this paper. This paper shows the differentiation the length of the n-well thickness with three lengths which are 1.6 µm, 1.4 µm and 1.2µm. Then, the size of the Schottky Diode becomes too small with dimension 2.0µm x 2.0µm. The suitable materials that used in this diode are silicon where it has a more advantages than other materials. The Schottky Diode was designed by using the Silvaco TCAD tools software whereas it’s also produced the IV and CV Characteristics graph. Both graphs were analyzed after the three comparison the length of the n-well thickness was specified the values.

 
 
 
Full Text 

Title:

Microwave imaging technique using UWB signal for breast cancer detection

Author (s):

Siti Hasmah binti Mohd Salleh, Mohd Azlishah Othman, Nadhirah Ali, Hamzah Asyrani Sulaiman, Mohamad Harris Misran and Mohamad Zoinol Abidin Abd. Aziz

Abstract:

Microwave Imaging modalities used for breast cancer detection currently are not sufficient for society’s need.  The key features for microwaves technique for tumor detection by the observation at microwaves frequencies, the dielectric contrast of permittivity and conductivity between normal and malignant tissues. This project focuses on the experimental of reflection coefficient in complex frequency domain obtained using vector network analyzer transform into time domain using Inverse Fast Fourier Transform (IFFT). Breast phantom is illuminating from various points with short UWB microwave pulse generated by RF Horn antenna with frequency of 1GHz -10GHz and the collected backscattered energy is being analyzed and simulated using Microwave imaging algorithms to identify the presence and localization of the tumors. The experiment represent medium form by a rectangular shape of container filled with oil and small size of 3cm stone as a reflected target that represent as a malignant tissues in the breast sample.

 
 
 
Full Text 

Title:

A concept of assistive courseware for hearing-impaired learners

Author (s):

Ariffin Abdul Mutalib, Sobihatun Nur Ab Salam, Massudi Mahmuddin,  Mazida Ahmad and Syarifah Nadia Syed Yahya

Abstract:

This paper reports on an initiative that develops a concept of teaching and learning material for hearing-impaired learners in higher learning institutions.  It describes the needs for the concept.  The aim of the paper is to describe about the concept that is developed through User-centered Design approach.  It involves observation and interview in three seminars in gathering the components of the concept.  In the three seminars, users who are the hearing-impaired learners and their teachers were involved very closely.  In the end, the concept has been derived and evaluated.  The evaluation further reveal that the concept has been well-accepted by the users.

 
 
 
Full Text 

Title:

An efficient analytical method for vibration problems

Author (s):

H. Jodeiri and V. Imani Haddadan

Abstract:

In this paper, we implement a new analytical technique, variational iteration method for solving the some vibration problems. The variational iteration algorithm leads to analytical solutions in the present study. The results show that the present method can be easily extended to other nonlinear oscillations and it can be predicted that variational iteration method can be found widely applicable in engineering and physics.

 
 
 
Full Text 

Title:

Seismic investigations of lake Chebarkul in the process of searching Chelyabinsk meteorite

Author (s):

P. S. Krylov, D. K. Nourgaliev and P. G. Yasonov

Abstract:

High-resolution seismic investigations of Lake Chebarkul bottom was carried out in the place of meteoric fall of the biggest part of “Chelyabinsk” meteorite. The disturbance of stratification and degassing zone on seismic sections passing through the coordinates of the ice hole was found on the proposed meteorite location.

 
 
 
Full Text 

Title:

Analysis of defected ground structure notched monopole antenna

Author (s):

B. T. P. Madhav, A. Manikanta Prasanth and Sreeramineni Prasanth

Abstract:

A compact defected ground structure curved wideband monopole antenna and notched monopole antenna are designed and presented in this paper. In the basic cured monopole antenna wide band characteristics are obtained and in the case of notched monopole antenna, some frequency bands are cut- off in the wide band operation. The band notched characteristic involved the WLAN operating band. The curved monopole antenna with defected ground structure is operating in a wide bandwidth of 16 GHz. The designed antennas are showing impedance band width more than 140% with VSWR less than 2 in the desired band.

 
 
 
Full Text 

Title:

Optimization of airport parking facilities size, location and connection

Author (s):

Luca Mantecchini

Abstract:

In this paper, a decision making tool for the optimization of size and location of airport parking facilities is present. The model is developed by considering travellers’ socioeconomic characteristics, demand variability and supply costs. After a review of the literature focused on parking space allocation, parking location choice and influence of operating costs, a mathematical model is applied for determining the optimum size, location, connection and fee of an airport parking facility.

 
 
 
Full Text 

Title:

Comparative analysis of topology control algorithms to enhance network lifetime

Author (s):

Manisha Bhende and Sanjeev Wagh

Abstract:

Topology issues have received more and more attentions in Wireless Sensor Networks (WSN). WSN applications are normally optimized by the given underlying network topology. Topology control is an effective method to improve the energy efficiency of wireless sensor networks. Due to the severe resource limitations of the sensor nodes (e.g., small battery, limited computation capabilities, inexpensive transceiver etc.), Lifetime extension is one of the most critical research issues in the area of wireless sensor networks. One of the key approaches for prolonging the sensor network operable lifetime is to deploy an effective topology control protocol. In this survey paper, we provide a full view of the studies in the area of topology control in Wireless sensor network. By summarizing previous achievements and analyzing existed issues, we also point out challenges and research directions for future work.

 
 
 
Full Text 

Title:

Effect of high CO2 content on formation damage of oil fields: A field case in a south western Colombian field

Author (s):

Jairo Antonio Sepulveda, Carmen Pizon-Torres, Jose Miguel Galindo, Carolina Charry and Jorge Ivan Chavarro

Abstract:

Such factors as fines migration, mud invasion, high gas phase saturation, organic and inorganic deposition and bacterial growing are among the causes of formation damage. Reservoirs with high CO2 content present a particular thermodynamic behavior leading to increase formation damage by both organic and inorganic deposition. This work deals with a field case in a Colombian field in which CO2 content is very high. CO2 content increases asphaltene destabilization and alters wettability which leads to a severe reduction of the near-wellbore permeability causing a tremendous loss of the well potential. A thermodynamic evaluation of fluid samples coming from this reservoir was analyzed and results for a single well are presented.

 
 
 
Full Text 

Title:

Cascade heat pump dryer performance improvement using a solar collector

Author (s):

I. S. Hwang and Y. L. Lee

Abstract:

Heat pump cycles are used in heating, drying, and other applications, and have recently seen greater use in the drying of clothes and food stuffs. Driers using the heat pump cycle are limited in that their performance changes in environments with a low ambient temperature such as winter. Researchers are working to resolve this downside, and the most prevalent solution is to use additional heat sources, such as solar, geothermal, and recovered heat. This paper implemented the cascade cycle with solar radiation as an additional external heat source, and conducted performance analyses of the drier at different ambient temperatures. Results indicated that when a cascade cycle combined with a solar collector is used, operational performance at low temperatures is greatly improved.

 
 
 
Full Text 

Title:

Sustainability analysis of conventional and eco-friendly materials: A step towards green building

Author (s):

Bakhoum E. S., Garas G. L. and Allam M. E.

Abstract:

In the construction industry, selection of sustainable structural materials during the design phase leads to move towards more sustainable construction. Therefore, there is a need to select more green building materials to be used in construction. Based on the promising vision of future needs for sustainable development this paper presents a comparative study between conventional and eco-friendly building materials using sustainability measures. A prototype of two storeys was constructed using eco- friendly building materials (integrated bricks, rice straw bales, M2 system, plain concrete, and Rockwool sandwich panels). A sustainable decision support system (SDSS) was used to compare between the structural building materials of the two structural systems. The results showed that the eco-friendly system had better sustainability rank (67%) than the conventional system (56%). In addition, the results of SDSS showed that the Eco-friendly system was better than the conventional system during the three phases of total life cycle assessment (manufacturing, construction and demolition) by 11%, 0.5% and 9%, respectively.

 
 
 
Full Text 

Title:

Re-refining and recycling of used lubricating oil: An option for foreign exchange and natural resource conservation in Ghana

Author (s):

Henry Mensah-Brown

Abstract:

The paper reviews the re-refining of used automotive engine lubricating oils to obtain lube stock with the right characteristics and additives’ response suitable for blending automotive engine lubricating oil. The caustic treatment and subsequent vacuum distillation method for re-refining of used automotive gasoline engine lubricating oils was used in this investigation. A lube stock with the appropriate properties and characteristics including additive response for the formulation of SAE 40 grade lubricating oil suitable for an automotive gasoline engine was obtained from a blend of re-refined used lubricating oil and virgin bright lube stock in
the ratio 3:1. The lube stock had a viscosity index (VI) of 105.

 
 
 
Full Text 

Title:

Threshold results of a host-mortal commensal ecosystem with a constant harvesting of the commensal species

Author (s):

N. Seshagiri Rao, K. V. L. N. Acharyulu and K. Kalyani

Abstract:

This paper focuses on phase plane diagrams for two species ecological model comprising a mortal commensal and the host species with a constant harvesting of the commensal species. This model is characterized by a couple of first order non-linear ordinary differential equations. The possible three existing equilibrium points of the system are identified and the nature of the ecological interaction between the species is discussed based on the equilibrium points of the model equations through the phase plane diagrams for specific values to the parameters in the model equations.

 
 
 
Full Text 

Title:

Comparative analysis of stress and strain distribution in artificial knee implant and human knee joint

Author (s):

R. B. Durairaj and A. Krishnamoorthy

Abstract:

Knee joint is a hinge joint which posses six degrees of freedom and withstand entire load of the human body. In Recent statistics Knee replacement surgery has been increased for the major issues like Bone cancer, Bone damage etc. The TKP involves the replacement of damaged or defected knee joint and replaced with artificial implant. In general artificial implant is made up of bio-compatible materials such as Titanium alloys which are restricted in their motion (2-3 Degrees) when compared to human knee joint. In this work it is discussed about the comparative study of stress and strain distribution of artificial knee implant with human knee joint. The CT scan image of human knee joint has taken for this work and converted in to 3D model using MIMICS software and analysed at various loading conditions such as 300, 500, 700 and 900N.

 
 
 
Full Text 

Title:

Analytical expressions for heat transfer and entropy generation in a pipe flow using homotopy analysis method

Author (s):

V. Ananthaswamy and L. Sahaya Amalraj

Abstract:

This paper demonstrates the effect of convective cooling on a temperature dependent viscosity liquid flowing steadily through a cylindrical pipe. In this model, it is assumed that due to Newton’s cooling law heat is exchanged with the ambient and the viscosity model varies as an inverse linear function of temperature. The analytical expressions for fluid velocity and temperature are derived using Homotopy Analysis method and entropy generation rate, total entropy generated and the Bejan number for various parametric values are determined. Our results are compared with the previous work and found to be in good agreement.

 
 
 
Full Text 

Title:

Performance analysis of heterogeneous networks using coalitional games

Author (s):

Rajesh L. and Bhoopathy Bagan K.

Abstract:

A network which is best suited for a user in a heterogeneous wireless environment is selected by using a Game Theory technique. A statistical game theoretical model is developed by positioning the users randomly, setting-up the base stations of WiMAX and 3G as per standards of ITU and defining the Grade of Service (GoS) for each type of network respectively. Several parameters such as Received signal strength (RSS), Reputation factor, Energy utility, Cost utility and Mobility support are considered. With these parameters the Utility function payoffs are estimated for all the users. With the calculated Payoffs, an algorithm is designed for a best network selection by implementing Coalitional Game Theory principles. Performance estimation is done to demonstrate the Game Theory principles stand and compare with conventional network selection schemes.

 
 
 
Full Text 

Title:

A new approach for energy recovery and turbocompounding systems for high altitude flight with common rail diesel engines

Author (s):

Luca Piancastellia and Leonardo Frizzieroa

Abstract:

This paper introduces an original method for the preliminary calculations and the turbomatching of a dual stage high altitude turbocompounding system. This method is conceived to use modified automotive commercial turbochargers along with electric motor/generators. The method used is innovative and uses only the data commonly available from the manufacturer. In the example described herein, full power and throttle control are achieved up to 10, 000m (32, 000ft). The engine is a Common Rail Direct Injection Diesel engine derived from the automotive market. The calculation method and the problems connected are widely discussed. For this application turbocompunding is a good option that partially compensates the unavoidable increase in TOW (Take Off Weight). In drones that have relatively large batteries, the ERS (Energy Recovery System) does not increase the air vehicle mass.

 
 
 
Full Text 

Title:

A novel compact CPW FED slot antenna with EBG structure

Author (s):

M. S. S. S. Srinivas, T. V. Ramakrishna, B. T. P. Madhav, N. Bhagyalakshmi, S. Madhavi, K. Venkateswarulu

Abstract:

A compact CPW fed antenna is designed for the dual band operation. Here electromagnetic band gap structures of rectangle-shaped lattices are placed for the harmonic suppression. We observed that EBG structures are not only exhibiting the band stop characteristics, but also help to magnify the proposed antenna bandwidth. The rectangular lattice like EBG’s have a frequency band gap and high surface impedance characteristics, which generally represent as in-phase reflection band. We succeeded in integrating the rectangular lattice EBG’s in compact slot antenna with a CPW feeding line, to decrease the surface wave losses and bandwidth enhancement. The complete antenna analysis with radiation characteristics are presented in the current study.

 
 
 
Full Text 

Title:

Hard handover optimization using time window based handover algorithm

Author (s):

Nagy F. Merghani, Rania A. Mokhtar, Raed A. Alsaqour and Rashid A. Saeed

Abstract:

This paper shows and solves a handover problem occurring with current power control mechanisms in co-channel Wideband Code Division Multiple Access (WCDMA) heterogeneous networks. The problem is the mismatch between the required uplink transmits power when a user is communicating to a small cell and an underlying microcellular base-station. This paper introduces Time Window Handover (TWHO) algorithm to adapt the transmit power of the small cell users during the handover regime to prevent such Signal to Interference plus Noise Ratio (SINR) drops.

 
 
 
Full Text 

Title:

Design and implementation of a fuzzy control system of relative humidity and temperature for a neonatal intensive care incubator

Author (s):

A. Soto Otálora, L.A. Guzmán Trujillo and J. D. Suarez Losada

Abstract:

This project involves in the design and implementation of two fuzzy logic controllers developed in a to a high performance microcontroller MSP430 series made by Texas Instruments. The whole system is able to monitor the status of two critical variables in the first days after birth of the preterm baby, temperature and canopy relative humidity through a remote server system in a software application designed on LabVIEW and communicated with the system wirelessly via XBee devices which use the IEEE 802.15.4 standard also known asZigBee protocol. The application developed in LabVIEW allows the storage of information in a database in MySQL. The equipment is equipped with an alarm module which works with both visual and sound alerts to avoid over heating or power supply malfunction.

 
 
 
Full Text 

Title:

Power transfer enhancement of existing EHVAC transmission line with HVDC conversion- Indian scenario

Author (s):

M. Raju and N.P. Subramaniam

Abstract:

This paper analyses the feasibility of converting the existing 400kV and 765 kV Double circuit AC Transmission line available in Indian scenario to HVDC line without altering the tower structure, line insulators and conductors. It has been observed that though line losses are more in HVDC system compared to AC Transmission line, there has been substantial increase in Net power transfer capability i.e. 2.84 times and 2.75 times increase in power transfer with +/-200kV HVDC and +/-400kV HVDC configuration respectively by using the existing conductors close to their thermal limits. Moreover, the benefits of all the advantages of HVDC are obtained by adapting this conversion.

 
 
 
Full Text 

Title:

A grid of material and immaterial laboratories for a sustainable transportation system: The RE.S.E.T. project in Sicily

Author (s):

Marco Guerrieri, Maria La Gennusa, Barbara Lo Casto, Gianfranco Rizzo

Abstract:

Transportation is a crucial sector, to be suitably approached in order of getting human activities in more environmentally sustainable paths. In fact, in developing, as well in less developing, countries people and freights mobility are responsible of important amount of pollutant emissions and are cause of significant levels of energy consumptions. In this paper, a Sicilian regional project is presented, aiming at establishing an interconnected grid of material and immaterial laboratories. These laboratories, that are devoted at inducing more virtuous behaviors in the transportation policies, are constituted by equipment and software tools, mainly located in the region’s universities, acting as monitoring and simulation stations. After a description of the structure of the grid, first results of the laboratories activity are provided, along with an estimation of the expected improvement in the environmental and energy efficiency of the transportation sector in Sicily.

 
 
 
Full Text 

Title:

Transient analysis of elevated intze water tank-fluid-soil system

Author (s):

Neeraj Tiwari and M.S. Hora

Abstract:

The conventional analysis (non-interaction analysis) of over head water tank assumes that columns rest on unyielding supports. In reality, the structure is supported by deformable soil strata which deforms unevenly under the action of loads and hence causes redistribution of forces in the components of overhead water tank. In the present work, 3-D interaction analysis of intze type water tank-fluid-layered soil system is carried out using ANSYS software to evaluate the principal stresses in different parts of the tank and supporting layered soil mass. The resultant deflections, Von-mises stress, neural frequency of the tank are calculated and also evaluate acceleration by Transient analysis under different filling conditions of the intze tank. The intze tank, supporting frame, foundation and soil mass are considered to act as single compatible structural unit for more realistic analysis. The tank, foundation and soil are considered to be follow linear stress-strain relationship. The natural frequency of the tank is evaluated for different filling conditions and comparison is made between the non-interaction and interaction analyses.

 
 
 
Full Text 

Title:

A review on various data security issues in cloud computing environment and its solutions

Author (s):

Balasubramanian V. and Mala T.

Abstract:

Cloud Computing is a relatively new computing model that provides on demand business and IT services over the Internet. One of the main concerns in adapting Cloud Computing is its security. When outsourcing the data and business application to a third party cloud causes the security and privacy issues critical. Cloud service users need to understand the risk of data breaches in the cloud environment. In this paper, a survey of the various cloud computing models, different security risks that affects the cloud environment in the area of confidentiality, integrity and computing on data is thoroughly investigated. This paper also provides the solutions for the different security issues due to the cloud service delivery models.

 
 
 
Full Text 

Title:

Anthropometric data for Tanzania’s primary school furniture design

Author (s):

Kafuku John and Ademola James Adeyemi

Abstract:

Lack of anthropometric data has been reported to be primarily responsible for furniture mismatch, which has resulted in the high prevalence of musculoskeletal disorders among schoolchildren. This study is aimed at determining appropriate anthropometry dimensions that can be used in school furniture manufacturing for Tanzania’s children. Anthropometric data from 12 body regions; which includes stature height, body weight, shoulder breadth, popliteal height, reaching (overhead) height, eye height, elbow height, hip breadth, arm length, thigh thickness, buttock-popliteal length and buttock-knee length; were collected from 468 children, comprising 236 boys and 232 girls. Percentile distributions of these dimensions, grouped into four age groups, 6- to 8-, 9- to 11-, 12- to 14- and 15- to 17-year-olds were presented. However, there was no significant difference in these dimensions between boys and girls, except among the 9-11-year-olds. The results from this study will provide design inputs to help furniture manufacturers to provide well fitted furniture for Tanzania’s schoolchildren because it is suitable for both genders and for children from both rural and urban centers.

 
 
 
Full Text 

Title:

Kinetic evaluation of Pd alumina supported catalyst for the reaction of oxidative dehydrogenation of propane

Author (s):

Hugo Zea and LM Carballo

Abstract:

Monometallic catalysts of Pd supported on gamma-Al2O3 were prepared using wet impregnation, pretreated under oxidative conditions and tested for catalytic activity for the reaction of oxidative dehydrogenation of propane (ODHP). Propane conversion and selectivity to propylene on Pd supported catalyst was evaluated as function of feed ratio (W/Feed C3H8), ratio of oxygen/propane (U) and temperature, showed a strong effect of the oxygen/propane ratio both on conversion and selectivity. Higher concentration of oxygen in the reactor feed increases propane conversion, but reduces propylene selectivity; the best performance of selectivity as a function of the ratio of oxygen/propane (U) was at the stoichiometric condition (U=1). Propane conversion increases as the feed ratio (W/Feed C3H8) increases, on the contrary propylene selectivity decreases as the feed ratio (W/Feed C3H8) increases; both behaviors are properly adjusted by a Simplified Eley-Rideal (SEM) mechanism.

 
 
 
Full Text 

Title:

Microstrip filter design techniques: An overview

Author (s):

B. H. Ahmad, M. H. Mazlan, M. N. Husain, Z. Zakaria and N. A. Shairi

Abstract:

In this paper, two common techniques indesigning microstrip microwave filterwere reviewed which areperiodic and non-periodic microstrip line perturbation techniques and matched filter. This technique are widely used in RF microstrip designs such asPhotonic Band Gap (PBG), Defected Ground Structure (DGS), Defected Microstrip Structure (DMS), Ground Plane Aperture (GPA), Electromagnetic Band Gap (EBG), high-impedance surface (HIPs), and uniplanar compact photonic bandgap (UC-PBG), distorted UC-PBG (DUC-PBG), dual-mode ring resonator, and Multi-Band Matched Bandstop Filter Design.

 
 
 
Full Text 

Title:

Fault tolerant control design with acceptable performance degradation

Author (s):

S. Kanthalakshmi, M. Raghapriya and R. Latha

Abstract:

The main objective of this work is to design a fault tolerant control approach using multiple model technique and with acceptable performance degradation due to faults in actuators, sensors and system dynamics. The achievable performance under various component failures is represented in the form of reference models, known as acceptable performance reference models. These models are used to synthesize a set of controllers. Under a specific fault condition, proper controller is reconfigured and revised command inputs are selected automatically to achieve desired performance. The aircraft model is chosen to demonstrate the effectiveness of the model.

 
 
 
Full Text 

Title:

Pressure and pressure derivative analysis for naturally-fractured fractal reservoirs

Author (s):

Freddy Humberto Escobar, Lorena Lopez-Morales, Karen Tatiana Gomez

Abstract:

Naturally fractured reservoirs have received considerable attention in the recent decades since more than half of the world oil reserves are found in this type of deposits; then, it is becoming fundamental a good characterization of these reservoirs and their understanding for having a better success in their exploitation and management. Generally, as originally proposed by Warren and Root, naturally-fractured formations are represented by a two scale model: a fracture network and a matrix. This modeling assumes that the fracture network is equivalent to a homogeneous medium fixed into an Euclidean geometry. However, it has been shown that the fracture networks are fractal elements which must be seen as alternative wiews for reservoirs with multiple scales and a network of non-Euclidean fractures. Fractal geometry is a good candidate for representing such systems. Several models and solutions based on the transient-pressure behavior have been presented in the literature with which were found that the change in pressure is a function of a power-law relationship where the exponent is related to the fractal dimension. In this work, direct expressions were developed from observing characteristic features on the pressure derivative log-log plot, so fracture permeability, fractal dimension conductivity index, flow capacity and storativity ratio can be estimated. The equations were successfully tested with synthetic examples.

 
 
 
Full Text 

Title:

Investigation on voltage multiplier cells for high step-up conversion

Author (s):

Anoop. K. J and V. Rajini

Abstract:

The demand of high gain dc-dc converter is increasing as there is a need to utilize the power output from the low voltage sources such as PV, fuel cell. The high gain converters boost the low input voltage to high output voltage. In this paper a dc-dc converter with Cockcroft-Walton voltage multiplier cells is proposed to obtain high voltage gain. The voltage multiplier cells are made up of diodes and capacitors. They are used to develop a high static gain dc-dc converter with high efficiency.

 
 
 
Full Text 

Title:

Improvement of power system stability using D-facts controllers: A review

Author (s):

P. Sivachandran, T. Hariharan and R. Pushpavathy

Abstract:

As the power demand has been increasing rapidly, power generation and transmission are being affected due to limited resources, environmental restrictions and other losses. Transient stability control plays a vital role in maintaining the steady state operation of power system in the event of huge disturbance, faults and any extinction of power generation. Flexible AC Transmission System (FACTS) controllers were mainly used for solving various power system control problems. This paper presents the study of various FACTS devices and their effects on power system for stability enhancement.

 
 
 
Full Text 

Title:

Interaction analysis of intze tank-fluid-layered soil system

Author (s):

Neeraj Tiwari and M. S. Hora

Abstract:

The non-interaction analysis of over head water tank assumes that columns rest on unyielding supports. In reality, the structure is supported by deformable soil strata which deforms unevenly under the action of loads and hence causes redistribution of forces in the components of overhead water tank. In the present work, 3-D interaction analysis of intze type water tank-fluid-layered soil system is carried out using ANSYS software to evaluate the principal stresses in different parts of the tank and supporting layered soil mass. The resultant deflection, von-Mises stress and neural frequency of the tank are also evaluated under different filling conditions of the intze tank. The intze tank, supporting frame, foundation and soil mass are considered to act as single compatible structural unit for more realistic analysis. The tank, foundation and soil are considered to be follow linear stress-strain relationship. The natural frequency of the tank is evaluated for different filling conditions and comparison is made between the non-interaction and interaction analyses.

 
 
 
Full Text 

Title: Determination of the projections of the velocity vector of the cooled air from the refrigerating compartment with the door open
Author (s): Lemeshko Mikhail A., Gornostaeva ZhannaV., Duvanskaya Elena. V. and Danileko Irina N.
Abstract: The article considers the question of movement of cooled air by opening the cell doors of a domestic refrigerator. The object of research is the characteristics of the flow of cooling air, which include the velocity vector of the flow. The actual flow of air flowing out of the refrigerator compartment is three-dimensional, ie, it is characterized at each point in the flow values of the longitudinal, transverse and vertical projections of the velocity, pressure, temperature, viscosity, specific heat, thermal conductivity. To solve this problem, we used data of field tests, which led to some simplifications in the mathematical description of the process of movement of cooled air without compromising reliability and objectivity of the obtained patterns. The studies were obtained according to determination the projections of the velocity vector of the flow of cool air coming out of the refrigerating compartment of the refrigerator when the door is open at different temperatures within the chambers and the surrounding air, which allows to estimate the heat loss associated with the replacement of the cooled air warmer when you open the cell doors of domestic refrigerator.
 
 
 
Full Text 

   

 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

       arpnjournals.com                                                       Publishing Policy                                                  Review Process                                           Code of Ethics