Original Research Article
Jan. 20, 2016
Analysis of Teledensity Growth Model Using Augmented Dickey-Fuller Technique (ADFT)
Okafor Chioma Sylvia, H.C. Inyiama, C.C. Okezie, K.C. Okafor
Sch J Eng Tech | 15-24
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
This research developed a teledensity growth model in Nigeria using a multiple regression approach in order
to understand the Nigerian telecommunication growth trend for predictive analytics. Data were obtained from four GSM
network operators, fixed line operators and CDMA providers. The data used captured number of subscribers and a
monthly data summary from February 2012 to January 2013. Using multiple regression technique, an estimating for
teledensity growth model was achieved with MATLAB R2011a. The model was tested and validated for prediction and
forecasting at a significance level, α = 0.05. Advanced Statistical tools like STATASE, Minitab, E-view and Time series
analysis were used in this study. Using the Augmented Dickey-Fuller (ADF) test, it was observed that the teledensity
time series trend were found to be stationary overtime and had no unit root at second difference. The findings of this
study showed that teledensity growth has an increasing trend over time which implies that the linear trend model
obtained from the time series regression analysis can be used to make predictions for future behaviour of the process.
Hence, six years prediction on the teledensity growth pattern was made and it was found that in the year 2018, that
teledensity growth will increase to about 148.4%. Given a population and subscriber base, the model could be applied in
any country of the world.
Original Research Article
Jan. 15, 2016
Image Encryption and Compression Using Scalable Coding Techniques
Karpakam S, Amutha A
Sch J Eng Tech | 1-5
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
The security becomes an important issue of communication and storage of image due to the growth of
multimedia application. Encryption is one of the ways to ensure high security. Images are used in many fields such as
military and medical science. They are stored or transferred through network, security of such image data is important.
Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before
they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original
data from cipher code. Information privacy becomes a challenging issue. In order to protect valuable data or image from
undesirable readers, image encryption and decryption is essential. In this approach, encryption phase by using selective
encryption technique original image pixel values are completely concealed so that an attacker cannot obtain any
statistical information from an original image. An encoder quantizes the sub images and Hadamard transform is applied
to reduce the data amount. At the receiver side with the cryptographic key, the principal content with higher resolution
can be reconstructed when more bit streams are received. The quality of the reconstructed image is measured by
calculating peak signal to noise ratio (PSNR).
Original Research Article
Jan. 20, 2016
Experimental Investigation of Friction Stir Welding of Aluminium Alloys Using Response Surface Methodology
Shubham Patel, Murali Krishna
Sch J Eng Tech | 6-14
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
Friction stir welding (FSW) uses a non-consumable tool to produce frictional heat in the adjoining surfaces.
The welding parameters like rotational speed, welding speed, tool pin length, and tool shoulder diameter play a major
role in deciding the joint properties. In this work, an attempt has been made to analyse the effect of various tool profiles
have been used to fabricate joints by using constant thickness (3mm) work piece of aluminium alloy. The mechanical
properties of welded materials are measured in terms of tensile strength. With the help of vertical milling machine create
the specimen by friction stir welding (FSW). Now using universal testing machine on which tensile testing of the welded
specimen was carried out. After that by using design of experiment (DOE)concept. Experimentally were carried out to
predict tensile strength of the welded joint. After comparison of predicted and practical values of tensile strength
conclude that with increase in pin length tensile strength increase contently and tool geometry with a large shoulder
diameter together with high welding speed leads to decrease in welds speed leads to decrees’ in tensile strength of the
welds work pieces.
Original Research Article
Jan. 20, 2016
Online Framework based on Serious Games for Healthcare:Case Studies
Begoña Garcia-Zapirain, Adel Elmaghraby
Sch J Eng Tech | 25-39
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
Integrating serious games for Health has been proposed through a unified framework expanding current Health
informatics. Healthcare from this perspective includes care for persons with physical, mental or developmental
limitations. The main objective is to suggest an online framework to configure, monitor and analyze the results of health
intervention therapy based games using different media. The technology offers various possibilities to interact with the
game through tools such as iPad, Kinect, Wii or robots. All of them communicated through internet and the information
stored in the cloud. Having all the data in the cloud allows, not only have the updated tracking of the patient, also to
update the treatment based on the combination of appropriate games for every stage of the disease. To do this,
biofeedback information is included. The main benefit remains to be that Games can provide an improved lifestyle and a
more friendly approach to health diagnostics and therapies when possible.
Original Research Article
Jan. 20, 2016
A Comprehensive Contextual Industrial Engineering Research and Software project Management Using Product Metrics
Prodip Kumar Sarker, Md. Jamal Hossain
Sch J Eng Tech | 40-48
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
For the purpose of exact and flawless valid conclusions while aggregating evidence of software project, it is
important to describe the context in which industrial studies and inspection were conducted. This paper exhibits and
structures the context for comprehensive and empirical inspections, studies, analysis and provides a checklist. The prime
concern of this paper is to assists decisions makers and researchers in making well equipped informed decisions
concerning which parts of the context is to include into the project descriptions and software project management and
maintenance using product metrics. In additions to this there will be surveyed the descriptions of industrial studies and
analysis.
5G Technology and Advancement in Telecommunication at Military Level
Anirudh Bhagwandas Rathi, Snehal Kalam
Sch J Eng Tech | 49-52
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
5G Technology (5th generation mobile technology) which denotes the next major phase of mobile
telecommunication standards beyond the upcoming 4G standards. This upcoming technology will support IPv6 and flat
IP. With 5G pushed over a VOIP enabled device, people will experience a level of call volume and data transmission
never experienced before. Looking at the increasing demand for the speed, it has become very essential that we start
investing time in 5G technology. As the customer become more and more aware of the mobile phone technology, he or
she will look for a decent package all together including all the advanced features a cellular phone can have. Hence the
search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors.
5G technology will have it usage in field like military, smart housing, cooperate companies etc. In the present work we
will be discussing the evolution of telecommunication from 1G to 5G. We will give brief information about all the
generations and then focus on 5G technology. We will also discuss the problems faced by soldier due to present
Telecommunication system and what recent efforts are made in order to overcome them. Due to the advantages of
wireless transmission, safe wireless communication plays a significant role for safety related systems in military,
industrial, medical and other safety related applications.
Original Research Article
Jan. 21, 2016
The Influence of Angkak Treatment on Physical, Chemical and Organoleptical Characteristics of the Castoff Duck Meat Sausage
Delly Bertha Johana Rumondor, Djalal Rosyidi, Lilik Eka Radiati, Purwadi
Sch J Eng Tech | 53-57
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
This research is aimed to understand the influence of angkak as curing material and natural color maker on
physical and chemical characteristics and also on organoleptical test of castoff duck meat sausage, in effort to maintain
the quality of castoff duck meat sausage. Data were analyzed with analysis of variance using Complete Random Planning
4x4. Treatment involves various angkak levels, such as 0% (without treatment), 1%, 1.5%, and 2%. It includes 4 times
replications continued with HSD Test. Organoleptical test is done by the panelist using Scoring for Intensity Test on
color, flavor, taste and texture tests. Results of physical test (color, water holding capacity and pH), chemical test (water
content, lipid and protein) and bacterial total showing that angkak treatment at levels of 0%,1%, 1.5%, and 2%, may give
obvious influence (P < 0.05) on duck meat sausage. Color organoleptical test is giving very obvious influence (P < 0.01),
whereas organoleptical tests of aroma, taste and texture do not give obvious influence (P > 0.01). Result of research
indicates that angkak treatment 1% is already effective to maintain sausage quality and useful as curing compound and
natural color maker n the preparation of castoff duck meat sausage.
The Impact of Clustering Mechanism in Dense Wireless Sensor Network
Senthil Kumar T, Boselin Prabhu S R, Sophia S
Sch J Eng Tech | 58-62
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
A sensor is a miniature component which gauges physical parameters from the environment. A sensor
measures the physical parameters and transmits them either by wired or wireless means. In wireless medium the sensor
and its allied components are called as node. A wireless sensor node is self-assured by a processor, local memory,
sensors, radio, battery and a base station accountable for receiving and processing data collected by the nodes. The
incorporation of multiple types of sensors such as seismic, acoustic, optical, etc., in a single network platform and the
evaluation of the overall coverage of the system also presents numerous interesting challenges. The sensor-based military
applications involves intrusion detection, perimeter monitoring, information gathering and smart logistics support in an
unknown deployed area, sensor-based personal health monitoring, location detection with sensor network and movement
detection using wireless sensor network. This paper gives a detailed description about the impact of clustering
mechanism in dense wireless sensor network
Safety Distance Calculation for Collision Avoidance in Vehicular Ad hoc Networks
M. A. Berlin, S. Muthusundari
Sch J Eng Tech | 63-69
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
A Vehicular Ad-Hoc Network (VANET) is a special form of Mobile ad-hoc network used for the
communication between nearby vehicles and between vehicles and fixed roadside equipment. VANETs are an important
component of Intelligent Transport System (ITS) that combines computer and communication technologies for traffic
management to reduce traffic congestion, improve traffic efficiency, avoid accidents and improve road safety. Vehicular
safety is an important application of VANET and these include vehicle collision warning, brake warning from a
preceding car, obstacle warning and other emergency notifications. In this paper, we focus on accident prevention and
propose a Safety Distance Calculation methodology that is based on the relative velocity and distance between the
vehicles. The driver is warned, when the safety distance to another vehicle is reached so that the driver can take
appropriate steps for collision avoidance. The proposed system is based on the positional information provided by GPS
receivers. As most cars, today, are equipped with GPS receivers, our proposed system provides a simple and feasible
solution for accident prevention. Since, the relative distance between the vehicles is used for computation; the safety
distance can be accurately estimated
Improved Fuzzy Support Vector Machine for Face Recognition
Navin Prakash, Dr. Yashpal Singh
Sch J Eng Tech | 70-82
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
Face recognition is the most emerging research area of the pattern recognition since the early 1990s. This
paper presents a new classifier called modified fuzzy support vector machine (MFSVM) by modification in membership
function of Fuzzy Support Vector Machine using Combination of Distance Feature, Correlation. We use based on
discrete wavelet transform (DWT), discrete Cosine transform (DCT) as a combined feature extraction method and
modified fuzzy support vector machine (MFSVM) for face recognition. First the face image is decomposed by 2-D
wavelet, then the 2-dimentional DCT is applied to the low-frequency image. Then, using the DCT coefficient, face image
can be recognized using MFSVM classifier. The experiment is carried out on the ORL database the result is encouraging,
which achieves high accuracy
Determination of Cost-Efficient Bandwidths of Multicast Algorithms through Data Envelopment Analysis using Variable Return to Scale Model
Joseph Stephen Soja, Abdoulie Momodou Sunkary Tekanayi, Iliya TizheThuku, Adewale Emmanuel Adedokun, Mohammed Mijinyawa, Bashira Yahaya, Zainab MukhtarAbubakarand, Oguchi Akudo Nwogu
Sch J Eng Tech | 83-88
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
In this paper, Data Envelopment Analysis (DEA) was applied using Variable Return to Scale (VRS) model to
determine bandwidth consumption of two algorithms during video conferencing over wireless network. Recent
researches conducted focused on Constant Return to Scale (CRS) model where all Decision Making Units (DMUs) are
operating at an optimal scale. DEA employing VRS was used on simulation results of Improved Network Coding
Algorithms (INCAs) of two and three parameters to determine the better coding algorithm. The two Simulation results
showed that, the INCA with three parameters is more efficient than the INCA with two parameters. This is ascertained
from the mean efficiency of INCA with three parameters which are; 0.941, 0.934 and 0.812 for 20, 50 and 60 nodes
generated at random when compared with mean efficiency of 0.847, 0.909 and 0.801 for INCA with two parameters
using the same number of nodes generated at random.
Design of Second Order Digital Integrator Using Simulation Annealing
Nitin Rawal, Amit Bohra
Sch J Eng Tech | 89-94
DOI : 10.36347/sjet
Abstract
PDF
Full Texts
e-Pub
In this paper, a new design of second order digital integrator is investigated using simulation annealing
optimization algorithm. Transfer function of the second order digital integrator is derived from the use of simulation
annealing algorithm. Then compare the results with the ideal second order integrator and digital IIR second order
integrator using Richardson Extrapolation which is also obtained.