Archive
I. Abdulla, P. (2012). Understanding the Impact of Denial of Service Attacks on Virtual Machines.
II. Alfieri, R., Cecchini, R., Ciaschini, V., dell’Agnello, L., Frohner, A.,Gianoli, A., …&Spataro, F. (2004). VOMS, an authorization system for virtual organizations.In Grid computing (pp. 33-40).Springer Berlin Heidelberg.
III. ARP Spoofing. Retrieved from https://www.thesecuritybuddy.com/data-breaches-prevention/what-is-
arp-spoofing/on December 8, 2018.
IV.Cummings, J., Finholt, T., Foster, I., Kesselman, C., & Lawrence, K. A. (2008). Beyond being there: A blueprint for advancing the design,development, and evaluation of virtual organizations.V. Darko-Ampem, S., Katsoufi, M., &Giambiagi, P. (2006, October).Secure negotiation in virtual organizations. In Enterprise Distributed Object Computing Conference Workshops, 2006. EDOCW’06. 10th IEEE International
(pp. 48-48). IEEE.
VI.Denial of Service Attack. Retrieved from https://www.blackmoreops.com/2015/10/21/free-dos-attack-tools/
onDecember 4, 2018.
VII. DNS Cache Poisoning. Retrieved from https://techglimpse.com/dns-cache-poison-solution-simple-terms/
on December 8, 2018.
VIII. Higgins, K. J.,Vm’screate potential risks. Technical report, darkREADING, 2007.
http://www.darkreading.com/document.asp?doc_id=117908
IX. Kamel, M., Benzekri, A., Barrère, F., &Laborde, R. (2007, June). Evaluating the Virtual Organizations security solutions using the ISO/IEC 17799 standard.In Technology Management Conference (ICE),
2007 IEEE International (pp. 1-8).IEEE.
X. Kerschbaum, F., Haller, J., Karabulut, Y., & Robinson, P. (2006, May). Pathtrust: A trust-based reputation service for virtual organization formation. In International Conference on Trust Management (pp. 193-
205).Springer, Berlin, Heidelberg.
XI.Kerschbaum, F., & Robinson, P. (2009). Security architecture for virtual organizations of business web services.Journal of Systems Architecture,55(4), 224-232.
XII. Khalil, M. E., Ghani, K., & Khalil, W. (2016, April). Onion architecture: a new approach for XaaS (every-thing-as-a service) based virtual collaborations. In Learning and Technology Conference (L&T), 2016
13th(pp. 1-7). IEEE.
XIII. Khalil, W. (2012).Reference architecture for virtual organization (Doctoral dissertation, uniwien).
XIV. Khalil, W., &Schikuta, E. (2013). A Design Blueprint for Virtual Organizations in a Service Oriented Landscape.arXiv preprint arXiv:1312.5172
XV. Khalil, W., &Schikuta, E. (2012). Virtual organization for computational intelligence. In Human-Computer Interaction: The Agency Perspective (pp. 437-464). Springer, Berlin, Heidelberg.
XVI.Kim, Y. P., Lee, S., Lee, P., & Newby, G. B. (2006, October). Grid Information Retrieval Management System for Dynamically Reconfigurable Virtual Organization.In Grid and Cooperative Computing, 2006.GCC 2006. Fifth International Conference (pp. 301-306). IEEE.
XVII. Kirch, J. (2007). Virtual machine security guidelines.The Center for Internet Security.
XVIII. Kumar, A., Patwari, A., &Sabale, S. User Authentication by Typing Pattern for Computer and Computer based devices.
XIX. Lee, C. A., Desai, N., &Brethorst, A. (2014, December). A Keystone-Based Virtual Organization Management System.In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International
Conference on (pp. 727-730).IEEE.
XX. Li, J., Li, B., Du, Z., &Meng, L. (2010, June). Cloudvo: Building a secure virtual organization for multiple clouds collaboration. In Software Engineering Artificial Intelligence Networking and Parallel/Distributed
Computing (SNPD), 2010 11th ACIS International Conference on (pp.181-186). IEEE.
XXI.Magiera, J., &Pawlak, A. (2005). Security Frameworks for virtual organizations.In Virtual Organizations
(pp. 133-148).Springer US.
XXII. Muthaiyah, S., &Kerschberg, L. (2007). Virtual organization security policies: An ontology-based integration approach. Information Systems Frontiers,9(5), 505-514.
XXIII. Phishing Attack. Retrieved from https://www.cloudflare.com/learning/security/threats/phishing-attack/
on December 8, 2018.
XXIV. Securing Virtual Applications and Servers. Retrieved from http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unified-network-services-uns/white_paper_c11-652663.pdf on March 17
, 2016.
XXV. Sinnott, R. O., Chadwick, D. W., Doherty, T., Martin, D., Stell, A.,Stewart, G., …& Watt, J. (2008, May). Advanced security for virtual organizations: The pros and cons of centralized vs decentralized security
models. In Cluster Computing and the Grid, 2008.CCGRID’08. 8th IEEE International Symposium on
(pp. 106-113). IEEE.
XXVI. Sniffing Networks Part 2 – MAC addresses, IP. Retrieved from http://securitymusings.com/article/tag/arp-spoofing on March 17, 2016.
Pairing-free Partially Blind Message Recovery Signature Scheme with Application To Online e-Cash Payment System
Authors:
Salome James, P. Vasudeva ReddyDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00036Abstract:
Blind signature plays a significant role in practical applications such as ecash and e-voting systems, where anonymity is of great importance. A partially blind signature enables a signer to explicitly incorporate a pre-agreed common information into a blind signature without the loss of blindness property. In recent years, many cryptographic researchers have made substantial progress in the design of blind signature schemes. In order to improve the efficiency, in this paper, we propose a new pairing free partially blind signature scheme with message recovery in the identity-based frame work. The proposed scheme is existentially unforgeable with the assumption that the Elliptic Curve Discrete Logarithm Problem (ECDLP) is hard. We compare our scheme to the well known existing identity-based partially blind signature schemes. With pairing free realization and the message recovery features, the proposed scheme is more efficient in terms of computation and communication point of view. Finally, we present an electronic-cash payment system based on our PF-IDPBS-MR scheme.Keywords:
Digital signatur,Partially Blind signatu,ECDL, ID-based Cryptography,Message Recovery,E-cash,Refference:
I.Abe, E and Fujisaki. “How to Date Blind Signatures”. Asiacrypt’96, LNCS 1163, Springer-Verlag, pp 244-251 (1996).
II.Abe, M and Okamoto, T. “Provably secure partially blind signatures”.In: Proceedings of 20th Annual Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, August 20–24, 2000. Lecture Notes in
Computer Science, Springer, New York,Vol. 1880, pp 271–286 (2000).
III.Barreto, P; Kim, H.Y and Lynn, B. “Efficient Algorithms for Pairing based Cryptosystems”. LNCS, Springer-Verlag, Vol. 2442, pp 354–368 (2002).
IV.Cao, X; Kou, W and Du, X. “A Pairing –free Identity Based Authenticated Key Agreement Protocol with Minimal Message Exchanges”. Information Sciences, Vol. 180, No.15, pp 2895–2903 (2010).
V.Chaum, D. “Blind signatures for untraceable payments”. In Advances in Cryptology-Proceedings of CRYPTO’82, Springer-Verlag, New York, pp 199-203 (1983).
VI.Chen,W; Qin, B; Wu, Q; Zhang, L and Zhang, H. “ID-based partially blind signatures : A scalable solution to multi-bank e-cash, International conference on signal processing systems”. IEEE, DOI 10.1109/ICSPS.2009.121 (2009).
VII.Chow, S; Hui, L; Yiu, S and Chow, K. “ Two improved partially blind signature schemes from bilinear pairings”. In: Proceedings of 10th Australasian Conference on Information Security and Privacy, Brisbane,
Australia, Lecture Notes in Computer Science, Springer, New York, Vol. 3574 (2005).
VIII.Fan, C.I and Lei, C.L. “ Low-computation partially blind signatures for electronic cash”. IEICE Trans. Fund. Electron. Commun. Comput. Sci. E81-A(5), pp 818–824 (1998).
IX.Hafizul Islam, S.K; Amin, R; Biswas, G.P; Obaidat, M.S and Khan, M.K. “Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System”. Arab J Sci Eng, Vol.41, No. 8, pp 3163-3176 (2016).
X.Hu, X and Huang, S. “An efficient ID-based partially blind signature scheme”. In software engineering, artificial intelligence, networking, and parallel/distributed computing, SNPD, IEEE, Eighth ACIS international
conference, pp 291-296 (2007).
XI.Koblitz, N. “Elliptic curve cryptosystem”. Journal of Mathematics of Computation, Vol. 48, No.177, pp 203-209 (1987).
XII.Li, F; Zhang, M and Takagi T. “Identity-based partially blind signature in the standard model for electronic cash”. Mathematical and Computer Modelling 58 pp 196–203 (2013).
XIII.Mahender Kumar and Katti, C.P. “An efficient ID-based partially blind signature scheme and application in electronic-cash payment system”.ACCENTS Transactions on Information Security, Vol. 2, No. 6, ISSN, pp
2455-7196 (2016).
XIV.Miller, V.S. “Use of elliptic curves in cryptography”. In Proceeding on Advances in cryptology-CRYPTO 85, Springer-Verlag, New York, LNCS,Vol. 218, pp 417-426 (1985).
XV.Nyberg, K and Rueppel, R.A. “A New Signature Scheme based on the DSA giving Message Recovery”. In Proc. of 1st ACM conference on communication and computer security, Virginia, USA, pp 58-61 (1993).
XVI.Paterson, K.G and Schuldt, J.C.N. “Efficient identity-based signatures secure in the standard model”. In: Information Security and Privacy—ACISP 2006,in: LNCS,Vol. 4058, Springer-Verlag, pp 207–222 (2006).
XVII.Pointcheval, D and Stern, J. “Security arguments for digital signatures and blind signatures”. Journal of Cryptology, Springer-Verlag, Vol.13, No.3, pp361-396 (2000).
XVIII.Shamir, A. “Identity-based Cryptosystems and Signature Schemes”. Crypto ’84, Springer-Verlag, LNCS Vol. 196, pp 47-53 (1985).
XIX.Shamus Software Ltd. Miracl Library. Available: http://certivox.org/display/EXT/MIRACL.
XX.Tahat, N. “A New Design Partially Blind Signature Scheme Based on Two Hard Mathematical Problems”.World Academy of Science, Engineering and Technology, International Journal of Mathematical and Computational Sciences Vol. 6, No. 8, (2012).
XXI.Tan, S.Y; Heng, S.H and Goi, B.M. “Java Implementation for Pairing-based Cryptosystems”. In: Taniar D., Gervasi O., Murganate B., Pardede E.,Apduhan B. O. (Eds.), Computational Science and its Applications- ICCSA- 2010, LNCS, Springer, Berlin, Heidelberg, 6019, pp 188-198 (2010).
XXII.Tian, X.X; Li, H. J; Xu, J.P and Wang Y. “A security enforcement ID-based partially blind signature scheme”. In International conference on web information systems and mining,IEEE, pp 488-92 (2009).
XXIII.Tseng, Y.M; Wu, T.Y and Wu, J.D. “Forgery attacks on an ID-based partially blind signature scheme”. International Journal of Computer Science. Vol. 35, No.3, pp 301-304 (2008).
XXIV.Wang, H and Zhang,Y. “A protocol for untraceable electronic cash”. In international conference on web-age information management, Springer Berlin Heidelberg, pp 189-197 (2000).
XXV.Wang, H; Zhang,Y and Cao, J. “An electronic cash scheme and its management”. Concurrent Engineering, Vol.12, No. 3, pp 247-257 (2004).
XXVI.Zhang, F; Safavi-Naini, R and Susilo, W. “Efficient verifiably encrypted signature and partially blind signature from bilinear pairings”. In: Proceedings of the 4th International Conference on Progress in Cryptology-INDOCRYPT, Springer, New York, Vol. 2904, pp 191–204 (2003).
XXVII.Zhang, X. “New randomized partially blind signature scheme”. International Conference on Computer Science and Electronic Technology (ICCSET2014).
XXVIII.Zhang, Y and Chen M. “The standard model enhanced ID based partially blind signature”. Journal of Sichuan University (Engineering Science Edition), Vol. 01, pp 95-101 (2014).
Comparison IFOC Scheme of Three Phase Optimal 63 Level Multilevel Inverter Connected Induction Motor using FLC and ANFIS
Authors:
Mr. Bolla Madhusudana Reddy, Y.V.Siva Reddy , M.Vijaya KumarDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00037Abstract:
This paper proposes initially an optimal structured single phase 63 level Multi level Inverter-(MLI) with Sinusoidal Pulse Modulation-(SPWM) and it can be extended to three phase 63 level MLI which is built with three individual single phase 63 level MLIs connected in star form and later it is fed to three phase star winding induction motor drive. The proposed MLI generates more number of levels with minimum switches, DC sources, low switching losses and reduced THD while compared with traditional MLIs. In the next subsequent case indirect field Oriented Control (IFOC) method is implemented through fuzzy Logic Controller-((FLC) of optimal 63 level MLI feeding induction motor(IM) drive for checking speed of motor, sudden load variation, parameters changes. Later the same method of AC drive tested with Adaptive Neuro Fuzzy Inference System (ANFIS) which gives better performance than AC drive with FLC. The proposed optimal MLI fed IM drive with IFOC gives improved performance using ANFIS in view of its high-quality dynamic performance and minimum THD.Keywords:
MLI,FLC,ANFIS,IFOC,THD ,Refference:
I.Ali saghafinia et.al. , “Adaptive fuzzy sliding mode control into chattering free IM drive”,IEEE trans., vol 51,no 1,Jan 2015.
II.Ataollah Makhberdonran et al., “Symmetrical and asymmetrical design of new cascaded multilevel inverter”, IEEE trans., vol 29,no 12,Dec 2014.
III.EiI Badsi et al., “DTC scheme for four switch inverter fed induction motor emulating six switch inverter”,IEEE trans., vol 28,no.7,Jul 2013.
IV.M.M Uddin, “Performances of fuzzy logic based indirect vector control for induction motor drive”,IEEE trans. Vol 38,no.5 Sept 2014.
V.M.Nasir uddin , “Development and implementation of simplified self tuned neuro fuzzy based IM drive”,IEEE trans.,vol 50,no1 Jan 2014.
VI.Mohammad fahadi kangarlu et al. “A generalized cascaded multilevel inverter using series connection of sub multilevel inverters”, IEEE trans. vol 28, no 2 Feb 2013.
VII.Mohamed S.Zaky et al., “A performance investigation of four switch three phase inverter fed IM drive at low speed using PI & FLC , IEEE trans. On Power Electronics , 2016.
VIII.Muvungu masiala, et al. “Fuzzy self tuning speed control of indirect field oriented control induction motor drive”, IEEE tran., vol44,no 6, Nov 2008.
IX.P.Ganesh et al., “Single phase 63 level modular multilevel inverter fed induction drive for solar PV applications”, IEEE explore, Aug 2018.
X.Yonsoo cho, et al. “Torque ripple reduction & fast torque response strategy for predictive torque
control of induction motor”, IEEE Trans. On Power Electronics, Jun 2017.
View
Download
Face Recognition using Deep Neural Networks
Authors:
Amirhosein Dastgiri, Pouria Jafarinamin, Sami Kamarbaste, Mahdi GholizadeDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00038Abstract:
Face recognition is one of the most important issues in the machine vision, which has many applications in the industry and other issues related to the vision of the machine. There are many algorithms in the field of machine learning to detect facial expressions. In recent years, deep neural networks are one of the areas of research. Because of its excellent performance, this technique is widely used in face recognition. Facial features are useful for a variety of tasks, and the application of deep neural network is very fast. In this paper, a method for recognition of facial expressions is presented using the features of the deep neural network. A deep neural network is used to summarize images and classify them. The proposed model focuses on identifying the faces of a person from a single image. The work algorithm is a multilayer neural network with a deep learning concept. The results show that in some cases, the recognition rate is very high.Keywords:
face mode,deep neural network,deep learning,Refference:
I.A. Kortylewski, B. Egger and A. Schneider.Empirically Analyzing the Effect of Dataset Biases on Deep Face Recognition Systems. Computer Vision and Pattern Recognition (CVPR), 2018.
II.Byeon YH, Kwak KC. Facial expression recognition using 3d convolutional neural network. Int J Adv Comput Sci Appl 5(12):107-112, 2014.
III.C. Benjamin and M. Ennio. Mitigation of effects of occlusion on object recognition with deep neural networks through low level image completion,”Computational Intelligence and Neuroscience, vol. 2016, Article ID 6425257, 15 pages, 2016.
IV.Chen, Xue-wen, Melih Aslan, Kunlei Zhang, and Thomas Huang.Learning multi-channel deep feature representations for face recognition”, In Feature Extraction: Modern Questions and Challenges, pp. 60-71, 2015.
V.Fakhari, Ali; Moghadam, Amir Masoud Eftekhari. Combination of classification and regression in decision tree for multi-labeling image annotation” Applied Soft Computing Volume 13 issue 2, 2013.
VI.Guosheng Hu and Xiaojiang Peng. Frankenstein: Learning deep face representations using small data”, IEEE Transactions on Image Processing, 2017.
VII.H.Xiong, S.Szedmak and J. Piater, “ Scalable, Accurate Image Annotation with Joint SVMs and Output Kernels, Neurocomputing”, Vol., No. 2015.
VIII.Hansen, M. F. , Smith, M. , Smith, L. , Salter, M. , Baxter, E. , Farish, M. and Grieve, B. and AB Agri, SRUC, Manchester University, Towards on-farm pig face recognition using convolutional neural networks.
Computers in Industry,98. pp. 145-152. ISSN 0166-3615 Available from: http://eprints.uwe.ac.uk/35276, 2018.
IX.J. Zeng, X. Zhao, Q. Chuanbo et al. Single sample per person face recognition based on deep convolutional neural network,” in Proceedings of IEEE International Conference on Computer and Communications (ICCC), pp. 1647–1651, Chengdu, China, December, 2017.
X.J. Zeng, X. Zhao, Y. Zhai, J. Gan, Z. Lin, and C. Qin. A novel expanding sample method for single training sample face recognition,” in Proceedings of International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), pp. 33–37, Ningbo, China, , 2017.
XI.Jing Zhang, Yaxin Zhao, Da Li, Zhihua Chen, and Yubo Yuan. A novel image annotation model based on content representation with multi-layer segmentation.Neural Comput. Appl. 26, 6,1407-1422.
DOI=http://dx.doi.org/10.1007/s00521-014-1815-6,. 2015.
XII.Jing Zhang• Yaxin Zhao• Da Li “A novel image annotation model based on content representation with multi-layer segmentation” The Natural Computing Applications Forum, 2015.
XIII.Jiwei Hu; Kin-Man Lam “An efficient two-stage framework for image annotation” Pattern Recognition Volume 46 issue 3, 2013.
XIV.K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multitask cascaded convolutional networks,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.
XV.L.Agapito et al. “Mixing Low-Level and Semantic Features for Image Interpretation A Framework and a Simple Case Study”: ECCV 2014 Workshops, Part II, LNCS 8926, pp. 283–298.DOI: 10.1007/978-3-319-16181-520, 2015.
XVI.M.Saraswathi and S. Sivakumari.Evaluation of PCA and LDA techniques for Face recognition using ORL face database”, (IJCSIT) International Journal of Computer Science and Information Technologies, Volume 6 (1), 2015, pp. 810-813, 2015.
XVII.Nur Ateqah Binti Mat Kasim, Nur Hidayah Binti Abd Rahman, Zaidah Ibrahim, Nur Nabilah Abu Mangshor. Celebrity Face Recognition using Deep Learning. Indonesian Journal of Electrical Engineering and Computer Science.Vol. 12, No. 2, pp. 476~481, 2018.
XVIII.S. S. Farfade, M. J. Saberian, and L.-J. Li, “Multi-view face detection using deep convolutional neural networks ,” in Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, pp. 643-650: ACM, 2015.
XIX.S. S. Farfade, M. J. Saberian, and L.-J. Li. Multi-view face detection using deep convolutional neural networks,” in Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, pp. 643-650: ACM, 2015.
XX.Savath Saypadith and Supavadee Aramvith.Real-Time Multiple Face Recognition using Deep Learning on Embedded GPU System. Proceedings,APSIPA Annual Summit and Conference 201812-15 November, 2018.
XXI.Shraddha Arya and Arpit Agrawal.Face Recognitionwith Partial Face Recognition and Convolutional Neural Network. International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET)Volume 7, Issue 1, 2278–1323, 2018.
XXII.Y. Li, W. Shen, X. Shi, and Z. Zhang.Ensemble of randomized linear discriminant analysis for face recognition with single sample per person,” in Proceedings of IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, pp. 1–8, Shanghai, 2013.
XXIII.Zhiming Qian, Ping Zhong, Jia Chen, Integrating Global and Local Visual Features with Semantic Hierarchies for Two-Level Image Annotation,Neurocomputing,http://dx.doi.org/10.1016/j.neucom. 07.094
, 2015.
Adopting Modern Energy Conservation Measures to Enhance Building Energy Efficiency
Authors:
M. Yousaf Ali Khan, Imran Abbas, Shahid Atiq, Sheeraz Ahmed, AmadUd Din, Muhammad FahadDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00039Abstract:
Energy efficiency has been an immense importance in worldwide particularly in large educational institutes which are often left unnoticed as a contributor to energy consumers in Pakistan. The institute budget for energy cost has assumed to be the major costs and minimizing the energy bill in a large institute has become a big challenge. The targeted actions can be used to minimize the electricity consumption. The savings on energy provides a chance to reinvest it for the institute. In this work, energy assessment of Government College of Technology (GCT) campus Bhakkar is done to identify potential energy savings and to enhance the awareness, responsiveness for energy conservation amongst the community of the campus. The data about the installed load is collected by visiting each department. This work explained in details of the power consumption of different electrical devices installed in the institute and energy usage by those devices for a month is analysed. The work showed that a significant energy savings up to 50 % is achieved if old electrical devices are replaced with latest Energy conserving devices. Many facts corresponding the ECM devices are also encoded in this work and payback time is computed for the devices. Few basic ECMs are recommended to be followed by the institute which is technically and economically more reasonable. The benefits of implementing the energy efficiency measures in buildings are substantial both in terms of energy savings and cost savings.Keywords:
Energy Audit, Energy Conservation,Energy Conservation Measure(ECMs) ,Refference:
I.C.P. Ahila, and W.J.J. Femi. “Energy audit in ladies hostel.” In TENCON -TENCON 2015 – 2015 IEEE Region 10 Conference.
II.D. Rathod, Deepak, R.Khandare, and A. K. Pandey. “Electrical Energy Audit (A Case Study OfTobbaco Industry).” International Journal of Engineering, 2013, Vol. No. 3, pp. 9-18.
III.G. Sultana, and H.U. Harsha. “Electrical Energy Audit a case study.” IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 2015, Vol. 10, no. 3, pp 1-6.
IV.H. Singh, M. Seera, and M. A. M.Idin. “Electrical energy audit in a Malaysian university- A case study.” International Conference on Power and Energy (PECon), IEEE, 2012, pp. 616-619.
V.K.P. Amber, and N. Ashraf. “Energy outlook in Pakistan.” International Conference on Energy Systems and Policies (ICESP), IEEE, 2014.
VI.K.R.Shailesh, S. Tanuja, M. Kumar, and R.A. Krishna. “Energy consumption optimisation in classrooms using lighting energy audit.”National Conference on Challenges in Research & Technology in the Coming Decades (CRT 2013).
VII. M. Ahmad, M. Shafique, M. A. Aslam, M. N. Khan, and R. Y. Khan. “Personal energy independence a short-term solution for ongoing energy crisis in Pakistan using home solar grid.” International Conference on Energy Systems and Policies (ICESP),IEEE, 2014.
VIII.M. Kumar, P. H. Shaikh, F. Shaikh, and M. A.Uqailli. “Energy Conservation through Motors in Pakistan’s Industrial Sector-Need to use of Energy Efficient Motors.” International Journal of Computer Applications, 2012,
Vol. 54, No. 5.
IX.M. S. Isasare, and S. A. Zadey. “A case study: Energy audit at AVBRH, Sawangi (M), Wardha.” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT),IEEE, 2016.
X.N.M. Maricar, and M. H. Othman. “Energy audit application for building of small and medium enterprise.” Saudi InternationalElectronics,Communications and Photonics Conference (SIECPC), IEEE, 2013.
XI.S.A.R.Shah, M. M. Saleem, H. Rehman, and B. Khan. “The cost for economic growth: A study on the energy demand of Pakistan using TIMES.”, Power Generation System and Renewable Energy Technologies
(PGSRET),IEEE, 2015.
XII.S. N. Chaphekar, R. A.Mohite, and A. A. Dharme. “Energy monitoring by energy audit and supply side management.”International Conference on Energy Systems and Applications , IEEE 2015.
XIII.S.P. Parthe, and S.Kompeli. “Energy Audit and Conservation Tool for Energy Efficiency.” International Research Journal Engineering and Technology (IRJET) 2015, Vol.2,No.8, pp 747-751.
XIV.T. Fiedler and P.M. Mircea. “Energy Management systems according to the ISO 50001 standard, Challenges and benefits.” International Conference on Applied and Theoretical Electricity (ICATE), IEEE, 2012.
Fostering Conditions for Innovative Reforms in Public Sector Organizations and Their Response to Artificial Intelligence
Authors:
Sayyed Khawar Abbas, Muhammad AftabDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00040Abstract:
The paper is intended to investigate the foster effects of political instability, leadership influence, experimentation and budget constraints responsible for poor performance and feedback from public sector organizations. Keeping in view the purpose of the study, the research framework for the study is descriptive. Firstly, Primary data is collected through questionnaires from individuals engaged with public sector organizations. Secondly, unstructured interviews conducted to explore the effect of Artificial intelligence. Through research analysis, the empirical evidence suggest that the innovation activity is intrigued with important conditions responsible for the performance of public sector organization. Political instability suggested negative significance while others have demonstrated positive significance concerning innovation reforms. Artificial Intelligence also demonstrates a strong scope for future public sector organizations. In the following research framework, the data is based on the judgments of employees engaged with public sector organizations. The responses are individual self-reported and not objective, so there is a fair possibility that response would be biased. Furthermore, the responses are from Pakistan’s main cities which cannot be generalized to various countries. This study focuses on the performance of the public sector organization. A large amount of literature has emerged on the likelihood of innovation reforms for private sector firms over the course of time. This paper is widening the horizon to study the likelihood of innovation reforms for public sector organizations by adhering the innovation culture and identifying important factors which may influence. The paper also provides a base for finding more dimensions to implement innovation reforms and also guide policymakers to execute efficient policies. Furthermore, the study is based on questions covering “what” and “how” dimensions. This type of quantitative study lacks for “why” dimension. Therefore, semi-structured interviews and case analysis could explain more regarding innovation reforms. The research framework is the first attempt to examine the impact of different conditions on the implementation of innovation and Artificial intelligence influence in public sector organizations in Pakistan.Keywords:
Public sector organizations, Innovation reforms, political instability,leadership influence, experimentation, budget constraints, OECD (Organization for Economic Cooperation and Development, ICT (Information and communication technology),Artificial Intelligence,Refference:
I.Albury, D. (2005). Fostering innovation in public services.Public money and management, 25(1), 51-56.
II.Anthony, A., & Dorothea, H. (2013). From too little to too much innovation?Issues in measuring innovation in the public sector. Structural Change and Economic Dynamics, 27, 27(C), 146-159.
III.Arfeen , M. I., & Khan , P. N. (2009). Public Sector Innovation: Case study of e-government projects in Pakistan.The Pakistan Development Review,439-457.
IV.Arundel , A., Casali, L., & Hollanders, H. (2015). How European public sector agencies innovate: The use of bottom-up,policy-dependent and knowledge-scanning innovation methods.Research Policy, 44(7), 1271-1282.
V.Audretsch, D., & Demircioglu, M. (2017). Conditions for innovation in public sector organizations.Research Policy, 46(9), 1681-1691.
VI.Bommert, B. (2010). “Collaborative innovation in the public sector”.International Public Management Review
, 11(1),15-33.
VII.Bugge, M. M., & Bloch, C. (2016). Between bricolage and breakthroughs—framing the many faces of public sector innovation.Public Money & Management, 36(4), 281-288.
VIII.Butt, F. S., Rafique, T., Nawab, S., Khan, N. A., & Raza, A. (2013). Organizational Transformation in Public Sector Organizations of Pakistan in the Quest of Change Management.Research Journal of Applied Sciences,
Engineering and Technology, 6(16): 3086-3093.
IX.Chesbrough, H. (2003). “The logic of open innovation: managing intellectual property”. California Management Review, 45(3), 33-58.
X.Demircioglu, M. A. (2017). Conditions for innovation in public sector organizations. Research Policy
, 46(9), 1681-1691.
XI.Gallup Organization. (2011).Analytical Report – Innovation in Public Administration: Report.Gallup Organization.
XII.Gassmann, O. (2006). “Opening up the innovation process: towards an agenda”.R&D Management
, 36(3), 223-8.
XIII.Goodman, J. (2016). Robots in Law: How Artificial Intelligence is Transforming Legal Services.
Ark Group. ISBN 978-1-78358-264-8.
XIV.Iqbal, M. Z., Rehan, M., Fatima, A., & Nawab, S. (2017). The Impact of Organizational Justice on Employee Performance in Public Sector Organization of Pakistan.International Journal of Economics &
Management Sciences, (6)3, 1-6.
XV.Koch, P., & Hauknes, J. (2005). On innovation in the public sector – today and beyond. Oslo: Publin.
XVI.Lee, S. M., Hwang, T., & Choi, D. (2012). Lee, S. M., Hwang, T., & Choi, D. (2012). Open innovation in the public sector of leading countries.Management decision,. Management Decision, 50(1), 147-162.
XVII.Lopez, V., & Whitehead, D. (2013). Sampling data and data collection inqualitative research.Nursing and Midwifery Research: Methods and Critical Appraisal for Evidence-based Practice, 124-140.
XVIII.Luc, B., & Hafsi, T. (2007). The changing nature of public entrepreneurship. 67(3), 488-503.: Public Administration Review,.
XIX.Maranville, S. (1992). “Entrepreneurship in the Business Curriculum”. Journal of Education for Business.
, 68(1), 27–31.
XX.Ng, A. (2017, September 22). IBM’s Watson gives proper diagnosis after doctors were stumped. Newyork: NY Daily News.
XXI.OECD. (2014). Innovating the Public Sector: from Ideas to Impact. OECD Conference Centre, Paris
(pp. 1-40). Paris: OECD Conference Centre, Paris.
XXII.Palmer , C., & Kaderdina , F. (2017). Public sector innovation: From ideas to actions. UK: Ernst & Young Global Limited.
XXIII.Russell, S. J., & Norvig, P. (2009). Artificial Intelligence: A Modern Approach. Upper Saddle River, New Jersey: Prentice Hall. ISBN 0-13-604259-7.
XXIV.Sahni, N. R., Wessel, M., & Chr, C. M. (2013). Unleashing breakthrough innovation in government.
Stanford Soc. Innovation Rev, 11(3), 27-31.
XXV.Schweitzer, J. (. (2014). Leadership and innovation capability development in strategic alliances.
Leadership & Organization Development Journal, 35(5),442-469.
XXVI.Smith, S. (2013). Fundamentals of marketing research.Thousand Oaks, CA:SAGE Publications.
XXVII.Torugsa, N., & Arundel, A. (2017). Rethinking the effect of risk aversion on the benefits of service innovations in public administration agencies.Research Policy, (5), 900-910.
XXVIII.UNDP Pakistan. (2018, February). Governance Reforms and Innovation. Retrieved from SUSTAINABLE DEVELOPMENT GOALS: United Nations Development Programme:http://www.pk.undp.org/content/pakistan/en/home/operations/projects/democ ratic_governance/governance-reforms-and-innovation-.html
XXIX.Wynen Jan, Verhoest, K., Ongaro, E., & Thie, S. V. (2014). Innovation-oriented culture in the public sector: Do managerial autonomy and result control lead to innovation?Public Management Review
, 16(1), 45-66
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism
Authors:
Nasreen J. Kadhim, Mohannad T. MohammedDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00041Abstract:
A rapid growing has occurred for the act of plagiarism with the aid of Internet explosive growth wherein a massive volume of information offered with effortless use and access makes plagiarism − the process of taking someone else’s work (represented by ideas, or even words) and representing it as his own work − easy to be performed. For ensuring originality, detecting plagiarism has been massively necessitated in various areas so that the people who aim to plagiarize ought to offer considerable effort for introducing works centered on their research. In this paper, a work has been proposed for detecting textual plagiarism focused on proposing models for both candidate retrieval and detailed comparison phases. Firstly, for the candidate retrieval, two models have been proposed established on adopting the vector space method VSM as a retrieval model wherein these models base on offering different representations for text documents. The first model centers on representing documents as vectors consisting of average term 𝑡𝑓 − 𝑖𝑠𝑓 weights instead of representing them as vectors of term 𝑡𝑓 − 𝑖𝑑𝑓 weight. Whereas, the second retrieval model assigns for each term constituting the document a weight resulted from a weighted sum equation that sums this term 𝑡𝑓 − 𝑖𝑑𝑓 weight with its average 𝑡𝑓 − 𝑖𝑠𝑓 weights and considers it as a query for retrieval. The detailed comparison task comes as the second phase wherein a method has been proposed that cores at the integration of two diverse similarity measures and the introduction of one similarity measure involving them; Exact similarity and Fuzzy similarity. Experiments have been conducted using PAN-PC-10 as an evaluation dataset for evaluating the proposed system. As the problem statement in this paper is restricted to detect extrinsic plagiarism and works on English documents, experiments have been performed on the portion dedicated for extrinsic detection and on documents in English language only. These documents have been randomly separated into training and testing dataset. The training data has been used for parameters tuning whereas evaluating the performance of the proposed system and comparing it against the existing methods have been performed using testing dataset. For evaluating performance of the models proposed for the candidate retrieval problem, Precision, Recall, and F-measure have been used as an evaluation metrics. The overall performance of the proposed system has been assessed through the use of the five PAN standard measures Precision, Recall, F-measure, Granularity and 𝑃𝑙𝑎𝑔𝑑𝑒𝑡 . The experimental results has clarified that the proposed system either comparable or outperforms the other state-of-the-art methods.Keywords:
VSM,TF-IDF, TF-ISF, exact similarit, Jaccard similarity, fuzzy similarity,Refference:
I.A.Abdi, et al., A linguistic treatment for automatic external plagiarism detection. 2017. 135: p. 135-146.
II.A.Sarkar, U. Marjit, and U. Biswas. A conceptual model to develop an advanced plagiarism checking tool based on semantic matching. in 2014 2nd International Conference on Business and Information Management
(ICBIM). 2014. IEEE.
III.A.Abdi, et al., PDLK: Plagiarism detection using linguistic knowledge.2015. 42(22): p. 8936-8946.
IV.B.Gipp, Citation-based plagiarism detection, in Citation-based plagiarism detection. 2014, Springer. p. 57-88.
V.D.E.J.A.C.Appelt, Introduction to information extraction. 1999. 12(3): p.161-172.
VI.G.Oberreuter and J.D.J.E.S.w.A. VeláSquez, Text mining applied to plagiarism detection: The use of words for detecting deviations in the writing style. 2013. 40(9): p. 3756-3763.
VII.K.Vani and D. Gupta. Investigating the impact of combined similarity metrics and POS tagging in extrinsic text plagiarism detection system. in 2015 International Conference on Advances in Computing,
Communications and Informatics (ICACCI). 2015. IEEE.
VIII.L.Prechelt, G. Malpohl, and M.J.J.U. Philippsen, Finding plagiarisms among a set of programs with JPlag. 2002. 8(11): p. 1016-.
IX.M .Alzahrani, S, et al., Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model. 2015. 27(3): p. 248-268.
X.M.Roig, Avoiding plagiarism, self-plagiarism, and other questionable writing practices: A guide to ethical writing. 2006.
XI.M.Potthast, et al., Cross-language plagiarism detection. 2011. 45(1): p. 45-62.
XII.R.Lukashenko, V. Graudina, and J. Grundspenkis. Computer-based plagiarism detection methods and tools: an overview. in Proceedings of the 2007 international conference on Computer systems and
technologies. 2007. ACM.J. Mech. Cont.& Math. Sci., Vol.-14, No.-3, May-June (2019) pp 555-578
Copyright reserved © J. Mech. Cont.& Math. Sci.Nasreen J. Kadhim et al.578
XIII.S.Wang, et al. Combination of VSM and Jaccard coefficient for external plagiarism detection. in 2013 International Conference on Machine Learning and Cybernetics. 2013. IEEE.
XIV.S.Rao, et al., External & Intrinsic Plagiarism Detection: VSM &Discourse Markers based Approach Notebook for PAN at CLEF 2011.2011.
XV.S. Alzahrani and N. Salim, Fuzzy Semantic-Based String Similarity for Extrinsic Plagiarism Detection Lab Report for PAN at CLEF 2010.2010.
XVI.S.M.Alzahrani, et al., Understanding plagiarism linguistic patterns,textual features, and detection methods. 2012. 42(2): p. 133-149.
A Robust and Efficient Finger Print Combination form Privacy Protection
Authors:
Abdullah S. AlotaibiDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00042Abstract:
Now a day’s fingerprint techniques are widely used in authentication systems, therefore its privacy protection becomes an important issue. Securing a stored fingerprint template is very important because once fingerprints are compromised, it cannot be easily revoked. So, we review here a new system for preserving fingerprint confidentiality. In this system, the fingerprint privacy is maintained by combining two special fingerprints keen on a original identity. In the enlistment phase, two fingerprints need aid taken from two different fingers. We acquire the minutiae positions about one fingerprint, the introduction from claiming another fingerprint, and the reference focuses starting with both fingerprints. In view of those gotten information, a joined minutiae format may be created Also saved previously, a database. In the Confirmation phase, we utilize the fingerprints of the same fingers that need aid at that point utilized within enlistment stage. For same 2 finger prints against a mutual minutiae template, a two-stage fingerprint matching process is used. By storing the combined minutiae template in the database, the complete minutiae characteristic of a single fingerprint will not be compromised when the database is stolen by the attackers. The joined minutiae format will be changed over under a real-look indistinguishable joined together finger impression by utilizing existing finger impression reproduction approach. These effects under another virtual character to those two different fingerprints.Keywords:
Fingerprint,Combination,Protection,Minutiae,Privacy ,Refference:
I.A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, “An analysis of biohashing and its variants,” Pattern Recognit., vol. 39, no. 7, pp. 1359–1368,2006.
II.A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transforma- tion: A security analysis,” in Proc. SPIE, Electron. Imaging, Media Forensics and Security, San Jose, Jan. 2010.
III.A. Othman and A. Ross, “Mixing fingerprints for generating virtual identi- ties,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS),Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011.
IV.A. Ross and A. Othman, “Mixing fingerprints for template security and priva-cy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug.29–Sep. 2, 2011.
V.B. Yanikoglu and A. Kholmatov, “Combining multiple biometrics to protect privacy,” in Proc. ICPR- BCTP Workshop, Cambridge, U.K., Aug. 2004.
VI.B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentica-tion featuring fingerprint data and tokenised random number,” Pattern Recog-nit., vol. 37, no. 11, pp. 2245–2255, 2004.
VII.E. Camlikaya, A. Kholmatov, and B. Yanikoglu, “Multi-biometric templates using fingerprint and voice,” Proc. SPIE, vol. 69440I, pp. 69440I-1–69440I-9,2008.
VIII.K. G. Larkin and P. A. Fletcher, “A coherent framework for fingerprint analy-sis: Are fingerprints holograms?,” Opt. Express, vol. 15, pp. 8667–8677, 2007.
IX.K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault:Implementation and performance,” IEEE Trans. Inf. Forensics Security, vol. 2,no. 4, pp. 744–57, Dec. 2007.
X.N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating can-celable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no. 4, pp. 561–72, Apr. 2007
XI.S. Li and A. C. Kot, “A novel system for fingerprint privacy protection,” in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5–8, 2011, pp.262–266.
XII.S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process. Lett., vol. 18, no. 2, pp. 115–118, Feb. 2011. [9] A. Ross and A.Othman, “Visual cryptography for biometric privacy,” IEEE Trans. Inf. Fo-rensics Security, vol. 6, no. 1, pp. 70–81,Mar. 2011.
XIII.S. Li and A. C. Kot, “Attack using reconstructed fingerprint,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Bra-zil, Nov. 29–Dec. 2, 2011.
XIV.W. J. Scheirer and T. E. Boult, “Cracking fuzzy vaults and biometric encryp-tion,” in Proc. Biometrics Symp., Sep. 2007, pp. 34–39.
Protein sequence comparison under a new complex representation of amino acids based on their physio-chemical properties
Authors:
Jayanta Pal, Soumen Ghosh, Bansibadan Maji , Dilip Kumar BhattacharyaDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00043Abstract:
The paper first considers a new complex representation of amino acids of which the real parts and imaginary parts are taken respectively from hydrophilic properties and residue volumes of amino acids. Then it applies complex Fourier transform on the represented sequence of complex numbers to obtain the spectrum in the frequency domain. By using the method of ‘Inter coefficient distances’ on the spectrum obtained, it constructs phylogenetic trees of different Protein sequences. Finally on the basis of such phylogenetic trees pair wise comparison is made for such Protein sequences. The paper also obtains pair wise comparison of the same protein sequences following the same method but based on a known complex representation of amino acids, where the real and imaginary parts refer to hydrophobicity properties and residue volumes of the amino acids respectively. The results of the two methods are now compared with those of the same sequences obtained earlier by other methods. It is found that both the methods are workable, further the new complex representation is better compared to the earlier one. This shows that the hydrophilic property (polarity) is a better choice than hydrophobic property of amino acids especially in protein sequence comparison.Keywords:
omplex Representatio, DFT, Hydrophobicity Proper,Hydrophilicity (Polarity) Property,ICD; Phylogenetic Tree,Voss Representation,Refference:
I.K. Brodzik, and 0. Peters, “Symbol-balanced quaternionic periodicity transform for latent pattern detection in DNA sequences,”in Proc. IEEE ICASSP, vol. 5, pp. 373-376, 2005.
II.B. D. Silverman, and R. Linsker, “A measure of DNA periodicity,” J. Theor. Biol., vol. 118, pp. 295-300, 1986.
III.Changchuan Yin and Stephen S. –T. Yau, Numerical representation of DNA sequences Based on Genetic Code Context and its applications in Periodicity Analysis Genomes- 978-1—1779-7/08/$25.00@2008 IEEE
IV.D. Anastassiou, Frequency-domain analysis of bimolecular sequences, Bioinformatics, vol.16, no.4, pp. 1073-1081, 2000.
V.D. Anastassiou, “Genomic signal processing,” IEEE Signal Proc.Mag., vol. 18, no. 4, pp. 8-20, July 2001.
VI.D. E. Godsack and R. C. Chalifoux, Contribution of the free energy of mixing hydrophobic side chains to the stability of the tertiary structure, Journal of Theoretical Biology vol. 39, pp. 645-651, 1973.
VII.Ghosh, S., Pal, J. S. Das and Bhattacharya, D.K (2015)-Biological and Theoretical Classifications of Amino Acids in Six Groups. International Journal of Computer Science and Software Engineering, 5, 695-698.
VIII.Ghosh, S., Pal, J. and Bhattacharya, D.K. (2014) Classification of Amino Acids of a Protein on the Basis of Fuzzy Set Theory. International Journal of Modern Sciences and Engineering Technology, 1, 30-35.
IX.G. L. Rosen, “Signal processing for biologically-inspired gradient source localization and DNA sequence analysis,” PhD thesis, Georgia Institute of Technology, Aug. 2006.
X.J. Ning, C. N. Moore, and J. C. Nelson, “Preliminary wavelet analysis of genomic sequences,” in Proc. IEEE Bioinformatics Conf (CSB), pp. 509-510, August 2003.
XI.King, B.R., Aburdene, M., Thompson, A. and Warres, Z. (2014) Application of Discrete Fourier Inter-Coefficient Difference for Assessing Genetic Sequence Similarity.EURASIP Journal on Bioinformatics and
Systems Biology, 2014, 8.
XII.M. Elloumi et al. (Eds.) “Complex Representation of DNA Sequences by Carlo Cattani”, BIRD 2008, CCIS 13, pp. 528–537, 2008._c Springer- Verlag Berlin Heidelberg 2008.
XIII.N. Chakravarthy, A. Spanias, L. D. lasemidis, and K. Tsakalis,”Autoregressive modeling and feature analysis of DNA sequences,”EURASIP JASP, vol. 1, pp. 13-28, 2004.
View
Download
XIV.Pal, J., Ghosh, S., Maji, B. and Bhattacharya, D.K. (2016) Use of FFT in Protein Sequence Comparison under Their Binary Representations.Computational Molecular Bioscience, 6, 33-40.http://dx.doi.org/10.4236/cmb.2016.62003
IV.P. Argos, J.K.M.Rao and P.A.Hargrave, structural prediction of membrane bound proteins, Eur.J.Biochevol.128, pp. 565-575,1982.
XVI.P. D. Cristea, “Genetic signal representation and analysis,” in Proc. SPIE Conference, International Biomedical Optics Symposium (BIOS’02), vol.4623, pp. 77-84, 2002.
XVII.R. F. Voss, “Evolution of long-range fractal correlations and 1/f noise in DNA base sequences,” Phy. Rev. Lett., vol. 68, no. 25, pp. 3805-3808,June 1992
XVIII.R. Zhang, and C. T. Zhang, “Z curves, an intuitive tool for visualizing and analyzing the DNA sequences,” J. Biomol. Struct. Dyn.,vol. 11, no. 4, pp. 767-782, February 1994.
XIX.Tung Hoang, Changchuan Yin, Hui Zheng, Chenglong YU, Rong Lucy He, Stephen S, T. Tay – A new method to cluster DNA sequences using Fourier power spectrum- Journal of Theoretical Biology- 372 (2015), 135-145.
Effect of Thin Layer on Bearing Capacity in Layered Profile Soil
Authors:
Abdul Farhan, Farman Ullah, Fawad Ahmad, Mehr E MunirDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00044Abstract:
Bearing capacity is the main criteria for designing the foundation of a structure. Several theories and experimental methods have been propounded by many researchers for computing the bearing capacity parameters separately. Traditional bearing capacity theories for determining the ultimate bearing capacity of shallow foundations assume that the bearing stratum is homogenous and infinite. However this is not true in all cases. Layered soils are mostly encountered in practice. It is possible to encounter a rigid layer at shallow depth or the soil may be layered and have different shear strength parameters. In such cases shear pattern gets distorted and bearing capacity becomes dependent on the extent of the rupture surface in weaker or stronger material. The best estimation of bearing capacity on layered soil are possible only, if the pressure-settlement characteristics of the foundation-soil are known for the size of the footing. From the review of literature, it may be noted that the bearing capacity equations proposed for the homogenous soils by Terzaghi (1943) and Meyerhof (1951) are not applicable to layered soils. Hence it is necessary to develop an equation for predicting the bearing capacity of granular layered soils. In present investigation, plate load test have been conducted in a large tank to observe the load settlement behavior of plates of different sizes resting on layered granular soils. Tests were conducted on two layers of soils. Fine gravel layer overlain sand layer were tested using mild steel plates of square shapes. The effect of the placement of layers on the bearing capacity characteristics of footing, has been studied and an equation for predicting the bearing capacity of two layered granular soils is developed based on the plate load test data.Keywords:
Bearing capacity,plate load test,Refference:
I.Hanna A. M. Bearing Capacity of Foundations on a Weak Sand Layer Overlaying a Strong Deposit, Canadian Geotechnical Journal, 1982: 392-396.
II.Hanna, A.M., and Meyerhof G.G. (1980), “Design charts for ultimate bearing capacity of foundations on sand overlying soft clay”. Can. Geotech.J, 17(2). 300-303.
III.Meyerhof, G. G. Hanna A. M. Design Charts for Ultimate Bearing Capacity of Foundations on Sand Overlaying Soft Clay. Canadian Geotechnical Journal, 1980, 17: 300-303.
IV.Michalowski, R.L. (1997). An estimate of the influence of soil weight on bearing Capacity using limit analysis. Soils and Foundations, Vol. 37, No.4, pp. 57-64.
V.Meyerhof, G. G. & Hanna, A. M. (1978), ultimate bearing capacity of foundations on layered soils under inclined load. Canadian Geotechnical Journal, vol. 15, n. 4, pp. 565-572.
VI.Srivastava, A.K. (1982), Relevance of small scale model tests for estimating load settlement behavior of footings on sand.” M.Tech dissertation.
VII.Terzaghi, k. and Peck, R. B. (1967) Soil Mechanics in Engineering Practice, 2nd edition John Wiley and Sons Inc, New York, USA.
VIII.Valsangkar A. J, Meyerhof, G. G. Experimental Study of Punching Coefficients and Shape Factor for Two Layered Soils. Canadian Geotechnical Journal, 1979, 16: 802-805.
IX.Varghese P.C., A text Book of Foundation Engineering, Prentice Hall of India Pvt. Ltd., New Delhi, Edition 2005
View
Download
Bin the Case Bifurcation and Chaos of Logistic Maps with Three Parameters and its Applications
Authors:
Asia Ali Mohammed, Assistant Prof. Radhi A. ZaboonDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00045Abstract:
In this paper, the generalization of logistic discrete dynamic systems with three parameters have been analyzed with the necessary mathematical requirements and proofs. The dynamics and the qualitative properties of the fixed points and their stability, the bin the case bifurcation diagram and chaos have proposed with application.Keywords:
fixed point ,stability,bin the case bifurcation diagram,periodic point,Refference:
I.A. Ferrettia, N. K. Rahman , “A study of Coupled Logistic Map and Its Applications in Chemical Pysics” , Chemical Pysics,vol.119 , no.2-3, pp: 275-288,1988.
II.C.Robiason, “Dynamical System. Stability , Symbolic Dynamics and Chaos “, second edition ,CRC Press Boca Ration.Florida,1999.
III.C. Pellicer –Lostao , R. Lpez – Ruiz,”A Chaotic gas- like Model for Trading Markets “,Journal of Computational Science,vol.1, no.1, pp: 24- 32,2010.
IV.D.Gulick, ” Encounters with Chaos “, McGraw Hill, 1990.
V.F .G. Alvarez, Monotoya, G. Pastor, and M. Romera,” Chaotic cryptosystems”, In Proceedings of IEEE International Carnahan Conference on Security Technology, pp: 332-338, 1999.
VI.G.Geoffrey . ,”Chaotic Dynamics; Fractals, Tilings and Substitutions”,Towson University Mathematics Department, 2015.
VII.G. Jakimoski, and L. Kocarev, “Chaos and cryptography: Block encryption ciphers based on chaotic maps “, IEEE Transactionson Circuits and Systems-I: Fundamental Theory and Applications, vol. 48, no.2,
pp:163-169, 2001.
VIII.G. R.Ahmed ,”On Some Generalized Discrete Logistic Maps” , Journal of Advance Research , vol.4, no.2, pp:163-171,2013.
IX.H. R.Biswas, “One Dimensional Chaotic Dynamical Systems “, Journal of Pure and Applied Mathematics :Advance andApplications , Vol. 10, no.0, pp: 69-101, 2013.
X.I.Sajid ,R.Muhammad ,I.Shahaid ,O.Muhammad , A. S.Hadeed,”Study of Nonlinear Dynamics Using Logistic Map”, LUMS 2nd International Conference on Mathematics and its Applications in Information Technology (LICM08), 2008.
XI.K. Pareeka .N.VinodPatidara ,K . K. Sud ,” Image Encryption Using Chaotic Logistic Map ” ,Image and Vision Computing , vol. 24, no.9, pp: 926-934,2006.
XII.M. SBaptista, ” Cryptography with chaos”, Physics Letters A. Vol. 240, no.1-2, pp: 50-54, 1998.
XIII.R.Klages ,” Applied Dynamical System”, Lectures 5-10 From Deterministic Chaos to Deterministic Din the case offusion, Rainer Klages, QMUL,2010
XIV.R.A.J.Matthews ” On the Derivation of a Chaotic Encryption Algorithm”. Cryptologia, vol.13, no.1, pp: 29-42, 1989.
XV.R. L. Devaney, L. Keen ,”Chaos and Fractals :The Mathematics Behind The Computer Graphics “, American Mathematical Society ,Providence, 1989.
XVI.R. Rak, E. Rak ,” Route to Chaos in Generalized Logistic Map” , Faculty of Mathematics and Natural Science ,University of Rezesow , PL-35-45, Rezesow ,Poland ,2015.
XVII.S. Sternberg. “The Perron-Frobenius Theorem”, Dynamical Systems, pp: 175-195, 2011.
XVIII.T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, “A secret key cryptosystem by iterating a chaotic map”, Advances in Cryptology:Proceedings of EUROCRYPT 91, LNCS 547, Berlin:Springer-Verlag, pp: 127-140, 1991.
XIX.T. –Y. Li and J .York ” Period Three Implies Chaos ” , American Mathematical Monthly, vol.82, no.10, pp: 985-992,1975.
XX.W .Xiangjun ,Haibin K. , Jürgen K. , ” A New Color Image Encryption Scheme Based on DNA Sequences and Multiple Improved 1D Chaotic Maps ” , Contents lists available at Science Direct Applied Soft
Computing journal homepage : www.elsevier.com/locate/asoc,2015.
XXI.Z. Kotulski, and J. Szczepanski, ” Discrete chaotic cryptography”, Annalen der Physik, vol. 509, no.5, pp: 381-394, 1997.
XXII.Z. L. Zhou ,” Symbolic Dynamics (chinsi)” , Shanghai Scientin the case ofic and Technology Education Publish House Shanghai, 1997.
Peer Tutoring Activities To Support Active Learning In Mathematics: Review of The Effects on Student’s Thinking and Metacognitive Skills
Authors:
Mohamad Ariffin Abu Bakar, Norulhuda IsmailDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00046Abstract:
Mastery of mathematics is an overview of the accuracy of mathematics competency. It is a tremendous impact on well development and complete trained metacognition skills and thinking skills. Therefore, to ensure that students can understand mathematics well is through learning that can enhance and develop metacognitive skills and thinking skills. In order to reduce the weakness of mathematical mastery, one of the interventions is through active and meaningful learning. Active learning focuses on student engagement, interactive, retention and motivation to explore the learning. Through this review, peer tutoring is subject matter to discuss the ability to support active learning and evaluate the effectiveness of peer tutoring activities among students in developing metacognitive skills and thinking skills. A review of previous research through search in database likes Google Scholar, Science Direct, ERIC, Springer Link, Elsevier and several other databases, based on keywords has been implemented. A number of articles and journals have been systematically reviewed to answer questions in this literature study. However, just 13 articles and journals published in 2012 until the current year are selected for this review. Briefly, the constructs and themes in peer tutoring contribute to forming active learning that can lead to increased student thinking and metacognitive skills.Keywords:
Peer Tutoring,Metacognitive Skil,Thinking Skil,Active Learning,Mathematics Mastery,Refference:
I.A.B. Festus, “Activity-Based Learning Strategies in the Mathematics Classrooms”. Journal of Education and Practice.Vol.4, No.13,2013
II.A. Ansuategui, F. Jose, M. Miravet, &Lidon “Emotional and Cognitive Effects of Peer Tutoring among Secondary School Mathematics Students”.International Journal of Mathematical Education in Science and
Technology.Vol 48,n8,pp 1185-1205,2017
III.Adnan &ArsadBahri. “Beyond Effective Teaching: Enhancing Students’ Metacognitive Skill Through Guided Inquiry”. IOP Publishing .Journal of Physics: Conf. Series 954 (2018) 012022 doi :10.1088/1742-
6596/954/1/012022,2018.
IV.A. Elliot, “Metacognitive Teaching Strategies And Young Children’s Mathematical Learning”. Proceeding Of Australian Association for Research in Education Conference, AARE.Fremantle,1993
V.B. BozYaman, “A Multiple Case Study: What Happens In Peer Tutoring Of Calculus Studies?”.International Journal of Education in Mathematics,Science and Technology (IJEMST).7(1), 53-72.
Doi:10.18404/ijemst.328336,2019
VI.B. Hott, & J. Walker, “Peer Tutoring. Council for Learning Disabilities”.Retrived from : https://council-for-learning-disabilities.org/peer- tutoring-flexible-peer-mediated-strategy-that-involves-students-serving-as-
academic-tutors, 2012
VII.D. Al Kharusi, “What Positive Impacts Does Peer Tutoring Have Upon The Peer Tutors at SQU?”.Journal of Education and Practice.Vol.7, No.27, 2016.
VIII.D.S. Benders, “The Effect of Flexible Small Groups on Math Achievement in First Grade”. An On-line Journal forTeacherResearch.Vol. 18, Issue 1.Issn 2470-6353.Spring,2016
IX.F. Acar, & E. Ader.”Metacognition Used By Tutors During Peer Tutoring Sessions In Mathematics”.Elementary Education Online.2017; 16(3),pp 1185-1200,2017
X.F.U. Rahman, N.B. Jumani, M.A. Chaudry, S.U.H. Chisti, & F. Abbasi, “Impact Of Metacognitive Awareness On Performance Of Students In Chemistry”. Contemporary Issues In Education Research.Vol 3, No10,2010
XI.G. Pilten, “The Evaluation of Effectiveness of Reciprocal Teaching Strategieson Comprehension of Expository Texts”. Journal of Education and Training Studies.Vol. 4, No. 10; October 2016. Doi:10.11114/jets.v4i10.1791,2016
XII.G. Schraw, & D. Moshman, (1995) . Metacognitive Theories. Educational Psychology Papers and Publications. 40. Retrieved From : http://digitalcommons.unl.edu/edpsychpapers/40 1995
XIII.H.C. Celik, “The Effects of Activity Based Learning on Sixth Grade Students’ Achievement and Attitudes towards Mathematics Activities”.EURASIA Journal of Mathematics, Science and Technology Education,
2018, 14(5), 1963-1977,2018
XIV.H.C. Chu, J.M. Chen, & C.L. Tsai, “Effects of an Online Formative Peer-Tutoring Approach on Students’ Learning Behaviours, Performance and Cognitive Load in Mathematics”.Interactive Learning Environments.Vol
25,n2, pp 203-219,2017
XV.I. Amin, & Y.L. Sukestiyarno, “Analysis Metacognitive Skills On Learning Mathematics In High School”. International Journal of Education and Research.Vol. 3 No. 3 March 2015.
XVI.I. Coskun, & C. Eker, “The Effect Of Teaching Activities Done By Using Activity Based Posters On The Students’ Academic Achievements, Retention Levels In Their Learning”. Universal Journal of Educational Research 6(4): 585-597, 2018. Doi: 10.13189/ujer.2018.060402,2018
XVII.I. Ullah, R. Tabassum, & M. Kaleem, “Effects of Peer Tutoring on the Academic Achievement of Students in the Subject of Biology at Secondary Level”.Educ. Sci. 2018, 8, 112; Doi:10.3390/educsci8030112,2018
XVIII.J.M. Smith, & R. Mancy, “Exploring The Relationship Between Metacognitive And Collaborative Talk During Group Mathematical Problem- Solving – What Do We Mean By Collaborative Metacognition?”, Research in Mathematics Education, 20:1, pp 14-36, Doi:10.1080/ 4794802.2017.1410215,2018
XIX.K. Arrand, “Peer Tutoring”.Journal Pedagogic Development.Volume 4 Issue 1,2014
XX.K. Findley, I. Whitacre, & K. Hensberry, “Integrating Interactive Simulations Into The Mathematics Classroom: Supplementing, Enhancing, Or Driving?” In Galindo, E., & Newton, J., (Eds.). (2017). Proceedings of the 39th Annua
Using Increased Section Thickness to Gain Inherent Fire Protection in Single Span Portal Frames
Authors:
Nasir Khan, Muhammad Hasnain, Shabbir Ahmad, Fawad Khan, Sharifullah khanDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00047Abstract:
All over the world, different designs are used for construction of any type of structure. The Structure is design with mutual understanding of structure and architecture engineer to make structure stable and having an attractive look for the people. Beside this one of most essential component which must be installed in any type of structure is fire protection. To enhance the stanchions thickness in single span portal frame structures with fire boundary conditions cost analysis examine in this study. More ever this study also investigates to gain an inherent fire protection for fire resistance design periods. Using this method the cost is compared with common techniques for fire protection such as applying intumescent coating to frame members. In this study for conducting the analysis a portal type frame structure was designed. Different tests are conduct on the design portal frame structure and it is concluded that for fire resistance using the increase thickness of section is economical of fire protection while the design period is up to 30 minutes. Using the inherent protection method against the application intumescent coating for a period of 30 minutes more than 21% energy is saved. Significant cost of saving recorded in a project having large scale construction.Keywords:
Fire Protection, Fire boundary condition,intumescent coating,Porta frame structure,Stanchions thickness,Refference:
I.BOLLUM (Undated). (1987).“Technical Data Sheet Bm066 Fireshield Ultra Universal.” Vertical Column Loading Table.
II.BRITISH STANDARDS INSTITUTION. (2003).”Structural use of steelwork in building – Part 8: Code of practice for fire resistant design.”
III.BUILDING REGULATIONS. (2010). “Fire Safety Buildings Other than Dwelling houses.” Approved Document B Volume 2
IV.CORUS. (2006). “Fire resistance of steel-framed buildings 2006 Edition, Section factor and protection thickness assessment.”
V.HSE. (2012a). “Active Fire Protection.” [Online] Available at: http://www.hse.gov.uk/comah/sragtech/techmeasfire.htm [Accessed 16.11.12]
VI.MDM PUBLISHING. (2012).”Intumescent coating.” [Online] Available at: http://www.mdmpublishing.com/mdmmagazines/magazineifp/newsview/436/ how-to-minimise-the-fire-risk-to-structural-steel
[Accessed 18.10.12].
VII.MONGABAY.(2012). [Online] Available at: http://population.mongabay.com/population/united
kingdom/2641170/nottingham [Accessed 08.01.13]
VIII.SPRAYFINE. (2012). “Passive fire protection.” [Online] Available at: http://www.sprayfine.ltd.uk/treatments/fireprotection.php [Accessed 16.10.12]
IX.STEEL CONSTRUCTION INSTITUTE. (2002). “Single Storey Steel Framed Buildings in Fire Boundary Conditions”.
X.STEEL CONSTRUCTION INSTITUTE. (2004). “Design of Single-Span Steel Portal Frames.” BS 5950-1:2000
Artificial Intelligence – Machine Learning based Mental Health Diagnosis Automation
Authors:
F. Catherine Tamilarasi, J. ShanmugamDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00048Abstract:
Mental health of human being is more important parameter and any deficit or issue needs faster diagnosis. In this aspect Medical Image Analysis and psychology have become a promising application domain for Machine Learning (ML) which facilitates an intelligent decision support system for diagnosis.Keywords:
Artificial Intelligence, Deep Learnin, Neural Network, Machin learning,Working Memory,Refference:
I. Bhaskar Sen, Neil C. Borle, Russell Greiner, Matthew R. G. Brown,” A general prediction model for the detection of ADHD and Autism using structural and functional MRI “, PLoS ONE 13(4): e0194856.
II.D van der Meer, PJ Hoekstra, M van Donkelaar, J Bralten, J Oosterlaan, D Heslenfeld, SV Faraone, B Franke, JK Buitelaar and CA Hartman, “Predicting attention-deficit/hyperactivity disorder severity from
psychosocial stress and stress-response genes: a random forest regression approach”, Translational Psychiatry (2017) 7, e1145; doi:10.1038/tp.2017.114; published online 6 June 2017
III.Daniel S. Margulies and Simon B. Eickhoff ,” Functional Segregation of the Right Inferior Frontal Gyrus: Evidence From Coactivation-Based Parcellation”, Cerebral Cortex, bhy049, https://doi.org/10.1093/cercor/bhy049
IV. doi: 10.1016/j.ijpsycho.2013.01.008. Epub 2013
V. DP Wall, J Kosmicki, TF DeLuca, E Harstad and VA Fusaro1,” Use of machine learning to shorten observation-based screening and diagnosis of autism”, Translational Psychiatry (2012) 2, e100;
doi:10.1038/tp.2012.10; published online 10 April 2012
VI. Gesa Hartwigsen , Nicole E. Neef, Julia A. Camilleri,
VII. https://doi.org/10.1371/journal.pone.0194856
VIII. https://doi.org/10.1371/journal.pone.0194856 , April 17, 2018
IX. JA Kosmicki , V Sochat , M Duda and DP Wall,” Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning”, Translational Psychiatry (2015) 5, e514;
doi:10.1038/tp.2015.7; published online 24 February 2015
X. JA Kosmicki, V Sochat, M Duda and DP Wall, “Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning”, Transl Psychiatry (2015) 5, e514;
doi:10.1038/tp.2015.7
XI. Jan 27. PMID:23361114
XII. Kartick Subramanian, Sundaram Suresh, “Importance of phenotypic information in ADHD diagnosis”, March 2015
https://www.researchgate.net/publication/276848476 Conference Paper ·
DOI: 10.1109/CCIP.2015.7100722
XIII.
M Duda, R Ma, N Haber and DP Wall, “Use of machine learning for
behavioral distinction of autism and ADHD”, Translational Psychiatry
(2016) 6, e732; doi:10.1038/tp.2015.221; published online 9 February
2016
XIV.
Published: 18 April 2018
XV.
Pulkit Agrawal, Dustin Stansbury, Jitendra Malik, Jack L. Gallant,”
Pixels to Voxels: Modeling Visual Representation in the Human Brain”,
AN OVERVIEW TOWARDS THE TIP-RUBBING EVENT AND USAGE OF ABRADABLE MATERIALS TO MINIMIZE THE OCCURRENCE OF TIP-RUBBING
Authors:
Ch. Vinay Kumar Reddy, I. RajasriDOI NO:
https://doi.org/10.26782/jmcms.2019.06.00049Abstract:
There has actually been a considerable rise in air traffic quantity, especially over the previous twenty years. In order to handle this boost popular, it has actually been needed to raise the effectiveness of airplane engines. For many years, this has actually been accomplished by minimizing the clearance in between blade tips and also the engine casing. Consequently, of the minimized clearance, tip-rubbing often takes place in the engine throughout the procedure. In this paper, a short intro to the tip-rubbing occasion as well as associated prices to the sector, and also just how abradable products are utilized to decrease the incident of tip-rubbing are pointed out. The Rolls-Royce Trent 900 engine and also the 2nd phase compressor area are explained briefly.Keywords:
tip-rubbing,Rolls-Royce Trent 900 engine,Blade-Casing,Refference:
I.AircraftAccidentReport–NationalAirlines,Inc.DC-10-10,N60NA,Near
Albuquerque,NewMexico,November3,1973,(1975),NTSB-AAR-75-2,
NationalTransportationSafetyBoard,Washington,D.C.20591.
II.AircraftAccidentReport–In-FlightEngineSeparationJapanAirlines,Inc,
Flight 46e Boeing 747-121, (1993), NTSB/AAR-93/06, National
TransportationSafetyBoard,Washington,D.C.20594.
III.Aidanpää,J.andLindkvist,G.(2010),”DynamicsofaRubbingJeffcottRotor
withThreeBlades”,ProceedingsoftheThirdChaoticModelingandSimulation
InternationalConference,1-4June2010,Chania,Crete,Greece.
IV.AustralianTransportSafetyBureau(2008),In-flightenginefailure,Sydney,
BoeingCompany747-438,VH-OJM,03February2007,200700356.
V.Chu,F.andLu,W.(2007),”Stiffeningeffectoftherotorduringtherotor-to-
statorrubinarotatingmachine”,JournalofSoundandVibration,vol.308,no.
3-5,pp.758-766.
VI.ContactModellinginLS-DYNA-ContactParameters(2001),availableat:http://www.dynasupport.com/tutorial/contact-modeling-in-ls-dyna/contact-parameters (accessed20/09/2011).
VII.Dai,X.,Jin,Z.andZhang,X.(2002),”Dynamicbehaviourofthefullrotor/stoprubbing”,JournalofSoundandVibration,vol.251,no.5,pp.807-822.
VIII.DeRyck,H.(2008),TurbofanDesignfortheCommercialAircraft,Warsaw
University of Technology, Warsaw,Poland.
IX.Dinardo, J. E. (2009), Signal Processing Techniques for Nonlinearity IdentificationofStructuresUsingTransientResponse(MasterofScience thesis),UniversityofMissouri,Missouri,USA.
X.LS-DYNATheoryManual(2006),LivermoreSoftwareTechnology Corporation, Livermore, California94551.
XI. LS-DYNAKeywordUser’sManual(2007),Version971ed.,LivermoreSoftware
Technology Corporation, Livermore, California94551.
XII.Virgin Driver (2010), available at: http://virginflightdeck.blogspot.com/
(accessed11/11/2011).