eISSN 2231-8879
Published by:
Science & Knowledge Research Society
Listed by:
Ulrich's Periodicals Directory
|
Published Papers For Volume 6 Issue 3
Analysis of Fourier and Non-Fourier heat conduction using Tiknonov based Well-conditioned Asymptotic Waveform Evaluation Technique
Sohel Rana, Ahmed Wasif Reza, Mohd Sayuti
Pages: 75-80
DOI: 10.20967/jcscm.2016.03.007
Close abstract | Download PDF
|
Abstract
The unprecedented success of information technology has been focused by semiconductor industry to advance at dramatic rate. Thermal issues are hastily becoming one of the most challenging problems in high-performance chip design due to ever-increasing device. In the analysis of heat transport of IC chip, Fourier's heat conduction mechanism was frequently used. It is known that, this equation suggests a presumption of infinite thermal propagation speed. Then non-Fourier heat conduction model was used to forecast the rapid transient heat conduction process. A number of traditional iterative and moments matching based solvers can be found to analyze the Fourier and non-Fourier heat conduction model such as Runge-Kutta (RK) and Asymptotic Waveform Evaluation (AWE) technique. The iteration based RK method is computationally expensive and the AWE moment matching is inherently ill-conditioned. In present work, Tiknonov based Well-conditioned Asymptotic Waveform Evaluation (TWCAWE) technique has proposed to analyze the Fourier and non-Fourier heat conductions. The TWCAWE technique is successfully able to avoid the ill-conditioning moment matching and also 1.2 times faster compared to AWE. |
Evaluation Framework for Business Process Evaluation Approaches
Ayad Hameed Mousa, Norshuhada Shiratuddin, Muhamad Shahbani Abu Bakar
Pages: 69-74
DOI: 10.20967/jcscm.2016.03.006
Close abstract | Download PDF
|
Abstract
Business Process Management (BPM) lifecycle consists of goals specification, through the other phases such as design, implementation, execution, enactment, monitoring and evaluation of BP During process enactment information collected about execution plans that are stored in the form of log files and database tables, with information systems (IS) and use .In the past decade it has emerged a new approach based on apply Business Intelligence (BI) in business process management. Since it is the Data Warehouse (DW), technique is the backbone of the BI. The comprehensive and detailed assessment of the use of DW in the process of business is scarce compared to heavily use the DW. Therefore, in this paper we extend the existing framework in order to propose a comprehensive framework (FBPEA) that can be used to evaluate the existing approaches used DW to store and manage post-execution data in BPM. Moreover, we have used this proposed framework in the evaluation of a number of studies for the period from 2001 to 2012 selected through of intensive and comprehensive study of these approaches. |
A Class of 3-Generated Groups
A. Arjomandfar
Pages: 67-68
DOI: 10.20967/jcscm.2016.03.005
Close abstract | Download PDF
|
Abstract
In this paper, the order of group G(n)=<a, b, c| anb2 =1, aca= c, a-1(bc)3a= cb-1 >, is considered, where n is a positive odd integer. Further, it is proved that the order of this class is equal to n.7n. In this way, the coset enumeration algorithm is used. |
Merging Two Steganography Techniques Adjusted to Improve Arabic Text Data Security
Safia Meteb Al-Nofaie, Manal Mohammed Fattani, Adnan Abdul-Aziz Gutub
Pages: 59-65
DOI: 10.20967/jcscm.2016.03.004
Close abstract | Download PDF
|
Abstract
Securing private texts to fully prevent any detection, is a technique called Steganography. This research work of Arabic text steganography focuses on improving the hiding secrets within Arabic language text utilizing the redundant extension “Kashida” letter as covering media. We propose modifying the “Kashida” stego-cover technique merging with a new way of embedding sensitive data within whitespaces. This modified merging was tested on hiding data within Arabic text of the last 30 Chapters of the Holy Quran (Sura Al-Buruj #85 to Sura An-Nas #114) comparing with both the normal method and the improved proposed one. The results demonstrated clear increase in the capacity as expected without degrading the security, which justifies this work for real promising research direction. |
An Algorithmic Analysis of Degressively Proportional Apportionments
Janusz Łyko, Radosław Rudek
Pages: 53-57
DOI: 10.20967/jcscm.2016.03.003
Close abstract | Download PDF
|
Abstract
This paper focuses on the analysis of degressively proportional allocation of seats in the European Parliament. We propose an approach, which involves a linear function holding boundary conditions on the minimum and the maximum number of seats for countries with the smallest and the greatest populations. On this basis and applying a branch and bound algorithm, we search the set of all feasible solutions to find degressively proportional allocations of seats such that the sum of the squared differences or the sum of the absolute differences between these allocations and the values provided by the defined linear function is minimized. |
Optical Encryption Device for Software Protection
Abang Annuar Ehsan, Mohd Ridzuan Mohd Arip, Mohd Quyyum Sohaimi, Ibrahim Ghazi, Faieza Abd Aziz
Pages: 49-52
DOI: 10.20967/jcscm.2016.03.002
Close abstract | Download PDF
|
Abstract
An optical-based hardware encryption device for software protection is proposed. Software piracy and illegal usage requirethat software operation is secured through a form of hardware protection. Electronic-based hardware keys such as dongle keysmay be vulnerable to attacks through reverse engineered technology. A simple optical device can be included as part of thehardware key where it can be used as an encryption device. Software users will require specific hardware key with built opticaldevice in order to operate the software. The LED activated optical device can produce encrypted signals via generated optical codessolely based on the geometrical feature of the optical device. A suitable form of optical code generating device is presented in theform of 1xN asymmetric waveguide coupler. |
Aggregation of Flexible Chainlike Walkers in Off-Lattice Space
Takashi Mashiko, Yasuhiro Fujii
Pages: 45-48
DOI: 10.20967/jcscm.2016.03.001
Close abstract | Download PDF
|
Abstract
Two-dimensional off-lattice behavior of chainlike self-driven objects is numerically studied. The objects undergo spontaneous, irreversible aggregation, irrespective of their deformability, in contrast with the on-lattice case in which aggregation is observed only when the objects are deformable. Also, we found that the tendency of aggregation increases with the decrease in the degree of deformability of each object or with the increase in the degree of fluctuation. |
|
|