eISSN 2231-8879
Published by:
Science & Knowledge Research Society

Listed by:

Ulrich's
Periodicals Directory
Published Papers For Volume 6

Vibration Analysis of a Generator Anti-Vibration Rubber Mounts
Hazim Nasir Ghafil
Pages: 105-111
DOI: 10.20967/jcscm.2016.04.004

Close abstract |  Download PDF
Abstract

The aim of this study is to measure the vibration and the stresses developed in the anti-vibration rubber mounts of a generator resulted from vibration of a generator at duty cycle. This is done by measuring the acceleration of the engine case using accelerometer; piezoelectric sensor. The stresses were calculated numerically by finite element analysis using ANSYS 15.0 software package.



Analytical Solution of Squeezing Unsteady Nanofluid Flow in the Presence of Thermal Radiation
A.G. Madaki, R. Roslan, M. Mohamad, M.G. Kamardan
Pages: 97-103
DOI: 10.20967/jcscm.2016.04.003

Close abstract |  Download PDF
Abstract

Homotopy perturbation method (HPM) and Runge-Kutta fourth-order method with shooting technique have been performed to investigate the presence of thermal radiation on squeezing unsteady nanofluid flow between two lateral plates. The results obtained, are found in good agreement with the previously published studies which employed Duan-Rach Approach (DRA). We found that the fluid temperature is physically decreased with an increase in thermal radiation parameter.



Coupling Tuning Based Impedance Matching for Maximum Wireless Power Transfer Efficiency
Surajit Das Barman, Ahmed Wasif Reza, Narendra Kumar
Pages: 91-96
DOI: 10.20967/jcscm.2016.04.002

Close abstract |  Download PDF
Abstract

In the recent years, a remarkable evolution of the non-radiant wireless power transfer (WPT) system using strong magnetic resonant coupling has been observed, and it has shown more prospects for powering portable devices due to its operating range and efficiency. However, the performance of the system is adversely affected by the coil movement, which is a critical issue for high transfer efficiency. In this paper, a coupling tuning based impedance matching method is proposed to enhance and maximize the transfer efficiency of the system. The matching conditions are derived from power transfer model analysis using equivalent coil circuit model for optimum transfer efficiency. A simulation setup is developed in an electric automatic tool to testify the viability of the proposed technique, and verified against theoretical data. Applying this technique, the extracted  shows more than 9 dB improvement at both the strong and weak coupling regimes, and results transfer efficiency over 90% at close coil distance without changing the operating frequency. Compared to the conventional fixed coupling and LC circuit based matching technique, the proposed method shows efficiency enhancement about 9% - 20% at different coupling conditions.



Discrete Legendre Projection Methods for the Eigenvalue Problem of a Compact Integral Operator
Bijaya Laxmi Panigrahi, Jitendra Kumar Malik
Pages: 81-89
DOI: 10.20967/jcscm.2016.04.001

Close abstract |  Download PDF
Abstract

In this paper, we consider the discrete Legendre projection methods to solve the eigenvalue problem. Using sufficiently accurate numerical quadrature rule, we obtain the error bounds for gap between the spectral subspaces, eigenvalues and iterated eigenvectors for the eigenvalue problem in norm. We also obtain the superconvergence results for eigenvalues and iterated eigenvectors in discrete Legendre Galerkin methods. Numerical examples are presented to illustrate the theoretical results.



Analysis of Fourier and Non-Fourier heat conduction using Tiknonov based Well-conditioned Asymptotic Waveform Evaluation Technique
Sohel Rana, Ahmed Wasif Reza, Mohd Sayuti
Pages: 75-80
DOI: 10.20967/jcscm.2016.03.007

Close abstract |  Download PDF
Abstract

The unprecedented success of information technology has been focused by semiconductor industry to advance at dramatic rate. Thermal issues are hastily becoming one of the most challenging problems in high-performance chip design due to ever-increasing device. In the analysis of heat transport of IC chip, Fourier's heat conduction mechanism was frequently used. It is known that, this equation suggests a presumption of infinite thermal propagation speed. Then non-Fourier heat conduction model was used to forecast the rapid transient heat conduction process. A number of traditional iterative and moments matching based solvers can be found to analyze the Fourier and non-Fourier heat conduction model such as Runge-Kutta (RK) and Asymptotic Waveform Evaluation (AWE) technique. The iteration based RK method is computationally expensive and the AWE moment matching is inherently ill-conditioned.  In present work, Tiknonov based Well-conditioned Asymptotic Waveform Evaluation (TWCAWE) technique has proposed to analyze the Fourier and non-Fourier heat conductions. The TWCAWE technique is successfully able to avoid the ill-conditioning moment matching and also 1.2 times faster compared to AWE.



Evaluation Framework for Business Process Evaluation Approaches
Ayad Hameed Mousa, Norshuhada Shiratuddin, Muhamad Shahbani Abu Bakar
Pages: 69-74
DOI: 10.20967/jcscm.2016.03.006

Close abstract |  Download PDF
Abstract

Business Process Management (BPM) lifecycle consists of goals specification, through the other phases such as design, implementation, execution, enactment, monitoring and evaluation of BP During process enactment information collected about execution plans that are stored in the form of log files and database tables, with information systems (IS) and use .In the past decade it has emerged a new approach based on apply Business Intelligence (BI) in business process management. Since it is the Data Warehouse (DW), technique is the backbone of the BI. The comprehensive and detailed assessment of the use of DW in the process of business is scarce compared to heavily use the DW. Therefore, in this paper we extend the existing framework in order to propose a comprehensive framework (FBPEA) that can be used to evaluate the existing approaches used DW to store and manage post-execution data in BPM. Moreover, we have used this proposed framework in the evaluation of a number of studies for the period from 2001 to 2012 selected through of intensive and comprehensive study of these approaches.



A Class of 3-Generated Groups
A. Arjomandfar
Pages: 67-68
DOI: 10.20967/jcscm.2016.03.005

Close abstract |  Download PDF
Abstract

In this paper, the order of group G(n)=<a, b, c| anb2 =1, aca= c, a-1(bc)3a= cb-1 >, is considered, where n is a positive odd integer. Further, it is proved that the order of this class is equal to n.7n. In this way, the coset enumeration algorithm is used.



Merging Two Steganography Techniques Adjusted to Improve Arabic Text Data Security
Safia Meteb Al-Nofaie, Manal Mohammed Fattani, Adnan Abdul-Aziz Gutub
Pages: 59-65
DOI: 10.20967/jcscm.2016.03.004

Close abstract |  Download PDF
Abstract

Securing private texts to fully prevent any detection, is a technique called Steganography. This research work of Arabic text steganography focuses on improving the hiding secrets within Arabic language text utilizing the redundant extension “Kashida” letter as covering media. We propose modifying the “Kashida” stego-cover technique merging with a new way of embedding sensitive data within whitespaces. This modified merging was tested on hiding data within Arabic text of the last 30 Chapters of the Holy Quran (Sura Al-Buruj #85 to Sura An-Nas #114) comparing with both the normal method and the improved proposed one. The results demonstrated clear increase in the capacity as expected without degrading the security, which justifies this work for real promising research direction.



An Algorithmic Analysis of Degressively Proportional Apportionments
Janusz Łyko, Radosław Rudek
Pages: 53-57
DOI: 10.20967/jcscm.2016.03.003

Close abstract |  Download PDF
Abstract

This paper focuses on the analysis of degressively proportional allocation of seats in the European Parliament. We propose an approach, which involves a linear function holding boundary conditions on the minimum and the maximum number of seats for countries with the smallest and the greatest populations. On this basis and applying a branch and bound algorithm, we search the set of all feasible solutions to find degressively proportional allocations of seats such that the sum of the squared differences or the sum of the absolute differences between these allocations and the values provided by the defined linear function is minimized.



Optical Encryption Device for Software Protection
Abang Annuar Ehsan, Mohd Ridzuan Mohd Arip, Mohd Quyyum Sohaimi, Ibrahim Ghazi, Faieza Abd Aziz
Pages: 49-52
DOI: 10.20967/jcscm.2016.03.002

Close abstract |  Download PDF
Abstract

An optical-based hardware encryption device for software protection is proposed. Software piracy and illegal usage requirethat software operation is secured through a form of hardware protection. Electronic-based hardware keys such as dongle keysmay be vulnerable to attacks through reverse engineered technology. A simple optical device can be included as part of thehardware key where it can be used as an encryption device. Software users will require specific hardware key with built opticaldevice in order to operate the software. The LED activated optical device can produce encrypted signals via generated optical codessolely based on the geometrical feature of the optical device. A suitable form of optical code generating device is presented in theform of 1xN asymmetric waveguide coupler.



Aggregation of Flexible Chainlike Walkers in Off-Lattice Space
Takashi Mashiko, Yasuhiro Fujii
Pages: 45-48
DOI: 10.20967/jcscm.2016.03.001

Close abstract |  Download PDF
Abstract

Two-dimensional off-lattice behavior of chainlike self-driven objects is numerically studied. The objects undergo spontaneous, irreversible aggregation, irrespective of their deformability, in contrast with the on-lattice case in which aggregation is observed only when the objects are deformable. Also, we found that the tendency of aggregation increases with the decrease in the degree of deformability of each object or with the increase in the degree of fluctuation.



Visualization of Crime Data Using Self-organizing Map (SOM) and Improvement in SOM: A Review and Available Tools
Noor Maizura Mohamad Noor, Siti Haslini Ab Hamid
Pages: 37-43
DOI: 10.20967/jcscm.2016.02.003

Close abstract |  Download PDF
Abstract

Recently, the major challenge faced by all intelligence-gathering and law-enforcement organizations is to efficiently and accurately analyze the huge volumes of crime data. Self-organizing map (SOM) can be used to visualize crime data into more comprehensible presentation. Although visualization by using SOM has been done by many researchers, a literature review on the subject focuses on crime data has yet to be implemented. Thus, this study reviews researches on visualization of crime data using SOM and improvement in SOM (Fuzzy SOM or FSOM) together with their available software tools. Information and related works on visualization using SOM and FSOM were studied to fully understand the situation. The result of this study clearly shows that SOM and FSOM have been applied to visualize data in various fields of study. However, there is only limited use of them for visualization of crime data by the researchers. The popular software tool for visualization of crime data using SOM is Matlab, followed by Viscovery SOMine, R, GeoVISTA Studio and C/C++ compiler. Finally, this study concludes with a few suggestions for future researches on visualization of crime data.



Investigation into the Essence of Intelligence: The Theoretical Foundation and Design
Safawi Abdul Rahman, Haryani Haron, Fadhilnor Rahmad, AP Azli Bunawan, Mohamad Yusoff Mustafar, Haliza Ab Ghani
Pages: 31-36
DOI: 10.20967/jcscm.2016.02.002

Close abstract |  Download PDF
Abstract

The development of artificial intelligent systems mainly based on and imitated from human intelligence. However, there is a deviation among scholars and practitioners in artificial intelligence, philosophy and psychology realms about the essence of human intelligence and human intelligent behaviors. This paper re-looks into the issues of deviation in intelligence and intelligent behaviors, and describes the the oretical foundation and the design set forth fora proposed study to re-investigate the essence of intelligence. Inenabling a further investigation, the issues of intelligent theories,the quest of intelligence essence, the intelligent behavior andcomputation and the relationship between intelligent behaviors and artificial intelligence systems are addressed. The paper progresses to justify the investigation by discussing the nature of behavior with its respective issues that channel the discussion into intelligent processes and problem solving processes. Based on these justifications, the investigation embarks on Pragmaticism’s scientific method - a philosophical thought for “a clear idea” promoted by C. S. Peirce 1839 – 1914.



Preservation of Sharp Edges on 2D Drawing Using B-Spline Curve
Nur Soffiah Sahubar Ali, Ahmad Ramli, Nur Shafiqah Daud
Pages: 25-30
DOI: 10.20967/jcscm.2016.02.001

Close abstract |  Download PDF
Abstract

B-spline is widely used in computer graphics in order to construct a smooth curve. In this paper, we discuss about the detection of sharp points on a B-spline curve and the preservation of the sharpness at the corner of the edges as the degree of the curve increases. We have made the removal process for the data that use a huge number of points and then marked the sharp edge points which will be used to calculate the Euclidean distance between the control points. The formulation of automatic knot vector generationby manual marking of points close to the sharp edges is implemented to obtain an algorithm that is capable of detecting the sharp points. The smoothness of the curve is based on the increase in the degree or order of the curve. Thus, to preserve the sharpness of the edges, knot vector repetition is applied corresponding to the sharp points. In addition, knot vectors play an important role in preserving the sharpness of the edges because the changes in knot vectors will produce various shapes of the B-spline curve.



Sketch Based Image Retrieval by Using Feature Extraction Technique
Mohammad Hossein Torabi Motlagh Fard, Nazean Jomhari, Sri Devi Ravana
Pages: 21-24
DOI: 10.20967/jcscm.2016.01.004

Close abstract |  Download PDF
Abstract

Nowadays, touch screen technology makes drawing a sketch easier. It also makes searching and surfing easier for disabled children. Retrieving images with a sketch is a highly desired feature for disabled children with autism. The image retrieval system was defined as a computer system for searching, browsing and accessing the image. It is not easy for autistic children to recognize suitable keyword because of their lack of processing ability and memorizing the information in their mind; otherwise they are good in drawing sketch. In this paper, attention is placed on developing an image retrieval search engine based on sketch to aid children with Autism Spectrum Disorders in retrieving relevant images without needing to insert text based input.



A New Mechanism to Tag Collision Avoidance in Radio Frequency Identification (RFID) Systems
Somayeh Aghayi, Ahmad Habibizad Navin
Pages: 17-20
DOI: 10.20967/jcscm.2016.01.003

Close abstract |  Download PDF
Abstract

RFID tags are increasingly used for identifying and tracking purposes. In many applications, such as shop gateways, it is possible that more than one tag come within the range of the reader, which may interfere with the detection of tags or the data exchange. This paper presents a method based on the combination of CSMA and query tree to manage multiple accesses and avoid collision. This method is implemented in two stages. First, the tags with the unique short addresses are detected, and then remaining tags are identified in the next stage. The simulation results of the proposed method in MATLAB Software show improved common access parameters and reduced latency compared to the similar methods, which is due to the processing of the shortened address rather than the whole address.



Random Variables and Probability in Cricket Game Management
V. R. Lakshmi Gorty, Shashank Prabhu, Shaila Parekh, Dhwani Shah, Sachin Mistry, Mayank Tolia
Pages: 11-16
DOI: 10.20967/jcscm.2016.01.002

Close abstract |  Download PDF
Abstract

This paper focusses on the concept of random variables and probability in making a cricket management game through C++ programming. For a finite number of outcomes which occur on each ball that is bowled, a discrete random variable is generated and the outcome probabilities are estimated from the data being used in the game. The probability in the game has an effect on the batsman, number of wickets lost and number of balls remaining. The game behaves like a simulator which is used to predict the outcome in the matches being played by the user. The game is designed in such a way that the sample space changes, and the probability of the random variable generated changes as well according to the in-game options and decisions made by the user. The concept of random variables and probability is applied to make the foundation logic for this game. The skills help in understanding what strategy can be implemented to be on the winning side. The study is developed with an attempt to realistically model a T20 cricket match, and to help in reflecting major tendencies.



Finite Element Analysis of Precast Lightweight Foamed Concrete Sandwich Panel Subjected to Axial Compression
W. I. Goh, N. Mohamad, R. Abdullah, A. A. A. Samad
Pages: 1-9
DOI: 10.20967/jcscm.2016.01.001

Close abstract |  Download PDF
Abstract

Quasi static finite element analysis (FEA) was conducted on precast light weight foamed concrete sandwich panel (PLFP) using ABAQUS/Explicit module to study its structural behavior. The PLFP subjected to axial load was simulated under perfect and imperfect conditions. Results from the FEA were validated with experimental data accurately. The analysis produced ultimate load carrying capacity, damage criteria and vertical and horizontal displacement. It was found that the proposed finite element model for PLFP with perfect and imperfection conditions can predict the structural behavior of PLFP accurately. Therefore, a computational study by using FEA can be used as an economical alternative tool to replace the experimental study of structural behavior of PLFP.



powered by simple cms