Version-4 (Mar-Apr 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Abstract: Almost all Arab countries seek to implement e-government in their public administration. Different perspectives exist for e-Government approaches: Reduce the operation cost, save time and effort, as well as increase effectiveness and efficiency. All countries implementing e-Government faced different and somewhat similar challenges during their endeavor. Given similar cultural and administrative foundations, Arab countries may be expected to have some similar challenges. In this work, we collect and analyze government challenges in several Arab countries and compared them with other countries worldwide. We then classify these challenges into various domains such as technical, adoption approach, cultural, strategic and organizational.................
Index Terms—E-government, Challenges, EGDI, Arab World
[1]. Heeks, R., Most egovernment-for-development projects fail: how can risks be reduced? Vol. 14. 2003: Institute for Development Policy and Management, University of Manchester Manchester.
[2]. Furuholt, B. and F. Wahid. E-government Challenges and the Role of Political Leadership in Indonesia: the Case of Sragen. in Hawaii International Conference on System Sciences, Proceedings of the 41st Annual. 2008. IEEE.
[3]. Alshehri, M. and S. Drew. Implementation of e-government: advantages and challenges. in International association for scientific knowledge (IASK) E-ALT Conference proceedings. 2010.
[4]. Hwang, M.-S., et al., Challenges in e-government and security of information. Information & Security, 2004. 15(1): p. 9-20.
[5]. Ebrahim, Z. and Z. Irani, E-government adoption: architecture and barriers. Business process management journal, 2005. 11(5): p. 589-611.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Segmentation is to partition an image into meaningful regions for the purpose of clear identification of the objects in the picture. Algorithm for segmenting the videos of all format are proposed. The video is converted into frames. Each and every frame is segmented individually by using absolute differencing method and the segmented video is obtained. The frame is cropped such that it takes the news readers portion of the frame from the video. The Scope of the work is to identify the News reader with hands from the segmented videos.
Keyword—Absolute Frame Difference, Video Segmentation, Frame Cropping.
[1]. Y.Ramadevi, T.Sridevi, B.Poornima and B.Kalyani, "Segmentation and object recognition using edge detection techniques",
International journal of computer science and information technology, vol2, No 6, Decemeber 2010.
[2]. Madhurjya Kumar Nayak , Anjan Kumar Talukdarv, Kandarpa KumarSarma," An Adaptive Algorithm for Hand Segmentation and
Tracking for Continuous Hand Posture Recognition", Mobile and Embedded Technology International Conference (MECON-
2013) Proceedings published in International Journal of Computer Applications (IJCA).
[3]. R.Wren, A.Azarbayejani, T. Darrell and A.P.Pentland-Pfinder: real-time tracking of the human body, IEEE Trans.Pattern
Anal.Machine Intell, vol.19, pp. 780-785, July 1997.
[4]. https://www.mathworks.com/help/images/ref/imabsdiff.html
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Every school try to provide best transport facility to the student for saving the time to focus on their studies. Parents are as concerned about the safety measures a school has in place as they are about the level of education they expect the school to impart on their child. Here one way available in front of school that is tracking the school bus using GPS tracking system. High end GPS system is installed in the school vehicle all the signals from the vehicle are routed to an integrated central server for real time monitoring Information from the server can be transmitted via message alerts and Emails, or can be checked on the web or using mobile apps. This android app provides some features like application provide estimated arrival time of child to the parent before/after reach the bus on stop. Parent can track the bus using android application............
Keyword—Computer Communication Network ı.C.2.0 General, Data Communication, Open System Interconnection Reference Model, Security and Protection (e.g. Firewall), Mobility, Network Operations, Public Network, Distributed System, Client Server.
[1] R. Dang, J. Wang, S. E. Li, and K. Li, "Coordinated adaptive cruise control system with lane-change assistance," IEEETrans. Intell. Transp. Syst., vol. 16, no. 5, pp. 2373–2383, Oct. 2015.
[2] A. Jazayeri, H. Cai, J. Y. Zheng, and M. Tuceryan, "Vehicle detection and tracking in car video based on motion model," IEEETrans. Intell. Transp. Syst., vol. 12, no. 2, pp. 583–595, Jun. 2011.
[3] F. Fayad and V. Cherfaoui, "Tracking objects using a laser scanner in driving situation based on modelling target shape," in Proc. IEEEIntell. Veh. Symp., 2007.
[4] I. Skog and P. Handel, "Time synchronization errors in loosely coupled GPS-aided inertial navigation systems," IEEE Trans. Intell. Transp. Syst., vol. 12, no. 4, pp. 1014–1023, Dec. 2011.
[5] Comparison of advanced imputation algorithms for detection of transportation mode and activity episode using GPS data 2016.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Green Information and Communication Technology (ICT) is the study and practice of using computing resources efficiently to achieve economic viability and improved system performance and use while abiding by ethical and social responsibilities. Green ICT frameworks are useful in measuring and evaluating different organizations' Green ICT efforts. Some frameworks make it easier to interpret and measure green ICT than others, while some do not offer guidance on which metrics to use. Features of Green ICT frameworks have not been studied and documented adequately. Furthermore, existing green ICT frameworks are all static, and have one major limitation, that is the inability to specify realistic components for evaluating the implementation of green ICT. Equipment life cycle, end user computing and enterprise and data center are the maincomponents............
Keyword— ICT, Green ICT, Equipment Life Cycle, End User Computing and Enterprise and Data Center.
[1]. Bordens, K. S., & Abbott, B. B. (2011). Research Design and Methods A Process Approach. New York: McGraw-Hill.
[2]. Council of European Professional Informatics Societies (CEPIS). (2012). Energy Efficient Enterprise in Europe Green ICT Awareness in Organisations. Retrieved Augast 23, 2013, from http://cepis.org: http://cepis.org/media/GreenICTSurveyReport_v1.20131.pdf
[3]. Curtis, D., & Lingarchani, A. (2011). Green ICT System Architecture Frameworks. In B. Unhelkar, Handbook of Research on Green ICT: Technology, Business and Social Perspectives (pp. 446-457). New York: IGI Global.
[4]. Dawson, C. (2009). Introduction to Research Methods. Oxford : How To Content.
[5]. Denscombe, M. (2007). The Good Research Guide for small-scale social research projects. Berkshire: Open University Press.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Malware & Session Hijack Attack over Web Environments |
Country | : | India |
Authors | : | Jyoti Kushwaha || Dheeresh Soni |
: | 10.9790/0661-2002043035 |
Abstract: Web applications are very effective means of nitration between end-users. Today social networking based web applications are very popular due to its user friendly behavior but in recent years many social network sites have suffered from cross site scripting attacks and several business and private organization are suffered from the SQL injection attacks, which were conducted by suspicious users through inserting a vulnerable script into web form components. Network attack is a form of intelligent and sophisticated crimes in the web environment. Network based attacks are increasing at fast speed to hamper the smooth working of web resources. New trend in Network based attacks is a rising number of indirect attacks that manipulate network traffic, instead of directly entering into a network resource and damaging it.............
Keyword—Web environment, Network Attack, Malware attack, Session hijacks attack
[1]. Haron, H. "Cyber stalking The social impact of social networking technology" , IEEE 2010, pp 237 - 241
[2]. Limsaiprom and Prajit, "Social network anomaly and attack patterns analysis", IEEE 2010, pp 1 – 6.
[3]. Xuelei Wu Coll. of Transp. & Manage., DaLian Maritime Univ., Dalian Jia Chen and Bilan Rong, "Web Service Architecture and Application Research", IEEE 2009, pp 1–5.
[4]. Kasra Amirtahmasebi, Seyed Reza Jalalinia and Saghar Khadem, "A Survey of SQL Injection Defence Mechanisms", IEEE 2009, pp 1-6.
[5]. Ntagw Abira Lambert & Kang Song Lin, "Use of Query Tokenization to detect and prevent SQL Injection Attacks", IEEE 2010, pp 438-440.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The detrimental effects of high temperature on poultry production have been investigated by several researchers due to common occurrence of environmental stressors worldwide. It has been shown that high temperature negatively affects the welfare and significantly influence the survivability and performance of the poultry production. Hence, controlling the temperature of the poultry house within thermal neutral zone of poultry birds is indispensable in order to reduce their mortality and increase production. Most of the existing techniques utilized to control poultry house temperature within the thermal neutral zone of the bird were time consuming, tedious and require a continuous monitoring. In this study, a metaheuristic technique; Particle Swarm Optimization (PSO) algorithm is adopted to achieve an optimal control of thermal requirement of a poultry housing system. PSO is a computational search and optimization method that have been empirically shown to achieve well on several optimization problems. The experimental result obtained shows that the PSO in the regulation of the thermal requirement of the poultry house is computational efficient.
Keyword—Metaheuristic, Particle Swamp Optimization, Poultry House Temperature, Thermal Regulation.
[1]. Z. Fuzhang. Optimized Algorithm for Particle Swarm Optimization.World Academy of Science, Engineering and Technology International Journal of Physical and Mathematical Sciences, 3(3), 2016,
[2]. D. O Aborisade, S. Oladipo. Poultry House Temperature Control Using Fuzzy-PID Controller. International Journal of Engineering Trends and Technology (IJETT), 11(6), 2014,310-314.
[3]. H. A. Olanrewaju, J. L. Purswell, S. D. Collier and S. L. Branton. Effect of Ambient Temperature and Light Intensity on Growth Performance and Carcass Characteristics of Heavy Broiler Chickens at 56 Days of Age. International Journal of Poultry Science, 9(8),2010, 720-725.
[4]. M. Czarick and L. Michael. Poultry Housing Tips: Environmental Controllers. University of Georgia Cooperative Extension Service. College of Agricultural and Environmental Sciences, Athen, Georgia 30602, USA. 1994.
[5]. Liu Yi. Study on an Improved PSO Algorithm and its Application for Solving Function Problem. International Journal of Smart Home 10 (3) 2016), 51-62.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: [7] Student feedback is a process of collecting student reviews about the teacher's performance in order to evaluate the teacher's effectiveness. It hasthus the most powerful influences on learning and achievements. Its power is very often mentioned in different articles about learning and teaching, but surprisingly few recent studies have systematically investigated its meaning. Although feedback is among the major influences, the type of feedback and the way it is given can be differentially effective. Nowadays, technology is increasingly used by human being in every field. The concept of "Feedback Tracker"introduced in this paper is to digitalize and organize the feedback process. What makes the "Feedback Tracker" different from the traditional pen paper feedbacks is, it's set of complimentary criteria's taken into consideration, while..............
Keyword—Feedback, Performance Evaluation, Android SDK, Android Studio
[1]. The Student Satisfaction Inventory by Noel-Levitz (Survey)
[2]. Instruments for obtaining student feedback : A review of the literature Published in Assessment and Evaluation in Higher Education Vol. 30, No. 4, August 2005, pp. 387–415John T. E. Richardson
[3]. Challenges in Android Application Development : A Case StudyPublished in International Journal of Computer Science and Mobile ComputingVol. 4, Issue 5, May 2015, pp. 294-299By Abhinav Kathuria and Anu Gupta
[4]. Teaching and the Teacher Education Published in International Journal of Research and studiesVol. 24, Issue 1,Jan 2015, pp. 69-79
ByCarol-Ann Courneyaa, Daniel D. Prattb, John Collinsb
[5]. www.uml-diagrams.org/use-case-diagrams.html..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Due to rapid development of internet peoples are more dependent on Internet. Email messages is one the communication medium over internet. Some messages are true and some are fake. In this we developed a method to predict Phishy email. Our experimental results shows that results are very effective over existing method..
Keyword—Data Mining, Machine Learning, Pattern Matching, Weka
[1]. Activity, P., & Report, T. (2012). Phishing Activity Trends Report 1 Quarter
[2]. Iraqi, Y &Khonji, M.,. (2011).Lexical URLs analysis for separate legitimate and phishing e-mail messages. Secured and Internet Technology , 11–14.
[3]. Webb, S Irani, D.,.,Pu, C. &Giffin, J., (2008). Evolutional Study of Phishing.University of Computing Georgia Institute of Technology, Georgia..
[4]. SonicWall. (2008). Applied Bayesian Spam Classification to Phishing E-Mail. 2008 SonicWall.
[5]. Paaß, G., &Bergholz, A. (2009).AntiPhish - Machine Learning for Phishing Detection., Project Exhibition at ECML/PKDD 2009.7-8.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Overview On Integration Of Cloud Computing And Internet |
Country | : | India |
Authors | : | Sonia Arora || Rohit Sharma |
: | 10.9790/0661-2002046469 |
Abstract:Cloud computing and Internet of Things (IoT), two altogether different technologies, are both as of now part of our life. Their monstrous reception and utilize is required to increment further, making them essential segments of the Future Internet. A novel paradigm where Cloud and IoT are consolidated is predicted as problematic and an empowering agent of an expansive number of application situations. In this paper we concentrate on the incorporation of Cloud and IoT, which we call the CloudIoT paradigm. Numerous works in writing have overviewed Cloud and IoT independently: their fundamental properties, highlights, hidden technologies, and open issues. In any case, to..................
[1] Atzori, L., Iera, A., Morabito, G., 2010. The internet of things: A survey. Computer Networks 54 (15), 2787–2805
[2] Bassi, A., Horn, G., 2008. Internet of Things in 2020: A Roadmap for the Future. European Commission: Information Society and
Media.
[3] Carriots, 2014. https://www.carriots.com.
[4] Christophe, B., Boussard, M., Lu, M., Pastor, A., Toubiana, V., 2011. The web of things vision: Things as a service and interaction
patterns. Bell Labs Technical Journal 16 (1), 55–61.
[5] Dobre, C., Xhafa, F., 2014. Intelligent services for big data science. Future Generation Computer Systems 37, 267–281.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study On Recent Trends And Scenario In Cloud Computing Security |
Country | : | India |
Authors | : | Rohit Sharma || Sonia Arora |
: | 10.9790/0661-2002047074 |
Abstract: This paper means to recognize security challenges for adjusting cloud computing and their answers from genuine world for the test that don't have any legitimate relief procedures are distinguished. For this the goal is to recognize existing cloud computing security challenges and their answers. Distinguish the difficulties that have no alleviation methodologies and assemble arrangements/rules/hones from experts, for a test with more references however no moderation techniques recognized. The security issues of cloud computing as talked about in different research commitments. Cloud computing has been a hot examining territory of PC network innovation and information mining. As information mining requires extensive measure of information to be dug as opposed to contributing for assets at a similar place, cloud computing assets can be used. While outsourcing information to the mining procedure in cloud condition the respectability of information ought to be kept up. Here an exchange is being given on cloud computing security issues and arrangements as given in different research papers.
[1] Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, "Security and Privacy in Cloud Computing: A Survey", 2012
Sixth International Conference on Semantics, Knowledge and Grids (IEEE).
[2] Jayalatchumy D., Ramkumar P., Kadhirvelu D., "Preserving Privacy through Data Control in a Cloud Computing Architecture
using Discretion Algorithm", Third International Conference on Emerging Trends in Engineering and Technology (2014) IEEE.
[3] "Trust and Reputation Management", IEEE Internet Computing, 2011.
[4] Zhidong Shen, Qiang Tong, "The Security of Cloud Computing System Enabled by Trusted Computing Technology," 2012, 2nd
International Conference on Signal Processing Systems (ICSPS).
[5] Sravan Kumar R., Ashutosh Saxena, "Data Integrity Proofs in Cloud Storage", IEEE (2014).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This project is concerned about checking the Tuning Range of an Electric Horn used in automotives
and to display the values in digitized format. The displayed values are interfaced with computer for future
advancement. The vibration of the electric horn is used for measuring the tuning range, which decides its life
expectancy. The existing system used for measurement is an analog device, which requires frequent calibration
and appended labor for documentation. The project involves measuring of tuning range with the help of the
Accelerometer. The output from sensor is transmitted to microcontroller, which is interfaced with LCD and
UART for display and future enhancement.......
Key Word: Accelerometer, Electric Horn, Tuning Range, UART, Vibration
[1] Arjun Rajput, Ankita Jain (2015), "Basic Introduction to Micro Controller and its features", Published in International Journal of
Engineering Technology Science and Research (IJETSR) Vol.2, Issue.4.
[2] Jeetender Singh Chauhan, Sunil Semwal (2013), "Micro-controller based speed control of DC Geared motor through RS-232
interface with PC", Published in International Journal of Engineering Research and Applications (IJERA) Vol.3, Issue.1,pp.778-
783.
[3] Sindhuja. D, Mohandas Gandhi. N, Madhumathi. P (2012), "Redesigning of Horn Assembly Line Using Ecrs Principle", Publishes
in International Journal of Engineering and Innovative Technology (IJEIT) Vol.1, Issue.3.
[4] R. Devasaran, Pankaj Roy and Dr. Arvind Kumar Singh, Implementation of Fuzzy Logic Using Mems Accelerometer for
Controlling BLDC Motor Speed. International Journal of Electrical Engineering and Technology (IJEET). 4(2), 2013, pp. 65–70.
[5] Mr. B. Parthiban, Mr. John Powl.S, Mr. P.Sivaprakasam and Mr. N. Elayaraja. Micro-Controller Based Space Vector Modulation
(SVM) Signal Generator. International Journal of Electrical Engineering and Technology (IJEET). 4(6), 2013, pp. 33–44.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:The temperature in a distribution transformer can vary depending on the season of the year and load
it possesses. This temperature change influences the dielectric response of the distribution transformer. This
paper presents the results of the impact of temperature on dissipation factors of oil-paper insulation simulated
by varying oil level and temperature values. The dissipation factors were obtained by using AC/DC electric
current application mode in Finite Element Method software (COMSOL Multiphysics). The results show that
when insulating oil is at the same level, the dissipation factor values are sensitive to temperature change.
Key Word: COMSOL Multiphysics, dissipation factor, distribution transformer, insulating oil level, insulation temperature, oil-paper insulation.
[1] United States Department of the Interior Bureau of Reclamation, "Permissible Loading ofOil -Immersed Transformers and
Regulators", [Online].Available: https://www.usbr.gov/power/data/fist/fist1_5/vol1-5.pdf [Accessed 15 September 2017].
[2] The World Bank Group, "Climate Change Knowledge Portal for Development Practitioners and Policy Makers",
[Online].Available:
[3] A. M. Emsley and G. C. Stevens, "A Reassessment of the Low Temperature Thermal Degradation of Cellulose", 6th International
Conference of Dielectric Materials, Measurement Applications, UK, pp. 229-232, 1992.
[4] Z. Dianchun, L. Baomin, Y. Li and Z. Dianwang, "Thermal Aging Behaviour of the Oil-impregnated Paper at I60°C", IEEE 5th
Int'l. Conf. Properties and Applications of Dielectric. Materials, Seoul, Korea, Vol. 1, pp. 256-258, 1997.
[5] M. Koch and T. Prevost, "Analysis of dielectric response measurements for condition assessment of oil-paper transformer
insulation", IEEE Trans. Dielectric. Electr. Insul, Vol. 19, pp. 1908-1915, 2012..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Thermal Study of Combustion Adjusted Chamber of Spark Ignition Engine |
Country | : | India |
Authors | : | Namrata mishra || Manas Kumar Samantaray |
: | 10.9790/0661-2002048692 |
Abstract: Efficiency of an interior ignition motor can be expanded by expanding the warmth vitality age inside
the burning chamber without affecting the exhibition of l ubricating oil and reducing the quality of the cylinder.
The principle point of this paper is to decide temperature dispersion in a four-stroke, single-chamber, water
cooled, variable pressure proportion (3-9), variable speed (2200-3000 rpm) flash start motor with brake
intensity of 2.2 kW at a speed of 3000 rpm with copper covered burning chamber (CCE) [copper-(thickness, 300
μ) was covered on cylinder crown, inward side of liner and chamber head] and thought about the motor, with
ordinary ignition chamber (CE) with slick fuel activity. Copper covered force cylinder, copp.
Keywords: Copper Coating, Piston, Liner, Solid Works, Ansys Workbench, Thermal Analysis
[1]. Khopkar, S.M., 2010, "Environmental Pollution Analysis," New Age International (P) Limited, Publishers, New Delhi, pp.180 -190.
[2]. Murali Krishna, M.V.S., and Kishor,K., 2008, "Performance Of Copper Coated Spark Ignition Engine With Methanol–Blended
Gasoline With Catalytic Converter, "Indian Journal (CSIR) of Scientific and Industrial Research, 67,July,543–548.
[3]. Kishor, K., Murali Krishna, M.V.S., Gupta, A.V.S.S.K.S., Narasimha Kumar, S., and Reddy, D.N, 2010, "Emissions From Copper
Coated Spark Ignition Engine With Methanol Blended Gasoline With Catalytic Converter," Indian Journal of Environmental
Protection, 30(3), pp.177–183
[4]. Murali Krishna, M.V.S., Kishor, K., Murthy, P.V.K., Gupta, A.V.S.S.K.S., and Narasimha Kumar, S, 2010, ".Performance
Evaluation Of Copper Coated Four Stroke Spark Ignition Engine With Gasohol With Catalytic Converter," International Journal of
Engineering Studies, 2(4),pp.465–473.
[5]. Murthy, P.V.K., Narasimha Kumar, S., Kishor,K., and Murali Krishna,M.V.S., 2011, "Aldehyde Emissions From Two-Stroke And
Four-Stroke Spark Ignition Engines With Catalytic Converter Running On Gasohol," International Journal of Fuels and Lubricants,
50(2), pp.137-156.