Author Archives: Kamran Khan

A Neuro-Finite Element Analysis of Partial Differential Equations of Solid Mechanics

Sangeeta Yadav¹, K.K. Pathak² and Rajesh Shrivastava³

View:    Abstract |  HTML Full Text |  PDF |  XML|

Numerical analysis of Partial Differential Equations (PDE's) of the solid mechanics using Finite Element Method (FEM) is very popular. One issue which is haunting the finite element solution is the computer time. Finite Element Analysis (FEA) using fine mesh and large number of nodes consumes lot of solution time. To overcome this difficulty, a hybrid Neuro-FEM is proposed. FEM solutions considering coarse mesh is used for training neural networks which is further employed for finer predictions. The proposed methodology is successfully employed on a cantilever beam problem.

Hide Abstract

Study and Model Formulation for Curved Surface Using Computational Fluid Dynamics (CFD)

R.E. Shelke¹* and L.B. Bhuyar²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Impinging jets on curved surfaces are important in many industrial applications. Experimentation have been carried out for heat transfer evaluation between the impinging air jets and curved surfaces in the prior research. An attempt has been made towards the model development using Computational Fluid Dynamics (CFD) to validate the experimental results obtained for curved surface in the present study. This attempt is made because, the physical model experimentation is time consuming and cumbersome as well as costlier affair. Hence, if the CFD model is developed in accordance with the results obtained earlier and if it is in good agreement with the same then using the same procedure, the CFD models for flat and rough surface can also be formulated, thereby, reducing the efforts of actual experimentations in future.

Hide Abstract

Techniques of Wireless Intrusion Detection System: T-WIDZ

Rajshekhar M. Patil¹, Mamitha R. Patil² and K. V. Ramakrishnan³

View:    Abstract |  HTML Full Text |  PDF |  XML|

Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection-a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) in computer network security are real-time software assessment by monitoring for suspicious activity at the network and system layer. Software scanner allows network administrator to audit the network for vulnerabilities and thus securing potential holes before attackers take advantage them. The network traffic datasets provided by the DARPA 1998 offline intrusion detection project are used in our empirical investigation, which demonstrates the feasibility and promise of unsupervised learning methods for network intrusion detection using UML diagrams. The goal of this paper is to place some characteristics of good IDS and examine the positioning of intrusion detection as part of an overall layered security strategy and a review of evaluation criteria for identifying and selecting IDS.

Hide Abstract

Heat Transfer Between Impinging Circular Air Jet and Finned Flat Plate and Validation of Results Using Artificial Neural Network

R.E. Shelke¹* and L. B. Bhuyar²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Impinging jets on rough surfaces are important in many industrial applications. The surface may become rough for many reasons. Roughness may arise from manufacturing processes, a long time in service and/or natural occurrences such as rain, snow, frost etc. Prior research indicate that the average roughness height on in-service gas turbine blades may vary from 1.5um to 10um.This is very rough considering the thickness of the boundary layer is of the order of 1 mm.Similarly,there are some industrial applications like spray formed billet cooling by impinging jets where the target and the jet are not orthogonal but the oblique.Therefore, study of inclination of target plate on heat transfer between impinging jet and rough flat plate is important. In the present work, inclination effect is studied for the oblique angles of 45°, 60° and 75° at a given Z/D of 1 and Reynolds number of 23000. The rough surfaces are in the form of hexagonal prism of side 2.04 mm and height of 2 mm spaced at a pitch of 7.5 mm on the target plate.The experimental results are validated using Artificial Neural Network (ANN).It has been observed that the validation using ANN gives the correlation coefficient (R²) as 0.998 to 1.

Hide Abstract

Study Recycling of Plastic and Crts From Electronic Waste

Preeti Jain¹, Mukata Rani Bhawsar² and Jitendra Bhawsar³

View:    Abstract |  HTML Full Text |  PDF |  XML|

The major objective of this paper is to build capacity of practitioners and decision makers to guide and handhold them to plan, design and implement E-waste management. It includes policy, collection, transportation and treatment in a city geographical area and country, here is a scope of further reduction of technology costs if the developing country has got infrastructure to for the local fabrication of machinery and equipment. A key recommendation is that the outstanding logistics issues are addressed in order to enable recyclers to define optimized processes for materials acquisition, processing and recovery. WEEE deposited at CA and other central collection sites should be segregated as far as possible into distinct streams that are compatible with subsequent transport and recycling technology choices. There is an ongoing need to educate designers regarding choices of materials and the implications of their choices on materials recycling.

Hide Abstract

Optimized Binary Merge Coding for Lossless Image Compression

N. Subhash Chandra1, M. Bala Raju2, S. Mahaboob Basha3 and A. Govardhan4

View:    Abstract |  HTML Full Text |  PDF |  XML|

Digital Spatial Image Processing is a rapidly evolving field with growing applications in Science and Engineering. Spatial Image data requires considerable storage capacity and transmission bandwidth. Despite rapid progress in mass-storage density, processor speeds, and digital communication system performance, demand for data storage capacity and data-transmission bandwidth continues to outstrip the capabilities of available technologies. This is a crippling disadvantage during transmission & storage. So, there arises a need of efficient Image Compression Techniques for compression . This paper deals with Optimized Binary Merge Coding for data compression, which is a modification to the Binary merge coding. Like in BMC the Optimized Binary Merge Coding uses Huffman coding after the modified Binary Merge Coding. The results of the Optimized Binary Merge Coding are compared with Binary Merge Coding and JPEG. An experimental result shows that Optimized Binary Merge Coding improves compression rate compared to Binary Merge coding. The same algorithm can be extended to color images.

Hide Abstract

A Survey of MANET Reactive Routing Protocols Under Different Mobility Models

M.K. Jeya Kumar1 and R.S. Rajesh2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Ad Hoc Networks is a multi - hop wireless network with dynamically changing network connectivity owing to mobility. It consists of a collection of wireless mobile nodes it will act without the use of any existing infrastructure or centralized administration. With this flexibility, networks can be formed anywhere, at any time, as long as two or more wireless users are willing to communicate. In such a dynamic network routing is a challenging problem Different routing protocols are designed assuming certain mobility patterns of the mobile nodes in the network. However the choice of mobility pattern may favor certain protocols over the others. Hence it is necessary to study the performance of different routing protocols under different mobility models. In this work two mobility models with high mobility and Low mobility constraints have been considered which mirror the realistic mobility patterns of the mobility nodes with high mobility and low mobility. The two reactive protocols AODV and DSR are examined based on the traces derived for each of these mobility models for various speed of the mobile nodes, Traffic and Node Density in the network. An analysis of the results obtained from the simulations shows that the AODV protocols in Boundless Simulation Area model performs better than DSR. Based on the observations, it is to suggest that AODV routing protocol can be used under high mobility since it outperforms DSR protocols.

Hide Abstract

Artificial Neural Network Based Hybrid Algorithmic Structure for Solving Linear Programming Problems

L.R. Arvind Babu* and B. Palaniappan

View:    Abstract |  HTML Full Text |  PDF |  XML|

Linear Programming Problems are mathematical models used to represent real life situations in the form of linear objective function and constraints various methods are available to solve linear programming problems. When formulating an LP model, systems analysts and researchers often include all possible constraints although some of them may not be binding at the optimal solution. The presence of redundant constraints does not alter the optimum solution(s), but may consume extra computational effort. Redundant constraints identification methods are applied for reducing computational effort in LP problems. But accuracy of the LP problems goes down due to this reduction of loops and constraints. To achieve optimality in accuracy and also in computational effort, we propose an algorithm, called, hybrid algorithm, it trains the constraint and parameter before applying the formal methodology

Hide Abstract

Wireless Mesh Networks – Reliability and Flexibility

K.Rama Krishnaiah¹*, B. Ramesh Babu², T. Pavan Kumar1 and K.Rajasekhara Rao1

View:    Abstract |  HTML Full Text |  PDF |  XML|

With the increasing use of wireless sensor networks in industrial settings, a new type of network topology, mesh networks, has emerged in today's market. The success of wireless networks in every field has made wireless networks, an emerging key technology for the next generation wireless networking. The various features of wireless mesh networks have attracted the research community, which led to the rapid growth of this technology, inspiring many applications. Many challenging technical issues still exist in this field. This paper compares the reliability and flexibility of the mesh network with other two traditional wireless network topologies, namely point-to-point and point-to-multipoint networks, and illustrates why and how the mesh network has advantages in these areas with the help of a case study.

Hide Abstract

Effect of Surface Area on the Electronic Parameters of Vacuum Deposited Bismuth-Silicon Junctions

S. S. Oluyamo and O. P. Faromika

View:    Abstract |  HTML Full Text |  PDF |  XML|

The study investigates the effects of surface area on the electronic parameters of bismuthsilicon junctions at room temperature. The desired samples were obtained using vacuum deposition technique. Electrical characteristics of the samples were carried out at electric field value 10 - 60V/m. The surface conductance, ideality factor and barrier height of the samples were determined at different surface areas. The result of the study showed that the surface areas of the junctions have effects on the surface conductance while the values of the ideality factor and the barrier height had no significant dependence on the surface area of the junctions. In addition, the values of the ideality factor range between 0.70 - 0.83, an indication that the junctions are close to being ideal. This also stresses the fact that vacuum deposition is an ideal method for making metal-semiconductor junctions.

Hide Abstract

Approaches in RSA Cryptosystem Using Artificial Neural Network

Siamak Haghipour and Babak Sokouti*

View:    Abstract |  HTML Full Text |  PDF |  XML|

RSA cryptosystem, the first public key cryptography presented in 1977. Neural networks are often used as a powerful discriminating estimator for tasks in function approximation. This paper describes a neural-network-based method relies on Radial Basis Function and Levenberg-Marquardt Backpropagation for estimating the behavior of the function used in RSA cryptosystem to calculate the function. The difficulty of the RSA cryptosystem relies on the difficulty of the factorization, to have the RSA cryptosystem broken, it suffices to factorize N which is the product of two prime numbers p, q (N=p.q). This will be equivalent to calculate the Euler function φ(N)=(p-1)(q-1) .

Hide Abstract

XML-Based Process Definition Tool for a Workflow Management System (WFMS)

Amin Y. Noaman and Nada M. Al-Mani

View:    Abstract |  HTML Full Text |  PDF |  XML|

A Workflow is an automation of a business process. In general, the process model describes the activities performed and their relations. It could be defined by using the process definition tool, which is one of the Workflow Management System (WFMS) components. Technically, fixed workflow structure is a major problem that could be faced by any WFMS. It is lacking of reusability and flexibility needed during runtime, i.e. once a workflow has started; changes to system and process structure are no longer feasible. This research proposes a framework that supports designing and implementing of a general purpose process definition tool with a graphical user interface. The business process modeled by this tool presented internally in an XML schema file. The elements of this schema are the activities of the model which will be parsed and transformed to a graphical notation whenever loading the model. In addition, the defined process in whole could be used as an activity in other business model into the interface. Then, the process will be automated on process engine that has empowered with the required flexibility to dynamically modifying the structure of a running instance.

Hide Abstract

Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses

A.Venkateswara Rao1* and Mandava V. Basaveswara Rao2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. However, until recently, these techniques were not commonplace in computer viruses. The CodeRed worm was a major shock to the antivirus industry since it was the first worm that spread not as a file, but solely in memory by utilizing a buffer overflow in Microsoft IIS. Many antivirus companies were unable to provide protection against CodeRed, while other companies with a wider focus on security were able to provide solutions to the relief of end users. Usually new techniques are picked up and used by copycat virus writers. Thus, many other similarly successful worms followed CodeRed, such as Nimda and Badtrans. In this paper, the authors will not only cover such techniques as buffer overflows and input validation exploits, but also how computer viruses are using them to their advantage. Finally, the authors will discuss tools, techniques and methods to prevent these blended threats.

Hide Abstract

Delay Adjust Mac Protocol for Energy Efficiency in Wireless Sensor Networks

V. Srikanth¹ and I. Ramesh Babu²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Medium Access Control (MAC) Protocol are designed to improve energy efficiency inorder to prolong lifetime of node in Wireless Sensor Networks, where they exploit listen/sleep cycles to conserve energy. These cycles of nodes influence the network performances such as energy efficiency, packet latency and throughput in these networks. The issue of performance enhancement of wireless networks in terms of overhead messages per node and energy consumption is an important challenge. In this paper we present different MAC protocols and propose a new Delay Adjust MAC protocol for Wireless Sensor Networks and summarize how this protocol provide energy-efficiency and throughput, over well known MAC protocols.

Hide Abstract

Coping and Limitations of Genetic Algorithms

A. Venkateswara Rao¹*, G.A.V.Ramachandra Rao¹ and Mandava V. Basaveswara Rao²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Genetic Algorithms (GA’s) are adaptive heuristic search algorithm premised on the evolutionary ideas of natural selection and genetic. The basic concept of GA’s is designed to simulate processes in natural system necessary for evolution, specifically those that follow the principles As such they represent an intelligent exploitation of a random search within a defined search space to solve a problem. Genetic Algorithms has been widely studied, experimented and applied in many fields in engineering worlds. Not only does GA’s provide alternative methods to solving problem, it consistently outperforms other traditional methods in most of the problems link. Many of the real world problems involved finding optimal parameters, which might prove difficult for traditional methods but ideal for GA’s. However, because of its outstanding performance in optimization, GA’s has been wrongly regarded as a function optimizer. In fact, there are many ways to view genetic algorithms.GA’s as problem solvers GA’s as challenging technical puzzle GA’s as basis for competent machine learning GA’s as computational model of innovation and creativity GA’s as computational model of other innovating systems GA’s as guiding philosophy However, due to various constraints, we would only be looking at GA’s as problem solvers and competent machine learning here. We would also examine how GA’s is applied to completely different fields. Many scientists have tried to create living programs. These programs do not merely simulate life but try to exhibit the behaviors and characteristics of real organisms in an attempt to exist as a form of life.

Hide Abstract

A Secure Protocol for Authentication of Passwords Using Delayed Password Disclosure

V. Srikanth, T. Pavan Kumar, A. Sushma and K. Rajani

View:    Abstract |  HTML Full Text |  PDF |  XML|

Phishing is a type of attack in which the attackers lure the users to submit their personal information like passwords, credit card details etc. Passwords and security are a perennial problem we all face when using the Internets. There are various solutions, but none of them are perfect. Even the strongest encryption technologies available for common use could be broken given enough computer power or just simple luck on the part of a hacker. But, that doesn’t stop computer scientists from trying to come up with new ways to make us electronically safe. So, an authentication protocol namely, Delayed Password Disclosure is designed. The protocol’s goal is aimed at reducing the effectiveness of phishing/spoofing attacks that are becoming increasingly problematic for Internet users. It does provide a user with the tools necessary to recognize an ongoing phishing attack, and prevent the disclosure of his/her entire password, providing graceful security degradation.

Hide Abstract

Brain Gate Technology

G.Rajendra Kumar¹, Samuel Vara Prasada Raju² and D.Santhosh Kumar³

View:    Abstract |  HTML Full Text |  PDF |  XML|

Who would have thought that in only a decade we would be able to read minds, or at least translate thoughts into actions without having to say a word? Advances in Neurotechnology have made great strides since the field’s original arrival in the scientific community. The development of a small microchip that when implanted in the brain would enable patients, such as those with ALS, to communicate effectively is the goal. Neurotechnology is making significant advancements in the field of medicine. It is the science of altering signals from the Central Nervous System to obtain a desired or effect. The studies conducted on monkeys have shown that it is possible for an animal to use a very small electrode array device located in the brain to control the movement of a prosthetic limb or other biomedical device. At the University of Pittsburgh, an experiment is conducted to show that a monkey could control a prosthetic device in order to feed itself. In addition to testing the animals, there have been studies involving human subjects in which a computer was used to operate a mechanical arm by harnessing signals from the brain and pressure from the skin. Cyberkinetics Neurotechnology Systems Inc. created a cyberkinetic system known as the BrainGate Neural Interface System, is able to transform thoughts into actions by monitoring neural signals from the motor cortex. The first patient to receive an implantation of a multi-electrode recording array into his brain for the purpose of monitoring his brain activity was twenty-five year old Matthew Nagle.The dream of BrainGate program is to develop a fast, reliable and unobtrusive connection between the brain of a severely disabled person and a personal computer.

Hide Abstract

Using UML for Automatic Test Generation

Y. Prasanth, K. Subbarao and L. S. S. Reddy

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper presents an architecture for model-based verification and testing using a profile of the Unified Modeling Language (UML). Class, object, and state diagrams are used to define essential models: descriptions that are relatively complete. Object and state diagrams are used to introduce test directives. Models written in this profile may be compiled into a tool language: the Intermediate Format (IF). Descriptions written in IF can be animated, verified, and used to generate tests. As well as defining the profile for UML, the paper explains the basis of the compilation into IF, and reports upon the problems encountered.

Hide Abstract

Toward a Model of M-Learning for Enhancing Dissemination of Information Among Nigerian Farmers

O.K. Boyinbode and K.G. Akintola

View:    Abstract |  HTML Full Text |  PDF |  XML|

Mobile learning (M-Learning) is the point where mobile computing and e-learning intersect to produce an anytime, anywhere learning experiences. Advances in mobile technologies have enhanced M-learning tools at just the right moment to meet the need for more cost- effective just in time information. Electronic Learning offer methods, which decrease the limitations of traditional education but M-learning offers more. This paper discusses the existing devices and technologies appropriate to realize Mobile learning, and its benefits in improving the spread of information among Nigerian farmers through SMS technology.

Hide Abstract

The Electronic College: A Study of the Effectiveness of Electronic Management Systems Within Colleges

Arwa Yousef Al-Aama

View:    Abstract |  HTML Full Text |  PDF |  XML|

Electronic Management Systems (EMS) today play an important role in organizations as they simplify managerial tasks, improve resource utilization and improve efficiency. King Abdul-Aziz University is a leader in the use of technology among Saudi universities. Its focus, like several other universities, has been on building centralized EMSs which tie different departments across campus using a centralized network. The systems, however, do not aim to automate managerial tasks within the colleges themselves. As the amount of managerial work within colleges is huge and redundant, this research aimed to evaluate the effect of automating college’s internal affairs on performance. An EMS (EAASy) was built for the Academic Affairs department of the Women’s College of Computing & Information Technology and was used as a test-bed to evaluate the effectiveness of an EMS within the College. Both manual & electronic systems were used for an entire semester for comparisons. Quantitative and qualitative measurements were used. Statistically significant differences between the two systems were found. This paper includes an overview of the research methodology used in this project. It also includes results, implications, and recommendations established by the researcher.

Hide Abstract

Failures of Network Security Utilities

Mandava V. Basaveswara Rao and Ch. Naga Manisha

View:    Abstract |  HTML Full Text |  PDF |  XML|

Main aim of network securities is to maintain confidentiality for the user sensitive data. For this purpose, there are lot many Network Security utilities are available in the market for securing the user data. But no utility is proved perfect for securing the system. Because threats are either by wrongly motivated human activities or highly powerful threats introduced at any moment. Every moment threats greatly challenges the systems.

Hide Abstract

Multi-User Communication Through Ambient Intelligence Devices Using H. 323 Protocol

B. Vijaya Babu¹, M. Surendra Prasad Babu² and P. Sunitha³

View:    Abstract |  HTML Full Text |  PDF |  XML|

Ambient Intelligence devices are developed from Ubiquitous computing and communications and Intelligent User –friendly Interfaces. Ambient Intelligence refers to electronic environments that are sensitive and responsive to the presence of people. These devices provide vocal interaction with users but serve only a single-user Environment. H. 323 is a standard that specify many components, protocols and procedures that serve establishing multi-user communication. In our research, we embedded supportive H. 323 components to those of ambient device architecture and proposed a new architecture that supports multi-user communication environment through Ambient Intelligent devices. We threw light on advantages of using H.323 over other protocols.

Hide Abstract

An Intelligent System for the Characterization of Hyperlipidemic Blood and a Comparative Study on the Efficacy of Statins

S. Djodilatchoumy1, N. Rama2 and S. Gunasekaran3

View:    Abstract |  HTML Full Text |  PDF |  XML|

Elevated lipid level is supposed to be one of the main risk factors for cardiovascular diseases. Therefore lipid lowering is one of the major target in cardiovascular treatment and prevention. Hence hyperlipidemic blood has to be identified and lipid level has to be lowered. Atorvastatin and simvastatin are the lipid lowering agents, they lower the low density cholesterol. For the characterization of hyperlipidemic blood, the FTIR spectra of blood sera of 20 healthy people and 20 hyperlipidemic patients of the same age group were recorded and fed as input to our system.To study the efficacy of statins, the FTIR spectral data of blood sera of the 20 hyperlipidemic patients of the same age group and blood group were recorded and fed as input to our system. Our system is trained to distinguish between the healthy and hyperlipidemic blood. Some remarkable differences are identified by our system. Both the statins were well tolerated and it is concluded from the results that Atorvastatin is more efficacious than simvastatin in modifying lipids in patients with hyperlipidemia and a high coronary heart disease risk. FTIR spectroscopy allows accurate lipids concentration determination. The results obtained from our System are well supported by both spectroscopic data and clinical data. Since our system is trained to distinguish the hyperlipidemic blood with the fine details of FTIR spectra, it can improve the diagnostic accuracy and rate of cardiovascular treatment and also it can analyze the efficacy of statins at a faster rate with more accuracy.

Hide Abstract

Cell Phone as a Portable Storage Device and Beyond

Vaishali Mishra¹, Suhas Patil² and Ashutosh Mishra³

View:    Abstract |  HTML Full Text |  PDF |  XML|

The introduction of personal computing and wireless communication technology provides an option for on site device software updating and data retrieving. This is especially true for any devices sitting in a remote site where computing network is not accessible. In many advanced computing systems, frequent software updating and configuration profiles refreshing are required. This is clumsy and error prone procedures when users are not familiar with the operating systems. Suppose all the necessary files and programs are predefined in a mobile phone. All necessary files and software can be transferred to the corresponding computing devices and PCs at remote sites through wireless communication links such as Bluetooth/infrared. This idea helps to solve the initial installation cost of a communication network to a remote site. Index Terms - Bluetooth, mobile communication.

 

Hide Abstract

An Optimized Call Routing Technique Using Session Initiation Protocol

B. Vijaya Babu¹, M. Surendra Prasad Babu and P. Sunitha

View:    Abstract |  HTML Full Text |  PDF |  XML|

Revolutionary changes took place in the modern communication world. Mobiles and internet have changed the way people communicate with each other. Nowadays every busy person has many devices for communicating with others such as a mobile phone, a telephone and a PC at his home, a telephone and a PC at his office etc. People call using a telephone or PC to communicate with that particular user according to their convenience (using the device which is along with them). But the user may not be present at that particular device. Hence the user may have to loose some calls. Those calls may be very important or urgent calls. This paper ICR aims to solve the above problem. In order to avoid this problem we should route the call to the current user location irrespective of the device used by the other user. We check the current location of the user and route the call to that location. For this we maintain a schedule for every user in the database provided in the server of the service provider. Whenever call comes to a particular user it checks the schedule of that user, finds his location and routes the call to that location. Hence this application can also be called as Schedule Based Calling. For implementation of this application we require a protocol which works for all the devices in order to create a session between any two different devices. Hence we use Session Initiation Protocol (SIP). Session Initiation Protocol is an application layer control signaling protocol used to create (initiate), modify and terminate sessions. Session represents the type of data transfer between two devices such as audio, video etc. SIP only initiates, modifies and terminates sessions. It does not provide any information about data transfer. Data transfer is done using other protocols such as RTP, RTSP etc. type of session is defined by Session Description Protocol (SDP).

Hide Abstract

Data Warehousing Practices in Business Initiatives

G. Vijay Kumar and M. Sreedevi

View:    Abstract |  HTML Full Text |  PDF |  XML|

The paper presents the data warehousing architecture and practices used at a major. Retailing company. Many considerations were assessed when deciding which data warehousing architecture to adopt. The paper discusses the two pre-dominant styles in data warehousing, namely the “Bill Inmon Style” or the top-down approach and the “Ralph Kimball Style” or the bottom-up approach. The com-pany chose the Inman style due to a unique combination of circumstances in their business and technical environments, which are being discussed in detail. Much of the information presented in this paper is based upon the direct experiences of the lead data architect assigned to the projects under which this retailing company’s customer data warehouse evolved. The architecture has evolved over time and currently has been accepted at the company as a best practice. It is interesting to mention that both the hardware platform (CPU and disk drives) and Relational Database Management System (RDBMS) soft-ware employed today at this company for data ware-housing is not the same as was selected for the first instantiation. The implication was that the best plan or practice was a flexible one. There were many challenges, like organizational, technical, data sourcing and data naming, needed to be solved during the pre-project, initial stages, and throughout the project and beyond. The initial data warehouse, implemented in 1996, was termed an overall success and approved for expansion. The current data warehouse data are being used by over six hundred registered users to fine-tune customer marketing and leverage and share data in an enterprise manner. The data warehouse has allowed the company to strengthen customer relation-ship management (CRM) core capabilities and business partnerships. Today, there are many departments benefiting from queries and requests for data warehouse data, many anticipated, some not.

 

Hide Abstract

An Algorithm for Effective Web Crawling Mechanism of a Search Engine

B. Vijaya Babu¹, M. Surendra Prasad Babu² and Y. Chetan Prasad.3

View:    Abstract |  HTML Full Text |  PDF |  XML|

Broad web search engines as well as many more specialized search tools rely on web crawlers to acquire large collections of pages for indexing and analysis. Such a web crawler may interact with millions of hosts over a period of weeks or months, and thus issues of robustness, flexibility, and manageability are of major importance. In addition, I/O performance, network resources, and OS limits must be taken into account in order to achieve high performance at a reasonable cost. Current-day crawlers retrieve content only from the publicly indexable Web, i.e., the set of web pages reachable purely by following hypertext links, ignoring search forms and pages that require authorization or prior registration. In particular, they ignore the tremendous amount of high quality content “hidden” behind search forms, in large searchable electronic databases. Also even if there is good data collection that has been indexed we would be able to look at those sites having these info only if we are connected to the internet and may be the days where hourly based nets used to be major providers of internet are gone, these days the broadband facilities, high speed net connections are available to the common man. But, the growth in the usage of laptops is even growing at same pace, in that case one may not be able to access the net where ever he moves and if any important pages on the net in a particular web site would be of no use even he has good configuration, as still it takes time for the wi-fi networks to come in to full swing, until then saving every page of a particular website may be a hectic task. In this paper, would provide a framework for addressing the problem of browsing the web even when offline.

 

Hide Abstract

Simulation of Flat Rolling and Analyzing of Rolling Pressure Profile

Ali Akbar Mottahedi

View:    Abstract |  HTML Full Text |  PDF |  XML|

Rolling is an important process in metal forming because of high productivity and production tonnage of wrought metals. Hence, any interruption in rolling line or wastage has large costs. So, technological research or any change in rolling process is difficult along with a high risk of cost in industrial scale. Thus, rolling simulation by computer and using of software could make rolling research easy. Analysis of pressure profile on rolls and maximum rolling pressure in flat rolling process is very important in metal forming investigations. It is also significant in controlling of force, power, rolls, rolling process and so on. The author of this paper had a project in the field of computer simulation of flat rolling by making software. This paper is about to show the simulation of flat rolling process by using of that software and experimental industrial experience. Analysis of the rolling pressure profile and maximum rolling pressure is also shown for an Aluminum alloy in this software.

Hide Abstract

Evaluating the Impact of Internet on Research in Nigeria

B. A. Ojokoh¹*, O. S. Adeola¹ and D. M. Okewole²

View:    Abstract |  HTML Full Text |  PDF |  XML|

The benefits accrued from the advent of the Internet especially in developing countries can not be overemphasized. At the click of a button on a desktop, Internet users can have access to vast information that covers almost all areas of human endeavors. This has made Internet the greatest achievement of the century. Research in the past for all levels of Nigerian researchers used to be tedious and done under stress. Most times, there used to be inadequate information that is required to produce qualitative and timely output. This could result in substandard research output. Additionally, oftentimes research persons failed to meet up with set deadlines. These days, researchers have experienced tremendous improvement in access to vast amount of data and information required to produce competitive research result. There is the need to evaluate the depth of the impact of Internet on research, hence a kind of research like this. The research was carried out with the use of questionnaires administered to some higher institutions in Nigeria and the views of various levels of researchers were analyzed based on a number of factors. From the study, confirmation was made of the positive impact of Internet on research and recommendations were made based on the factors identified to be hindering the maximal utilization of the Internet for research in the Nigerian situation.

Hide Abstract

On the structural property of two symmetrical N2O2-coordination Schiff base compounds

Iran Sheikhshoaie* and Ahmad Kamali

View:    Abstract |  HTML Full Text |  PDF |  XML|

Disulphide derivatives of imine compounds have the subject of intensive investigation over the past years, reflecting that they are excellent ligands for coordination to the metal ions. The disulphide group is well recognized as a potential binding site for metal ions in biological systems. In our present works we prepared two symmetrical Schiff base compounds N,N/-bis (2-hydroxy-3-methoxybenzylidene)-2,2/-(aminophenylthio) ethane [L1] and N,N/-bis (2-hydroxybenzylidene)-2,2/-(aminophenylthio) ethane [L2] by condensation of bis-(2-aminophenyl) disulphide with salen derivatives in absolute ethanol at room temperature. The structures of prepared compounds were checked by several spectroscopic methods. In the other part of this work the structure of these compounds have been optimized in gas phase and all quantum chemical parameters of the optimized L1 and L2 compounds have been discussed by some semi-empirical methods.

Hide Abstract

Improving on the Smoothing Technique for Obtaining Emission Probabilities in Hidden Markov Models

Bolanle A. Ojokoh*, Olumide S. Adewale and Samuel O. Falaki

View:    Abstract |  HTML Full Text |  PDF |  XML|

Hidden Markov Models (HMMs) have been shown to achieve good performance when applied to information extraction tasks. This paper describes the training aspect of exploring HMMs for the task of metadata extraction from tagged bibliographic references. The main contribution of this work is the improvement of the technique proposed by earlier researchers for smoothing emission probabilities in order to avoid the occurrence of zero values. The results show the effectiveness of the proposed method.

Hide Abstract