Volume 11, Number 4

Hostel Management System Based on Finger Print Authentication

G. Rajkumar1and T. Sivagama Sundari2

View:    Abstract |  HTML Full Text |  PDF |  XML|

The biometric system plays the most important role in this current century. Finger print identification is one among the foremost distinguished and familiar identity verification system due to its individuality. Security within the hostel is one of the foremost repetitive issues. To keep up day by day attendance verification is sophisticated and time consuming system for the hostel management. There are number of existing attending systems are available for college students, for hostel students it must improve. Within the existing system wardens are manually maintain the attendance for hostel students. This paper deals with, avoid of an entire problem in hostel management system together with this monitoring system also proposed. The administrator of this system was college principal or warden. Biometric system is used to accommodate a large number of students within the hostel. This system makes automatically to monitor the entry and exit of students from hostel and offers alert SMS to parents for their safety.

Hide Abstract

Developed Web-Based System for Performance Evaluation Based on Balanced Scorecard Model: Case Study in Ethiopian Organizations

Worku Mekonnen Tessema

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this research a developed web–based balanced scorecard performance evaluation system proposed for the case study of Ethiopian organizations and supports both English and Amharic languages. The system incorporates evaluations of individual performance (both in activity and behavior), major activity performance, objective performance, perspective performance, unit/ department performance, and the organization/institute as a whole based on time, cost, quality and quantity. Object oriented software engineering and ASP.NET 4.0 platform is employed to develop the system. Reviewing the overall results from the usability test, questionnaires and interviews, it is concluded that all production and extensive public service providing organizations prefer to use the implemented application but other organizations comparatively didn’t want to use it as it seems it doesn’t facilitate their daily duties. But the overall functionality of the system is being agreed by the users.

Hide Abstract

Energy Audit Application for Rice-Wheat Cropping System

Rajesh U Modi1*, Mudasir Ali1, Raghuvirsinh P Parmar1, Sharad Kumar Namdev2

View:    Abstract |  HTML Full Text |  PDF |  XML|

This computer application deals with energy auditing for rice-wheat cropping system. Computing different input parameters for the crop production system in terms of energy requirement (MJ/ha) can be done by using this computer application. The developed application was found to be a simple, easy and user-friendly with appropriate output units. It works efficiently and gives the desired output in terms of energy consumption (MJ/ha). The advantage of this application is to decide the inputs on the basis of energy consumption before performing actual cultivation practice using the last season data. Moreover, using this package energy budget difference and comparison of subsequent production seasons can be achieved. The computer application was developed using Visual Basic, which allows the user to calculate total energy use efficiency, specific energy and different energy ratios in a particular cropping system.

Hide Abstract

Simulation Approach for Logistical Planning in a Warehouse: A Review

M.H.F. Md. Fauadi1*, N.Z. Azimi1, N.I. Anuar2, M. M. Ali1, M.K. Sued1, S. Ramlan3

View:    Abstract |  HTML Full Text |  PDF |  XML|

Simulation approach has been widely utilized for design and planning of a warehouse logistic system. As technology advances, better simulation tools have been developed. This enables decision makers to create more realistic models to represent the actual scenario. As a result, better evaluation could be made especially regarding dynamic factors within system. Thus, complex logistic problems could be solved. This paper reviews the fundamentals of warehouse logistic and the simulation tools available to analyze logistic problems.

 

Hide Abstract

Use of Mathematical Morphology in Vehicle Plate Detection

Neeraja Mohanan, Afaq Ahmad, Sayyid Samir Al-Busaidi, Lazhar Khiriji, Amir Abdulghani and Muhammad Al Nadabi

View:    Abstract |  HTML Full Text |  PDF |  XML|

In the past couple of decades, the number of vehicles has increased radically. A statistic which presents the number of cars sold worldwide from 1990 through 2017, forecasts for 2018, some 81.6 million automobiles are expected to be sold by the end 2018. With this continuous increase, it is becoming very tedious to keep track of each vehicle for the purpose of security, law enforcement and traffic management. This phenomenon of rapidly increasing vehicles on the road highlights the importance for a vehicle number plate recognition system. By recognizing the car plates, the drivers of the vehicle can be identified from the database. Number plate detection system are used in various applications like traffic law maintenance, traffic control, automatic toll collection, parking systems, automatic gate openers. This paper presents a unique algorithmic procedure for detecting vehicle plate number which is based on the concept of mathematical morphology. The developed algorithm is simple, efficient and flexible. The algorithm is capable of working satisfactorily even in different constraints such as like rain, smoke and shadow. This user-friendly software tool is developed on MATLAB platform which is one of the common and efficient image processing analysis tools.

Hide Abstract

Revisiting the “An Improved Remote User Authentication Scheme with Key Agreement”

Yalin Chen1 and Jue-Sam Chou*2 and I - Chiung Liao3

View:    Abstract |  HTML Full Text |  PDF |  XML|

Recently, Kumari et al., pointed out that Chang et al.’s scheme “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” has several drawbacks and does not provide any session key agreement. Hence, they proposed an improved remote user authentication scheme with key agreement based on Chang et al.’s protocol. They claimed that the improved method is secure. However, we found that their improvement still has both anonymity breach and smart card loss password guessing attack which cannot be violated in the ten basic requirements advocated for a secure identity authentication using smart card by Liao et al. Thus, we modify their protocol to encompass these security functionalities which are needed in a user authentication system using smart card.

Hide Abstract