Ijeacs Uk

Ijeacs Uk
Empirical Research Press Ltd. · International Journal of Engineering and Applied Computer Science (IJEACS)

IJEACS UK

About

81
Publications
62,965
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
129
Citations

Publications

Publications (81)
Article
Full-text available
This work proposed a multi-attribute optimization technique for identification the equivalent circuit parameters of a three-phase induction motor from the name plate data. A fitness function was obtained and compared with the computed steady-state performance of the exact equivalent circuit at prospective parameters set with rated manufacturer data...
Article
Full-text available
This paper examined the viability of using agricultural waste materials as coarse aggregate in three-layered concrete. Concrete layers included crushed stone, and coarse aggregate replacements of periwinkle shell, and clamshell. For each sample type, the layer depth, and mix ratio varied. The physical and mechanical properties of the concrete beams...
Article
Full-text available
This paper presents a study of a single-phase cascaded H-bridge multilevel converter-based Distribution Static Synchronous Compensator (D-STATCOM) with active harmonic filtering capability. For the proper operation of the proposed D-STATCOM, a constant voltage is maintained at its DC bus link using a proportional and integral (PI) controller. Based...
Book
Full-text available
Stacked Generalization of Random Forest and Decision Tree Techniques for Library Data Visualization. Comparative Phytochemical and Antimicrobial Study of Ultrasound-Assisted Aqueous Extract from Fresh Plants of Bryophyllum pinnatum with Conventional Extraction Method. A Digital Planning Tool for Shaping Up the Landscaping Architecture. Data Mining-...
Article
Full-text available
Results of analysis carried out on data of Covid19, in Tabasco State, are presented, from March 2020 to February 2022. The procedure named 7 day´s moving average was applied to smooth the original graph and, in this way, analyze the data more easily. Fast Fourier transform (FFT) was applied to find the frequency that allows us to detect the period...
Article
Full-text available
VLSI technology development nowadays is mostly focused on the downsizing of semiconductor devices, which is significantly reliant on advancements in complementary metal-oxide-semiconductor technology. Due to capacitance, shorter channel length, body biassing, faster-switching transistor, limited variability, and faster running transistor, Silicon-o...
Article
Full-text available
Landscape architecture is a comparatively new concept and is gaining prominence in town and country planning exercises. People marveled at the design of new towns when the infrastructure looks nice and well placed. However, when the planning exercise is not done properly this results in the implementation of poor infrastructure with narrow roads, l...
Article
Full-text available
The tourism information system in Nigeria is not novel. What is novel is the need to develop reliable real-time recommender systems that can adequately aid tourists in their decisions. Several researchers have proposed various models. However, there are still issues about the applicability, effectiveness, efficiency, and reliability of the existing...
Article
Full-text available
The huge amount of library data stored in our modern research and statistic centers of organizations is springing up on daily bases. These databases grow exponentially in size with respect to time, it becomes exceptionally difficult to easily understand the behavior and interpret data with the relationships that exist between attributes. This expon...
Article
Full-text available
Bryophyllum pinnatum is a potential medicinal plant widely used in different tribes in Bangladesh. The leaves of B. pinnatum were used in the present study for the compatibility assessment of a proposed ultrasound-assisted green extraction method with the conventional extraction method. An aqueous Ultrasound-Assisted Extraction (UAE) by using both...
Book
Full-text available
A Literature Review on Energy Healing Techniques and Biofield – Detection and Scientific Analysis. Using Geographic Information Systems (GIS) to Model the Clustering Effect of COVID-19 in South-Western Zimbabwe. Effect of Body Posture on Heart Rate Variability Analysis of ECG Signal. In Vitro Micropropagation Studies Cotyledonary Explants Of Tricho...
Article
Full-text available
A method for Invitro Micropropagation Through Cotyledonary Explants of Trichosanthes anguina was exercised from 10-15 days of young stage explants [1, 2]. Developed a protocol for cotyledonary explants cultures, callus induction, and regeneration through cotyledon callus tissue [3, 4]. Multiple shoot formation was promoted by BAP 1.0 mg/l to 3.0 to...
Article
Full-text available
The purpose of the study was to model the clustering of COVID-19 in Bulawayo, Zimbabwe. A cross-sectional study design was used to provide a snapshot of the occurrence of COVID-19 in Bulawayo at a particular time. About 246 COVID-19 cases were randomly selected from the list of cases that occurred in Bulawayo as of 1 August 2020. The data was analy...
Article
Full-text available
An assessment of cardiac function derived from the ECG signal is known as heart charge variability (HRV). The evaluation of HRV provides ways for analyzing entry into the heart rhythm non-invasively, which can be used to guide treatment. For the prevailing study, records of ten members in two one-of-a-kind frame postures have been taken. Sets of re...
Article
Full-text available
Energy Healing techniques are considered as one of the age-old practices dating its origin back to the ancient scriptures, to be precise much earlier than those. Scientific technology has been incorporated on a small scale into these in recent decades, beginning in the twentieth century. Even in the twenty-first century, little progress has been ma...
Book
Full-text available
Mangrove Ecotourism Information System Based on Digital Book and Online Reservations. Analysis of Most Common Encryption Algorithms. A Secured Text Encryption with Near Field Communication (NFC) using Huffman Compression. A Novel Framework for Selecting Elicitation Technique based on Attribute Mapping. Performance Analysis of the Bus Topology Netwo...
Article
Full-text available
Stability, reliability, efficiency, and dependability necessitate a higher performance feature-based system in Ethernet LAN to meet the prevalent emergent technology of 5G and beyond 5G in the domain of networking. LAN technology has experienced the most progression since it came to reality. Despite its ability to achieve promising performance, the...
Article
Full-text available
The software development process is completely based on the requirements of stakeholders. If the requirements of stakeholders are being integrated into the proposed system, then it can be assumed that the end product is going to be optimal and successful. To achieve a successful product, different Requirement Elicitation Techniques (RET) are being...
Article
Full-text available
Bali's tourism sector has faced serious challenges since the pandemic, with Bali's economic growth rate of-12.28% in the third quarter of 2020. Kampoeng Kepiting Mangrove Ecotourism located in Tuban, Kuta Badung district, Bali province is one of the tourism sectors which suffered a heavy impact. Before the pandemic, ecotourism visitors increased ho...
Article
Full-text available
As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this pur...
Article
Full-text available
There are a lot of Challenges raised over the security of information written to the Mifare classic 1k a Radio Frequency Identification card due to the vulnerability status of this card. The card's information can be traced to another card or an electronic device. These issues allow for unauthorized access to the data on the Mifare classic 1k-enabl...
Article
Full-text available
New pharmacological, surgical, and endoscopic therapies have recently been developed to treat IBD. Among them, stem cell treatment is still in its early stages, despite the fact that multiple studies show that stem cell therapy's immunomodulatory function may decrease inflammation and tissue harm in IBD patients. Intralesional transplantation of au...
Article
Full-text available
This paper explains how Artificial Intelligence (AI) can and is being applied in the educational sector. Artificial Intelligence in the educational sector is one of the currently expanding disciplines in educational technology, according to the 21st International Conference on Artificial Intelligence in Education, held in 2020. Educators are still...
Article
Full-text available
The paper aims at studying the effects of fabric aerial weight, thickness, tightness factor, and loop shape factor on thermal conductivity behavior of plain single jersey knitted fabrics made with cotton yarn. 25 samples have been collected from the market. The samples are collected on the basis of their variation in the stated factors. Accordingly...
Book
Full-text available
Studying effects of fabric thickness, loop shape factor, fabric tightness factor and aerial weight on thermal conductivity of plain single jersey cotton knitted fabric using Box Behnken Design. Education and the Use of Artificial Intelligence. Mesenchymal Stem Cells and Their Use in Inflammatory Bowel Illness.
Article
Full-text available
The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and web-based activities have been increased drastically in recent times by users of all categories. Users have extensive...
Article
Full-text available
Task scheduling is an important aspect to improve the utilization of resources in the Cloud Computing. This paper proposes a Divide and Conquer based approach for heterogeneous earliest finish time algorithm. The proposed system works in two phases. In the first phase it assigns the ranks to the incoming tasks with respect to size of it. In the sec...
Article
Full-text available
Breast cancer is the most common form of cancer diseases among women and the second leading cause of cancer deaths worldwide. However, due to some limitations in mammography, it is difficult to classify a suspicious mass in the breast as malignant (cancerous) or benign. This paper attempts to classify the mammographic masses with high accuracy by c...
Article
Full-text available
In the area of digitization and automation, the life of human being is getting simpler as almost everything is automated. Nowadays humans have made internet an integral part of their everyday life without which they are helpless. Internet of things (IoT) gives a platform which allows different devices to inter-connect, sense and control the things...
Article
Full-text available
The accurate spectrum sensing is a predominant aspect of any competent CR system. Efficient spectrum sensing enables a CR terminal to detect the spectrum holes (underutilized spectral bands) by providing high spectral resolution, thereby accrediting opportunistic transmission in the licensed band to the CR. In order to facilitate a good spectrum ma...
Article
Full-text available
The solvent effect of aquo-dipolar protic solvent system was highlighted by studying the kinetics of base catalyzed solvolysis of ethyl cinnanmate in water-methanol media of various compositions having 20 to 70% (v/v)of ethanol at different five temp ranging from 20 to 400C. Fast decrease of specific rate constant with gradual addition of organic c...
Article
Full-text available
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes...
Article
Full-text available
The rate of alkaline hydrolysis of ethyl cinamate was measured over the temperature range of 20o C to 40 o C in water-methanol mixture at different composition 30 to 70% (v/v).The specific rate constant was calculated using second order reaction. The influence of solvent variation on reaction rate was examined in term of changes in the Activation p...
Article
Full-text available
In recent times, there has been a tectonic shift in the manner through which medical services are being rendered and the organization of the practice of Medicine as a whole. This tremendous diversification in the techniques employed for medical service delivery has noticeably been achieved through the integration of Engineering with medical science...
Article
Full-text available
Under the deregulation of generation market in China, all distributed generators will particular in electric power bidding. Therefore power purchase cost optimization (PPCO) problem has been getting more attention of power grid Company. However, under the competition principle, they can purchase power from several of power plants, therefor, there e...
Article
Full-text available
The magnetotelluric (MT) method has become more widely used in hydrocarbon exploration. The inversion of MT data, which can determine the electrical structure of subsurface, is a nonlinear and multimodal optimization problem. Particle swarm optimization (PSO) algorithm is a good solver for this geophysical inversion problem, whereas it has a shorta...
Article
Full-text available
Computer systems engineering is based, increasingly, on models. These models permit to describe the systems under development and their environment at different abstraction levels. These abstractions allow us to conceive applications independently of target platforms. For a long time, models have only constituted a help for human users, allow to ma...
Article
Full-text available
Image enhancement is one of the challenging issues in image processing. The objective of Image enhancement is to process an image so that result is more suitable than original image for specific application. Digital image enhancement techniques provide a lot of choices for improving the visual quality of images. Appropriate choice of such technique...
Article
Full-text available
Detecting and tracking objects are the most widespread and challenging tasks that a surveillance system must achieve to determine expressive events and activities, and automatically interpret and recover video content. An object can be a queue of people, a human, a head or a face. The goal of this article is to state the Detecting and tracking meth...
Article
Full-text available
Digital images are prone to a variety of noises. Denoising of image is a crucial fragment of image re-construction procedure. Noise gets familiarized in the course of reception and transmission, acquisition and storage & recovery processes. Hence de-noising an image becomes a fundamental task for correcting defects produced during these processes....
Article
Full-text available
This paper aims to highlight distinct features of Big of information. We are living on the planet with huge varieties and tremendous volume of data Information is the new money. Data is being generated by sensors, digital images, activities in social media sites, forensic science, business informatics, research activities across various domains and...
Article
Full-text available
As the arena movements to superior ability for recorded purposes, the usage of Cloud Service Providers (CSPs) are increasing more ubiquity. With the steady increment of disbursed garage adopters, records de-duplication has become a want for cloud providers. In distributed storage administrations statistics de-duplication is one of crucial structure...
Article
Full-text available
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted g...
Article
Full-text available
Generally HBASE is NoSQL database which runs in the Hadoop environment, so it can be called as Hadoop Database. By using Hadoop distributed file system and map reduce with the implementation of key/value store as real time data access combines the deep capabilities and efficiency of map reduce. Basically testing is done by using single node cluster...
Article
Full-text available
In this work, fingerprint and palm print multi-modal biometric security system is proposed. In this proposed work some of the common features of finger print and palm print images are identified and the process is carried out for authentication. At first, the preprocessing steps are completed on chosen images which include binarization, thinning an...
Article
Full-text available
Image stitching is a technique which is used for attaining a high resolution panoramic image. In this technique, distinct aesthetic images that are imaged from different view and angles are combined together to produce a panoramic image. In the field of computer graphics, photographic and computer vision, Image stitching techniques are considered a...
Article
Full-text available
For those organization for vast number about IoT devices, progressively vast amounts about information need aid produced, which abandons provision suppliers confronting new tests especially for administration to security. Information security might make attained utilizing cryptographic encryption strategies. Cryptographic keys are needed will unscr...
Article
Full-text available
Now days the usage of internet has been enormously increased. Online shopping has acquired widely in day today event. Mean which these online shopping is affected by various advanced network security attacks Flash Crowd Attack is the one of the advanced attack, where huge amount of dummy requests are sent at a time and thus putting lot of pressure...
Article
Full-text available
The usage of internet and requirement for data transmission is at tremendous demand. People are more dependent on the internet compared to previous decades. So with the increase in number of users, spectrum is becoming congested. Presently Wi-Fi technology is popular which runs on radio frequency waves having less bandwidth so, to have a larger ban...
Article
Full-text available
Energy is one of the main network resources that is used in mobile devices. We proposed an energy efficient routing techniques called reliable minimum energy cost routing (RMECR) and comparing with reliable minimum energy routing (RMER) which are used by the nodes in the most efficient manner. RMER and RMECR works on the basis of balancing the ener...
Article
Full-text available
In this communication era, wireless sensor network places a vital role. Wireless sensor network comprises of various types of sensor networks. Deployment of sensor nodes in wireless sensor network is a major concern to optimal result. There are various techniques in deploying the wireless sensor node. Among those some of the methods are, randomized...
Article
Full-text available
In this paper, we use the clustering technique to monitor the status of students’ scholastic recital. This paper spotlights on upliftment the education system via K-means clustering. Clustering is the process of grouping the similar objects. Commonly in the academic, the performances of the students are grouped by their Graded Point (GP). We adopte...
Article
Full-text available
In this paper, the test portrayal strategies of nonlinear measurements of wideband LNA exhibitions are simulated. Likewise, significance of the nonlinear estimations has been portrayed unmistakably with microwave LNA operating large signal analysis had been assessed. This work is endeavored to demonstrate the performances of the LNA with AM-AM, AM-...
Article
Full-text available
The rate of alkaline hydrolysis of ethyl cinnamate was measured over the temperature range of 20o C to 40 o C in water-acetone mixture at different composition 30 to 70% (v/v). The influence of solvent variation on reaction rate was examined in term of changes in the activation parameter. Depletion of H* and S* value with simultaneous increase in...
Article
Full-text available
This paper describes the function used in databases for performing the calculations, modifies the data items and does manipulations on data. It defines the functions, their syntax’s and errors occurred during the process. Functions are applied on oracle having SQL and are illustrated through query processing.
Article
Full-text available
The vital objective of artificial intelligence is to discover and understand the human competences, one of which is the capability to distinguish several text objects within one or more images exhibited on any canvas including prints, videos or electronic displays. Multimedia data has increased rapidly in past years. Textual information present in...
Article
Full-text available
With the emergence of Web 2.0 applications that bestow rich user experience and convenience without time and geographical restrictions, web usage logs became a goldmine to researchers across the globe. User behavior analysis in different domains based on web logs has its utility for enterprises to have strategic decision making. Business growth of...
Article
Full-text available
Due to the growing need for high-performance and low-cost software applications and the increasing competitiveness, the industry is under pressure to deliver products with low development cost, reduced delivery time and improved quality. To address these demands, researchers have proposed several development methodologies and frameworks. One of the...
Article
Full-text available
Technologies are constantly evolving. In order to benefit from technological advances, it is necessary to adapt the applications to these technologies. This operation is expensive for companies because it is often necessary to rewrite the code entirely. Where there is no capitalization of application functions and development is generally based on...
Article
Full-text available
This proposed work investigates the effects of biasing circuit in the ultra-wideband microwave low noise amplifier which operates between 3GHz to 10GHz. The complete circuit is visualized the importance of every component in the design with respect to linear measurements like Gain, Noise Figure, Return loss under unconditionally stable condition. T...
Article
Full-text available
Distributed systems deadlock is similar to single-processor system deadlock, but is worse. It is harder to avoid, prevent or detect and is harder to cure, when it is tracked down because all the relevant information is scattered over many machines. In some systems, such as distributed database systems, it can be extremely serious, so it is importan...
Article
Full-text available
Cloud computing is an arrangement of Information Technology administrations offered to clients over the web on a leased base. Such administrations empower the associations to scale-up or downsize their in-house establishments. By and large, cloud administrations are given by an outside supplier who has the game plan. Cloud computing has numerous fo...
Article
Full-text available
The kinetic of alkaline hydrolysis of Ethyl Cinnamate was investigated at different percentage of aqua-organic solvent mixture with Acetone (30 to 70% v/v) over the temperature range of 20o C to 40 o C. The specific rate constant was found to be decreased with increasing proportion of solvent (Acetone) at all the temperature range. The Iso-composit...
Article
Full-text available
This paper is located within the 21st century global debates about the impact of e-learning as one of the ICT on students’ achievements in teaching and learning process in universities. From the perspectives of Tanzania, this paper provides a model for measuring the impact of e-learning on students’ achievements in universities. The rationale for t...
Article
Full-text available
Now a day everyone is having a passion of playing Survival games so, keeping on mind this project gives a best experience on playing the best escaping game. Usually this game consists of very high visual graphics. Ball is the main player in the game designed, the main aim of the player is to hold its life and reach from source to destination by esc...
Article
Full-text available
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence...
Article
Full-text available
Data mining is an integrated field, depicted technologies in combination to the areas having database, learning by machine, statistical study, and recognition in patterns of same type, information regeneration, A.I networks, knowledge-based portfolios, artificial intelligence, neural network, and data determination. In real terms, mining of data is...
Article
Full-text available
Component-based software development (CBD) promises development of high-quality trustworthy software systems within specified budget and deadline. The selection of the most appropriate component based on specific requirement plays a vital role for high-quality software product. Multi-Agent software (MAS) engineering approach played a crucial role f...
Article
Full-text available
Development of an expert system is difficult because of two challenges involve in it. The first one is the expert system itself is high level system and deals with knowledge, which make is difficult to handle. Second, the systems development is more art and less science; hence there are little guidelines available about the development. This paper...
Article
Full-text available
Use of Grid Computing for carrying out cooperative work from distributed resources has been into practice for the past several years. Efficient execution of various tasks on the grid comes with various challenges. One of them is to ensure that a particular resource remains available during the execution of task. The dynamic nature of resources make...
Article
Full-text available
From previous year researches, it is concluded that testing is playing a vital role in the development of the software product. As, software testing is a single approach to assure the quality of the software so most of the development efforts are put on the software testing. But software testing is an expensive process and consumes a lot of time. S...
Article
Full-text available
Body area sensor network is an important technology which is suitable for monitoring the patient’s health and real time diagnosing the diseases. The body area network includes the sensors which can be spread over the body or the wearable cloth and a coordinator node which can be a mobile or a tablet or a PDA, which receives the signal of a person’s...
Article
Full-text available
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store...
Article
Full-text available
Malware is the main threat for all computing environments. It also acts as launching platform for many other cyber threats. Traditional malware detection system is not able to detect “modern”, “unknown” and “zero-day” malware. Recent developments in computing hardware and machine learning techniques have emerged as alternative solution for malware...
Article
Full-text available
Sign languages use visual pattern to communicate rather than acoustic patterns that are communication mode in verbal communication. Sign languages being the most structured form of gestures can be considered as the benchmark for systems of gesture recognition. SLR has got its applicability in the areas of appliances control, robot control, interact...
Article
Due to continuous change in business requirements and to implement proactive, adaptive maintenance procedures in application program; it is required to evolve application program time to time. Program comprehension is a process of program understanding and reverse engineering, which supports the analyst to easily undertake the program for further r...
Article
Full-text available
Hacking has become an extensive trouble with the beginning of the digital age, almost worldwide access to the internet and other digital media. It is significant for individuals, corporations, and the government to guard them from being susceptible to such attacks. The purpose of this paper is to provide information about ethical hacking; their ski...
Article
Full-text available
It is considerably recognized that in software engineering, the utilization of metrics at the initial stages of the object oriented software can encourage designers to bring about a noticeable improvement decisions. In this paper, a literature review and classification scheme for software complexity measurement researches is presented. The study sh...
Article
Full-text available
A location service gives the requested location information to the nodes in the ad hoc networks. It is supposed that there are different clusters in the different levels. Every cluster has a cluster head. The clusters can be logical or physical. The higher level cluster heads have the information of the tables of lower level cluster heads. The info...

Network

Cited By