Information Technology articles list

Modelling and analytical proofing of low energy temperature control using earth/ground water heat exchanger

For given condition of (temperature and humidity) of suction air, the delivery air condition depends on the system parameters (depth, radius, length and air mass flow rate), thermo physical properties of the surrounding earth (thermal conductivity and specific thermal capacity) and earth surface environment (ambient temperature, ambient humidity and solar irradiance)[1,3].Sensitivity analysis of system performance is essential for understanding the relative importance of different parameters of design of a optimum system [2,5]. For the steady state periodic input air condition and the performance of the system can be measured in terms of heating potential during the winter period and cooling potential during the summer period. Sensitivity of the system performance parameters (heating potential in winter and cooling potential in summer) to the changes in system parameters or thermo physical properties of the surrounding earth has been analysed and the result is present is in this paper.

Dr H Shaheen

An iot based system to detect a person/wheelchair fall

Keeping an in depth tab of recent folks or folks on chair with bound health conditions for his or her health and safety is a very important task. With maturity, weak bones and weakness because of alternative health connected problems could lead to will increase risk of falling. A supervisor might not continually be on the market with them and if correct assistance is not provided at the correct time it should cause larger health considerations which will need extra resources for treatment. For this purpose we've projected a wise IOT Fall Detection System exploitation acceptable sensors that square measure integrated facilitate|to assist} report these incidents to assist avail help at the correct time to forestall additional injury to health. The same system uses sensors like associate degree measuring system to live the speed of the person, a rotating mechanism to live the person’s orientation so as to live their stability, a load sensing element once the system is employed by an individual employing a chair to live their weight, a Wi-Fi module and a microcontroller that sends the general readings to alert the involvedthose that shall give with the right suggests that to assist the person in want. The microcontroller receives all the info from the sensors and perpetually transmits and monitors the acceleration and also the orientation of the person. Any fast abrupt modification within the system which will result from a fall is taken into account as a ‘fall’ and is reported . a serious concern would be that not all fast movement may end up from a fall and be thought of as a matter of concern. To avoid this warning a napbutton is provided to snooze the system. This button will be ironed before a definite time say 15-30 seconds to prevent the system from causation the alert, thus avoiding any confusion and panic. this method will be mounted to the person’s chair or will be created compact to be created into a wearable device which will be worn on the hand.

Dr H Shaheen

Blue brain technology

How great would it be if you never forgot anything or never lost the ability to think and be creative? And just imagine how much more great it would be if your brain can be reconstructed so that it can stay young forever and be used to create wonders even after your death? It would be a great leap in the field of science if the brains of great minds like Steve Jobs or Albert Einstein can be recreated. That is exactly what the blue brain does. The blue brain project is an attempt to reconstruct the brain piece by piece and building a virtual brain in a supercomputer. It began in 2005 with an agreement between the EPFL and IBM, which supplied the Blue Gene/L supercomputer acquired by EPFL to build the virtual brain. The computing power needed is considerable. Each simulated neuron requires the equivalent of a laptop computer. A model of the whole brain would have billions. Supercomputing technology is rapidly approaching a level where simulating the whole brain becomes a concrete possibility. The main aim is to update the brain into a computer. As a first step, the project succeeded in simulating a rat cortical column. Efforts are now being made to simulate the human brain. In five years of work, Henry Mark ram’s team has perfected a facility that can create realistic models of one of the brains essential building blocks. This process is entirely data driven and essentially automatically executed on the supercomputer. This modeling will expand to all the areas of the brain and if successful, shed light on the relationships between genetic, molecular and cognitive functions of the brain. These models will be basic building blocks for larger scale models leading towards a complete virtual brain.

Dr H Shaheen

Metapuf: a challenge response pair generator

Physically unclonable function (PUF) is a hardware security module preferred for hardware feature based random number and secret key generation. Security of a cryptographic system relies on the quality of the challenge-response pair, it is necessary that the key generation mechanism must unpredictable and its response should constant under different operating condition. Metastable state in CMOS latch is undesirable since it response becomes unpredictable, this feature used in this work to generate a unique response. A feedback mechanism is developed which forces the latch into the metastable region; after metastable state, latch settle to high or state depends on circuit internal condition and noise which cannot be predicted. Obtained inter hamming variation for 8 PUF is 51% and average intra hamming distance is 99.76% with supply voltage variation and 96.22% with temperature variation.

Abhishek Kumar

Intersection of caste and gender based subjugation

One of the unique features of Indian society is prevalence of caste system which was originated thousands of years back to demarcate the people engaged in different occupation or jobs. Initially it was not much rigid but gradually people belonging to upper castes for their own selfish means to maintain their monopoly made this arrangement hereditary and started treating people of lower castes disgracefully. For preservation of this system, people started controlling their women to prevent inter-caste marriages and the concept of endogamy came up. This robbed away many types of freedom from women. For women belonging to lower castes, this situation is worse as they are doubly subjugated on the basis on caste as well as gender. Men belonging to their own caste treat them as secondary beings. This paper throws light on this intersection. How intersection of these two kinds of inequalities place them at the lowest position in Indian society. Dr. B.R. Ambedkar rises as their leader who all his life worked for empowerment of downtrodden section of society. He argues that education is the primary tool for evading these differences among people. He further emphasizes to adopt the concept of exogamy to break the backbone of Indian caste system and to immediately leave a religion or culture which legitimizes such system of inequality among people of the same land.

Swati sharma

Intersection of caste and gender based subjugation

One of the unique features of Indian society is prevalence of caste system which was originated thousands of years back to demarcate the people engaged in different occupation or jobs. Initially it was not much rigid but gradually people belonging to upper castes for their own selfish means to maintain their monopoly made this arrangement hereditary and started treating people of lower castes disgracefully. For preservation of this system, people started controlling their women to prevent inter-caste marriages and the concept of endogamy came up. This robbed away many types of freedom from women. For women belonging to lower castes, this situation is worse as they are doubly subjugated on the basis on caste as well as gender. Men belonging to their own caste treat them as secondary beings. This paper throws light on this intersection. How intersection of these two kinds of inequalities place them at the lowest position in Indian society. Dr. B.R. Ambedkar rises as their leader who all his life worked for empowerment of downtrodden section of society. He argues that education is the primary tool for evading these differences among people. He further emphasizes to adopt the concept of exogamy to break the backbone of Indian caste system and to immediately leave a religion or culture which legitimizes such system of inequality among people of the same land.

Swati sharma

An analysis of south africa’s readiness for analogue to digital terrestrial television migration

ABSTRACT The 2006 International Telecommunication Union (ITU) Radio World Conference treaty concluded that all countries should migrate from analogue to digital terrestrial television by June 2015, starting with region one countries, comprising Africa, Europe, the Middle East and the Republic of Iran (Agona & Otim, 2012). The purpose of this research was to explore the technology adoption model (TAM) to address challenges associated with digital terrestrial television migration, and analyse the readiness of South Africa to migrate. A quantitative research was conducted in order to determine the relationship between dependent and independent variables. Digital television offers many benefits for broadcasters, network operators, spectrum regulators, and consumers. In most countries, the transition was slower than expected, even though most European countries managed to migrate. The digital migration is not an easy transition and analogue switch-off can also be much more difficult. Studies have shown that analogue switch off (ASO) needs to be carefully planned and well budgeted for, and it also needs a good publicity campaign which must involve all relevant stakeholders, such as broadcasters, viewers, manufacturers, network operators, manufacturers and retailers. Even though studies conducted previously identified obstacles of digital migration to include; a) lack of awareness b) lack of information, c) influence of politics and d) influence of corruption.

Luyolo Mahlangabeza

Financing ict smmes at different stages of the business life cycle

Small, medium and micro enterprises (SMMEs) represent a vital element in our economy in terms of addressing unemployment and the gross domestic product (GDP) of our country. Improving the success rate of SMMEs would save a lot of financial resources, thus understanding the financing options that complement success at different phases of the business is very important. This research sought to examine the extent to which the financing options chosen by entrepreneurs will have an impact on business success. The investigators adopted the progression of the ventures along the business life cycle stages as a benchmark for assessing success. The study focused primarily on SMMEs in the Eastern Cape Information Communication Technologies (ICT) sector. Data was obtained using an online survey which reached 50 small business owners/ business representative within the ICT sector in the Eastern Cape Province. The research study showed the role that internal financing options, such as personal savings, family, relatives and friends' financing, retained earnings, sale of existing assets and cutting down stock levels, play in the achievement of ICT SMME success. Moreover, examined external financing options such as Broad-Based Black Economic empowerment (B-BBEE) financing, bank loans, equity financing, government grants, trade credit, to SMME success. Key results revealed that the financial support of B-BBEE and personal savings have played a key role in the success of ICT SMMEs throughout the business life cycle phases. This occurs after an ICT SMME has advanced successfully over the start-up stage and aims for success in the development phase. The finding revealed that for these SMMEs to attain success at the development stage, they should finance their business investment projects utilising credit trade, bank loans, families, relatives and friends. The abovementioned financing options are only substantially linked to good advancement from the development phase onto the expansion phase. Also, suggestions have been made to the ICT SMME management to include B-BBEE finance, personal savings, bank loans, families, relatives and friends and trade credit as suitable funding choices for the ICT SMME's life cycle

Luyolo Mahlangabeza

A review of solar energy

Solar Energy is the prime important source of energy, and it has continued to gain popularity globally. As of 2018, about 486 GW of solar PV was installed worldwide. One of the key requirements for socio-economic improvement in any nation of the world is the provision of dependable electricity supply systems. Recently, there is a massive growth in access to solar electricity in several Africa countries, notably South Africa, Egypt, Morocco, and Algeria. As a result, it decreases the global population without access to electricity with an appreciable value. This paper review the present state of solar energy capacity in the world also identifies vital approaches of improving their functionality, reliability, and affordability as well as the essential method that policymakers may implement in the future. The result shows that there is a recurrent growth in solar energy annually and as at the end of 2018 Asia with the largest capacity of 56.58%, while Central America and the Caribbean have the lowest installed capacity of 0.36%. As the request for an uninterrupted supply increases in different regions, progressive builders are embracing solar photovoltaics (PV) renewable energy as an option for their customers.

Najeem Olawale Adelakun

Analysis of poverty and poverty alleviation measures and information technology: the case of jordan

This study reviews indicators of poverty and the government policies and strategies to reduce and alleviate poverty in Jordan and investigate the effects of information technologies (ITC) on the poverty in Jordan, Population growth rate, GDP at current prices, consumer price index, and human development index in addition to percentage of population use internet, percentage of export and import of ITC of the total trade are used as dependent variables. Data from different resource is collected from 1999 in which the internet started in Jordan till 2018 on the abovementioned variables. The results show that there are negative impacts of the percentage of population using internet on the poverty rate while there are positive effects of human development index and consumer price index on poverty

IAEME

Acceptance of cloud deployed blended learning environment by students in higher education sector-a literature review

n India, the education sector has been always attentive to adopt innovations and techniques in the teaching-learning process due to various challenges. But nowadays, academic institutions are becoming flexible in accepting the new teaching and learning techniques to satisfy the student sector which as cited as the most vital entity in the educational sector. New technologies, tools, and techniques are proving as a boom for innovative teaching and learning practices. One of the emerging teaching technique is Blended learning which is a process refers to “mixing of the different learning environment for educational transfer”. It combines the traditional face to face classroom method with online learning method supported by advanced technology and tools. Blended learning should be viewed not only as a temporal construct but also as a fundamental redesign model. Through this content, delivery becomes digital and online. Truly blended learning requires teachers should adopt the approach as guides and mentors and learning should go beyond the classroom walls. Blended learning is also known as Hybrid learning. Although, Indian Government is taking initiatives to implement a blending learning approach yet there is a need to access the behavioral aspect of the students to use this blending learning approach. Adopting a blended learning approach must start with a re-examination of the intended learning outcomes.The deployment of cloud in the blended learning process makes its existence more strong. This study is the review of literature selected to identify the need for blended learning deploy with cloud in the teaching-learning process in the Higher Education Sector.

Inderbir Kaur

Design and development of framework for big data based smart farming system

Improving the agricultural productivity is an imminent need to meet the food requirement of constantly growing population rate. It can be gracefully satisfied if the farming process is integrated through technologies such as big data and IoT. The integration of agricultural processes with modern technologies has emerged as the smart agriculture technology. This research work is focused on proving the suitability of the big data analytics for smart agricultural processes in terms of increasing production and quality of yields with less resources and overhead. This research paper expounds the extensive review carried out on the related works in smart agricultural farming, challenges in implementing the smart farming technologies at large scale, followed by the conceptual framework model for the effective implementation of big data together with IoT devices in smart farming.

Dr H Shaheen

Peningkatan mutu pengajaran sekolah dasar melalui pemanfaatan teknologi integratif

Pada awal terjadinya pandemi COVID 19, telah terjadi banyak hal yang mengakibatkan perubahan di tengah masyarakat. Salah satunya adalah di kegiatan belajar mengajar. Berangkat dari hal tersebut maka pada pertengahan Agustus 2020 dimulailah satu kegiatan untuk membantu para guru yang ada di daerah untuk bisa beradaptasi dengan perubahan terkait kegiatan belajar mengajar pada masa pandemi. Kegiatan ini dilaksanakan dalam beberapa bulan dengan dua kegiatan utama dilaksanakan secara daring dan kegiatan pendampingan juga secara daring. Pada April 2021 didapatkanlah hasil dari kegiatan ini yang sebagian besar menilai kegiatan positif dan membantu dalam aplikasi kegiatan belajar mengajar. Hanya saja yang disayangkan kegiatan ini tidak menjangkau banyak peserta.

Lila Maria Kaban

Utility-based joint power control and resource allocation algorithm for heterogeneous cloud radio access network (h-cran)

The high density of H-CRAN associated with frequent UE handover may degrade the throughput. The infrastructure equipment like RRHs and BBUs consumes more energy to reduce UE energy consumptions. In this paper, we propose a utility-based joint power control and resource allocation (UJPCRA) algorithm for heterogeneous cloud radio access network (H-CRAN). In this framework, the power consumption of baseband units (BBUs), remote radio heads (RRHs), and macrocell base station (MBS) are estimated by predicting their dynamic loads. The data rate achievable for UE associated with each RRH and MBS on resource block RBk is then estimated. The user wishing to connect to a RRH or MBS then checks the corresponding utility with minimum expected energy consumption and the maximum expected data rate. If any UE with high priority traffic connected to MBS could not achieve its desired data rate requirements, then it can cooperatively seek the assistance of any RRH for assigning the balance RBs. The throughput may be enhanced by the high density of H-CRAN and frequent UE handover. Inter- and intracell interference causes the H-CRAN macrocells’ improved data rate to diminish. To lower UE energy consumption, infrastructure devices like RRHs and BBUs need more energy. As a result, there is a trade-off between operators and UE energy conservation. It is possible to determine the power consumption of BBUs, RRHs, and MBS using predictions of their dynamic loads. The UE may then forecast the data rate for each RRH and MBS on the resource block. When a user wishes to connect to an RRH or MBS, they look at the utility with the highest expected data rate and the least predicted energy usage first. A UE with high priority traffic connected to the MBS can cooperatively ask any RRH for assistance in allocating the remaining RBs if it is unable to achieve its intended data rate needs. Experimental results have shown that the proposed JRAUA algorithm achieves higher throughput, resource utilization, and energy efficiency with reduced packet loss ratio, when compared to the existing techniques.

Dr H Shaheen

Evolution and significance of unmanned aerial vehicles

Unmanned aerial vehicles (UAVs) are aerial systems controlled remotely or autonomously by astronauts. Massive advancements in electronics and information technology have prompted the popularity and growth of UAVs. As a result of the huge advances made in electronics and information technology, civilian tasks can now be accomplished with UAV in a more effective, efficient, and secure way. Known as a drone, UAVs are developed and operated using a variety of technologies such as machine learning, computer vision, artificial intelligence, and collision avoidance. Having become more affordable and accessible, drone technology has become more popular among civilians. Therefore, this technology is constantly evolving and can be used across a variety of fields. The application of drones makes a huge difference in the most demanding and complex industrial environments such as those in the mining industry, maritime, oil, gas, and seaports. The usage of drones is increasing among industrialists to improve and optimize processes, as well as to enhance operational efficiency in industrial process. This chapter discusses UAVs on a wide range of topics, including evolution and historical perspectives of UAV, taxonomy of UAV, significance of UAV to society and industry, and industrial and academic perspectives on UAV.

Dr H Shaheen

Attention is all you need

The dominant sequence transduction models are based on complex recurrent or convolutional neural networks that include an encoder and a decoder. The best-performing models also connect the encoder and decoder through an attention mechanism. We propose a new simple network architecture, the Transformer, based solely on attention mechanisms, dispensing with recurrence and convolutions entirely. Experiments on two machine translation tasks show these models to be superior in quality while being more parallelizable and requiring significantly less time to train. Our model achieves 28.4 BLEU on the WMT 2014 Englishto-German translation task, improving over the existing best results, including ensembles, by over 2 BLEU. On the WMT 2014 English-to-French translation task, our model establishes a new single-model state-of-the-art BLEU score of 41.0 after training for 3.5 days on eight GPUs, a small fraction of the training costs of the best models from the literature.

Kamal Singh

Operations and information management - music project

Chris and Clive have decided to keep up with the requirements of their company, to comply with the requirements of work and to keep up with the modern times by moving to a full-time business. All the shareholders have agreed to introduce advanced technology and move to a higher step to keep up with the requirements of modern times and work. We will be in this document critically analyse current existed CC MUSIC operation and information management and demonstrate an understanding of the strategic importance of information management. Evaluate the fundamental principles of information systems and the significance of a socio-technical approach to their use in CC MUSIC critically. Select and apply appropriate problem-solving and improvement approaches for information systems in CC MUSIC

Mohamed Sorogy

A state-of-the-art analysis of android malware detection methods

Smartphones are constantly changing in today's world, and as a result, security has become a major concern. Security is a vital aspect of human life, and in a world where security is lacking, it becomes a concern for mobile users' safety. Malware is one of the most serious security risks to smartphones. Mobile malware attacks are becoming more sophisticated and widespread. Malware authors consider the open-source Android platform to be their preferred target as it came to lead the market. State-of-the-art mobile malware detection solutions in the literature use a variety of metrics and models, making cross-comparison difficult. In this paper various existing methods are compared and a significant effort is made to briefly address android malwares, various methods for detecting android malwares and to give a clear image of the progress of the android platform and various malware detection classifiers.

Jebin Bose S

Enabling authenticity and integrity with information hiding for secure communication in internet of things

Internet of Things (IoT) enhances the global connectivity to all the remote sensing devices. It enables the connectivity of communication and processing the real-time data that has been collected from an enormous number of connected sensing devices. There is an increase in the IoT technology that leads to various malicious attacks. It is more important to overcome the malicious attacks, mainly to stop attackers or intruders from taking all the control of devices. Ensuring the safety and accuracy of the sensing devices is a serious task. It is very much important to enabling the authenticity and integrity to obtain the safety of the devices. Dynamic tree chaining, Geometric star chaining and Onion encryption are the three solutions that has been proposed in this project for in order to enable authenticity and integrity with information hiding for secure communication. The simulation results are driven displays that the proposed system is very stable and much better than other existing solution in means of security, space and time.

Jebin Bose S

Efficient and secure data transfer in iot

Nowadays, the Internet of Things (IoT) has been used widely in our daily day to day life, starting from health care devices, hospital management appliances to a smart city. Most of the IoT devices have limited resources and limited storing capability. All the sensed information must have to be transmitted and to store in the cloud. To make a decision and for making analysis all the data stored in the cloud has to be retrieved. Making certain the credibility and security of the sensed information are much necessary and very important for the use of IoT devices. We tend to examine the proposed technique to be much secure than the existing one. In IoT, if the security is not ensured, then it may result in a variety of unsought issues. This survey resembles the overall safety aspects of IoT and debates the overall issues in the security of IoT.

Jebin Bose S

 < 1 2 3 >