Academic Research Publishing Agency Press
International Journal of Research and Reviews in Applied Sciences
ISSN: 2076-734X, EISSN: 2076-7366

Volume 2, Issue 2 (February, 2010)

To read and print the PDF files of the Journal Archive you will need to have Acrobat Version 8. If you do not have the highest version of Acrobat then you can download it from:
www.adobe.com/products/acrobat/readermain.html
 If you have any technical or content problems contact : publisher@arpapress.com

1. A COMPARISON OF HEAT TRANSFER AROUND A SINGLE SERRATED FINNED TUBE AND A PLAIN FINNED TUBE
by S.R.Mcilwain
Abstract

With comparable bundle geometry, serrated fin finned tube heat exchangers transfer more heat than plain finned ones. There are believed to be many factors in this behaviour, and this investigation used CFD to examine the heat transfer and fluid flow patterns around the fins to try to understand the magnitude of the differences in the processes. The study is a first step in developing a new theory-based method to predict the performance of serrated fin tube bundles.


2. DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS

by Dr.S.Subasree and Dr.N.K.Sakthivel

Abstract

A Computer Network is an interconnected group of autonomous computing nodes, which use a well defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. Security Attacks compromises the security and hence various Symmetric and Asymmetric cryptographic algorithms have been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. To improve the strength of these security algorithms, a new security protocol for on line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of Elliptic Curve Cryptography, Dual-RSA algorithm and Message Digest MD5. That is it uses Elliptic Curve Cryptography for encryption, Dual-RSA algorithm for authentication and MD-5 for integrity. This new security protocol has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques.


3. COLLABORATIVE MUSIC SOFTWARE FOR MOBILE PHONES
by Dr.Ian Gibson
Abstract

The paper reports on the Cellmusic system: a real-time, wireless distributed composition and performance system designed for domestic mobile devices. During a performance, each mobile device communicates with others, and may create sonic events in a passive (non interactive) mode or may influence the output of other devices. Cellmusic distinguishes itself from other mobile phone performance environments in that it is intended for performance in ad hoc locations, with services and performances automatically and dynamically adapting to the number of devices within a given proximity. It is designed to run on a number of mobile phone platforms to allow as wider distribution as possible, again distinguishing itself from other mobile performance systems which primarily run on a single device. Rather than performances being orchestrated or managed, it is intended that users will access it and create a performance in the same manner that they use mobile phones for interacting socially at different times throughout the day. However, this does not preclude the system being used in a more traditional performance environment. This accessibility and portability make it an ideal platform for sonic artists who choose to explore a variety of physical environments (such as parks and other public spaces).


4. COMPARING MATHEMATICAL AND A META HEURISTIC METHOD FOR VEHICLE ROUTING PROBLEM WITH UNCERTAIN DEMAND
by B.F.Moghadam, S.J.Sadjadi and S.M.Seyedhosseini
Abstract

This paper addresses the Vehicle Routing Problem with uncertain demand and capacitated fleet. In particular, demands are assumed to be uncertain and no sufficient historical information is available to estimate the probability distributions of uncertain parameter values. In this paper, we use Ant Colony System (ACS) meta-heuristic to find the problem solutions. First, we use branch and cut algorithm as an exact one to solve the problems with small scale. Then, we will extent the general Ant Colony System to obtain robust solution. Finally, we show some comparison between the heuristic and the exact solution to validate the heuristic algorithm.


5. THE AWARENESS AND THE ACCEPTANCE OF ISLAMIC PAWNSHOPS
by Mohd Fazli Mohd Sam, Md Nor Hayati Tahir and Noor Khamisah Abdul Latif
Abstract

AgroBank Malalysia formerly known as Bank Pertanian Malaysia has a product the Islamic pawnshop called Ar-Rahnu. Basically AgroBank Malalysia aims is to provide a comprehensive range of competitive baking and financial services to meet the total needs of customers in line with national aspiration and development. To accomplish this, AgroBank Malalysia had set its strategy to be innovative and forward looking, sensitive and adaptable to changing customer’s needs and market environment, committed to efficiency, cost effectiveness, profitability and social responsibilities and capable of capitalizing on new opportunities and challenges. This research is designed because we believed the product called Ar-Rahnu able to be marketed in every country if certain actions can be taken especially in implementing new tools of marketing. The demand of the product that highly demanded in certain areas especially in Kelantan, Terengganu, Selangor and Kedah shows that they believed on the service and know the advantage of the product. The significant of the research is to expose readers and the future researchers that pawnshop is not second class business. It is allowed in Islam and e-commerce can be implemented. Those who know the advantage of Islamic pawnshop will appreciate the system and grab the opportunities that exist in the system. Although pawnshop is a traditional business, new approach can be implemented. With the right marketing approach we believed that Islamic pawnshop can be one the best fund providers. Not only gold some other valued materials can be used as collateral.


6. INTELLIGENT TIME SLICE FOR ROUND ROBIN IN REAL TIME OPERATING SYSTEMS
by Yaashuwanth C. and Dr.R.Ramesh
Abstract

The main objective of this paper is to develop a new scheduling algorithm for scheduling tasks in real time operating systems. Scheduling algorithms play a significant role in the design of real time embedded systems. Simple round robin architecture cannot be implemented in real time operating systems because of high context switch rate, large waiting time and larger response time. Missing deadlines will degrade the system performance in real time embedded systems. The proposed algorithm modifies all the drawbacks of simple round robin architecture, the proposed architecture calculates the time slice for tasks and exclusively allocates the time slice for every individual tasks. A comparison with round robin architecture to the proposed architecture has been made. It is observed that the proposed architecture solves the problems encountered in simple round robin architecture in real time operating systems by decreasing the number of context switches waiting time and response time thereby increasing the system throughput.


7. MULTI-CHOICE GOAL PROGRAMMING APPROACH FOR A FUZZY TRANSPORTATION PROBLEM
by Dr.Debashis Dutta and A.Satyanarayana Murthy
Abstract

A transportation problem with fuzzy demand and supply values and objective function assuming multiple choices is considered. Two cases are dealt with where the goal function assumes a set of choices and a range. Multi-choice goal programming methodology is applied for both the cases. This results in a linear programming problem where some of the constraints are crisp and the remaining fuzzy. A method is proposed to solve this problem. The proposed method is illustrated through two numerical examples.


8. HOMOTOPY ANALYSIS METHOD FOR SOLVING INTEGRAL AND INTEGRO_DIFFERENTIAL EQUATIONS
by H.Hossein Zadeh, H.Jafari and S.M.Karimi
Abstract

In this paper, several integral equations are solved by Homotopy analysis method (HAM). A comparison of the exact solution and HAM have shown that the method is very effective and convenient for solving integral and integro – differential equations.


9. CANCER AND CARDIVASCULAR DISEASE MODELLING IN NORTH CYPRUS
by EVREN HINCAL
Abstract

Age-adjusted mortality in 2004 was essentially unchanged from the early 1990s. At the same time, age-adjusted mortality rates from cardiovascular disease have fallen quite dramatically. Since the causes underlying cancer and cardiovascular disease are likely to be correlated, the decline in mortality rates from cardiovascular disease may be somewhat responsible for the rise in cancer mortality. It is natural to model mortality with more than one cause of death as a competing risks model. Such models are fundamentally unidentified, and it is therefore difficult to get a clear picture of the progress in cancer. This paper derives bounds for aspects of the underlying distributions under a number of different assumptions. Most importantly, I do not assume that the underlying risks are independent, and impose weak parametric assumptions in order to obtain identification. The theoretical contribution of the paper is to provide a framework to estimate competing risk models with interval data and discrete explanatory variables, both of which are common in empirical applications. I use our method to estimate changes in cancer and cardiovascular mortality since 1990. The estimated bounds for the effect of time on the duration until death for either cause are fairly tight and we find that trends in cancer show much larger improvements than previously estimated. For example, we find that time until death from cancer increased by about 10% for NC males and 20% for NC women.


10. FLUID FLOW INTERACTIONS IN OGUN RIVER, NIGERIA
by Dr.Amartya Kumar Bhattacharya1 and G.Akin Bolaji
Abstract

Surface and groundwater interaction is an important aspect of the hydrologic cycle that borders on the watershed assessment, protection and restoration. In groundwater/surface water interactions, the groundwater component is much greater than the surface water but is much less visible and attracts less public interest. The mixing between surface and groundwater enables them to import their characteristics upon one another thereby counting a change in their parameters. Groundwater interacts with surface water in nearly all landscapes, ranging from small streams to major river valleys. Many scientists have studied the physical aspects of groundwater/surface water interactions, but it is in recent times that these interactions have been looked upon in relation to their ecological implications. With the coming of a more holistic approach to environmental flows and environmental protection, surface water/groundwater (SW/GW) interactions should receive heightened attention at multidisciplinary scale and more so, by policy makers and watershed managers. It is generally understood in conceptual form that surface water therefore has the ability to enhance or detract from groundwater quality and vice versa, yet little is known about the processes by which these two entities interact (Gardener, 1988). In the past, emphasis has been placed on studying the physical and chemical effects that groundwater has on surface water but it is also important to look at the ecological role surface water and groundwater interactions can play in maintenance of environmental flows in a river basin. In area where surface water and groundwater directly interacts, the important issue commonly raised in recent times are not only concern with water quality but related with ecology and biodiversity. Therefore, there is a need for thorough understanding of the surface water and groundwater interactions within catchments so as to enhance the sustainable development and management of water resources system. The analytical technique discussed in this paper is an aid to assess the relationship of surface and subsurface hydrology to enlighten a broad audience on the importance of this relationship to environmental flow regulations. The target goals of this paper includes making a case for environmental flows in planning for water allocation and to gain the attention and create awareness that will support future research in environmental flow assessments.


11. OPTIMAL DESIGN FOR A THREE –LEVEL NESTED MULTINOMIAL LOGIT MODEL IN DISCRETE CHOICE EXPERIMENTS
by Habib Jafari
Abstract

In this paper we calculate the information matrix for a three-level nested Multinomial logit model and derive the locally D-optimal design to estimate the parameter vector.














Academic Research Publishing Agency Press