http://sersc.org/journals/index.php/IJAST/issue/feed International Journal of Advanced Science and Technology 2024-01-27T11:57:24+00:00 Editor in Chief ijast@sersc.org Open Journal Systems <div style="text-align: justify;"> <table style="width: 100%;"> <tbody> <tr> <td><img style="max-width: 70%;" src="/journals/images/cover_page/ijast.jpg"></td> <td style="padding: 1px; text-align: left;"> <p><span style="color: #1e6292;"><strong> Editor-in-Chief of the IJAST Journal:</strong></span><br><span class="SmallTitle"><strong>Neal N. Xiong,</strong></span> School of Computer Science, Colorado Technical University, USA<br><br><span style="color: #1e6292; font-size: 16px;"><strong>General Information of IJAST</strong></span><br><strong><span style="color: #1e6292;">ISSN:</span></strong> 2005-4238 (Print)<br><strong><span style="color: #1e6292;">ISSN:</span></strong> 2207-6360 (Online)<br><strong><strong><span style="color: #1e6292;">Impact Factor: </span></strong></strong>6.78<strong><br><strong><span style="color: #1e6292;">Publisher:</span></strong>&nbsp;Science and Engineering Research Support Society<br><strong><span style="color: #1e6292; font-size: 16px;">Contact Information</span></strong><br><strong><span style="color: #1e6292;">SERSC Australia</span></strong><br><strong><span style="color: #1e6292;">Management Office:</span></strong> PO Box 5014, Sandy Bay TAS 7005, Australia<br><strong><span style="color: #1e6292;">Email:</span></strong> ijast@sersc.org<br><br><strong><span style="color: #1e6292; font-size: 16px;">Publication and Update</span></strong><br>Last day of Every Month</strong></p> </td> </tr> </tbody> </table> <br><strong><span class="MidTitle" style="font-size: 20px; color: #1e6292;">Journal Paper Publication Policy</span></strong> <ul> <li class="show">The publication will not be an Open Access repository (Effective January 2017).</li> <li class="show">A maximum of thirty-nine (39) papers will be included in every journal issue (effective April 2013).</li> <li class="show">Multiple submission of the same paper on different journal submission will all be discarded (effective January 2017).</li> <li class="show">Paper title, author and corresponding author(s) names should be the same to the submitted paper and on the submission system (effective January 2017).</li> <li class="show">Each paper should only have one (1) corresponding author and cannot be changed (effective April 2013).</li> <li class="show">If plagiarism problem was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.<br>The paper will be removed even though it was already published, and this will be noticed on the home page (effective April 2013).</li> <li class="show">If double submission was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.<br>The paper will be removed even though it was published, and this will be noticed on the home page (effective April 2013).</li> <li class="show">Only paper(s) containing simulation, implementation, case study or other evidence of research advancement will be published.<br>Ideal paper can be published after the editorial board grants permission after reviewing the paper (effective April 2013).</li> <li class="show">Papers from one country cannot exceed 60% in every journal issue; it will be based by the first authors' nationality (effective July 2014).</li> <li class="show">Only one (1) paper from same author can be included in each issue regardless of role and order (effective July 2014).</li> <li class="show">SERSC DOES NOT ALLOW ANY AGENTS FROM CHINA to act on our behalf in collecting papers for our journals. SERSC have standard procedures in publication of submitted papers.</li> </ul> <br><strong><span style="font-size: 20px; color: #1e6292;">Journal Aims</span></strong> <ul> <li class="show">IJAST aims to facilitate and support research related to control and automation technology and its applications.</li> <li class="show">Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of control and automation.</li> <li class="show">To bridge the gap of users who do not have access to major databases where one should pay for every downloaded article; this online publication platform is open to all readers as part of our commitment to global scientific society.</li> </ul> <br><strong><span style="font-size: 20px; color: #1e6292;">Abstracted/Indexed In</span></strong> <ul class="ul3"> <li class="show">EBSCO</li> <li class="show">ProQuest</li> <li class="show">ULRICH</li> <li class="show">J-Gate</li> <li class="show">OAJI</li> </ul> </div> http://sersc.org/journals/index.php/IJAST/article/view/35794 Sentiment Analysis of Code-Mixed language 2021-04-02T08:15:34+00:00 Sukhpreet Kaur, Gurpreet Singh Josan <p>Code-mixed language is very commonly used in today’s multilingual society. It is the phenomenon of mixing the syntax and vocabulary of many languages in single sentence. Sentiment analysis of code-mixed language aims at identifying the polarity value of the sentence. This paper mainly focuses on sentiment analysis of Tweets consisting of words from Hindi and English language along with other symbols. The dataset contains 20,000 tweets. We generate word level, character level and subword level representation for the Tweets which are used as input to the different models such as CNN, LSTM and BiLSTM. The performance of BiLSTM model is better as compared with other models. The accuracy of WORD Level BiLSTM, BPE Level BiLSTM and WORD Level CHAR Level BiLSTM is 60.27%, 58.59% and 54.24% respectively.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/35845 An Analysis of Digital Video Water Marking Techniques 2021-04-09T07:28:40+00:00 Ms.Shital Gupta , Dr.Megha Kamble a@a.com <p>This is a broad review of digital video water marking which is an important technique to restrict piracy. Piracy is one of the significant factors and concern for studios and movies producers. Now a day’s video piracy is harming the film industry and its revenue. If we see the global economy, production houses are becoming loss making units. In this Digital world, every day the technology is changing and the chances of misuse of video are also increasing at same rate. So multimedia security and secure video are challenging and inspiring problem for the researchers. This paper narrates the several video water marking techniques used to prevent and avoid the piracy in order to produce secured and full proof video and related multimedia content. In addition to this survey paper also highlights video water marking in transform domain with some prospective solution.</p> 2021-04-05T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/35983 Microgrid Control Schemes And Current Trends For Sustainable Energy 2021-04-23T13:21:36+00:00 N.Santosh Kumar, P.Hemeshwar Chary a@a.com <p>A microgrid is one of the improving concepts and creates the power grid works as smarter. Control technique in Microgrid working and operation is a key element for application and research. A microgrid is an aggregation of multiple distributed generators (DGs), energy storage systems, and loads. A microgrid can be operated in both islanding mode and grid-connected mode. Micro grid’s control is necessary to provide power quality, system stability, and also reliability. Most DG technologies, which can be installed in the microgrid, are not suitable to direct connection to the grid because of their power generation characteristics. Therefore, for the installation of these units in the microgrid, we need the power electronic converters. Hence, the main concern in the operation of the microgrid is to control the power electronics units. Microgrid’s control methods are different with respect to its structure that is mean that what type of microgrid exists for study, DC or AC microgrid or consolidation of them that is called hybrid microgrid. It is noticeable that control methods in the microgrid are also different from the point of view of control functions. For example, output power control of DGs, islanding detection, synchronization with the upstream grid, power quality, participation in the energy market and etc. Moreover, control methods of microgrid can be divided into two general categories such as control methods based on communication infrastructure and without communication link.</p> 2021-04-20T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/36043 Virtual Environments of Educational Administration to Enhance the Teaching-Learning Process 2021-04-27T13:13:07+00:00 Elvis Cluver Moreira Álvarez, Yita Maribel Briones Palacios <p>Information and Communication Technologies offer through communication, they open a range of possibilities of use that can be located in different areas of education. The proper use of virtual environments of Company Resource Planning or virtual environments of school administration, assume the function of managing the different dimensions of schooling, such as: general organization, teaching-learning, counseling, student participation and community safety. school. The objective of this study was to analyze the importance of virtual environments to enhance the teaching-learning process, showing some of the main characteristics and functionalities of these tools most used in educational activities. The method used was the bibliographic review, the descriptive and inductive with a qualitative approach. The criteria of experts who evaluated the efficiency and effectiveness, as well as the adaptability of these environments to the organizational processes of educational institutions and the development of the teaching-learning process, were analyzed. The results demonstrate a high degree of functionality both in its structure and in the contextualization of three learning platforms, Moodle, Dockeos and Chamilo.</p> 2021-04-27T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/36142 An Appraisal of Adoption of Information Technology and Innovative Measures in an Emerging Market 2021-05-03T17:22:28+00:00 Rishu Jain, Dr. Rohit Kumar <p>In this era of new technology, research facilities, globalization and the flood of new products, tough competition is being faced by Indian automobile industry. Today’s automotive consumers are well informed and have a wider choice in the market place. &nbsp;All the companies are facing massive challenges and strive to acquire the maximum possible market share in an overcrowded market. Therefore, the area of Relationship Marketing and CRM continues to receive attention both in literature and practice to enhance customer loyalty and customer retention. CRM has been accompanied by technology developments that emphasizes on individual or one to one relationships with customers by integrating database knowledge with the long term prospects of growth and customer loyalty. Hence, the present study empirically examines the extent of adoption of new technology and innovative measures to implement CRM by automobile companies in India. Data was collected from the 150 sales executives of top 10 car manufacturing companies in Punjab. The results found that the sales executives of all the companies believe that their respective automobile company adopts the new technology to implement CRM but their adoption level differs from company to company. However, initiatives are still required to use innovative strategies for the successful implementation of CRM technology.</p> 2021-05-03T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/36205 Computer Vision Based Moving Object Detection and Tracking 2021-05-11T15:02:18+00:00 Suresh Kumar , Prof. Yatin Kumar Agarwal <p><em>To detect and track objects, some approaches of detecting and tracking moving objects in stationary scene are presented, including the detection methods of the time domain differential method, the background differential method, optical flow method and tracking methods of the Kalman filter and feature optical flow. Keywords-moving object detection and tracking; background model; Kalman filter; optical flow. Object tracking is an important task within the field of computer vision. It is a challenging problem. Many difficulties arises in tracking the objects due to abrupt object motion, changing appearance patterns of both the object and the scene, non-rigid object structures, object-to-object and object-to-scene occlusions, and camera motion. This paper selectively reviews the research papers with regard to tracking methods on the basis of the object, their motion representations and all detailed descriptions of representative methods in each category examining their advantages/disadvantages.</em></p> 2021-05-01T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/36228 Under Publication Process 2021-06-07T16:33:56+00:00 Author 1 <p>Under Publication Process</p> 2021-05-12T00:00:00+00:00 Copyright (c) 2021 http://sersc.org/journals/index.php/IJAST/article/view/36242 Under Publication Process 2021-06-07T16:31:08+00:00 Author 1 <p>Under Publication Process</p> 2021-01-31T00:00:00+00:00 Copyright (c) 2021 http://sersc.org/journals/index.php/IJAST/article/view/36578 An Experimental and FEA approach to investigate the effect of LSP on the microstructure and corrosion resistance of Ti-17 titanium alloy. 2021-06-06T08:21:13+00:00 Sourav Ghosh, Ren XuDong, Jia Fei, Enoch, Zhaopao Tong, Wang Fan a@a.com <p>Ti-17 is a widely used material in the aircraft and marine industry while experiences severe environmental condition in its service life. Severe breakdowns happened to the marine vessels and other materials during its service life due to the corrosion. Therefore, to strengthen its material properties against electrochemical corrosion resistance, a novel technique laser shock processing has been employed. LSP is widely used for surface modification by improving its material properties. &nbsp;A simultaneous FEM analysis also conducted to validate the experimental results. An Nd: YAG (Neodymium-doped yttrium aluminum garnet) laser has been equipped with a 1064 nm wavelength. Three different laser energies 8J, 9J and 10J with laser power density 11.32 GW/cm<sup>2</sup>, 12.73 GW/cm<sup>2</sup>, 14.14 GW/cm<sup>2</sup> for 8J, 9J and 10J, respectively have been chosen. A 3 mm circular laser spot has been used with 50% overlapping rate. XRD, SEM, Vickers hardness tester, XRD sin<sup>2</sup> &nbsp;(2 ) technique were used to investigate the phase transformation, microstructure and grain refinement, micro hardness and compressive residual stress (CRS), respectively. Experimental results show that, a maximum -405 MPa compressive residual stress generated in the LSPed surface which is agreed by FEM and FEM shows that the affected depth is about 1500 m from the treated surface. Microstructure test reveals the original Ti-17 consists of a typical &nbsp;+ &nbsp;structure along the grain boundaries. SEM observation shows that coarse grain has been refined after the LSP treatment. Severe plastic deformation observed in the treated surface. Microhardness also improved after LSP and maximum hardness -398 HV were reported. Electrochemical test were conducted in 3.5% NaCl solution in room temperature with a three electrode system. OCP, EIS and potentiodynamic polarization study shows that corrosion resistance, corrosion current and corrosion potential improve after LSP. This research shows that the deformation induced martensites and surface roughness at higher laser power energy outweigh the beneficial grain refinement and compressive residual stress and has detrimental effect on corrosion resistance.</p> 2021-06-04T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/36641 Canonical Correlation Analysis of Some Crimes Rate and Unemployment in Nigeria (1999-2019) 2021-06-10T11:11:04+00:00 Ojekudo, Nathaniel Akpofure , Bekesuoyeibo Rebecca a@a.com <p><em>In the 21<sup>st</sup> century, the internet has become a quicker platform through which crimes are reported to the public. Crime is an important topic and is of interest to us because of the consequences and penalties it attracts. This work the study is to show the pattern and crime rate in Nigeria. Then, show the relationships that exist between crime figures and employment status/gender by using canonical correlation analysis (CCA). Secondary method of Data collection was employed. The findings reveal Burglary as the most common crime type reported over the period, followed by Murder. The trend employed trend analysis in time series, correlation and Canonical Correlation Analysis with a statistical software called Minitab 18. However, the aim of analysis reveals no trend for Murder, upward trend for Armed Robbery and downward trend for both bribery/corruption and Burglary. For correlation studies, it reveals that there is a relationship among the pairs considered at 0.05 level of significance and the CCA suggest variable (Burglary) on both ESG variables are significant (that is sex and employment status of the crime figures are significant than other SCR variables “Murder, Armed Robbery, Bribery and corruption”).</em></p> 2021-06-10T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/36642 Application Programming Interface (API) Library for Nigerian Software Development Industry 2021-06-10T11:13:27+00:00 Mbato, Nnwobuike Robinson, Ojekudo, Nathaniel Akpofure a@a.com <p><em>The concept of re-using functions or routines (or sometimes called libraries) built by the developer or a third party to address critical problems within applications by the developer without re-inventing the wheel is not new in software development. However, there are some extremely difficult situations in which an application must communicate with one or more other applications in order to share data/information without having prior knowledge of how such data/information is derived; thus, the name of such a process is Application Programming Interface (API).In the Nigerian software development industry, developers who build applications to access national critical data/information on a daily basis attempt to re-event the wheels where such capacity exists at the expense of cost and time, and are frequently confronted with limitations due to a lack of publicly re-usable functions, routines, or libraries that will enable access to such national critical data. This paper will offer a solution to this problem by providing a framework and an implemented application boilerplate that will allow Nigerian software developers to gain secure access to dozens of APIs that may target national critical data/information such as BVN, NIN, biometrics data, security data from security agencies, customs, NDLEA, immigration, licensing authorities &nbsp;and any other national critical data/information required by an application programmer without re-inventing &nbsp;the wheel thereby saving cost, time and removing limitations currently suffered by developers. The exploratory and explanatory research methodologies, as well as the Angular framework, were used to examine the impact of not reinventing the wheel. This work may be useful to programmers, API developers, researchers, security agencies, and any organization tasked with managing national critical data.</em></p> 2021-06-10T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/36695 Characterization of Friction Stir Weld Joint for Aluminum Alloy (AA6061) coated with Mg Particles 2021-06-17T15:47:20+00:00 Sibbala Nikhil Ram, Dr. N. Rajesh, P. Charan Teja, Dr. M. Chandra Sekhara Reddy <p>Friction stir welding (FSW) is a solid-state welding process which is having broad scope of joining materials which are relatively hard to be welded by fusion welding process. FSW process is highly energy-efficient and eco friendly as compared to the fusion welding. The purpose of this experimental work is to investigate and analyze the mechanical properties like Tensile Strength, Hardness and Impact strength by using Universal Testing Machine, Rockwell Hardness Tester and Charpy Impact Test Machine respectively on butt joint. Friction stir welding operation is performed on Aluminium alloy 6061 coated with magnesium particles. The optimum values were optimized by developing a Taguchi optimization technique. The experimental results have been analyzed by using ANOVA statistical technique to know the effect of process parameters. During this experimental work it is observed that AA 6061 has higher values of Tensile Strength and Hardness due to its strain hardening effect.</p> 2021-06-17T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37210 Integration of ICT as Teaching and Learning Tool for Teachers of English Language in Schools 2021-08-23T10:48:52+00:00 Dr. C. Suresh Kumar a@a.com <p><em>Literacy in Information and Communication Technologies (ICT) is basic to life in our modern technological society. In order to make the students literate for life-long learners and global citizens of the 21st century, we must successfully integrate Information Communication Technology into both the English curriculum and English teaching practices. The adoption of technology and innovation to instructing and learning problems has conveyed an incredible help to teaching as a whole. With the help of modern technology, teaching and learning procedures have become simpler, solid, genuine, appropriate to viable circumstances, pertinent to life, and retentive. This study is a descriptive research of the survey type. This study attempts to find out the ICT usage pattern of school English language teachers in Pondicherry. The sample used for this paper consisted of forty English language teachers randomly selected from ten schools in Pondicherry. A simple random sampling technique and self-structured validated questionnaire were used for the study. Findings of the study reveal that the English language schools teachers deem ICT only as an additional tool for teaching the children, whereas the traditional teaching method has been widely used for the teaching purpose.&nbsp; &nbsp;</em></p> 2021-08-19T00:00:00+00:00 Copyright (c) 2021 http://sersc.org/journals/index.php/IJAST/article/view/37331 Measurement of atmospheric pressure, temperature above Geopathic Stress Zone 2021-08-29T06:55:49+00:00 Dipali K. Kolhe ,N.P. Dharmadhikari,Shilpi Shrivastava a@a.com <p>The purpose of this paper is to measure atmospheric pressure (P) and temperature (T) in the Geopathic stress zone (GSZ) region above the surface of the earth in 15 locations in the Deccan Trap flood basalt region of Pune region, Maharashtra, India. Using the L-rod the deflection can identify GSZ areas, in addition to identifying the local division of L-rods occurs and marking the edges of the GSZ. A digital barometer was used to record atmospheric pressure and temperature, the results showing that both P (≈940.218hPa to 953.888hPa) and T (≈307.81k to 312.31k) were higher than non-GSZ. Analysis shows that measuring atmospheric pressure and temperature is an effective way to locate that GSZ field and measure its location.</p> 2021-08-19T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37451 Impact of Landfill Leachates on the Physico-Chemical Properties of Groundwater at Okhla Landfill Site 2021-09-29T09:08:06+00:00 Neeraj Saini, Manish Bhargav, Neeraj Verma, Kaushal Sharma, Satyam Garg <p>Physico-chemical analysis of water samples collected from the groundwater at Okhla landfill situated in Delhi to measure the impact of the landfill leach ate.&nbsp; Temperature, pH, turbidity, total dissolved solids (TDS), Dissolved oxygen (DO), Total Iron, Total Hardness, Nitrite, Nitrate, Calcium, and heavy metals such as Zinc, copper, and lead are the parameters that are determined in the groundwater at Okhla through the standard laboratory procedures and conventional equipment. These parameters are considered as the indicator of traceable pollution. The pH of the toxic pollution ranges from 5.7 to 6.8.Turbidity values of this pollution range between 26.5 to 27.50C.&nbsp; The Values of temperature for these parameters are considered as 266.5 to 27.50C. The concentration of the heavy metals found in the groundwater such as iron, nitrite, nitrate, and calcium ranged from 0.8 to 1.3 mg, 1.29 to 60 mg, 1 to 9.6 mg, and 16 to 121 mg respectively. The presence of chromium in the groundwater is not directly affected by landfills. From the statistical analysis, it is clear that significant differences among all the parameters for the samples were test at a 95% level.</p> 2021-09-29T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37595 Trace Metal Studies on the Level of Zinc Content from Limboti Reservoir with Reference to Agriculture Context 2021-11-26T07:29:39+00:00 Kondawar Ganesh M., Bhosle Arjun B., Lolage Yogesh P. <p>Limboti reservoir is situated near Limboti village of Loha Tehsil, Dist. Nanded of Maharashtra state. It is an Earth fill dam on the river Manar, engulfed with the different culture of agricultural land with soil pattern like little red soil, black cotton, sediments, fertilizers, bacteria from the livestock, food processing and various soil salts from irrigation drainage system. The metal pollutants are generally common in environment. There are different pollutants we always observe in agricultural soils and its occurrence, passing ways through the water defines the presence of natural as well as anthropogenic sources. However, these metals are in small quantities hence its referred as trace metals. The trace metals can occur naturally in the water but hardly ever at toxic level. The advanced culture of agriculture practices meanwhile contribute to containing waste, zinc covering material cause pollution in water body. Our emphasis is to identify quantitatively the concentration of zinc which is one of widespread essential micronutrient.</p> <p>Source of zinc as trace element is observed in an aquatic system by galvanized steel material, zinc coated pipes used for irrigation, agricultural fertilizers, and other sources. Zinc is essential as a nutritional element for humans, plants, and animals, it is biologically significant. Present investigations, the Limboti reservoir near to Nanded city, also its wide applicability, hence we have selected this site for work on zinc and agriculture. Water samples were collected from the different three locations (Site-1, Site-2 and Site-3). The analysis carried out during period of February 2018 to January 2019 continuously. Zinc is studied by UV Spectrophotometer of Shimadzu UV1800, at wavelength of 535nm. Dithizone is widely useful and popular method applied for the systematic estimation of zinc. Maximum value of zinc was observed as 1.66mg/L and the minimum noted as 0.7mg/L.</p> 2021-11-26T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37636 Vandalism Of Monuments and Neglect: A Concern for Heritage Tourism 2021-12-08T06:22:40+00:00 Zikho Qwatekana, Thulile Promise Ndlovu, Nkululeko Ephraim Zondi, Mthokozisi Sydney Luthuli <p>The occurrence of vandalism in structures of historical and cultural value has been largely observed in urban environments. The destruction to these structures ultimately imposes challenges to historical and cultural tourism in particular. Local municipalities in urban cities are tasked with a responsibility of maintaining local infrastructure and essential services to support tourism activity. However, amongst the biggest constraints for local governments to meet these objectives is limited budgets, therefore leaving the cities with unpleasant aesthetics. This study determines the extent and forms of vandalism that exists in the city of Pietermaritzburg, South Africa and its implications to heritage tourism. The city is governed within the jurisdiction of Msunduzi Municipality housing many of South Africa’s heritage monuments that are integral to the city’s history, culture and multiplicity of tourism offerings. A review of&nbsp; online sources as well as visual and photographic methods were applied for data collection. The analysis revealed various forms of vandalism mainly concentrated in the central business district (CBD). These results suggest that residents are oblivious to the intrinsic&nbsp; and monetary value of historic monuments. The disjuncture between residents and monuments may be attributed to South Africa’s harrowing history of oppression as well as the lack of connection and sentimental value. On this basis, it is recommended that Msunduzi Municipality in collaboration with heritage agencies creates post-colonial monuments that are inclusive and transformational. In addition, it is suggested that aggressive educational initiatives are introduced on existing monuments.</p> 2021-12-04T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37659 A Novel Implementation of Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services 2021-12-12T14:04:34+00:00 Mahadeva Karthik, Mrs. M. Revati <p>The demand for remote data storage and computation services is increasing exponentially in our data-driven society; thus, the need for secure access to such data and services. In this paper, we design a new biometric-based authentication protocol to provide secure access to a remote (cloud) server. In the proposed approach, we consider biometric data of a user as a secret credential. We then derive a unique identity from the user’s biometric data, which is further used to generate the user’s private key. In addition, we propose an efficient approach to generate a session key between two communicating parties using two biometric templates for a secure message transmission. In other words, there is no need to store the user’s private key anywhere and the session key is generated without sharing any prior information. A detailed Real-Or- Random (ROR) model based formal security analysis, informal (non-mathematical) security analysis and also formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool reveal that the proposed approach can resist several known attacks against (passive/active) adversary. Finally, extensive experiments and a comparative study demonstrate the efficiency and utility of the proposed approach</p> 2021-12-11T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37676 An Evaluation of the Channel Parameters for Optimum Energy Dissipation in Open Channel Flow System 2021-12-29T18:47:08+00:00 Satyam Garg, Neeraj Saini, Neeraj Verma, Ravpreet Kaur, Kaushal Sharma, Kiran Devi <p>Hydraulic jump is a useful means of dissipating excess energy and prevent scour below overflow spillways, chutes and sluices. In situations where the downstream depth is larger than the sequentdepthforanormaljump,adropinthechannelfloormaybeusedtoensurea jump. A hydraulic model investigation is conducted to evaluate the amount of energy dissipated by the hydraulicjumpinasloping channel with different slope and four different types of weirs. All the four different types of weirs were inserted in the channel to form the hydraulic jump together with three different channel slopes. Fromtheentiretestruns, amount of energy dissipated by the hydraulic jumps were calibrated with the experimental data to relate these energy losses for different types of weirs for various inflow velocity and to find out the best weir which can dissipate maximum amount of energy for the particular inflow velocity.</p> 2021-12-27T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37692 Synthesis of ALSIC NANO Mixed With PLA for Packing Applications 2022-02-10T15:26:39+00:00 M. Johnson, Dr. M. Ashok Kumar, Dr. K. Hemachandra Reddy test@test.com <p>Ceramics contain a distinctive property of completely absence of slip planes and have least probability of deforming by the application of force. Among these ceramics, the silicon carbide occupies a competent place to be used as a reinforcing agent for aluminum or its alloys. It has the density close to aluminum and is best for making composite having good strength and good heat conductivity. Present work focuses on preparation of packing micron films by hybridising PLA with NANO AlSiC. The PLA with inclusion of Storch mixture was pre-heated using a heating plate up to 50 degree Centigrade. The alumina nano particles and chopped glass/carbon fibers of length 1-7 mm (termed as short fibers) with the variation of 1, 2, 3, 4, and 5 wt% was considered for the open casting process.After being sealed in a glass beaker, it was transferred to bath ultra-sonication (22 kHz in frequency, 55 % power intensity with a sweep mode) followed by probe ultra-sonication for 30 min to achieve the fine particle or fiber dispersion and degassed for 4 h at 75degree Centigrade. The foil samples prepared at 30, 50,70,80 and 100 microns for preparing tests.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37699 Does The Monetary Policy Matter In A Multiple Currency Economy? Zimbabwe’s Experience 2022-02-24T08:32:48+00:00 David Damiyano, Nirmala Dorasamy a@a.com <p>This paper seek to establish the role of monetary policy in stimulating economic activities in Zimbabwe during the multiple currency era for the period 2009-2020. The study analyzed secondary time series data collected from RBZ, CSO and IMF publications. Data was tested for stationarity using the Augmented Dickey Fuller test and later the Johansen Cointegration test and Vector Error Correction Model were employed to determine long-run and short-run dynamic. The findings show positive influence of money supply, interest rates and the consumer price index of inflation on economic activity. The study therefore recommends that the government should monitor levels of inflation, develop policies to promote exports and employ fixed exchange rate to influence economic activity in Zimbabwe.</p> 2021-12-30T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37700 Multiple Currency and Non-Performing Loans on The Performance of Commercial Banks in Zimbabwe 2022-02-24T08:41:05+00:00 David Damiyano, Nirmala Dorasamy a@a.com <p>The purpose of this study is to establish the impact of non-performing loans on the performance of commercial banks in Zimbabwe, during the multiple currency era for the 2009-2017 period. Understanding the role played by banks in the Zimbabwean economy, it is essential to carry out a study of this nature to point out key banking areas impacted by bad loans. The study make use of secondary data from a survey of 13 commercial banks through the Reserve Bank of Zimbabwe. Data for this study was collected from the Reserve Bank of Zimbabwe (RBZ) published financial accounts, Bank Licensing Supervision and Surveillance (BLSS) quarterly reports and the International Monetary Fund (IMF) Annual Article IV consultation reports. The Johansen Cointegration test was employed to analyze data, to examine the existence of a long-run relationship between the variables. The results revealed a negative impact of credit risk on banks return on equity. Management efficiency and loan loss provision ratios has a positive long-run effect on bank performance whilst interest income and loans and advances ratios has an adverse long-run effect. This is a reverse of the prior expectations and it is a result of the underlining macroeconomic conditions in the Zimbabwean economy that causes banks to misbehave in anticipation of the future risks. Furthermore, the study make use of the Vector Error Correction Model (VECM) to check for short-run dynamics and found out a negative in the coefficient value of the error correction term. This implies existence of forces that restores back the long-run equilibrium of the model from short-run movements. A conclusion was drawn that non-performing loans are a major cause of concern to changes in liquidity and banks’ lending behavior.</p> 2021-12-30T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37701 Does Dynamic Capabilities Enhance Algerian Firm Export Performance? Role of Innovation ambidexterity and Strategic Planning Effectiveness 2022-02-24T08:49:07+00:00 Emir Moumene Benabid, Fakhrorazi bin Ahmad a@a.com <p>Across the globe, executives and managers recognized that one of the successful ways toward survival and further growth is the export and internationalization of their businesses (Namada et al., 2017). Studies found that export performance plays a significant role in enhancing gross domestic products of the nations and lead to provide a wide range of products to international markets (Bianchi &amp; Wickramasekera, 2016). Export performance is an important tool for those seeking to achieve their desires and goals (Celec, Globocnik, &amp; Kruse, 2014).&nbsp; Therefore, the increased attention made by that businessmen and nations due to its strategic benefits regarding the manipulation of foreign markets and delivering such cultures and values with the spread of this variety of products (Rebrab, 2015). Academics as well give more attention to address this phenomenon for better understanding of the consequences and antecedent of superior export performance (Namada et al., 2017).</p> 2021-12-30T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37892 Role of 5G in Data Collection and Application 2022-05-22T11:25:25+00:00 Rahul Kumar Chawda, Dr. Varaprasad Kolla, Dr. Byju John gaurav@gaurav.com <p>Beginning with the original of remote correspondence systems, remote systems have caused the whole modern transformation. In the 2G period, the call brought individuals closer, and email stretched the time individuals worked. In the 3G period, individuals have enhanced their lives through handheld gadgets, regardless of whether it is riding the Internet, staring at the TV, motion pictures, or steadily applying remote systems to work and business. In the 4G time, the prevalence of touch screens, the portability, processing force and transmission capacity of cell phones started to step by step supplant individuals' reliance on work areas and PCs, through cell phones, paying little heed to Internet, shopping, installment, move, discussion, and social administrations. Gathering associations, synergistic work and gatherings at work, and so forth., have totally switched the manner in which individuals live. Individuals can completely address the issues of life through their cell phones without going out. So for the approach of the 5G period, individuals have more prominent desires and humiliation. Everybody is additionally inquisitive about the approach of the 5G time. What are the contrasts between the above information and the test confirmation? This examination is to break down the two distinct frameworks through contextual investigations and plan to give future information. Take a specialized reference.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37893 6G Technology Healthcare Management 2022-05-22T11:27:18+00:00 Rahul Kumar Chawda, Dr. Varaprasad Kolla, Dr. Byju John gaurav@gaurav.com <p>The present usage of 5G innovation has pushed the scholarly network to consider what is straightaway. To appropriately respond to this inquiry, we need to make sense of which will be the necessities later on. This paper manages the responses to those inquiries for the wellbeing vertical of 6G. The developed and the maturing of populace overall make the present social insurance frameworks impractical later on. Remote wellbeing must be executed to leave all residents alone followed and oversaw in the wellbeing procedure of their life by seeking after a financially practical route for the network. 6G is imagined to be an innovation which won't just make the remote social insurance valid, however it likewise will permit the Internet of Bio-Nano-Things, leaving the human body alone piece of the "Net". Exceptionally low complex wearable/implantable gadgets will be a piece of our regular day to day existence, which can recuperate data about our wellbeing and way of life from each item we collaborate with, from a jug of water to a shrewd medication.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/37974 Do Gulf Cooperation Council Trade Determined By Geographical Proximity And Cultural Similarity? 2022-09-15T08:11:01+00:00 Sadok Achour, Abdelhak Tir, Okba Rimi, ElHachemi Tamma, Adel Ziadi a@a.com <p>The aim of this paper is to examine the impact of cultural and geographic determinants on trade flows of the Gulf Cooperation Council (GCC) countries. For the methodology, we have used a gravity model to estimate the determinants of GCC exports and imports with 58 trading partners over the period 2000-2019. The findings show that the Fixed Effects Model (FEM) predicts that the effect of geographic proximity and cultural similarity on trade flows for GCC countries is insignificant. These results contradict the expected results of the gravity model. In addition, we extend the estimation of the gravitational model by using the Poisson pseudo-maximum likelihood with High-Dimensional Fixed-Effects (PPMLHDFE). The findings were impressive. We found that geographical distance and common language reduce GCC exports and imports. The colonial is an essential trading partner of the GCC countries.</p> 2022-09-10T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/38021 Analysis of Proposed NIST Framework on Software Supply Chain Risks for Companies 2022-11-18T13:13:04+00:00 Pramod Misra, Neha Tiwari tojqi@gmail.com <p><strong>Background</strong>: Information and Communications Technology (ICT) and operational technology (OT) relies on a complicated, widely dispersed, intricate, and interrelated supply chain ecosystem that is made up of numerous layers of outsourcing and routed through various geographic regions. The National Institute of Standards and Technology (NIST) Cybersecurity Supply Chain Risk Management (C-SCRM) program assists enterprises in managing the rising risk of purposeful or inadvertent supply chain compromise connected to cybersecurity.&nbsp;</p> <p><strong>Aims and Objectives:</strong>&nbsp;To find out the applicability of NIST framework in software supply chain for companies.&nbsp;</p> <p><strong>Methods:</strong>&nbsp;For software developers and producers, it is essential to follow the basic set of high-level safe software development standards outlined in SSDF V1.1. Many of these developments have come to light as a result of the publishing of Executive Order (EO) 14028 and publications from various industries. We analysed various literature put forward by different organizations.&nbsp;</p> <p><strong>Results</strong>: Accenture outlined the essential conditions for safeguarding SW source code. More efficient system-oriented architectures can successfully combat large-scale breaches that result in the revealing of customer and commercial information as well as ransomware assaults. By exposing a complete list of software components in the finished products, including third-party binaries and problems introduced in the build stage like improper compiler defence options and build environments.&nbsp;</p> <p><strong>Conclusion:</strong>The study concludes NIST is sufficiently helping companies for avoiding cyber threats and deal with daily cyber risks. Regular upgradation will keep NIST active and capable of serving small companies in dealing with cyber threats.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/38033 E-commerce Impact on Economic Development: A Case Study of Amazon 2022-11-30T07:23:20+00:00 Aichouche Mohammed El Hafedh test@test.com <p>The continued advancement of technology leads to the spread of E-commerce into both developed and developing countries, which is anticipated to enhance the country's economy. The purpose of this article is to investigate the effects of e-commerce on the&nbsp;economic development. This article will look at Amazon as a case study to discuss its influence in the American economy. The findings reveal that Amazon makes a significant contribution to the US economy by investing in a variety of sectors, generating employment, paying taxes, and addressing climate change.</p> 2021-06-30T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/38067 You are what you pay: A Case Study in Venmo 2023-02-11T09:08:05+00:00 Mrunmayee Khare , Rajvardhan Oak a@a.com <p>With the advent of the Internet Age, digital payments have become the cornerstone of the economy. From vendors on the street to billion dollar corporations, all entities accept payments through digital modes. Venmo, a mobile application by PayPal is popular for facilitating peer-to-peer digital transactions without a fee. Users can request or send money to other users by scanning a QR Code, or via a phone number or email address. While the primary purpose of the app is money transfer, Venmo goes a step ahead and adds a social component to it: users can add others as friends, like or dislike transactions, and even leave comments. Our study aims to understand privacy issues in using Venmo for monetary transactions. To this end, we examine the Venmo activity of N = 10 users, and conduct follow-up semi-structured interviews with them. We discover that transactions on Venmo are public by default, and need specific user effort to make them private. These transactions can potentially reveal information about a user's habits, preferences, financial circumstances, family and friends. Friend lists are publicly visible to others. The privacy settings section of the application is obscure and hard to find. Based on our digital investigation and user study, we provide a set of recommendations that can improve user privacy in payment apps, even those that have a social component.&nbsp;</p> 2021-10-27T00:00:00+00:00 Copyright (c) 2023 http://sersc.org/journals/index.php/IJAST/article/view/38068 Optimizing Fuzzy Assignment Problem with Randomly Generated Triangular Fuzzy Numbers 2023-02-11T09:07:05+00:00 K Ravinder Reddy, Ch. Rajitha, B Harika, L P Raj Kumar a@a.com <p>Random numbers are critical as they generate the keys which are used in encrypting the data and are generated by a process, where the outcome is unpredictable and cannot be reproduced. Even in cases, where the input is precisely known, there will be no clear knowledge on which portion of input is observable and these issues may be addressed by appropriate sensitivity analysis in assignment problems which in turn support decision making. In this paper, the associated costs are taken as Randomly Generated Triangular Fuzzy Numbers (TrFNs), Robust Ranking Technique is used for defuzzification, and Hungarian method is used in determining the fuzzy optimal solution and is related with the original fuzzy assignment problem. This study is used&nbsp;to identify how much variations in the input values for a given variable impact the results for a mathematical model, and it is proposed to use the decision making methods for solving multi-criterion group decision making processes.</p> 2021-12-23T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/38129 A Literature Review on Smart Agriculture Crop Prediction Techniques 2023-04-12T07:28:26+00:00 P. Vara Prasad, M. Ravi Sankar, Dr. Praveen Kumar author@email.com <p>India is traditionally an agriculturally based country. The population of India growing tremendously and touches the world’s first position within few years. So, it is evident that the existing agriculture system does not fulfil the future demand. Hence, it is necessary to adopt smart farming technology in Indian agriculture systems and also encourage the farmers to improve their crop yielding and to predict crop as well as less utilisation of water resources.&nbsp; &nbsp;Therefore, a literature review is very much needful to focus on recent development trends in smart farming technologies in agriculture such as Internet of Things (IoT), Data Mining Techniques, Machine learning Algorithms and Cloud Computing. This paper presents different emerging systems including IoT and Mobile Agent Systems which are using in the worlds agriculture system to&nbsp;&nbsp; predict crop yield, with minimum water utilisation and forecasting whether such as rainfall, temperature etc. And also, this paper &nbsp;&nbsp;presents&nbsp; &nbsp;advantages and limitations of the different techniques along with some recommendations to implement in agriculture system thereby it leads to improve economic benefits to the famers.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/38262 Conjoint Coupling Lessening in Multiband MIMO Antenna Using Cross-Slot Fractal Multiband EBG in the E-Plane 2023-07-05T10:51:51+00:00 Medepalli Narasimha Rao, Ramgopal author@email.com <p>In this paper, provided a technical description of a research study involving the design and implementation of a multiband electromagnetic band gap (EBG) structure and a multiband multiple-input and multiple-output (MIMO) antenna for mutual coupling reduction. Here's a brief explanation of the terms and concepts used in the description. Electromagnetic band gap (EBG) structure is periodic structure made of dielectric or metallic materials that act as a filter for electromagnetic waves. It has the ability to prohibit the propagation of certain frequencies at 5.7 GHz, 7.5 GHz, and 10 GHz frequencies. and allows others to pass through. Multiband EBG structure: An EBG structure that can filter multiple frequencies simultaneously. MIMO antenna of that uses multiple antennas at the transmitter and receiver to improve the communication performance. It allows for multiple data streams to be transmitted and received simultaneously, which increases the data rate and reliability of the communication system. Mutual coupling: A phenomenon that occurs when the electromagnetic fields of two antennas interfere with each other, leading to degradation in communication performance. Envelope correlation coefficient: A metric used to measure the similarity of the signals received by two antennas in a MIMO system. It indicates how correlated or independent the signals are. Channel capacity loss: A measure of the reduction in the maximum achievable data rate due to the presence of mutual coupling in a MIMO system.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/38282 Particle Swarm Optimization based Communication and Fault Tolerant Clustering Protocol for Wireless Communication 2023-08-09T07:04:23+00:00 Asa Jyothi G. author@email.com <p>In wireless sensor networks (WSNs), energy efficiency can be achieved through the implementation of a variety of various strategies, the sole purpose of which is to lower overall energy consumption. However, fault tolerance and energy balancing give equal importance for enhancing the network lifetime. A shortest path is what defines for the Base Station (BS), although it is important to have both. Clustering is one of the effective approaches for wireless sensor networks and has been believed to be one of the best ways to save energy in wireless sensor networks. Failures can occur as a result of excessive overload, which causes more energy to be consumed by the cluster heads (CHs) in a cluster-based wireless sensor network (WSN) in order to receive and aggregate the information from member sensor nodes. The choice of CHs has been an important factor in the amount of energy that sensor nodes have needed to use in order to make WSNs last longer. Particle Swarm Optimization (PSO) is one of the intelligent strategies that are proposed in "An Energy Efficient Unequal fault tolerant clustering approach," also known as "PSO-FL-C," with the purpose of lowering the amount of energy that is used. An optimal MCH-MDA selection technique has been given in the approach. This method makes use of the fitness values, and it evaluates these values based on the PSO to find two optimal nodes in each cluster that will operate as the Master Data Aggregator (MDA), and the MCH. The selected MCH is the only one who can collect the data from the cluster members, and the MDA is the one who is responsible for receiving the data from the MCH before sending it on to the BS. As a result, there is a decrease in the MCH overhead. During times of intense data transfer, overhead controls are implemented through the utilization of energy-efficient time division multiple access (EE-TDMA) scheduling. In order to demonstrate the superiority of the suggested approaches based on a variety of performance indicators, simulations will be run, and the results will be compared with those of the existing methods.</p> 2021-04-02T00:00:00+00:00 Copyright (c) http://sersc.org/journals/index.php/IJAST/article/view/38346 Enterprise Resource Planning’s Fundamental Concepts of Growth of the User Satisfaction 2024-01-27T11:57:24+00:00 Saurabh Shandilya, Ashish Chourasia author@email.com <p>ERP package developers, as well as the organisations interested in implementing ERP systems, must determine what features should be included in an ERP package for TEIs. Enterprise resource planning (ERP) aims to improve the overall efficiency of the system as well as the efficiency of the business. It also aims to improve communication and coordination as well as task efficiency. Having an enterprise resource planning (ERP) system in place that is strategically oriented toward directly responding to expanding consumer demands and seizing market opportunities as they arise, is critical nowadays ERP is simply seen as a tool for winners, who use it to efficiently obtain critical information and act on it as soon as possible. ERP systems differ from other types of systems in that they are pre-packaged software solutions rather than custom-built systems. Therefore, they are pre- loaded with assumptions and procedures regarding the business operations of the businesses in which they are used. Enterprise resource planning (ERP) success is defined as the successful implementation of such systems to improve operational efficiency and effectiveness. The advantages of scientific ERP solutions are numerous and varied. We can say that an enterprise system streamlines a company's information flows and offers management immediate access to a wealth of real-time operating info. For a lot of businesses, these advantages have translated into remarkable gains in pace as well as efficiency.</p> 2021-04-02T00:00:00+00:00 Copyright (c)