ABC Journal of Advanced Research最新文献

筛选
英文 中文
Effects of Operating Pressure, Nozzle Diameter and Wind Speed on the Performance of Sprinkler in Irrigation System during Water Application 喷淋过程中操作压力、喷头直径和风速对喷灌系统喷头性能的影响
ABC Journal of Advanced Research Pub Date : 2018-12-31 DOI: 10.18034/ABCJAR.V7I2.78
Dereje Bishaw Nigatie, M. Dinka, T. Hordofa
{"title":"Effects of Operating Pressure, Nozzle Diameter and Wind Speed on the Performance of Sprinkler in Irrigation System during Water Application","authors":"Dereje Bishaw Nigatie, M. Dinka, T. Hordofa","doi":"10.18034/ABCJAR.V7I2.78","DOIUrl":"https://doi.org/10.18034/ABCJAR.V7I2.78","url":null,"abstract":"Owing to an increasing demand for irrigation water associated with the massive expansion of irrigated sugarcane farms in Ethiopia, there is a need to use the available water efficiently and effectively. Accordingly, a study was conducted to evaluate the effect of operating pressure and nozzle size on the field performance of dragline sprinkler system at Wonji/Shoa Sugar Estate. The study was conducted under three wind phases (morning, mid-day and late afternoon) using three operating pressures (250 kPa, 300 kPa and 350 kPa) and two nozzle sizes (4.4 and 4.8 mm). Uniformity measurements were performed using single sprinkler and four sprinklers configurations. An application efficiency of low-quarter of 41% to 80.3% and actual application efficiency of low-quarter of 30.1% to 37.5% were achieved under the respective test combinations. Christiansen’s coefficient of uniformity of 71.7% to 86.3%, and distribution uniformity of 61% to 80.3% were achieved under different test combinations for four sprinklers test. The achievable delivery performance ratio was in the range of 0.81 to 1.18. The experimental results illustrated that, lower operating pressure and higher wind velocity were the major factors responsible for the low water distribution uniformity and efficiency.  \u0000  \u0000 \u0000  \u0000","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131395145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Origins, Evolution and Current Activities of Sunni Salafi Jihadist Groups in Bangladesh 孟加拉国逊尼派萨拉菲圣战组织的起源、演变和当前活动
ABC Journal of Advanced Research Pub Date : 2018-12-31 DOI: 10.18034/ABCJAR.V7I2.80
Labiba Rahman
{"title":"Origins, Evolution and Current Activities of Sunni Salafi Jihadist Groups in Bangladesh","authors":"Labiba Rahman","doi":"10.18034/ABCJAR.V7I2.80","DOIUrl":"https://doi.org/10.18034/ABCJAR.V7I2.80","url":null,"abstract":"Despite its global recognition as a moderate Muslim country, Bangladesh has been experiencing increasing bouts of religious fundamentalism and militant activities since 2005. This phenomenon is not altogether novel to the country. During the Liberation War of 1971, Bengali freedom fighters faced staunch opposition from the Pakistani armed forces as well as Islamist militias under the control of Jamaat-e-Islami, an Islamist political party. Even after attaining its independence, Bangladesh has struggled to uphold the pillars of democracy and secularism due to political, social and religious drivers. Between January 2005 and June 2015, nearly 600 people have died in Islamic terrorist attacks in the country. These militant outfits either have close ties to or are part of Al Qaeda Indian Subcontinent (AQIS) and the Islamic State (ISIS). Despite such troubling signs and the fact that it is the fourth largest Muslim majority country in the world, Bangladesh has generally received little attention from academics of security studies. This paper aims to provide a comprehensive analysis of the drivers and trends of Sunni Salafi jihadist groups operating in Bangladesh to ascertain the implications for counterterrorism activities. Political, social and religious interventions that go beyond the hard approach must be undertaken to control the mounting threat of Islamist terrorism to the security and stability of the nation.  \u0000 ","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Privacy-Preservation: A Method of Machine Learning 数据隐私保护:一种机器学习方法
ABC Journal of Advanced Research Pub Date : 2018-11-22 DOI: 10.18034/abcjar.v7i2.654
Sandesh Achar
{"title":"Data Privacy-Preservation: A Method of Machine Learning","authors":"Sandesh Achar","doi":"10.18034/abcjar.v7i2.654","DOIUrl":"https://doi.org/10.18034/abcjar.v7i2.654","url":null,"abstract":"The privacy-preservation field in cyber security tends to affiliate with the protection measure related to the use of data and its sharing via third parties for activities such as data analysis. The paper's main objective for this research article will be to use machine learning models that tend to aid as a privacy-preservation technique (PPT). The augmentation of machine learning as a technique for privacy preservation has been able to address the challenges facing the current field of cyber security concerning data protection and security. The paper summarizes the methods such as \"federated learning\" to address the current issue in the network security field relating to data protection. The rise of augmentation of machine learning in privacy preservation is due to the development of cloud-based applications that are usually prone to data protection issues. Thus, the result of machine learning was necessary to counteract data insecurity. However, the use of machine learning in privacy preservation has remained proficient; there still needs to be a literature gap between the theory and the application of machine learning. ","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133375955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Application of Machine Learning Techniques in Software Project Management- An Examination 机器学习技术在软件项目管理中的应用——考试
ABC Journal of Advanced Research Pub Date : 2018-11-20 DOI: 10.18034/abcjar.v7i2.626
M. Pasupuleti
{"title":"The Application of Machine Learning Techniques in Software Project Management- An Examination","authors":"M. Pasupuleti","doi":"10.18034/abcjar.v7i2.626","DOIUrl":"https://doi.org/10.18034/abcjar.v7i2.626","url":null,"abstract":"Planning and evaluating project management are key parts of project performance that should not be overlooked. It is difficult to succeed at project management unless you have a realistic and logical plan in place. This paper provides a comprehensive overview of papers on the application of machine learning in software project management, covering a wide range of topics. Apart from that, this study examines machine learning, software project management, and methodologies. Papers in the first category are the results of software project management studies or surveys. Papers in the third category are based on machine-learning methods and strategies applied to projects; studies on the phases and tests that are the parameters used in machine-learning management; and final classes of study results, contribution of studies to production, and promotion of machine-learning project prediction. Our work also provides a larger perspective and context, which could be useful for future project risk management research, among other things. To summarize, we have demonstrated that project risk assessment using machine learning is more effective in minimizing project losses, increasing the likelihood of project success, providing an alternative method for efficiently reducing project failure probabilities, increasing the output ratio for growth, and facilitating accuracy-based analysis of software fault prediction.  \u0000 ","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128990652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AI and Machine Learning in Retail Pharmacy: Systematic Review of Related Literature 零售药房的人工智能和机器学习:相关文献的系统综述
ABC Journal of Advanced Research Pub Date : 2018-11-15 DOI: 10.18034/abcjar.v7i2.514
Praveen Kumar Donepudi
{"title":"AI and Machine Learning in Retail Pharmacy: Systematic Review of Related Literature","authors":"Praveen Kumar Donepudi","doi":"10.18034/abcjar.v7i2.514","DOIUrl":"https://doi.org/10.18034/abcjar.v7i2.514","url":null,"abstract":"Artificial intelligence and machine learning are the future of every field. These can be applied in any field for better or efficient performance. Both these can be used in retail pharmacy as a solution to different problems. The machine learning prediction model can help in predicting the disease of patients and it can also be used to predict the medicine for the patient. AI systems can be used to automate the tasks that will help in saving time and also the tasks will be performed by using fewer resources. ","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"37 32","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120811449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Rohingya Muslims in Myanmar are Victim of Genocide! 缅甸的罗兴亚穆斯林是种族灭绝的受害者!
ABC Journal of Advanced Research Pub Date : 2018-08-10 DOI: 10.18034/ABCJAR.V7I2.82
H. Mohajan
{"title":"The Rohingya Muslims in Myanmar are Victim of Genocide!","authors":"H. Mohajan","doi":"10.18034/ABCJAR.V7I2.82","DOIUrl":"https://doi.org/10.18034/ABCJAR.V7I2.82","url":null,"abstract":"This article deals with the genocide against the Rohingya Muslims in Myanmar. For decades, the Rohingya in Myanmar has been the victim of the extensive violation of human rights. Recently the Rohingya, Karen, San, Chin, and other ethnic groups are facing ethnic cleansing in Myanmar. Of them, the Rohingya is the mostly dehumanized and persecuted ethnic minority group. The Rohingya is stateless and exile in its own country. The Government of Myanmar (GoM) has taken attempts for establishing one nation, one language, and one religious policy in the country. Since 2012 the persecution upon the Rohingya in Myanmar falls in the genocide. In 1917, the Rohingya faced the final stages of genocide. Genocide is considered as one of the worst moral crimes a Government can commit against its citizens. An attempt has been taken here to discuss the aspects of genocide, and genocide upon the Rohingya Muslims in Myanmar.  \u0000  \u0000 \u0000  \u0000","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124304711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Assessment of Sesame Bacterial Blight (Xanthomonas Campestris Pv. Sesami) on Sesame (Sesamum indicum L.) in North Gondar, Ethiopia 芝麻白叶枯病菌的鉴定。埃塞俄比亚贡达尔北部的芝麻(Sesamum indicum L.)
ABC Journal of Advanced Research Pub Date : 2018-06-16 DOI: 10.18034/abcjar.v7i2.81
A. Azanaw, C. Fininsa, Samuel Sahile, Geremew Terefe
{"title":"Assessment of Sesame Bacterial Blight (Xanthomonas Campestris Pv. Sesami) on Sesame (Sesamum indicum L.) in North Gondar, Ethiopia","authors":"A. Azanaw, C. Fininsa, Samuel Sahile, Geremew Terefe","doi":"10.18034/abcjar.v7i2.81","DOIUrl":"https://doi.org/10.18034/abcjar.v7i2.81","url":null,"abstract":"Sesame is one of the important oil crops in Ethiopia for the international market while its production has challenged by lack of appropriate agronomic practices, weather uncertainties, weeds, insects and diseases outbreaks. Bacterial leaf blight caused by Xanthomonas campestris PV. sesami is the most common and inflicts heavy qualitative and quantitative losses. The objectives of the present study were to assess bacterial blight incidence, severity and its association with agronomic practices in north Gondar Ethiopia. A Field survey was conducted in Metema and Mirab Armachiho in 2014 cropping season at flowering and fruiting growth stages. A total of 80 fields were assessed for the disease assessment from both large and small-scale farmers. Data on prevalence, incidence, severity and, management practices have been recorded. All surveyed fields were infected both at flowering and fruiting stage of the crop. Mean incidence over the two districts varied from 78% at Metema to 96.5% at Mirab Armachiho. The minimum mean severity (6.1%) has been recorded in Metema district and, the highest mean severity (76.9%) has been recorded at Mirab Armachiho. The association of independent variables with bacterial blight incidence and severity were varied. The district, variety, growth stage, altitude, slope, crop density, previous crop, soil type, and weed density variables have significantly associated with bacterial blight incidence. Variables producer and sowing date were non-significant as a single predictor in the logistic regression model. Similarly, all the variables were significantly associated with bacterial blight severity.  \u0000  \u0000 \u0000  \u0000","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Application Development to Backing the Legitimacy of Digital Annals: Use of the Diplomatic Archives 支持数字编年史合法性的软件应用开发:外交档案的使用
ABC Journal of Advanced Research Pub Date : 2017-09-20 DOI: 10.18034/abcjar.v6i2.618
Harshini Priya Adusumalli
{"title":"Software Application Development to Backing the Legitimacy of Digital Annals: Use of the Diplomatic Archives","authors":"Harshini Priya Adusumalli","doi":"10.18034/abcjar.v6i2.618","DOIUrl":"https://doi.org/10.18034/abcjar.v6i2.618","url":null,"abstract":"As a fundamental design feature of their digital archives, this approach was applied to the project. It has so demonstrated considerable potential in terms of defining and condensing crucial data pieces that support the presumption of authenticity across a wide range of record formats. The purpose of this study is to offer a conceptual technique, which will be referred to as object-oriented diplomacy in this work. This methodology focuses on creating digital records that can maintain their authenticity over time and when they are removed from their original systems. This is accomplished through the extension of archival diplomatic theory and the application of object-oriented programming (OOP) principles. A new way to support the presumption of the authenticity of digital records is presented in this study, which makes use of concepts from archival diplomatic theory, which are combined with OOP principles. It is the author's goal that this work may spark a more fruitful collaboration between archivists and records managers and software developers in the development and implementation of digital repositories in the future. ","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116330374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Credit Card Fraud Detection using Machine Learning: A Systematic Literature Review 使用机器学习的信用卡欺诈检测:系统的文献综述
ABC Journal of Advanced Research Pub Date : 2017-09-15 DOI: 10.18034/abcjar.v6i2.547
Harish Paruchuri
{"title":"Credit Card Fraud Detection using Machine Learning: A Systematic Literature Review","authors":"Harish Paruchuri","doi":"10.18034/abcjar.v6i2.547","DOIUrl":"https://doi.org/10.18034/abcjar.v6i2.547","url":null,"abstract":"Companies want to give more and more facilities to their customers. One of these facilities is the online mode of buying goods. The customers now can buy the required goods online but this is also an opportunity for criminals to do frauds. The criminals can theft the information of any cardholder and use it for online purchases until the cardholder contacts the bank to block the card. This paper shows the different algorithms of machine learning that are used for detecting this kind of transaction.  \u0000 ","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Big Data as a Driving Tool of Digital Transformation 大数据作为数字化转型的驱动工具
ABC Journal of Advanced Research Pub Date : 2016-12-31 DOI: 10.18034/abcjar.v5i2.616
Harshini Priya Adusumalli
{"title":"Big Data as a Driving Tool of Digital Transformation","authors":"Harshini Priya Adusumalli","doi":"10.18034/abcjar.v5i2.616","DOIUrl":"https://doi.org/10.18034/abcjar.v5i2.616","url":null,"abstract":"As a result of this research, it was discovered how Big Data is characterized by the five Vs: Velocity, Volume, Variety, Veracity, and Value; and how Hadoop and other tools, in conjunction with distributed computing capacity, are utilized to meet the needs of Big Data. The research defines the abilities necessary to analyze Big Data, as well as the method of Data Mining and how it generates results, and it also includes recommendations. Physicians may use data science to give the best care possible for their patients, and meteorologists can use it to anticipate the scope of local meteorological occurrences. Data science can even be used to predict natural disasters such as earthquakes and tornadoes. Capturing data is an excellent way for businesses to begin their data science journeys. They can begin evaluating the data as soon as they obtain it. Here are some examples of how people produce data and how corporations such as Netflix, Amazon, United Parcel Service (UPS), Google, and Apple exploit the data generated by their customers and workers. When a Data Science project is completed, the final output should be used to communicate new information and insights gained from the data analysis to important decision-makers. \u0000 ","PeriodicalId":130992,"journal":{"name":"ABC Journal of Advanced Research","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信