International Journal of Engineering and Applied Computer Science最新文献

筛选
英文 中文
In Vitro Micropropagation Studies Cotyledonary Explants Of Trichosanthes Anguina (L) 栝楼子叶外植体离体微繁研究
International Journal of Engineering and Applied Computer Science Pub Date : 2022-04-30 DOI: 10.24032/ijeacs/0403/003
M. Venkateshwaralu
{"title":"In Vitro Micropropagation Studies Cotyledonary Explants Of Trichosanthes Anguina (L)","authors":"M. Venkateshwaralu","doi":"10.24032/ijeacs/0403/003","DOIUrl":"https://doi.org/10.24032/ijeacs/0403/003","url":null,"abstract":"A method for Invitro Micropropagation Through Cotyledonary Explants of Trichosanthes anguina was exercised from 10-15 days of young stage explants [1, 2]. Developed a protocol for cotyledonary explants cultures, callus induction, and regeneration through cotyledon callus tissue [3, 4]. Multiple shoot formation was promoted by BAP 1.0 mg/l to 3.0 to 5.0 mg/l and higher combination with NAA 3.0 to 4.0 mg/l Kn [5, 6]. Invitro produced small shoots were green callus induced to cotyledonary callus cultures green compact small shoots buds were induced in 16-20 days cultures respectively on Ms. Medium.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131575734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Literature Review on Energy Healing Techniques and Biofield – Detection and Scientific Analysis 能量治疗技术与生物场检测与科学分析的文献综述
International Journal of Engineering and Applied Computer Science Pub Date : 2022-04-15 DOI: 10.24032/ijeacs/0403/002
Jeo Joy A, Suresh Kumar Rudrahithlu, Molly Joy
{"title":"A Literature Review on Energy Healing Techniques and Biofield – Detection and Scientific Analysis","authors":"Jeo Joy A, Suresh Kumar Rudrahithlu, Molly Joy","doi":"10.24032/ijeacs/0403/002","DOIUrl":"https://doi.org/10.24032/ijeacs/0403/002","url":null,"abstract":"Energy Healing techniques are considered as one of the age-old practices dating its origin back to the ancient scriptures, to be precise much earlier than those. Scientific technology has been incorporated on a small scale into these in recent decades, beginning in the twentieth century. Even in the twenty-first century, little progress has been made in this area. This literature review is an eye-opener for the world to get familiarized with various energy healing techniques and their basic functionality. The various technical devices used for the detection and treatment of the biofield are depicted in brief in this review. The modalities in which Artificial Intelligence is used in various energy healing techniques are introduced here. The review culminates with a note on the future scope of the Energy Healing techniques on a wider horizon incorporating Artificial Intelligence wherever necessary.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Framework for Selecting Elicitation Technique based on Attribute Mapping 一种基于属性映射的启发技术选择框架
International Journal of Engineering and Applied Computer Science Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/001
Attique Ahmed, M. Naeem
{"title":"A Novel Framework for Selecting Elicitation Technique based on Attribute Mapping","authors":"Attique Ahmed, M. Naeem","doi":"10.24032/ijeacs/0402/001","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/001","url":null,"abstract":"The software development process is completely based on the requirements of stakeholders. If the requirements of stakeholders are being integrated into the proposed system, then it can be assumed that the end product is going to be optimal and successful. To achieve a successful product, different Requirement Elicitation Techniques (RET) are being practiced. The selection of a suitable RET is based on the nature of the product being developed. So, a single RET doesn’t fit all products. In this paper, we differentiate all RETs from each other which makes it easier for an analyst to choose suitable RET from the available ones. We further designed a novel mapping framework that extracts the best suited RET to any software based on its attributes. We have further implemented the proposed framework by using an online vehicle booking system as a running example.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126793467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of the Bus Topology Network for Effectual Data Distribution 有效数据分发的总线拓扑网络性能分析
International Journal of Engineering and Applied Computer Science Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/007
Ojo Jayeola Adaramola, Jamiu Olasina
{"title":"Performance Analysis of the Bus Topology Network for Effectual Data Distribution","authors":"Ojo Jayeola Adaramola, Jamiu Olasina","doi":"10.24032/ijeacs/0402/007","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/007","url":null,"abstract":"Stability, reliability, efficiency, and dependability necessitate a higher performance feature-based system in Ethernet LAN to meet the prevalent emergent technology of 5G and beyond 5G in the domain of networking. LAN technology has experienced the most progression since it came to reality. Despite its ability to achieve promising performance, the technology still keeps some topology characteristics that have a greater influence on its performance. This paper, therefore, addresses the high packet loss experienced in bus topology by investigating the performance of bus topology in four practical scenarios consisting of 10, 20, 30, and 40 nodes. In some applications, traffic was cautiously selected and configured in the application configuration to generate traffic for the modeling. These include HTTP, FTP, email, and databases before they were finally defined in the profile configuration. Substantial global and object statistics such as delay (sec), traffic-sent (bits/sec), traffic-received (bits/sec) for global, and throughput (bits/sec) for global were considered as network metrics for simulation in the OPNET environment. The results obtained proved that as the number of nodes increased, more traffic (bits/sec) were sent and received, more messages were delivered (bits/sec), the delay (sec) was lowered, but greater bit errors per packet were experienced in the network, thus making the bus topology not very suitable for a larger network.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130331019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secured Text Encryption with Near Field Communication (NFC) using Huffman Compression 基于哈夫曼压缩的近场通信安全文本加密
International Journal of Engineering and Applied Computer Science Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/002
Adeniji Oluwashola David, Akinola Olaniyan Eliais
{"title":"A Secured Text Encryption with Near Field Communication (NFC) using Huffman Compression","authors":"Adeniji Oluwashola David, Akinola Olaniyan Eliais","doi":"10.24032/ijeacs/0402/002","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/002","url":null,"abstract":"There are a lot of Challenges raised over the security of information written to the Mifare classic 1k a Radio Frequency Identification card due to the vulnerability status of this card. The card’s information can be traced to another card or an electronic device. These issues allow for unauthorized access to the data on the Mifare classic 1k‐enabled device data which are transmitted between the device and reader. The information produced by a Mifare classic 1k enabled credential system for a stated status is also a concern. The focus of the study is to develop an algorithm to secure information written to the Near Field Communication tag. The performance of the system shows that when n=50, with elapse time of 1.2ms the unique character was 64, likewise at optimal when n=200, the elapse time was 1ms with the unique character of 62. This result shows a decline of the symbol-by-symbol restriction with elapses time which can secure the information of the unique character.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Most Common Encryption Algorithms 最常用的加密算法分析
International Journal of Engineering and Applied Computer Science Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/003
Attiq Ahmed, Muhammad Naeem
{"title":"Analysis of Most Common Encryption Algorithms","authors":"Attiq Ahmed, Muhammad Naeem","doi":"10.24032/ijeacs/0402/003","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/003","url":null,"abstract":"As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mangrove Ecotourism Information System Based on Digital Book and Online Reservations 基于数字图书和在线预订的红树林生态旅游信息系统
International Journal of Engineering and Applied Computer Science Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/005
I. E. Putra
{"title":"Mangrove Ecotourism Information System Based on Digital Book and Online Reservations","authors":"I. E. Putra","doi":"10.24032/ijeacs/0402/005","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/005","url":null,"abstract":"Bali's tourism sector has faced serious challenges since the pandemic, with Bali's economic growth rate of -12.28% in the third quarter of 2020. Kampoeng Kepiting Mangrove Ecotourism located in Tuban, Kuta Badung district, Bali province is one of the tourism sectors which suffered a heavy impact. Before the pandemic, ecotourism visitors increased however during the pandemic, the number of visits decreased significantly. This study aims to develop a mangrove ecotourism information system, based on digital books and online reservations. The ecotourism digital book outlines the catalog of tour packages offered along with information on the mangrove tour packages for conservation and education. Based on the information from a digital book, potential visitors can use an online reservation application to make a reservation for tour packages and do payment by bank transfer. Once the payment process is done, visitors get digital vouchers to use the tour packages they have been reserved. The E-Voucher was used to visit the ecotourism of Kampoeng Kepiting. The development of a mangrove information system is expected to support the promotion of ecotourism in the recovery of ecotourism during the COVID-19 pandemic.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129768028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信