{"title":"In Vitro Micropropagation Studies Cotyledonary Explants Of Trichosanthes Anguina (L)","authors":"M. Venkateshwaralu","doi":"10.24032/ijeacs/0403/003","DOIUrl":"https://doi.org/10.24032/ijeacs/0403/003","url":null,"abstract":"A method for Invitro Micropropagation Through Cotyledonary Explants of Trichosanthes anguina was exercised from 10-15 days of young stage explants [1, 2]. Developed a protocol for cotyledonary explants cultures, callus induction, and regeneration through cotyledon callus tissue [3, 4]. Multiple shoot formation was promoted by BAP 1.0 mg/l to 3.0 to 5.0 mg/l and higher combination with NAA 3.0 to 4.0 mg/l Kn [5, 6]. Invitro produced small shoots were green callus induced to cotyledonary callus cultures green compact small shoots buds were induced in 16-20 days cultures respectively on Ms. Medium.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131575734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Literature Review on Energy Healing Techniques and Biofield – Detection and Scientific Analysis","authors":"Jeo Joy A, Suresh Kumar Rudrahithlu, Molly Joy","doi":"10.24032/ijeacs/0403/002","DOIUrl":"https://doi.org/10.24032/ijeacs/0403/002","url":null,"abstract":"Energy Healing techniques are considered as one of the age-old practices dating its origin back to the ancient scriptures, to be precise much earlier than those. Scientific technology has been incorporated on a small scale into these in recent decades, beginning in the twentieth century. Even in the twenty-first century, little progress has been made in this area. This literature review is an eye-opener for the world to get familiarized with various energy healing techniques and their basic functionality. The various technical devices used for the detection and treatment of the biofield are depicted in brief in this review. The modalities in which Artificial Intelligence is used in various energy healing techniques are introduced here. The review culminates with a note on the future scope of the Energy Healing techniques on a wider horizon incorporating Artificial Intelligence wherever necessary.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Framework for Selecting Elicitation Technique based on Attribute Mapping","authors":"Attique Ahmed, M. Naeem","doi":"10.24032/ijeacs/0402/001","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/001","url":null,"abstract":"The software development process is completely based on the requirements of stakeholders. If the requirements of stakeholders are being integrated into the proposed system, then it can be assumed that the end product is going to be optimal and successful. To achieve a successful product, different Requirement Elicitation Techniques (RET) are being practiced. The selection of a suitable RET is based on the nature of the product being developed. So, a single RET doesn’t fit all products. In this paper, we differentiate all RETs from each other which makes it easier for an analyst to choose suitable RET from the available ones. We further designed a novel mapping framework that extracts the best suited RET to any software based on its attributes. We have further implemented the proposed framework by using an online vehicle booking system as a running example.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126793467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of the Bus Topology Network for Effectual Data Distribution","authors":"Ojo Jayeola Adaramola, Jamiu Olasina","doi":"10.24032/ijeacs/0402/007","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/007","url":null,"abstract":"Stability, reliability, efficiency, and dependability necessitate a higher performance feature-based system in Ethernet LAN to meet the prevalent emergent technology of 5G and beyond 5G in the domain of networking. LAN technology has experienced the most progression since it came to reality. Despite its ability to achieve promising performance, the technology still keeps some topology characteristics that have a greater influence on its performance. This paper, therefore, addresses the high packet loss experienced in bus topology by investigating the performance of bus topology in four practical scenarios consisting of 10, 20, 30, and 40 nodes. In some applications, traffic was cautiously selected and configured in the application configuration to generate traffic for the modeling. These include HTTP, FTP, email, and databases before they were finally defined in the profile configuration. Substantial global and object statistics such as delay (sec), traffic-sent (bits/sec), traffic-received (bits/sec) for global, and throughput (bits/sec) for global were considered as network metrics for simulation in the OPNET environment. The results obtained proved that as the number of nodes increased, more traffic (bits/sec) were sent and received, more messages were delivered (bits/sec), the delay (sec) was lowered, but greater bit errors per packet were experienced in the network, thus making the bus topology not very suitable for a larger network.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130331019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secured Text Encryption with Near Field Communication (NFC) using Huffman Compression","authors":"Adeniji Oluwashola David, Akinola Olaniyan Eliais","doi":"10.24032/ijeacs/0402/002","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/002","url":null,"abstract":"There are a lot of Challenges raised over the security of information written to the Mifare classic 1k a Radio Frequency Identification card due to the vulnerability status of this card. The card’s information can be traced to another card or an electronic device. These issues allow for unauthorized access to the data on the Mifare classic 1k‐enabled device data which are transmitted between the device and reader. The information produced by a Mifare classic 1k enabled credential system for a stated status is also a concern. The focus of the study is to develop an algorithm to secure information written to the Near Field Communication tag. The performance of the system shows that when n=50, with elapse time of 1.2ms the unique character was 64, likewise at optimal when n=200, the elapse time was 1ms with the unique character of 62. This result shows a decline of the symbol-by-symbol restriction with elapses time which can secure the information of the unique character.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Most Common Encryption Algorithms","authors":"Attiq Ahmed, Muhammad Naeem","doi":"10.24032/ijeacs/0402/003","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/003","url":null,"abstract":"As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mangrove Ecotourism Information System Based on Digital Book and Online Reservations","authors":"I. E. Putra","doi":"10.24032/ijeacs/0402/005","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/005","url":null,"abstract":"Bali's tourism sector has faced serious challenges since the pandemic, with Bali's economic growth rate of -12.28% in the third quarter of 2020. Kampoeng Kepiting Mangrove Ecotourism located in Tuban, Kuta Badung district, Bali province is one of the tourism sectors which suffered a heavy impact. Before the pandemic, ecotourism visitors increased however during the pandemic, the number of visits decreased significantly. This study aims to develop a mangrove ecotourism information system, based on digital books and online reservations. The ecotourism digital book outlines the catalog of tour packages offered along with information on the mangrove tour packages for conservation and education. Based on the information from a digital book, potential visitors can use an online reservation application to make a reservation for tour packages and do payment by bank transfer. Once the payment process is done, visitors get digital vouchers to use the tour packages they have been reserved. The E-Voucher was used to visit the ecotourism of Kampoeng Kepiting. The development of a mangrove information system is expected to support the promotion of ecotourism in the recovery of ecotourism during the COVID-19 pandemic.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129768028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}