Pub Date : 2022-01-01DOI: 10.11648/j.eas.20220701.11
Etefa Tilahun Ashine, Minda Tadesse Bedane
{"title":"Research Achievements, Challenges and Future Perspectives of Irrigation and Water Harvesting Research Program of Jimma Agricultural Research Center: A Review","authors":"Etefa Tilahun Ashine, Minda Tadesse Bedane","doi":"10.11648/j.eas.20220701.11","DOIUrl":"https://doi.org/10.11648/j.eas.20220701.11","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82378025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.17582/journal.jeas/41.44.55
R. Muhammad, Aamer Sharif, M. U. R. Siddiqi
{"title":"Performance Investigation of a Single-Stage Gravitational Water Vortex Turbine Accounting for Water Vortex Configuration and Rotational Speed","authors":"R. Muhammad, Aamer Sharif, M. U. R. Siddiqi","doi":"10.17582/journal.jeas/41.44.55","DOIUrl":"https://doi.org/10.17582/journal.jeas/41.44.55","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78913273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.17582/journal.jeas/41.1.24.32
R. A. Khan, Sajjad Ahmed, S. Raza, Shehla Gul
{"title":"Fracture Gradient Analysis for Lockhart Formation at Kohat–Potwar and Nizampur Sub-Basins, Pakistan","authors":"R. A. Khan, Sajjad Ahmed, S. Raza, Shehla Gul","doi":"10.17582/journal.jeas/41.1.24.32","DOIUrl":"https://doi.org/10.17582/journal.jeas/41.1.24.32","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90693507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.11648/j.eas.20220703.11
Edward John Forrest
{"title":"Heresy or Breakthrough: Fibre Optic Cleaning Without Inspection and Call for an \"Open Architecture\" Fibre Optic Precision Cleaning Procedure","authors":"Edward John Forrest","doi":"10.11648/j.eas.20220703.11","DOIUrl":"https://doi.org/10.11648/j.eas.20220703.11","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"127 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75592232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.11648/j.eas.20220701.12
Kouéni-Toko Christian Anicet, Patte-Rouland Béatrice, Paranthoën Pierre
{"title":"Experimental Study of the Pressure Generated by a Linear Heat Source in a Semi–ventilated Enclosure","authors":"Kouéni-Toko Christian Anicet, Patte-Rouland Béatrice, Paranthoën Pierre","doi":"10.11648/j.eas.20220701.12","DOIUrl":"https://doi.org/10.11648/j.eas.20220701.12","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79529329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The usage of the Internet of Things (IoT) conception in the industrial sector along with applications is referred to as the Industrial Internet of Things (IIoT). Various applications have been subsumed in the IIoT. Nevertheless, cybercriminals mostly target these systems. Thus, here, a novel methodology of Cyber Attack Detection (CAD) system has been proposed in IIoT to overcome the aforementioned issue. UNSW-NB2015 and DS2OS are the two IIoT datasets utilized in this work. Initially, in both datasets, the missing values are replaced; subsequently, the feature extraction is performed. Next, by utilizing Poisson Distribution-based Naked Mole Rat Optimization Algorithm (PD-NMROA), the significant features are selected as of both datasets. After that, by employing MaHalanobis distance-based K-Means (MaH-KMeans) algorithm, the features extracted as of the datasets are normalized along with clustered. Eventually, to classify the data, the clustered features are inputted to the TanSwish - Restricted Boltzmann Dense Machines (TS-RBDMs). The experiential outcomes displayed that the proposed methodology obtained higher efficacy in contrast to the prevailing systems.
{"title":"A Novel Classifier for Cyber Attack Detection System in Industrial Internet of Things","authors":"Fathe Jeribi","doi":"10.5455/jeas.2022110103","DOIUrl":"https://doi.org/10.5455/jeas.2022110103","url":null,"abstract":"The usage of the Internet of Things (IoT) conception in the industrial sector along with applications is referred to as the Industrial Internet of Things (IIoT). Various applications have been subsumed in the IIoT. Nevertheless, cybercriminals mostly target these systems. Thus, here, a novel methodology of Cyber Attack Detection (CAD) system has been proposed in IIoT to overcome the aforementioned issue. UNSW-NB2015 and DS2OS are the two IIoT datasets utilized in this work. Initially, in both datasets, the missing values are replaced; subsequently, the feature extraction is performed. Next, by utilizing Poisson Distribution-based Naked Mole Rat Optimization Algorithm (PD-NMROA), the significant features are selected as of both datasets. After that, by employing MaHalanobis distance-based K-Means (MaH-KMeans) algorithm, the features extracted as of the datasets are normalized along with clustered. Eventually, to classify the data, the clustered features are inputted to the TanSwish - Restricted Boltzmann Dense Machines (TS-RBDMs). The experiential outcomes displayed that the proposed methodology obtained higher efficacy in contrast to the prevailing systems.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80208316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.17582/journal.jeas/41.1.1.12
M. Jalees
{"title":"The Effect of Web Design Elements in Digital Marketing on Supply Chain Management Profit under Cooperative Advertisement","authors":"M. Jalees","doi":"10.17582/journal.jeas/41.1.1.12","DOIUrl":"https://doi.org/10.17582/journal.jeas/41.1.1.12","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86441116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Several countries struggle to deliver cost-effective, quality healthcare services to their patients and citizens. The growth of healthcare services has rapidly increased for both health organizations and industries. The challenge of setting healthcare services remains to increase as system structure needs to satisfy several specifications and requirements of ever serious design scenarios. The industry of healthcare is progressing as the ability of producing a high value quality of service to the community, and this leads to the growth of information technology (IT) which has presented several significant solutions to healthcare services using high quality speed of network communication, mobile and digital technology which should facilitate an accessible to achieve medical services. Hence, this paper proposes and adopts a technique to proof and validate digital healthcare services which illustrates a technological method to produce health services and benefits available by using a distributed system, thus the proposed system will provide Electronic Health Records (EHR) which is using and applying several client technologies such as, web, mobile and personal computer to have a variety of services in the system. Therefore, the EHRs are managed by system modules in different criteria of health records which is shown and applied along with a typical transmission protocol to tame interconnecting between system services and modules.
{"title":"Devise and Adopt a Technique to validate Digital Healthcare System using Finite State Machine","authors":"K. Aldriwish","doi":"10.5455/jeas.2022050104","DOIUrl":"https://doi.org/10.5455/jeas.2022050104","url":null,"abstract":"Several countries struggle to deliver cost-effective, quality healthcare services to their patients and citizens. The growth of healthcare services has rapidly increased for both health organizations and industries. The challenge of setting healthcare services remains to increase as system structure needs to satisfy several specifications and requirements of ever serious design scenarios. The industry of healthcare is progressing as the ability of producing a high value quality of service to the community, and this leads to the growth of information technology (IT) which has presented several significant solutions to healthcare services using high quality speed of network communication, mobile and digital technology which should facilitate an accessible to achieve medical services. Hence, this paper proposes and adopts a technique to proof and validate digital healthcare services which illustrates a technological method to produce health services and benefits available by using a distributed system, thus the proposed system will provide Electronic Health Records (EHR) which is using and applying several client technologies such as, web, mobile and personal computer to have a variety of services in the system. Therefore, the EHRs are managed by system modules in different criteria of health records which is shown and applied along with a typical transmission protocol to tame interconnecting between system services and modules.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91145551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
High number of users, connected devices and services on the Internet producing high traffic and load on the web servers causes a degradation of the quality of Internet services. A possible solution to this problem is to use a cluster of web servers. The cluster requires a load balancer to provide scalability and high performance of the services offered. The main load balancer is the only entry point to the server cluster in this architecture. In this paper, the researchers propose a two-tier load balancer rather than a single one to achieve more scalability and reduce the load on the main load balancer. The study also compared three features, Response Time Average, the load balancer CPU Utilization, and Servers’ CPU Utilization. The comparison uses three algorithms (Round Robin, Number of Connections, and Least Load) through two experiments. The results concluded that the Multi-Tier Load Balancing method offered better CPU utilization than a Single-Tier Load Balancing method for Round Robin and Server Load algorithms. However, the Single-Tier Load Balancing method provided better response time for all three algorithms. Moreover, the Round Robin and Server Load algorithms using a Multi-Tier method balanced the CPU utilization for all servers. This result shows the Multi-Tier method handles huge traffic and large number of servers with better CPU utilization.
{"title":"Two-Tier Load Balancer as a Solution to a Huge Number of Servers","authors":"Fawaz Alharbi, M. Mustafa","doi":"10.5455/jeas.2022050101","DOIUrl":"https://doi.org/10.5455/jeas.2022050101","url":null,"abstract":"High number of users, connected devices and services on the Internet producing high traffic and load on the web servers causes a degradation of the quality of Internet services. A possible solution to this problem is to use a cluster of web servers. The cluster requires a load balancer to provide scalability and high performance of the services offered. The main load balancer is the only entry point to the server cluster in this architecture. In this paper, the researchers propose a two-tier load balancer rather than a single one to achieve more scalability and reduce the load on the main load balancer. The study also compared three features, Response Time Average, the load balancer CPU Utilization, and Servers’ CPU Utilization. The comparison uses three algorithms (Round Robin, Number of Connections, and Least Load) through two experiments. The results concluded that the Multi-Tier Load Balancing method offered better CPU utilization than a Single-Tier Load Balancing method for Round Robin and Server Load algorithms. However, the Single-Tier Load Balancing method provided better response time for all three algorithms. Moreover, the Round Robin and Server Load algorithms using a Multi-Tier method balanced the CPU utilization for all servers. This result shows the Multi-Tier method handles huge traffic and large number of servers with better CPU utilization.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81381629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The number of distinct eigenvalues of the adjacency matrix of graph G is bounded below by d(G)+1, where d is the diameter of the graph. Graphs attaining this lower bound are known as minimal graphs. The spectrum of graph G, where G is a simple and undirected graph is the collection of different eigenvalues of the adjacency matrix with their multiplicities. This paper deals with the construction of non-regular minimal graphs, together with the study of their characteristic polynomial and spectra.
{"title":"Construction And Spectra Of Non-Regular Minimal Graphs","authors":"Sabeena Kazi, H. Ramane","doi":"10.5455/jeas.2022050103","DOIUrl":"https://doi.org/10.5455/jeas.2022050103","url":null,"abstract":"The number of distinct eigenvalues of the adjacency matrix of graph G is bounded below by d(G)+1, where d is the diameter of the graph. Graphs attaining this lower bound are known as minimal graphs. The spectrum of graph G, where G is a simple and undirected graph is the collection of different eigenvalues of the adjacency matrix with their multiplicities. This paper deals with the construction of non-regular minimal graphs, together with the study of their characteristic polynomial and spectra.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83192606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}