Pub Date : 2022-12-28DOI: 10.33411/ijist/2022040405
Amna Sajid, Muhammad Zafar Ullah, B. Shahzad, Aaqib Adeel, Naveed Ahmad
Introduction/Importance of Study: Social networking websites have become the main medium for communication, information sharing, entertainment, buying/selling, and various other purposes. People of every age use social networking websites, and their usage is increasing daily, especially in current circumstances. People with different abilities also used social networking websites, but each set of users had their requirements forusing these websites. Visually impaired people use computers and the web with the help of screen reading tools e. g.; jaws, NVDA. Screen reading tools read a web page sequentially, which wastime-consuming. The major problem with screen reading tools came while reading visual content. Screen reading tools only read the alternate texts of non-visual contents behind their tag. This research focuses on the usability Usability of social networking websitesfor visually impaired people. Two of the most commonly used social networking websites, Facebook and Instagram, were selected for the usability evaluation. Accessibility, efficiency, and effectiveness were the metrics of Usability, which were evaluated in this study. Novelty statement: A consolidated set of guidelines specific to social networking websites were presented in which some new guidelines were also proposed for Facebook. A mock interface was developed based on the proposed guidelines for Facebook. Material and Method: For the evaluation of Usability, a controlled experiment was conducted with 28 visually impaired people in which 16 participants evaluated Facebook and 12 evaluated Instagram to find the usability problems faced by visually impaired people. Result and Discussion: Results show that Instagram was as easy to use asFacebook when used by visually impaired people with the help of screen reading tools. Concluding Remarks: This research evaluated the Usability of social networking websites Facebook and Instagram by visually impaired people. A controlled experiment was conducted for their evaluation. Results showed that Facebook was difficult to use as Instagram. Thus, new guidelines were proposed for Facebook and based on the guidelines, a prototype was proposed.
{"title":"Usability Evaluation of Facebook and Instagram by Visually Impaired People","authors":"Amna Sajid, Muhammad Zafar Ullah, B. Shahzad, Aaqib Adeel, Naveed Ahmad","doi":"10.33411/ijist/2022040405","DOIUrl":"https://doi.org/10.33411/ijist/2022040405","url":null,"abstract":"Introduction/Importance of Study: Social networking websites have become the main medium for communication, information sharing, entertainment, buying/selling, and various other purposes. People of every age use social networking websites, and their usage is increasing daily, especially in current circumstances. People with different abilities also used social networking websites, but each set of users had their requirements forusing these websites. Visually impaired people use computers and the web with the help of screen reading tools e. g.; jaws, NVDA. Screen reading tools read a web page sequentially, which wastime-consuming. The major problem with screen reading tools came while reading visual content. Screen reading tools only read the alternate texts of non-visual contents behind their tag. This research focuses on the usability Usability of social networking websitesfor visually impaired people. Two of the most commonly used social networking websites, Facebook and Instagram, were selected for the usability evaluation. Accessibility, efficiency, and effectiveness were the metrics of Usability, which were evaluated in this study.\u0000Novelty statement: A consolidated set of guidelines specific to social networking websites were presented in which some new guidelines were also proposed for Facebook. A mock interface was developed based on the proposed guidelines for Facebook.\u0000Material and Method: For the evaluation of Usability, a controlled experiment was conducted with 28 visually impaired people in which 16 participants evaluated Facebook and 12 evaluated Instagram to find the usability problems faced by visually impaired people.\u0000Result and Discussion: Results show that Instagram was as easy to use asFacebook when used by visually impaired people with the help of screen reading tools. \u0000Concluding Remarks: This research evaluated the Usability of social networking websites Facebook and Instagram by visually impaired people. A controlled experiment was conducted for their evaluation. Results showed that Facebook was difficult to use as Instagram. Thus, new guidelines were proposed for Facebook and based on the guidelines, a prototype was proposed.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-17DOI: 10.33411/ijist/2022040411
Abid Sultan, Yao Lin, Azhar Mushtaq
With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.
{"title":"A Survey Paper on ASCII-Based Cryptographic Techniques","authors":"Abid Sultan, Yao Lin, Azhar Mushtaq","doi":"10.33411/ijist/2022040411","DOIUrl":"https://doi.org/10.33411/ijist/2022040411","url":null,"abstract":"With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.33411/ijist/2022040410
Imran Hussain, I. Siddiq, Anza Riaz, Abdullah Faisal, Ameer Hamza
Background: The primary purpose of this study is to find out the Significance of Cognitive Distortions and Risk Factors due to Android Game Addiction for Adults. Methods: The research population includes three main parameters Physical Effects, Mental Effects, and, Cognitive Effects each part containing 10 questions. The sample comprises 200 school students (male=150, females=50) between the ages of 8 to 20 years recruited from schools in Lahore, Pakistan. A total of 200 copies of the Questionnaire are distributed among the students. Only 180 copies are received filled so the total response rate of the data collection was 90%. SPSS tool was used to analyze the results of the Questionnaire. It aims to einvestigate the impacts that Android Games have on adults. As most of the researchers have done Quantitative research in this area, so I decided to conduct both Quantitative and Qualitative research designs which can help us get a deeper understanding of Android Game Addiction. Findings: By going through the results, it is revealed that the all above-mentioned three main parameters are found positive in adults. According to the range of the frequency, it is concluded that all three factors are in the medium range not more harmful. There was a strong positive association between the addictions of students to Android mobile games and their physical and mental well-being in terms of physical, mental, and cognitive health.
{"title":"The Significance of Cognitive Distortions and Risk Factors Due to Android Games Addictions for Adults","authors":"Imran Hussain, I. Siddiq, Anza Riaz, Abdullah Faisal, Ameer Hamza","doi":"10.33411/ijist/2022040410","DOIUrl":"https://doi.org/10.33411/ijist/2022040410","url":null,"abstract":"Background:\u0000The primary purpose of this study is to find out the Significance of Cognitive Distortions and Risk Factors due to Android Game Addiction for Adults.\u0000Methods:\u0000The research population includes three main parameters Physical Effects, Mental Effects, and, Cognitive Effects each part containing 10 questions. The sample comprises 200 school students (male=150, females=50) between the ages of 8 to 20 years recruited from schools in Lahore, Pakistan. A total of 200 copies of the Questionnaire are distributed among the students. Only 180 copies are received filled so the total response rate of the data collection was 90%. SPSS tool was used to analyze the results of the Questionnaire. It aims to einvestigate the impacts that Android Games have on adults. As most of the researchers have done Quantitative research in this area, so I decided to conduct both Quantitative and Qualitative research designs which can help us get a deeper understanding of Android Game Addiction.\u0000Findings:\u0000By going through the results, it is revealed that the all above-mentioned three main parameters are found positive in adults. According to the range of the frequency, it is concluded that all three factors are in the medium range not more harmful.\u0000There was a strong positive association between the addictions of students to Android mobile games and their physical and mental well-being in terms of physical, mental, and cognitive health.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-07DOI: 10.33411/ijist/2022040402
Sajawal Khan, Adeela Ashraf, Muhammad Shoaib, Muhammad Iftikhar, I. Siddiq, Muhammad Dawood Khan, Abdullah Faisal
With regard to today's social media networks, memes have become central. Share a million memes per second on different social media. The detection of memes is a very concentrated and demanding subject in the current field of research. Share about a million memes on various social media. Today's social media (What's App, Twitter, and Facebook) is widespread around the world. Since people in all countries are heavily used, use a set of social media application data (Twitter). As social media has an enormous amount of data overall the world. That will use that data set of Twitter for meme detection of journalists in Pakistan. So, this is done by getting data set from social media (Twitter, What’s App, and Facebook) by using their authenticated APIs. For this analysis use some opinion mining techniques and sentiment analysis like the statistical descriptive and content analysis. In our society, it is the better way to analysis about any journalists because social media can provide very huge amounts of data about any journalist which is true or false but I can make approximate correct perceptions by using sentiment analysis and text mining techniques. It will provide highly wanted and hidden characteristics and perceptions for searchers and demanding people about journalists. Finally use for sentiment analysis by using Python.
就当今的社交媒体网络而言,表情包已经成为核心。在不同的社交媒体上每秒分享一百万个表情包。模因的检测是当前研究领域中一个非常集中和要求很高的课题。在各种社交媒体上分享大约一百万个表情包。今天的社交媒体(What's App、Twitter和Facebook)在世界各地广泛传播。由于所有国家的人都被大量使用,所以使用一套社交媒体应用数据(Twitter)。因为社交媒体在全球范围内拥有大量的数据。这将使用推特的数据集来检测巴基斯坦记者的表情包。所以,这是通过使用他们的认证api从社交媒体(Twitter, What 's App和Facebook)获取数据集来完成的。在此分析中使用了一些观点挖掘技术和情感分析,如统计描述分析和内容分析。在我们的社会中,这是分析任何记者的更好方式,因为社交媒体可以提供关于任何记者的大量数据,这些数据是真的还是假的,但我可以通过使用情感分析和文本挖掘技术做出近似正确的感知。它将为搜索者和对记者有要求的人提供非常需要和隐藏的特征和看法。最后使用Python进行情感分析。
{"title":"Meme Detection of Journalists from Social Media by Using Data Mining Techniques","authors":"Sajawal Khan, Adeela Ashraf, Muhammad Shoaib, Muhammad Iftikhar, I. Siddiq, Muhammad Dawood Khan, Abdullah Faisal","doi":"10.33411/ijist/2022040402","DOIUrl":"https://doi.org/10.33411/ijist/2022040402","url":null,"abstract":"With regard to today's social media networks, memes have become central. Share a million memes per second on different social media. The detection of memes is a very concentrated and demanding subject in the current field of research. Share about a million memes on various social media. Today's social media (What's App, Twitter, and Facebook) is widespread around the world. Since people in all countries are heavily used, use a set of social media application data (Twitter). As social media has an enormous amount of data overall the world. That will use that data set of Twitter for meme detection of journalists in Pakistan. So, this is done by getting data set from social media (Twitter, What’s App, and Facebook) by using their authenticated APIs. For this analysis use some opinion mining techniques and sentiment analysis like the statistical descriptive and content analysis. In our society, it is the better way to analysis about any journalists because social media can provide very huge amounts of data about any journalist which is true or false but I can make approximate correct perceptions by using sentiment analysis and text mining techniques. It will provide highly wanted and hidden characteristics and perceptions for searchers and demanding people about journalists. Finally use for sentiment analysis by using Python.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132615528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In software development, the selection of a software process model set the base for the success of a software product. An inappropriate selection may lead to a delay in project release, introduce defects and make the project difficult to update. This lack of quality characteristics may lead to the risk of losing customer expectations as well as the failure of the project itself. In the case of complex systems, the problems become more severe. To meet such expectations, agile methodologies are used to ensure quality in software and meet customers’ expectations. There is currently no literature that gives insights into the role of agile methodologies in ensuring quality in complex systems. The purpose of this paper is to evaluate the effectiveness and the impact of agile methodology in achieving the quality of complex systems. For this, we perform a Systematic Literature Review (SLR) and define a review protocol. By performing a thorough search and screening, we selected 39 papers related to agile methods and complex systems. Our analysis shows that complex systems have various requirements of quality attributes some of the complex systems mainly focus on security, reliability, and efficiency whereas other emphasizes safety, response time, and maintainability. Our analysis also shows that agile methodologies are widely used for the development of complex systems because ensuring the quality requirements of complex systems is not possible with the use of traditional methods of software development.
{"title":"Role of Agile Methodologies for Ensuring Quality in Complex Systems: A Systematic Literature Review","authors":"Ihsan Ullah, Jaweria Kanwal, Fatima Gillani, Iqra Shahzad","doi":"10.33411/ijist/2022040409","DOIUrl":"https://doi.org/10.33411/ijist/2022040409","url":null,"abstract":"In software development, the selection of a software process model set the base for the success of a software product. An inappropriate selection may lead to a delay in project release, introduce defects and make the project difficult to update. This lack of quality characteristics may lead to the risk of losing customer expectations as well as the failure of the project itself. In the case of complex systems, the problems become more severe. To meet such expectations, agile methodologies are used to ensure quality in software and meet customers’ expectations. There is currently no literature that gives insights into the role of agile methodologies in ensuring quality in complex systems. The purpose of this paper is to evaluate the effectiveness and the impact of agile methodology in achieving the quality of complex systems. \u0000For this, we perform a Systematic Literature Review (SLR) and define a review protocol. By performing a thorough search and screening, we selected 39 papers related to agile methods and complex systems. Our analysis shows that complex systems have various requirements of quality attributes some of the complex systems mainly focus on security, reliability, and efficiency whereas other emphasizes safety, response time, and maintainability. Our analysis also shows that agile methodologies are widely used for the development of complex systems because ensuring the quality requirements of complex systems is not possible with the use of traditional methods of software development.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-30DOI: 10.33411/ijist/2022040406
Mahira Najeeb, Dr. Ammar Masood, Dr. Adnan Fazil
Data protection and information security have been the essence of communication in today's digital era. Authentication and secrecy of secure communication are achieved using key-based cryptographic primitives; the security of which significantly relies upon the underlying computationally complex mathematics. Moreover, these existing cryptographic primitives are considered to be non-deterministic on the basis of the existing computational capabilities. However, the considerable advancements in the development of quantum computers have significantly enhanced parallel computations; thereby, posing a great threat to these existing encryption primitives. Thus, in the future, the physical manifestation of a large successful quantum computer is likely to break all the existing public-key encryption algorithms in no time. This has led to a remarkable surge of interest in propelling quantum mechanics into existence; subsequently, leading cryptographers to research various viable domains to offer quantum-resistant secure communications. Resultantly, quantum cryptography/quantum key distribution has emerged as a futuristic replacement for classical cryptography as it offers unconditionally secure communication along with the inherent detection of any unintended user. Thus, keeping in view the significance of this relatively newer domain of cryptography, this research focuses on presenting a consolidated review of the various Quantum Key Distribution (QKD) protocols. A comparative analysis of the working mechanism of the prominent QKD protocols is presented along with an overview of the various emerging trends that have been proposed to optimize the implementational efficiency of the BB84 protocol.
{"title":"Quantum Key Distribution for Secure Communications","authors":"Mahira Najeeb, Dr. Ammar Masood, Dr. Adnan Fazil","doi":"10.33411/ijist/2022040406","DOIUrl":"https://doi.org/10.33411/ijist/2022040406","url":null,"abstract":"Data protection and information security have been the essence of communication in today's digital era. Authentication and secrecy of secure communication are achieved using key-based cryptographic primitives; the security of which significantly relies upon the underlying computationally complex mathematics. Moreover, these existing cryptographic primitives are considered to be non-deterministic on the basis of the existing computational capabilities. However, the considerable advancements in the development of quantum computers have significantly enhanced parallel computations; thereby, posing a great threat to these existing encryption primitives. Thus, in the future, the physical manifestation of a large successful quantum computer is likely to break all the existing public-key encryption algorithms in no time. This has led to a remarkable surge of interest in propelling quantum mechanics into existence; subsequently, leading cryptographers to research various viable domains to offer quantum-resistant secure communications. Resultantly, quantum cryptography/quantum key distribution has emerged as a futuristic replacement for classical cryptography as it offers unconditionally secure communication along with the inherent detection of any unintended user. Thus, keeping in view the significance of this relatively newer domain of cryptography, this research focuses on presenting a consolidated review of the various Quantum Key Distribution (QKD) protocols. A comparative analysis of the working mechanism of the prominent QKD protocols is presented along with an overview of the various emerging trends that have been proposed to optimize the implementational efficiency of the BB84 protocol.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-30DOI: 10.33411/ijist/2022040407
Faraz Bashir, Farrukh Zeeshan Khan
Cloud services are the on-demand availability of resources like storage, data, and computing power. Nowadays, cloud computing and storage systems are continuing to expand; there is an imperative requirement for CSPs (Cloud Service providers) to ensure a reliable and consistent supply of resources to users and businesses in case of any failure. Consequently, large cloud service providers are concentrating on mitigating any losses in a cloud system environment. In this research, we examined the bit brains dataset for job failure prediction, which keeps traces of 3 years of cloud system VMs. The dataset contains data about the resources used in a cloud environment. We proposed the performance of two machine learning algorithms: Logistic-Regression and KNN. The performance of these ML algorithms has been assessed using cross-validation. KNN and Logistic Regression give optimal results with an accuracy of 99% and 95%. Our research shows that using KNN and Logistic Regression increases the detection accuracy of job failures and will relieve cloud-service providers from diminishing future losses in cloud resources. Thus, we believe our approach is feasible and can be transformed to apply in an existing cloud environment.
{"title":"Analysis of Job Failure Prediction in a Cloud Environment by Applying Machine Learning Techniques","authors":"Faraz Bashir, Farrukh Zeeshan Khan","doi":"10.33411/ijist/2022040407","DOIUrl":"https://doi.org/10.33411/ijist/2022040407","url":null,"abstract":"Cloud services are the on-demand availability of resources like storage, data, and computing power. Nowadays, cloud computing and storage systems are continuing to expand; there is an imperative requirement for CSPs (Cloud Service providers) to ensure a reliable and consistent supply of resources to users and businesses in case of any failure. Consequently, large cloud service providers are concentrating on mitigating any losses in a cloud system environment. In this research, we examined the bit brains dataset for job failure prediction, which keeps traces of 3 years of cloud system VMs. The dataset contains data about the resources used in a cloud environment. We proposed the performance of two machine learning algorithms: Logistic-Regression and KNN. The performance of these ML algorithms has been assessed using cross-validation. KNN and Logistic Regression give optimal results with an accuracy of 99% and 95%. Our research shows that using KNN and Logistic Regression increases the detection accuracy of job failures and will relieve cloud-service providers from diminishing future losses in cloud resources. Thus, we believe our approach is feasible and can be transformed to apply in an existing cloud environment.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-30DOI: 10.33411/ijist/2022040408
Muhammad Tahir Turi, Ma Wei, Ittehad Hussain, Javid Hussain
Arsenic, is one of the most harmful elements to humans, health of chronic diseases, and continuously causing a threat to the world. Arsenic is found in combined form in rocks under the earth's surface and when it dissolves, it contaminates groundwater. In the current research study synthesized iron oxide nanoparticles (Fe2O3-NPs) and aluminum oxide nanoparticles (Al2O3-NPs) for the removal of arsenic (As) (˅) from an aqueous medium and characterized the synthesized material by different analytical techniques such as FT-IR spectroscopy and XRD spectroscopy. The results show successful synthesis of Fe2O3-NPs and Al2O3-NPs. Furthermore, the synthesized material was used as an adsorbent for extraction of as (V) from water. The effect of different parameters such as pH, temperature, contact time, and adsorbent dose on the adsorption process was investigated. The adsorption efficiency was determined by Fe2O3-NPs at about 20 mg/g and Al2O3-NPs at 19.5 mg/g. The quantitative removal of as (V) from industrial water required a minimum amount (0.2 g) of Fe2O3-NPs and Al2O3-NPs. various kinetic and isotherms were investigated in the current study. The result showed that the obtained data for Fe2O3-NPs was more fitted to Pseudo second order kinetic and Freundlich equation, while for Al2O3-NPs the data was more fitted to Pseudo second order kinetic and Elovich model equation, which confirms the interaction among as (V) and adsorbents. Thermodynamic parameters were also investigated which shows the process is spontaneous and endothermic. This model was used to estimate the site energy distribution for each adsorbent. Thermodynamic parameters were also investigated which shows the non-spontaneous and endothermic nature of the adsorbent. According to the results of the analysis of the approximate site energy distribution, adding Fe2O3 and Al2O3-NPs to arsenic decreased the area under the frequency distribution curve of the sorption site energies, which in turn decreased the number of sorption sites that were open to arsenic. This might be explained by the hydrophobic interaction between synthesized materials and arsenic being reduced due to the blocking of the Fe2O3 and Al2O3-NPs hydrophobic surface.
{"title":"Arsenic (v) Adsorption by Using Synthesized Iron Oxide Nanoparticles (Fe2O3-NPs) and Aluminum Oxide Nanoparticles (Al2O3-NPs)","authors":"Muhammad Tahir Turi, Ma Wei, Ittehad Hussain, Javid Hussain","doi":"10.33411/ijist/2022040408","DOIUrl":"https://doi.org/10.33411/ijist/2022040408","url":null,"abstract":"Arsenic, is one of the most harmful elements to humans, health of chronic diseases, and continuously causing a threat to the world. Arsenic is found in combined form in rocks under the earth's surface and when it dissolves, it contaminates groundwater. In the current research study synthesized iron oxide nanoparticles (Fe2O3-NPs) and aluminum oxide nanoparticles (Al2O3-NPs) for the removal of arsenic (As) (˅) from an aqueous medium and characterized the synthesized material by different analytical techniques such as FT-IR spectroscopy and XRD spectroscopy. The results show successful synthesis of Fe2O3-NPs and Al2O3-NPs. Furthermore, the synthesized material was used as an adsorbent for extraction of as (V) from water. The effect of different parameters such as pH, temperature, contact time, and adsorbent dose on the adsorption process was investigated. The adsorption efficiency was determined by Fe2O3-NPs at about 20 mg/g and Al2O3-NPs at 19.5 mg/g. The quantitative removal of as (V) from industrial water required a minimum amount (0.2 g) of Fe2O3-NPs and Al2O3-NPs. various kinetic and isotherms were investigated in the current study. The result showed that the obtained data for Fe2O3-NPs was more fitted to Pseudo second order kinetic and Freundlich equation, while for Al2O3-NPs the data was more fitted to Pseudo second order kinetic and Elovich model equation, which confirms the interaction among as (V) and adsorbents. Thermodynamic parameters were also investigated which shows the process is spontaneous and endothermic. This model was used to estimate the site energy distribution for each adsorbent. Thermodynamic parameters were also investigated which shows the non-spontaneous and endothermic nature of the adsorbent. According to the results of the analysis of the approximate site energy distribution, adding Fe2O3 and Al2O3-NPs to arsenic decreased the area under the frequency distribution curve of the sorption site energies, which in turn decreased the number of sorption sites that were open to arsenic. This might be explained by the hydrophobic interaction between synthesized materials and arsenic being reduced due to the blocking of the Fe2O3 and Al2O3-NPs hydrophobic surface.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-27DOI: 10.33411/ijist/2022040403
Bakhtawer 1, Bushra Naz, Sanam Narejo, N. Din, Waqar Ahmed
Crop Management System (CMS) as developed in an Ionic framework with a Real-Time Firebase database for loop backing and decision support. The main two features were; Soil classification where the soil classified based on temperature, humidity, and soil properties such as soil moisture, soil nutrients, and soil PH level using Random Forest Algorithm. By Bootstrap method using Random Forest, samples from the dataset were selected & then classification trees was generated. The other feature was crop precision where the condition of the crop was and examined using temperature, humidity, soil moisture, soil PH levels, and soil nutrients (N, P, K). IoT device was used to fetch data from the field and then compare with already stored ideal values, suitable for optimal yield, in CMS database then process using the application to suggest the crop for cultivation and to optimize the usage of water and fertilizers. Currently, we classify the soil using Random Forest Algorithm & suggest the suitable crop for the classified type of soil & also measure the soil moisture and soil nutrients of agricultural field Acre based on the reading results we are suggesting the crop to is cultivated and pre-requisite which would be needed in future. The proposed method gives an accuracy of 96.5% as compared to existing methods of Artificial Neural Networks and Support Vector Machines
{"title":"Soil Classification & Prediction of Crop Status with Supervised Learning Algorithm: Random Forest","authors":"Bakhtawer 1, Bushra Naz, Sanam Narejo, N. Din, Waqar Ahmed","doi":"10.33411/ijist/2022040403","DOIUrl":"https://doi.org/10.33411/ijist/2022040403","url":null,"abstract":"Crop Management System (CMS) as developed in an Ionic framework with a Real-Time Firebase database for loop backing and decision support. The main two features were; Soil classification where the soil classified based on temperature, humidity, and soil properties such as soil moisture, soil nutrients, and soil PH level using Random Forest Algorithm. By Bootstrap method using Random Forest, samples from the dataset were selected & then classification trees was generated. The other feature was crop precision where the condition of the crop was and examined using temperature, humidity, soil moisture, soil PH levels, and soil nutrients (N, P, K). IoT device was used to fetch data from the field and then compare with already stored ideal values, suitable for optimal yield, in CMS database then process using the application to suggest the crop for cultivation and to optimize the usage of water and fertilizers. Currently, we classify the soil using Random Forest Algorithm & suggest the suitable crop for the classified type of soil & also measure the soil moisture and soil nutrients of agricultural field Acre based on the reading results we are suggesting the crop to is cultivated and pre-requisite which would be needed in future. The proposed method gives an accuracy of 96.5% as compared to existing methods of Artificial Neural Networks and Support Vector Machines","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moving machinery is the backbone of socio-economic development. The use of machines helps in increasing the production of everyday used items, and tools, that generate electricity and mechanical energy, and provides easy and fast transportation and help by saving human efforts, energy, and time. The mechanical industry is totally dependent on the bearing and it is considered bread and butter of the system. Bearing failure is about 40% of the total failures of induction motors which is why it is a crucial challenge to predict the failure and helps prevent future downtime events through maintenance schedules with the latest techniques and tools of. This paper presents a review of how DL techniques and algorithms outsmarted ML for bearing fault detection and diagnosis and summarizes the accuracy results generated by most common DL algorithms over classical ML algorithms. Additionally this paper reasons different criteria for which DL algorithms have been proved efficient for building productive model in the field of bearing fault detection. Furthermore, some of the most famous datasets by different universities have been discussed and accuracy results are provided by reviewing algorithms on the CWRU dataset by different researchers and comparison chart is listed in the results section.
{"title":"A Qualified review of ML and DL algorithms for Bearing Fault Diagnosis","authors":"Asma Bibi, Bushra Naz, Shahnawaz Talpur, Shahzad Hyder Soomro, Yusrah Bablani","doi":"10.33411/ijist/2022040401","DOIUrl":"https://doi.org/10.33411/ijist/2022040401","url":null,"abstract":"Moving machinery is the backbone of socio-economic development. The use of machines helps in increasing the production of everyday used items, and tools, that generate electricity and mechanical energy, and provides easy and fast transportation and help by saving human efforts, energy, and time. The mechanical industry is totally dependent on the bearing and it is considered bread and butter of the system. Bearing failure is about 40% of the total failures of induction motors which is why it is a crucial challenge to predict the failure and helps prevent future downtime events through maintenance schedules with the latest techniques and tools of. This paper presents a review of how DL techniques and algorithms outsmarted ML for bearing fault detection and diagnosis and summarizes the accuracy results generated by most common DL algorithms over classical ML algorithms. Additionally this paper reasons different criteria for which DL algorithms have been proved efficient for building productive model in the field of bearing fault detection. Furthermore, some of the most famous datasets by different universities have been discussed and accuracy results are provided by reviewing algorithms on the CWRU dataset by different researchers and comparison chart is listed in the results section.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133913538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}