Pub Date : 2019-12-10DOI: 10.31695/ijerat.2019.3584
A. AL-Yafeai, A. Hassan, Elsadig E. El hassan
Risk factors in oil & gas production facilities projects tender process contribute to project poor quality, delay, cost overrun, claims, disputes, litigation, failure/abandonment, and a bad reputation for the company, in the contract implementation stage, in Arab countries, such as Yemen. This study investigates risk factors in the tender process in onshore oil and gas production facilities projects, via exploratory factor analysis to extract the significant variables based on results of 400 distributed questionnaire in 65 risk factors in nine constructs; and confirmatory factor analysis to ensure, assess, and /or evaluate the explored risk factors. The results show the goodness of fit for the measurement model of extracted risk factors 60 items in nine constructs. The findings help all parties involved in oil & gas production facilities projects to achieve better attention and allocation of risks in the tender process, as well as good control of risk in the contract implementation stage. Moreover, provide support for practitioners to incorporate risk potential analysis in future projects. Such will also be useful to researchers in the field of oil & gas projects to have better understand the risk factors in developing countries.
{"title":"Investigating Risk Factors in Tender Process Effecting on Contract Implementation Stage in Onshore Oil and Gas Production Facilities Projects","authors":"A. AL-Yafeai, A. Hassan, Elsadig E. El hassan","doi":"10.31695/ijerat.2019.3584","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3584","url":null,"abstract":"Risk factors in oil & gas production facilities projects tender process contribute to project poor quality, delay, cost overrun, claims, disputes, litigation, failure/abandonment, and a bad reputation for the company, in the contract implementation stage, in Arab countries, such as Yemen. This study investigates risk factors in the tender process in onshore oil and gas production facilities projects, via exploratory factor analysis to extract the significant variables based on results of 400 distributed questionnaire in 65 risk factors in nine constructs; and confirmatory factor analysis to ensure, assess, and /or evaluate the explored risk factors. The results show the goodness of fit for the measurement model of extracted risk factors 60 items in nine constructs. The findings help all parties involved in oil & gas production facilities projects to achieve better attention and allocation of risks in the tender process, as well as good control of risk in the contract implementation stage. Moreover, provide support for practitioners to incorporate risk potential analysis in future projects. Such will also be useful to researchers in the field of oil & gas projects to have better understand the risk factors in developing countries.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-10DOI: 10.31695/ijerat.2019.3583
S. Hussein, Mohsin R. Kareem, D. N. George
Active page replacement approaches are required for the virtual memory for the purpose of resolving what data pages are going to be driven out from the memory when a page fault occurs. For years, a lot of algorithms have been developed to avoid page fault, all these algorithms have the efforts of decreasing the proportion related to the reduce error in the same time as incurring minimal overhead. Since up-to-date patterns of memory access have been studied, the study has the aim of creating novel methods for page replacement that can be adaptive to the varying workloads. The presented review aims of comparing the assessed replacement time for the main methods of page replacement. Some conventional methods like CLOCK and LRU will be examined, as well as some new methods like 2-DPR, CLOCK-Pro, LIRS, and CAR.
{"title":"Subject Review: Comparing and Analyzing Page Fault Schemes According to Estimated Time","authors":"S. Hussein, Mohsin R. Kareem, D. N. George","doi":"10.31695/ijerat.2019.3583","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3583","url":null,"abstract":"Active page replacement approaches are required for the virtual memory for the purpose of resolving what data pages are going to be driven out from the memory when a page fault occurs. For years, a lot of algorithms have been developed to avoid page fault, all these algorithms have the efforts of decreasing the proportion related to the reduce error in the same time as incurring minimal overhead. Since up-to-date patterns of memory access have been studied, the study has the aim of creating novel methods for page replacement that can be adaptive to the varying workloads. The presented review aims of comparing the assessed replacement time for the main methods of page replacement. Some conventional methods like CLOCK and LRU will be examined, as well as some new methods like 2-DPR, CLOCK-Pro, LIRS, and CAR.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-10DOI: 10.31695/ijerat.2019.3585
Sunadi, M. Darmawan, Else Paulina, S. Hasibuan
The development of the automotive industry in the world continues to grow, including also the development of the automotive industry in Indonesia, along with the development of the business, supporting industries that supply components for parts used for automotive must prepare it, especially in terms of quality, quantity, and accuracy of delivery. There are still several automotive failures in terms of quality that have caused recall, it’s as the reason why the research was conducted. Research carried out in one of the oil filter manufacturing industries where defect products namely peel off on the seaming area was reached 35.21%from the total amount of defects that occurred. The focus and purpose of the research are the effort to reduce printing defects. Several techniques are used in this research, such as work time measurement, line balancing approach, and some statistical tools for quality improvement, such as Pareto, fishbone diagrams, and why-why analysis. The result of the study was identified that the dominant cause of printing peel off on the seaming area was caused by the handling process on the packaging line when overlapping time. The handling process has been improved by reducing process handling with added transfer conveyors. Theeffectiveness of improvement has reported in March 2019 that the number of defect printing peels off the seaming area on oil filter products decreased by 46.74%
{"title":"Quality Improvement of Filter Product by Reducing Defect Printing Peel-off Area Seam (Case Study) in the Automotive Components Filter Industry","authors":"Sunadi, M. Darmawan, Else Paulina, S. Hasibuan","doi":"10.31695/ijerat.2019.3585","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3585","url":null,"abstract":"The development of the automotive industry in the world continues to grow, including also the development of the automotive industry in Indonesia, along with the development of the business, supporting industries that supply components for parts used for automotive must prepare it, especially in terms of quality, quantity, and accuracy of delivery. There are still several automotive failures in terms of quality that have caused recall, it’s as the reason why the research was conducted. Research carried out in one of the oil filter manufacturing industries where defect products namely peel off on the seaming area was reached 35.21%from the total amount of defects that occurred. The focus and purpose of the research are the effort to reduce printing defects. Several techniques are used in this research, such as work time measurement, line balancing approach, and some statistical tools for quality improvement, such as Pareto, fishbone diagrams, and why-why analysis. The result of the study was identified that the dominant cause of printing peel off on the seaming area was caused by the handling process on the packaging line when overlapping time. The handling process has been improved by reducing process handling with added transfer conveyors. Theeffectiveness of improvement has reported in March 2019 that the number of defect printing peels off the seaming area on oil filter products decreased by 46.74%","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-10DOI: 10.31695/ijerat.2019.3586
S. Tito
Health monitoring is an essential task in managing both the daily routine progress of a patient/outpatient during and after the medication period. It plays not only a significant role in the overall well-being of the patient/outpatient but also as the measure of quality and effective healthcare services deliverance. However, achieving this is very challenging in areas with limited infrastructure to support a myriad of current social services, including advanced healthcare services. For instance, instead of relying only on the outpatient’s physical visitations to the healthcare center as a feedback mechanism in case of any complications during medications, continuously remote monitoring of the outpatients' health can improve the deliverance of healthcare services. This paper presents a simplified system model for remote monitoring of the outpatients well-being that has been designed to work in the limited Internet of Things (IoT) infrastructure to address the challenge above. The design is cheap and easily deployable for health remote monitoring purposes as the outpatient’s well-being can be monitored in real-time so that to facilitate detection of the subtle changes and avoid drug intoxication. The system advises and alerts in real-time the doctors/medical assistants about the changing of vital parameters in order to take preventive measures.
{"title":"A Simplified Outpatient Health Monitoring System in Resource Constrained IoT Infrastructure","authors":"S. Tito","doi":"10.31695/ijerat.2019.3586","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3586","url":null,"abstract":"Health monitoring is an essential task in managing both the daily routine progress of a patient/outpatient during and after the medication period. It plays not only a significant role in the overall well-being of the patient/outpatient but also as the measure of quality and effective healthcare services deliverance. However, achieving this is very challenging in areas with limited infrastructure to support a myriad of current social services, including advanced healthcare services. For instance, instead of relying only on the outpatient’s physical visitations to the healthcare center as a feedback mechanism in case of any complications during medications, continuously remote monitoring of the outpatients' health can improve the deliverance of healthcare services. This paper presents a simplified system model for remote monitoring of the outpatients well-being that has been designed to work in the limited Internet of Things (IoT) infrastructure to address the challenge above. The design is cheap and easily deployable for health remote monitoring purposes as the outpatient’s well-being can be monitored in real-time so that to facilitate detection of the subtle changes and avoid drug intoxication. The system advises and alerts in real-time the doctors/medical assistants about the changing of vital parameters in order to take preventive measures.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.31695/ijerat.2019.3582
A. O. Khalaf, Shaimaa Khudhair Salah, Hind Jumaa Sartep, Z. Abdalrdha
Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.
{"title":"Subject Review: Comparison between RSA, ECC & NTRU Algorithms","authors":"A. O. Khalaf, Shaimaa Khudhair Salah, Hind Jumaa Sartep, Z. Abdalrdha","doi":"10.31695/ijerat.2019.3582","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3582","url":null,"abstract":"Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-26DOI: 10.31695/ijerat.2019.3579
M. O. Hassan, Ahmed Khaled Al-haj
Assessment the performance of Unified Power Flow Controller (UPFC) based on the stabilizing controllers for damping LowFrequency Oscillations (LFO) has been conducted on Single Machine Infinite Bus (SMIB) power system in this paper. A detailed investigation has been carried out considering different modulating signals as input signals for stabilizing controllers. Particle Swarm Optimization (PSO) has been chosen as the optimization algorithm for computing the optimal parameters of the proposed stabilizing controllers. Eigenvalues and simulation results have been adopted for assessment and analysis of the performance, effectiveness and robustness of the proposed design approach.
{"title":"Optimal Selection of Different Control Input Signals to UPFC Damping Controller for Stabilization of LowFrequency Oscillations","authors":"M. O. Hassan, Ahmed Khaled Al-haj","doi":"10.31695/ijerat.2019.3579","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3579","url":null,"abstract":"Assessment the performance of Unified Power Flow Controller (UPFC) based on the stabilizing controllers for damping LowFrequency Oscillations (LFO) has been conducted on Single Machine Infinite Bus (SMIB) power system in this paper. A detailed investigation has been carried out considering different modulating signals as input signals for stabilizing controllers. Particle Swarm Optimization (PSO) has been chosen as the optimization algorithm for computing the optimal parameters of the proposed stabilizing controllers. Eigenvalues and simulation results have been adopted for assessment and analysis of the performance, effectiveness and robustness of the proposed design approach.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122487305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-25DOI: 10.31695/ijerat.2019.3578
A. Hussein
In recent times, with the progress of artificial intelligence and machine learning, handwriting recognition becomes an active research area. Furthermore, many products of applications have provided handwriting recognition services in various languages with a low margin of errors. The Arabic language has its challenges which make it not easy comparing with other languages to develop error-free and practical Arabic handwriting recognition. Deep learning has promising results in this field. This paper surveys existing literature work for Arabic handwriting recognition in general and using deep learning in particular.
{"title":"Subject Review: Machine Learning and Deep Learning based Arabic Handwriting Recognition","authors":"A. Hussein","doi":"10.31695/ijerat.2019.3578","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3578","url":null,"abstract":"In recent times, with the progress of artificial intelligence and machine learning, handwriting recognition becomes an active research area. Furthermore, many products of applications have provided handwriting recognition services in various languages with a low margin of errors. The Arabic language has its challenges which make it not easy comparing with other languages to develop error-free and practical Arabic handwriting recognition. Deep learning has promising results in this field. This paper surveys existing literature work for Arabic handwriting recognition in general and using deep learning in particular.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-05DOI: 10.31695/ijerat.2019.3562
Haitham Salman Chyad, Raniah Ali Mustafa, R. A. Haleot
Essentially use iris technique to human identification and recognition. Due enormous growth through the recent years for iris recognition techniques numerous research has emerged in the areas like; image compression, segmentation, quality assessment, Image Acquisition (IA), restoration, feature extraction (FE), normalization, noise reduction iris code matching (NRCM), evaluation, searching large database, applications, performance under changing multibiometrics and condition. Where many techniques were suggested to iris recognition (IR) using neural network because their efficient algorithm and also gives good result. In this research paper, we provide reviews a background for many techniques proposed to recognition iris image in various domains and also procedure a comparison between these techniques.
{"title":"Subject Review: Iris Recognition Using Neural Network","authors":"Haitham Salman Chyad, Raniah Ali Mustafa, R. A. Haleot","doi":"10.31695/ijerat.2019.3562","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3562","url":null,"abstract":"Essentially use iris technique to human identification and recognition. Due enormous growth through the recent years for iris recognition techniques numerous research has emerged in the areas like; image compression, segmentation, quality assessment, Image Acquisition (IA), restoration, feature extraction (FE), normalization, noise reduction iris code matching (NRCM), evaluation, searching large database, applications, performance under changing multibiometrics and condition. Where many techniques were suggested to iris recognition (IR) using neural network because their efficient algorithm and also gives good result. In this research paper, we provide reviews a background for many techniques proposed to recognition iris image in various domains and also procedure a comparison between these techniques.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-02DOI: 10.31695/ijerat.2019.3557
Ohnmar Zaw
This paper deals with the experimental works on the strength of concrete cube specimens with cement replacement by various percentages (0%, 5%, 7.5%, and 10%) of silica fume in concrete mixtures. The use of supplementary cementitious material is gaining much attention owing to its high pozzolanic property and a further improvement in strength properties. Silica-fume is one among the widely used pozzolanic material which exhibits high cementing efficiency due to high silica content. The physical properties of cement with and without silica fume replacement are tested according to ASTM. Mix design calculations for concrete mixtures with 0%, 5%, 7.5% and 10% silica fume content with constant watercement ratio 0.4 are calculated for concrete mixtures according to ACI. The target strength is 34.5 MPa. Three concrete cube specimens for each mix are prepared. After 7 days and 28 days, compressive strengths of the mortar and concrete cubes are tested. According to the test results, the concrete mix with 10% silica fume has the highest compressive strength. Overall, the strength of concrete with various replacement of silica fume enhances greater strength than the normal mix with 0% replacement.
{"title":"Effect of Silica Fume on the Properties of Concrete","authors":"Ohnmar Zaw","doi":"10.31695/ijerat.2019.3557","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3557","url":null,"abstract":"This paper deals with the experimental works on the strength of concrete cube specimens with cement replacement by various percentages (0%, 5%, 7.5%, and 10%) of silica fume in concrete mixtures. The use of supplementary cementitious material is gaining much attention owing to its high pozzolanic property and a further improvement in strength properties. Silica-fume is one among the widely used pozzolanic material which exhibits high cementing efficiency due to high silica content. The physical properties of cement with and without silica fume replacement are tested according to ASTM. Mix design calculations for concrete mixtures with 0%, 5%, 7.5% and 10% silica fume content with constant watercement ratio 0.4 are calculated for concrete mixtures according to ACI. The target strength is 34.5 MPa. Three concrete cube specimens for each mix are prepared. After 7 days and 28 days, compressive strengths of the mortar and concrete cubes are tested. According to the test results, the concrete mix with 10% silica fume has the highest compressive strength. Overall, the strength of concrete with various replacement of silica fume enhances greater strength than the normal mix with 0% replacement.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-02DOI: 10.31695/ijerat.2019.3491
Farida K. Kalonda, Stanley Leonard
It is very difficult for the voice impaired people to convey their messages to regular people since regular people are not trained on hand sign language, communication becomes very difficult. Therefore, I propose a speaking system that will enable dumb and deaf people to deliver their messages to normal people using hand gestures. This proposed system, use of hand gestures reading system equipped with gestures and flex sensors connected to each finger and connected to the RF Transmitter as an input along with the speaker unit. This system powered by a battery-powered circuitry to run it. Also, this system will contain different words and sentences that will help dumb people to deliver basic messages. Thesystem reads a dumb person’s hand gesture for different variations of hand movement. A processor constantly receives input sensor values and then processes it, then searches for matching message for the set of sensor values. Once it found in memory, the message is retrieved and is spoken out using text to speech processing through the interfaced speaker [1]. Data for this study was collected using structured open and closed questionnaires which were clearly administered to the sample used in my study. Data were analyzed using embedded C software. Finally, the findings were positive to my research objectives and it was expected to help the intended group in the society.
{"title":"Development of Speaking System for Dumb People by Using Hand Gestures","authors":"Farida K. Kalonda, Stanley Leonard","doi":"10.31695/ijerat.2019.3491","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3491","url":null,"abstract":"It is very difficult for the voice impaired people to convey their messages to regular people since regular people are not trained on hand sign language, communication becomes very difficult. Therefore, I propose a speaking system that will enable dumb and deaf people to deliver their messages to normal people using hand gestures. This proposed system, use of hand gestures reading system equipped with gestures and flex sensors connected to each finger and connected to the RF Transmitter as an input along with the speaker unit. This system powered by a battery-powered circuitry to run it. Also, this system will contain different words and sentences that will help dumb people to deliver basic messages. Thesystem reads a dumb person’s hand gesture for different variations of hand movement. A processor constantly receives input sensor values and then processes it, then searches for matching message for the set of sensor values. Once it found in memory, the message is retrieved and is spoken out using text to speech processing through the interfaced speaker [1]. Data for this study was collected using structured open and closed questionnaires which were clearly administered to the sample used in my study. Data were analyzed using embedded C software. Finally, the findings were positive to my research objectives and it was expected to help the intended group in the society.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134168134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}