International Journal of System Modeling and Simulation
Latest Publications


TOTAL DOCUMENTS

34
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By Research Plus Journals

2518-0959

Author(s):  
Emran Al Otaibi ◽  
Mohammed Refaei ◽  
Nadia Nassif ◽  
Anas Naqawa

Roundabouts have faced a huge development in terms of designing and operation, the reason behind that is to get the most safe and functional design. The functionality is affected by different factors e.g. line width, diameter of the roundabout etc., when the capacity of the roundabout is fully utilized, queue length starts to form in the different approaches, which indicates of a minor or major issue that should be studied. This paper discusses the different factors affecting the queue length of an approach on the roundabout (Al Falah roundabout), after obtaining the data, regression analysis was done to provide a model that can be used for estimating the volume capacity ratio from queue lengths or vice versa. Two other methods were used to compare the obtained model (HCM 2010 Method and Two Minute Rule Method), in addition to a field data collection of the actual timing needed to pass that queue length, which was assigned as the true value of the models and comparing depending on it. Finally, the discussion of the term paper, will include the different concepts of advanced statistical analysis, the will (as expected) contain different types of distributions and the coloration between the keys of the roundabouts design, and will study the limitation and how it can be improved in future.


Author(s):  
Amruth Nag ◽  
Sowmya M S

Deceptive download buttons are those on the internet which may look like it is meant to do an action but actually does something else which it is not intended by the user. Drive-by installations are those extra software which is installed in a user's device without him noticing it. This paper gives the information about the types of deceptive download buttons and the ways a common user can avoid clicking on such button while browsing the web. A few methods the advertiser may commonly use for making the end user a victim of the deceptive download buttons is discussed here. The methods by which someone can avoid these kinds of buttons are also given in this paper. An idea for the development of an extension to the user's browser, that runs in the background. This warns the user about those buttons prior to the button being clicked. This paper also includes information about drive-by installations of bloatware and the ways in which the end users are being affected by this, how the end user can avoid being a victim of drive-by installations and an idea to develop a tool which runs in the background as a small script in the operating system which will automatically warn the user about the drive-by installations.


Author(s):  
Vivek Vullikanti ◽  
Komarasamy G

Cloud computing is emerging computing model where the data owners are outsourcing their data into the cloud storage. By outsourcing the data files into the cloud, it gives many benefits to the large enterprises as well as individual users for accessing database security. In data base Storage management systems to cloud it still faces a number of fundamental and critical challenges, among which storage space and security is the top concern. We consider the problem of processing range query search over a confidential numeric attribute K in an outsourced setting of cloud computing. To ensure the correctness of user and user's data in the cloud, we propose a multilevel round random key policy third party authentication system in crypto policy standard. In addition to simplified data storage and secure data acquisition. Also, we consider processing range query search over a confidential numeric attribute with two main challenges. First, the confidentiality requires hiding the value and the relative order of the attribute in records from the cloud server. Finally, we will perform security and performance analysis which shows that the proposed scheme is highly efficient for maintaining secure data storage and acquisition.


Author(s):  
Abdullah Osman

Total quality management (TQM) philosophy and principle targeting on the regular changes for customer satisfaction, were proposed to be used in guiding the change process in electric utility industry towards market orientation through quality improvement of TQM practices. The aim of this study to analyses the TQM dimensions of; employee relation, training, and customer focus towards market orientation of electric utility industry in Peninsular of Malaysia. Total of 127 questionnaires distributed and 80 questionnaires useable for further analysis. A structural approach using Partial Least Square was adopted to analyze this relationship. The findings showed that all studied variables influence market orientation. Future direction was proposed for further research.


Author(s):  
Yan-Zhen Huang ◽  
Jing-Wei Liu

According to the current International Rowing Federation, the distance from the rowing competition is 2000 meters, the match time depending on the different items. The boating operation relies on the paddle hand of the boat to push the boat forward quickly with the work done by the paddle hand. As a result, boating wants to pass the endpoint at less time in a specified distance, and must increase the frequency of rowing per minute on the ship as a power paddle. Increasing the strength of each paddle allows the ship to paddle at the most force of each oar. Each oar hand puts forward the required quality requirements, that is, strength, speed, muscular endurance and rhythm. At present, many scholars have put forward many methods to study sports monitoring at home and abroad, but this sport is rarer in rowing. Therefore, this study will present the intelligent prediction of rowing performance model to predict the performance of the contestants, including: We use four weight methods to defuzzify: (a) dynamic weight forecasting, (b) equal weight, (c) sequential weight, and (d) trends weight. Finally, the forecasting value is optimized by the adaptive adjustment method. Finally, this study uses the public information provided by the International Rowing Alliance website as a training prediction model. The test results are compared with the weight-cutting and forecasting methods.


Author(s):  
Mohammed Al Arfaj ◽  
Nasser Al Mulhim ◽  
Abdullah Al Mulhim ◽  
Ahmed Al Naim

The manuscript reviews the various steps involved in the design of a cross flow heat exchanger. Performance charts describing the thermal performance of the heat exchanger in terms of dimensionless parameters are used to develop the preliminary design of the heat exchanger. The preliminary design involves choosing the required number of heat exchanger passes, the required number of transfer units (NTU) and the capacity rate ratio for a given heat transfer application. These dimensionless parameters account for material, flow and thermal characteristics of the heat exchanger. In addition, NTU accounts for heat exchanger size, flow configuration and the type of heat exchanger. Since the preliminary design accounts for all the major characteristics of the heat exchanger, this approach is beneficial in optimizing the heat exchanger during the design phase. Performance charts indicate that indefinitely increasing the surface area (or NTU) does not increase the rate of heat transfer. There exists a threshold limit beyond which increasing the surface area adds no benefit to the heat exchanger. Instead, it just adds weight, material and cost of the heat exchanger. It must be noted that an undersized heat exchanger for a given application may not deliver the required heat transfer and while an oversized heat exchanger will increase the capital cost. Hence, it is very important to choose the right parameters during design of a heat exchanger. From the preliminary design, the detailed design for the heat exchanger can be readily extrapolated. The benefits of using performance charts in the design of a cross flow heat exchanger are described in the manuscript.


Author(s):  
Dauletkulova Aigul ◽  
Kurmanbekkyzy Nurgul

Integration of Kazakhstan into the world educational space makes it necessary to align with the requirements of the state and society to orient the education of the younger generation on the development of competencies that promote the concept of "education through life". Significant changes in the priorities in school education in the world in recent years require a reorientation to a competence approach, continuous self-education, mastering new information technologies, the ability to cooperate and work in groups. The purpose of our research is to improve the quality of school mathematics education with the help of competence-oriented assignments. For the analysis of the analyzed targets, the analysis of the native and chemical methapods is analyzed; the systematic analysis of the mathematical encounters and the reconstruction of the infectious information with the help of hypotheses and analgesia, comparison and hypnotism, analysis and synthesis, modeling and mental ex- periment; Diagnostic methods with the goal of designing the formation of coarse mnogoapektnyh central design of the person; the isolation of the criteria for the design of a diagonal quality - a system of colors that characterize the structure of the complex of personalities in the world; methods of observation, caution, a systematic analysis of the results. When solving competency-oriented tasks, students are able to use and notice the general in the private, to reveal the significance of established facts and patterns, to form and develop the basic mental operations. The methods for solving competence-oriented tasks should not only promote the development of skills and skills that meet the program requirements, but also the development of creative cognitive activities. These include tasks that familiarize schoolchildren with non-standard methods of reasoning, but do not require the extension of the curriculum material. The nature of the representation of competence-oriented tasks takes into account the psychological characteristics of students' perception of information. In particular, it is desirable that the conditions of the problems allow rather simple graphic or "subject" illustrations. In conclusion, we note that competence-oriented tasks should include entertaining tasks that are diverse in terms of the story, in the formulation of questions, in the methods of solutions. It is desirable to include in the system tasks, the solution of which is divided in time and whose purpose is the development of certain skills and abilities, the consolidation of methods of reasoning, methods of solving problems, the development of spatial representations, the formation and development of mental operations, such as: analysis, synthesis, comparison, classification, etc.


Author(s):  
Frederick S. Sexe

This paper will discuss a model for team learning and adaptation by applying sociotechnical and cognitive systems concepts to a model previously developed by [1] to facilitate double-loop learning in teams and organizations. Organizational knowledge assets will be explained relative to team learning followed by an explanation of the sociotechnical system that the model is based upon. An overview of the team cognitive systems model will be provided as a precursor to explaining the learning and adaptation system. The team learning and adaptation model combines sociotechnical and cognitive systems elements to provide a model explaining how team learning at the tactical level can be aligned with other organizational resources while aligning these efforts towards organizational strategy. The proposed model also provides a holistic means for implementing a problem-solving methodology within the sociotechnical and cognitive systems contexts. The aim of this paper is to aid practitioners seeking to improve how his or her team learns, collaborates, and innovates at all levels of the organization. The paper is geared mainly towards practitioners interested in improving his or her team's performance. Academics interested in team learning and knowledge sharing may also find the model of interest in academic pursuits related to team learning and adaptation. Practitioners can use this model to identify shortcomings in team learning and adaptation performance relative to specific work requirements. Academicians can use the model to explain sociotechnical and environmental interactions relative to how teams perform learning and adapting behaviors.


Author(s):  
Monishkanna Barathan ◽  
Ershad Sharifahmadian

Due to the increase in amount of available information, finding places and planning of the activities to be done during a tour can be strenuous. Tourists are looking for information about a place in which they have not been before, which worsen the selection of places that fit better with user’s preferences. Recommendation systems have been fundamentally applicable in tourism, suggest suitable places, and effectively prune large information from different locations, so tourists are directed toward those places where are matched with their needs and preferences. Several techniques have been studied for point-of-interest (POI) recommendation, including content-based which builds based on user preferences, collaborative filtering which exploits the behavior of other users, and different places, knowledge-based method, and several other techniques. These methods are vulnerable to some limitations and shortcomings related to recommendation environment such as scalability, sparsity, first-rater or gray sheep problems. This paper tries to identify the drawbacks that prevent wide spread use of these methodologies in recommendation. To improve performance of recommendation systems, these methods are combined to form hybrid recommenders. This paper proposes a novel hybrid recommender system which suggests tourism destinations to a user with minimal user interaction. Furthermore, we use sentiment analysis of user’s comments to enhance the efficiency of the proposed system.


Author(s):  
Areej M Abduldaim

Authentication over insecure public networks or with untrusted servers raises more concerns in privacy and security.Modern algebra is one of the significantfields of mathematics. It is a combination of techniques used for a variety of applications including the process of the manipulation of the mathematical categories. In addition,modern algebra deals in depth with the study of abstractions such as groups, rings and fields,the main objective of this article is to provide a novel algebraic verification protocol using ring theory. The protocol is blind, meaning that it detects only the identity, and no additional information will be known anything about the prover (the biometric) to the authenticating server or vice-versa. More officially a blind authentication scheme is a cryptographic protocol that comprises of two parties, a user (the prover) that wants to achieve having signs on her messages, and a signer (the verifier) that is in ownership of his secret signing key. In this paper, we employ the algebraic structure called central Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.This method gave two important properties for the central Armendariz zero knowledge protocol compared with other known protocols.


Sign in / Sign up

Export Citation Format

Share Document