International Journal of Computer Networks and Communications Security

Volume 8, Issue 12, December 2019

 

 

Door Unlock by Face Recognition (DUFR)
 

Door Unlock by Face Recognition (DUFR)

Pages: 294-303 (10) | [Full Text] PDF (800 KB )
A Hussain, M Hasnain, M Faseeh-Ul-Haq, F Hussain
Hamdard University, Faculty of Engineering Sciences and Technology (FEST), Karachi, Sindh, Pakistan

Abstract -
The proposed paper is proposing a solution and mechanism which is grounded and focused on the security parameter. It is evident that with the passage of time substantial advancements and progressions have been developed in the past decade which is adequately helping and facilitating end-users with a satisfactory level of ease concerning their daily routines and habits. The development and establishments are in tangible and intangible forms such as mobile applications, security devices, and several others. On such stance, the researchers of this paper are focused on the development of a platform which facilitates the people with significant ease factor in their daily routines and habits. Therefore, researchers have proposed and developed a platform or solution that help the people in the attainment of ease factor regarding security. Researchers had a keen focused on usability, feasibility, ease, and usefulness that ultimately help in the attainment of high-quality outcomes. Thus, this paper has proposed and developed a solution concerning the security aspects which is Door Unlock by Using Face Recognition (DUFR) that assists in the accomplishment of security facets within the territory of homes, educational institutions, offices, healthcare units, and various different areas.
 
Index Terms - IoT, Face Recognition, Security, Safety, Technology

Citation - A Hussain, M Hasnain, M Faseeh-Ul-Haq, F Hussain. "Door Unlock by Face Recognition (DUFR)." International Journal of Computer Science and Software Engineering 8, no. 12 (2019): 294-303.

Modeling and simulation of resistive type superconducting fault current limiter using Matlab/Simulink
 

Modeling and simulation of resistive type superconducting fault current limiter using Matlab/Simulink

Pages: 304-311 (8) | [Full Text] PDF (1.42 MB)
N Pinon, G Didier, A Djaouti, D Netter
GREEN Laboratory, Faculté des sciences et technologies, Lorraine University, 54506 Vandoeuvre les Nancy, France

Abstract -
This paper presents a multi-scale resistive superconducting fault current limiter model developed in the Matlab/Simulink environment. The model considers the electrical and thermal phenomena present in HTS tape. It includes heat diffusion in the thickness and in the length that allows to study the presence of hot spot. A configurable interfacial resistance is included in the model to optimize the normal zone propagation velocity (NZPV). Simulation results are compared with a model developed in OpenModelica software where the heat equations are solved using finite difference method.
 
Index Terms - Superconducting fault current limiter, hot spot, numerical modeling, Simscape toolbox

Citation - N Pinon, G Didier, A Djaouti, D Netter. "Modeling and simulation of resistive type superconducting fault current limiter using Matlab/Simulink." International Journal of Computer Science and Software Engineering 8, no. 12 (2019): 304-311.

Wireless Sensor Network Mobile Element Energy Efficiency Challenges and Issues
 

Wireless Sensor Network Mobile Element Energy Efficiency Challenges and Issues

Pages: 312-315 (4) | [Full Text] PDF (408 KB)
MA Al-Namari, HAH Ibrahim , A Abdelkader, BR Al-Zabi
College of Computer at Al-Gunfudah, Umm Al-Qura University,Saudi Arabia
Faculty of Computer Science and Information Technology, University of Malaya,50603 Kuala Lumpur, Malaysia

Abstract -
Wireless Sensor Networks (WSNs) mostly applied to collect data from their sensing area. The trade-off between power efficiency or battery life and the data collection accuracy is the big challenging issue meets the designing of WSNs. This paper provide brief survey on WSNs energy efficiency especially in direction of mobile element. The goal of this survey is to equip valuable information out of huge amount of research papers. Single/multiple mobile elements, Drones and Path Planning, are the categories, which considered to highlight the main constrains of WSNs designing.
 
Index Terms - WSNs, Power efficiency, Mobile elements, Drones, Path Planning

Citation - MA Al-Namari, HAH Ibrahim , A Abdelkader, BR Al-Zabi. "Wireless Sensor Network Mobile Element Energy Efficiency Challenges and Issues." International Journal of Computer Science and Software Engineering 8, no. 12 (2019): 312-315.

Pliable Algorithm RGB image Convert in Gray image Using Transformation Equation
 

Pliable Algorithm RGB image Convert in Gray image Using Transformation Equation

Pages: 316-321 (6) | [Full Text] PDF (838 KB)
M Ahmad, Z Abbas, A Nasir, M Waseem, Au Azim, A Abbas
Department of Computer Science, Institute of Southern Punjab Multan, Pakistan

Abstract -
Color image conversion in gray image is the technique remodeling the peculiarity of the gray scale images. Gray Conversion emphasizes the aspect of images. In this precursory deed is the conversion color image into gray scale image integrity through new equation. The modus operandi of gray image blend channels is complicated to tow reasonable results. In earlier existing techniques to isolate (RGB) Red, Green, Blue channels from gray image but the lack of consume more than immense memory and time and lesser maintain brightness. The jurisdiction of circumscribed follow the gray conversion during of cumulative probability with improves the image brightness. Outcomes acquire by experimentation demonstrate that implemented of gray conversion improve luminance of gray image. Wherefore it is extremely endorsed to use the adequate RGB in gray conversion during of cumulative probability.
 
Index Terms - RGB image and Grayscale image, MATLAB

Citation - M Ahmad, Z Abbas, A Nasir, M Waseem, Au Azim, A Abbas. "Pliable Algorithm RGB image Convert in Gray image Using Transformation Equation." International Journal of Computer Science and Software Engineering 8, no. 12 (2019): 316-321.