Abstract: a class as "a collection of data and methods." One of the important object-oriented techniques is
hiding the data within the class and making it available only through the methods. This technique is known as
encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it
can be accessed only by trusted users.
Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class
often contains a number of interdependent fields that must be in a consistent state. If you allow a users to
manipulate those fields directly, he may change one field without changing important related fields, thus leaving
the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure
to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal
use only, hiding these methods prevents users of the class from calling them.
The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java
defines access control rules that restrict members of a class from being used outside the class that is done
through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be
accessed only by trusted users.
Keywords: Encapsulation, Access Control, Classes, Constructors, Methods.
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
Security has been an issue from the inception of computer systems and experts have related security issues with usability. Secured systems must be usable to maintain intended security. Password Authentication Systems have either been usable and not secure, or secure and not usable. Increasing either tends to complicate the other.
Text passwords are widely used but suffer from poor usability, reducing its security. Graphical Passwords, while usable, does not seem to have the security necessary to replace text passwords. Attempts using text or graphics only have mixed results. A combination password is proposed as a potential solution to the problem.
This paper explores combination as a means of solving this password problem. We implemented three password systems: Text only, Graphics only and a Combination of Text and Graphics. Remote evaluations were conducted with 105 computer science students. Results from our evaluations, though not conclusive, suggest promise for combination passwords.
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...gerogepatton
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and User to Root (U2R) attacks are very rare attacks and even in KDD dataset, these attacks are only 2% of overall datasets. So,these result in model not able to efficiently learn the characteristics of rare categories and this will result in
poor detection rates of rare attack categories like R2L and U2R attacks. We even compared the accuracy of KDD and NSL-KDD datasets using different classifiers in WEKA.
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...ijaia
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and User to Root (U2R) attacks are very rare attacks and even in KDD dataset, these attacks are only 2% of overall datasets. So, these result in model not able to efficiently learn the characteristics of rare categories and this will result in poor detection rates of rare attack categories like R2L and U2R attacks. We even compared the accuracy of KDD and NSL-KDD datasets using different classifiers in WEKA.
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
Security has been an issue from the inception of computer systems and experts have related security issues with usability. Secured systems must be usable to maintain intended security. Password Authentication Systems have either been usable and not secure, or secure and not usable. Increasing either tends to complicate the other.
Text passwords are widely used but suffer from poor usability, reducing its security. Graphical Passwords, while usable, does not seem to have the security necessary to replace text passwords. Attempts using text or graphics only have mixed results. A combination password is proposed as a potential solution to the problem.
This paper explores combination as a means of solving this password problem. We implemented three password systems: Text only, Graphics only and a Combination of Text and Graphics. Remote evaluations were conducted with 105 computer science students. Results from our evaluations, though not conclusive, suggest promise for combination passwords.
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...gerogepatton
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and User to Root (U2R) attacks are very rare attacks and even in KDD dataset, these attacks are only 2% of overall datasets. So,these result in model not able to efficiently learn the characteristics of rare categories and this will result in
poor detection rates of rare attack categories like R2L and U2R attacks. We even compared the accuracy of KDD and NSL-KDD datasets using different classifiers in WEKA.
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...ijaia
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and User to Root (U2R) attacks are very rare attacks and even in KDD dataset, these attacks are only 2% of overall datasets. So, these result in model not able to efficiently learn the characteristics of rare categories and this will result in poor detection rates of rare attack categories like R2L and U2R attacks. We even compared the accuracy of KDD and NSL-KDD datasets using different classifiers in WEKA.
Synthesis and Characterization O-, M- and Para-Toluyl Thiourea Substituted Pa...IOSR Journals
Abstract: Six new derivatives of carbonyl thiourea comprises of o-,m- and p-toluyl at one end of Nitrogen atom and p-methylpyridine or ethyl pyridine at another one end of Nitrogen atom has been synthesized. The compounds are, 2-methyl-N-[(4-methylpyridine-2-yl) carbamothiol] benzamide (I), 3-methyl-N-[(4-methylpyridine-2-yl) carbamothiol] benzamide (II) and 4-N-[(4-methylpyridine-2-yl) carbamothiol] benzamide (III) for Toluyl-MP while 2-methyl-N-[(2-pyridine-2-yl-ethyl) carbamothiol] benzamide (IV), 3- methyl-N-[(2-pyridine-2-yl-ethyl) carbamothiol] benzamide (V) and 4- methyl-N-[(2-pyridine-2-yl-ethyl) carbamothiol] benzamide (VI) for isomer Toluidal-AEP have been successfully synthesized and characterized by elemental analysis, Infrared Spectroscopy analysis (FT-IR), Nuclear Magnetic Resonance Spectroscopy (NMR) and Ultraviolet-visible (UV-vis). All products shown stretching modes of ν(N-H), ν(C=O), ν(C-N), and ν(C=S) around 3276 cm-1, 1671 cm-1, 1315cm-1 and 1148 cm-1 respectively. All products shown two maximum absorption around 262 nm and 290 nm respectively for carbonyl C=O and thione C=S chromophore. Those both values contributed by n -п* transition. 1H nuclear magnetic resonance spectrum showed presence of aromatic, methyl, methine and amide protons except for product III. All products showed presence of carbon thione in 13C nuclear magnetic resonance except for product III. Ionophor interpretation with acetate anion shows color changes by naked eye for compound (I) and (III).
Voice Recognition Wireless Home Automation System Based On ZigbeeIOSR Journals
Abstract : In the recent years, the Home Automation systems has seen a rapid changes due to introduction of various wireless technologies The explosion in the wireless technology has seen the emergence of many standards, especially in the industrial, scientific and medical (ISM) radio band. ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. Zigbee is targeted at applications that requires low data rate, long battery life, and secure networking. Zigbee has a defined rate of 250 kbits/s, best suited for periodic or intermittent data or a single signal transmission from a sensor or input device. The wireless home Automation systems is supposed to be implemented in existing home environments, without any changes in the infrastructure. The automation centers on recognition of voice commands and uses low-power ZigBee wireless communication modules along with microcontroller. This system is most suitable for the elderly and the disabled persons especially those who live alone and since recognize voice so it is secure. The home automation system is intended to control all lights and electrical appliances in a home or office using voice commands. So in this paperwork our aim is to designed a voice recognition wireless ZigBee based home automation system. Keywords - Home automation, Microcontroller , Voice Recognition, ZigBee, Power Supply.
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
Abstract: MIMO-OFDM system in Rayleigh Fading Channel is very popular technique for mobile communication now a day’s for research. Here we want increase the capacity of MIMO-OFDM of system by using adaptive modulation, Algebraic Space-Time Codes (ASTC) encoder for MIMO Systems are based on quaternion algebras .we found that ergodic capacity has some limitation which reduce the system’s performance to overcome this we use ASTC code . ASTC code are full rank, full rate and non vanishing constant minimum determinant for increasing spectral efficiency and reducing Peak to Average Power Ratio (PAPR) . Keywords— Adaptive modulation ASTC code, Capacity, BER, Ergodic capacity, PAPR, Spectral Efficiency and SNR
Performance Comparison of Uncoded OFDM & Uncoded Adaptive OFDM System Over AW...IOSR Journals
Adaptive OFDM (AOFDM) is the important approach to fourth generation of mobile
communication. Adaptive modulating scheme is employed according to channel fading condition for improving
the performance of OFDM. This gives improved data rate, spectral efficiency & throughput. OFDM is flexible
to adapt modulation schemes on subcarriers according instantaneous signal-to-noise ratio (SNR). In this paper,
we compare Bit Error Rate (BER),Mean Square Error(MSE), Spectral Efficiency, Throughput performance of
uncoded OFDM & uncoded adaptive OFDM with BPSK,QPSK & QAM modulation over AWGN channel.
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
Structural and Spectroscopical Studies for a Complex Macromolecule (hGH)IOSR Journals
Abstract: This paper tries to find the effect of the different environmental changes of ( pH, ionic strength, and temperature) on their tertiary structure of hGH by using UV sepctoscopy. We found that the hormone affected by chemical reagents change its conformation and folding. The present study is an attempt to discover what could happen to GH molecule when the biochemistry of body is changed. The results reveal that tryptophyl residues are inside the hormone, whereas tyrosyl residues are on the surface.
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
Abstract: Face detection and Facial recognition technology has emerged as a striking solution to address
many contemporary prerequisites for identification and the verification of identity prerogatives. It brings
together the potential of supplementary biometric systems, which attempt to link identity to individually
distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current
decades face recognition has experienced significant consideration from both research communities and the
marketplace, conversely still remained very electrifying in real applications. The assignment of face detection
and recognition has been dynamically researched in current eternities. This paper offers a conversant
evaluation of foremost human face recognition research. We first present a summary of face detection, face
recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques
is accessible.
Clarification and restrictions of the performance of these face recognition algorithms are specified.
Here we present a vital assessment of the current researches concomitant with the face recognition process. In
this paper, we present a broad range review of major researches on face recognition process based on various
circumstances. In addition, we present a summarizing description of Face detection and recognition process
and development along with the techniques connected with the various influences that affects the face
recognition process.
Keywords: Face Detection, Face Recognition System, Biometric System, Review Research.
Survey on Single image Super Resolution TechniquesIOSR Journals
Super-resolution is the process of recovering a high-resolution image from multiple lowresolutionimages
of the same scene. The key objective of super-resolution (SR) imaging is to reconstruct a
higher-resolution image based on a set of images, acquired from the same scene and denoted as ‘lowresolution’
images, to overcome the limitation and/or ill-posed conditions of the image acquisition process for
facilitating better content visualization and scene recognition. In this paper, we provide a comprehensive review
of existing super-resolution techniques and highlight the future research challenges. This includes the
formulation of an observation model and coverage of the dominant algorithm – Iterative back projection.We
critique these methods and identify areas which promise performance improvements. In this paper, future
directions for super-resolution algorithms are discussed. Finally results of available methods are given.
Application of Artificial Neural Network (Ann) In Operation of ReservoirsIOSR Journals
Abstract: Reservoir operation is an important element in water resources planning and management. It consists
of several parameters like inflow, storage, evaporation and demands that define the operation strategies for
giving a sequence of releases to meet the demands. The operating policy is a set of rules for determining the
quantities of water to be stored or released or withdrawn from a reservoir or system of several reservoirs under
various conditions. Reservoir operation frequently follows a conventional policy based on Guide curves (Rule
curves) that prescribes reservoir releases based on limited criteria such as current storage levels, season and
demands. Operating policies can be derived using system techniques such as simulation, optimisation and
combination of these two. System analysis has proved to be a potential tool in the planning, operation and
management of the available resources. In recent years, artificial intelligence techniques like Artificial Neural
Networks (ANN) have arisen as an alternative to overcome some of the limitations of traditional methods. In
most of the studies, feed forward structure and the back propagation algorithm have been used to design and
train the ANN models respectively. Detail analysis will be carried out to develop an ANN model for reservoir
operation and assess the application potential of ANN in attaining the reservoir operation objectives compared
with the conventional rule curves.
Key words:Artificial Neural Network, Back propagation, Guide curves (Rule curves), optimisation,reservoir
operation, simulation.
Investigating and Classifying the Applications of Flexible Manufacturing Syst...IOSR Journals
The recent manufacturing environment is characterized as having diverse products due to mass
customization, short production lead-time, and unstable customer demand. Today, the need for flexibility, quick
responsiveness, and robustness to system uncertainties in production scheduling decisions has increased
significantly. In traditional job shops, tooling is usually assumed as a fixed resource. However, when tooling
resource is shared among different machines, a greater product variety, routing flexibility with a smaller tool
inventory can be realized. Such a strategy is usually enabled by an automatic tool changing mechanism and tool
delivery system to reduce the time for tooling setup, hence allows parts to be processed in small batches. In this
research, a dynamic scheduling problem under flexible tooling resource constraints is studied. An integrated
approach is proposed to allow two levels of hierarchical, dynamic decision making for job scheduling and tool
flow control in Automated Manufacturing Systems. It decomposes the overall problem into a series of static subproblems
for each scheduling window, handles random disruptions by updating job ready time, completion
time, and machine status on a rolling horizon basis, and considers the machine availability explicitly in
generating schedules. Two types of manufacturing system models are used in simulation studies to test the
effectiveness of the proposed dynamic scheduling approach. First, hypothetical models are generated using
some generic shop flow structures (e.g. flexible flow shops, job shops, and single-stage systems) and
configurations(Insup,Um.,et al.,2009).They are tested to provide the empirical evidence about how well the
proposed approach performs for the general automated manufacturing systems where parts have alternative
routings. Second, a model based on a real industrial flexible manufacturing system was used to test the
effectiveness of the proposed approach when machine types, part routing, tooling, and other production
parameters closely mimic to the real flexible manufacturing operations.
Transformational Leadership at Muhammadiyah Primary Schoolson Emotional Intel...IOSR Journals
The aim of this research are examines the influence of Authentic Transformational Leadership behavior on Emotional Intelligence with intervening variables: Value CongruenceandTrust of the teachers and employees at MuhammadiyahPrimary Schools forward Bass &Avolio Theory. Quantitative approach used on this research. The samples in this study were 55 employees and 110 teachers. The finding indicate that Authentic Transformational Leadership behavior have significant direct effect on Emotional Intelligence. The significant influence was also shown by intervening variables: Value Congruence (positive), andTrust (negative). For further studies there is recommended to conduct similar studies in high school Muhammadiyah, considering there are differences in the curriculum and the emotional maturity of students and teachers
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch
A New Lupan type Triterpene Butilinol from Viburnum grandiflorumIOSR Journals
The isolation and structural studies on the chemical constituents of Viburnum grandiflorum are described. The medicinal properties of the plant are also described. The mentholic extract was subjected to the preparative thin layer chromatography (PTLC) test experiments to investigate the isolation pattern. Based on the PTLC test experiments, the extract was subjected to the silica gel column chromatography. The column was eluted with increasing polarities of organic solvents. This afforded several fractions. The fractions were re-chromatographed on silica gel column to afford a new lupan type triterpene butilinol (1) with several known compounds i. e. oleanolic acid (2), ursolic acid (3), β-sitosterol (4), butilinic acid (5), butilin (6), α-amyrin (7) and germanicol (8). The compound (6) was not reported previously from the genus Viburnum. This therefore represents its first report from Viburnum grandiflorum. The compounds (2) and (4) have been previously reported from Viburnum pronifolium while the compounds (3) and (8) from Viburnum opulus and Viburnum erubescens, respectively. This represents the first report of the presence of these compounds in Viburnum grandiflorum. The structures of the above compounds were identified on the basis of spectral data (UV, IR, Mass, 1NMR, 13C-NMR) and literature evidences. The hexane and ethyl acetate soluble portions of the methanolic extract showed significant antifungal activity, while the chloroform soluble portion and the remaining methanol extract showed moderate activity.
Biomimetic Materials in Our World: A Review.IOSR Journals
The study of biomineralization offers valuable and incredible insights into the scope and nature of material chemistry at the inorganic and organic surfaces. Biological systems (architecture) are replete with examples of organic supramolecular assemblies (double and triplet helices, multisubunit proteins, membrane-bound reaction centres, vesicle, tubules e. t. c.), some of which (collagen, cellulose and chitin) extend to microscopic dimensions in the form of hierarchical structure, There are ample opportunities of lessons from the biological (on growth and functional adaptation), and physical (properties and compositions) world. This review explores the field of biomimetic material chemistry as it relates to fibres with respect to their historical perspective, the use of the products of biomimetic material, the progressive efforts and a general overview. Conclusively, biomimetic materials research is indeed a rapidly growing and enormously promising field that needs to be explored.
An Inquiry on the Effect of Knowledge Management and Strategic Leadership on ...IOSR Journals
Organizational dynamic capability and entrepreneurship strategy are two aspects that have contribution in affecting organizational performances particularly by means of knowledge management and strategic leadership. There is a need to identify this presumption, thus current research in this paper were employed in the General Public Hospitals in Makassar in the Provinces of South Sulawesi (Indonesia). Previous research has uncovered important factors of organizational performance such as knowledge management, strategic leadership, dynamic capability, entrepreneurship strategy. Nonetheless they require further conceptual depth and empirical assessment as it remains unclear how these factors holistically affects critical performances in organizational performances. In this paper, we developed the structural model including the introduction of knowledge management and strategic leadership and the more established relationship between dynamic capability and strategic entrepreneurship with organizational performances as a means to understand their interrelatedness and feasibility on improving the body of knowledge in current literature
Comparison of Sports Anxiety in three different Stages between Team and Indiv...IOSR Journals
Abstract: To find out the degrees of anxieties experienced by both the individual and team sports persons of
Manipur at three different stages of sports such as prior to the actual play, during the progress of the play and
after the conclusion of the play over the period of five years beginning from 1995 to 2000 A.D. The researchers
mainly adopted the simple and easy methods of questionnaires, personal visits to national and state level
sportspersons of Manipur at their residence, hostels and other sports complexes. The subjects of the study were
173 teams’ sportspersons and 173 individual sportspersons of Manipur over the span of five years starting form
1995 to 2000. The team sports persons were form the field of hockey, handball, kabaddi, sepak-takraw and
volleyball, on the other hand the individual team sportspersons were from the disciplines of Archery, cycling,
table-tennis, wrestling, fencing, athletics, weight lifting, judo, boxing and tae-kwondo respectively. Data were
collected by using “Anxiety test questionnaire” tools.
Comparing the sport anxiety before, during and after the play, both the individual and team sportsperson were
found significantly higher in anxiety level during the play than the before and after the play situation. The sports
anxiety between the individuals and teams sports found no significant difference before the play and after the
play. But there is significant different found during the play i.e., individuals sportspersons were found
significantly higher in sports anxiety then the team sportspersons.
Key wards: Sports anxiety, individual and team sportspersons, STAI Form Y-I, comparative t test.
Effect of Fermentation on the Nutritional and Antinutritional Composition of ...IOSR Journals
The dehulled seeds of three varieties of Lagenaria siceraria were subjected to control fermentation process. The fermented and unfermented seeds were analysed for their nutritional and anti-nutritional compositions using AOAC 1998. The fermented seeds were found to contain high amount of crude protein (48.12%) and crude fibre (4.11%) compared to 27.42% and 0.67% for unfermented seeds respectively. Similarly, crude lipid content of the seeds decreased by about 75%. The process also results in decrease in phytate, oxalate, tannins and cyanide content with consequent increase in nitrate and Vitamin C. Hence fermenting the seeds is an important way of exposing its protein content and reducing the antinutritional content. The seeds were found to have good potentials for preparation of condiments which are commonly used in the preparation of soup.
Synthesis and Characterization O-, M- and Para-Toluyl Thiourea Substituted Pa...IOSR Journals
Abstract: Six new derivatives of carbonyl thiourea comprises of o-,m- and p-toluyl at one end of Nitrogen atom and p-methylpyridine or ethyl pyridine at another one end of Nitrogen atom has been synthesized. The compounds are, 2-methyl-N-[(4-methylpyridine-2-yl) carbamothiol] benzamide (I), 3-methyl-N-[(4-methylpyridine-2-yl) carbamothiol] benzamide (II) and 4-N-[(4-methylpyridine-2-yl) carbamothiol] benzamide (III) for Toluyl-MP while 2-methyl-N-[(2-pyridine-2-yl-ethyl) carbamothiol] benzamide (IV), 3- methyl-N-[(2-pyridine-2-yl-ethyl) carbamothiol] benzamide (V) and 4- methyl-N-[(2-pyridine-2-yl-ethyl) carbamothiol] benzamide (VI) for isomer Toluidal-AEP have been successfully synthesized and characterized by elemental analysis, Infrared Spectroscopy analysis (FT-IR), Nuclear Magnetic Resonance Spectroscopy (NMR) and Ultraviolet-visible (UV-vis). All products shown stretching modes of ν(N-H), ν(C=O), ν(C-N), and ν(C=S) around 3276 cm-1, 1671 cm-1, 1315cm-1 and 1148 cm-1 respectively. All products shown two maximum absorption around 262 nm and 290 nm respectively for carbonyl C=O and thione C=S chromophore. Those both values contributed by n -п* transition. 1H nuclear magnetic resonance spectrum showed presence of aromatic, methyl, methine and amide protons except for product III. All products showed presence of carbon thione in 13C nuclear magnetic resonance except for product III. Ionophor interpretation with acetate anion shows color changes by naked eye for compound (I) and (III).
Voice Recognition Wireless Home Automation System Based On ZigbeeIOSR Journals
Abstract : In the recent years, the Home Automation systems has seen a rapid changes due to introduction of various wireless technologies The explosion in the wireless technology has seen the emergence of many standards, especially in the industrial, scientific and medical (ISM) radio band. ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. Zigbee is targeted at applications that requires low data rate, long battery life, and secure networking. Zigbee has a defined rate of 250 kbits/s, best suited for periodic or intermittent data or a single signal transmission from a sensor or input device. The wireless home Automation systems is supposed to be implemented in existing home environments, without any changes in the infrastructure. The automation centers on recognition of voice commands and uses low-power ZigBee wireless communication modules along with microcontroller. This system is most suitable for the elderly and the disabled persons especially those who live alone and since recognize voice so it is secure. The home automation system is intended to control all lights and electrical appliances in a home or office using voice commands. So in this paperwork our aim is to designed a voice recognition wireless ZigBee based home automation system. Keywords - Home automation, Microcontroller , Voice Recognition, ZigBee, Power Supply.
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
Abstract: MIMO-OFDM system in Rayleigh Fading Channel is very popular technique for mobile communication now a day’s for research. Here we want increase the capacity of MIMO-OFDM of system by using adaptive modulation, Algebraic Space-Time Codes (ASTC) encoder for MIMO Systems are based on quaternion algebras .we found that ergodic capacity has some limitation which reduce the system’s performance to overcome this we use ASTC code . ASTC code are full rank, full rate and non vanishing constant minimum determinant for increasing spectral efficiency and reducing Peak to Average Power Ratio (PAPR) . Keywords— Adaptive modulation ASTC code, Capacity, BER, Ergodic capacity, PAPR, Spectral Efficiency and SNR
Performance Comparison of Uncoded OFDM & Uncoded Adaptive OFDM System Over AW...IOSR Journals
Adaptive OFDM (AOFDM) is the important approach to fourth generation of mobile
communication. Adaptive modulating scheme is employed according to channel fading condition for improving
the performance of OFDM. This gives improved data rate, spectral efficiency & throughput. OFDM is flexible
to adapt modulation schemes on subcarriers according instantaneous signal-to-noise ratio (SNR). In this paper,
we compare Bit Error Rate (BER),Mean Square Error(MSE), Spectral Efficiency, Throughput performance of
uncoded OFDM & uncoded adaptive OFDM with BPSK,QPSK & QAM modulation over AWGN channel.
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
Structural and Spectroscopical Studies for a Complex Macromolecule (hGH)IOSR Journals
Abstract: This paper tries to find the effect of the different environmental changes of ( pH, ionic strength, and temperature) on their tertiary structure of hGH by using UV sepctoscopy. We found that the hormone affected by chemical reagents change its conformation and folding. The present study is an attempt to discover what could happen to GH molecule when the biochemistry of body is changed. The results reveal that tryptophyl residues are inside the hormone, whereas tyrosyl residues are on the surface.
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
Abstract: Face detection and Facial recognition technology has emerged as a striking solution to address
many contemporary prerequisites for identification and the verification of identity prerogatives. It brings
together the potential of supplementary biometric systems, which attempt to link identity to individually
distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current
decades face recognition has experienced significant consideration from both research communities and the
marketplace, conversely still remained very electrifying in real applications. The assignment of face detection
and recognition has been dynamically researched in current eternities. This paper offers a conversant
evaluation of foremost human face recognition research. We first present a summary of face detection, face
recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques
is accessible.
Clarification and restrictions of the performance of these face recognition algorithms are specified.
Here we present a vital assessment of the current researches concomitant with the face recognition process. In
this paper, we present a broad range review of major researches on face recognition process based on various
circumstances. In addition, we present a summarizing description of Face detection and recognition process
and development along with the techniques connected with the various influences that affects the face
recognition process.
Keywords: Face Detection, Face Recognition System, Biometric System, Review Research.
Survey on Single image Super Resolution TechniquesIOSR Journals
Super-resolution is the process of recovering a high-resolution image from multiple lowresolutionimages
of the same scene. The key objective of super-resolution (SR) imaging is to reconstruct a
higher-resolution image based on a set of images, acquired from the same scene and denoted as ‘lowresolution’
images, to overcome the limitation and/or ill-posed conditions of the image acquisition process for
facilitating better content visualization and scene recognition. In this paper, we provide a comprehensive review
of existing super-resolution techniques and highlight the future research challenges. This includes the
formulation of an observation model and coverage of the dominant algorithm – Iterative back projection.We
critique these methods and identify areas which promise performance improvements. In this paper, future
directions for super-resolution algorithms are discussed. Finally results of available methods are given.
Application of Artificial Neural Network (Ann) In Operation of ReservoirsIOSR Journals
Abstract: Reservoir operation is an important element in water resources planning and management. It consists
of several parameters like inflow, storage, evaporation and demands that define the operation strategies for
giving a sequence of releases to meet the demands. The operating policy is a set of rules for determining the
quantities of water to be stored or released or withdrawn from a reservoir or system of several reservoirs under
various conditions. Reservoir operation frequently follows a conventional policy based on Guide curves (Rule
curves) that prescribes reservoir releases based on limited criteria such as current storage levels, season and
demands. Operating policies can be derived using system techniques such as simulation, optimisation and
combination of these two. System analysis has proved to be a potential tool in the planning, operation and
management of the available resources. In recent years, artificial intelligence techniques like Artificial Neural
Networks (ANN) have arisen as an alternative to overcome some of the limitations of traditional methods. In
most of the studies, feed forward structure and the back propagation algorithm have been used to design and
train the ANN models respectively. Detail analysis will be carried out to develop an ANN model for reservoir
operation and assess the application potential of ANN in attaining the reservoir operation objectives compared
with the conventional rule curves.
Key words:Artificial Neural Network, Back propagation, Guide curves (Rule curves), optimisation,reservoir
operation, simulation.
Investigating and Classifying the Applications of Flexible Manufacturing Syst...IOSR Journals
The recent manufacturing environment is characterized as having diverse products due to mass
customization, short production lead-time, and unstable customer demand. Today, the need for flexibility, quick
responsiveness, and robustness to system uncertainties in production scheduling decisions has increased
significantly. In traditional job shops, tooling is usually assumed as a fixed resource. However, when tooling
resource is shared among different machines, a greater product variety, routing flexibility with a smaller tool
inventory can be realized. Such a strategy is usually enabled by an automatic tool changing mechanism and tool
delivery system to reduce the time for tooling setup, hence allows parts to be processed in small batches. In this
research, a dynamic scheduling problem under flexible tooling resource constraints is studied. An integrated
approach is proposed to allow two levels of hierarchical, dynamic decision making for job scheduling and tool
flow control in Automated Manufacturing Systems. It decomposes the overall problem into a series of static subproblems
for each scheduling window, handles random disruptions by updating job ready time, completion
time, and machine status on a rolling horizon basis, and considers the machine availability explicitly in
generating schedules. Two types of manufacturing system models are used in simulation studies to test the
effectiveness of the proposed dynamic scheduling approach. First, hypothetical models are generated using
some generic shop flow structures (e.g. flexible flow shops, job shops, and single-stage systems) and
configurations(Insup,Um.,et al.,2009).They are tested to provide the empirical evidence about how well the
proposed approach performs for the general automated manufacturing systems where parts have alternative
routings. Second, a model based on a real industrial flexible manufacturing system was used to test the
effectiveness of the proposed approach when machine types, part routing, tooling, and other production
parameters closely mimic to the real flexible manufacturing operations.
Transformational Leadership at Muhammadiyah Primary Schoolson Emotional Intel...IOSR Journals
The aim of this research are examines the influence of Authentic Transformational Leadership behavior on Emotional Intelligence with intervening variables: Value CongruenceandTrust of the teachers and employees at MuhammadiyahPrimary Schools forward Bass &Avolio Theory. Quantitative approach used on this research. The samples in this study were 55 employees and 110 teachers. The finding indicate that Authentic Transformational Leadership behavior have significant direct effect on Emotional Intelligence. The significant influence was also shown by intervening variables: Value Congruence (positive), andTrust (negative). For further studies there is recommended to conduct similar studies in high school Muhammadiyah, considering there are differences in the curriculum and the emotional maturity of students and teachers
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch
A New Lupan type Triterpene Butilinol from Viburnum grandiflorumIOSR Journals
The isolation and structural studies on the chemical constituents of Viburnum grandiflorum are described. The medicinal properties of the plant are also described. The mentholic extract was subjected to the preparative thin layer chromatography (PTLC) test experiments to investigate the isolation pattern. Based on the PTLC test experiments, the extract was subjected to the silica gel column chromatography. The column was eluted with increasing polarities of organic solvents. This afforded several fractions. The fractions were re-chromatographed on silica gel column to afford a new lupan type triterpene butilinol (1) with several known compounds i. e. oleanolic acid (2), ursolic acid (3), β-sitosterol (4), butilinic acid (5), butilin (6), α-amyrin (7) and germanicol (8). The compound (6) was not reported previously from the genus Viburnum. This therefore represents its first report from Viburnum grandiflorum. The compounds (2) and (4) have been previously reported from Viburnum pronifolium while the compounds (3) and (8) from Viburnum opulus and Viburnum erubescens, respectively. This represents the first report of the presence of these compounds in Viburnum grandiflorum. The structures of the above compounds were identified on the basis of spectral data (UV, IR, Mass, 1NMR, 13C-NMR) and literature evidences. The hexane and ethyl acetate soluble portions of the methanolic extract showed significant antifungal activity, while the chloroform soluble portion and the remaining methanol extract showed moderate activity.
Biomimetic Materials in Our World: A Review.IOSR Journals
The study of biomineralization offers valuable and incredible insights into the scope and nature of material chemistry at the inorganic and organic surfaces. Biological systems (architecture) are replete with examples of organic supramolecular assemblies (double and triplet helices, multisubunit proteins, membrane-bound reaction centres, vesicle, tubules e. t. c.), some of which (collagen, cellulose and chitin) extend to microscopic dimensions in the form of hierarchical structure, There are ample opportunities of lessons from the biological (on growth and functional adaptation), and physical (properties and compositions) world. This review explores the field of biomimetic material chemistry as it relates to fibres with respect to their historical perspective, the use of the products of biomimetic material, the progressive efforts and a general overview. Conclusively, biomimetic materials research is indeed a rapidly growing and enormously promising field that needs to be explored.
An Inquiry on the Effect of Knowledge Management and Strategic Leadership on ...IOSR Journals
Organizational dynamic capability and entrepreneurship strategy are two aspects that have contribution in affecting organizational performances particularly by means of knowledge management and strategic leadership. There is a need to identify this presumption, thus current research in this paper were employed in the General Public Hospitals in Makassar in the Provinces of South Sulawesi (Indonesia). Previous research has uncovered important factors of organizational performance such as knowledge management, strategic leadership, dynamic capability, entrepreneurship strategy. Nonetheless they require further conceptual depth and empirical assessment as it remains unclear how these factors holistically affects critical performances in organizational performances. In this paper, we developed the structural model including the introduction of knowledge management and strategic leadership and the more established relationship between dynamic capability and strategic entrepreneurship with organizational performances as a means to understand their interrelatedness and feasibility on improving the body of knowledge in current literature
Comparison of Sports Anxiety in three different Stages between Team and Indiv...IOSR Journals
Abstract: To find out the degrees of anxieties experienced by both the individual and team sports persons of
Manipur at three different stages of sports such as prior to the actual play, during the progress of the play and
after the conclusion of the play over the period of five years beginning from 1995 to 2000 A.D. The researchers
mainly adopted the simple and easy methods of questionnaires, personal visits to national and state level
sportspersons of Manipur at their residence, hostels and other sports complexes. The subjects of the study were
173 teams’ sportspersons and 173 individual sportspersons of Manipur over the span of five years starting form
1995 to 2000. The team sports persons were form the field of hockey, handball, kabaddi, sepak-takraw and
volleyball, on the other hand the individual team sportspersons were from the disciplines of Archery, cycling,
table-tennis, wrestling, fencing, athletics, weight lifting, judo, boxing and tae-kwondo respectively. Data were
collected by using “Anxiety test questionnaire” tools.
Comparing the sport anxiety before, during and after the play, both the individual and team sportsperson were
found significantly higher in anxiety level during the play than the before and after the play situation. The sports
anxiety between the individuals and teams sports found no significant difference before the play and after the
play. But there is significant different found during the play i.e., individuals sportspersons were found
significantly higher in sports anxiety then the team sportspersons.
Key wards: Sports anxiety, individual and team sportspersons, STAI Form Y-I, comparative t test.
Effect of Fermentation on the Nutritional and Antinutritional Composition of ...IOSR Journals
The dehulled seeds of three varieties of Lagenaria siceraria were subjected to control fermentation process. The fermented and unfermented seeds were analysed for their nutritional and anti-nutritional compositions using AOAC 1998. The fermented seeds were found to contain high amount of crude protein (48.12%) and crude fibre (4.11%) compared to 27.42% and 0.67% for unfermented seeds respectively. Similarly, crude lipid content of the seeds decreased by about 75%. The process also results in decrease in phytate, oxalate, tannins and cyanide content with consequent increase in nitrate and Vitamin C. Hence fermenting the seeds is an important way of exposing its protein content and reducing the antinutritional content. The seeds were found to have good potentials for preparation of condiments which are commonly used in the preparation of soup.
In this modern age automation is taking place in every field of life. This automatic DOL starter of 3 phase induction motor is also a work in this automation process. Induction motors find their application in vast field of engineering and daily life. This project implements a device which provides automation to the 3 phase induction operation. Due to wide range of application induction motor automation in working of induction motor will cover a wide area of automation.
There are different techniques to start an Induction Motor but there are some drawbacks with the traditional motor starters which are using in our day to day life .One major disadvantage of the traditional motor starters are they do not have a mechanism to restart them when power is resumed after power cut while the machine is in running condition.To over come this disadvantage we have designed a circuit of AUTOMATIC CONTROL OF DIRECT ONLINE STARTER
Object-Oriented Programming in Java
Java is a well-liked programming language that may be used to create a wide range of applications, from straightforward desktop programs to intricate web programs. It is an object-oriented programming language that enables programmers to create modular, reusable code, making it simple to maintain and update.
We shall look at the fundamentals of Java object-oriented programming in this tutorial. The fundamentals of object-oriented programming in Java, oops concepts such as classes and objects, inheritance, polymorphism, and encapsulation will all be covered. You will have a solid understanding of object-oriented programming in Java and how to use it to create robust and scalable programs at the end of this article.
Introduction to OOPs concept
Object-oriented programming in Java is a programming paradigm that revolves around objects. An object is a real-world entity that has a set of attributes and behaviors. In Java, even basic data types like integers and booleans are considered objects.
In OOPS, a program is designed by creating objects that interact with each other to perform tasks. Objects have attributes that define their properties and methods that define their behavior.
In Java, we create classes, which are templates that define the attributes and behaviors of objects. A class can be compared to an object creation blueprint. Once a class is defined, objects can be created based on that class.
Principles of Object-Oriented Programming
There are four main principles of object-oriented programming:
a. Abstraction
Abstraction is the process of hiding complex details and providing a simplified interface for the user. It helps developers to create simpler and more understandable models of a complex system, by just exposing only the required features and not the implementation part. In Java, abstraction can be achieved using interfaces and abstract classes.
b. Encapsulation
Encapsulation is the process of hiding the internal details of an object and providing a public interface for accessing and modifying the object. It helps in maintaining the integrity of the object and ensures that its internal state cannot be modified by external code. In Java, encapsulation can be achieved using access modifiers such as public, private, and protected.
Got confused between Abstraction and Encapsulation?
Abstraction is about simplifying the complexity of a system by focusing on its essential features, while encapsulation is about protecting the integrity of an object by hiding its internal details.
c. Inheritance
The process of creating a new class from an existing one is called Inheritance. The new class inherits the attributes and behaviors of the existing class and can add additional attributes and behaviors. This helps in reducing code duplication, promoting code reuse, and making the code more modular and maintainable. In Java, the extend keyword is useful for achieving inheritance.
d. Polymorphism
The ability of an
Having more than 3 years of experience at hkrtrainings.com an IT professional with expertise in providing Enterprise Performance Engineering solutions.
This program is designed for the use of LibraryManagement System and its functioning Main Objective of this project to facilitate the transactions through use of electronic medium. We use java netbeans 6.5.1 software and Mysql to programming our project.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 59-66
www.iosrjournals.org
www.iosrjournals.org 59 | Page
"Study of Java Access Control Mechanism”
Manhal Mohammad Basher
(Department Of Mechanical, Technical Institute / Foundation of Technical Education, Iraq)
Abstract: a class as "a collection of data and methods." One of the important object-oriented techniques is
hiding the data within the class and making it available only through the methods. This technique is known as
encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it
can be accessed only by trusted users.
Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class
often contains a number of interdependent fields that must be in a consistent state. If you allow a users to
manipulate those fields directly, he may change one field without changing important related fields, thus leaving
the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure
to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal
use only, hiding these methods prevents users of the class from calling them.
The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java
defines access control rules that restrict members of a class from being used outside the class that is done
through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be
accessed only by trusted users.
Keywords: Encapsulation, Access Control, Classes, Constructors, Methods.
I. Introduction
Every time you download a ―normal‖ program, you are taking a risk, because the code you are
downloading might contain a virus, Trojan horse, or other harmful code. At the core of the problem is the fact
that malicious code can cause its damage because it has gained unauthorized access to system resources. For
example, a virus program might gather private information, such as credit card numbers, bank account balances,
and passwords, by searching the contents of your computer’s local file system. In order for Java to enable
applets to be downloaded and executed on the client computer safely, it was necessary to prevent an applet from
launching such an attack.
Java supplies a rich set of access specifiers. Some aspects of access control are related mostly to
encapsulation, inheritance and packages. Also Java’s access specifiers are public, private, and protected. Java
also defines a default access level. protected applies only when inheritance is involved.
Encapsulation links data with the code that manipulates it. However, encapsulation provides important
attribute: access control. Through encapsulation, you can control what parts of a program can access the
members of a class. By controlling access, you can prevent misuse. Also it is the technique of making the fields
in a class private and providing access to the fields via public methods. If a field is declared private, it cannot be
accessed by anyone outside the class, thereby hiding the fields within the class. For this reason, encapsulation is
also referred to as data hiding.
II. Theory Part
2.1 Object-Oriented Programming
Object-oriented programming (OOP) is at the core of Java. In fact, all Java programs are to at least
some extent object-oriented. OOP is so integral to Java that it is best to understand its basic principles before
you begin writing even simple Java programs.
There are Four OOP Principles
All object-oriented programming languages provide mechanisms that help you implement the object-
oriented model. They are abstraction, encapsulation, inheritance, and polymorphism.
We are talking about encapsulation and inheritance because these two things is related with Access
Control that is related with computer network and internet.
2.1.1 Encapsulation
Encapsulation is the mechanism that binds together code and the data it manipulates, and keeps both
safe from outside interference and misuse. One way to think about encapsulation is as a protective wrapper that
prevents the code and data from being arbitrarily accessed by other code defined outside the wrapper. Access to
the code and data inside the wrapper is tightly controlled through a well-defined interface. A class defines the
2. "Study Of Java Access Control Mechanism”
www.iosrjournals.org 60 | Page
structure and behavior (data and code) that will be shared by a set of objects. Each object of a given class
contains the structure and behavior defined by the class, as if it were stamped out by a mold in the shape of the
class. For this reason, objects are sometimes referred to as instances of a class. Thus, a class is a logical
construct; an object has physical reality. When you create a class, you will specify the code and data that
constitute that class. Collectively, these elements are called members of the class. Specifically, the data defined
by the class are referred to as member variables or instance variables. The code that operates on that data is
referred to as member methods or just methods. In properly written Java programs, the methods define how the
member variables can be used. This means that the behavior and interface of a class are defined by the methods
that operate on its instance data. Since the purpose of a class is to encapsulate complexity, there are mechanisms
for hiding the complexity of the implementation inside the class. Each method or variable in a class may be
marked private or public. The public interface of a class represents everything that external users of the class
need to know, or may know. The private methods and data can only be accessed by code that is a member of the
class. Therefore, any other code that is not a member of the class cannot access a private method or variable.
Since the private members of a class may only be accessed by other parts of your program through the class’
public methods, you can ensure that no improper actions take place. Of course, this means that the public
interface should be carefully designed not to expose too much of the inner workings of a class.[1]
2.1.2 Inheritance
Inheritance is the process by which one object acquires the properties of another object. This is
important because it supports the concept of hierarchical classification. As mentioned earlier, most knowledge is
made manageable by hierarchical (that is, top-down) classifications. For example, a Golden Retriever is part of
the classification dog, which in turn is part of the mammal class, which is under the larger class animal. Without
the use of hierarchies, each object would need to define all of its characteristics explicitly. However, by use of
inheritance, an object need only define those qualities that make it unique within its class. It can inherit its
general attributes from its parent. Thus, it is the inheritance mechanism that makes it possible for one object to
be a specific instance of a more general case.
Inheritance interacts with encapsulation as well. If a given class encapsulates some attributes, then any
subclass will have the same attributes plus any that it adds as part of its specialization. This is a key concept that
lets object-oriented programs grow in complexity linearly rather than geometrically. A new subclass inherits all
of the attributes of all of its ancestors. It does not have unpredictable interactions with the majority of the rest of
the code in the system.[2]
III. Practical Part
3.1 Access Control Mechanism With Encapsulation
Encapsulation links data with the code that manipulates it. However, encapsulation provides another
important attribute: access control. Through encapsulation, you can control what parts of a program can access
the members of a class. By controlling access, you can prevent misuse. For example, allowing access to data
only through a well defined set of methods, you can prevent the misuse of that data., you will be introduced to
the mechanism by which you can precisely control access to the various members of a class. How a member can
be accessed is determined by the access specifier that modifies its declaration. Java supplies a rich set of access
specifiers. Some aspects of access control are related mostly to inheritance or packages. (A package is,
essentially, a grouping of classes.). Here, let’s begin by examining access control as it applies to a single class.
Once you understand the fundamentals of access control, the rest will be easy.
Java’s access specifiers are public, private, and protected. Java also defines a default access level.
protected applies only when inheritance is involved. The other access specifiers are described next. Let’s begin
by defining public and private. When a member of a class is modified by the public specifier, then that member
can be accessed by any other code. When a member of a class is specified as private, then that member can only
be accessed by other members of its class. Now you can understand why main( ) has always been preceded by
the public specifier. It is called by code that is outside the program—that is, by the Java run-time system. When
no access specifier is used, then by default the member of a class is public within its own package, but cannot be
accessed outside of its package. In the classes developed so far, all members of a class have used the default
access mode, which is essentially public. However, this is not what you will typically want to be the case.
Usually, you will want to restrict access to the data members of a class—allowing access only through methods.
Also, there will be times when you will want to define methods that are private to a class.
An access specifier precedes the rest of a member’s type specification. That is, it must begin a member’s
declaration statement. Here is an example:
public int i;
private double j;
private int myMethod(int a, char b)
3. "Study Of Java Access Control Mechanism”
www.iosrjournals.org 61 | Page
{
/* This program demonstrates the difference between
public and private.
*/
class Test
{
int a; // default access
public int b; // public access
private int c; // private access
// methods to access c
void setc(int i)
{
// set c's value
c = i;
}
int getc()
{ // get c's value
return c;
}
}
class AccessTest
{
public static void main(String args[])
{
Test ob = new Test();
// These are OK, a and b may be accessed directly
ob.a = 10;
ob.b = 20;
// This is not OK and will cause an error
// ob.c = 100; // Error!
// You must access c through its methods
ob.setc(100); // OK
System.out.println("a, b, and c: " + ob.a + " " +
ob.b + " " + ob.getc());
}
}
As you can see, inside the Test class, a uses default access, which for this example is the same as
specifying public. b is explicitly specified as public. Member c is given private access. This means that it cannot
be accessed by code outside of its class. So, inside the AccessTest class, c cannot be used directly. It must be
accessed through its public methods: setc( ) and getc( ). If you were to remove the comment symbol from the
beginning of the following line,
// ob.c = 100; // Error!
then you would not be able to compile this program because of the access violation.[3]
3.2 Access Control Mechanism With Inheritance
Inheritance is one of the cornerstones of object-oriented programming because it allows the creation of
hierarchical classifications. Using inheritance, you can create a general class that defines traits common to a set
of related items. This class can then be inherited by other, more specific classes, each adding those things that
are unique to it. In the terminology of Java, a class that is inherited is called a superclass. The class that does the
inheriting is called a subclass. Therefore, a subclass is a specialized version of a superclass. It inherits all of the
instance variables and methods defined by the superclass and adds its own, unique elements.
Member Access and Inheritance
Although a subclass includes all of the members of its superclass, it cannot access those members of the
superclass that have been declared as private. For example, consider the following simple class hierarchy:
/*
In a class hierarchy, private members remain private to their class. This program contains an error and
will not compile.
4. "Study Of Java Access Control Mechanism”
www.iosrjournals.org 62 | Page
*/
// Create a superclass.
class A
{
int i; // public by default
private int j; // private to A
void setij(int x, int y)
{
i = x;
j = y;
}
}
// A's j is not accessible here.
class B extends A
{
int total;
void sum()
{
total = i + j; // ERROR, j is not accessible here
}
}
class Access
{
public static void main(String args[])
{
B subOb = new B();
subOb.setij(10, 12);
subOb.sum();
System.out.println("Total is " + subOb.total);
}
}
This program will not compile because the reference to j inside the sum( ) method of B causes an access
violation. Since j is declared as private, it is only accessible by other embers of its own class. Subclasses have
no access to it.
REMEMBER A class member that has been declared as private will remain private to its class. It is not
accessible by any code outside its class, including subclasses.
3.3 Access Control Mechanism With Packages
Packages are containers for classes that are used to keep the class name space compartmentalized. For example,
a package allows you to create a class named List, which you can store in your own package without concern
that it will collide with some other class named List stored elsewhere. Packages are stored in a hierarchical
manner and are explicitly imported into new class definitions.
Defining a Package
To create a package is quite easy: simply include a package command as the first statement in a Java
source file. Any classes declared within that file will belong to the specified package. The package statement
defines a name space in which classes are stored. If you omit the package statement, the class names are put into
the default package, which has no name. While the default package is fine for short, sample programs, it is
inadequate for real applications. Most of the time, you will define a package for your code. This is the general
form of the package statement:
package pkg;
Here, pkg is the name of the package. For example, the following statement creates a package called
MyPackage.
package MyPackage;
Java uses file system directories to store packages. For example, the .class files for any classes you declare to be
part of MyPackage must be stored in a directory called MyPackage. Remember that case is significant, and the
5. "Study Of Java Access Control Mechanism”
www.iosrjournals.org 63 | Page
directory name must match the package name exactly. More than one file can include the same package
statement. The package statement simply specifies to which package the classes defined in a file belong. It does
not exclude other classes in other files from being part of that same package. Most real-world packages are
spread across many files.
3.3.1 Access Protection
Packages add another dimension to access control. Java provides many levels of protection to allow
fine-grained control over the visibility of variables and methods within classes, subclasses, and packages.
Classes and packages are both means of encapsulating and containing the name space and scope of variables and
methods. Packages act as containers for classes and other subordinate packages. Classes act as containers for
data and code. The class is Java’s smallest unit of abstraction. Because of the interplay between classes and
packages, Java addresses four categories of visibility for class members:
• Subclasses in the same package
• Non-subclasses in the same package
• Subclasses in different packages
• Classes that are neither in the same package nor subclasses
The three access specifiers, private, public, and protected, provide a variety of ways to produce the
many levels of access required by these categories. While Java’s access control mechanism may seem
complicated, we can simplify it as follows. Anything declared public can be accessed from anywhere. Anything
declared private cannot be seen outside of its class. When a member does not have an explicit access
specification, it is visible to subclasses as well as to other classes in the same package. This is the default access.
If you want to allow an element to be seen outside your current package, but only to classes that subclass your
class directly, then declare that element protected.
An Access Example
The following example shows all combinations of the access control modifiers. This example has two
packages and five classes. Remember that the classes for the two different packages need to be stored in
directories named after their respective packages in this case, p1 and p2. The source for the first package defines
three classes: Protection, Derived, and Same Package. The first class defines four int variables in each of the
legal protection modes. The variable n is declared with the default protection, n_pri is private, n_pro is
protected, and n_pub is public.
Each subsequent class in this example will try to access the variables in an instance of this class. The
lines that will not compile due to access restrictions are commented out. Before each of these lines is a comment
listing the places from which this level of protection would allow access. The second class, Derived, is a
subclass of Protection in the same package, p1. This grants Derived access to every variable in Protection except
for n_pri, the private one. The third class, SamePackage, is not a subclass of Protection, but is in the same
package and also has access to all but n_pri. Private No Modifier Protected Public
This is file Protection.java:
package p1;
public class Protection
{
int n = 1;
private int n_pri = 2;
protected int n_pro = 3;
public int n_pub = 4;
public Protection()
{
System.out.println("base constructor");
System.out.println("n = " + n);
System.out.println("n_pri = " + n_pri);
System.out.println("n_pro = " + n_pro);
System.out.println("n_pub = " + n_pub);
}
}
This is file Derived.java:
package p1;
class Derived extends Protection
6. "Study Of Java Access Control Mechanism”
www.iosrjournals.org 64 | Page
{
Derived()
{
System.out.println("derived constructor");
System.out.println("n = " + n);
// class only
// System.out.println("n_pri = "4 + n_pri);
System.out.println("n_pro = " + n_pro);
System.out.println("n_pub = " + n_pub);
}
}
This is file SamePackage.java:
package p1;
class SamePackage
{
SamePackage()
{
Protection p = new Protection();
System.out.println("same package constructor");
System.out.println("n = " + p.n);
// class only
// System.out.println("n_pri = " + p.n_pri);
System.out.println("n_pro = " + p.n_pro);
System.out.println("n_pub = " + p.n_pub);
}
}
Following is the source code for the other package, p2. The two classes defined in p2 cover the other two
conditions that are affected by access control. The first class, Protection2, is a subclass of p1.Protection. This
grants access to all of p1.Protection’s variables except for n_pri (because it is private) and n, the variable
declared with the default protection. emember, the default only allows access from within the class or the
package, not extra-package subclasses. Finally, the class OtherPackage has access to only one variable, n_pub,
which was declared public.[4] [5]
This is file Protection2.java:
package p2;
class Protection2 extends p1.Protection
{
Protection2()
{
System.out.println("derived other package constructor");
// class or package only
// System.out.println("n = " + n);
// class only
// System.out.println("n_pri = " + n_pri);
System.out.println("n_pro = " + n_pro);
System.out.println("n_pub = " + n_pub);
}
}
This is file OtherPackage.java:
package p2;
class OtherPackage
{
OtherPackage()
{
p1.Protection p = new p1.Protection();
System.out.println("other package constructor");
// class or package only
7. "Study Of Java Access Control Mechanism”
www.iosrjournals.org 65 | Page
// System.out.println("n = " + p.n);
// class only
// System.out.println("n_pri = " + p.n_pri);
// class, subclass or package only
// System.out.println("n_pro = " + p.n_pro);
System.out.println("n_pub = " + p.n_pub);
}
}
If you wish to try these two packages, here are two test files you can use. The one for
package p1 is shown here:
// Demo package p1.
package p1;
// Instantiate the various classes in p1.
public class Demo
{
public static void main(String args[])
{
Protection ob1 = new Protection();
Derived ob2 = new Derived();
SamePackage ob3 = new SamePackage();
}
}
The test file for p2 is shown next:
// Demo package p2.
package p2;
// Instantiate the various classes in p2.
public class Demo
{
public static void main(String args[])
{
Protection2 ob1 = new Protection2();
OtherPackage ob2 = new OtherPackage();
}
}
IV. Conclusion
In Java Access Specifiers The access to classes, constructors, methods and fields are regulated using
access modifiers i.e. a class can control what information or data can be accessible by other classes. To take
advantage of encapsulation, you should minimize access whenever possible.
Java provides a number of access modifiers to help you set the level of access you want for classes as
well as the fields, methods and constructors in your classes. A member has package or default accessibility
when no accessibility modifier is specified.
Access Modifiers
1. private
2. protected
3. default
4. public
public access modifier
Fields, methods and constructors declared public (least restrictive) within a public class are visible to
any class in the Java program, whether these classes are in the same package or in another package.
private access modifier
The private (most restrictive) fields or methods cannot be used for classes and Interfaces. It also cannot
be used for fields and methods within an interface. Fields, methods or constructors declared private are strictly
controlled, which means they cannot be accesses by anywhere outside the enclosing class. A standard design
strategy is to make all fields private and provide public getter methods for them.
8. "Study Of Java Access Control Mechanism”
www.iosrjournals.org 66 | Page
protected access modifier
The protected fields or methods cannot be used for classes and Interfaces. It also cannot be used for
fields and methods within an interface. Fields, methods and constructors declared protected in a superclass can
be accessed only by subclasses in other packages. Classes in the same package can also access protected fields,
methods and constructors as well, even if they are not a subclass of the protected member’s class.
Default access modifier
Java provides a default specifier which is used when no access modifier is present. Any class, field,
method or constructor that has no declared access modifier is accessible only by classes in the same package.
The default modifier is not used for fields and methods within an interface.
Reference
[1] L. Gong and G. Ellison, Inside Java(TM) 2 Platform Security: Architecture, API Design, and Implementation. Pearson Education,
2003.
[2] L. Gong, M. Mueller, H. Prafullchandra, R. Schemers, and S. Microsystems, ―Going beyond the sandbox: An overview of the new
security architecture in the Java development kit 1.2,‖ Proceedings of the USENIX Symposium for Secure Systems, 1997.
[3] N. Hardy, ―The confused deputy,‖ SIGOPS Operating Systems Review, vol. 22, no. 4, pp. 36–38, 1988.
[4] I. Welch and R. Stroud, ―Supporting real world security models in Java,‖ in Distributed Computing Systems, 1999. Proceedings. 7th
IEEE Workshop on Future Trends of Distributed Computing Systems, 1999, pp. 155–159.
[5] J. Viega, J. Bloch, and P. Chandra, ―Applying Aspect-Oriented programming to security,‖ Cutter IT Journal, vol. 14, no. 2, pp. 31–
39, Feb. 2001.