A Comparison of Requirement Prioritization Methodologies
Software Engineering upholds the productivity of quality software products that meets the customer requirements. Requirements engineering ensures the customer satisfaction through the selection of requirements through elicitation processes. Requirement elicitation promotes prioritizing a set of requirements that enables the stakeholders for conformance to the requirements to be built. Requirement prioritization process solves critical decision making problems towards the selection of requirements among group of inappropriate requirements. The main objective of the comparison of the prioritization techniques concludes the differences between them in terms of cost and time. This paper compares and elaborates the prioritization technique that provides a deep study of their constraints, objectives and selection basis of the requirements.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analysis of the automation telecommunication and how works it
The distribution automation system, should be the relationship between the different parts, this connection is performed by the telecommunication system. This study is based on a descriptive analysis and use of available resources to analyze automation telecommunication , and how it acted. Results indicated that collected information, tools and measuring equipment, as well as status indicators, this data includes voltage lines, switch status and key, and the temperature of the transformer and is, by means of relays digital, CT, PT, PI, or error detection, etc., collected, and for the electrical signal, is ready. The instrument is needed, to the various data collected, and ready to send. The device should be able to, such as terminal information act, and electrical signals different, the voltages and current levels vary in a range acceptable, and to send ready, and at the same time be able to signal receive operation also , to apply to the equipment, to reach the desired voltage level. The device, remote terminal units, or the so-called RTU, called. Telecommunication system, should be able to kind of adjustment between the data created. The data on the one hand, the path between the terminal and the control center to travel. Information, telecommunication system, some changes are to transfer from the environment to be prepared. These changes are known to act modulation. After sending the photo changes based on the signal, the signal becomes understandable message back into shape.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Impact of distributed generation in the grid network of the Nigerian south-south region
The impact of distributed generation in the grid network of the Nigerian South-South Region is studied in this paper. DG capacity installation in the network was modelled using NEPLAN software. Reduction of network and transmission line losses as well as minimisation of transmission line congestion and voltage profile improvement for the nodes of the network were observed in the results.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Novel Thermal Image Encryption using Histogram Diffusion and Chaos Map
In a recent years, security for the thermal images are more necessary due to fast growing information technology. Here proposed an thermal image encryption based on histogram diffusion and permutation using chaotic map. As we know that histogram of thermal image distributed towards right (towards white pixel) and towards left (towards black). First step of proposed algorithm shift the histogram by mixing a random number. After that resultant image undergo permutation process with the help of chaotic map followed block wise histogram diffusing. In next level, apply the bit plane permutation. At last XOR operation with random image to get thermal encrypted image. The simulation results shows that proposed algorithm achieves high security.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A three phase function generator
A variable frequency and variable phase function generator with three outputs of (1) reference fO (2) lead phase fO + Æ1 and (3) lag phase fO - Æ2, is described in this paper. The leading phase difference Æ1 is continuously adjustable over 0 to 180o by an input control voltage VC1 and the lagging phase difference Æ2 is also continuously adjustable over 0 to -180o by an another input control voltage VC2, independent of frequency of operation of the function generator which can be set by a third control input dc voltage –VI
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design and Analysis of PV Array with Multilevel Inverter
In this work, a novel power conversion structure for grid-connected photovoltaic applications is presented. This structure is based on a Diode clamped multilevel inverter. The configuration of the PV system is based on the multi-string technology and the maximum power point is obtained using PSO Algorithm. The output of the MPPT tracker controls the duty cycle of the boost converter. To control this power converter, SVPWM based modulation technique is implemented. The proposed system operation was simulated using the MATLAB/Simulink power system toolbox and are furnished to verify the efficiency of this method.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
DTMF signal sensing and reconstruction using L1-minimization
L1-minimization solves the minimum L1-norm solution to an underdetermined linear system. It has recently received much attention, mainly motivated by the new compressive sensing theory that shows that under certain conditions an L1-minimization solution is also the sparsest solution to that system. In this paper an L1 minimization algorithm is proposed for solution of Dual Tone Multiple Frequ-ency (DTMF) reconstruction problems. In the method of Compressive sensing, a raw signal or image can be regarded as a vector which can be represented as a linear combination of certain basis functions. The discrete cosine transform (DCT) has been used as the basis function in the proposed algorithm. This algorithm considers only 500 samples and reconstructs the original signals exactly without any distortion. The compressed DTMF signal is estimated using DTMF decoder with the help of Goertzel algorithm, the popularity of which lies in the small number of points at which the DFT is estimated. We compare with the existing algorithms such as FFT and Goertzel algorithms. The results show the effectiveness of the proposed algorithm.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Hybrid Multilevel Inverter Configuration for Even and Odd Output Levels
This paper presents comparative study and simulation results for different Hybrid Multilevel Inverter configurations. This paper covers hybrid multilevel inverters such as cascaded multilevel inverter with high voltage low-frequency pulse width-modulation (PWM) and low voltage high frequency pulse width-modulation (PWM) and series connected half-bridge modules hybrid multilevel inverters. Here the operating principle of each topology is discussed with a review of the relevant modulation method focusing mainly on total harmonic distortion (THD). Such multilevel inverters achieve higher power quality with a given switch count when compared to traditional multilevel inverters. The purpose of the circuits presented here is to minimize the reverse voltage stress that affects the power switches and decrease the harmonic distortion of the voltage applied to the load.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Image Encryption using Four-Dimensional Hyper Chaotic Lorenz System
The paper proposed the application of a new four-dimensional hyper chaotic map based on the Lorenz chaotic system to realize chaotic encryption for improved security. Hyper chaotic systems are more complex and difficult to predict. An image encryption algorithm is designed by utilizing the basic operations like permutation, confusion and diffusion. The combination of the user defined 256 bits secret key and the plain image are used as initial conditions for the 4D hyper-chaotic system to generate the key matrix. Several test images are used for inspecting the validity of the proposed work. The security analyses and computer simulations on the basis of key space analysis, statistical analysis, histogram analysis, information entropy analysis, correlation analysis and differential analysis is done. The NPCR and UACI values of encrypted images are also calculated. The result shows that a single bit change in the pixel value of the input plain images will cause a significant changed in the ciphered images. Total key space for the proposed method is 2256, which is good enough to protect the encrypted image against brute-force attack.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
IoT Based Farmland Powered Using Solar Energy
In the present scenario, availability of power and water are insufficient to satisfy the farmer’s requirements. Traditionally implemented Techniques of irrigation are proving to be less futile as these are not good at multitasking different concerns which are combinations of availability of water, source of energy and timely soil profile analysis. With the merger of automation and the methods of irrigation used earlier. The scope to mitigate issues concerning water and power crisis, is huge. In this paper Internet of Things based solar powered smart irrigation system with monitoring and control features, is designed and implemented. The sensor enabled proposed model of smart irrigation system along with its Android application and ESP8266 as its main controllers. The farmland parameters can be monitored anywhere around the world with the help of IoT technology. The whole concept of this paper is implemented and then only the results are presented.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]