Volume 10, Issue 5, May 2018

 

 

Comparative Study of Energy Balance of a Single-Phase Power Supply for Magnetron
 

Comparative Study of Energy Balance of a Single-Phase Power Supply for Magnetron

Pages: 66-70 (5) | [Full Text] PDF (860 KB)
B Abderrahim, N Elghazal, C Mohammed
Ibnou Zohr University , Higher school of technology, Department of Electrical and Computer Engineering, Agadir City, State 80000, Morocco

Abstract -
The objective of this work focuses on the comparative study of energy balance of conventional single-phase power supply for magnetron using different methods. The energy balance study already performed on the classical single phase power supply currently used by most industrial ovens was not experimentally validated. In this article the detailed study of different powers (primary power of the transformer, output power of the transformer and input power of the magnetron) was performed, each of these powers were compared with their corresponding powers obtained experimentally.
 
Index Terms - Magnetron, Energy Balance, Modeling, Matlab-Simulink

Citation - B Abderrahim, N Elghazal, C Mohammed. "Comparative Study of Energy Balance of a Single-Phase Power Supply for Magnetron ." International Journal of Computer Engineering and Information Technology 10, no. 5 (2018): 66-70.

Information Technology Roles in Crisis Management: A Case Study in Kurdistan Region Government
 

Information Technology Roles in Crisis Management: A Case Study in Kurdistan Region Government

Pages: 71-78 (6) | [Full Text] PDF (274 KB)
MI Ghareb
Computer Science Department, University of Human Development, Sulaymaniyah, Iraq

Abstract -
Information technology has turned into an essential piece of the business world. IT is associated with correspondence and business forms crosswise over offices making the utilizations dependant on the technology to play out their work. In this research the creator concentrating on how organizations set themselves up for the crisis that can influence information technology inside the organizations, and what sorts of crisis they are agonizing over. To answer these inquiries a hypothetical structure is defined by assessing a gathering of crisis management literature. The hypothesis is later contrasted with observational discoveries with uncovering contrasts and likenesses. The discoveries in this research demonstrate that the contrasts amongst hypothetical and experimental work are restricted, and the similitude are many. Both clarifies that social event specialists and leaders in an emergency administration group that can bring up conceivable basic situations and build activity designs, is a key piece of emergency arrangement. Alternative methods for correspondence must be readied, and client preparing help the general population included feel safe and realize what to do when a basic circumstance happens. All designs and duties must be investigated every now and again with the goal that they generally are up-todate, old designs are of little help. Emergency planning must be roused. It requires investment furthermore, is expensive. As a result of Islamic State of Iraq and the Levant offensives and the Anbar crisis, more than 1.8 million Iraqi people have been newly displaced since January 2014 and effect the Kurdistan region government in all aspect of management health, humanitarian, education system and economical.
 
Index Terms - Crisis Management, Information Technology, Social Networking, Risk Assessment

Citation - MI Ghareb. "Information Technology Roles in Crisis Management: A Case Study in Kurdistan Region Government." International Journal of Computer Engineering and Information Technology 10, no. 5 (2018): 71-78.

Polymorphic Malware Analysis and Detection Techniques: State of the Art Analysis
 

Polymorphic Malware Analysis and Detection Techniques: State of the Art Analysis

Pages: 78-84 (7) | [Full Text] PDF (410 KB)
E Masabo1, KS Kaawaase, J Sansa-Otim, J Ngubiri
Makerere university, Uganda & University of Rwanda, Makerere university, Uganda

Abstract -
Malware are capable of destroying the system on which they have access. They achieve their objectives by working behind the scene without the knowledge of the system owner. Such malware are sophisticatedly created with advanced techniques that make hard to detect, thus straining both industry and academia. Polymorphism is one of the sophisticated techniques by which malware change their identity on each time they attack. This research aims to explore available literature, and outline research efforts that have been made in relation to polymorphic malware analysis and detection..
 
Index Terms - Malware, Polymorphic Malware, Static Analysis, Dynamic Analysis, Machine Learning

Citation - E Masabo1, KS Kaawaase, J Sansa-Otim, J Ngubiri. "Polymorphic Malware Analysis and Detection Techniques: State of the Art Analysis." International Journal of Computer Engineering and Information Technology 10, no. 5 (2018): 78-84.