IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of ComputationalEngineeringResearch

(IJCER)

Volume 3, Issue 11, November, 2013

 
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

Appm: A Narrative Data Embedding Method Using Adaptive Pixel Pair Matching

P.Ramesh Babu, Y.Chitti Babu, Dr.P.Harini

Abstract

Here We Proposed A New Data-Hiding Method Based On Pixel Pair Matching (PPM). In This Paper The Basic Idea Of PPM Is To Use The Values Of Pixel Pair As A Reference Coordinate, And Coordinate Search In The Neighborhood Used To Set Of This Pixel Pair According To A Given Message Digit. The Pixel Pair Is Then Replaced By The Searched Coordinate To Conceal The Digit.(EMD)Exploitedmodificationdirection(EMD) And Diamond Encoding (DE) Are Two Data-Hiding Methods Proposed Recently Based On PPM. Then The Maximum Capacity Of EMD Is 1.161 Bpp And DE Extends The Payload Of EMD By Embedding Digits In A Larger Notational System.This Is The Proposed Method Offers Lower Distortion Than DE By Having High Compact Neighborhood Sets And It Will Also Accepting Embedded Digits In Any Representative System. Then It Will Be Compared With The (OPAP)Optimal Pixel Adjustment Process Method, Then This Method Always Has Lower Distortion For Various Payloads. Experimental Results Reveal That The Proposed Method Does Not Only Provides Performance Better Than Those Of OPAP And DE, But Also Is Secure Under The Detection Of Some Well-Known Steganalysis Techniques

Keywords:(ADPPM)Adaptive Pixel Pair Matching,(DE) Diamond Encoding , Exploiting Modification Direction (EMD), Least Significant Bit (LSB), Optimal Pixel Adjustment Process (OPAP), Pixel Pair Matching (PPM).
01-06  
03.3005/0311010106
PDF
2.

SPURGEAR

T.Shoba Rani, T.Dada Khalandar

Abstract

The creep nature of metallic spur gear results in the deficiency because of the deformation of teeth when pressure angle of 20 acting on it. At the replacing points of tooth between driving and driven the disturbances such as in-evitable random noise, elastic deformation and manufacturing error, alignment error in assembly all these together causes the high level of gear vibration and noise and leads to loss in efficiency. The main motto is to reduce the deformation of teeth, by replacing the metallic cast iron gear with Nylon gear and proved that the deformation of Nylon gear is less compared to metallic and polycarbonate. Since the deformation is less the loss in efficiency is also less compared to metallic gear.

Keywords:Gear, Spur gear, nylon spur gear.
07-12  
03.3005/03110107012
 
PDF
3.

Stress Analysis of Splice Joint of the Aircraft Bottom Wing Skin by Finite Element Method

A.Rukesh Reddy, P. Ramesh, B. Siddeswara rao

Abstract

This paper investigates the maximum stress concentrated part of the splice joint of an aircraft bottom wing skin due to tensile loading. Wings are the aerofoils attached to each side of the fuselage to produce lift force. Joints are inevitable in any large structure like an aircraft wing. Splicing is normally used to retain a clean aerodynamic surface of the skin for most of the aircraft structure. This analysis considers the wing box with a bottom skin splice joint. The wing box comprises of two spar beams, three ribs, stiffeners covered with skin plate. In this paper the chord-wise splicing of wing skin is considered for a detailed analysis. The splicing is multi row riveted joint under the action of tensile in plane load due to wing bending. The stress analysis of the joint is carried out to compute the stresses at rivet holes due to By-pass load, bearing load and secondary bending. The splice is optimized to minimize the rivet hole local stress. A finite element analysis is carried out to evaluate the stresses. Analyses were performed by MSC PATRAN and NASTRAN software.

Keywords:stress analysis, splice joint, wing skin and rivet holes.

13-17  
03.3005/031101013017
PDF
4.

Identification Of Eligible Customer Requirements

Pavel MIKUŠ

Abstract

The paper deals with the changes which must be made by the company for customer satisfaction. The mission of the company is meeting customer requirements, which can be understood as the perception and understanding of his expectations. Making changes is based on a thorough analysis of options of organization and customer requirements. There are many methods by which it is possible to identify the eligible customer's requirements to improve the quality of service or product. The paper deals with a relatively new and simple method BDI - band diagram of interest (band diagram of interest) that is used for the comparison of customer satisfaction, perceptions of the importance of a particular factor as well as perception of the importance of individual perception and the possibility of his influence.

Keywords: customer satisfaction, build loyalty, band diagram, analysis of customer requirements
18-22  
03.3005/031101018022
PDF
5.

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

D.Dhivya, S.Chinnadurai

Abstract

Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this paper, a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. In particular, an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. Leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users' data will trigger authentication and automated logging local to the JARs. To strengthen user's control, provide distributed auditing mechanisms. Extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.

Keywords:Cloud computing, accountability, data sharing
23-27  
03.3005/031101023027
PDF
6.

Mobile Phone Based Multi-Devices Secured Control System

Elsanosy Mohamed Elamin , AbdirasoulJabar Alzubaidi

Abstract

In this paper, the integration or merge of technologies is presented to aid in reducing men-hands within the system as a total cost reduction especially in the industrial sectors as well as developing systems to comply with a running requirements instead of reengineering. The controlling system is regarded as a flexible tool to develop a way of traditional controlling technique. The structure of system is divided into three different functional parts which are: cellular mobile network, PC, and interface circuits to show, clarify, and make ease of the controlling signal transition from the user to the controlled devices. In addition, for well-designed process, interface circuits are utilized to enhance and boost the controlling signal. PC is the heart of the controlling process due to the reside program that decode and manipulate the incoming controlling signal from user to assist in making appropriate decision. The integration of technologies include both cellular mobile network and PC. Utilization of this integration or merge cause to accelerate decision making, and reduce men hand within the system as a total cost minimization

Keywords:Controlling Signal, mobile network, DTMF, interface circuit, controlled devices
28-32  
03.3005/031101028032
PDF
7.

Determination Gamma Width and Transition Strength Of Gamma Rays from 48Ti(nth, 2 gamma)49Ti Reaction

Nguyen An Son, Pham Dinh Khang, Nguyen Duc Hoa, Nguyen Xuan Hai,Dang Lanh

Abstract

The experiment was setup on the 3rd horizontal channel of Dalat nuclear reactor. The sample was activated by thermal neutron which is about 106 neutron/cm2/s. The gamma-gamma system is used to collect experimental data. The Summation of Amplitude Coincidence Pulses method (SACP) treats the experiment data. In this paper, the gamma cascades based on 48Ti(nth, 2 gamma)49Ti reaction. Event – event coincidence method got relative intensity, gamma ray energy directly, and the gamma cascades collected directly as well. Since then, the transition probabilities and some intermediate quantum characteristics are splitted and determined. The single particle model is applied to treat the results. The advantage of this method is that it allows determining a pair of the transitions and the intermediate levels directly. The branching ratios of such gamma transitions are used to calculate the partial gamma width, the total gamma width, lifetime of level. Besides, the transition strengths have been calculated for gamma transitions

Keywords:Gamma cascade; Gamma width; Transition strength; Lifetime; Level; Spin and parity
 
33-37  
03.3005/03110133037
PDF
8.

Offline Signature Recognition Using Maximally Stable Extremely Regions (Mser)

Mohammad B. Abdulkareem , Santosh Gaikwad , Bharti Gawali

Abstract

This paper describes an approach for signature is an offline environment based on Maximally Stable Extremely Regions (MSER) features. MSER features are the parts of the image where local binarization is stable over a large range of thresholds. We discuss a system designed using geometric and MSER based feature which provides efficient recognition for offline signature

Keywords:Signatures, Centroid, FAR, FRR, MSER, TAR, TRR.
38-44  
03.3005/031101038044
PDF
9.

The Effect Of Water Solubles On The Hygroscopicity Of Urban Aerosols

B. I. Tijjani

Abstract

In this paper, the author extracted some microphysical and optical properties of urban aerosols from OPAC by varying the concentrations of water soluble at the spectral range of 0.25μm to 2.5μm and eight relative humidities (RHs) (0, 50, 70, 80, 90, 95, 98, and 99%).The microphysical properties extracted were diameters, volume mix ratio, number mix ratio, mass mix ratio and refractive indices while the optical properties are optical depth and asymmetric parameters all as a function of RHs. Using the microphysical properties, hygroscopic growth factors of the mixtures and their effective refractive indices were determined while using optical depth we determined its relation with RHs, the enhancement parameters and Angstrom parameters. The hygroscopic growths and enhancement parameters were then parameterized using some models to determine their relationship with RHs. The data fitted the models very well. The angstrom coefficients show that the mixtures havebi-modal type of distribution with the dominance of fine mode particles and the mode sizes increase with the increase in water soluble concentrations and RH.The relation of optical depth with RH shows improvement with the increase in water soluble but decreases with the increase in wavelengths.The asymmetric parameters show that hygroscopic growth enhances forward scattering at smaller wavelengths

Keywords:microphysical properties, optical properties, hygroscopic growth, enhancement parameters, Angstrom coefficients, spectral range, water soluble.
45-60  
03.3005/031101045060
PDF
10.

Efficient Solution of Constraint Satisfaction Problems by Equivalent Transformation

Hiroshi Mabuchi

Abstract

In many conventional programming languages, programs are constructed from built-in data structures and built-in constraints. Due to the limitation of the expressive power, the computation may become very inefficient when they are used to solve large and complicated problems. In order to overcome the difficulty, we adopt a computing framework of "problem solving based on equivalent transformation (ET)." In this framework, a problem can be solved by simplifying declarative descriptions of the problem on the equivalent transformation basis, and the correctness of computation can be guaranteed. Furthermore, users can easily introduce new various data structures and constraint-solving rules necessary for the improving of the constraint-solving algorithms. In this paper, we show that "problem solving based on equivalent transformation" is useful to avoid the combinatorial explosion when solving large constraint satisfaction problems

Keywords:Combinatorial explosion, Constraint satisfaction problem, Equivalent transformation, Transformation rule
 
61-70  
03.3005/031101061070
PDF
11.

Experimental Analysis & Designing of abrication Method Of Shear Fatigue Strength Of Glass Fiber Epoxy And Chapstan E-Glass Epoxy Laminates

Pns Srinivas, Movva Mounika, M.Rajya Lakshmi

Abstract

The present project work mainly is focusing on development of manufacturing process and establishing critical test procedures for the polymer reinforced composite materials to be used in automobile & power plant equipments. This experiment played an important role in estimation of stiffness of the laminate which in turn helps for the testing to evaluate the stiffness of the laminate for further mathematical analysis. The evaluating elastic properties and the flexural stiffness of the composite beam by theoretical calculation is compared with experimental value analysis and from which the relations of mechanical properties are derived. This reduction in stiffness can further be improved by advanced manufacturing process such as compressor moulding, macro sphere moulding & auto clave moulding and the results obtained from the analytical testing are used to calibrate the load transducers. The load transducer shows a linear response to the load from this is clearly evident that the testing could be able to generate the useful data for evaluating the fatigue failure behavior of the composites. The data acquisition system from standard manufacturer of model TSI-608 which exactly meets requirements. A continuous plot of time verses load could be obtained We can say that the required data can be generated as per expectations, which could be utilized to establish the fatigue failure behavior any kind of composite laminate

Keywords:glass epoxy composites, fatigue test rig, transducer, pressure plate, CATIA
 
71-83  
03.3005/031101071083
PDF
Version II
S.No. Article Title Page No. Paper Index PDF
1.

An Evaluation of Software Development Methodology Adoption by Software Developer in Sri Lanka

C.D. Manawadu, Md Gapar Md Johar, S.S.N. Perera

Abstract

Software development methodology usage and the adoption by software developers is an area which is crucial to understand. Currently available research in this area is limited and finding the evolution of software development methodology in the Sri Lankan context is vital for this booming industry. In this research the main objective is to find out how the evolution of software development methodology took place in history in Sri Lanka and what are the current methodologies adopted by the software developer in Sri Lanka. The research will be carried out by both qualitative and quantitative methods with the facilitation of the software development companies and software developers in Sri Lanka. The outcome of this research will be a stepping stone for future research on this area and the impact for future software development practitioners while adopting software development methodologies

Keywords:Adoption, Methodologies, Software Developer, Software Development, , Sri Lanka,
 
01-11  
03.3005/03110201011
PDF
2.

Harmonic Filter Design for Hvdc Lines Using Matlab

P.Kumar , P.Prakash 

Abstract

This paper presents harmonic filter design for HVDC lines using MATLAB version R2009a.Non-linear devices such as power electronics converters can inject harmonics alternating currents (AC) in the electrical power system. The number of sensitive loads that require ideal sinusoidal supply voltage for their proper operation has been increasing. To maintain the quality limits proposed by standards to protect the sensitive loads, it is necessary to include some form of the filtering device to the power system. Harmonics also increases overall reactive power demanded equivalent load. This paper deals with the design of three phase filter banks connected in parallel to achieve optimal control for harmonic elevation problems

Keywords:harmonic filter, sensitive loads, reactive power, three phase filter banks, optimal control, harmonic elevation problems.
12-19  
03.3005/031102012019
PDF
3.

Adsorption Capacity Of Nicotine From Tobacco Products By Different Adsorbents

Zamzam Basher , A.K.Gupta ,Amit Chattre

Abstract

This study determined the adsorption capacity of nicotine content of tobacco in four cigarettes brands . The method was used to estimate the nicotine in tobacco products by an Ultraviolet-Visible Spectrophotometer. The results for nicotine content that was adsorbed highest in coconut fibre and saw dust , followed by tea waste

Keywords:UV-Vis Spectrophotometer, tobacco, nicotine, adsorption.
 
20-22  
03.3005/031102020022
PDF
4.

An Automated Image Segmentation Scheme for Iris Recognition

Dr. G. Saravana Kumar, J. Munikrishnan, Manimaraboopathy

Abstract

The paper proposes an automated segmentation system, which localize the iris region from an eye image and also isolate the eyelid, eyelash as well as the reflection regions. This Automatic segmentation was achieved through the utilization of the circular Hough transform in order to localize the iris as well as the pupil regions, and the linear Hough transform has been used for localizing the eyelid occlusion. Thresholding has been employed for isolating the eyelashes as well as the reflections. Now, the segmented iris region has got normalized in order to eliminate the dimensional inconsistencies between the iris regions. This was achieved by applying a version of Daugman's rubber sheet model, in which the iris is modeled as a flexible rubber sheet, which is unpacked into a rectangular block with constant polar dimensions. Ultimately, the iris features were encoded by convolving the normalized iris region with the 1D Log-Gabor filters and phase quantizing the output to produce a bit-wise biometric template. For metric matching, the Hamming distance has been chosen, which provides a measure of number of disagreed bits between two templates

Keywords:Image segmentation, Image localization,Circular Hough transform, Thresholding, Log-Gabor filter, Hamming distance
23-30  
03.3005/031102023030
PDF
5.

DWDM Link with Multiple Backward Pumped Raman Amplification

Awab Fakih, Santosh Jagtap, Shraddha Panbude

Abstract

Faced with the challenge of dramatically increasing capacity while constraining costs, carriers have two options either to install new fiber or increase the effective bandwidth of existing fiber. The technology of dense wavelength-division multiplexing (DWDM) has recently resulted in a considerable increase in the transmission capacity of fiber-optic communication systems up to several terabits per second. The further improvement of the transmission capacity of such systems can be achieved through the expansion of the spectral range of WDM transmission toward the short-wavelength region. Therefore in this report we have proposed and investigated the new trends and progress of fiber Raman amplification for dense wavelength division multiplexing photonic communication networks. Forty individual channels carrying PRBS data are transmitted over a 50 km length of ITU-T G.652 single mode dispersive fiber. The design objective is to utilize distributed Raman amplification to compensate for the link attenuation thereby effectively increasing the inter-EDFA span in a longer-haul link.

Keywords:PRBS, Digital Crossconnect System (DCS), phonons, Dense wavelength division multiplexing (DWDM), stimulated raman scattering (SRS), raman amplification, pump evolution, EDFA.
31-40  
03.3005/031102031040
PDF
6.

Fingerprint Recognition Using Genetic Algorithm and Neural Network

Purneet Kaur , Jaspreet Kaur 

Abstract

Fingerprints are the most used biometric feature for the person identification. During research it has been observed that there are number of approaches has been implemented for recognition of fingerprints. Different algorithms and techniques have been used for enhancement purpose, minutiae extraction and for matching. In this thesis work a novel technique to enhance our results by using the combination of genetic algorithm and neural network. As we know that both techniques are the world's best techniques. Genetic algorithm is used for the extraction of minutiae and neural network is used for the recognition of a fingerprint. Firstly, fingerprint image has been enhanced using histogram equalization process so that our algorithm also capable of predicting good results even for dull or low intensity images too. Then Morphological Image Processing operations using MATLAB 2011b has applied for thinning the lines up to the predefined extent so that it will not further destroy or harm our structure of the image. After that we proceed towards predicting of discontinuities using Genetic Algorithm approach based upon nth last segment. Here genetic algorithm is used to find the best possibility for each discontinues segment in an image. Lastly Enhanced image has fed to NN (neural networks) based trained system to diagnose and match finger print with data set. Several features will be used to train the network so that precision will be made in recognition of finger print.

Keywords:Biometrics, fingerprints, minutiae enhancement, ridge endings, feature extraction, genetic algorithm, neural network.
41-46  
03.3005/031102041046
PDF
7.

Content Based Medical Image Retrieval – Performance Comparison of Various Methods

Harishchandra Hebbar, Niranjan U C, Sumanth Mushigeri 

Abstract

Present healthcare system calls for standardization and interoperability of images acquired by various equipment manufacturers. The healthcare system is also not limited to a single super-specialty hospital where state of the art machines and excellent physicians are available but should also these services need to be available in remote places too. Nowadays, number of images acquired by the hospitals is increasing due to the various modalities available to identify accurately the cause of the deceases. This results in more number of medical images being stored in the database in hospitals. The interpretation of these medical images becomes even more critical, as it may contain the information which cannot be perceived by human eye. Therefore the images need to be annotated appropriately while it is stored so that, retrieval of the images of interest can be done quickly. The manual annotation is very cumbersome process when large number of images is involved in the retrieval process. Hence it is necessary to have an efficient Content Based Image Retrieval System which is user friendly and user definable in terms of speed and Precision

Keywords:CBIR, Histogram, Retrieval time, Precision, Recall, CDF, GLCM, DICOM, RSNA
47-57  
03.3005/031102047057
PDF
Version III
S.No. Article Title Page No. Paper Index PDF
1.

Direct Methodfor Finding an Optimal Solution for Fuzzy
Transportation Problem

A.Srinivasan , G. Geetharamani 

Abstract

In this paper we shall study fuzzy transportation problem, and we introduce an approach for solving a wide range of such problem by using a method which apply it for ranking of the fuzzy numbers. Some of the quantities in a fuzzy transportation problem may be fuzzy or crisp quantities. In many fuzzy decision problems, the quantities are represented in terms of fuzzy numbers may be triangular or trapezoidal. Thus, some fuzzy numbers are not directly comparable. First, we transform the fuzzy quantities as the cost, coefficients, supply and demands, in to crisp quantities by using Robust's ranking method [1] and then by using the classical algorithms we solve and obtain the solution of the problem. The new method is a systematic procedure, easy to apply and can be utilized for all types of transportation problem whether maximize or minimize objective function. At the end, this method is illustrated with a numerical example

Keywords:Fuzzy ranking, fuzzy sets (normal and convex), Membership Functions, Trapezoidal fuzzy number, Triangular fuzzy number, Optimal Solution, Transportation problem.
01-07  
03.3005/031103001007
PDF
2.

Polynomials having no Zero in a Given Region

 M. H. Gulzar

Abstract

In this paper we consider some polynomials having no zeros in a given region. Our results when combined with some known results give ring –shaped regions containing a specific number of zeros of the polynomial. Mathematics Subject Classification: 30C10, 30C15

Keywords:Coefficient, Polynomial, Zero
08-12  
03.3005/031103008012
PDF
3.

Simple Domestic Air Conditioning by using the Ice Thermal Storage Capacity

Mohammed Hadi Ali

Abstract

In this paper, a special design of an experimental rig was used to study and evaluate the performance of using the ice thermal storage capacity for cooling purpose. Nowadays ice thermal storage system is mostly used because it is practical due to the large heat of fusion of ice to change into water. Thermal storage techniques have provided opportunities to store cooling energy in ice when the power price is relatively low. The experimental rig that was built is a simple domestic air conditioning prototype that can be used to cool small spaces with ice bank which are prepared for this purpose. Encouraging results were obtained in this paper where two different air flowrate was used to compare between them; it was found that the performance of using the ice storage capacity is effective in which the coefficient of performance (COP) is relatively high compared to a conventional air conditioning. The results showed that the COP for higher air flowrate is lower than the COP for lower air flowrate due to lower power consumed by the system. And the outlet temperature for the higher air flowrate is higher than the outlet temperature for the lower air flowrate due to the more time of contact between the air and the ice banks. As a conclusion we found that the ice storage capacity process is an effective process of using a chiller or refrigeration plant to build ice during off-peak hours to serve part or the entire on-peak cooling requirement

13-20  
03.3005/031103013020
PDF
4.

Design of A network Data Security Circuit

Nuha Abdelmageed Tawfig Khalil, Abdelrasoul Jabar Alzubaidi

Abstract

To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements, including authentication, confidentiality, integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and BASCOM language (TC++ program language ) to generate non-standard algorithm ( logic algorithm ) for encrypted and decryption. The algorithm depends on ciphering the plaintext n times with n keys

Keywords:Basic stamp2, ciphertext, Decrypted, Encryption, Network data security, plaintext, and X-Bee.
21-24  
03.3005/031103021024
PDF
5.

Key pad Based Online Examination System

 S.G.Pardeshi, K.S.Jadhav

Abstract

Area of compact handheld devices using embedded system is attracting embedded designers nowadays. This paper present such one handheld embedded device which can be used for online examination system. This device is designed using microcontroller, keypad, LCD & RF transmitter and receiver. In present systems to conduct online examination system one desktop PC per candidate have to be used. This embedded device can be used to conduct online examination with only one desktop PC. Also the main objective of this On-line Examination System is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast & accurate results without using number of computers.

Keywords:Microcontroller, RF communication, Keypad
25-29  
03.3005/031103025029
PDF
6.

Connectedness of e-Service Quality, e-Satisfaction and e-Loyalty. A Configuration Analysis with QDA Software

 Nanis Susanti, Surachman, Djumilah Hadiwidjojo, Fatchur Rohman

Abstract

Marketing strategy of e-business should be adjusted to ensure that the customer is ready to make transaction online. This adjustment is primarily intended to foster customer trust related to privacy and economic risk. E-Trust in B2C e-commerce is more difficult to realize than an offline business. Gaps in e-Trust still exist, how the service without face to face interaction can logically satisfy. The perceptions of e-Service Quality can grow through technology readiness as well as technology acceptance, but e-Trust is more decisive in shaping of the service quality perception. This study aims to discover the customer's perspective on e-Service Quality and to analyze its relations with e-Satisfaction and e-Loyalty. Text corpus of satisfied customer review from the online store is used as the unit of hermeneutics analysis to reveal meaningful reviews. Purposive text sampling with detail in content and context is used to obtain a complete answer to the research question. MAXQDA11 software is used for the configuration analysis process on the connectivity among themes. The perspectives of e-Service Quality are discovered through Fun Shopping theme which is determined by: shopping experience, ease shopping, shopping problem handling and functional satisfaction. Customers' satisfaction perspective is the emotional e-Satisfaction through the emotional satisfaction in online shopping and the delight from family values. The fellow care and special attention are the value delivered by the company. Perspectives on e-Loyalty drawn from Loyal to Each Other: customer loyalty commitment, customer loyalty proof, and customer service staff dedication to serve. The perspectives of e-Loyalty is determined by the e-Trust which is reflected from the themes of mutual trust (Trust Each Other). That is customer recognition to customer service team performance and recognition of the company's reputation offset with the company's trust to the customer.

Keywords:Configuration Analysis, Customer Revie, e-Satisfaction, e-Service Quality, e-Loyalty, e-Trust, Word of Mouse
30-38  
03.3005/031103030038
PDF
7.

Estimation of Stress- Strength Reliability model using finite mixture of exponential distributions

K.Sandhya, T.S.Umamaheswari

Abstract

In this paper considered a situation where stress and strength follow finite mixture of exponential distributions to find the reliability of a system. It has been studied when stress follow exponential distribution and strength follow finite mixture of exponential distributions and both stress-strength follow the finite mixture of exponential distributions. The general expression for the reliability of a system is obtained. The reliability is computed numerically for different values of the stress and strength parameters. We estimate the parameters of the reliability stress-strength models by the method of maximum likelihood estimation. The role of finite mixture of exponential distributions is illustrated using a real life data on time to death of two groups of leukaemia patients.

Keywords:Exponential distribution, Finite mixture of exponential distributions, Maximum Likelihood Estimation, Reliability, Stress-Strength model
 
39-46  
03.3005/031103039046
PDF