Past issues

Welcome to IJLERA! International Journal of Latest Engineering Research and Applications

Volume 09 - Issue 01 (January 2024)


Title:
Optimization Models for Adaptive Video Streaming: Balancing Quality, Buffering, and Bandwidth
Authors:
Koffka Khan
Source:
International Journal of Latest Engineering Research and Applications, pp 01 - 10, Vol 09 - No. 01, 2024
Abstract:
Adaptive video streaming plays a pivotal role in delivering high-quality multimedia content over diverse network conditions. This review paper explores the landscape of optimization models applied to enhance adaptive streaming algorithms. Focusing on the intricate balance between maximizing video quality, minimizing buffering, and optimizing network bandwidth usage, we survey existing algorithms and models. The paper categorizes optimization approaches, spanning quality metrics, buffering strategies, and bandwidth utilization models. Special attention is given to multi-objective optimization, addressing the challenge of simultaneously achieving conflicting objectives. Evaluation metrics, benchmarking methodologies, and emerging trends in adaptive video streaming optimization are also discussed. The comprehensive analysis presented in this review aims to provide a roadmap for researchers, practitioners, and industry professionals to navigate the evolving terrain of adaptive video streaming optimization.
Keywords:
Adaptive video streaming, Optimization models, Video quality, Buffering strategies, Bandwidth utilization
Download Full Article

Title:
An Improved Intelligent Cloud-based Structure for Automated Product Quality Control
Authors:
Vineeta Shrivastava, Vaibhav Udgir
Source:
International Journal of Latest Engineering Research and Applications, pp 11 - 19, Vol 09 - No. 01, 2024
Abstract:
Regardless of the products, quality is the most crucial concern for all manufacturers in any manufacturing system. Quality management is a collection of procedures and instruments that can improve the overall system performance of a manufacturing facility. The dynamic nature of today's business climate and intense rivalry in the market have made quality tools and continuous improvement (CI) essential for long-term success and overcoming obstacles. The methodology of automating quality assurance with cloud computing is also explored in this study. Given how popular cloud computing has become lately. An increasing number of manufacturers are thinking about switching to a cloud-based quality system for their quality management. Because of this, the cloud's power, agility, and cost advantages are now essential for surviving in today's dynamic and uncertain manufacturing environment. Thus, utilizing machine learning methods and cloud computing, this work has provided a service-based proposal system for visual quality assurance. The model's accuracy in detecting defects in manufactured parts and response time are assessed. The model's average accuracy was estimated to be approximately 93%, while the average reaction delay was estimated to be approximately 8 seconds.
Keywords:
Manufacturing, Quality Assurance, Customer Satisfaction, Visual Inspection, Cloud Computing
Download Full Article
DOI:
10.56581/IJLERA.9.1.11-19

Title:
Inverse Doubly Connected Domination in the Join and Cartesian Product of Two Graphs
Authors:
Khaty M. Cruz, Enrico L. Enriquez
Source:
International Journal of Latest Engineering Research and Applications, pp 20 - 25, Vol 09 - No. 01, 2024
Abstract:
Let G be a nontrivial connected graph. A dominating set D⊆V(G) is called a doubly connected dominating set of G if both {D} and {V(G)\D} are connected. Let D be a minimum doubly connected dominating set of G. If S⊆V(G)\D is a doubly connected dominating set of G, then S is called an inverse doubly connected dominating set of G with respect to D. Furthermore, the inverse doubly connected domination number, denoted by γcc−1(G), is the minimum cardinality of an inverse doubly connected dominating set of G. An inverse doubly connected dominating set of cardinality γcc−1(G) is called γcc−1-set. In this paper, we characterized the inverse doubly connected domination in the join and cartesian product of two graphs and give some important results.
Keywords:
dominating set, doubly connected dominating set, inverse dominating set, inverse doubly connected dominating set
Download Full Article

Title:
Cultural Influences and Sustainable Housing Design: A Comprehensive Systematic Review
Authors:
Tajudeen O. AJAYI, Thomas B. AKINTUNDE, Akinniyi T. AKINYEMI
Source:
International Journal of Latest Engineering Research and Applications, pp 26 - 37, Vol 09 - No. 01, 2024
Abstract:
Sustainable housing design is a key component of achieving the Sustainable Development Goal 11 (SDG-11), which aims to make cities and human settlements inclusive, safe, resilient, and sustainable. However, cultural influences are often overlooked or neglected in the design process, leading to potential conflicts and mismatches between the intended outcomes and the actual needs and preferences of the users. This paper presents a systematic review of forty-nine published journal articles from 2009 to 2023 that explore the relationship between cultural influences and sustainable housing design in different contexts and regions. The review follows the PRISMA guidelines and uses a mixed-methods approach to synthesize the data from descriptive statistics, thematic analysis, and meta-analysis. The results reveal that cultural influences have significant impacts on various aspects of sustainable housing design, such as energy efficiency, thermal comfort, indoor air quality, water management, waste management, materials selection, spatial organization, aesthetics, and social cohesion. The paper also discusses the challenges and opportunities for integrating cultural influences into sustainable housing design and provides recommendations for future research and practice.
Keywords:
Cultural influences; Mixed-method; SDG-11; Sustainable housing design; Systematic review.
Download Full Article
DOI:
10.56581/IJLERA.9.1.26-37

Title:
Neanderthal Extinction, Early Modern Humans and Diet
Authors:
Pedro Juan Urbano Cardona
Source:
International Journal of Latest Engineering Research and Applications, pp 38 - 42, Vol 09 - No. 01, 2024
Abstract:
The use in this work of a diet model differentiated between Neanderthals and early modern humans, based on the need for a diet rich in protein to maintain robust morphology and muscle hypertrophy in elite weightlifting and throwing athletes, with anatomical adaptations similar to Neanderthals, allows establishing an increase of 81.92% of the population of modern humans with respect to Neanderthals. This must have played an essential role in the extinction of the latter, due to the competition to obtain a greater amount of daily protein (121.89 gr/day for each Neanderthal versus 67 gr/day for each modern human) to maintain 30% more muscle mass (Boyd et Silk, 2001, Arsuaga et al., 2015, Carretero et al., 2018, García-Martínez et al., 2018).
Download Full Article
DOI:
10.56581/IJLERA.9.1.38-42

Title:
Disjoint Perfect Domination in Join and Corona of Two Graphs
Authors:
Ma. Elizabeth N. Diapo, Enrico L. Enriquez
Source:
International Journal of Latest Engineering Research and Applications, pp 43 - 49, Vol 09 - No. 01, 2024
Abstract:
Let G bea connected simple graph. A dominating set S⊆V G is called a perfect dominating set of G if every u∈V G \S is dominated by exactly one element of S. Let D be a minimum perfect dominating set of G. A perfect dominating set S⊂ V G \D is called an inverse perfect dominating set of G with respect to D. A disjoint perfect dominating set of G is the set C=D∪S⊆V(G). Furthermore, the disjoint perfect domination number, denoted by, γpγp (G), is the minimum cardinality of a disjoint perfect dominating set of G. A disjoint perfect dominating set of cardinality, γpγp (G), is called γpγp-set. In this paper, we give the characterization of the disjoint perfect dominating sets of the join and corona of two graphs. We also determine the disjoint perfect domination number of the join and corona of two graphs and give some important results.
Keywords:
dominating set, perfect dominating set, inverse perfect dominating set, disjoint perfect dominating set, join of two graphs, and corona of two graphs
Download Full Article

Title:
Outer-restrained Domination in the Join and Corona of Graphs
Authors:
Celart A. Tuble, Enrico L. Enriquez
Source:
International Journal of Latest Engineering Research and Applications, pp 50 - 56, Vol 09 - No. 01, 2024
Abstract:
Let G be a connected simple graph. A set S⊆V(G) is a restrained dominating set if every vertex not in S is adjacent to a vertex in S and to a vertex in V(G)∖S. A set S of vertices of a graph G is an outer-restrained dominating set if every vertex not in S is adjacent to some vertex in S and V(G)∖S is a restrained set. The outer-restrained domination number of G, denoted by γr(G) is the minimum cardinality of an outer-restrained dominating set of G. An outer-restrained set of cardinality γr(G) will be called γr - set. In this paper, we initiate a study of the concept and give the characterization of the outer-restrained dominating set in the join and corona of two graphs.
Keywords:
corona, domination, join, outer, restrained
Download Full Article
DOI:
10.56581/IJLERA.9.1.50-56

Title:
Restrained Inverse Domination in the Join and Corona of Two Graphs
Authors:
Wenlin Rose E. Alabastro, Enrico L. Enriquez
Source:
International Journal of Latest Engineering Research and Applications, pp 57 - 62, Vol 09 - No. 01, 2024
Abstract:
Let G be a connected simple graph and D be a minimum dominating set of G. A dominating set S⊆V G ∖D is called an inverse dominating set of G with respect to D. An inverse dominating set S is called a restrained inverse dominating set of G if every vertex not in S is adjacent to a vertex in S and to a vertex in V(G)∖S. The restrained inverse domination number of G, denoted by γr−1(G), is the minimum cardinality of a restrained inverse dominating set of G. A restrained inverse dominating set of cardinality γr −1 (G) is called γr−1-set. In this paper, we initiate a study of the concept and characterize the restrained inverse dominating sets in the join and corona of two graphs.
Keywords:
dominating set, inverse dominating set,join and corona,restrained dominating set, restrained inverse dominating set
Download Full Article
DOI:
10.56581/IJLERA.9.1.57-62

Title:
Disjoint Perfect Secure Domination in the Join and Corona of Graphs
Authors:
Renelyn B. Udtohan, Enrico L. Enriquez
Source:
International Journal of Latest Engineering Research and Applications, pp 63 - 71, Vol 09 - No. 01, 2024
Abstract:
Let 𝐺 be a graph. A dominating set 𝐷⊆𝑉(𝐺)is called a secure dominating set of 𝐺 if for each vertex 𝑢∈𝑉(𝐺)∖𝐷, there exists a vertex 𝑣∈𝐷 such that 𝑢𝑉 ∈ 𝐸(𝐺) and the set (𝐷∖{𝑣})∪{𝑢} is a dominating set of 𝐺. If every 𝑢∈𝑉(𝐺)∖𝐷 is adjacent to exactly one vertex in 𝐷, then 𝐷 is a perfect secure dominating set of 𝐺. Let 𝐷 be a minimum perfect secure dominating set of G. If 𝑆⊆𝑉(𝐺)∖𝐷 is a perfect secure dominating set of 𝐺, then 𝑆 is called an inverse perfect secure dominating set of 𝐺 with respect to 𝐷. A disjoint perfect secure dominating set of 𝐺 is the set 𝐶=𝐷∪𝑆⊆𝑉(𝐺). Furthermore, the disjoint perfect secure domination number, denoted by 𝛾𝑝𝑆𝛾𝑝𝑆(𝐺), is the minimum cardinality of a disjoint perfect secure dominating set of 𝐺. A disjoint perfect secure dominating set of cardinality 𝛾𝑝𝑆𝛾𝑝𝑆(𝐺) is called 𝛾𝑝𝑆𝛾𝑝𝑆-set. In this paper, we initiate a study of the concept of disjoint perfect secure domination in graphs and characterize this type of domination in graphs under some binary operations, namely the join and corona of two graphs..
Keywords:
corona of two graphs, disjoint dominating set, dominating set, inverse dominating set, inverse perfect secure dominating set, join of two graphs, perfect secure dominating set
Download Full Article
DOI:
10.56581/IJLERA.9.1.63-71

Title:
Communication Competencies in the Age of Unmanned Aerial Vehicles (UAVs) Ecosystem
Authors:
Brian Bantugan
Source:
International Journal of Latest Engineering Research and Applications, pp 72 - 87, Vol 09 - No. 01, 2024
Abstract:
This study sought to identify critical communication competencies in the UAV ecosystem, exploring sectors, sustaining competencies, and essential communication skills. This research relied on the "14th Five-Year Plan for General Aviation Development" of China (Unmanned Airspace, 2022) for sector identification, employing textual analysis and validation through online literature searches. Using ChatGPT 3.5, competencies were extracted from original sectors, structured into a matrix, and examined for communication-specific attributes. Thematic analysis facilitated categorization under broader sectors. The study uniquely focused on competencies crucial for communication within the UAV ecosystem, addressing questions regarding sector constitution, competencies for sustainability, and vital communication skills. The comprehensive methodology involved multi-step validation, synthesis, and analysis, ensuring a robust exploration of communication requirements in the UAV ecosystem. Findings revealed six fields within the UAV ecosystem, four major competency categories, and three core communication competencies that can help sustain the UAV ecosystem.
Keywords:
Unmanned Aerial Vehicles; UAV Ecosystem; Competencies; Communication Competencies
Download Full Article

Title:
The Administrative Decentralization Policy Strategy to Carry Out Quality Public Services to the People
Authors:
Cesaltina Dias Corte-Real de Carvalho
Source:
International Journal of Latest Engineering Research and Applications, pp 88 - 94, Vol 09 - No. 01, 2024
Abstract:
The Public services to the people carried out by the government from national to village level, and the people of Timor-Leste continue to cry out for unsatisfied public services. The Administrative Decentralization Policy is a way to distribute the power of the central government to the municipal government to carry out the necessary public services at the local level. Therefore the Government's Administrative Decentralization Policy is set out in Article 72° of the Republic Democrat of Timor Leste Constitution as in paragraph (1) states that "the local power of the people who are collective in the country with representative bodies will be created to organize the participation of each citizen on the solution of their own problems in their community and to promote local development, and not affect the participation of the state". Also referred to in Article 5 of the Republic Democrat of Timor Leste Constitution on Decentralization is as in paragraph (1) The State respect, within its national organisation, the principle for the sharing of the powers of the Public Administration, (2) The law shall establish and strengthen the different characteristics of the country, as well as the administrative competence of the bodies. Based on the above, the following problems are formulated: How is the Administrative Decentralization Policy Strategy for Quality Public Service to the People? The purpose of the research is to identify, analyse and describe the administrative decentralization policy strategy for conducting quality public services to the people. The theory that serves as a basis is the institutional theory by Di Maggio & Powell (1983).
This research used qualitative descriptive methods. Data sources are primary data and secondary data. With data collection techniques, observation, interviews and documentation. And using data analysis techniques from experts Miles & Hubermen (1992:20), such as: data collection, data presentation, data reduction and valid data verification.
The research findings show that, in Timor-Leste, the Government has started implementing administrative decentralization, to approach public administration services to the people, who are currently in the phase of territorial administrative deconcentration. The Government has also formulated laws, decree-laws, ministerial diplomas, government resolution, human resources preparation and preparation of facilities and budgets, to carry out administrative decentralization policies, which in the next phase will be held the Municipal elections so that the people of each Municipality can elected their local national bodies.
Keywords:
Policy Strategy, Administrative Decentralization, and Public Services.
Download Full Article
DOI:
10.56581/IJLERA.9.1.88-94

Title:
Phase Equilibrium for Washing Step during Biodiesel Production from Vegetable Oil and Animal Fat Mixtures
Authors:
Jalal Mustafa Hasan, Cevdet AKOSMAN, Arkan Jasim Hadi
Source:
International Journal of Latest Engineering Research and Applications, pp 95 - 104, Vol 09 - No. 01, 2024
Abstract:
The ternary liquid-liquid equilibrium data of the biodiesel-methanol-water system involved in biodiesel production provides important tools for the development and design of the equipment. In this investigation, the effects of temperature and amount of beef tallow in corn oil on ternary phase equilibrium data for the system of biodiesel-methanol-water were experimentally determined.
The biodiesel samples (0%, 10%, and 20% v/v beef tallow) were produced using the mixtures of corn oil and beef tallow with methanol (methanol to oil: 1/6, n/n) using potassium hydroxide of %1 (w/w) at 60 °C. The solubility data were determined using the cloud point titration method for biodiesel-methanol-water systems at temperatures of 25 °C, 35 °C,45 °C, and at atmospheric pressure. It was found that the effect of temperature on the solubility curves of the ternary liquid-liquid system of biodiesel-methanol-water was negligible at low methanol compositions but had little effect at high methanol compositions. The ternary liquid-liquid solubility curves of biodiesel-methanol-water systems did not significantly change with increasing the beef tallow concentration in corn oil.
Keywords:
Biodiesel, Beef Tallow, Corn Oil, Phase Equilibrium.
Download Full Article

Title:
Secure Inverse Domination in the Join of Graphs
Authors:
Jesica P. Dagodog, Enrico L. Enriquez
Source:
International Journal of Latest Engineering Research and Applications, pp 105 - 112, Vol 09 - No. 01, 2024
Abstract:
Let G be a connected simple graph and let D be a minimum dominating set of G. A dominating set S⊆V G ∖D is an inverse dominating set of G with respect to D. The set S is called a secure inverse dominating set of G if for every u∈V G ∖S, there exists v∈S such that uv∈E(G) and the set S∖ v ∪{u} is a dominating set of G. The secure inverse domination number of G, denoted by γs−1 (G), is the minimum cardinality of a secure inverse dominating set of G. A secure inverse dominating set of cardinality γs−1 (G) is called γs−1 −set. In this paper, the researchers initiate a study of the concept of secure inverse domination in graphs and characterize the secure inverse dominating set in the join of two connected simple graphs.
Keywords:
dominating sets, inverse dominating sets, join of two graphs, secure dominating sets, secure inverse dominating sets
Download Full Article
DOI:
10.56581/IJLERA.9.1.105-112

Title:
Lidar Point Clouds to Precision Forestry
Authors:
Jenish Chauhan, Subash Ghimire
Source:
International Journal of Latest Engineering Research and Applications, pp 113 - 118, Vol 09 - No. 01, 2024
Abstract:
Light Detection and Ranging (LiDAR), is a remote sensing technology that uses laser light to measure distances and create detailed three-dimensional (3D) models of the Earth's surface. This paper highlights the application and uses of lidar point clouds in precision forestry. The study has been carried out by reviewing several literatures. The study also indicates the uses and application of Lidar technology in national and international contexts. The study reveals that LiDAR technology has witnessed widespread adoption across diverse countries, showcasing its versatility and utility in various domains. The study of possible application of LiDAR on archaeology in three archaeological sites of Ireland. Similarly, the study indicates that there are potential emerging areas where advanced LiDAR-based GIS applications can be successfully implemented such as 3D landscape modeling, aquatic applications, and environmental monitoring. In comparison to the international context, LiDAR technology is a novel technology in Nepal till now. The Survey Department of Nepal has started preparing the High-Resolution DTM and orthophoto of about 20,000 square kilometers of Nepal using LiDAR technology. While the majority of projects in Nepal currently center around biomass estimation, this paper discusses the diverse applications of LiDAR beyond this specific context. Finally, the study highlights the transformative potential of LiDAR technology to enhance the accuracy of forestry practices, which is evident in multi-dimensional applications around the world. While developed countries are using LiDAR in various industries, Nepal is still in the early stages of the technology.
Keywords:
LiDAR, Precision Forestry, Nepal
Download Full Article

Title:
Improved Face Authentication by Constructing an Adjustable 3D Image from two 2D Images taken by Two Adjacent Cameras
Authors:
Menachem Domb
Source:
International Journal of Latest Engineering Research and Applications, pp 119 - 125, Vol 09 - No. 01, 2024
Abstract:
With the vast spread of automation, the significant demand for communication services, adding IoT to the Internet, and the corresponding huge increase and sophistication in malicious attacks utilizing system vulnerabilities to penetrate systems. Identification and Authentication are heavily used in every access trial towards any electronic resource and communication networks. The traditional approach to coping with such challenges is using passwords, encryption, Secure ID, Firewall, Etc. More safety methods use Biometrics, which suffer from spoofing. The access control market is a fast-growing and highly volatile market that poses significant challenges for investors seeking to make secured decisions. As the market continues to evolve and become more mainstream, there is a growing demand for new identification and authentication technologies. This paper proposes expanding the number of features extracted from a 3D image, with unique features evolved during the generation of the 3D image of the prospect at the access control stage. We mounted two identical 2D cameras on the same bar, allowing the adjustment of the distance between the two mounted cameras. The two cameras are simultaneously activated, generating a unique 3D image, including some distortion. This stage is executed at the person enrollment process and repeated at the access stage, providing an enhanced, unique, and cannot be faked Authentication. Experiments support the proposed approach.
Keywords:
Image processing, 3D image Construction, Authentication,
Download Full Article
DOI:
10.56581/IJLERA.9.1.119-125

Title:
Student Activities Learning in Applying AR Media with the RME Approach
Authors:
Ahmad Budi Sutrisno, Hamzah Upu, Rusli
Source:
International Journal of Latest Engineering Research and Applications, pp 126 - 128, Vol 09 - No. 01, 2024
Abstract:
The abstract should summarize the content of the paper. Try to keep the abstract below 200 words. Do not make references nor display equations in the abstract. The journal will be printed from the same-sized copy prepared by you. Your manuscript should be printed on A4 paper (21.0 cm x 29.7 cm). It is imperative that the margins and style described below be adhered to carefully. This will enable us to keep uniformity in the final printed copies of the Journal. Please keep in mind that the manuscript you prepare will be photographed and printed as it is received. Readability of copy is of paramount importance.
Keywords:
About five key words in alphabetical order, separated by comma
Download Full Article

Title:
General Principles of Credit Risk Assessment
Authors:
Affes M'hamed, Hammami Sami
Source:
International Journal of Latest Engineering Research and Applications, pp 129 - 144, Vol 09 - No. 01, 2024
Abstract:
Credit risk is at the heart of banking concerns today. However, granting credit is a complex act; it is linked to risks whose coverage becomes a safeguard principle. In this context, it is necessary to carry out assessments in order to limit these risks.
Our study has made it possible to show, on the basis of the work of the Basel Committee, the relevant valuation method with regard to the requirements of Basel II and Basel III. For this purpose, the “standard” and “IRB” methods were used.
Keywords:
Bank, credit, risk, investment credit, credit risk, rating, probability of default.
Download Full Article